This page was not yet optimized for use on mobile devices.
Protection Profile for Peripheral Sharing Device Version 4.0
Web information ?
Status: activeCertification date: 2019-07-19
Scheme: 🇺🇸
Category: Other Devices and Systems
Security level: EAL1
Certification report ?
Extracted keywords
Claims
O.COMPUTER_INTERFACE, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.NO_OTHER_EXTERNAL, O.LEAK_PREVENTION_SWITCHING, O.AUTHORIZED_USAGE, O.PERIPHERAL_PORTS_ISOLATION, O.REJECT_UNAUTHORIZED, O.NO_TOE_ACCESS, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_USE, T.UNAUTHORIZED_DEVICES, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, A.NO_TEMPEST, A.PHYSICAL, A.NO_WIRELESS_DEVICES, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.USER_ALLOWED_ACCESS, OE.NO_TEMPEST, OE.PHYSICAL, OE.NO_WIRELESS_DEVICES, OE.TRUSTED_ADMIN, OE.TRUSTED_CONFIGSecurity Assurance Requirements (SAR)
ADV_FSP, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_CCL, APE_ECD, APE_INT, APE_OBJ, APE_REQ, APE_SPD, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN, FDP_APC_EXT.1, FDP_RIP_EXT.1, FDP_RIP_EXT.2, FDP_PDC_EXT.1, FDP_SWI_EXT.1, FDP_SWI_EXT.2, FDP_APC_EXT, FDP_PDC_EXT, FDP_RIP_EXT, FDP_SWI_EXT, FIA_UAU.2, FIA_UID.2, FIA_UAU, FIA_UID, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF, FMT_SMF, FMT_SMR, FPT_STM.1, FPT_NTA_EXT.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS_EXT.1, FPT_TST_EXT.1, FPT_FLS_EXT, FPT_NTA_EXT, FPT_PHP, FPT_TST, FPT_TST_EXT, FPT_STM, FTA_CIN_EXT.1Evaluation facilities
EWA-CanadaStandards
ISO/IEC 17025File metadata
Creation date | D:20210531101825-04'00' |
---|---|
Modification date | D:20210531101919-05'00' |
Pages | 16 |
Producer | Foxit PhantomPDF Printer Version 10.1.0.3521 |
Profile ?
Extracted keywords
Claims
O.COMPUTER_INTERFACE_ISOLATION, O.COMPUTER_INTERFACE_ISOLATION_, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.NO_OTHER_EXTERNAL_INTERFACES, O.LEAK_PREVENTION_SWITCHING, O.AUTHORIZED_USAGE, O.PERIPHERAL_PORTS_ISOLATION, O.REJECT_UNAUTHORIZED_PERIPHERAL, O.REJECT_UNAUTHORIZED_ENDPOINTS, O.NO_TOE_ACCESS, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, O.COMPUTER_INTERFACE_ISO, O.NO_OTHER_EXTERNAL_INTE, O.PERIPHERAL_PORTS_ISOLAT, O.LEAK_PREVENTION_SWITCH, O.NO_USER_DATA_RETENTIO, O.REJECT_UNAUTHORIZED_EN, O.REJECT_UNAUTHORIZED_PE, O.SELF_TEST_FAIL_TOE_DISAB, O.SELF_TEST_FAIL_INDICATIO, O.COMPUTER_INTERFACE_ISOL, O.NO_OTHER_EXTERNAL_INTER, O.LEAK_PREVENTION_SWITCHIN, O.PERIPHERAL_PORTS_ISOLATIO, O.REJECT_UNAUTHORIZED_, O.REJECT_UNAUTHORIZED_END, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_USE, T.UNAUTHORIZED_DEVICES, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, A.NO_TEMPEST, A.PHYSICAL, A.NO_WIRELESS_DEVICES, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.USER_ALLOWED_ACCESS, A.NO_PHYSICAL, OE.NO_TEMPEST, OE.PHYSICAL, OE.NO_WIRELESS_DEVICES, OE.TRUSTED_ADMIN, OE.TRUSTED_CONFIGSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, ATE_IND, AVA_VAN.1, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FDP_APC_EXT, FDP_PDC_EXT, FDP_RIP_EXT, FDP_SWI_EXT, FDP_APC_EXT.1, FDP_RIP_EXT.1, FDP_RIP_EXT.2, FDP_PDC_EXT.1, FDP_SWI_EXT.1, FDP_SWI_EXT.2, FDP_APC_EXT.1.1, FDP_APC_EXT.1.2, FDP_APC_EXT.1.3, FDP_APC_EXT.1.4, FDP_PDC_EXT.1.1, FDP_PDC_EXT.1.2, FDP_PDC_EXT.1.3, FDP_PDC_EXT.1.4, FDP_PDC_EXT.1.5, FDP_RIP_EXT.1.1, FDP_SWI_EXT.1.1, FDP_RIP_EXT.2.1, FDP_SWI_EXT.2.1, FDP_SWI_EXT.2.2, FDP_CDS_EXT.1, FDP_CDS_EXT.1.1, FIA_UAU.2, FIA_UID.2, FIA_UAU.2.1, FIA_UID.2.1, FIA_UID.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS_EXT, FPT_NTA_EXT, FPT_TST_EXT, FPT_STM.1, FPT_NTA_EXT.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS_EXT.1, FPT_TST_EXT.1, FPT_FLS_EXT.1.1, FPT_NTA_EXT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TST_EXT.1.1, FPT_STM, FPT_STM.1.1, FPT_PHP.3.1, FTA_CIN_EXT, FTA_CIN_EXT.1, FTA_CIN_EXT.1.1, FTA_CIN_EXT.1.2, FTA_CIN_EXT.1.3Side-channel analysis
physical tampering, malfunctionFile metadata
Title | Microsoft Word - pp_psd_base_v4.0_20190719 |
---|---|
Author | mbdowne |
Creation date | D:20190719092002-04'00' |
Modification date | D:20241114132207+01'00' |
Pages | 56 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
References ?
- ATEN Secure KVM Switch Series (CAC Models) active
- ATEN Secure KVM Switch Series (Non-CAC Models) active
- Adder AS-4CR Multi-Domain Card Reader Firmware Version 40040-0E7 active
- Adder AVS-4112, AVS-2112, AVS-4114, AVS-4214, AVS-2114, AVS-2214, AVS-4128, AVS-4124, AVS-1124, AVS-4224 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Adder AVS-4228, AVS-42216, XDS441, XDS441FXFirmware Version 44404-E7E7 Peripheral Sharing Devices active
- BAE Systems Secure KVM Gen2 8560943-2 active
- Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices active
- Belkin F1DN102MOD-BA-4, F1DN202MOD-BA-4, F1DN104MOD-BA-4, F1DN204MOD-BA-4, F1DN108MOD-BA-4, F1DN208MOD-BA-4, F1DN102MOD-HH-4, F1DN102MOD-PP-4, F1DN102MOD-DD-4, F1DN202MOD-HH-4, F1DN202MOD-PP-4, F1DN202MOD-DD-4, F1DN104MOD-HH-4, F1DN104MOD-PP-4, F1DN108MOD-PP-4, F1DN104MOD-DD-4, F1DN204MOD-HH-4, F1DN204MOD-PP-4, F1DN208MOD-PP-4, F1DN204MOD-DD-4, F1DN104MOD-XX-4, F1DN204MOD-XX-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Belkin F1DN104KVM-UN-4, F1DN204KVM-UN-4, F1DN102KVM-UN-4, F1DN202KVM-UN-4, F1DN108KVM-UN-4, F1DN208KVM-UN-4, F1DN116KVM-UN-4 Firmware Version 44444-E7E7 Peripheral Sharing Devices active
- Belkin F1DN104KVM-UNN4, F1DN204KVM-UNN4, F1DN102KVM-UNN4, F1DN202KVM-UNN4 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Black Box Secure KM Switch (CAC Models) active
- Black Box Secure KVM Switch (Non-CAC Models) active
- High Sec Labs FA10A-4 and FA10AO-4 Firmware Version 40000-0E7 Peripheral Sharing Devices active
- High Sec Labs FI11H-M, FI11D-M, FI11PH-M Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- High Sec Labs SC21H-4, SC82PH-4, SC162PH-4, SMX42D-M, SMX42H-M, SMX42P-M, SMX82D-M,SMX82H-M, SMX82P-M Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- High Sec Labs SK21PH-4, SK41PH-4, DK22PH-4, DK42PH-4, SK81PH-4, DK82PH-4, SX42PH-4, SX82PH-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- High Sec Labs SK41PHU-4, DK42PHU-4, SX42PHU-4, SX82PHU-4, SC42DHU-4, SC42PHU-4 Firmware Version 44444-E7E7 Peripheral Sharing Devices active
- IHSE K487-1PHCA-N, K487-1PHSA-N, K487-1PHCRA-N, K487-1PHSRA-N, K497-1PHCA-N, K497-1PHSA-N, K497-1PHCRA-N, K497-1PHSRA-N Firmware Version 4404-E7E7 Isolator Devices archived
- IOGEAR Secure KVM Switch Series (CAC Models) active
- IOGEAR Secure KVM Switch Series (Non-CAC Models) active
- IPGARD Secure KM Switches (CAC Models) active
- IPGARD Secure KVM Switch (Non-CAC Models) active
- IPGARD Secure KVM Switch/Isolator (CAC Models) active
- Raritan Secure KVM Switch Series with CAC active
- SK41D-4TR KVM, Firmware Version 44404-E7E7 active
- Sekuryx Secure KVM Switch (CAC Models) active
- Sekuryx Secure KVM Switch (Non-CAC Models) active
- Tripp Lite Secure KVM Switch (CAC Models) active
- Tripp Lite Secure KVM Switch (Non-CAC Models) active
- Vertiv CYBEXâ„¢ SC820DPH, SC840DPH, SC920DPH, SC940DPH, SC840DPHC, SC940DPHC, SC840DVI, SC940DVI Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Vertiv CYBEXâ„¢ SC845DPH, SC945DPH, SC845DPHC, SC945DPHC, SCM145DPH, SCM185DPH, SC985DPH, SCMV245DPH, SCMV285DPH Firmware Version 44444-E7E7 Peripheral Sharing Devices active
- Vertiv CYBEXâ„¢ SCMDR0001 Multi-Domain Smart Card Reader Firmware Version 40040-0E7 active
- Vertiv CYBEXâ„¢ SCMV2160DPH, SC840DVIE, SC940DVIE, SC840HE, SC940HE, SC840DPE, SC940DPE Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Vertiv CYBEXâ„¢ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEXâ„¢ SCKM140PP4 KM Switch Firmware Version 40404-0E7 active
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile for Peripheral Sharing Device Version 4.0 was processed.
Raw data
{
"_id": "76f8f05a35d87f59",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "76f8f05a35d87f59",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_psd_v4.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_PHYSICAL": 1,
"A.NO_TEMPEST": 2,
"A.NO_WIRELESS_DEVICES": 2,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 2,
"A.TRUSTED_CONFIG": 2,
"A.USER_ALLOWED_ACCESS": 2
},
"O": {
"O.ANTI_TAMPERING": 3,
"O.AUTHORIZED_USAGE": 3,
"O.COMPUTER_INTERFACE_ISO": 3,
"O.COMPUTER_INTERFACE_ISOL": 2,
"O.COMPUTER_INTERFACE_ISOLATION": 1,
"O.COMPUTER_INTERFACE_ISOLATION_": 1,
"O.LEAK_PREVENTION_SWITCH": 1,
"O.LEAK_PREVENTION_SWITCHIN": 1,
"O.LEAK_PREVENTION_SWITCHING": 1,
"O.NO_OTHER_EXTERNAL_INTE": 2,
"O.NO_OTHER_EXTERNAL_INTER": 1,
"O.NO_OTHER_EXTERNAL_INTERFACES": 1,
"O.NO_TOE_ACCESS": 3,
"O.NO_USER_DATA_RETENTIO": 1,
"O.NO_USER_DATA_RETENTION": 2,
"O.PERIPHERAL_PORTS_ISOLAT": 1,
"O.PERIPHERAL_PORTS_ISOLATIO": 1,
"O.PERIPHERAL_PORTS_ISOLATION": 1,
"O.REJECT_UNAUTHORIZED_": 1,
"O.REJECT_UNAUTHORIZED_EN": 1,
"O.REJECT_UNAUTHORIZED_END": 1,
"O.REJECT_UNAUTHORIZED_ENDPOINTS": 1,
"O.REJECT_UNAUTHORIZED_PE": 1,
"O.REJECT_UNAUTHORIZED_PERIPHERAL": 1,
"O.SELF_TEST": 3,
"O.SELF_TEST_FAIL_INDICATIO": 1,
"O.SELF_TEST_FAIL_INDICATION": 2,
"O.SELF_TEST_FAIL_TOE_DISAB": 1,
"O.SELF_TEST_FAIL_TOE_DISABLE": 2,
"O.TAMPER_EVIDENT_LABEL": 4,
"O.USER_DATA_ISOLATION": 3
},
"OE": {
"OE.NO_TEMPEST": 2,
"OE.NO_WIRELESS_DEVICES": 2,
"OE.PHYSICAL": 3,
"OE.TRUSTED_ADMIN": 2,
"OE.TRUSTED_CONFIG": 2
},
"T": {
"T.DATA_LEAK": 2,
"T.FAILED": 2,
"T.LOGICAL_TAMPER": 2,
"T.PHYSICAL_TAMPER": 2,
"T.REPLACEMENT": 2,
"T.RESIDUAL_LEAK": 2,
"T.SIGNAL_LEAK": 2,
"T.UNAUTHORIZED_DEVICES": 2,
"T.UNINTENDED_USE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 3
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.1": 4,
"ALC_CMS.1": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND": 5,
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 3
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1
},
"FDP": {
"FDP_APC_EXT": 4,
"FDP_APC_EXT.1": 16,
"FDP_APC_EXT.1.1": 2,
"FDP_APC_EXT.1.2": 2,
"FDP_APC_EXT.1.3": 2,
"FDP_APC_EXT.1.4": 2,
"FDP_CDS_EXT.1": 1,
"FDP_CDS_EXT.1.1": 1,
"FDP_PDC_EXT": 4,
"FDP_PDC_EXT.1": 13,
"FDP_PDC_EXT.1.1": 2,
"FDP_PDC_EXT.1.2": 2,
"FDP_PDC_EXT.1.3": 2,
"FDP_PDC_EXT.1.4": 2,
"FDP_PDC_EXT.1.5": 2,
"FDP_RIP_EXT": 4,
"FDP_RIP_EXT.1": 8,
"FDP_RIP_EXT.1.1": 2,
"FDP_RIP_EXT.2": 8,
"FDP_RIP_EXT.2.1": 3,
"FDP_SWI_EXT": 4,
"FDP_SWI_EXT.1": 11,
"FDP_SWI_EXT.1.1": 4,
"FDP_SWI_EXT.2": 11,
"FDP_SWI_EXT.2.1": 2,
"FDP_SWI_EXT.2.2": 2
},
"FIA": {
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 1,
"FIA_UID.2": 5,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 9,
"FMT_MOF.1.1": 2,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS_EXT": 4,
"FPT_FLS_EXT.1": 8,
"FPT_FLS_EXT.1.1": 3,
"FPT_NTA_EXT": 4,
"FPT_NTA_EXT.1": 7,
"FPT_NTA_EXT.1.1": 2,
"FPT_PHP.1": 6,
"FPT_PHP.1.1": 2,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 1,
"FPT_STM": 1,
"FPT_STM.1": 5,
"FPT_STM.1.1": 1,
"FPT_TST.1": 6,
"FPT_TST.1.1": 2,
"FPT_TST.1.2": 3,
"FPT_TST.1.3": 3,
"FPT_TST_EXT": 4,
"FPT_TST_EXT.1": 11,
"FPT_TST_EXT.1.1": 2
},
"FTA": {
"FTA_CIN_EXT": 4,
"FTA_CIN_EXT.1": 10,
"FTA_CIN_EXT.1.1": 2,
"FTA_CIN_EXT.1.2": 2,
"FTA_CIN_EXT.1.3": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1,
"physical tampering": 6
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "mbdowne",
"/CreationDate": "D:20190719092002-04\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20241114132207+01\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "Microsoft Word - pp_psd_base_v4.0_20190719",
"pdf_file_size_bytes": 801251,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 56
},
