Belkin OmniView Secure KVM Switch Models 2-port (F1DN102U), 4-port (F1DN104U), 8- port (F1DN108U)
CSV information ?
Status | archived |
---|---|
Valid from | 25.02.2009 |
Valid until | 20.07.2012 |
Scheme | 🇺🇸 US |
Manufacturer | Belkin International, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | EAL4+, ALC_FLR.3 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Security level
EAL 4, EAL 1, EAL4, EAL4 augmented, EAL 4 augmentedClaims
T.BYPASS, T.INSTALL, T.LOGICAL, T.PHYSICAL, T.RESIDUAL, T.SPOOF, T.STATE, T.TRANSFER, A.ACCESS, A.EMISSION, A.ISOLATE, A.MANAGE, A.NOEVIL, A.PHYSICAL, A.SCENARIOSecurity Assurance Requirements (SAR)
ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, ADV_ARC.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Standards
CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
Title | D |
---|---|
Author | Steve Wilson |
Creation date | D:20090319185600 |
Modification date | D:20090319185600 |
Pages | 14 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Security target ?
Extracted keywords
Schemes
MACSecurity level
EAL4, EAL 4, EAL4 augmentedClaims
O.CONF, O.CONNECT, O.INDICATE, O.INVOKE, O.NOPROG, O.ROM, O.SELECT, O.SWITCH, O.TAMPER, T.BYPASS, T.INSTALL, T.LOGICAL, T.PHYSICAL, T.RESIDUAL, T.SPOOF, T.STATE, T.TRANSFER, A.ACCESS, A.EMISSION, A.ISOLATE, A.MANAGE, A.NOEVIL, A.PHYSICAL, A.SCENARIO, OE.ACCESS, OE.EMISSION, OE.ISOLATE, OE.MANAGE, OE.NOEVIL, OE.PHYSICAL, OE.SCENARIOSecurity Assurance Requirements (SAR)
ADO_IGS, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_USR, AGD_ADM, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FDP_ETC.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2Side-channel analysis
physical tamperingFile metadata
Title | Belkin USB KVM |
---|---|
Author | InfoGard |
Creation date | D:20090319185503 |
Modification date | D:20090319185503 |
Pages | 35 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
No heuristics are available for this certificate.
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Similar certificates
Scheme data ?
Product | Belkin OmniView Secure KVM Switch Models 2-port (F1DN102U), 4-port (F1DN104U), 8-port (F1DN108U) | |
---|---|---|
Id | CCEVS-VR-VID10326 | |
Url | https://www.niap-ccevs.org/product/10326 | |
Certification Date | 25.02.2009 | |
Expiration Date | None | |
Category | Peripheral Switch | |
Vendor | Belkin International, Inc. | |
Evaluation Facility | UL Verification Services Inc. (Formerly InfoGard) | |
Scheme | US |
References ?
No references are available for this certificate as its ID was not successfully extracted.
