Secure Analogue and Digital KVM Switches - Black Box models SW2006A-USB-EAL, SW4006A-USB-EAL, SW2008A-USB-EAL, SW4008A-USB-EAL, SW2009A-USB-EAL, SW4009A-USB-EAL

CSV information ?

Status archived
Valid from 04.01.2011
Valid until 04.01.2016
Scheme 🇬🇧 UK
Manufacturer Black Box Corporation
Category Other Devices and Systems
Security level ALC_FLR.2, EAL4+, ATE_DPT.2

Heuristics summary ?

Certificate ID: CRP260

Certificate ?

Certification report ?

Extracted keywords

Security level
EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2, ATE_DPT.2
Certificates
CRP260
Certification process
out of scope, analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation, analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although

Certification process
out of scope, analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation, analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title Certification Report
Author User
Creation date D:20110111164749Z
Modification date D:20110111164751Z
Pages 16
Creator Acrobat PDFMaker 7.0.5 for Word
Producer Acrobat Elements 7.0.5 (Windows)

References

Incoming
  • CRP269 - archived - Black Box Secure Analogue and Digital KVM Switches, Version 1.0, SW2008A-USB-EAL, SW4008A-USB-EAL, SW2006A-USB-EAL, SW4006A-USB-EAL

Security target ?

Extracted keywords

Security level
EAL4, EAL4 augmented
Claims
O.SWITCH, O.CONF, O.CONNECT, O.INDICATE, O.SELECT, O.INVOKE, O.NOPROG, O.ROM, T.BYPASS, T.INSTALL, T.LOGICAL, T.PHYSICAL, T.RESIDUAL, T.SPOOF, T.STATE, T.TRANSFER, A.SCENARIO, A.ACCESS, A.MANAGE, A.NOEVIL, A.PHYSICAL, A.EMISSION, A.ISOLATE, OE.ACCESS, OE.MANAGE, OE.NOEVIL, OE.PHYSICAL, OE.SCENARIO, OE.EMISSION, OE.ISOLATE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT, ATE_DPT.1, AVA_VAN.3
Security Functional Requirements (SFR)
FAU_GEN, FDP_ETC, FDP_IFF, FDP_ITC, FDP_ETC.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_MSA.1, FMT_MSA, FMT_SMF, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1

Side-channel analysis
malfunction

Standards
CCMB-2009-07-004

File metadata

Title
Author Ian Mearns
Creation date D:20101206093805
Modification date D:20101206093805
Pages 38
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics ?

Certificate ID: CRP260

Extracted SARs

ALC_CMS.4, ATE_COV.2, ALC_LCD.1, ATE_DPT.2, ADV_ARC.1, AGD_PRE.1, AGD_OPE.1, ALC_FLR.2, ALC_TAT.1, ALC_CMC.4, ADV_TDS.3, ATE_IND.2, ALC_DEL.1, ADV_IMP.1, ALC_DVS.1, AVA_VAN.3, ADV_FSP.4, ATE_FUN.1

