Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM
383-4-270
NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
BSI-DSZ-CC-0707-2012
name Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA DE
not_valid_after 19.04.2018 01.09.2019
not_valid_before 16.07.2013 13.08.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0707a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0707b_pdf.pdf
manufacturer Belkin International, Inc. NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.belkin.com https://www.nxp.com
security_level EAL4+, ALC_FLR.3 ATE_DPT.2, AVA_VAN.5, ASE_TSS.2, EAL4+, ALC_DVS.2
dgst 40eda3a9b18267e3 f8c46366b632c04b
heuristics/cert_id 383-4-270 BSI-DSZ-CC-0707-2012
heuristics/cert_lab CANADA BSI
heuristics/direct_transitive_cves {} CVE-2021-3011
heuristics/indirect_transitive_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0864-2012, BSI-DSZ-CC-0860-2013, NSCIB-CC-13-37762-CR
heuristics/report_references/indirectly_referenced_by {} OCSI/CERT/CCL/09/2022/RC, BSI-DSZ-CC-0913-2014, NSCIB-CC-13-37760-CR2, OCSI/CERT/SYS/05/2016/RC, OCSI/CERT/CCL/05/2021/RC, BSI-DSZ-CC-0825-2017, OCSI/CERT/SYS/03/2016/RC, BSI-DSZ-CC-0864-2012, BSI-DSZ-CC-0914-2014, BSI-DSZ-CC-0912-2014, OCSI/CERT/SYS/04/2015/RC, NSCIB-CC-13-37761-CR2, BSI-DSZ-CC-0821-2014, BSI-DSZ-CC-0911-2014, BSI-DSZ-CC-0860-2013, OCSI/CERT/SYS/02/2016/RC, OCSI/CERT/SYS/05/2015/RC, OCSI/CERT/CCL/06/2021/RC, OCSI/CERT/SYS/06/2016/RC, NSCIB-CC-13-37762-CR
heuristics/protection_profiles fd5d86dc01df0437 f6d23054061d72ba
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/report_filename belkin-cert-eng.pdf 0707a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • CA:
    • cert_id: 383-4-270 CR
    • cert_lab: CANADA
  • DE:
    • cert_id: BSI-DSZ-CC-0707-2012
    • cert_item: NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-270: 1
  • DE:
    • BSI-DSZ-CC-0707: 1
    • BSI-DSZ-CC-0707-2012: 20
    • BSI-DSZ-CC-S-0003: 1
  • NL:
    • CC-0707: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0035-2007: 1
    • BSI-CC-PP-0035-2007: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 2
    • EAL4: 1
  • EAL:
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 2
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 7
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 5
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 19
    • NXP Semiconductors: 20
  • Philips:
    • Philips: 2
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • TDEA: 3
      • Triple-DES: 4
    • DES:
      • DES: 5
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • physical probing: 1
    • side channel: 1
  • other:
    • JIL: 4
    • reverse engineering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • BSI:
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 3
    • AIS 36: 2
    • AIS 37: 1
    • AIS 38: 1
  • FIPS:
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 7816: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Card Controllers P5Cx081V1D/P5CD041V1D/P5 CD021V1D/P5CD016V1D with DESFire EV1, T-Systems GEI GmbH (confidential document) [10] ETR for composition, NXP P5CD081V1D Secure Smart Card Controller, BSI-DSZ- CC-0707, T-Systems: 1
    • Controllers, Revision 1.3, NXP Semiconductors, Business Unit Identification, October 24th, 2011 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [8: 1
    • GmbH, Version 1.2, 08.06.2012 (confidential document) [11] Data Sheet P5CD016/021/041/051 and P5Cx081 family, Secure dual interface and contact PKI: 1
pdf_data/report_metadata
  • /Author: User
  • /CCEF: CCEF name
  • /CR date: dd month yyyy
  • /CR version: x.x
  • /Certificate date: dd month yyyy
  • /Comments:
  • /Company:
  • /CreationDate: D:20131004084035-04'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer name: Developer name
  • /Document number: 383-4-xx-CR
  • /ETR title, version, date: ETR title, version, date
  • /Evaluation completion date: dd month yyyy
  • /Manager:
  • /ModDate: D:20131004084142-04'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ST Title: ST title
  • /ST date: dd month yyyy
  • /ST version: ST version
  • /Sponsor: Sponsor
  • /Subject:
  • /TOE Version: 5.0
  • /TOE name and version: TOE name and version
  • /TOE short name: TOE short name
  • /Title: EAL 4+ Evaluation of Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM
  • pdf_file_size_bytes: 64923
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20120828082855+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcards: Controller, Operating System, NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1, NXP Semiconductors Germany GmbH"
  • /ModDate: D:20120829085126+02'00'
  • /Producer: LibreOffice 3.5
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0707-2012
  • pdf_file_size_bytes: 954555
  • pdf_hyperlinks: https://www.bsi.bund.dea/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename belkin-sec-eng.pdf 0707b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0707: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 4: 68
    • EAL 4 augmented: 65
    • EAL4: 1
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL4: 29
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 2
    • ALC_FLR.3: 71
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 2
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 4
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 5
    • FDP_ETC: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 33
    • FDP_IFC.1: 6
    • FDP_IFF: 27
    • FDP_IFF.1: 12
    • FDP_ITC: 1
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA: 4
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 3
    • FMT_SMR.1: 3
  • FPT:
    • FPT_PHP: 2
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
  • FAU:
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 25
    • FCS_COP.1.1: 2
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 48
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 38
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 15
    • FDP_ITC.1: 7
    • FDP_ITC.2: 14
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 6
    • FDP_ROL.1: 6
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MDT.1: 1
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 26
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 7
    • FPT_ITT.1: 6
    • FPT_PHP.3: 7
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FRU:
    • FRU_FLT.2: 7
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 10
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.MANAGE: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 2
  • O:
    • O.CONF: 7
    • O.INDICATE: 3
    • O.ROM: 11
    • O.SELECT: 3
    • O.SWITCH: 7
    • O.TAMPER: 6
    • O.UNIDIR: 11
    • O.USBDETECT: 6
  • OE:
    • OE.ACCESS: 3
    • OE.MANAGE: 2
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 2
  • T:
    • T.INFECTED: 3
    • T.INVALIDUSB: 3
    • T.PERIP: 3
    • T.RESIDUAL: 3
    • T.ROM_PROG: 3
    • T.SPOOF: 3
    • T.TAMPER: 3
    • T.TRANSFER: 3
  • O:
    • O.AUTHENTICATION: 8
    • O.CONFIDENTIALITY: 6
    • O.DATA-ACCESS: 8
    • O.HW-AES: 7
    • O.MEM-ACCESS: 10
    • O.MF-FW: 8
    • O.RND: 3
    • O.SFR-: 1
    • O.SFR-ACCESS: 7
    • O.TRANSACTION: 6
    • O.TYPE-: 1
    • O.TYPE-CONSISTENCY: 5
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Microsoft:
    • Microsoft: 4
  • Samsung:
    • Samsung: 3
  • NXP:
    • NXP: 104
    • NXP Semiconductors: 23
  • Philips:
    • Philips: 1
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 30
  • DES:
    • 3DES:
      • TDEA: 3
      • Triple-DEA: 1
      • Triple-DES: 11
    • DES:
      • DEA: 2
      • DES: 22
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 3
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 10
  • other:
    • reverse engineering: 1
  • FI:
    • Malfunction: 10
    • fault injection: 4
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 14
    • Physical Probing: 2
    • physical probing: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 4
    • FIPS PUB 46: 1
    • FIPS PUB 46-3: 4
    • FIPS PUB 81: 1
  • ISO:
    • ISO/IEC 14443: 16
    • ISO/IEC 18092: 2
    • ISO/IEC 7816: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • TSF shall ensure that only secure values are accepted for security attributes.” This is clearly out of scope for the TOE. The design concept of the TOE and the systems in which the TOE is used is based on the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: krshann
  • /CreationDate: D:20130909140137-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20130910104630-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - Belkin Secure DVI KVM Switch ST Rev 1_01 updated by keith.docx
  • pdf_file_size_bytes: 739602
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /Alternative descriptive title: Security Target Lite
  • /Author: NXP Semiconductors
  • /CertificationID: BSI-DSZ-CC-0707
  • /Comments:
  • /Company: NXP Semiconductors
  • /Copyright date: 2011
  • /CreationDate: D:20111025074953+02'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Descriptive title: Security Target Lite
  • /Division: NXP Semiconductors
  • /Document identifier: xxx
  • /Keywords: Evaluation Documentation; CC; Security Target Lite; P5CD081V1D with DESFire EV1, P5CD081; NXP Secure Smart Card Controller; BSI_DSZ-CC-0707
  • /ModDate: D:20111025075009+02'00'
  • /Modification date: 24 October 2011
  • /Producer: Adobe PDF Library 9.0
  • /Revision: Rev. 1.1
  • /Security status: Public
  • /SourceModified: D:20111025054903
  • /Specification status: Evaluation documentation
  • /Subject:
  • /Template date: 31 March 2009
  • /Template revision: 2
  • /Template version: 2.8.3B
  • /Title: Security Target Lite
  • /docpath: D:\Aufgaben\2010\NXP_P5CD081V1A_Desfire
  • /philips_smx_cl_docpath: I:\P5_CryptoLib\SmxCl\docs\99_prj_mgmt\Templates
  • /relBiblioPath: V:\DESFireEV1\ProjectManagement\90_Common_Criteria\SecurityTargetEvaluation\Bibliography.doc
  • /status:
  • /text_developer_long: NXP Semiconductors, Business Unit Identification
  • /text_developer_short: NXP
  • /text_product_cfgCD016: P5CD016V1D
  • /text_product_cfgCD021: P5CD021V1D
  • /text_product_cfgCD041: P5CD041V1D
  • /text_product_cfgCD081: P5CD081V1D
  • /text_product_cfgCN081: P5CN081V1D
  • /text_product_letter: D
  • /text_product_long: NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
  • /text_product_minor: V1D
  • /text_product_short: P5CD081V1D with DESFire EV1
  • pdf_file_size_bytes: 667836
  • pdf_hyperlinks: mailto:[email protected], http://www.nxp.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different