name |
Tripp Lite B002a Secure KVM Switch Series |
IBM Enterprise PKCS#11 Firmware FW IDs 'dada00eb' ((4767) and 'e41c1444' (4765) |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
09.07.2022 |
26.03.2023 |
not_valid_before |
09.07.2020 |
26.03.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_VID11062-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1002c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_VID11062-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1002a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_VID11062-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1002b_pdf.pdf |
manufacturer |
Tripp Lite |
IBM Corporation |
manufacturer_web |
https://www.tripplite.com |
https://www.ibm.com |
security_level |
{} |
EAL4 |
dgst |
96402fa45cae4c3f |
4db9ed66ccab7fd5 |
heuristics/cert_id |
CCEVS-VR-11062-2020 |
BSI-DSZ-CC-1002-2018 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
{} |
heuristics/extracted_versions |
- |
4767, 11, 4765 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1094-2019 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1094-2019 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Peripheral Switch
- certification_date: 09.07.2020
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 09.07.2022
- id: CCEVS-VR-VID11062
- product: Tripp Lite B002a Secure KVM Switch Series
- scheme: US
- url: https://www.niap-ccevs.org/product/11062
- vendor: Trippe Manufacturing Company
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
da2e45c9b3fbb700 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf |
{} |
pdf_data/cert_filename |
st_VID11062-ci.pdf |
1002c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11062-2020: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
- PKCS:
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20200715122218-04'00'
- /ModDate: D:20200715122218-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 179835
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180423082623+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, IBM, PKCS#11 FW IDs 'dada00eb' (4767) and 'e41c1444' (4765)"
- /ModDate: D:20180423142404+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Zertifikat, Certificate, Urkunde
- /Title: Certification Report BSI-DSZ-CC-1002-2018
- pdf_file_size_bytes: 922473
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_VID11062-vr.pdf |
1002a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-11062-20209
- cert_item: for Tripp Lite B002a Secure KVM Switch Series
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1002-2018
- cert_item: IBM Enterprise PKCS#11 Firmware FW IDs 'dada00eb' (4767) and 'e41c1444' (4765
- cert_lab: BSI
- developer: IBM Research & Development Germany
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
- US:
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 6
- SHA-384: 1
- SHA-512: 1
- SHA256: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 2
- AIS 23: 1
- AIS 32: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 186-3: 1
- FIPS 186-4: 8
- FIPS 197: 1
- FIPS 46-3: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-90A: 1
- PKCS:
- RFC:
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- EP11 configuration list (BOE) for documentation files, Version 1, 2017-07-14, IBM (confidential document) Hardware configuration list for IBM 4765 and 4767 EP11 HSMs, Version 1.0, 2017- 08-31, IBM: 1
- Report, Version 5, 2018-03-12, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration lists for the TOE: Configuration list of static content measured by SHA256: 1
- Version 1.0, 2016- 12-12, IBM (confidential document) EP11 configuration list BOE, Version 1, 2017-07-14, IBM (confidential document) 7 specifically •: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180423082645+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, IBM, PKCS#11 FW IDs 'dada00eb' (4767) and 'e41c1444' (4765)"
- /ModDate: D:20180423142111+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Certification Report, Zertifizierungsreport
- /Title: Certification Report BSI-DSZ-CC-1002-2018
- pdf_file_size_bytes: 1388431
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
pdf_data/st_filename |
st_VID11062-st.pdf |
1002b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 3
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 49
