name |
High Sec Labs SC21H-4, SC82PH-4, SC162PH-4, SMX42D-M, SMX42H-M, SMX42P-M, SMX82D-M,SMX82H-M, SMX82P-M Firmware Version 44404-E7E7 Peripheral Sharing Devices
|
Belkin F1DN102MOD-BA-4, F1DN202MOD-BA-4, F1DN104MOD-BA-4, F1DN204MOD-BA-4, F1DN108MOD-BA-4, F1DN208MOD-BA-4, F1DN102MOD-HH-4, F1DN102MOD-PP-4, F1DN102MOD-DD-4, F1DN202MOD-HH-4, F1DN202MOD-PP-4, F1DN202MOD-DD-4, F1DN104MOD-HH-4, F1DN104MOD-PP-4, F1DN108MOD-PP-4, F1DN104MOD-DD-4, F1DN204MOD-HH-4, F1DN204MOD-PP-4, F1DN208MOD-PP-4, F1DN204MOD-DD-4, F1DN104MOD-XX-4, F1DN204MOD-XX-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices
|
category |
Other Devices and Systems
|
Other Devices and Systems
|
not_valid_before |
2024-04-29
|
2021-07-11
|
not_valid_after |
2029-04-29
|
2026-07-11
|
scheme |
CA
|
CA
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/545-EWA%20ST%20v1.1.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/534-EWA%20ST%20v1.6.pdf
|
status |
active
|
active
|
manufacturer |
High Sec Labs, Inc.
|
Belkin International, Inc.
|
manufacturer_web |
https://www.highseclabs.com
|
https://www.belkin.com
|
security_level |
|
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/545-EWA%20CR%20v1.1.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/534-EWA%20CR%20v1.0.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/545-EWA%20CT%20v1.0.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/534-EWA%20CT%20v1.0.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Peripheral Sharing Device Version 4.0', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP-Module for Keyboard/Mouse Devices Version 1.0', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP-Module for Video/Display Devices Version 1.0', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Peripheral Sharing Device Version 4.0', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP-Module for Keyboard/Mouse Devices Version 1.0', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP-Module for Video/Display Devices Version 1.0', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
True
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
64f65d5ca68862def8b6c23e4a2820ac0dc331471b156d89b457ebb4a3b5bfa4
|
6008d1f57b28f5dce8f42d7a1a5326525f6dde9512a5052ee855d2f5ef026fbd
|
state/cert/txt_hash |
eaf4a6123add672f352cbdbff79f3d6a60c97d1fd3b9ad78df781190b1bf0465
|
64365bfe5f1b5ac62c1bdf594f5074ff17f3d5adb92826b20c7a2cbc78ef8d85
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
800cc9544807979f232d85da1dc61e87210df99ffd8e6d14cc3b7f7b37b21d5f
|
696d39c57874ac5e97401ad2bfe4d09e90a799029267f7d5fbb8366f6222d6d8
|
state/report/txt_hash |
401ce5f670d6f584cc4010146a302dc558d0de7788275e5c0134a03df3b1061f
|
95bfcbb99c80fa95971523fbc8685e0e417bd8e85b8c61e303b56ee35959de99
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
744ba89b65d0d152dafe6018095ab40bbf728efa56c6ad19b5d0f0e93a3f515b
|
4b38ba46191afe0cc41a3b0d78a3e1fe0a8abd975f917eb0d3452bfabc01fdba
|
state/st/txt_hash |
44a5064a76a125dd2454c2533c11b10a3dbb1535a2de33abf5f4249d830a162a
|
9e83c525621cb669fb319ef72b912f9a9f49482acd437db32ff8246af4a2bb0d
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
545-EWA
|
534-EWA
|
heuristics/cert_lab |
None
|
CANADA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AGD_OPE.1, ASE_REQ.2, AGD_PRE.1, ALC_CMS.1, ASE_OBJ.2, ATE_IND.1, ASE_ECD.1, ASE_CCL.1, ASE_TSS.1, AVA_VAN.1, ASE_SPD.1, ASE_INT.1 |
ADV_FSP.1, ALC_CMC.1, AGD_OPE.1, ASE_REQ.2, AGD_PRE.1, ALC_CMS.1, ASE_OBJ.2, ATE_IND.1, ASE_ECD.1, ASE_CCL.1, ASE_TSS.1, AVA_VAN.1, ASE_SPD.1, ASE_INT.1 |
heuristics/extracted_versions |
4, 44404 |
4, 44404 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data/certification_date |
2024-04-29
|
2021-07-11
|
heuristics/scheme_data/level |
PP_PSD_V4.0 with MOD_KM_V1.0, MOD_VI_V1.0
|
PP_PSD_v4.0, MOD_KM_v1.0, MOD_VI_v1.0
|
heuristics/scheme_data/product |
High Sec Labs SC21H-4, SC82PH-4, SC162PH-4, SMX42D-M, SMX42H-M, SMX42P-M, SMX82D-M, SMX82H-M, SMX82P-M Firmware Version 44404-E7E7 Peripheral Sharing Devices
|
Belkin F1DN102MOD-xx-4, F1DN202MOD-xx-4, F1DN104MOD-xx-4, F1DN204MOD-xx-4, F1DN108MOD-xx-4, F1DN208MOD-xx-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices
|
heuristics/scheme_data/vendor |
High Sec Labs Ltd.
