This page was not yet optimized for use on mobile devices.
Protection Profile for Peripheral Sharing Device Version 4.0
Web information
Status: activeCertification date: 2019-07-19
Scheme: 🇺🇸
Category: Other Devices and Systems
Security level: EAL1
Certification report
Extracted keywords
Claims
O.COMPUTER_INTERFACE, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.NO_OTHER_EXTERNAL, O.LEAK_PREVENTION_SWITCHING, O.AUTHORIZED_USAGE, O.PERIPHERAL_PORTS_ISOLATION, O.REJECT_UNAUTHORIZED, O.NO_TOE_ACCESS, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_USE, T.UNAUTHORIZED_DEVICES, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, A.NO_TEMPEST, A.PHYSICAL, A.NO_WIRELESS_DEVICES, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.USER_ALLOWED_ACCESS, OE.NO_TEMPEST, OE.PHYSICAL, OE.NO_WIRELESS_DEVICES, OE.TRUSTED_ADMIN, OE.TRUSTED_CONFIGSecurity Assurance Requirements (SAR)
ADV_FSP, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_CCL, APE_ECD, APE_INT, APE_OBJ, APE_REQ, APE_SPD, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN, FDP_APC_EXT.1, FDP_RIP_EXT.1, FDP_RIP_EXT.2, FDP_PDC_EXT.1, FDP_SWI_EXT.1, FDP_SWI_EXT.2, FDP_APC_EXT, FDP_PDC_EXT, FDP_RIP_EXT, FDP_SWI_EXT, FIA_UAU.2, FIA_UID.2, FIA_UAU, FIA_UID, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF, FMT_SMF, FMT_SMR, FPT_STM.1, FPT_NTA_EXT.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS_EXT.1, FPT_TST_EXT.1, FPT_FLS_EXT, FPT_NTA_EXT, FPT_PHP, FPT_TST, FPT_TST_EXT, FPT_STM, FTA_CIN_EXT.1Evaluation facilities
EWA-CanadaStandards
ISO/IEC 17025File metadata
Creation date | D:20210531101825-04'00' |
---|---|
Modification date | D:20210531101919-05'00' |
Pages | 16 |
Producer | Foxit PhantomPDF Printer Version 10.1.0.3521 |
Profile
Extracted keywords
Claims
O.COMPUTER_INTERFACE_ISOLATION, O.COMPUTER_INTERFACE_ISOLATION_, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.NO_OTHER_EXTERNAL_INTERFACES, O.LEAK_PREVENTION_SWITCHING, O.AUTHORIZED_USAGE, O.PERIPHERAL_PORTS_ISOLATION, O.REJECT_UNAUTHORIZED_PERIPHERAL, O.REJECT_UNAUTHORIZED_ENDPOINTS, O.NO_TOE_ACCESS, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, O.COMPUTER_INTERFACE_ISO, O.NO_OTHER_EXTERNAL_INTE, O.PERIPHERAL_PORTS_ISOLAT, O.LEAK_PREVENTION_SWITCH, O.NO_USER_DATA_RETENTIO, O.REJECT_UNAUTHORIZED_EN, O.REJECT_UNAUTHORIZED_PE, O.SELF_TEST_FAIL_TOE_DISAB, O.SELF_TEST_FAIL_INDICATIO, O.COMPUTER_INTERFACE_ISOL, O.NO_OTHER_EXTERNAL_INTER, O.LEAK_PREVENTION_SWITCHIN, O.PERIPHERAL_PORTS_ISOLATIO, O.REJECT_UNAUTHORIZED_, O.REJECT_UNAUTHORIZED_END, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_USE, T.UNAUTHORIZED_DEVICES, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, A.NO_TEMPEST, A.PHYSICAL, A.NO_WIRELESS_DEVICES, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.USER_ALLOWED_ACCESS, A.NO_PHYSICAL, OE.NO_TEMPEST, OE.PHYSICAL, OE.NO_WIRELESS_DEVICES, OE.TRUSTED_ADMIN, OE.TRUSTED_CONFIGSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, ATE_IND, AVA_VAN.1, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FDP_APC_EXT, FDP_PDC_EXT, FDP_RIP_EXT, FDP_SWI_EXT, FDP_APC_EXT.1, FDP_RIP_EXT.1, FDP_RIP_EXT.2, FDP_PDC_EXT.1, FDP_SWI_EXT.1, FDP_SWI_EXT.2, FDP_APC_EXT.1.1, FDP_APC_EXT.1.2, FDP_APC_EXT.1.3, FDP_APC_EXT.1.4, FDP_PDC_EXT.1.1, FDP_PDC_EXT.1.2, FDP_PDC_EXT.1.3, FDP_PDC_EXT.1.4, FDP_PDC_EXT.1.5, FDP_RIP_EXT.1.1, FDP_SWI_EXT.1.1, FDP_RIP_EXT.2.1, FDP_SWI_EXT.2.1, FDP_SWI_EXT.2.2, FDP_CDS_EXT.1, FDP_CDS_EXT.1.1, FIA_UAU.2, FIA_UID.2, FIA_UAU.2.1, FIA_UID.2.1, FIA_UID.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS_EXT, FPT_NTA_EXT, FPT_TST_EXT, FPT_STM.1, FPT_NTA_EXT.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS_EXT.1, FPT_TST_EXT.1, FPT_FLS_EXT.1.1, FPT_NTA_EXT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TST_EXT.1.1, FPT_STM, FPT_STM.1.1, FPT_PHP.3.1, FTA_CIN_EXT, FTA_CIN_EXT.1, FTA_CIN_EXT.1.1, FTA_CIN_EXT.1.2, FTA_CIN_EXT.1.3Side-channel analysis
physical tampering, malfunctionFile metadata
Title | Microsoft Word - pp_psd_base_v4.0_20190719 |
---|---|
Author | mbdowne |
Creation date | D:20190719092002-04'00' |
Modification date | D:20241114132207+01'00' |
Pages | 56 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
References
- ATEN Secure KVM Switch Series (CAC Models) active
- ATEN Secure KVM Switch Series (Non-CAC Models) active
- Adder AS-4CR Multi-Domain Card Reader Firmware Version 40040-0E7 active
- Adder AVS-4112, AVS-2112, AVS-4114, AVS-4214, AVS-2114, AVS-2214, AVS-4128, AVS-4124, AVS-1124, AVS-4224 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Adder AVS-4228, AVS-42216, XDS441, XDS441FXFirmware Version 44404-E7E7 Peripheral Sharing Devices active
- BAE Systems Secure KVM Gen2 8560943-2 active
- Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices active
- Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5 active
- Belkin F1DN102MOD-BA-4, F1DN202MOD-BA-4, F1DN104MOD-BA-4, F1DN204MOD-BA-4, F1DN108MOD-BA-4, F1DN208MOD-BA-4, F1DN102MOD-HH-4, F1DN102MOD-PP-4, F1DN102MOD-DD-4, F1DN202MOD-HH-4, F1DN202MOD-PP-4, F1DN202MOD-DD-4, F1DN104MOD-HH-4, F1DN104MOD-PP-4, F1DN108MOD-PP-4, F1DN104MOD-DD-4, F1DN204MOD-HH-4, F1DN204MOD-PP-4, F1DN208MOD-PP-4, F1DN204MOD-DD-4, F1DN104MOD-XX-4, F1DN204MOD-XX-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Belkin F1DN104KVM-UN-4, F1DN204KVM-UN-4, F1DN102KVM-UN-4, F1DN202KVM-UN-4, F1DN108KVM-UN-4, F1DN208KVM-UN-4, F1DN116KVM-UN-4 Firmware Version 44444-E7E7 Peripheral Sharing Devices active
- Belkin F1DN104KVM-UNN4, F1DN204KVM-UNN4, F1DN102KVM-UNN4, F1DN202KVM-UNN4 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Black Box Secure KM Switch (CAC Models) active
- Black Box Secure KVM Switch (Non-CAC Models) active
- High Sec Labs FA10A-4 and FA10AO-4 Firmware Version 40000-0E7 Peripheral Sharing Devices active
- High Sec Labs FH10N-4 Firmware Version 40404-0E7 active
- High Sec Labs FI11H-M, FI11D-M, FI11PH-M Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- High Sec Labs SC21H-4, SC82PH-4, SC162PH-4, SMX42D-M, SMX42H-M, SMX42P-M, SMX82D-M,SMX82H-M, SMX82P-M Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- High Sec Labs SK21PH-4, SK41PH-4, DK22PH-4, DK42PH-4, SK81PH-4, DK82PH-4, SX42PH-4, SX82PH-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- High Sec Labs SK41PHU-4, DK42PHU-4, SX42PHU-4, SX82PHU-4, SC42DHU-4, SC42PHU-4 Firmware Version 44444-E7E7 Peripheral Sharing Devices active
- High Sec Labs SM20N-4, SM40N-4, SM80N-4 Firmware Version 40404-0E7 active
- IHSE K487-1PHCA-N, K487-1PHSA-N, K487-1PHCRA-N, K487-1PHSRA-N, K497-1PHCA-N, K497-1PHSA-N, K497-1PHCRA-N, K497-1PHSRA-N Firmware Version 4404-E7E7 Isolator Devices archived
- IOGEAR Secure KVM Switch Series (CAC Models) active
- IOGEAR Secure KVM Switch Series (Non-CAC Models) active
- IPGARD Secure KM Switches (CAC Models) active
- IPGARD Secure KVM Switch (Non-CAC Models) active
- IPGARD Secure KVM Switch/Isolator (CAC Models) active
- IPGARD Secure KVM Switch/Isolator (CAC Models) active
- Raritan Secure KVM Switch Series with CAC active
- SK41D-4TR KVM, Firmware Version 44404-E7E7 active
- Sekuryx Secure KVM Switch (CAC Models) active
- Sekuryx Secure KVM Switch (Non-CAC Models) active
- Tripp Lite Secure KVM Switch (CAC Models) active
- Tripp Lite Secure KVM Switch (Non-CAC Models) active
- Vertiv CYBEXâ„¢ SC820DPH, SC840DPH, SC920DPH, SC940DPH, SC840DPHC, SC940DPHC, SC840DVI, SC940DVI Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Vertiv CYBEXâ„¢ SC845DPH, SC945DPH, SC845DPHC, SC945DPHC, SCM145DPH, SCM185DPH, SC985DPH, SCMV245DPH, SCMV285DPH Firmware Version 44444-E7E7 Peripheral Sharing Devices active
- Vertiv CYBEXâ„¢ SCMDR0001 Multi-Domain Smart Card Reader Firmware Version 40040-0E7 active