- FDP_IFC.1.1: 2
- FDP_IFF.1: 53
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_RIP.1: 14
- FDP_RIP.1.1: 5
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 4
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 2
- FMT_MSA.3: 6
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FPT:
- FPT_FLS.1: 14
- FPT_FLS.1.1: 1
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 17
- FPT_PHP.3.1: 1
- FPT_TST.1: 18
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_ATH_EXT.1: 9
- FTA_ATH_EXT.1.1: 2
- FTA_ATH_EXT.2: 5
- FTA_ATH_EXT.2.1: 1
- FTA_CIN_EXT: 1
- FTA_CIN_EXT.1: 7
- FTA_CIN_EXT.1.1: 2
- FTA_SSL.4: 1
- FTA_TAB.1: 1
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_SPECIAL_ANALOG_CAPABILITIES: 2
- A.NO_TEMPEST: 2
- A.PHYSICAL: 2
- A.TRUSTED_ADMIN: 2
- A.TRUSTED_CONFIG: 2
- O:
- O.ANTI_TAMPERING: 6
- O.ANTI_TAMPERING_BACKUP_FAIL_TRI: 1
- O.ANTI_TAMPERING_BACKUP_FAIL_TRIG: 1
- O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 3
- O.ANTI_TAMPERING_BACKUP_POWER: 5
- O.ANTI_TAMPERING_INDICATION: 5
- O.ANTI_TAMPERING_PERMANENTLY_: 1
- O.ANTI_TAMPERING_PERMANENTLY_DIS: 1
- O.ANTI_TAMPERING_PERMANENTLY_DISABL: 1
- O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 6
- O.AUTHORIZED_SWITCHING: 5
- O.COMPUTER_INTERFACE_ISOLATION: 9
- O.COMPUTER_INTERFACE_ISOLATION_TOE_: 1
- O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 4
- O.COMPUTER_INTERFACE_ISOLATION_U: 2
- O.COMPUTER_TO_AUDIO_ISOLATION: 5
- O.CONTINUOUS_INDICATION: 5
- O.DISABLE_UNAUTHORIZED_ENDPOINT: 1
- O.DISABLE_UNAUTHORIZED_ENDPOINTS: 4
- O.DISABLE_UNAUTHORIZED_PERIPHER: 1
- O.DISABLE_UNAUTHORIZED_PERIPHERA: 1
- O.DISABLE_UNAUTHORIZED_PERIPHERAL: 3
- O.DISPLAYPORT_AUX_FILTERING: 2
- O.KEYBOARD_AND_MOUSE_TIED: 5
- O.KEYBOARD_MOUSE_EMULATED: 5
- O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
- O.NO_AMBIGUOUS_CONTROL: 5
- O.NO_ANALOG_AUDIO_INPUT: 6
- O.NO_CONNECTED_COMPUTER_CONTRO: 2
- O.NO_CONNECTED_COMPUTER_CONTROL: 3
- O.NO_DOCKING_PROTOCOLS: 5
- O.NO_OTHER_EXTERNAL_INTERFACES: 8
- O.NO_TOE_ACCESS: 5
- O.NO_USER_DATA_RETENTION: 7
- O.PERIPHERAL_PORTS_ISOLATION: 10
- O.PURGE_TOE: 2
- O.PURGE_TOE_KB_DATA_WHILE_SWITC: 1
- O.PURGE_TOE_KB_DATA_WHILE_SWITCH: 1
- O.PURGE_TOE_KB_DATA_WHILE_SWITCHING: 1
- O.SELF_TEST: 10
- O.SELF_TEST_FAIL_INDICATION: 5
- O.SELF_TEST_FAIL_TOE_DISABLE: 9
- O.TAMPER_EVIDENT_LABEL: 7
- O.UNIDIRECTIONAL_AUDIO_OUT: 5
- O.UNIDIRECTIONAL_EDID: 3
- O.UNIDIRECTIONAL_VIDEO: 7
- O.UNIDIRERCTIONAL_EDID: 4
- O.USER_AUTHENTICATION_ADMIN: 5
- O.USER_AUTHENTICATION_ISOLATION: 4
- O.USER_AUTHENTICATION_RESET: 9
- O.USER_AUTHENTICATION_TERMINATION: 1
- O.USER_DATA_ISOLATION: 7
- OE:
- OE.NO_TEMPEST: 1
- OE.PHYSICAL: 3
- OE.TRUSTED_ADMIN: 5
- T:
- T.AUDIO_REVERSED: 1
- T.AUTHORIZED_BUT_UNT: 1
- T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
- T.DATA_LEAK: 2
- T.FAILED: 2
- T.LOGICAL_TAMPER: 2
- T.MICROPHONE_USE: 1
- T.PHYSICAL_TAMPER: 2
- T.REPLACEMENT: 2
- T.RESIDUAL_LEAK: 2
- T.SIGNAL_LEAK: 2
- T.UNAUTHORIZED_DEVICE: 1
- T.UNAUTHORIZED_DEVICES: 1
- T.UNINTENDED_SWITCHI: 1
- T.UNINTENDED_SWITCHING: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 5
- SHA-256: 14
- SHA-384: 4
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 1
- KEX:
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-192: 8
- P-224: 8
- P-256: 8
- P-384: 8
- P-521: 8
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 2
- SCA:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
- BSI:
- FIPS:
- FIPS 140-2: 3
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS 197: 4
- ISO:
- PKCS:
- PKCS 11: 1
- PKCS#11: 153
- PKCS1: 5
- PKCS11: 1
- PKCS12: 1
- RFC:
- RFC 3394: 1
- RFC 3447: 11
- RFC 5649: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Visegrady, Tamas <tvi (at) zurich.ibm.com>
- /CreationDate: D:20170830165958+02'00'
- /Creator: IBM Research --- Zurich and IBM Boeblingen/Poughkeepsie
- /Keywords: IBM 4767 (hw. 00LV498 (2)); PCIeCC; XCP, Enterprise PKCS11 (EP11)
- /ModDate: D:20170830165958+02'00'
- /PTEX.Fullbanner: This is pdfTeX, Version 3.14159265-2.6-1.40.18 (TeX Live 2017/TeX Live for SUSE Linux) kpathsea version 6.2.3
- /Producer: pdfTeX
- /Subject: Security Policy [rev. 273]
- /Title: IBM Enterprise PKCS11(on 4767) Security Target (EAL 4 )
- /Trapped: /False
- pdf_file_size_bytes: 840064
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |