Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices
535-EWA
Samsung SP of S3B512C revision 3
2021-23-INF-4038
name Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices Samsung SP of S3B512C revision 3
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA ES
not_valid_after 24.01.2027 08.04.2028
not_valid_before 24.01.2022 08.04.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/535-EWA%20CT%20Done.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-23_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/535-EWA%20CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-23%20INF-4038.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%201.6%20Belkin_CFG_PSD-KM_Combined_ST_1.6.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-23%20ST_Lite.pdf
manufacturer Belkin International, Inc. Samsung Electronics Co., Ltd.
manufacturer_web https://www.belkin.com https://www.samsung.com
security_level {} EAL2
dgst 99b3bc3ca928c39f 95f760528ffedd31
heuristics/cert_id 535-EWA 2021-23-INF-4038
heuristics/cert_lab CANADA []
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 40404, 4 3
heuristics/scheme_data
  • certification_date: 24.01.2022
  • level: PP_PSD_v4.0, MOD_KM_v1.0
  • product: Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices
  • vendor: Belkin International, Inc.
  • category: Biometric Devices
  • certification_date: 08.04.2023
  • enhanced:
    • category: Biometric Devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1701
    • certification_date: 08.04.2023
    • description: The SP of S3B512C single-chip CMOS micro-controller is designed and packaged specifically for "Biometric Smart Card" applications. The Cortex-M33 CPU architecture of the SP of S3B512C microcontrollerfollows the Harvard style, that is, it has separate program memory and data memory. Both instruction and data can be fetched simultaneously without causing a stall, using separate paths for memory access. The main security features of the SP of S3B512C integrated circuit are: Secure fingerprint image capture and feature extraction provided by TOE SP firmware, integrity protected. Access control of Users to Flash memory positions where SP firmware is executed. TOE Unique Identification Countermeasures to avoid attackers reproduction of fingerprint data. An AES hardware block supporting AES encryption and decryption with 128-bit, 192-bit and 256-bit keys in ECB mode. The AES block supports encryption of fingerprint features to be sent to SE of S3B512C. Note SE (Secure Element) is not TOE.
    • evaluation_facility: Applus Laboratories
    • level: EAL2
    • manufacturer: Samsung Electronics Co., Ltd
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1702
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1700
    • type: Product
  • manufacturer: Samsung Electronics Co., Ltd
  • product: Samsung SP of S3B512C revision 3
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/974-samsung-sp-of-s3b512c-revision-3
heuristics/protection_profiles 76f8f05a35d87f59, 814f66c77bc7f33b {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf {}
pdf_data/cert_filename 535-EWA CT Done.pdf 2021-23_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 535-EWA: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 3
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20220127142407-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1643295
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 913137
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 535-EWA CR.pdf 2021-23 INF-4038.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 535-EWA
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 535-EWA: 1
  • ES:
    • 2021-23-INF-4038- v1: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 8
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_SPD.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 14
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Applus:
    • Applus Laboratories: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
pdf_data/report_keywords/crypto_protocol
  • PGP:
    • PGP: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 2
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 5
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_metadata
pdf_data/st_filename ST 1.6 Belkin_CFG_PSD-KM_Combined_ST_1.6.pdf 2021-23 ST_Lite.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
  • FDP:
    • FDP_APC_EXT: 15
    • FDP_APC_EXT.1: 13
    • FDP_APC_EXT.1.1: 1
    • FDP_APC_EXT.1.2: 1
    • FDP_APC_EXT.1.3: 1
    • FDP_APC_EXT.1.4: 1
    • FDP_FIL_EXT: 16
    • FDP_FIL_EXT.1: 7
    • FDP_FIL_EXT.1.1: 1
    • FDP_FIL_EXT.1.2: 1
    • FDP_FIL_EXT.1.3: 1
    • FDP_FLS_EXT: 1
    • FDP_PDC_EXT: 17
    • FDP_PDC_EXT.1: 26
    • FDP_PDC_EXT.1.1: 2
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 6
    • FDP_PDC_EXT.2.1: 1
    • FDP_PDC_EXT.2.2: 1
    • FDP_PDC_EXT.3: 7
    • FDP_PDC_EXT.3.1: 1
    • FDP_PDC_EXT.3.2: 1
    • FDP_RDR_EXT: 4
    • FDP_RDR_EXT.1: 15
    • FDP_RDR_EXT.1.1: 2
    • FDP_RIP: 6
    • FDP_RIP.1: 1
    • FDP_RIP_EXT: 4
    • FDP_RIP_EXT.1: 9
    • FDP_RIP_EXT.1.1: 2
    • FDP_SWI_EXT: 4
    • FDP_SWI_EXT.1: 21
    • FDP_SWI_EXT.1.1: 3
    • FDP_SWI_EXT.2: 11
    • FDP_SWI_EXT.2.1: 2
    • FDP_SWI_EXT.2.2: 3
    • FDP_SWI_EXT.3: 14
    • FDP_SWI_EXT.3.1: 2
    • FDP_UDF_EXT: 11
    • FDP_UDF_EXT.1: 5
    • FDP_UDF_EXT.1.1: 1
  • FPT:
    • FPT_FLS_EXT: 3
    • FPT_FLS_EXT.1: 10
    • FPT_FLS_EXT.1.1: 3
    • FPT_NTA_EXT: 4
    • FPT_NTA_EXT.1: 8
    • FPT_NTA_EXT.1.1: 2
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 18
    • FPT_TST_EXT.1.1: 3
  • FTA:
    • FTA_CIN_EXT: 4
    • FTA_CIN_EXT.1: 11
    • FTA_CIN_EXT.1.1: 2
    • FTA_CIN_EXT.1.2: 2
    • FTA_CIN_EXT.1.3: 2
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_SAS: 9
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 4
    • FCS_CKM.4: 7
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 10
    • FDP_ITC: 2
    • FDP_ITC.1: 10
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 4
    • FDP_ITT: 1
    • FDP_ITT.1: 6
    • FDP_ITT.1.1: 1
    • FDP_RIP: 1
    • FDP_RIP.1: 1
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
    • FDP_SDI: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 1
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
    • FDP_UIT: 1
    • FDP_UIT.1: 6
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 3
    • FMT_SMR.1: 6
  • FPT:
    • FPT_ITT: 1
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP: 1
    • FTP_TRP.1: 10
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 3
    • O.USER_DATA: 2
  • OE:
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
  • O:
    • O.AES: 10
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 20
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 36
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 7
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 70
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS197: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 1418253
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different