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Belkin OmniView Secure KVM Switch Models 2-port (F1DN102U), 4-port (F1DN104U), 8-port (F1DN108U)', 'id': 'CCEVS-VR-VID10326', 'url': 'https://www.niap-ccevs.org/product/10326', 'certification_date': '2009-02-25', 'expiration_date': None, 'category': 'Peripheral Switch', 'vendor': 'Belkin International, Inc.', 'evaluation_facility': 'UL Verification Services Inc. (Formerly InfoGard)', 'scheme': 'US'}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2009-02-25'}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ab3dcb3d7514572db90b9984ef1eebd9b469faf3b9f58a0c1d1c2ae188c7c466', 'txt_hash': '939fda8b046a95b77a04b68323ea737d25d61e6e333a24013496d17b846c5f7d'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6b624bac6e6849026c073aefc90106943d5a2cb73698bcc6659a4372c6f000ae', 'txt_hash': 'bb90744fab61137bc23e1c4195afd7a185615d3500875711278ba7dd55620640'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 368788, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Title': 'D', '/Author': 'Steve Wilson', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20090319185600', '/ModDate': 'D:20090319185600', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.niap-ccevs.org/cc-scheme/PD/0138.html', 'http://searchsmb.techtarget.com/sDefinition/0,,sid44_gci212588,00.html', 'http://searchexchange.techtarget.com/sDefinition/0,,sid43_gci212596,00.html', 'http://searchsmb.techtarget.com/sDefinition/0,,sid44_gci212440,00.html']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 570836, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 35, '/Title': 'Belkin USB KVM ', '/Author': 'InfoGard', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20090319185503', '/ModDate': 'D:20090319185503', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://searchsmb.techtarget.com/sDefinition/0,,sid44_gci212588,00.html', 'http://searchexchange.techtarget.com/sDefinition/0,,sid43_gci212596,00.html', 'http://searchsmb.techtarget.com/sDefinition/0,,sid44_gci212440,00.html']}}
. - The report_frontpage property was set to
{'US': {}}
. - The report_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 11, 'EAL 1': 1, 'EAL4': 5, 'EAL4 augmented': 4, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_TDS.3': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_ARC.1': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 6, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 2}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.BYPASS': 1, 'T.INSTALL': 1, 'T.LOGICAL': 1, 'T.PHYSICAL': 1, 'T.RESIDUAL': 1, 'T.SPOOF': 1, 'T.STATE': 1, 'T.TRANSFER': 1}, 'A': {'A.ACCESS': 1, 'A.EMISSION': 1, 'A.ISOLATE': 1, 'A.MANAGE': 1, 'A.NOEVIL': 1, 'A.PHYSICAL': 1, 'A.SCENARIO': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 7, 'EAL 4': 5, 'EAL4 augmented': 2}}, 'cc_sar': {'ADO': {'ADO_IGS': 1}, 'ADV': {'ADV_ARC.1': 4, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_USR': 1, 'AGD_ADM': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 12, 'ALC_FLR.2': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FDP': {'FDP_ETC.1': 7, 'FDP_IFC.1': 9, 'FDP_IFF.1': 10, 'FDP_ITC.1': 9, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1}, 'FMT': {'FMT_MSA': 1, 'FMT_MSA.1': 10, 'FMT_MSA.3': 12, 'FMT_SMF.1': 3, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 3}, 'FPT': {'FPT_PHP.1': 7, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1}}, 'cc_claims': {'O': {'O.CONF': 8, 'O.CONNECT': 6, 'O.INDICATE': 5, 'O.INVOKE': 3, 'O.NOPROG': 4, 'O.ROM': 4, 'O.SELECT': 4, 'O.SWITCH': 5, 'O.TAMPER': 5}, 'T': {'T.BYPASS': 3, 'T.INSTALL': 4, 'T.LOGICAL': 4, 'T.PHYSICAL': 6, 'T.RESIDUAL': 4, 'T.SPOOF': 4, 'T.STATE': 4, 'T.TRANSFER': 5}, 'A': {'A.ACCESS': 3, 'A.EMISSION': 3, 'A.ISOLATE': 3, 'A.MANAGE': 4, 'A.NOEVIL': 3, 'A.PHYSICAL': 3, 'A.SCENARIO': 3}, 'OE': {'OE.ACCESS': 4, 'OE.EMISSION': 3, 'OE.ISOLATE': 4, 'OE.MANAGE': 6, 'OE.NOEVIL': 4, 'OE.PHYSICAL': 3, 'OE.SCENARIO': 4}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 5}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
st_vid10326-vr.pdf
. - The st_filename property was set to
st_vid10326-st.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10326-vr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10326-st.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Belkin OmniView Secure KVM Switch Models 2-port (F1DN102U), 4-port (F1DN104U), 8- port (F1DN108U) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "b16db30dc63106ca",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": null,
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4",
"8",
