Belkin Secure KVM models F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, and F1DN108F-3

CSV information

Status archived
Valid from 24.03.2016
Valid until 24.03.2019
Scheme 🇺🇸 US
Manufacturer Belkin International, Inc.
Category Other Devices and Systems
Security level
Protection profiles
Maintenance updates Maintenance Update for Belkin Secure KVM Switch Models: F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, F1DN108F-3 (19.03.2018) Certification report

Heuristics summary

Certificate ID: CCEVS-VR-VID-10708-2016

Certificate

Extracted keywords

Certificates
CCEVS-VR-VID10708-2016

File metadata

Creation date D:20160325132054-04'00'
Modification date D:20160325132116-04'00'
Pages 1
Producer iText 2.1.0 (by lowagie.com)

Certification report

Extracted keywords

Asymmetric Algorithms
DH

Claims
O.COMPUTER_INTERFACE_, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.PURGE_TOE_KB_DATA_WHILE_, O.NO_DOCKING_PROTOCOLS, O.NO_OTHER_EXTERNAL_, O.NO_ANALOG_AUDIO_INPUT, O.UNIDIRECTIONAL_AUDIO_OUT, O.COMPUTER_TO_AUDIO_, O.USER_AUTHENTICATION_, O.USER_AUTHENTICATION_RESET, O.AUTHORIZED_SWITCHING, O.NO_AMBIGUOUS_CONTROL, O.CONTINUOUS_INDICATION, O.KEYBOARD_AND_MOUSE_TIED, O.NO_CONNECTED_COMPUTER_, O.PERIPHERAL_PORTS_, O.DISABLE_UNAUTHORIZED_, O.KEYBOARD_MOUSE_EMULATED, O.KEYBOARD_MOUSE_, O.UNIDIRECTIONAL_VIDEO, O.UNIDIRERCTIONAL_EDID, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.ANTI_TAMPERING_BACKUP_, O.ANTI_TAMPERING_INDICATION, O.ANTI_TAMPERING_, O.NO_TOE_ACCESS, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, O.USER_AUTHENTICATION_TERMINATION, O.USER_AUTHENTICATION_ADMIN, O.DISPLAYPORT_AUX_FILTERING, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_SWITCHING, T.UNAUTHORIZED_DEVICES, T.AUTHORIZED_BUT_UNTRUSTED_, T.MICROPHONE_USE, T.AUDIO_REVERSED, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, A.NO_TEMPEST, A.NO_SPECIAL_ANALOG_CAPABILITIES, A.PHYSICAL, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, OE.PHYSICAL, OE.TRUSTED_ADMIN
Certificates
CCEVS-VR-VID10708-2016

Side-channel analysis
physical tampering

Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Creation date D:20160325122034-04'00'
Modification date D:20160325122034-04'00'
Pages 27

Frontpage

Certificate ID CCEVS-VR-VID10708-2016
Certified item Belkin Secure KVM (identified 2, 4, 8, 16 port models
Certification lab US NIAP

Security target

Extracted keywords

Asymmetric Algorithms
DH

Claims
O.COMPUTER_INTERFACE_ISOLATION, O.COMPUTER_INTERFACE_ISOLATION_TOE, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.PURGE_TOE_KB_DATA_WHILE_SWITCHI, O.NO_DOCKING_PROTOCOLS, O.NO_OTHER_EXTERNAL_INTERFACES, O.NO_ANALOG_AUDIO_INPUT, O.UNIDIRECTIONAL_AUDIO_OUT, O.COMPUTER_TO_AUDIO_ISOLATION, O.USER_AUTHENTICATION_ISOLATION, O.USER_AUTHENTICATION_RESET, O.AUTHORIZED_SWITCHING, O.NO_AMBIGUOUS_CONTROL, O.CONTINUOUS_INDICATION, O.KEYBOARD_AND_MOUSE_TIED, O.NO_CONNECTED_COMPUTER_CONTROL, O.PERIPHERAL_PORTS_ISOLATION, O.DISABLE_UNAUTHORIZED_PERIPHERAL, O.DISABLE_UNAUTHORIZED_ENDPOINTS, O.KEYBOARD_MOUSE_EMULATED, O.KEYBOARD_MOUSE_UNIDIRECTIONAL, O.UNIDIRECTIONAL_VIDEO, O.UNIDIRERCTIONAL_EDID, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.ANTI_TAMPERING_BACKUP_POWER, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG, O.ANTI_TAMPERING_INDICATION, O.ANTI_TAMPERING_PERMANENTLY_DISA, O.NO_TOE_ACCESS, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, O.USER_AUTHENTICATION_TERMINATION, O.USER_AUTHENTICATION_ADMIN, O.DISPLAYPORT_AUX_FILTERING, O.COMPUTER_INTERFACE_ISOLATION_TO, O.NO_CONNECTED_COMPUTER_CONTRO, O.COMPUTER_INTERFACE_ISOLATION_, O.NO_CONNECTED_COMPUTER_CONT, O.PURGE_TOE_KB_DATA_WHILE_SWIT, O.PURGE_TOE_KB_DATA_WHILE_SWI, O.DISABLE_UNAUTHORIZED_PERIPHER, O.DISABLE_UNAUTHORIZED_ENDPOIN, O.KEYBOARD_MOUSE_UNIDIRECTIONA, O.KEYBOARD_MOUSE_UNIDIRECTION, O.ANTI_TAMPERING_BACKUP_FAIL_TR, O.ANTI_TAMPERING_BACKUP_FAIL_T, O.ANTI_TAMPERING_PERMANENTLY_, O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED, O.PURGE_TOE, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER, O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE, O.ANTI_TAMPERING_PERMANENTLY_DISAB, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_SWITCHING, T.UNAUTHORIZED_DEVICES, T.AUTHORIZED_BUT_UNTRUSTED_DEVICES, T.MICROPHONE_USE, T.AUDIO_REVERSED, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, T.UNINTENDED_SWITCHI, T.UNAUTHORIZED_DEVIC, T.AUTHORIZED_BUT_UNT, A.NO_TEMPEST, A.NO_SPECIAL_ANALOG_CAPABILITIES, A.PHYSICAL, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.NO_SPECIAL_ANALOG_CAPABILITIE, OE.PHYSICAL, OE.TRUSTED_ADMIN
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FDP_IFC.1, FDP_IFF.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_IFC.1.1, FDP_IFF, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ACC, FDP_ACC.1.1, FDP_ACF, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP, FDP_RIP.1.1, FIA_UAU.2, FIA_UID.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2.1, FMT_MSA.3, FMT_MSA, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FPT_PHP.1, FPT_PHP.3, FPT_FLS.1, FPT_TST.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_FLS, FPT_FLS.1.1, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_CIN_EXT, FTA_CIN_EXT.1, FTA_ATH_EXT, FTA_TAB.1, FTA_CIN_EXT.1.1, FTA_ATH_EXT.1, FTA_SSL.4, FTA_ATH_EXT.1.1

Side-channel analysis
physical tampering

Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Creation date D:20160325122241-04'00'
Modification date D:20160325122241-04'00'
Pages 106

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-10708-2016

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1

Scheme data

Product Belkin Secure KVM models F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, and F1DN108F-3
Id CCEVS-VR-VID10708
Url https://www.niap-ccevs.org/products/10708
Api Url https://www.niap-ccevs.org/api/project/product/pcl_products/10708/
Certification Date 24.03.2016
Expiration Date 24.03.2019
Category Peripheral Switch
Categories ['Peripheral Switch']
Vendor Belkin International, Inc.
Evaluation Facility DXC.technology
Scheme US

