This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM 383-4-270 |
S3NSEN4/S3NSEN3 with Bootloader & system API v1.1, DTRNG FRO M libraries v2.2, v3.3 & PTG.1 DTRNG FROM library v1.4 (Revision 1) ANSSI-CC-2021/30-R01 |
|
---|---|---|
name | Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM | S3NSEN4/S3NSEN3 with Bootloader & system API v1.1, DTRNG FRO M libraries v2.2, v3.3 & PTG.1 DTRNG FROM library v1.4 (Revision 1) |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
status | archived | active |
not_valid_after | 19.04.2018 | 06.07.2027 |
not_valid_before | 16.07.2013 | 06.07.2022 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2021_30-r01fr.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-cert-eng.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_30-r01.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-sec-eng.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_30-r01.pdf |
manufacturer | Belkin International, Inc. | SAMSUNG ELECTRONICS INC. |
manufacturer_web | https://www.belkin.com | https://www.samsung.com/sec |
security_level | EAL4+, ALC_FLR.3 | EAL6+, ASE_TSS.2 |
dgst | 40eda3a9b18267e3 | f93be9a7aeed78d6 |
heuristics/cert_id | 383-4-270 | ANSSI-CC-2021/30-R01 |
heuristics/cert_lab | CANADA | [] |
heuristics/cpe_matches | {} | cpe:2.3:h:samsung:s3nsen4:-:*:*:*:*:*:*:* |
heuristics/extracted_sars | ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 | ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions | - | 1.4, 2.2, 1.1, 3.3 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2021/30 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2018/30, ANSSI-CC-2021/30, ANSSI-CC-2019/29 |
heuristics/protection_profiles | fd5d86dc01df0437 | cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename | certificat_2021_30-r01fr.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | belkin-cert-eng.pdf | anssi-cc-2021_30-r01.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | belkin-sec-eng.pdf | anssi-cible-cc-2021_30-r01.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |