Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5

CSV information ?

Status active
Valid from 05.03.2025
Valid until 05.03.2030
Scheme 🇨🇦 CA
Manufacturer Belkin International, Inc.
Category Other Devices and Systems
Security level
Protection profiles

Heuristics summary ?

Certificate ID: 667-EWA

Certificate ?

Extracted keywords

Certificates
667-EWA
Evaluation facilities
EWA-Canada

File metadata

Author Sinitski, Kiril
Creation date D:20250307140618-05'00'
Modification date D:20250307140618-05'00'
Pages 1
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Certification report ?

Extracted keywords

Evaluation facilities
EWA-Canada

Standards
ISO/IEC 17025

File metadata

Author Sinitski, Kiril
Creation date D:20250307135915-05'00'
Modification date D:20250307135915-05'00'
Pages 16
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Security target ?

Extracted keywords

Device models
STM32F070RBT6, STM32F070C6T6

Claims
O.COMPUTER, O.USER_DATA, O.NO_USER, O.NO_OTHER, O.LEAK, O.AUTHORIZED, O.PERIPHERAL, O.REJECT, O.NO_TOE_ACCESS, O.TAMPER, O.ANTI_TAMPERING, O.SELF_TEST, O.EMULATED_INPUT, O.UNIDIRECTIONAL, O.USER, O.SESSION, O.PROTECTED, O.PERIPHERAL_PORTS, O.PROTECTED_EDID, O.LEAK_PREVENTION, O.NO_USER_DATA, O.TAMPER_EVIDENT, O.SELF_TEST_FAIL, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_USE, T.UNAUTHORIZED_DEVICES, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, T.RESIDUAL, T.UNINTENDED, T.UNAUTHORIZED, T.LOGICAL, T.PHYSICAL, A.NO_TEMPEST, A.PHYSICAL, A.NO_WIRELESS_DEVICES, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.USER_ALLOWED_ACCESS, A.NO_SPECIAL_ANALOG, A.NO_WIRELESS, A.TRUSTED, A.USER_ALLOWED, A.NO_PHYSICAL, A.NO_SPECIAL, OE.NO_TEMPEST, OE.PHYSICAL, OE.NO_WIRELESS_DEVICES, OE.TRUSTED_ADMIN, OE.TRUSTED_CONFIG, OE.NO_SPECIAL_ANALOG, OE.NO_WIRELESS, OE.TRUSTED, OE.NO_SPECIAL
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_APC_EXT.1, FDP_IPC_EXT.1, FDP_APC_EXT, FDP_PDC_EXT.1, FDP_FIL_EXT, FDP_RDR_EXT.1, FDP_SWI_EXT.3, FDP_PDC_EXT, FDP_PDC_EXT.4, FDP_PWR_EXT.1, FDP_SWI_EXT.2, FDP_RIP_EXT.1, FDP_RIP, FDP_SWI_EXT.1, FDP_CDS_EXT.1, FDP_SPR_EXT, FDP_UDF_EXT, FDP_UAI_EXT.1, FDP_TER_EXT.1, FDP_TER_EXT.2, FDP_TER_EXT.3, FDP_CDS_EXT, FDP_IPC_EXT, FDP_PWR_EXT, FDP_RDR_EXT, FDP_RIP_EXT, FDP_SWI_EXT, FDP_TER_EXT, FDP_UAI_EXT, FDP_CDS_EXT.1.1, FDP_FIL_EXT.1, FDP_IPC_EXT.1.1, FDP_IPC_EXT.1.2, FDP_PDC_EXT.1.1, FDP_PDC_EXT.2, FDP_PDC_EXT.3, FDP_PDC_EXT.4.1, FDP_PWR_EXT.1.1, FDP_RDR_EXT.1.1, FDP_RIP.1, FDP_RIP_EXT.1.1, FDP_SPR_EXT.1, FDP_SWI_EXT.1.1, FDP_SWI_EXT.2.1, FDP_SWI_EXT.2.2, FDP_SWI_EXT.3.1, FDP_TER_EXT.1.1, FDP_TER_EXT.2.1, FDP_TER_EXT.3.1, FDP_TER_EXT.3.2, FDP_UAI_EXT.1.1, FDP_UDF_EXT.1, FPT_STM.1, FPT_PHP.3, FPT_NTA_EXT.1, FPT_PHP.1, FPT_TST.1, FPT_FLS_EXT.1, FPT_TST_EXT.1, FPT_FLS_EXT, FPT_NTA_EXT, FPT_TST_EXT, FPT_FLS_EXT.1.1, FPT_NTA_EXT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TST_EXT.1.1, FTA_CIN_EXT.1, FTA_CIN_EXT, FTA_CIN_EXT.1.1, FTA_CIN_EXT.1.2, FTA_CIN_EXT.1.3
Evaluation facilities
EWA-Canada, Intertek