|
Belkin International, Inc.
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
545-EWA CT v1.0.pdf
|
534-EWA CT v1.0.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/CA |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
366092
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /ModDate:
D:20240502122621-05'00'
- /Producer:
Foxit PDF Editor Printer Version 13.0.0.15725
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
- /Title:
- /Keywords:
- /Author:
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
- /Creator:
- /Subject:
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
- /CreationDate:
D:20240502122609-04'00'
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1643891
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /ModDate:
D:20210812121605-05'00'
- /Producer:
Adobe PDF library 15.00
- /Title:
cyber-centre-product-evaluation-certificate-e-bg
- /Creator:
Adobe Illustrator CC 22.0 (Windows)
- /CreationDate:
D:20190122115136-04'00'
- pdf_hyperlinks:
|
pdf_data/cert_metadata//CreationDate |
D:20240502122609-04'00'
|
D:20190122115136-04'00'
|
pdf_data/cert_metadata//Creator |
|
Adobe Illustrator CC 22.0 (Windows)
|
pdf_data/cert_metadata//ModDate |
D:20240502122621-05'00'
|
D:20210812121605-05'00'
|
pdf_data/cert_metadata//Producer |
Foxit PDF Editor Printer Version 13.0.0.15725
|
Adobe PDF library 15.00
|
pdf_data/cert_metadata//Title |
|
cyber-centre-product-evaluation-certificate-e-bg
|
pdf_data/cert_metadata/pdf_file_size_bytes |
366092
|
1643891
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
1
|
1
|
pdf_data/report_filename |
545-EWA CR v1.1.pdf
|
534-EWA CR v1.0.pdf
|
pdf_data/report_frontpage/CA |
|
- cert_id:
534-EWA
- cert_lab:
CANADA
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
774675
- pdf_is_encrypted:
False
- pdf_number_of_pages:
16
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
- /ClassificationContentMarkingHeaderShapeIds: 10,1b,3f,c0,c1,c2,c3,c4,c5,c6,c7
- /Keywords:
- /Author:
- /Subject:
- /Creator:
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2024-04-09T14:39:36Z
- /CreationDate:
D:20240502122515-04'00'
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
- /ContentTypeId: 0x01010079E4DFC5E31A0F4FA8ED3514A1970A59
- /ModDate:
D:20240502122555-05'00'
- /Producer:
Foxit PDF Editor Printer Version 13.0.0.15725
- /ClassificationContentMarkingHeaderFontProps: #008000,10,Calibri
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: ec5e622b-eb08-4849-831c-88c9d680a3b3
- /Title:
- /ClassificationContentMarkingHeaderText: UNCLASSIFIED / NON CLASSIFIÉ
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
- pdf_hyperlinks:
https://highseclabs.com/quick-start-guides/, mailto:[email protected], https://highseclabs.com/, mailto:[email protected], https://nvd.nist.gov/vuln/search
|
- pdf_file_size_bytes:
566457
- pdf_is_encrypted:
False
- pdf_number_of_pages:
18
- /ModDate:
D:20210812160938-05'00'
- /Producer:
Foxit PhantomPDF Printer Version 10.1.0.3521
- /Title:
- /Keywords:
- /Author:
- /Creator:
- /Subject:
- /CreationDate:
D:20210812160830-04'00'
- pdf_hyperlinks:
http://belkin.com/us/, http://highseclabs.com/, https://google.ca/, mailto:[email protected], https://nvd.nist.gov/vuln/search
|
pdf_data/report_metadata//Author |
|
|
pdf_data/report_metadata//CreationDate |
D:20240502122515-04'00'
|
D:20210812160830-04'00'
|
pdf_data/report_metadata//Creator |
|
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
D:20240502122555-05'00'
|
D:20210812160938-05'00'
|
pdf_data/report_metadata//Producer |
Foxit PDF Editor Printer Version 13.0.0.15725
|
Foxit PhantomPDF Printer Version 10.1.0.3521
|
pdf_data/report_metadata//Subject |
|
|
pdf_data/report_metadata//Title |
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
774675
|
566457
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
16
|
18
|
pdf_data/st_filename |
545-EWA ST v1.1.pdf
|
534-EWA ST v1.6.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.COMPUTER:
5
- O.USER_DATA:
2
- O.NO_USER:
1
- O.NO_OTHER:
3
- O.LEAK:
1
- O.AUTHORIZED:
2
- O.PERIPHERAL:
1
- O.REJECT:
4
- O.NO_TOE_ACCESS:
2
- O.TAMPER:
1
- O.ANTI_TAMPERING:
2
- O.SELF_TEST:
4
- O.PROTECTED:
1
- O.UNIDIRECTIONAL:
7
- O.EMULATED_INPUT:
3
- O.PERIPHERAL_PORTS:
1
- O.PROTECTED_EDID:
3
- O.LEAK_PREVENTION:
1
- O.NO_USER_DATA:
1
- O.TAMPER_EVIDENT:
2
- O.SELF_TEST_FAIL:
2
- T:
- T.DATA_LEAK:
2
- T.SIGNAL_LEAK:
2
- T.RESIDUAL_LEAK:
1
- T.UNINTENDED_USE:
1
- T.UNAUTHORIZED_DEVICES:
1
- T.LOGICAL_TAMPER:
1
- T.PHYSICAL_TAMPER:
1
- T.REPLACEMENT:
2
- T.FAILED:
2
- T.RESIDUAL:
1
- T.UNINTENDED:
1
- T.UNAUTHORIZED:
1
- T.LOGICAL:
1
- T.PHYSICAL:
1
- A:
- A.NO_TEMPEST:
2
- A.PHYSICAL:
1
- A.NO_WIRELESS_DEVICES:
1
- A.TRUSTED_ADMIN:
2
- A.TRUSTED_CONFIG:
1
- A.USER_ALLOWED_ACCESS:
1
- A.NO_SPECIAL_ANALOG:
1
- A.NO_PHYSICAL:
1
- A.NO_WIRELESS:
1
- A.TRUSTED:
1
- A.USER_ALLOWED:
1
- A.NO_SPECIAL:
1
- OE:
- OE.NO_TEMPEST:
2
- OE.PHYSICAL:
3
- OE.NO_WIRELESS_DEVICES:
1
- OE.TRUSTED_ADMIN:
1
- OE.TRUSTED_CONFIG:
1
- OE.NO_SPECIAL_ANALOG:
1
- OE.NO_WIRELESS:
1
- OE.TRUSTED:
2
- OE.NO_SPECIAL:
1
|
- O:
- O.COMPUTER:
5
- O.USER_DATA:
2
- O.NO_USER:
1
- O.NO_OTHER:
3
- O.LEAK:
1
- O.AUTHORIZED:
2
- O.PERIPHERAL:
1
- O.REJECT:
4
- O.NO_TOE_ACCESS:
2
- O.TAMPER:
1
- O.ANTI_TAMPERING:
2
- O.SELF_TEST:
4
- O.PROTECTED:
1
- O.UNIDIRECTIONAL:
7
- O.EMULATED_INPUT:
3
- O.PERIPHERAL_PORTS:
1
- O.PROTECTED_EDID:
3
- O.LEAK_PREVENTION:
1
- O.NO_USER_DATA:
1
- O.TAMPER_EVIDENT:
2
- O.SELF_TEST_FAIL:
2
- T:
- T.DATA_LEAK:
2
- T.SIGNAL_LEAK:
2
- T.RESIDUAL_LEAK:
1
- T.UNINTENDED_USE:
1
- T.UNAUTHORIZED_DEVICES:
1
- T.LOGICAL_TAMPER:
1
- T.PHYSICAL_TAMPER:
1
- T.REPLACEMENT:
2
- T.FAILED:
2
- T.RESIDUAL:
1
- T.UNINTENDED:
1
- T.UNAUTHORIZED:
1
- T.LOGICAL:
1
- T.PHYSICAL:
1
- A:
- A.NO_TEMPEST:
2
- A.PHYSICAL:
1
- A.NO_WIRELESS_DEVICES:
1
- A.TRUSTED_ADMIN:
2
- A.TRUSTED_CONFIG:
1
- A.USER_ALLOWED_ACCESS:
1
- A.NO_SPECIAL_ANALOG:
1
- A.NO_PHYSICAL:
1
- A.NO_WIRELESS:
1
- A.TRUSTED:
1
- A.USER_ALLOWED:
1
- A.NO_SPECIAL:
1
- OE:
- OE.NO_TEMPEST:
2
- OE.PHYSICAL:
3
- OE.NO_WIRELESS_DEVICES:
1
- OE.TRUSTED_ADMIN:
1
- OE.TRUSTED_CONFIG:
1
- OE.NO_SPECIAL_ANALOG:
1
- OE.NO_WIRELESS:
1
- OE.TRUSTED:
2
- OE.NO_SPECIAL:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.1:
1
- ALC_CMS.1:
1
- ATE:
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ADV:
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.1:
1
- ALC_CMS.1:
1
- ATE:
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_APC_EXT.1:
13
- FDP_IPC_EXT.1:
12
- FDP_APC_EXT:
20
- FDP_PDC_EXT.1:
27
- FDP_FIL_EXT:
12
- FDP_RDR_EXT.1:
10
- FDP_SWI_EXT.3:
11
- FDP_RIP_EXT.1:
5
- FDP_RIP:
6
- FDP_SWI_EXT.1:
9
- FDP_SWI_EXT.2:
14
- FDP_CDS_EXT.1:
11
- FDP_PDC_EXT:
37
- FDP_SPR_EXT:
21
- FDP_UDF_EXT:
12
- FDP_CDS_EXT:
1
- FDP_IPC_EXT:
1
- FDP_RDR_EXT:
1
- FDP_RIP_EXT:
1
- FDP_SWI_EXT:
1
- FDP_SWI_EXT.2.2:
4
- FDP_CDS_EXT.1.1:
2
- FDP_FIL_EXT.1:
3
- FDP_IPC_EXT.1.1:
2
- FDP_IPC_EXT.1.2:
2
- FDP_PDC_EXT.1.1:
1
- FDP_PDC_EXT.2:
4
- FDP_PDC_EXT.3:
13
- FDP_RDR_EXT.1.1:
1
- FDP_RIP.1:
1
- FDP_RIP_EXT.1.1:
1
- FDP_SPR_EXT.1:
3
- FDP_SWI_EXT.1.1:
1
- FDP_SWI_EXT.2.1:
2
- FDP_SWI_EXT.3.1:
1
- FDP_UDF_EXT.1:
2
- FPT:
- FPT_STM.1:
1
- FPT_PHP.3:
3
- FPT_NTA_EXT.1:
4
- FPT_PHP.1:
7
- FPT_TST.1:
5
- FPT_FLS_EXT.1:
5
- FPT_TST_EXT.1:
6
- FPT_FLS_EXT:
1
- FPT_NTA_EXT:
1
- FPT_TST_EXT:
1
- FPT_FLS_EXT.1.1:
2
- FPT_NTA_EXT.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_TST_EXT.1.1:
1
- FTA:
- FTA_CIN_EXT.1:
9
- FTA_CIN_EXT:
1
- FTA_CIN_EXT.1.1:
1
- FTA_CIN_EXT.1.2:
1
- FTA_CIN_EXT.1.3:
1
|
- FAU:
- FDP:
- FDP_APC_EXT:
27
- FDP_CDS_EXT:
4
- FDP_FIL_EXT:
17
- FDP_IPC_EXT:
4
- FDP_PDC_EXT:
51
- FDP_RDR_EXT:
4
- FDP_RIP_EXT:
4
- FDP_SPR_EXT:
61
- FDP_SWI_EXT:
4
- FDP_UDF_EXT:
16
- FDP_PDC_EXT.1:
32
- FDP_RDR_EXT.1:
16
- FDP_SWI_EXT.3:
16
- FDP_RIP_EXT.1:
9
- FDP_RIP:
7
- FDP_SWI_EXT.1:
14
- FDP_SWI_EXT.2:
10
- FDP_CDS_EXT.1:
31
- FDP_IPC_EXT.1:
21
- FDP_APC_EXT.1:
17
- FDP_APS_EXT.1.1:
1
- FDP_APS_EXT.1.2:
1
- FDP_APS_EXT.1.3:
1
- FDP_APS_EXT.1.4:
1
- FDP_CDS_EXT.1.1:
9
- FDP_FIL_EXT.1:
7
- FDP_FIL_EXT.1.1:
1
- FDP_FIL_EXT.1.2:
1
- FDP_FIL_EXT.1.3:
1
- FDP_PDC_EXT.2:
16
- FDP_IPC_EXT.1.1:
5
- FDP_IPC_EXT.1.2:
5
- FDP_PDC_EXT.3:
29
- FDP_PDC_EXT.1.1:
2
- FDP_PDC_EXT.1.2:
1
- FDP_PDC_EXT.1.3:
1
- FDP_PDC_EXT.1.4:
1
- FDP_PDC_EXT.1.5:
1
- FDP_PDC_EXT.2.1:
1
- FDP_PDC_EXT.2.2:
1
- FDP_PDC_EXT.3.1:
1
- FDP_PDC_EXT.3.2:
1
- FDP_RDR_EXT.1.1:
2
- FDP_RIP_EXT.1.1:
2
- FDP_SPR_EXT.1:
18
- FDP_SPR_EXT.1.1:
1
- FDP_SWI_EXT.1.1:
2
- FDP_SWI_EXT.2.1:
2
- FDP_APS_EXT.2.2:
1
- FDP_SWI_EXT.3.1:
2
- FDP_UDF_EXT.1:
6
- FDP_UDF_EXT.1.1:
1
- FDP_FLS_EXT:
1
- FDP_RIP.1:
1
- FDP_SWI_EXT.2.2:
1
- FPT:
- FPT_FLS_EXT:
3
- FPT_NTA_EXT:
4
- FPT_TST_EXT:
4
- FPT_NTA_EXT.1:
8
- FPT_PHP.1:
9
- FPT_TST.1:
7
- FPT_FLS_EXT.1:
11
- FPT_TST_EXT.1:
12
- FPT_PHP.3:
2
- FPT_FLS_EXT.1.1:
3
- FPT_NTA_EXT.1.1:
2
- FPT_TST_EXT.1.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTA:
- FTA_CIN_EXT:
4
- FTA_CIN_EXT.1:
13
- FTA_CIN_EXT.1.1:
2
- FTA_CIN_EXT.1.2:
3
- FTA_CIN_EXT.1.3:
2
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_APC_EXT.1:
13
- FDP_IPC_EXT.1:
12
- FDP_APC_EXT:
20
- FDP_PDC_EXT.1:
27
- FDP_FIL_EXT:
12
- FDP_RDR_EXT.1:
10
- FDP_SWI_EXT.3:
11
- FDP_RIP_EXT.1:
5
- FDP_RIP:
6
- FDP_SWI_EXT.1:
9
- FDP_SWI_EXT.2:
14
- FDP_CDS_EXT.1:
11
- FDP_PDC_EXT:
37
- FDP_SPR_EXT:
21
- FDP_UDF_EXT:
12
- FDP_CDS_EXT:
1
- FDP_IPC_EXT:
1
- FDP_RDR_EXT:
1
- FDP_RIP_EXT:
1
- FDP_SWI_EXT:
1
- FDP_SWI_EXT.2.2:
4
- FDP_CDS_EXT.1.1:
2
- FDP_FIL_EXT.1:
3
- FDP_IPC_EXT.1.1:
2
- FDP_IPC_EXT.1.2:
2
- FDP_PDC_EXT.1.1:
1
- FDP_PDC_EXT.2:
4
- FDP_PDC_EXT.3:
13
- FDP_RDR_EXT.1.1:
1
- FDP_RIP.1:
1
- FDP_RIP_EXT.1.1:
1
- FDP_SPR_EXT.1:
3
- FDP_SWI_EXT.1.1:
1
- FDP_SWI_EXT.2.1:
2
- FDP_SWI_EXT.3.1:
1
- FDP_UDF_EXT.1:
2
|
- FDP_APC_EXT:
27
- FDP_CDS_EXT:
4
- FDP_FIL_EXT:
17
- FDP_IPC_EXT:
4
- FDP_PDC_EXT:
51
- FDP_RDR_EXT:
4
- FDP_RIP_EXT:
4
- FDP_SPR_EXT:
61
- FDP_SWI_EXT:
4
- FDP_UDF_EXT:
16
- FDP_PDC_EXT.1:
32
- FDP_RDR_EXT.1:
16
- FDP_SWI_EXT.3:
16
- FDP_RIP_EXT.1:
9
- FDP_RIP:
7
- FDP_SWI_EXT.1:
14
- FDP_SWI_EXT.2:
10
- FDP_CDS_EXT.1:
31
- FDP_IPC_EXT.1:
21
- FDP_APC_EXT.1:
17
- FDP_APS_EXT.1.1: 1
- FDP_APS_EXT.1.2: 1
- FDP_APS_EXT.1.3: 1
- FDP_APS_EXT.1.4: 1
- FDP_CDS_EXT.1.1:
9
- FDP_FIL_EXT.1:
7
- FDP_FIL_EXT.1.1: 1
- FDP_FIL_EXT.1.2: 1
- FDP_FIL_EXT.1.3: 1
- FDP_PDC_EXT.2:
16
- FDP_IPC_EXT.1.1:
5
- FDP_IPC_EXT.1.2:
5
- FDP_PDC_EXT.3:
29
- FDP_PDC_EXT.1.1:
2
- FDP_PDC_EXT.1.2: 1
- FDP_PDC_EXT.1.3: 1
- FDP_PDC_EXT.1.4: 1
- FDP_PDC_EXT.1.5: 1
- FDP_PDC_EXT.2.1: 1
- FDP_PDC_EXT.2.2: 1
- FDP_PDC_EXT.3.1: 1
- FDP_PDC_EXT.3.2: 1
- FDP_RDR_EXT.1.1:
2
- FDP_RIP_EXT.1.1:
2
- FDP_SPR_EXT.1:
18
- FDP_SPR_EXT.1.1: 1
- FDP_SWI_EXT.1.1:
2
- FDP_SWI_EXT.2.1:
2
- FDP_APS_EXT.2.2: 1
- FDP_SWI_EXT.3.1:
2
- FDP_UDF_EXT.1:
6
- FDP_UDF_EXT.1.1: 1
- FDP_FLS_EXT: 1
- FDP_RIP.1:
1
- FDP_SWI_EXT.2.2:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_APC_EXT |
20
|
27
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_APC_EXT.1 |
13
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_CDS_EXT |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_CDS_EXT.1 |
11
|
31
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_CDS_EXT.1.1 |
2
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_FIL_EXT |
12
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_FIL_EXT.1 |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IPC_EXT |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IPC_EXT.1 |
12
|
21