- Vertiv CYBEXâ„¢ SCMV2160DPH, SC840DVIE, SC940DVIE, SC840HE, SC940HE, SC840DPE, SC940DPE Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Vertiv CYBEXâ„¢ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEXâ„¢ SCKM140PP4 KM Switch Firmware Version 40404-0E7 active
- Vertiv CYBEXâ„¢ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEXâ„¢ SCKM140PP4 KM Switch Firmware Version 40404-0E7 active
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 406920, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/ModDate': "D:20210531101919-05'00'", '/Producer': 'Foxit PhantomPDF Printer Version 10.1.0.3521', '/Title': '', '/Keywords': '', '/Author': '', '/Creator': '', '/Subject': '', '/CreationDate': "D:20210531101825-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]']}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 801251, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 56, '/Author': 'mbdowne', '/CreationDate': "D:20190719092002-04'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20241114132207+01'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': 'Microsoft Word - pp_psd_base_v4.0_20190719', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'APE': {'APE_CCL': 1, 'APE_ECD': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SPD': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN': 1}, 'FDP': {'FDP_APC_EXT.1': 4, 'FDP_RIP_EXT.1': 1, 'FDP_RIP_EXT.2': 1, 'FDP_PDC_EXT.1': 3, 'FDP_SWI_EXT.1': 2, 'FDP_SWI_EXT.2': 2, 'FDP_APC_EXT': 1, 'FDP_PDC_EXT': 1, 'FDP_RIP_EXT': 2, 'FDP_SWI_EXT': 2}, 'FIA': {'FIA_UAU.2': 1, 'FIA_UID.2': 1, 'FIA_UAU': 1, 'FIA_UID': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1, 'FMT_MOF': 1, 'FMT_SMF': 1, 'FMT_SMR': 1}, 'FPT': {'FPT_STM.1': 1, 'FPT_NTA_EXT.1': 1, 'FPT_PHP.1': 2, 'FPT_PHP.3': 1, 'FPT_TST.1': 1, 'FPT_FLS_EXT.1': 1, 'FPT_TST_EXT.1': 2, 'FPT_FLS_EXT': 1, 'FPT_NTA_EXT': 1, 'FPT_PHP': 2, 'FPT_TST': 1, 'FPT_TST_EXT': 1, 'FPT_STM': 1}, 'FTA': {'FTA_CIN_EXT.1': 2}}, 'cc_claims': {'O': {'O.COMPUTER_INTERFACE': 2, 'O.USER_DATA_ISOLATION': 1, 'O.NO_USER_DATA_RETENTION': 1, 'O.NO_OTHER_EXTERNAL': 1, 'O.LEAK_PREVENTION_SWITCHING': 1, 'O.AUTHORIZED_USAGE': 1, 'O.PERIPHERAL_PORTS_ISOLATION': 1, 'O.REJECT_UNAUTHORIZED': 2, 'O.NO_TOE_ACCESS': 1, 'O.TAMPER_EVIDENT_LABEL': 1, 'O.ANTI_TAMPERING': 1, 'O.SELF_TEST': 1, 'O.SELF_TEST_FAIL_TOE_DISABLE': 1, 'O.SELF_TEST_FAIL_INDICATION': 1}, 'T': {'T.DATA_LEAK': 1, 'T.SIGNAL_LEAK': 1, 'T.RESIDUAL_LEAK': 1, 'T.UNINTENDED_USE': 1, 'T.UNAUTHORIZED_DEVICES': 1, 'T.LOGICAL_TAMPER': 1, 'T.PHYSICAL_TAMPER': 1, 'T.REPLACEMENT': 1, 'T.FAILED': 1}, 'A': {'A.NO_TEMPEST': 1, 'A.PHYSICAL': 1, 'A.NO_WIRELESS_DEVICES': 1, 'A.TRUSTED_ADMIN': 1, 'A.TRUSTED_CONFIG': 