Side-channel analysis
physical tampering, Physical Tampering

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Author Michelle Ruppel
Creation date D:20250305145043-05'00'
Modification date D:20250305145043-05'00'
Pages 67
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Heuristics ?

Certificate ID: 667-EWA

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_IND.1, AVA_VAN.1

Scheme data ?

Product Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5
Vendor Belkin International, Inc.
Level PP_PSD_V4.0, MOD_KM_V1.0, MOD_VI_V1.0, MOD_UA_V1.0
Certification Date 05.03.2025

References ?

No references are available for this certificate.

Updates ?

  • 03.04.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20CT.pdf",
  "dgst": "d8cfef67e94e0372",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "667-EWA",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL1",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "44444",
        "4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "76f8f05a35d87f59",
        "42cf355b24450489",
        "48f73a122587b992",
        "814f66c77bc7f33b"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "certification_date": "2025-03-05",
      "level": "PP_PSD_V4.0, MOD_KM_V1.0, MOD_VI_V1.0, MOD_UA_V1.0",
      "product": "Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5",
      "vendor": "Belkin International, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Belkin International, Inc.",
  "manufacturer_web": "https://www.belkin.com",
  "name": "Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5",
  "not_valid_after": "2030-03-05",
  "not_valid_before": "2025-03-05",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "667-EWA CT.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "667-EWA": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA-Canada": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Sinitski, Kiril",
      "/CreationDate": "D:20250307140618-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId": "03c3dcc6-6bfd-4194-a625-fb83b8d0389e",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits": "1",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled": "true",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method": "Privileged",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name": "UNCLASSIFIED",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate": "2023-05-16T11:46:20Z",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId": "da9cbe40-ec1e-4997-afb3-17d87574571a",
      "/ModDate": "D:20250307140618-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 390416,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "667-EWA CR.pdf",
    "report_frontpage": {
      "CA": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA-Canada": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Sinitski, Kiril",
      "/CreationDate": "D:20250307135915-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId": "f4235719-a1a3-4fb4-8b18-a47ac84bac11",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits": "1",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled": "true",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method": "Privileged",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name": "UNCLASSIFIED",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate": "2022-07-20T10:41:47Z",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId": "da9cbe40-ec1e-4997-afb3-17d87574571a",
      "/ModDate": "D:20250307135915-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 823239,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.belkin.com/support-article/?articleNum=275531",
