This page was not yet optimized for use on mobile
devices.
RSA BSAFE® Crypto-C Micro Edition
Certificate #4305
Webpage information
Security policy
Symmetric Algorithms
AES, AES-128, AES-192, AES-256, RC2, RC4, RC5, DES, Triple-DES, Camellia, ARIA, SEED, HMACAsymmetric Algorithms
RSA-OAEP, RSA-CRT, ECDH, ECDSA, ECIES, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHA-3, SHA-3-224, SHA-3-256, SHA-3-384, SHA-3-512, MD4, MD5, PBKDF2, PBKDF1Schemes
MAC, Key AgreementProtocols
SSH, SSL, TLS, TLS 1.0, TLS 1.2, TLS v1.2, TLS 1.1, IKERandomness
PRNG, DRBG, RNGElliptic Curves
P-224, P-256, P-384, P-521, P-192, B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, B-163, K-163Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSVendor
Qualcomm, MicrosoftSecurity level
Level 1, Level 3Side-channel analysis
side-channel, Side-channel, timing attacks, timing attack, Oracle AttackStandards
FIPS 140-2, FIPS PUB 140-2, FIPS 186-4, FIPS 186-2, FIPS 198-1, FIPS 202, FIPS 180-4, FIPS140-2, SP 800-56A, SP 800-56B, SP 800-90A, SP 800-56C, SP 800-108, SP 800-132, SP 800-135, SP 800-133, SP 800-38F, SP 800-38D, SP 800-38A, SP 800-63B, SP 800-57, SP 800-52, SP 800-131A, SP 800-67, SP 800-89, NIST SP 800-56A, NIST SP 800-56B, SP 800-38C, SP 800-38E, PKCS #1, PKCS#1, RFC 2246, RFC 5288, RFC 4086, RFC 5246, RFC 2988, RFC 2313, RFC 2998, RFC 4346, RFC 5488File metadata
| Title | RSA BSAFE Crypto-C Micro Edition 4.1.5 Security Policy Level 1 |
|---|---|
| Keywords | RSA BSAFE Crypto-C Micro Edition, BSAFE, fips, security policy, level 1 |
| Author | Dell Technologies |
| Creation date | D:20240314141236Z |
| Modification date | D:20240315113929+11'00' |
| Pages | 57 |
| Creator | FrameMaker 17.0.3 |
| Producer | Adobe PDF Library 17.0 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4305,
"dgst": "4a147f223b0bb73b",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"ECDSA#C2130",
"CVL#C2130",
"RSA#C2130",
"HMAC#C2130",
"SHA-3#C2130",
"AES#C2130",
"KBKDF#C2130",
"DRBG#C2130",
"SHS#C2130",
"DSA#C2130"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 24
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 10
},
"ECIES": {
"ECIES": 2
}
},
"FF": {
"DH": {
"DH": 16,
"Diffie-Hellman": 8
},
"DSA": {
"DSA": 21
}
},
"RSA": {
"RSA-CRT": 2,
"RSA-OAEP": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CCM": {
"CCM": 3
},
"CFB": {
"CFB": 4
},
"CTR": {
"CTR": 16
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 8
},
"OFB": {
"OFB": 3
},
"XTS": {
"XTS": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"SSH": {
"SSH": 5
},
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 16,
"TLS 1.0": 5,
"TLS 1.1": 1,
"TLS 1.2": 2,
"TLS v1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 8
},
"MAC": {
"MAC": 11
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-163": 1,
"B-233": 4,
"B-283": 4,
"B-409": 4,
"B-571": 4,
"K-163": 1,
"K-233": 4,
"K-283": 4,
"K-409": 4,
"K-571": 4,
"P-192": 2,
"P-224": 10,
"P-256": 10,
"P-384": 10,
"P-521": 10
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 6
}
},
"fips_certlike": {
"Certlike": {
"AES 3": 1,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1,
"Certificate 24 RSA": 1,
"Certificate RSA": 2,
"DES40": 1,
"HMAC SHA-1": 1,
"HMAC SHA-224": 1,
"PAA 1": 3,
"PAA 2": 10,
"PAA 3": 1,
"PAA 4": 2,
"PKCS #1": 11,
"PKCS#1": 1,
"RSA PKCS #1": 1,
"RSA PKCS#1": 1,
"SHA 2": 1,
"SHA 4": 1,
"SHA 6": 1,
"SHA-1": 14,
"SHA-2": 3,
"SHA-224": 10,
"SHA-256": 12,
"SHA-3": 2,
"SHA-3-224": 1,
"SHA-3-256": 1,
"SHA-3-384": 1,
"SHA-3-512": 1,
"SHA-384": 12,
"SHA-512": 12,
"SHA1": 1,
"SHA3-224": 6,
"SHA3-256": 6,
"SHA3-384": 6,
"SHA3-512": 6
}
},
"fips_security_level": {
"Level": {
"Level 1": 60,
"Level 3": 1
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 3
},
"MD5": {
"MD5": 6
}
},
"PBKDF": {
"PBKDF1": 3,
"PBKDF2": 12
},
"SHA": {
"SHA1": {
"SHA-1": 14,
"SHA1": 1
},
"SHA2": {
"SHA-2": 3,
"SHA-224": 10,
"SHA-256": 12,
"SHA-384": 12,
"SHA-512": 12
},
"SHA3": {
"SHA-3": 2,
"SHA-3-224": 1,
"SHA-3-256": 1,
"SHA-3-384": 1,
"SHA-3-512": 1,
"SHA3-224": 6,
"SHA3-256": 6,
"SHA3-384": 6,
"SHA3-512": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 43,
"PRNG": 6
},
"RNG": {
"RNG": 5
}
},
"side_channel_analysis": {
"SCA": {
"Side-channel": 1,
"side-channel": 1,
"timing attack": 1,
"timing attacks": 3
},
"other": {
"Oracle Attack": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 41,
"FIPS 180-4": 3,
"FIPS 186-2": 4,
"FIPS 186-4": 22,
"FIPS 198-1": 4,
"FIPS 202": 4,
"FIPS PUB 140-2": 2,