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10708-ci.pdf",
  "dgst": "fec6483a966e3796",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10708-2016",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL1",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "da2e45c9b3fbb700"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "api_url": "https://www.niap-ccevs.org/api/project/product/pcl_products/10708/",
      "categories": [
        "Peripheral Switch"
      ],
      "category": "Peripheral Switch",
      "certification_date": "2016-03-24",
      "evaluation_facility": "DXC.technology",
      "expiration_date": "2019-03-24",
      "id": "CCEVS-VR-VID10708",
      "product": "Belkin Secure KVM models F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, and F1DN108F-3",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/products/10708",
      "vendor": "Belkin International, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2018-03-19",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10708-add1.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Maintenance Update for Belkin Secure KVM Switch Models: F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, F1DN108F-3"
      }
    ]
  },
  "manufacturer": "Belkin International, Inc.",
  "manufacturer_web": "https://www.belkin.com",
  "name": "Belkin Secure KVM models F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, and F1DN108F-3",
  "not_valid_after": "2019-03-24",
  "not_valid_before": "2016-03-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "st_vid10708-ci.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10708-2016": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20160325132054-04\u002700\u0027",
      "/ModDate": "D:20160325132116-04\u002700\u0027",
      "/Producer": "iText 2.1.0 (by lowagie.com)",
      "pdf_file_size_bytes": 179611,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "st_vid10708-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10708-2016",
        "cert_item": "Belkin Secure KVM (identified 2, 4, 8, 16 port models",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 4
          }
        }
      },
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10708-2016": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.NO_SPECIAL_ANALOG_CAPABILITIES": 1,
          "A.NO_TEMPEST": 1,
          "A.PHYSICAL": 1,
          "A.TRUSTED_ADMIN": 1,
          "A.TRUSTED_CONFIG": 1
        },
        "O": {
          "O.ANTI_TAMPERING": 1,
          "O.ANTI_TAMPERING_": 1,
          "O.ANTI_TAMPERING_BACKUP_": 2,
          "O.ANTI_TAMPERING_INDICATION": 1,
          "O.AUTHORIZED_SWITCHING": 1,
          "O.COMPUTER_INTERFACE_": 2,
          "O.COMPUTER_TO_AUDIO_": 1,
          "O.CONTINUOUS_INDICATION": 1,
          "O.DISABLE_UNAUTHORIZED_": 2,
          "O.DISPLAYPORT_AUX_FILTERING": 1,
          "O.KEYBOARD_AND_MOUSE_TIED": 1,
          "O.KEYBOARD_MOUSE_": 1,
          "O.KEYBOARD_MOUSE_EMULATED": 1,
          "O.NO_AMBIGUOUS_CONTROL": 1,
          "O.NO_ANALOG_AUDIO_INPUT": 1,
          "O.NO_CONNECTED_COMPUTER_": 1,
          "O.NO_DOCKING_PROTOCOLS": 1,
          "O.NO_OTHER_EXTERNAL_": 1,
          "O.NO_TOE_ACCESS": 1,
          "O.NO_USER_DATA_RETENTION": 1,
          "O.PERIPHERAL_PORTS_": 1,
          "O.PURGE_TOE_KB_DATA_WHILE_": 1,
          "O.SELF_TEST": 1,
          "O.SELF_TEST_FAIL_INDICATION": 1,
          "O.SELF_TEST_FAIL_TOE_DISABLE": 1,
          "O.TAMPER_EVIDENT_LABEL": 1,
          "O.UNIDIRECTIONAL_AUDIO_OUT": 1,
          "O.UNIDIRECTIONAL_VIDEO": 1,
          "O.UNIDIRERCTIONAL_EDID": 1,
          "O.USER_AUTHENTICATION_": 1,