"report_filename": "PP_PSD_v4.0 CR v1.0 (1).pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_TEMPEST": 1,
"A.NO_WIRELESS_DEVICES": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1,
"A.TRUSTED_CONFIG": 1,
"A.USER_ALLOWED_ACCESS": 1
},
"O": {
"O.ANTI_TAMPERING": 1,
"O.AUTHORIZED_USAGE": 1,
"O.COMPUTER_INTERFACE": 2,
"O.LEAK_PREVENTION_SWITCHING": 1,
"O.NO_OTHER_EXTERNAL": 1,
"O.NO_TOE_ACCESS": 1,
"O.NO_USER_DATA_RETENTION": 1,
"O.PERIPHERAL_PORTS_ISOLATION": 1,
"O.REJECT_UNAUTHORIZED": 2,
"O.SELF_TEST": 1,
"O.SELF_TEST_FAIL_INDICATION": 1,
"O.SELF_TEST_FAIL_TOE_DISABLE": 1,
"O.TAMPER_EVIDENT_LABEL": 1,
"O.USER_DATA_ISOLATION": 1
},
"OE": {
"OE.NO_TEMPEST": 1,
"OE.NO_WIRELESS_DEVICES": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1,
"OE.TRUSTED_CONFIG": 1
},
"T": {
"T.DATA_LEAK": 1,
"T.FAILED": 1,
"T.LOGICAL_TAMPER": 1,
"T.PHYSICAL_TAMPER": 1,
"T.REPLACEMENT": 1,
"T.RESIDUAL_LEAK": 1,
"T.SIGNAL_LEAK": 1,
"T.UNAUTHORIZED_DEVICES": 1,
"T.UNINTENDED_USE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"APE": {
"APE_CCL": 1,
"APE_ECD": 1,
"APE_INT": 1,
"APE_OBJ": 1,
"APE_REQ": 1,
"APE_SPD": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 1
},
"FDP": {
"FDP_APC_EXT": 1,
"FDP_APC_EXT.1": 4,
"FDP_PDC_EXT": 1,
"FDP_PDC_EXT.1": 3,
"FDP_RIP_EXT": 2,
"FDP_RIP_EXT.1": 1,
"FDP_RIP_EXT.2": 1,
"FDP_SWI_EXT": 2,
"FDP_SWI_EXT.1": 2,
"FDP_SWI_EXT.2": 2
},
"FIA": {
"FIA_UAU": 1,
"FIA_UAU.2": 1,
"FIA_UID": 1,
"FIA_UID.2": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS_EXT": 1,
"FPT_FLS_EXT.1": 1,
"FPT_NTA_EXT": 1,
"FPT_NTA_EXT.1": 1,
"FPT_PHP": 2,
"FPT_PHP.1": 2,
"FPT_PHP.3": 1,
"FPT_STM": 1,
"FPT_STM.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 1,
"FPT_TST_EXT": 1,
"FPT_TST_EXT.1": 2
},
"FTA": {
"FTA_CIN_EXT.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA-Canada": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "D:20210531101825-04\u002700\u0027",
"/Creator": "",
"/Keywords": "",
"/ModDate": "D:20210531101919-05\u002700\u0027",
"/Producer": "Foxit PhantomPDF Printer Version 10.1.0.3521",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 406920,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7d2fa62f4c73767707151f82e7cec85bdb21aa51a063c520012680227384f2ab",
"txt_hash": "f7a561d37c092a12043676dcbb26b57dbb0ce5115ae204280b66bdf950e1b619"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6aa7d369861835d7b10ddeb148e241f60834d07011f8553e493055e518a6a098",
"txt_hash": "69909e422f2013b54078465b5e782562373ea1a29b0362ef6e2a42b49582802d"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Other Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile for Peripheral Sharing Device Version 4.0",
"not_valid_after": null,
"not_valid_before": "2019-07-19",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_PSD_v4.0 CR v1.0 (1).pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "active",
"version": "4.0"
}
}