1, 'A.USER_ALLOWED_ACCESS': 1}, 'OE': {'OE.NO_TEMPEST': 1, 'OE.PHYSICAL': 1, 'OE.NO_WIRELESS_DEVICES': 1, 'OE.TRUSTED_ADMIN': 1, 'OE.TRUSTED_CONFIG': 1}}, 'vendor': {}, 'eval_facility': {'EWA': {'EWA-Canada': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 3}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.1': 4, 'ALC_CMS.1': 2}, 'ATE': {'ATE_IND.1': 1, 'ATE_IND': 5}, 'AVA': {'AVA_VAN.1': 3, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1}, 'FDP': {'FDP_APC_EXT': 4, 'FDP_PDC_EXT': 4, 'FDP_RIP_EXT': 4, 'FDP_SWI_EXT': 4, 'FDP_APC_EXT.1': 16, 'FDP_RIP_EXT.1': 8, 'FDP_RIP_EXT.2': 8, 'FDP_PDC_EXT.1': 13, 'FDP_SWI_EXT.1': 11, 'FDP_SWI_EXT.2': 11, 'FDP_APC_EXT.1.1': 2, 'FDP_APC_EXT.1.2': 2, 'FDP_APC_EXT.1.3': 2, 'FDP_APC_EXT.1.4': 2, 'FDP_PDC_EXT.1.1': 2, 'FDP_PDC_EXT.1.2': 2, 'FDP_PDC_EXT.1.3': 2, 'FDP_PDC_EXT.1.4': 2, 'FDP_PDC_EXT.1.5': 2, 'FDP_RIP_EXT.1.1': 2, 'FDP_SWI_EXT.1.1': 4, 'FDP_RIP_EXT.2.1': 3, 'FDP_SWI_EXT.2.1': 2, 'FDP_SWI_EXT.2.2': 2, 'FDP_CDS_EXT.1': 1, 'FDP_CDS_EXT.1.1': 1}, 'FIA': {'FIA_UAU.2': 5, 'FIA_UID.2': 5, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MOF.1': 9, 'FMT_SMF.1': 7, 'FMT_SMR.1': 7, 'FMT_MOF.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS_EXT': 4, 'FPT_NTA_EXT': 4, 'FPT_TST_EXT': 4, 'FPT_STM.1': 5, 'FPT_NTA_EXT.1': 7, 'FPT_PHP.1': 6, 'FPT_PHP.3': 8, 'FPT_TST.1': 6, 'FPT_FLS_EXT.1': 8, 'FPT_TST_EXT.1': 11, 'FPT_FLS_EXT.1.1': 3, 'FPT_NTA_EXT.1.1': 2, 'FPT_PHP.1.1': 2, 'FPT_PHP.1.2': 1, 'FPT_TST.1.1': 2, 'FPT_TST.1.2': 3, 'FPT_TST.1.3': 3, 'FPT_TST_EXT.1.1': 2, 'FPT_STM': 1, 'FPT_STM.1.1': 1, 'FPT_PHP.3.1': 1}, 'FTA': {'FTA_CIN_EXT': 4, 'FTA_CIN_EXT.1': 10, 'FTA_CIN_EXT.1.1': 2, 'FTA_CIN_EXT.1.2': 2, 'FTA_CIN_EXT.1.3': 3}}, 'cc_claims': {'O': {'O.COMPUTER_INTERFACE_ISOLATION': 1, 'O.COMPUTER_INTERFACE_ISOLATION_': 1, 'O.USER_DATA_ISOLATION': 3, 'O.NO_USER_DATA_RETENTION': 2, 'O.NO_OTHER_EXTERNAL_INTERFACES': 1, 'O.LEAK_PREVENTION_SWITCHING': 1, 'O.AUTHORIZED_USAGE': 3, 'O.PERIPHERAL_PORTS_ISOLATION': 1, 'O.REJECT_UNAUTHORIZED_PERIPHERAL': 1, 'O.REJECT_UNAUTHORIZED_ENDPOINTS': 1, 'O.NO_TOE_ACCESS': 3, 'O.TAMPER_EVIDENT_LABEL': 4, 'O.ANTI_TAMPERING': 3, 'O.SELF_TEST': 3, 'O.SELF_TEST_FAIL_TOE_DISABLE': 2, 'O.SELF_TEST_FAIL_INDICATION': 2, 'O.COMPUTER_INTERFACE_ISO': 3, 'O.NO_OTHER_EXTERNAL_INTE': 2, 'O.PERIPHERAL_PORTS_ISOLAT': 1, 'O.LEAK_PREVENTION_SWITCH': 1, 'O.NO_USER_DATA_RETENTIO': 1, 'O.REJECT_UNAUTHORIZED_EN': 1, 'O.REJECT_UNAUTHORIZED_PE': 1, 'O.SELF_TEST_FAIL_TOE_DISAB': 1, 'O.SELF_TEST_FAIL_INDICATIO': 1, 'O.COMPUTER_INTERFACE_ISOL': 2, 'O.NO_OTHER_EXTERNAL_INTER': 1, 'O.LEAK_PREVENTION_SWITCHIN': 1, 'O.PERIPHERAL_PORTS_ISOLATIO': 1, 'O.REJECT_UNAUTHORIZED_': 1, 'O.REJECT_UNAUTHORIZED_END': 1}, 'T': {'T.DATA_LEAK': 2, 'T.SIGNAL_LEAK': 2, 'T.RESIDUAL_LEAK': 2, 'T.UNINTENDED_USE': 2, 'T.UNAUTHORIZED_DEVICES': 2, 'T.LOGICAL_TAMPER': 2, 'T.PHYSICAL_TAMPER': 2, 'T.REPLACEMENT': 2, 'T.FAILED': 2}, 'A': {'A.NO_TEMPEST': 2, 'A.PHYSICAL': 1, 'A.NO_WIRELESS_DEVICES': 2, 'A.TRUSTED_ADMIN': 2, 'A.TRUSTED_CONFIG': 2, 'A.USER_ALLOWED_ACCESS': 2, 'A.NO_PHYSICAL': 1}, 'OE': {'OE.NO_TEMPEST': 2, 'OE.PHYSICAL': 3, 'OE.NO_WIRELESS_DEVICES': 2, 'OE.TRUSTED_ADMIN': 2, 'OE.TRUSTED_CONFIG': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 6, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7d2fa62f4c73767707151f82e7cec85bdb21aa51a063c520012680227384f2ab', 'txt_hash': 'f7a561d37c092a12043676dcbb26b57dbb0ce5115ae204280b66bdf950e1b619'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6aa7d369861835d7b10ddeb148e241f60834d07011f8553e493055e518a6a098', 'txt_hash': '69909e422f2013b54078465b5e782562373ea1a29b0362ef6e2a42b49582802d'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile for Peripheral Sharing Device Version 4.0 was processed.
Raw data
{
"_id": "76f8f05a35d87f59",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "76f8f05a35d87f59",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_psd_v4.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_PHYSICAL": 1,
"A.NO_TEMPEST": 2,
"A.NO_WIRELESS_DEVICES": 2,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 2,
"A.TRUSTED_CONFIG": 2,
"A.USER_ALLOWED_ACCESS": 2
},
"O": {
"O.ANTI_TAMPERING": 3,
"O.AUTHORIZED_USAGE": 3,
"O.COMPUTER_INTERFACE_ISO": 3,
"O.COMPUTER_INTERFACE_ISOL": 2,
"O.COMPUTER_INTERFACE_ISOLATION": 1,
"O.COMPUTER_INTERFACE_ISOLATION_": 1,
"O.LEAK_PREVENTION_SWITCH": 1,
"O.LEAK_PREVENTION_SWITCHIN": 1,
"O.LEAK_PREVENTION_SWITCHING": 1,
"O.NO_OTHER_EXTERNAL_INTE": 2,
"O.NO_OTHER_EXTERNAL_INTER": 1,
"O.NO_OTHER_EXTERNAL_INTERFACES": 1,
"O.NO_TOE_ACCESS": 3,
"O.NO_USER_DATA_RETENTIO": 1,
"O.NO_USER_DATA_RETENTION": 2,
"O.PERIPHERAL_PORTS_ISOLAT": 1,
"O.PERIPHERAL_PORTS_ISOLATIO": 1,
"O.PERIPHERAL_PORTS_ISOLATION": 1,
"O.REJECT_UNAUTHORIZED_": 1,
"O.REJECT_UNAUTHORIZED_EN": 1,
"O.REJECT_UNAUTHORIZED_END": 1,
"O.REJECT_UNAUTHORIZED_ENDPOINTS": 1,
"O.REJECT_UNAUTHORIZED_PE": 1,
"O.REJECT_UNAUTHORIZED_PERIPHERAL": 1,
"O.SELF_TEST": 3,
"O.SELF_TEST_FAIL_INDICATIO": 1,
"O.SELF_TEST_FAIL_INDICATION": 2,
"O.SELF_TEST_FAIL_TOE_DISAB": 1,
"O.SELF_TEST_FAIL_TOE_DISABLE": 2,
"O.TAMPER_EVIDENT_LABEL": 4,
"O.USER_DATA_ISOLATION": 3
},
"OE": {
"OE.NO_TEMPEST": 2,