          "https://nvd.nist.gov/vuln/search",
          "http://www.belkin.com/",
          "mailto:[email protected]",
          "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "667-EWA ST v1.2.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_PHYSICAL": 1,
          "A.NO_SPECIAL": 1,
          "A.NO_SPECIAL_ANALOG": 1,
          "A.NO_TEMPEST": 2,
          "A.NO_WIRELESS": 1,
          "A.NO_WIRELESS_DEVICES": 1,
          "A.PHYSICAL": 2,
          "A.TRUSTED": 1,
          "A.TRUSTED_ADMIN": 2,
          "A.TRUSTED_CONFIG": 1,
          "A.USER_ALLOWED": 1,
          "A.USER_ALLOWED_ACCESS": 1
        },
        "O": {
          "O.ANTI_TAMPERING": 2,
          "O.AUTHORIZED": 2,
          "O.COMPUTER": 5,
          "O.EMULATED_INPUT": 3,
          "O.LEAK": 1,
          "O.LEAK_PREVENTION": 1,
          "O.NO_OTHER": 3,
          "O.NO_TOE_ACCESS": 2,
          "O.NO_USER": 1,
          "O.NO_USER_DATA": 1,
          "O.PERIPHERAL": 1,
          "O.PERIPHERAL_PORTS": 1,
          "O.PROTECTED": 1,
          "O.PROTECTED_EDID": 3,
          "O.REJECT": 4,
          "O.SELF_TEST": 4,
          "O.SELF_TEST_FAIL": 2,
          "O.SESSION": 5,
          "O.TAMPER": 1,
          "O.TAMPER_EVIDENT": 2,
          "O.UNIDIRECTIONAL": 7,
          "O.USER": 4,
          "O.USER_DATA": 2
        },
        "OE": {
          "OE.NO_SPECIAL": 1,
          "OE.NO_SPECIAL_ANALOG": 1,
          "OE.NO_TEMPEST": 2,
          "OE.NO_WIRELESS": 1,
          "OE.NO_WIRELESS_DEVICES": 1,
          "OE.PHYSICAL": 3,
          "OE.TRUSTED": 2,
          "OE.TRUSTED_ADMIN": 1,
          "OE.TRUSTED_CONFIG": 1
        },
        "T": {
          "T.DATA_LEAK": 2,
          "T.FAILED": 2,
          "T.LOGICAL": 1,
          "T.LOGICAL_TAMPER": 1,
          "T.PHYSICAL": 1,
          "T.PHYSICAL_TAMPER": 1,
          "T.REPLACEMENT": 2,
          "T.RESIDUAL": 1,
          "T.RESIDUAL_LEAK": 1,
          "T.SIGNAL_LEAK": 2,
          "T.UNAUTHORIZED": 1,
          "T.UNAUTHORIZED_DEVICES": 1,
          "T.UNINTENDED": 1,
          "T.UNINTENDED_USE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1,
          "ALC_FLR": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FDP": {
          "FDP_APC_EXT": 30,
          "FDP_APC_EXT.1": 17,
          "FDP_CDS_EXT": 1,
          "FDP_CDS_EXT.1": 10,
          "FDP_CDS_EXT.1.1": 2,
          "FDP_FIL_EXT": 23,
          "FDP_FIL_EXT.1": 6,
          "FDP_IPC_EXT": 1,
          "FDP_IPC_EXT.1": 6,
          "FDP_IPC_EXT.1.1": 1,
          "FDP_IPC_EXT.1.2": 1,
          "FDP_PDC_EXT": 34,
          "FDP_PDC_EXT.1": 33,
          "FDP_PDC_EXT.1.1": 1,
          "FDP_PDC_EXT.2": 7,
          "FDP_PDC_EXT.3": 5,
          "FDP_PDC_EXT.4": 10,
          "FDP_PDC_EXT.4.1": 1,
          "FDP_PWR_EXT": 1,
          "FDP_PWR_EXT.1": 10,
          "FDP_PWR_EXT.1.1": 1,
          "FDP_RDR_EXT": 1,
          "FDP_RDR_EXT.1": 10,
          "FDP_RDR_EXT.1.1": 1,
          "FDP_RIP": 5,
          "FDP_RIP.1": 1,
          "FDP_RIP_EXT": 1,
          "FDP_RIP_EXT.1": 5,
          "FDP_RIP_EXT.1.1": 1,
          "FDP_SPR_EXT": 7,
          "FDP_SPR_EXT.1": 1,
          "FDP_SWI_EXT": 1,
          "FDP_SWI_EXT.1": 6,
          "FDP_SWI_EXT.1.1": 1,
          "FDP_SWI_EXT.2": 12,
          "FDP_SWI_EXT.2.1": 1,
          "FDP_SWI_EXT.2.2": 1,
          "FDP_SWI_EXT.3": 10,
          "FDP_SWI_EXT.3.1": 1,
          "FDP_TER_EXT": 1,
          "FDP_TER_EXT.1": 5,
          "FDP_TER_EXT.1.1": 1,
          "FDP_TER_EXT.2": 5,
