This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices 535-EWA |
NPCT7xx TPM2.0 rev1.38 Hardware version LAG019 Firmware version 7.2.1.0 ANSSI-CC-2018/61 |
|
---|---|---|
name | Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices | NPCT7xx TPM2.0 rev1.38 Hardware version LAG019 Firmware version 7.2.1.0 |
category | Other Devices and Systems | Trusted Computing |
scheme | CA | FR |
status | active | archived |
not_valid_after | 24.01.2027 | 18.01.2019 |
not_valid_before | 24.01.2022 | 18.01.2019 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/535-EWA%20CT%20Done.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/535-EWA%20CR.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_61fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%201.6%20Belkin_CFG_PSD-KM_Combined_ST_1.6.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_61en.pdf |
manufacturer | Belkin International, Inc. | Nuvoton Technology |
manufacturer_web | https://www.belkin.com | |
security_level | {} | ALC_FLR.1, EAL4+, AVA_VAN.4, ALC_DVS.2 |
dgst | 99b3bc3ca928c39f | 9b2b509ecd125370 |
heuristics/cert_id | 535-EWA | ANSSI-CC-2018/61 |
heuristics/cert_lab | CANADA | SERMA |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ALC_DVS.2, ALC_FLR.1, AVA_VAN.4 |
heuristics/extracted_versions | 40404, 4 | 7.2.1.0, 2.0, 1.38 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2020/21, ANSSI-CC-2019/30 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2020/21, ANSSI-CC-2022/27, ANSSI-CC-2022/24, ANSSI-CC-2022/25, ANSSI-CC-2022/31, ANSSI-CC-2019/30, ANSSI-CC-2022/30, ANSSI-CC-2021/49, ANSSI-CC-2022/29, ANSSI-CC-2022/26, ANSSI-CC-2021/52, ANSSI-CC-2021/50, ANSSI-CC-2022/28, ANSSI-CC-2021/51 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referencing | {} | ANSSI-CC-PP-2018/03 |
heuristics/st_references/indirectly_referencing | {} | ANSSI-CC-PP-2018/03 |
heuristics/protection_profiles | 76f8f05a35d87f59, 814f66c77bc7f33b | 477fa2c9a8069ca7 |
maintenance_updates |
|
|
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_03-pp.pdf |
pdf_data/cert_filename | 535-EWA CT Done.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 535-EWA CR.pdf | anssi-cc-2018_61fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ST 1.6 Belkin_CFG_PSD-KM_Combined_ST_1.6.pdf | anssi-cible-cc-2018_61en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |