Vertiv Secure KVM and Matrix (formerly as Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165)
CSV information ?
Status | archived |
---|---|
Valid from | 24.03.2016 |
Valid until | 24.03.2018 |
Scheme | 🇺🇸 US |
Manufacturer | Vertiv |
Category | Other Devices and Systems |
Security level | |
Protection profiles | |
Maintenance updates | Vertiv Secure KVM and Matrix (30.03.2017) Certification report Security target |
Maintenance Update for Vertiv Secure KVM and Matrix Models: SC820, SC820DD, SC820H SCM120, SCM120H, SC920H, SC920D, SC920XD, SC840 ,SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC80H, SC845H, SC940H, SC945H, SC945XD, SCM145, SC1045XD, SC885, SC985, SC8165 (19.03.2018) Certification report |
Heuristics summary ?
Certificate ?
Extracted keywords
Certificates
CCEVS-VR-VID10705-2016File metadata
Creation date | D:20160325131240-04'00' |
---|---|
Modification date | D:20160325131320-04'00' |
Pages | 1 |
Producer | iText 2.1.0 (by lowagie.com) |
Certification report ?
Extracted keywords
Asymmetric Algorithms
DHClaims
O.COMPUTER_INTERFACE_ISOLATION, O.COMPUTER_INTERFACE_ISOLATION_, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.PURGE_TOE_KB_DATA_WHILE_, O.NO_DOCKING_PROTOCOLS, O.NO_OTHER_EXTERNAL_INTERFACES, O.NO_ANALOG_AUDIO_INPUT, O.UNIDIRECTIONAL_AUDIO_OUT, O.COMPUTER_TO_AUDIO_ISOLATION, O.USER_AUTHENTICATION_ISOLATION, O.USER_AUTHENTICATION_RESET, O.USER_AUTHENTICATION_ADMIN, O.AUTHORIZED_SWITCHING, O.NO_AMBIGUOUS_CONTROL, O.CONTINUOUS_INDICATION, O.KEYBOARD_AND_MOUSE_TIED, O.NO_CONNECTED_COMPUTER_, O.PERIPHERAL_PORTS_ISOLATION, O.DISABLE_UNAUTHORIZED_, O.KEYBOARD_MOUSE_EMULATED, O.KEYBOARD_MOUSE_, O.UNIDIRECTIONAL_VIDEO, O.UNIDIRERCTIONAL_EDID, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.ANTI_TAMPERING_BACKUP_POWER, O.ANTI_TAMPERING_BACKUP_FAIL_, O.ANTI_TAMPERING_INDICATION, O.ANTI_TAMPERING_PERMANENTLY_, O.NO_TOE_ACCESS, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, O.USER_AUTHENTICATION_TERMINATION, O.DISPLAYPORT_AUX_FILTERING, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_SWITCHING, T.UNAUTHORIZED_DEVICES, T.AUTHORIZED_BUT_UNTRUSTED_, T.MICROPHONE_USE, T.AUDIO_REVERSED, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, A.NO_TEMPEST, A.NO_SPECIAL_ANALOG_CAPABILITIES, A.PHYSICAL, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, OE.PHYSICAL, OE.TRUSTED_ADMINCertificates
CCEVS-VR-VID10705-2016Side-channel analysis
physical tamperingStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date | D:20160325121009-04'00' |
---|---|
Modification date | D:20160325121009-04'00' |
Pages | 28 |
Frontpage
Certificate ID | CCEVS-VR-VID10705-2016 |
---|---|
Certified item | Emerson Secure KVM (identified 2, 4, 8, 16 port models |
Certification lab | US NIAP |
Security target ?
Extracted keywords
Asymmetric Algorithms
DHClaims
O.COMPUTER_INTERFACE_ISOLATION, O.COMPUTER_INTERFACE_ISOLATION_TOE, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.PURGE_TOE_KB_DATA_WHILE_SWITCHI, O.NO_DOCKING_PROTOCOLS, O.NO_OTHER_EXTERNAL_INTERFACES, O.NO_ANALOG_AUDIO_INPUT, O.UNIDIRECTIONAL_AUDIO_OUT, O.COMPUTER_TO_AUDIO_ISOLATION, O.USER_AUTHENTICATION_ISOLATION, O.USER_AUTHENTICATION_RESET, O.USER_AUTHENTICATION_ADMIN, O.AUTHORIZED_SWITCHING, O.NO_AMBIGUOUS_CONTROL, O.CONTINUOUS_INDICATION, O.KEYBOARD_AND_MOUSE_TIED, O.NO_CONNECTED_COMPUTER_CONTROL, O.PERIPHERAL_PORTS_ISOLATION, O.DISABLE_UNAUTHORIZED_PERIPHERAL, O.DISABLE_UNAUTHORIZED_ENDPOINTS, O.KEYBOARD_MOUSE_EMULATED, O.KEYBOARD_MOUSE_UNIDIRECTIONAL, O.UNIDIRECTIONAL_VIDEO, O.UNIDIRERCTIONAL_EDID, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.ANTI_TAMPERING_BACKUP_POWER, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG, O.ANTI_TAMPERING_INDICATION, O.ANTI_TAMPERING_PERMANENTLY_DISA, O.NO_TOE_ACCESS, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, O.USER_AUTHENTICATION_TERMINATION, O.DISPLAYPORT_AUX_FILTERING, O.COMPUTER_INTERFACE_ISOLATION_TO, O.NO_CONNECTED_COMPUTER_CONTRO, O.COMPUTER_INTERFACE_ISOLATION_, O.NO_CONNECTED_COMPUTER_CONT, O.PURGE_TOE_KB_DATA_WHILE_SWIT, O.PURGE_TOE_KB_DATA_WHILE_SWI, O.DISABLE_UNAUTHORIZED_PERIPHER, O.DISABLE_UNAUTHORIZED_ENDPOIN, O.KEYBOARD_MOUSE_UNIDIRECTIONA, O.KEYBOARD_MOUSE_UNIDIRECTION, O.ANTI_TAMPERING_BACKUP_FAIL_TR, O.ANTI_TAMPERING_BACKUP_FAIL_T, O.ANTI_TAMPERING_PERMANENTLY_, O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED, O.PURGE_TOE, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER, O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE, O.ANTI_TAMPERING_PERMANENTLY_DISAB, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_SWITCHING, T.UNAUTHORIZED_DEVICES, T.AUTHORIZED_BUT_UNTRUSTED_DEVICES, T.MICROPHONE_USE, T.AUDIO_REVERSED, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, T.UNINTENDED_SWITCHI, T.UNAUTHORIZED_DEVIC, T.AUTHORIZED_BUT_UNT, A.NO_TEMPEST, A.NO_SPECIAL_ANALOG_CAPABILITIES, A.PHYSICAL, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, OE.PHYSICAL, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FDP_IFC.1, FDP_IFF.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_IFC.1.1, FDP_IFF, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ACC, FDP_ACC.1.1, FDP_ACF, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP, FDP_RIP.1.1, FIA_UAU.2, FIA_UID.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2.1, FMT_MSA.3, FMT_MSA, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FPT_PHP.1, FPT_PHP.3, FPT_FLS.1, FPT_TST.1, FPT_PHP, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_FLS, FPT_FLS.1.1, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_CIN_EXT, FTA_CIN_EXT.1, FTA_ATH_EXT, FTA_TAB.1, FTA_CIN_EXT.1.1, FTA_ATH_EXT.1, FTA_SSL.4, FTA_ATH_EXT.1.1Side-channel analysis
physical tamperingStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | SKVM Security Target |
---|---|
Author | Michael Parvin |
Creation date | D:20170330123927-04'00' |
Modification date | D:20170330123941-04'00' |
Pages | 108 |
Creator | Acrobat PDFMaker 11 for Word |
Producer | Adobe PDF Library 11.0 |
Heuristics ?
Extracted SARs
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1Similar certificates
Scheme data ?
Product | Vertiv Secure KVM and Matrix (formerly Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165) | |
---|---|---|
Id | CCEVS-VR-VID10705 | |
Url | https://www.niap-ccevs.org/product/10705 | |
Certification Date | 24.03.2016 | |
Expiration Date | 24.03.2019 | |
Category | Peripheral Switch | |
Vendor | Vertiv IT Systems | |
Evaluation Facility | DXC.technology | |
Scheme | US |
References ?
No references are available for this certificate.
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Vertiv Secure KVM and Matrix (formerly Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165)', 'id': 'CCEVS-VR-VID10705', 'url': 'https://www.niap-ccevs.org/product/10705', 'certification_date': '2016-03-24', 'expiration_date': '2019-03-24', 'category': 'Peripheral Switch', 'vendor': 'Vertiv IT Systems', 'evaluation_facility': 'DXC.technology', 'scheme': 'US'}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2016-03-24', 'expiration_date': '2019-03-24'}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Peripheral Sharing Switch, Version 3.0', 'pp_eal': 'EAL1', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_pss_v3.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_PSS_V3.0']}}]}
.
The Maintenance Updates of the certificate were updated.
- The following values were removed:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2017-03-30', 'maintenance_title': 'Vertiv Secure KVM and Matrix', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-add1.pdf', 'maintenance_st_link': None}]}
. - The following values were added:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2017-03-30', 'maintenance_title': 'Vertiv Secure KVM and Matrix', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-add1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-st.pdf'}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5f47368eadffc375131e885cbc75525281e7f6a0e135af2ec0dfe1df7f5f4f9d', 'txt_hash': 'ec5bf0c373979bd4fd2a67a29e82b7d9b49f50ecd9cf452aab6c25b307a588db'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '15107c6fc49f42a07444f9fdca4cb196e7d985e800e0c4d3c0b341d7e8f20a50', 'txt_hash': '228effdd4b4522d64428fdefd01c3823083b6f9e9a5ab45e09bb022a7440e352'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a2cb77ff0f5c7d1dda7d470a819f5928819989ebba3d5e0b5e31fecfe82ac9e0', 'txt_hash': 'faf762b44fb280625bd70b45809d5a3d0b3aae189d529828950ecac8b846944b'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 519482, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 28, '/CreationDate': "D:20160325121009-04'00'", '/ModDate': "D:20160325121009-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.emersonnetworkpower.com/en-US/Support/Warranty/Infrastructure-Management/Hardware-Support/Pages/Cybex-Supporting-Documentation.aspx']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 2200649, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 108, '/Author': 'Michael Parvin', '/Company': 'Microsoft', '/CreationDate': "D:20170330123927-04'00'", '/Creator': 'Acrobat PDFMaker 11 for Word', '/ModDate': "D:20170330123941-04'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20170330163831', '/Title': 'SKVM Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://en.wikipedia.org/wiki/Computer_keyboard', 'http://en.wikipedia.org/wiki/Mini-DIN_connector', 'http://en.wikipedia.org/wiki/PC_compatible', 'http://en.wikipedia.org/wiki/Computer_mouse']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 178490, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20160325131240-04'00'", '/ModDate': "D:20160325131320-04'00'", '/Producer': 'iText 2.1.0 (by lowagie.com)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-VID10705-2016', 'cert_item': 'Emerson Secure KVM (identified 2, 4, 8, 16 port models', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-VID10705-2016': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.COMPUTER_INTERFACE_ISOLATION': 1, 'O.COMPUTER_INTERFACE_ISOLATION_': 1, 'O.USER_DATA_ISOLATION': 1, 'O.NO_USER_DATA_RETENTION': 1, 'O.PURGE_TOE_KB_DATA_WHILE_': 1, 'O.NO_DOCKING_PROTOCOLS': 1, 'O.NO_OTHER_EXTERNAL_INTERFACES': 1, 'O.NO_ANALOG_AUDIO_INPUT': 1, 'O.UNIDIRECTIONAL_AUDIO_OUT': 1, 'O.COMPUTER_TO_AUDIO_ISOLATION': 1, 'O.USER_AUTHENTICATION_ISOLATION': 1, 'O.USER_AUTHENTICATION_RESET': 1, 'O.USER_AUTHENTICATION_ADMIN': 1, 'O.AUTHORIZED_SWITCHING': 1, 'O.NO_AMBIGUOUS_CONTROL': 1, 'O.CONTINUOUS_INDICATION': 1, 'O.KEYBOARD_AND_MOUSE_TIED': 1, 'O.NO_CONNECTED_COMPUTER_': 1, 'O.PERIPHERAL_PORTS_ISOLATION': 1, 'O.DISABLE_UNAUTHORIZED_': 2, 'O.KEYBOARD_MOUSE_EMULATED': 1, 'O.KEYBOARD_MOUSE_': 1, 'O.UNIDIRECTIONAL_VIDEO': 1, 'O.UNIDIRERCTIONAL_EDID': 1, 'O.TAMPER_EVIDENT_LABEL': 1, 'O.ANTI_TAMPERING': 1, 'O.ANTI_TAMPERING_BACKUP_POWER': 1, 'O.ANTI_TAMPERING_BACKUP_FAIL_': 1, 'O.ANTI_TAMPERING_INDICATION': 1, 'O.ANTI_TAMPERING_PERMANENTLY_': 1, 'O.NO_TOE_ACCESS': 1, 'O.SELF_TEST': 1, 'O.SELF_TEST_FAIL_TOE_DISABLE': 1, 'O.SELF_TEST_FAIL_INDICATION': 1, 'O.USER_AUTHENTICATION_TERMINATION': 1, 'O.DISPLAYPORT_AUX_FILTERING': 1}, 'T': {'T.DATA_LEAK': 1, 'T.SIGNAL_LEAK': 1, 'T.RESIDUAL_LEAK': 1, 'T.UNINTENDED_SWITCHING': 1, 'T.UNAUTHORIZED_DEVICES': 1, 'T.AUTHORIZED_BUT_UNTRUSTED_': 1, 'T.MICROPHONE_USE': 1, 'T.AUDIO_REVERSED': 1, 'T.LOGICAL_TAMPER': 1, 'T.PHYSICAL_TAMPER': 1, 'T.REPLACEMENT': 1, 'T.FAILED': 1}, 'A': {'A.NO_TEMPEST': 1, 'A.NO_SPECIAL_ANALOG_CAPABILITIES': 1, 'A.PHYSICAL': 1, 'A.TRUSTED_ADMIN': 1, 'A.TRUSTED_CONFIG': 1}, 'OE': {'OE.PHYSICAL': 1, 'OE.TRUSTED_ADMIN': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMS.1': 1}, 'ATE': {'ATE_IND.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 3, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2}, 'FDP': {'FDP_IFC.1': 79, 'FDP_IFF.1': 85, 'FDP_ACC.1': 18, 'FDP_ACF.1': 15, 'FDP_RIP.1': 11, 'FDP_IFC.1.1': 2, 'FDP_IFF': 2, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 3, 'FDP_IFF.1.3': 3, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 13, 'FDP_ACC': 1, 'FDP_ACC.1.1': 1, 'FDP_ACF': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_RIP': 1, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_UAU.2': 3, 'FIA_UID.2': 5, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 3, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MSA.3': 12, 'FMT_MSA': 1, 'FMT_MOF.1': 7, 'FMT_SMF.1': 10, 'FMT_SMR.1': 6, 'FMT_MOF': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1}, 'FPT': {'FPT_PHP.1': 9, 'FPT_PHP.3': 20, 'FPT_FLS.1': 14, 'FPT_TST.1': 16, 'FPT_PHP': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_FLS': 1, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_CIN_EXT': 6, 'FTA_CIN_EXT.1': 9, 'FTA_ATH_EXT': 1, 'FTA_TAB.1': 1, 'FTA_CIN_EXT.1.1': 2, 'FTA_ATH_EXT.1': 11, 'FTA_SSL.4': 1, 'FTA_ATH_EXT.1.1': 2}}, 'cc_claims': {'O': {'O.COMPUTER_INTERFACE_ISOLATION': 11, 'O.COMPUTER_INTERFACE_ISOLATION_TOE': 2, 'O.USER_DATA_ISOLATION': 9, 'O.NO_USER_DATA_RETENTION': 9, 'O.PURGE_TOE_KB_DATA_WHILE_SWITCHI': 2, 'O.NO_DOCKING_PROTOCOLS': 7, 'O.NO_OTHER_EXTERNAL_INTERFACES': 10, 'O.NO_ANALOG_AUDIO_INPUT': 8, 'O.UNIDIRECTIONAL_AUDIO_OUT': 7, 'O.COMPUTER_TO_AUDIO_ISOLATION': 7, 'O.USER_AUTHENTICATION_ISOLATION': 7, 'O.USER_AUTHENTICATION_RESET': 11, 'O.USER_AUTHENTICATION_ADMIN': 7, 'O.AUTHORIZED_SWITCHING': 7, 'O.NO_AMBIGUOUS_CONTROL': 7, 'O.CONTINUOUS_INDICATION': 7, 'O.KEYBOARD_AND_MOUSE_TIED': 7, 'O.NO_CONNECTED_COMPUTER_CONTROL': 4, 'O.PERIPHERAL_PORTS_ISOLATION': 12, 'O.DISABLE_UNAUTHORIZED_PERIPHERAL': 5, 'O.DISABLE_UNAUTHORIZED_ENDPOINTS': 5, 'O.KEYBOARD_MOUSE_EMULATED': 7, 'O.KEYBOARD_MOUSE_UNIDIRECTIONAL': 5, 'O.UNIDIRECTIONAL_VIDEO': 7, 'O.UNIDIRERCTIONAL_EDID': 7, 'O.TAMPER_EVIDENT_LABEL': 8, 'O.ANTI_TAMPERING': 8, 'O.ANTI_TAMPERING_BACKUP_POWER': 7, 'O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG': 2, 'O.ANTI_TAMPERING_INDICATION': 7, 'O.ANTI_TAMPERING_PERMANENTLY_DISA': 2, 'O.NO_TOE_ACCESS': 8, 'O.SELF_TEST': 9, 'O.SELF_TEST_FAIL_TOE_DISABLE': 9, 'O.SELF_TEST_FAIL_INDICATION': 7, 'O.USER_AUTHENTICATION_TERMINATION': 1, 'O.DISPLAYPORT_AUX_FILTERING': 2, 'O.COMPUTER_INTERFACE_ISOLATION_TO': 1, 'O.NO_CONNECTED_COMPUTER_CONTRO': 1, 'O.COMPUTER_INTERFACE_ISOLATION_': 1, 'O.NO_CONNECTED_COMPUTER_CONT': 2, 'O.PURGE_TOE_KB_DATA_WHILE_SWIT': 1, 'O.PURGE_TOE_KB_DATA_WHILE_SWI': 1, 'O.DISABLE_UNAUTHORIZED_PERIPHER': 2, 'O.DISABLE_UNAUTHORIZED_ENDPOIN': 2, 'O.KEYBOARD_MOUSE_UNIDIRECTIONA': 1, 'O.KEYBOARD_MOUSE_UNIDIRECTION': 1, 'O.ANTI_TAMPERING_BACKUP_FAIL_TR': 1, 'O.ANTI_TAMPERING_BACKUP_FAIL_T': 1, 'O.ANTI_TAMPERING_PERMANENTLY_': 2, 'O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED': 4, 'O.PURGE_TOE': 3, 'O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER': 2, 'O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE': 3, 'O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE': 1, 'O.ANTI_TAMPERING_PERMANENTLY_DISAB': 1}, 'T': {'T.DATA_LEAK': 3, 'T.SIGNAL_LEAK': 2, 'T.RESIDUAL_LEAK': 3, 'T.UNINTENDED_SWITCHING': 1, 'T.UNAUTHORIZED_DEVICES': 2, 'T.AUTHORIZED_BUT_UNTRUSTED_DEVICES': 1, 'T.MICROPHONE_USE': 1, 'T.AUDIO_REVERSED': 1, 'T.LOGICAL_TAMPER': 3, 'T.PHYSICAL_TAMPER': 2, 'T.REPLACEMENT': 3, 'T.FAILED': 2, 'T.UNINTENDED_SWITCHI': 1, 'T.UNAUTHORIZED_DEVIC': 1, 'T.AUTHORIZED_BUT_UNT': 1}, 'A': {'A.NO_TEMPEST': 3, 'A.NO_SPECIAL_ANALOG_CAPABILITIES': 2, 'A.PHYSICAL': 3, 'A.TRUSTED_ADMIN': 2, 'A.TRUSTED_CONFIG': 3}, 'OE': {'OE.PHYSICAL': 4, 'OE.TRUSTED_ADMIN': 6}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 14}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-VID10705-2016': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
st_vid10705-vr.pdf
. - The st_filename property was set to
st_vid10705-st.pdf
. - The cert_filename property was set to
st_vid10705-ci.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-VID-10705-2016
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-vr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-st.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
- The cert property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Vertiv Secure KVM and Matrix (formerly as Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-ci.pdf",
"dgst": "d22e3c1b13290920",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-VID-10705-2016",
"cert_lab": [
"US"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Peripheral Switch",
"certification_date": "2016-03-24",
"evaluation_facility": "DXC.technology",
"expiration_date": "2019-03-24",
"id": "CCEVS-VR-VID10705",
"product": "Vertiv Secure KVM and Matrix (formerly Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165)",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/10705",
"vendor": "Vertiv IT Systems"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2018-03-19",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-add2.pdf",
"maintenance_st_link": null,
"maintenance_title": "Maintenance Update for Vertiv Secure KVM and Matrix Models: SC820, SC820DD, SC820H SCM120, SCM120H, SC920H, SC920D, SC920XD, SC840 ,SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC80H, SC845H, SC940H, SC945H, SC945XD, SCM145, SC1045XD, SC885, SC985, SC8165"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2017-03-30",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-add1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-st.pdf",
"maintenance_title": "Vertiv Secure KVM and Matrix"
}
]
},
"manufacturer": "Vertiv",
"manufacturer_web": "https://www.vertivco.com",
"name": "Vertiv Secure KVM and Matrix (formerly as Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165)",
"not_valid_after": "2018-03-24",
"not_valid_before": "2016-03-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "st_vid10705-ci.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10705-2016": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20160325131240-04\u002700\u0027",
"/ModDate": "D:20160325131320-04\u002700\u0027",
"/Producer": "iText 2.1.0 (by lowagie.com)",
"pdf_file_size_bytes": 178490,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "st_vid10705-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-VID10705-2016",
"cert_item": "Emerson Secure KVM (identified 2, 4, 8, 16 port models",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10705-2016": 1
}
},
"cc_claims": {
"A": {
"A.NO_SPECIAL_ANALOG_CAPABILITIES": 1,
"A.NO_TEMPEST": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1,
"A.TRUSTED_CONFIG": 1
},
"O": {
"O.ANTI_TAMPERING": 1,
"O.ANTI_TAMPERING_BACKUP_FAIL_": 1,
"O.ANTI_TAMPERING_BACKUP_POWER": 1,
"O.ANTI_TAMPERING_INDICATION": 1,
"O.ANTI_TAMPERING_PERMANENTLY_": 1,
"O.AUTHORIZED_SWITCHING": 1,
"O.COMPUTER_INTERFACE_ISOLATION": 1,
"O.COMPUTER_INTERFACE_ISOLATION_": 1,
"O.COMPUTER_TO_AUDIO_ISOLATION": 1,
"O.CONTINUOUS_INDICATION": 1,
"O.DISABLE_UNAUTHORIZED_": 2,
"O.DISPLAYPORT_AUX_FILTERING": 1,
"O.KEYBOARD_AND_MOUSE_TIED": 1,
"O.KEYBOARD_MOUSE_": 1,
"O.KEYBOARD_MOUSE_EMULATED": 1,
"O.NO_AMBIGUOUS_CONTROL": 1,
"O.NO_ANALOG_AUDIO_INPUT": 1,
"O.NO_CONNECTED_COMPUTER_": 1,
"O.NO_DOCKING_PROTOCOLS": 1,
"O.NO_OTHER_EXTERNAL_INTERFACES": 1,
"O.NO_TOE_ACCESS": 1,
"O.NO_USER_DATA_RETENTION": 1,
"O.PERIPHERAL_PORTS_ISOLATION": 1,
"O.PURGE_TOE_KB_DATA_WHILE_": 1,
"O.SELF_TEST": 1,
"O.SELF_TEST_FAIL_INDICATION": 1,
"O.SELF_TEST_FAIL_TOE_DISABLE": 1,
"O.TAMPER_EVIDENT_LABEL": 1,
"O.UNIDIRECTIONAL_AUDIO_OUT": 1,
"O.UNIDIRECTIONAL_VIDEO": 1,
"O.UNIDIRERCTIONAL_EDID": 1,
"O.USER_AUTHENTICATION_ADMIN": 1,
"O.USER_AUTHENTICATION_ISOLATION": 1,
"O.USER_AUTHENTICATION_RESET": 1,
"O.USER_AUTHENTICATION_TERMINATION": 1,
"O.USER_DATA_ISOLATION": 1
},
"OE": {
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1
},
"T": {
"T.AUDIO_REVERSED": 1,
"T.AUTHORIZED_BUT_UNTRUSTED_": 1,
"T.DATA_LEAK": 1,
"T.FAILED": 1,
"T.LOGICAL_TAMPER": 1,
"T.MICROPHONE_USE": 1,
"T.PHYSICAL_TAMPER": 1,
"T.REPLACEMENT": 1,
"T.RESIDUAL_LEAK": 1,
"T.SIGNAL_LEAK": 1,
"T.UNAUTHORIZED_DEVICES": 1,
"T.UNINTENDED_SWITCHING": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20160325121009-04\u002700\u0027",
"/ModDate": "D:20160325121009-04\u002700\u0027",
"pdf_file_size_bytes": 519482,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.emersonnetworkpower.com/en-US/Support/Warranty/Infrastructure-Management/Hardware-Support/Pages/Cybex-Supporting-Documentation.aspx"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
},
"st_filename": "st_vid10705-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_SPECIAL_ANALOG_CAPABILITIES": 2,
"A.NO_TEMPEST": 3,
"A.PHYSICAL": 3,
"A.TRUSTED_ADMIN": 2,
"A.TRUSTED_CONFIG": 3
},
"O": {
"O.ANTI_TAMPERING": 8,
"O.ANTI_TAMPERING_BACKUP_FAIL_T": 1,
"O.ANTI_TAMPERING_BACKUP_FAIL_TR": 1,
"O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG": 2,
"O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE": 1,
"O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER": 2,
"O.ANTI_TAMPERING_BACKUP_POWER": 7,
"O.ANTI_TAMPERING_INDICATION": 7,
"O.ANTI_TAMPERING_PERMANENTLY_": 2,
"O.ANTI_TAMPERING_PERMANENTLY_DISA": 2,
"O.ANTI_TAMPERING_PERMANENTLY_DISAB": 1,
"O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE": 3,
"O.AUTHORIZED_SWITCHING": 7,
"O.COMPUTER_INTERFACE_ISOLATION": 11,
"O.COMPUTER_INTERFACE_ISOLATION_": 1,
"O.COMPUTER_INTERFACE_ISOLATION_TO": 1,
"O.COMPUTER_INTERFACE_ISOLATION_TOE": 2,
"O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED": 4,
"O.COMPUTER_TO_AUDIO_ISOLATION": 7,
"O.CONTINUOUS_INDICATION": 7,
"O.DISABLE_UNAUTHORIZED_ENDPOIN": 2,
"O.DISABLE_UNAUTHORIZED_ENDPOINTS": 5,
"O.DISABLE_UNAUTHORIZED_PERIPHER": 2,
"O.DISABLE_UNAUTHORIZED_PERIPHERAL": 5,
"O.DISPLAYPORT_AUX_FILTERING": 2,
"O.KEYBOARD_AND_MOUSE_TIED": 7,
"O.KEYBOARD_MOUSE_EMULATED": 7,
"O.KEYBOARD_MOUSE_UNIDIRECTION": 1,
"O.KEYBOARD_MOUSE_UNIDIRECTIONA": 1,
"O.KEYBOARD_MOUSE_UNIDIRECTIONAL": 5,
"O.NO_AMBIGUOUS_CONTROL": 7,
"O.NO_ANALOG_AUDIO_INPUT": 8,
"O.NO_CONNECTED_COMPUTER_CONT": 2,
"O.NO_CONNECTED_COMPUTER_CONTRO": 1,
"O.NO_CONNECTED_COMPUTER_CONTROL": 4,
"O.NO_DOCKING_PROTOCOLS": 7,
"O.NO_OTHER_EXTERNAL_INTERFACES": 10,
"O.NO_TOE_ACCESS": 8,
"O.NO_USER_DATA_RETENTION": 9,
"O.PERIPHERAL_PORTS_ISOLATION": 12,
"O.PURGE_TOE": 3,
"O.PURGE_TOE_KB_DATA_WHILE_SWI": 1,
"O.PURGE_TOE_KB_DATA_WHILE_SWIT": 1,
"O.PURGE_TOE_KB_DATA_WHILE_SWITCHI": 2,
"O.SELF_TEST": 9,
"O.SELF_TEST_FAIL_INDICATION": 7,
"O.SELF_TEST_FAIL_TOE_DISABLE": 9,
"O.TAMPER_EVIDENT_LABEL": 8,
"O.UNIDIRECTIONAL_AUDIO_OUT": 7,
"O.UNIDIRECTIONAL_VIDEO": 7,
"O.UNIDIRERCTIONAL_EDID": 7,
"O.USER_AUTHENTICATION_ADMIN": 7,
"O.USER_AUTHENTICATION_ISOLATION": 7,
"O.USER_AUTHENTICATION_RESET": 11,
"O.USER_AUTHENTICATION_TERMINATION": 1,
"O.USER_DATA_ISOLATION": 9
},
"OE": {
"OE.PHYSICAL": 4,
"OE.TRUSTED_ADMIN": 6
},
"T": {
"T.AUDIO_REVERSED": 1,