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IPC_EXT.1.1 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IPC_EXT.1.2 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_PDC_EXT |
37
|
51
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_PDC_EXT.1 |
27
|
32
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_PDC_EXT.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_PDC_EXT.2 |
4
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_PDC_EXT.3 |
13
|
29
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RDR_EXT |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RDR_EXT.1 |
10
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RDR_EXT.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP_EXT |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP_EXT.1 |
5
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP_EXT.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SPR_EXT |
21
|
61
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SPR_EXT.1 |
3
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SWI_EXT |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SWI_EXT.1 |
9
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SWI_EXT.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SWI_EXT.2 |
14
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SWI_EXT.2.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SWI_EXT.2.2 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SWI_EXT.3 |
11
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SWI_EXT.3.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UDF_EXT |
12
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UDF_EXT.1 |
2
|
6
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_STM.1: 1
- FPT_PHP.3:
3
- FPT_NTA_EXT.1:
4
- FPT_PHP.1:
7
- FPT_TST.1:
5
- FPT_FLS_EXT.1:
5
- FPT_TST_EXT.1:
6
- FPT_FLS_EXT:
1
- FPT_NTA_EXT:
1
- FPT_TST_EXT:
1
- FPT_FLS_EXT.1.1:
2
- FPT_NTA_EXT.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_TST_EXT.1.1:
1
|
- FPT_FLS_EXT:
3
- FPT_NTA_EXT:
4
- FPT_TST_EXT:
4
- FPT_NTA_EXT.1:
8
- FPT_PHP.1:
9
- FPT_TST.1:
7
- FPT_FLS_EXT.1:
11
- FPT_TST_EXT.1:
12
- FPT_PHP.3:
2
- FPT_FLS_EXT.1.1:
3
- FPT_NTA_EXT.1.1:
2
- FPT_TST_EXT.1.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS_EXT |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS_EXT.1 |
5
|
11
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS_EXT.1.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_NTA_EXT |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_NTA_EXT.1 |
4
|
8
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_NTA_EXT.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 |
7
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
5
|
7
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST_EXT |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST_EXT.1 |
6
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST_EXT.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_CIN_EXT |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_CIN_EXT.1 |