          "O.USER_AUTHENTICATION_ADMIN": 1,
          "O.USER_AUTHENTICATION_RESET": 1,
          "O.USER_AUTHENTICATION_TERMINATION": 1,
          "O.USER_DATA_ISOLATION": 1
        },
        "OE": {
          "OE.PHYSICAL": 1,
          "OE.TRUSTED_ADMIN": 1
        },
        "T": {
          "T.AUDIO_REVERSED": 1,
          "T.AUTHORIZED_BUT_UNTRUSTED_": 1,
          "T.DATA_LEAK": 1,
          "T.FAILED": 1,
          "T.LOGICAL_TAMPER": 1,
          "T.MICROPHONE_USE": 1,
          "T.PHYSICAL_TAMPER": 1,
          "T.REPLACEMENT": 1,
          "T.RESIDUAL_LEAK": 1,
          "T.SIGNAL_LEAK": 1,
          "T.UNAUTHORIZED_DEVICES": 1,
          "T.UNINTENDED_SWITCHING": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20160325122034-04\u002700\u0027",
      "/ModDate": "D:20160325122034-04\u002700\u0027",
      "pdf_file_size_bytes": 476363,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://belkinbusiness.com/secure-kvm-products"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 27
    },
    "st_filename": "st_vid10708-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 5
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_SPECIAL_ANALOG_CAPABILITIE": 1,
          "A.NO_SPECIAL_ANALOG_CAPABILITIES": 1,
          "A.NO_TEMPEST": 3,
          "A.PHYSICAL": 3,
          "A.TRUSTED_ADMIN": 2,
          "A.TRUSTED_CONFIG": 3
        },
        "O": {
          "O.ANTI_TAMPERING": 8,
          "O.ANTI_TAMPERING_BACKUP_FAIL_T": 1,
          "O.ANTI_TAMPERING_BACKUP_FAIL_TR": 1,
          "O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG": 2,
          "O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE": 1,
          "O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER": 2,
          "O.ANTI_TAMPERING_BACKUP_POWER": 7,
          "O.ANTI_TAMPERING_INDICATION": 7,
          "O.ANTI_TAMPERING_PERMANENTLY_": 2,
          "O.ANTI_TAMPERING_PERMANENTLY_DISA": 2,
          "O.ANTI_TAMPERING_PERMANENTLY_DISAB": 1,
          "O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE": 3,
          "O.AUTHORIZED_SWITCHING": 7,
          "O.COMPUTER_INTERFACE_ISOLATION": 11,
          "O.COMPUTER_INTERFACE_ISOLATION_": 1,
          "O.COMPUTER_INTERFACE_ISOLATION_TO": 1,
          "O.COMPUTER_INTERFACE_ISOLATION_TOE": 2,
          "O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED": 4,
          "O.COMPUTER_TO_AUDIO_ISOLATION": 7,
          "O.CONTINUOUS_INDICATION": 7,
          "O.DISABLE_UNAUTHORIZED_ENDPOIN": 2,
          "O.DISABLE_UNAUTHORIZED_ENDPOINTS": 5,
          "O.DISABLE_UNAUTHORIZED_PERIPHER": 2,
          "O.DISABLE_UNAUTHORIZED_PERIPHERAL": 5,
          "O.DISPLAYPORT_AUX_FILTERING": 1,
          "O.KEYBOARD_AND_MOUSE_TIED": 7,
          "O.KEYBOARD_MOUSE_EMULATED": 7,
          "O.KEYBOARD_MOUSE_UNIDIRECTION": 1,
          "O.KEYBOARD_MOUSE_UNIDIRECTIONA": 1,
          "O.KEYBOARD_MOUSE_UNIDIRECTIONAL": 5,
          "O.NO_AMBIGUOUS_CONTROL": 7,
          "O.NO_ANALOG_AUDIO_INPUT": 8,
          "O.NO_CONNECTED_COMPUTER_CONT": 2,
          "O.NO_CONNECTED_COMPUTER_CONTRO": 1,
          "O.NO_CONNECTED_COMPUTER_CONTROL": 4,
          "O.NO_DOCKING_PROTOCOLS": 7,
          "O.NO_OTHER_EXTERNAL_INTERFACES": 10,
          "O.NO_TOE_ACCESS": 8,
          "O.NO_USER_DATA_RETENTION": 9,
          "O.PERIPHERAL_PORTS_ISOLATION": 12,
          "O.PURGE_TOE": 3,
          "O.PURGE_TOE_KB_DATA_WHILE_SWI": 1,
          "O.PURGE_TOE_KB_DATA_WHILE_SWIT": 1,
          "O.PURGE_TOE_KB_DATA_WHILE_SWITCHI": 2,
          "O.SELF_TEST": 9,
          "O.SELF_TEST_FAIL_INDICATION": 7,
          "O.SELF_TEST_FAIL_TOE_DISABLE": 9,
          "O.TAMPER_EVIDENT_LABEL": 9,