"FIPS140-2": 1
},
"NIST": {
"NIST SP 800-56A": 3,
"NIST SP 800-56B": 1,
"SP 800-108": 2,
"SP 800-131A": 2,
"SP 800-132": 8,
"SP 800-133": 2,
"SP 800-135": 8,
"SP 800-38A": 2,
"SP 800-38C": 1,
"SP 800-38D": 3,
"SP 800-38E": 1,
"SP 800-38F": 2,
"SP 800-52": 1,
"SP 800-56A": 14,
"SP 800-56B": 11,
"SP 800-56C": 4,
"SP 800-57": 2,
"SP 800-63B": 1,
"SP 800-67": 2,
"SP 800-89": 5,
"SP 800-90A": 5
},
"PKCS": {
"PKCS #1": 6,
"PKCS#1": 1
},
"RFC": {
"RFC 2246": 3,
"RFC 2313": 1,
"RFC 2988": 3,
"RFC 2998": 1,
"RFC 4086": 2,
"RFC 4346": 1,
"RFC 5246": 2,
"RFC 5288": 2,
"RFC 5488": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 21,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1
},
"RC": {
"RC2": 2,
"RC4": 2,
"RC5": 3
}
},
"DES": {
"3DES": {
"Triple-DES": 13
},
"DES": {
"DES": 8
}
},
"constructions": {
"MAC": {
"HMAC": 31
}
},
"miscellaneous": {
"ARIA": {
"ARIA": 1
},
"Camellia": {
"Camellia": 2
},
"SEED": {
"SEED": 3
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
},
"Qualcomm": {
"Qualcomm": 1
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Dell Technologies",
"/CreationDate": "D:20240314141236Z",
"/Creator": "FrameMaker 17.0.3",
"/Keywords": "RSA BSAFE Crypto-C Micro Edition, BSAFE, fips, security policy, level 1",
"/ModDate": "D:20240315113929+11\u002700\u0027",
"/Producer": "Adobe PDF Library 17.0",
"/Title": "RSA BSAFE Crypto-C Micro Edition 4.1.5 Security Policy Level 1 ",
"/Trapped": "/False",
"pdf_file_size_bytes": 474258,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf",
"https://www.dell.com/support",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-108.pdf",
"https://tools.ietf.org/html/rfc5246",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf",
"https://tools.ietf.org/html/rfc2898",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf",
"http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf",
"https://csrc.nist.gov/publications/detail/fips/140/2/final",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf",
"https://tools.ietf.org/html/rfc4346",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
"https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-38f.pdf",
"https://tools.ietf.org/html/rfc2313",
"https://tools.ietf.org/html/rfc5288",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf",
"https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-38e.pdf",
"https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.198-1.pdf",
"https://eprint.iacr.org/2011/388",
"https://www.ietf.org/rfc/rfc4086.txt",
"https://tools.ietf.org/html/rfc2246",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
"https://www.ipa.go.jp/security/english/jcmvp.html",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr1.pdf",
"http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf",
"https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-131ar2.pdf",
"https://csrc.nist.gov/csrc/media/projects/cryptographic-module-validation-program/documents/fips140-2/fips1402ig.pdf",
"https://csrc.nist.gov/publications/nistpubs/800-89/SP-800-89_November2006.pdf",
"https://csrc.nist.gov/publications/detail/sp/800-132/final"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 57
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "c0d154bbee436260790ec58376427d01c54541d718ba5baea7e5e63ce44d7072",
"policy_txt_hash": "282803b08bbeb14269c9ce3048a6196e1746a6884b597fd33f70b12f28af38ab"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. When entropy is externally loaded, no assurance of the minimum strength of generated keys",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2022_031022_0652_signed.pdf",
"date_sunset": "2026-09-21",
"description": "BSAFE Crypto-C Micro Edition is a software module providing a comprehensive set of cryptographic algorithms, including asymmetric key algorithms, symmetric key algorithms, message digests, message authentication, and deterministic random bit generator (DRBG) support. Developers can use the full set of algorithms through a single Application Programming Interface (API) or select a specific set of algorithms to reduce code size or meet performance requirements.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Cryptographic Module Specification: Level 3",
"Physical Security: N/A",
"Design Assurance: Level 3"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "RSA BSAFE\u00ae Crypto-C Micro Edition",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "active",
"sw_versions": "4.1.5",
"tested_conf": [