"OE.NO_WIRELESS_DEVICES": 2,
"OE.PHYSICAL": 3,
"OE.TRUSTED_ADMIN": 2,
"OE.TRUSTED_CONFIG": 2
},
"T": {
"T.DATA_LEAK": 2,
"T.FAILED": 2,
"T.LOGICAL_TAMPER": 2,
"T.PHYSICAL_TAMPER": 2,
"T.REPLACEMENT": 2,
"T.RESIDUAL_LEAK": 2,
"T.SIGNAL_LEAK": 2,
"T.UNAUTHORIZED_DEVICES": 2,
"T.UNINTENDED_USE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 3
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.1": 4,
"ALC_CMS.1": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND": 5,
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 3
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1
},
"FDP": {
"FDP_APC_EXT": 4,
"FDP_APC_EXT.1": 16,
"FDP_APC_EXT.1.1": 2,
"FDP_APC_EXT.1.2": 2,
"FDP_APC_EXT.1.3": 2,
"FDP_APC_EXT.1.4": 2,
"FDP_CDS_EXT.1": 1,
"FDP_CDS_EXT.1.1": 1,
"FDP_PDC_EXT": 4,
"FDP_PDC_EXT.1": 13,
"FDP_PDC_EXT.1.1": 2,
"FDP_PDC_EXT.1.2": 2,
"FDP_PDC_EXT.1.3": 2,
"FDP_PDC_EXT.1.4": 2,
"FDP_PDC_EXT.1.5": 2,
"FDP_RIP_EXT": 4,
"FDP_RIP_EXT.1": 8,
"FDP_RIP_EXT.1.1": 2,
"FDP_RIP_EXT.2": 8,
"FDP_RIP_EXT.2.1": 3,
"FDP_SWI_EXT": 4,
"FDP_SWI_EXT.1": 11,
"FDP_SWI_EXT.1.1": 4,
"FDP_SWI_EXT.2": 11,
"FDP_SWI_EXT.2.1": 2,
"FDP_SWI_EXT.2.2": 2
},
"FIA": {
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 1,
"FIA_UID.2": 5,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 9,
"FMT_MOF.1.1": 2,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS_EXT": 4,
"FPT_FLS_EXT.1": 8,
"FPT_FLS_EXT.1.1": 3,
"FPT_NTA_EXT": 4,
"FPT_NTA_EXT.1": 7,
"FPT_NTA_EXT.1.1": 2,
"FPT_PHP.1": 6,
"FPT_PHP.1.1": 2,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 1,
"FPT_STM": 1,
"FPT_STM.1": 5,
"FPT_STM.1.1": 1,
"FPT_TST.1": 6,
"FPT_TST.1.1": 2,
"FPT_TST.1.2": 3,
"FPT_TST.1.3": 3,
"FPT_TST_EXT": 4,
"FPT_TST_EXT.1": 11,
"FPT_TST_EXT.1.1": 2
},
"FTA": {
"FTA_CIN_EXT": 4,
"FTA_CIN_EXT.1": 10,
"FTA_CIN_EXT.1.1": 2,
"FTA_CIN_EXT.1.2": 2,
"FTA_CIN_EXT.1.3": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1,
"physical tampering": 6
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "mbdowne",
"/CreationDate": "D:20190719092002-04\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20241114132207+01\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "Microsoft Word - pp_psd_base_v4.0_20190719",
"pdf_file_size_bytes": 801251,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 56
},
"report_filename": "PP_PSD_v4.0 CR v1.0 (1).pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_TEMPEST": 1,
"A.NO_WIRELESS_DEVICES": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1,
"A.TRUSTED_CONFIG": 1,
"A.USER_ALLOWED_ACCESS": 1
},
"O": {
"O.ANTI_TAMPERING": 1,
"O.AUTHORIZED_USAGE": 1,
