Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5
667-EWA
NetSignOn Version 2.0
ISCB-5-RPT-C027-CR-v1a
name Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5 NetSignOn Version 2.0
category Other Devices and Systems Access Control Devices and Systems
scheme CA MY
status active archived
not_valid_after 05.03.2030 16.04.2017
not_valid_before 05.03.2025 16.04.2012
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20CT.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C027-CR-v1a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20ST%20v1.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NetSignON%20ST%20v1.7.pdf
manufacturer Belkin International, Inc. MagnaQuest Solutions Sdn Bhd
manufacturer_web https://www.belkin.com https://www.magnaquest.com
security_level {} EAL1
dgst d8cfef67e94e0372 1d7f84af6c6b8b93
heuristics/cert_id 667-EWA ISCB-5-RPT-C027-CR-v1a
heuristics/extracted_sars ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_OBJ.2, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ASE_REQ.2, ADV_FSP.1 ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1
heuristics/extracted_versions 4, 44444 2.0
heuristics/scheme_data
  • certification_date: 05.03.2025
  • level: PP_PSD_V4.0, MOD_KM_V1.0, MOD_VI_V1.0, MOD_UA_V1.0
  • product: Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5
  • vendor: Belkin International, Inc.
  • cert_no: 2012-005-C027
  • certification_date: 16.04.2012
  • developer: MagnaQuest Solutions Sdn. Bhd
  • enhanced:
    • assurance_level: EAL1
    • category: Access Control Devices and System
    • cert_id: C027
    • certification_date: 16.04.2012
    • developer: Ramdas Nemani A-2-07 & A-2-09SME Technopreneur Centre1,2270 Jalan Usahawan 2,63000 Cyberjaya, Selangor DE,MALAYSIA URL: http://www.magnaquest.comEmail: [email protected]: +60 (3) 8318 2964Fax: +60 (3) 8319 2534
    • expiration_date: 16.04.2017
    • mutual_recognition: CCRA
    • product: NetSignOn Version 2.0
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C027/ISCB-5-RPT-C027-CR-v1a.pdf
    • scope: The Target of Evaluation (TOE) is a software product, which comprises of MQAssure™/AppShield v1.2_CR6 integrated with MQAssure™/IAM v1.0_CR6. The MQAssureTM/AppShield v1.2_CR6 (hereafter referred as Appshield) combined with MQAssureTM/IAM v1.0_CR6 (hereafter referred as IAM) is an access control software for web applications. The TOE controls access to web filtering applications by enforcing authentication and authorisation using multifactor authentication schemes. It is also capable of session control, and request validation based on its core engine policy and rules. IAM or Identity and Access Management is the core engine of the TOE. It is a centralised identity and access management platform that provides the back bone for the AppShield security functionality. In the overall infrastructure, AppShield acts as a policy enforcement agent for the web applications. The security features within the scope of the evaluation for IAM includes: Multifactor User Authentication which includes MyKad-Biometric, iKey-PIN or password. TOE Administration which provides a web based GUI console for the administrator to configure and manage the TOE. Security Audit which generates audit records for relevant authentication events and access events to various objects. The security features within the scope of the evaluation for AppShield includes: Access Control which enforces access control policy decision made by the IAM. HTTP request validation which protects the web applications from common input tampering attacks.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C027/NetSignON%20ST%20v1.7.pdf
    • type: Client agent runs on Windows operating system platforms that leverages multifactor user authentication methods.