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7c4a67bbabe66ff725f1b75754ba2be37d81f7e7ed9b4d8810f392d675288728', 'txt_hash': '52d3f38a5893964a4eb9fab8ceac7c131112f427979f864bb83209db08dfa667'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '842c04aa6cdab4a566c602b2ff6f7f69403ec76d7f770ec4c62c1dfeae7387a8', 'txt_hash': '68ed8a0bffe65cb23ce383a1128dde7d1ba5d2d21d7263bc91a9f35d000aa073'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 203099, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': 'D:20110111164749Z', '/_EmailSubject': 'Word -> PDF (3) ', '/Author': 'User', '/Creator': 'Acrobat PDFMaker 7.0.5 for Word', '/_AuthorEmailDisplayName': 'WhittakerAxon, Nigel', '/Producer': 'Acrobat Elements 7.0.5 (Windows)', '/_AuthorEmail': '[email protected]', '/ModDate': 'D:20110111164751Z', '/_PreviousAdHocReviewCycleID': '2047206653', '/_AdHocReviewCycleID': '-1320395370', '/Company': 'Certification Body, CESG', '/Title': 'Certification Report', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 580697, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Title': ' ', '/Author': 'Ian Mearns', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20101206093805', '/ModDate': 'D:20101206093805', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CRP260': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 2}, 'ATE': {'ATE_DPT.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation': 1, 'analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 11, 'EAL4 augmented': 5}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_TDS.3': 4, 'ADV_FSP.4': 3, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 5, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 2, 'ATE_DPT': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.3': 3}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FDP': {'FDP_ETC': 1, 'FDP_IFF': 1, 'FDP_ITC': 1, 'FDP_ETC.1': 5, 'FDP_ACC.1': 3, 'FDP_IFC.1': 10, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 3, 'FDP_IFF.1': 7, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 5, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 3, 'FDP_ITC.1.3': 1, 'FDP_MSA.1': 1}, 'FMT': {'FMT_MSA': 1, 'FMT_SMF': 1, 'FMT_MSA.3': 10, 'FMT_MSA.1': 5, 'FMT_SMR.1': 4, 'FMT_SMF.1': 7, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 2, 'FMT_SMF.1.1': 2}}, 'cc_claims': {'O': {'O.SWITCH': 9, 'O.CONF': 5, 'O.CONNECT': 8, 'O.INDICATE': 3, 'O.SELECT': 3, 'O.INVOKE': 1, 'O.NOPROG': 5, 'O.ROM': 5}, 'T': {'T.BYPASS': 2, 'T.INSTALL': 2, 'T.LOGICAL': 3, 'T.PHYSICAL': 2, 'T.RESIDUAL': 2, 'T.SPOOF': 2, 'T.STATE': 2, 'T.TRANSFER': 4}, 'A': {'A.SCENARIO': 4, 'A.ACCESS': 2, 'A.MANAGE': 2, 'A.NOEVIL': 2, 'A.PHYSICAL': 2, 'A.EMISSION': 1, 'A.ISOLATE': 1}, 'OE': {'OE.ACCESS': 2, 'OE.MANAGE': 5, 'OE.NOEVIL': 5, 'OE.PHYSICAL': 4, 'OE.SCENARIO': 2, 'OE.EMISSION': 1, 'OE.ISOLATE': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to crp260.pdf.
    • The st_filename property was set to t265_st.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CRP260.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['CRP269']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['CRP269']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp260.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/t265_st.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Secure Analogue and Digital KVM Switches - Black Box models SW2006A-USB-EAL, SW4006A-USB-EAL, SW2008A-USB-EAL, SW4008A-USB-EAL, SW2009A-USB-EAL, SW4009A-USB-EAL was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "4605e0eaf615d2c4",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP260",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP269"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP269"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Black Box Corporation",
  "manufacturer_web": "https://www.blackbox.com/",
  "name": "Secure Analogue and Digital KVM Switches - Black Box models SW2006A-USB-EAL, SW4006A-USB-EAL, SW2008A-USB-EAL, SW4008A-USB-EAL, SW2009A-USB-EAL, SW4009A-USB-EAL",
  "not_valid_after": "2016-01-04",
  "not_valid_before": "2011-01-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "crp260.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CRP260": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 2
        },
        "ATE": {
          "ATE_DPT.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation": 1,
          "analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "User",
      "/Company": "Certification Body, CESG",
      "/CreationDate": "D:20110111164749Z",
      "/Creator": "Acrobat PDFMaker 7.0.5 for Word",
      "/ModDate": "D:20110111164751Z",
      "/Producer": "Acrobat Elements 7.0.5 (Windows)",
      "/Title": "Certification Report",
      "/_AdHocReviewCycleID": "-1320395370",
      "/_AuthorEmail": "[email protected]",
      "/_AuthorEmailDisplayName": "WhittakerAxon, Nigel",
      "/_EmailSubject": "Word -\u003e PDF (3) ",
      "/_PreviousAdHocReviewCycleID": "2047206653",
      "pdf_file_size_bytes": 203099,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "t265_st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 2,
          "A.EMISSION": 1,
          "A.ISOLATE": 1,
          "A.MANAGE": 2,
          "A.NOEVIL": 2,
          "A.PHYSICAL": 2,
          "A.SCENARIO": 4
        },
        "O": {
          "O.CONF": 5,
          "O.CONNECT": 8,
          "O.INDICATE": 3,
          "O.INVOKE": 1,
          "O.NOPROG": 5,
          "O.ROM": 5,
          "O.SELECT": 3,
          "O.SWITCH": 9
        },
        "OE": {
          "OE.ACCESS": 2,
          "OE.EMISSION": 1,
          "OE.ISOLATE": 1,
          "OE.MANAGE": 5,
          "OE.NOEVIL": 5,
          "OE.PHYSICAL": 4,
          "OE.SCENARIO": 2
        },
        "T": {
          "T.BYPASS": 2,
          "T.INSTALL": 2,
          "T.LOGICAL": 3,
          "T.PHYSICAL": 2,
          "T.RESIDUAL": 2,
          "T.SPOOF": 2,
          "T.STATE": 2,
          "T.TRANSFER": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 3,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 4
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.2": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 5,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.3": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 11,
          "EAL4 augmented": 5
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FDP": {
          "FDP_ACC.1": 3,
          "FDP_ETC": 1,
          "FDP_ETC.1": 5,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 3,
          "FDP_IFC.1": 10,
          "FDP_IFC.1.1": 1,
          "FDP_IFF": 1,
          "FDP_IFF.1": 7,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ITC": 1,
          "FDP_ITC.1": 5,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 3,
          "FDP_ITC.1.3": 1,
          "FDP_MSA.1": 1
        },
        "FMT": {
          "FMT_MSA": 1,
          "FMT_MSA.1": 5,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 10,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 2,
          "FMT_SMF": 1,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 2,
          "FMT_SMR.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Ian Mearns",
      "/CreationDate": "D:20101206093805",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20101206093805",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "       ",
      "pdf_file_size_bytes": 580697,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp260.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.2",
      "ATE_DPT.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/t265_st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7c4a67bbabe66ff725f1b75754ba2be37d81f7e7ed9b4d8810f392d675288728",
      "txt_hash": "52d3f38a5893964a4eb9fab8ceac7c131112f427979f864bb83209db08dfa667"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "842c04aa6cdab4a566c602b2ff6f7f69403ec76d7f770ec4c62c1dfeae7387a8",
      "txt_hash": "68ed8a0bffe65cb23ce383a1128dde7d1ba5d2d21d7263bc91a9f35d000aa073"
    }
  },
  "status": "archived"
}