          "O.UNIDIRECTIONAL_AUDIO_OUT": 7,
          "O.UNIDIRECTIONAL_VIDEO": 7,
          "O.UNIDIRERCTIONAL_EDID": 7,
          "O.USER_AUTHENTICATION_ADMIN": 2,
          "O.USER_AUTHENTICATION_ISOLATION": 7,
          "O.USER_AUTHENTICATION_RESET": 11,
          "O.USER_AUTHENTICATION_TERMINATION": 1,
          "O.USER_DATA_ISOLATION": 9
        },
        "OE": {
          "OE.PHYSICAL": 4,
          "OE.TRUSTED_ADMIN": 6
        },
        "T": {
          "T.AUDIO_REVERSED": 1,
          "T.AUTHORIZED_BUT_UNT": 1,
          "T.AUTHORIZED_BUT_UNTRUSTED_DEVICES": 1,
          "T.DATA_LEAK": 3,
          "T.FAILED": 2,
          "T.LOGICAL_TAMPER": 3,
          "T.MICROPHONE_USE": 1,
          "T.PHYSICAL_TAMPER": 2,
          "T.REPLACEMENT": 3,
          "T.RESIDUAL_LEAK": 3,
          "T.SIGNAL_LEAK": 2,
          "T.UNAUTHORIZED_DEVIC": 1,
          "T.UNAUTHORIZED_DEVICES": 2,
          "T.UNINTENDED_SWITCHI": 1,
          "T.UNINTENDED_SWITCHING": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 3,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 18,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 15,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 79,
          "FDP_IFC.1.1": 2,
          "FDP_IFF": 2,
          "FDP_IFF.1": 85,
          "FDP_IFF.1.1": 2,
          "FDP_IFF.1.2": 3,
          "FDP_IFF.1.3": 3,
          "FDP_IFF.1.4": 2,
          "FDP_IFF.1.5": 12,
          "FDP_RIP": 1,
          "FDP_RIP.1": 11,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 3,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 1,
          "FIA_UID.2": 4,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 2,
          "FMT_MSA": 1,
          "FMT_MSA.3": 12,
          "FMT_SMF.1": 2,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_FLS": 1,
          "FPT_FLS.1": 14,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 9,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 20,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 16,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_ATH_EXT": 3,
          "FTA_ATH_EXT.1": 11,
          "FTA_ATH_EXT.1.1": 2,
          "FTA_CIN_EXT": 4,
          "FTA_CIN_EXT.1": 11,
          "FTA_CIN_EXT.1.1": 2,
          "FTA_SSL.4": 1,
          "FTA_TAB.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 14
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20160325122241-04\u002700\u0027",
      "/ModDate": "D:20160325122241-04\u002700\u0027",
      "pdf_file_size_bytes": 2165522,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://en.wikipedia.org/wiki/Computer_mouse",
          "http://en.wikipedia.org/wiki/Computer_keyboard",
          "http://en.wikipedia.org/wiki/Mini-DIN_connector",
          "http://en.wikipedia.org/wiki/PC_compatible",
          "http://belkinbusiness.com/secure-kvm-products"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 106
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10708-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10708-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "d2a4ca2fc3130d5525c8978f115895ab58c1c7ccc6f870ee7247bb2e4c468a4d",
      "txt_hash": "ed3156522deeef31a231398a914d0ee850cf32b4d7a926802ef7d3f40161598a"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "3094566940b61e0aac05f4af3fd1fb7ec2f9a99434866a4a1ac90e925f6295ef",
      "txt_hash": "e0e514b7226d26c7ee93fbf1c26f8df30d50f25c268b05f0b5d55bf1d2b91146"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "ce445a4c00b57be53817bce081d644e4eb0bd3d2d5e8861e183e46d57c98f8cd",
      "txt_hash": "df72da6190c19dd84927d3764cb696cf318d24d246ad291b6befa4c46fc88cdf"
    }
  },
  "status": "archived"
}