"2"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Peripheral Switch",
"certification_date": "2009-02-25",
"evaluation_facility": "UL Verification Services Inc. (Formerly InfoGard)",
"expiration_date": null,
"id": "CCEVS-VR-VID10326",
"product": "Belkin OmniView Secure KVM Switch Models 2-port (F1DN102U), 4-port (F1DN104U), 8-port (F1DN108U)",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/10326",
"vendor": "Belkin International, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Belkin International, Inc.",
"manufacturer_web": "https://www.belkin.com",
"name": "Belkin OmniView Secure KVM Switch Models 2-port (F1DN102U), 4-port (F1DN104U), 8- port (F1DN108U)",
"not_valid_after": "2012-07-20",
"not_valid_before": "2009-02-25",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10326-vr.pdf",
"report_frontpage": {
"US": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.EMISSION": 1,
"A.ISOLATE": 1,
"A.MANAGE": 1,
"A.NOEVIL": 1,
"A.PHYSICAL": 1,
"A.SCENARIO": 1
},
"T": {
"T.BYPASS": 1,
"T.INSTALL": 1,
"T.LOGICAL": 1,
"T.PHYSICAL": 1,
"T.RESIDUAL": 1,
"T.SPOOF": 1,
"T.STATE": 1,
"T.TRANSFER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.3": 6,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 11,
"EAL 4 augmented": 1,
"EAL4": 5,
"EAL4 augmented": 4
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 1,
"CCMB-2007-09-002": 1,
"CCMB-2007-09-003": 1,
"CCMB-2007-09-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Steve Wilson",
"/CreationDate": "D:20090319185600",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20090319185600",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "D",
"pdf_file_size_bytes": 368788,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://searchexchange.techtarget.com/sDefinition/0,,sid43_gci212596,00.html",
"http://searchsmb.techtarget.com/sDefinition/0,,sid44_gci212440,00.html",
"http://searchsmb.techtarget.com/sDefinition/0,,sid44_gci212588,00.html",
"http://www.niap-ccevs.org/cc-scheme/PD/0138.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "st_vid10326-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.EMISSION": 3,
"A.ISOLATE": 3,
"A.MANAGE": 4,
"A.NOEVIL": 3,
"A.PHYSICAL": 3,
"A.SCENARIO": 3
},
"O": {
"O.CONF": 8,
"O.CONNECT": 6,
"O.INDICATE": 5,
"O.INVOKE": 3,
"O.NOPROG": 4,
"O.ROM": 4,
"O.SELECT": 4,
"O.SWITCH": 5,
"O.TAMPER": 5
},
"OE": {
"OE.ACCESS": 4,
"OE.EMISSION": 3,
"OE.ISOLATE": 4,
"OE.MANAGE": 6,
"OE.NOEVIL": 4,
"OE.PHYSICAL": 3,
"OE.SCENARIO": 4
},
"T": {
"T.BYPASS": 3,
"T.INSTALL": 4,
"T.LOGICAL": 4,
"T.PHYSICAL": 6,
"T.RESIDUAL": 4,
"T.SPOOF": 4,
"T.STATE": 4,
"T.TRANSFER": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADO": {
"ADO_IGS": 1
},
"ADV": {
"ADV_ARC.1": 4,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_OPE.1": 1,
"AGD_PRE.1": 1,
"AGD_USR": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 12,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 5,
"EAL4": 7,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FDP": {
"FDP_ETC.1": 7,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC.1": 9,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 10,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC.1": 9,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1
},
"FMT": {
"FMT_MSA": 1,
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 12,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 3,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 3
},
"FPT": {
"FPT_PHP.1": 7,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 5
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "InfoGard",
"/CreationDate": "D:20090319185503",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20090319185503",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "Belkin USB KVM ",
"pdf_file_size_bytes": 570836,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://searchexchange.techtarget.com/sDefinition/0,,sid43_gci212596,00.html",
"http://searchsmb.techtarget.com/sDefinition/0,,sid44_gci212440,00.html",
"http://searchsmb.techtarget.com/sDefinition/0,,sid44_gci212588,00.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 35
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10326-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10326-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ab3dcb3d7514572db90b9984ef1eebd9b469faf3b9f58a0c1d1c2ae188c7c466",
"txt_hash": "939fda8b046a95b77a04b68323ea737d25d61e6e333a24013496d17b846c5f7d"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6b624bac6e6849026c073aefc90106943d5a2cb73698bcc6659a4372c6f000ae",
"txt_hash": "bb90744fab61137bc23e1c4195afd7a185615d3500875711278ba7dd55620640"
}
},
"status": "archived"
}