          "FDP_TER_EXT.2.1": 1,
          "FDP_TER_EXT.3": 5,
          "FDP_TER_EXT.3.1": 1,
          "FDP_TER_EXT.3.2": 1,
          "FDP_UAI_EXT": 1,
          "FDP_UAI_EXT.1": 5,
          "FDP_UAI_EXT.1.1": 1,
          "FDP_UDF_EXT": 12,
          "FDP_UDF_EXT.1": 2
        },
        "FPT": {
          "FPT_FLS_EXT": 1,
          "FPT_FLS_EXT.1": 6,
          "FPT_FLS_EXT.1.1": 2,
          "FPT_NTA_EXT": 1,
          "FPT_NTA_EXT.1": 4,
          "FPT_NTA_EXT.1.1": 1,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 7,
          "FPT_PHP.3.1": 1,
          "FPT_STM.1": 1,
          "FPT_TST.1": 5,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST_EXT": 1,
          "FPT_TST_EXT.1": 6,
          "FPT_TST_EXT.1.1": 1
        },
        "FTA": {
          "FTA_CIN_EXT": 1,
          "FTA_CIN_EXT.1": 7,
          "FTA_CIN_EXT.1.1": 1,
          "FTA_CIN_EXT.1.2": 1,
          "FTA_CIN_EXT.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {
        "STM": {
          "STM32": {
            "STM32F070C6T6": 2,
            "STM32F070RBT6": 1
          }
        }
      },
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA-Canada": 1
        },
        "Intertek": {
          "Intertek": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Physical Tampering": 1,
          "physical tampering": 8
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Michelle Ruppel",
      "/CreationDate": "D:20250305145043-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/ModDate": "D:20250305145043-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "pdf_file_size_bytes": 1083572,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.niap-ccevs.org/technical-decisions/TD0844",
          "https://www.niap-ccevs.org/technical-decisions/TD0514",
          "https://www.niap-ccevs.org/technical-decisions/TD0586",
          "http://www.belkin.com/",
          "https://www.niap-ccevs.org/technical-decisions/TD0506",
          "https://www.niap-ccevs.org/technical-decisions/TD0584",
          "https://www.niap-ccevs.org/technical-decisions/TD0620",
          "https://www.niap-ccevs.org/technical-decisions/TD0518",
          "https://www.niap-ccevs.org/technical-decisions/TD0583",
          "https://www.niap-ccevs.org/technical-decisions/TD0804",
          "https://www.niap-ccevs.org/technical-decisions/TD0593",
          "https://www.niap-ccevs.org/technical-decisions/TD0681",
          "https://www.niap-ccevs.org/technical-decisions/TD0507",
          "https://www.niap-ccevs.org/technical-decisions/TD0686",
          "https://www.niap-ccevs.org/technical-decisions/TD0539",
          "https://www.niap-ccevs.org/technical-decisions/TD0619"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 67
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ua_v1.0.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20CR.pdf",
  "scheme": "CA",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20ST%20v1.2.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "15b23991dc19ba0d1f1b41263dfbccf7f542beb698d1ef7ce74767b276f41cce",
      "txt_hash": "26c6ae64bfbad7520356a27790b42c0e5985ed10f3cd6dc05a77509fd3e7d4e5"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e193f37c77f489db0646f7b4759afb32f4fde4394bd37f28dba3d18337d2dd70",
      "txt_hash": "a71d258cf751f82d4ba29d811b62c07d61ab60366903d251896c8d667298efe4"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "141e162418dd7ce92e24441c29b2ddb520ab25a22fdce9f6e1205fb232d61e34",
      "txt_hash": "f4dcae14c15173d24f3ccdeb144f7fa3cb9c4d7c98b61ee889695d61ca9fd699"
    }
  },
  "status": "active"
}