"T.AUTHORIZED_BUT_UNT": 1,
"T.AUTHORIZED_BUT_UNTRUSTED_DEVICES": 1,
"T.DATA_LEAK": 3,
"T.FAILED": 2,
"T.LOGICAL_TAMPER": 3,
"T.MICROPHONE_USE": 1,
"T.PHYSICAL_TAMPER": 2,
"T.REPLACEMENT": 3,
"T.RESIDUAL_LEAK": 3,
"T.SIGNAL_LEAK": 2,
"T.UNAUTHORIZED_DEVIC": 1,
"T.UNAUTHORIZED_DEVICES": 2,
"T.UNINTENDED_SWITCHI": 1,
"T.UNINTENDED_SWITCHING": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"ATE": {
"ATE_IND.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 3,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 2
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 18,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 15,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 79,
"FDP_IFC.1.1": 2,
"FDP_IFF": 2,
"FDP_IFF.1": 85,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 3,
"FDP_IFF.1.3": 3,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 13,
"FDP_RIP": 1,
"FDP_RIP.1": 11,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_UAU.1": 1,
"FIA_UAU.2": 3,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 3,
"FIA_UID.2": 5,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA": 1,
"FMT_MSA.3": 12,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6,
"FMT_SMR.1.1": 1
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 14,
"FPT_FLS.1.1": 1,
"FPT_PHP": 1,
"FPT_PHP.1": 9,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 20,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 16,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_ATH_EXT": 1,
"FTA_ATH_EXT.1": 11,
"FTA_ATH_EXT.1.1": 2,
"FTA_CIN_EXT": 6,
"FTA_CIN_EXT.1": 9,
"FTA_CIN_EXT.1.1": 2,
"FTA_SSL.4": 1,
"FTA_TAB.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 14
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Michael Parvin",
"/Company": "Microsoft",
"/CreationDate": "D:20170330123927-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 for Word",
"/ModDate": "D:20170330123941-04\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20170330163831",
"/Title": "SKVM Security Target",
"pdf_file_size_bytes": 2200649,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://en.wikipedia.org/wiki/Mini-DIN_connector",
"http://en.wikipedia.org/wiki/Computer_keyboard",
"http://en.wikipedia.org/wiki/PC_compatible",
"http://en.wikipedia.org/wiki/Computer_mouse"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 108
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL1",
"pp_ids": {
"_type": "Set",
"elements": [
"PP_PSS_V3.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_pss_v3.0.pdf",
"pp_name": "Protection Profile for Peripheral Sharing Switch, Version 3.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a2cb77ff0f5c7d1dda7d470a819f5928819989ebba3d5e0b5e31fecfe82ac9e0",
"txt_hash": "faf762b44fb280625bd70b45809d5a3d0b3aae189d529828950ecac8b846944b"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5f47368eadffc375131e885cbc75525281e7f6a0e135af2ec0dfe1df7f5f4f9d",
"txt_hash": "ec5bf0c373979bd4fd2a67a29e82b7d9b49f50ecd9cf452aab6c25b307a588db"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "15107c6fc49f42a07444f9fdca4cb196e7d985e800e0c4d3c0b341d7e8f20a50",
"txt_hash": "228effdd4b4522d64428fdefd01c3823083b6f9e9a5ab45e09bb022a7440e352"
}
},
"status": "archived"
}