"O.COMPUTER_INTERFACE": 2,
"O.LEAK_PREVENTION_SWITCHING": 1,
"O.NO_OTHER_EXTERNAL": 1,
"O.NO_TOE_ACCESS": 1,
"O.NO_USER_DATA_RETENTION": 1,
"O.PERIPHERAL_PORTS_ISOLATION": 1,
"O.REJECT_UNAUTHORIZED": 2,
"O.SELF_TEST": 1,
"O.SELF_TEST_FAIL_INDICATION": 1,
"O.SELF_TEST_FAIL_TOE_DISABLE": 1,
"O.TAMPER_EVIDENT_LABEL": 1,
"O.USER_DATA_ISOLATION": 1
},
"OE": {
"OE.NO_TEMPEST": 1,
"OE.NO_WIRELESS_DEVICES": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1,
"OE.TRUSTED_CONFIG": 1
},
"T": {
"T.DATA_LEAK": 1,
"T.FAILED": 1,
"T.LOGICAL_TAMPER": 1,
"T.PHYSICAL_TAMPER": 1,
"T.REPLACEMENT": 1,
"T.RESIDUAL_LEAK": 1,
"T.SIGNAL_LEAK": 1,
"T.UNAUTHORIZED_DEVICES": 1,
"T.UNINTENDED_USE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"APE": {
"APE_CCL": 1,
"APE_ECD": 1,
"APE_INT": 1,
"APE_OBJ": 1,
"APE_REQ": 1,
"APE_SPD": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 1
},
"FDP": {
"FDP_APC_EXT": 1,
"FDP_APC_EXT.1": 4,
"FDP_PDC_EXT": 1,
"FDP_PDC_EXT.1": 3,
"FDP_RIP_EXT": 2,
"FDP_RIP_EXT.1": 1,
"FDP_RIP_EXT.2": 1,
"FDP_SWI_EXT": 2,
"FDP_SWI_EXT.1": 2,
"FDP_SWI_EXT.2": 2
},
"FIA": {
"FIA_UAU": 1,
"FIA_UAU.2": 1,
"FIA_UID": 1,
"FIA_UID.2": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS_EXT": 1,
"FPT_FLS_EXT.1": 1,
"FPT_NTA_EXT": 1,
"FPT_NTA_EXT.1": 1,
"FPT_PHP": 2,
"FPT_PHP.1": 2,
"FPT_PHP.3": 1,
"FPT_STM": 1,
"FPT_STM.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 1,
"FPT_TST_EXT": 1,
"FPT_TST_EXT.1": 2
},
"FTA": {
"FTA_CIN_EXT.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA-Canada": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "D:20210531101825-04\u002700\u0027",
"/Creator": "",
"/Keywords": "",
"/ModDate": "D:20210531101919-05\u002700\u0027",
"/Producer": "Foxit PhantomPDF Printer Version 10.1.0.3521",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 406920,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7d2fa62f4c73767707151f82e7cec85bdb21aa51a063c520012680227384f2ab",
"txt_hash": "f7a561d37c092a12043676dcbb26b57dbb0ce5115ae204280b66bdf950e1b619"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6aa7d369861835d7b10ddeb148e241f60834d07011f8553e493055e518a6a098",
"txt_hash": "69909e422f2013b54078465b5e782562373ea1a29b0362ef6e2a42b49582802d"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Other Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile for Peripheral Sharing Device Version 4.0",
"not_valid_after": null,
"not_valid_before": "2019-07-19",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_PSD_v4.0 CR v1.0 (1).pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "active",
"version": "4.0"
}
}