  • expiration_date: 16.04.2017
  • level: EAL1
  • product: NetSignOn Version 2.0
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/70
heuristics/protection_profiles 48f73a122587b992, 814f66c77bc7f33b, 42cf355b24450489, 76f8f05a35d87f59 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ua_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf {}
pdf_data/cert_filename 667-EWA CT.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 667-EWA: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Sinitski, Kiril
  • /CreationDate: D:20250307140618-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250307140618-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 390416
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 667-EWA CR.pdf ISCB-5-RPT-C027-CR-v1a.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C027-CR-v1a: 25
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL1: 12
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DEL: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /Author: Sinitski, Kiril
  • /CreationDate: D:20250307135915-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: f4235719-a1a3-4fb4-8b18-a47ac84bac11
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2022-07-20T10:41:47Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250307135915-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 823239
  • pdf_hyperlinks: https://nvd.nist.gov/vuln/search, mailto:[email protected], http://www.belkin.com/, https://www.cisa.gov/known-exploited-vulnerabilities-catalog, https://www.belkin.com/support-article/?articleNum=275531
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename 667-EWA ST v1.2.pdf NetSignON ST v1.7.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 27
    • EAL1: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_FLR: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_APC_EXT: 30
    • FDP_APC_EXT.1: 17
    • FDP_CDS_EXT: 1
    • FDP_CDS_EXT.1: 10
    • FDP_CDS_EXT.1.1: 2
    • FDP_FIL_EXT: 23
    • FDP_FIL_EXT.1: 6
    • FDP_IPC_EXT: 1
    • FDP_IPC_EXT.1: 6
    • FDP_IPC_EXT.1.1: 1
    • FDP_IPC_EXT.1.2: 1
    • FDP_PDC_EXT: 34
    • FDP_PDC_EXT.1: 33
    • FDP_PDC_EXT.1.1: 1
    • FDP_PDC_EXT.2: 7
    • FDP_PDC_EXT.3: 5
    • FDP_PDC_EXT.4: 10
    • FDP_PDC_EXT.4.1: 1
    • FDP_PWR_EXT: 1
    • FDP_PWR_EXT.1: 10
    • FDP_PWR_EXT.1.1: 1
    • FDP_RDR_EXT: 1
    • FDP_RDR_EXT.1: 10
    • FDP_RDR_EXT.1.1: 1
    • FDP_RIP: 5
    • FDP_RIP.1: 1
    • FDP_RIP_EXT: 1
    • FDP_RIP_EXT.1: 5
    • FDP_RIP_EXT.1.1: 1
    • FDP_SPR_EXT: 7
    • FDP_SPR_EXT.1: 1
    • FDP_SWI_EXT: 1
    • FDP_SWI_EXT.1: 6
    • FDP_SWI_EXT.1.1: 1
    • FDP_SWI_EXT.2: 12
    • FDP_SWI_EXT.2.1: 1
    • FDP_SWI_EXT.2.2: 1
    • FDP_SWI_EXT.3: 10
    • FDP_SWI_EXT.3.1: 1
    • FDP_TER_EXT: 1
    • FDP_TER_EXT.1: 5
    • FDP_TER_EXT.1.1: 1
    • FDP_TER_EXT.2: 5
    • FDP_TER_EXT.2.1: 1
    • FDP_TER_EXT.3: 5
    • FDP_TER_EXT.3.1: 1
    • FDP_TER_EXT.3.2: 1
    • FDP_UAI_EXT: 1
    • FDP_UAI_EXT.1: 5
    • FDP_UAI_EXT.1.1: 1
    • FDP_UDF_EXT: 12
    • FDP_UDF_EXT.1: 2
  • FPT:
    • FPT_FLS_EXT: 1
    • FPT_FLS_EXT.1: 6
    • FPT_FLS_EXT.1.1: 2
    • FPT_NTA_EXT: 1
    • FPT_NTA_EXT.1: 4
    • FPT_NTA_EXT.1.1: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
  • FTA:
    • FTA_CIN_EXT: 1
    • FTA_CIN_EXT.1: 7
    • FTA_CIN_EXT.1.1: 1
    • FTA_CIN_EXT.1.2: 1
    • FTA_CIN_EXT.1.3: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 5
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 4
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 5
    • FIA_ATD: 1
    • FIA_ATD.1: 4
    • FIA_SOS: 1
    • FIA_SOS.1: 5
    • FIA_UAU: 3
    • FIA_UAU.1: 4
    • FIA_UAU.2: 5
    • FIA_UAU.5: 5
    • FIA_UAU.6: 4
    • FIA_UID: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 6
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 6
    • FMT_MSA.3: 6
    • FMT_SMF: 1
    • FMT_SMF.1: 5
    • FMT_SMR: 1
    • FMT_SMR.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_SPECIAL: 1
    • A.NO_SPECIAL_ANALOG: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 2
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.PROTECTED: 1
    • O.PROTECTED_EDID: 3
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.SESSION: 5
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 7
    • O.USER: 4
    • O.USER_DATA: 2
  • OE:
    • OE.NO_SPECIAL: 1
    • OE.NO_SPECIAL_ANALOG: 1
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
  • OE:
    • OE.ATTMP: 1
    • OE.COMM: 1
    • OE.CONFIG: 1
    • OE.CREDEN: 1
    • OE.DB: 1
    • OE.INSTALL: 1
    • OE.NOEVIL: 1
    • OE.PHYSICAL: 1
    • OE.PIN: 1
    • OE.RELIABLE: 1
    • OE.SYNC: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 5
  • Sagem:
    • Sagem: 1
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical Tampering: 1
    • physical tampering: 8
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 2
      • STM32F070RBT6: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_metadata
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different