"Apple iOS 12 ARMv8 (64-bit) running on an iPhone 8 with an Apple A11 with PAA",
"Apple iOS 12 ARMv8 (64-bit) running on an iPhone 8 with an Apple A11 without PAA",
"Apple macOS 10.15 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Mac Pro with an Intel Xeon E5-1650 v2 with PAA",
"Apple macOS 10.15 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Mac Pro with an Intel Xeon E5-1650 v2 without PAA",
"Canonical Ubuntu 16.04 ARMv7 (32-bit) running on a BeagleBoard BeagleBone Black with a Texas Instruments Sitara AM335x",
"FreeBSD 11.3 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA",
"FreeBSD 11.3 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA",
"Google Android 10 ARMv7 (32-bit) running on a Pixel 3 with Qualcomm Snapdragon 845",
"Google Android 10 ARMv8 (64-bit) running on a Pixel 3 with Qualcomm Snapdragon 845 with PAA",
"Google Android 10 ARMv8 (64-bit) running on a Pixel 3 with Qualcomm Snapdragon 845 without PAA (single-user mode)",
"IBM AIX 7.2 PowerPC (32-bit) on PowerVM Virtual I/O Server 2.2.6.41 running on an IBM Power 8284-22A with an IBM POWER8",
"IBM AIX 7.2 PowerPC (64-bit) on PowerVM Virtual I/O Server 2.2.6.41 running on an IBM Power 8284-22A with an IBM POWER8",
"Microsoft Windows 10 Enterprise x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA",
"Microsoft Windows 10 Enterprise x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA",
"Microsoft Windows 10 Enterprise x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA (VS2013)",
"Microsoft Windows 10 Enterprise x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA (VS2017)",
"Microsoft Windows 10 Enterprise x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA (VS2013)",
"Microsoft Windows 10 Enterprise x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA (VS2017)",
"Microsoft Windows Server 2016 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA",
"Microsoft Windows Server 2016 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA",
"Microsoft Windows Server 2019 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA",
"Microsoft Windows Server 2019 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA",
"Microsoft Windows Server 2019 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R7425 with AMD EPYC 7451 with PAA",
"Microsoft Windows Server 2019 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R7425 with AMD EPYC 7451 without PAA",
"Oracle Solaris 11.4 SPARC v8+ (32-bit) on Oracle VM Server 11 running on a Oracle SPARC T4-2 with a SPARC T4-2 with PAA",
"Oracle Solaris 11.4 SPARC v8+ (32-bit) on Oracle VM Server 11 running on a Oracle SPARC T4-2 with a SPARC T4-2 without PAA",
"Oracle Solaris 11.4 SPARC v9 (64-bit) on Oracle VM Server 11 running on a Oracle SPARC T4-2 with a SPARC T4-2 with PAA",
"Oracle Solaris 11.4 SPARC v9 (64-bit) on Oracle VM Server 11 running on a Oracle SPARC T4-2 with a SPARC T4-2 without PAA",
"Oracle Solaris 11.4 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA",
"Oracle Solaris 11.4 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA",
"Red Hat Enterprise Linux 7.8 PowerPC (64-bit) on PowerVM Virtual I/O Server 2.2.6.41 running on an IBM Power 8284-22A with an IBM POWER8",
"SUSE Linux Enterprise Server 11 SP4 PowerPC (64-bit) on PowerVM Virtual I/O Server 2.2.6.41 running on an IBM Power 8284-22A with an IBM POWER8",
"SUSE Linux Enterprise Server 12 SP5 ARMv8 (64-bit) running on a SoftIron Overdrive 1000 with an AMD Opteron A1100 with PAA",
"SUSE Linux Enterprise Server 12 SP5 ARMv8 (64-bit) running on a SoftIron Overdrive 1000 with an AMD Opteron A1100 without PAA",
"SUSE Linux Enterprise Server 12 SP5 PowerPC (64-bit) on PowerVM Virtual I/O Server 2.2.6.41 running on an IBM Power 8284-22A with an IBM POWER8",
"SUSE Linux Enterprise Server 12 SP5 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA",
"SUSE Linux Enterprise Server 12 SP5 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA",
"SUSE Linux Enterprise Server 12 SP5 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA",
"SUSE Linux Enterprise Server 12 SP5 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2022-09-19",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2022-10-24",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2023-04-12",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-03-28",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Update"
}
],
"vendor": "Dell Australia Pty Limited, BSAFE Product Team",
"vendor_url": "http://www.dell.com"
}
}