9
|
13
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_CIN_EXT.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_CIN_EXT.1.2 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_CIN_EXT.1.3 |
1
|
2
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model/STM/STM32/STM32F070C6T6 |
4
|
2
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1124857
- pdf_is_encrypted:
False
- pdf_number_of_pages:
61
- /Title:
Security Target
- /Author:
Teresa MacArthur
- /Creator:
Microsoft® Word for Microsoft 365
- /CreationDate:
D:20240429185558-04'00'
- /ModDate:
D:20240429185558-04'00'
- /Producer:
Microsoft® Word for Microsoft 365
- pdf_hyperlinks:
https://highseclabs.com/quick-start-guides/
|
- pdf_file_size_bytes:
1619155
- pdf_is_encrypted:
False
- pdf_number_of_pages:
91
- /Author:
Teresa MacArthur
- /Client Full Name: Belkin International, Inc.
- /Client Short Name: Belkin
- /Comments: CC V3.1 Security Target
Template Version 1_0
- /Company: EWA-Canada
- /CreationDate:
D:20210708101130+02'00'
- /Creator:
Acrobat PDFMaker 17 for Word
- /Document Number: 2149-001-D102B2
- /ModDate:
D:20210708102311+02'00'
- /Producer:
Adobe PDF Library 17.11.238
- /Product_Name: Belkin Peripheral Sharing Devices with Keyboard, Video, Mouse
- /ST_Date: 8 July 2021
- /ST_Version: 1.6
- /SourceModified: D:20210708081058
- /Title:
Security Target
- pdf_hyperlinks:
https://www.belkin.com/support/assets/belkin/qig/Quick%20Installation%20Guide%202_4_8%20Port%20Single_Dual-Head%20Modular%20Secure%20KVM%20Switches%2C%208820-02949%20Rev.B00.pdf, https://www.belkin.com/support/assets/belkin/others/Belkin%20Regulatory%20Information%2C%208820-02969%20Rev.%20A00.pdf, http://www.belkin.com/, mailto:[email protected]
|
pdf_data/st_metadata//Author |
Teresa MacArthur
|
Teresa MacArthur
|
pdf_data/st_metadata//CreationDate |
D:20240429185558-04'00'
|
D:20210708101130+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word for Microsoft 365
|
Acrobat PDFMaker 17 for Word
|
pdf_data/st_metadata//ModDate |
D:20240429185558-04'00'
|
D:20210708102311+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word for Microsoft 365
|
Adobe PDF Library 17.11.238
|
pdf_data/st_metadata//Title |
Security Target
|
Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
1124857
|
1619155
|
pdf_data/st_metadata/pdf_hyperlinks |
https://highseclabs.com/quick-start-guides/ |
https://www.belkin.com/support/assets/belkin/qig/Quick%20Installation%20Guide%202_4_8%20Port%20Single_Dual-Head%20Modular%20Secure%20KVM%20Switches%2C%208820-02949%20Rev.B00.pdf, https://www.belkin.com/support/assets/belkin/others/Belkin%20Regulatory%20Information%2C%208820-02969%20Rev.%20A00.pdf, http://www.belkin.com/, mailto:[email protected] |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
61
|
91
|
dgst |
aafab77cc53146db
|
e37581368981ae68
|