This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| KYOCERA ECOSYS PA6000x, PA5500x, PA5000x, PA4500x, P40050x, P40045x,TA Triumph Adler P-6034DN, P-5534DN, P-5034DN, P-4534DN,UTAX P-6034DN, P-5534DN, P-5034DN, P-4534DN,with system firmware C0T_S0IS.C04.002 CSEC2022012 |
Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F) CCEVS-VR-VID-10455-2011 |
|
|---|---|---|
| name | KYOCERA ECOSYS PA6000x, PA5500x, PA5000x, PA4500x, P40050x, P40045x,TA Triumph Adler P-6034DN, P-5534DN, P-5034DN, P-4534DN,UTAX P-6034DN, P-5534DN, P-5034DN, P-4534DN,with system firmware C0T_S0IS.C04.002 | Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F) |
| category | Multi-Function Devices | Network and Network-Related Devices and Systems |
| scheme | SE | US |
| status | active | archived |
| not_valid_after | 22.06.2028 | 14.05.2015 |
| not_valid_before | 22.06.2023 | 01.08.2011 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA_PA6000.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Kyocera%20ECOSYS%20PA6000x,%20PA5500x,%20PA5000x,%20PA4500x_1-0_22FMV6373-24.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-vr.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_ECOSYS_PA6000x_V100.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-st.pdf |
| manufacturer | KYOCERA Document Solutions Inc. | Belkin International, Inc. |
| manufacturer_web | https://www.kyoceradocumentsolutions.com/ | https://www.belkin.com |
| security_level | EAL2+, ALC_FLR.2 | ALC_FLR.3, EAL2+ |
| dgst | c86377c480aedc8d | 29a987839a62165e |
| heuristics/cert_id | CSEC2022012 | CCEVS-VR-VID-10455-2011 |
| heuristics/cert_lab | [] | US |
| heuristics/extracted_sars | ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 | ADV_FSP.2, ALC_FLR.3, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ALC_CMC.2, AGD_OPE.1, ALC_CMS.2, AVA_VAN.2, ALC_DEL.1, ADV_TDS.1, ADV_ARC.1 |
| heuristics/extracted_versions | 04.002 | - |
| heuristics/scheme_data |
|
|
| heuristics/protection_profiles | {} | fd5d86dc01df0437 |
| protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf |
| pdf_data/cert_filename | CCRA_PA6000.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id | ||
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | Certification Report - Kyocera ECOSYS PA6000x, PA5500x, PA5000x, PA4500x_1-0_22FMV6373-24.pdf | st_vid10455-vr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | ST_ECOSYS_PA6000x_V100.pdf | st_vid10455-st.pdf |
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | True | False |
| state/cert/download_ok | True | False |
| state/cert/extract_ok | True | False |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |