This page was not yet optimized for use on mobile devices.
PP-Module for Keyboard/Mouse Devices Version 1.0
Web information ?
Status: activeCertification date: 2019-07-19
Scheme: 🇺🇸
Category: Other Devices and Systems
Security level: EAL1
Certification report ?
Extracted keywords
Claims
O.COMPUTER_INTERFACE, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.NO_OTHER_EXTERNAL, O.LEAK_PREVENTION_SWITCHING, O.AUTHORIZED_USAGE, O.PERIPHERAL_PORTS_ISOLATION, O.REJECT_UNAUTHORIZED, O.NO_TOE_ACCESS, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, O.UNIDIRECTIONAL_AUDIO_OUT, O.COMPUTER_TO_AUDIO_, O.EMULATED_INPUT, O.UNIDIRECTIONAL_INPUT, O.PROTECTED_EDID, O.UNIDIRECTIONAL_VIDEO, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_USE, T.UNAUTHORIZED_DEVICES, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, T.MICROPHONE_USE, T.AUDIO_REVERSED, A.NO_TEMPEST, A.PHYSICAL, A.NO_WIRELESS_DEVICES, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.USER_ALLOWED_ACCESS, A.NO_MICROPHONES, A.NO_SPECIAL_ANALOG_, OE.NO_TEMPEST, OE.PHYSICAL, OE.NO_WIRELESS_DEVICES, OE.TRUSTED_ADMIN, OE.TRUSTED_CONFIG, OE.NO_MICROPHONES, OE.NO_SPECIAL_ANALOG_Security Assurance Requirements (SAR)
ACE_INT, ACE_CCL, ACE_SPD, ACE_OBJ, ACE_ECD, ACE_REQ, ACE_MCO, ACE_CCO, ADV_FSP, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN, FDP_APC_EXT.1, FDP_RIP_EXT.1, FDP_RIP_EXT.2, FDP_PDC_EXT.1, FDP_SWI_EXT.1, FDP_SWI_EXT.2, FDP_APC_EXT, FDP_PDC_EXT, FDP_RIP_EXT, FDP_SWI_EXT, FDP_AFL_EXT, FDP_PUD_EXT, FDP_UDF_EXT, FDP_FIL_EXT, FDP_RDR_EXT, FDP_RIP, FDP_CDS_EXT, FDP_IPC_EXT, FDP_SPR_EXT, FIA_UAU.2, FIA_UID.2, FIA_UAU, FIA_UID, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF, FMT_SMF, FMT_SMR, FPT_STM.1, FPT_NTA_EXT.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS_EXT.1, FPT_TST_EXT.1, FPT_FLS_EXT, FPT_NTA_EXT, FPT_PHP, FPT_TST, FPT_TST_EXT, FPT_STM, FTA_CIN_EXT.1Evaluation facilities
EWA-CanadaStandards
ISO/IEC 17025File metadata
Author | Morey, Robert B. |
---|---|
Creation date | D:20210712145517-04'00' |
Modification date | D:20210712145517-04'00' |
Pages | 20 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
Profile ?
Extracted keywords
Claims
O.COMPUTER_INTERFACE_ISOLATION, O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED, O.USER_DATA_ISOLATION, O.PERIPHERAL_PORTS_ISOLATION, O.REJECT_UNAUTHORIZED_ENDPOINTS, O.REJECT_UNAUTHORIZED_PERIPHERAL, O.AUTHORIZED_USAGE, O.NO_USER_DATA_RETENTION, O.EMULATED_INPUT, O.UNIDIRECTIONAL_INPUT, T.DATA_LEAK, T.RESIDUAL_LEAK, T.SIGNAL_LEAK, T.UNINTENDED_USE, T.UNAUTHORIZED_DEVICES, T.LOGICAL_TAMPER, A.NO_TEMPESTSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN, FDP_FIL_EXT, FDP_PDC_EXT, FDP_RDR_EXT, FDP_SWI_EXT, FDP_UDF_EXT, FDP_APC_EXT.1, FDP_PDC_EXT.1, FDP_RDR_EXT.1, FDP_SWI_EXT.3, FDP_RIP, FDP_RIP_EXT.1, FDP_SWI_EXT.1, FDP_FIL_EXT.1, FDP_APC_EXT.1.1, FDP_APC_EXT.1.2, FDP_SWI_EXT.2, FDP_SWI_EXT.2.2, FDP_PDC_EXT.2, FDP_PDC_EXT.3, FDP_SWI_EXT.1.1, FDP_PDC_EXT.3.1, FDP_UDF_EXT.1, FDP_RDR_EXT.1.1, FDP_RIP.1, FDP_SWI_EXT.3.1, FDP_FIL_EXT.1.1, FDP_FIL_EXT.1.2, FDP_FIL_EXT.1.3, FDP_PDC_EXT.2.1, FDP_PDC_EXT.2.2, FDP_PDC_EXT.3.2, FDP_UDF_EXT.1.1, FDP_APC_EXT, FDP_UAI_EXT.1, FDP_CDS_EXT.1, FIA_UAU.2, FIA_UID.2, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FPT_FLS_EXT.1, FPT_NTA_EXT.1, FPT_PHP.1, FPT_TST.1, FPT_TST_EXT.1, FPT_STM.1File metadata
Title | Microsoft Word - pp_psd_km_module_v1.0_20190719 |
---|---|
Author | mbdowne |
Creation date | D:20190719092133-04'00' |
Modification date | D:20190719092133-04'00' |
Pages | 31 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
References ?
- ATEN Secure KVM Switch Series (CAC Models) active
- ATEN Secure KVM Switch Series (Non-CAC Models) active
- Adder AVS-4112, AVS-2112, AVS-4114, AVS-4214, AVS-2114, AVS-2214, AVS-4128, AVS-4124, AVS-1124, AVS-4224 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Adder AVS-4228, AVS-42216, XDS441, XDS441FXFirmware Version 44404-E7E7 Peripheral Sharing Devices active
- BAE Systems Secure KVM Gen2 8560943-2 active
- Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices active
- Belkin F1DN102MOD-BA-4, F1DN202MOD-BA-4, F1DN104MOD-BA-4, F1DN204MOD-BA-4, F1DN108MOD-BA-4, F1DN208MOD-BA-4, F1DN102MOD-HH-4, F1DN102MOD-PP-4, F1DN102MOD-DD-4, F1DN202MOD-HH-4, F1DN202MOD-PP-4, F1DN202MOD-DD-4, F1DN104MOD-HH-4, F1DN104MOD-PP-4, F1DN108MOD-PP-4, F1DN104MOD-DD-4, F1DN204MOD-HH-4, F1DN204MOD-PP-4, F1DN208MOD-PP-4, F1DN204MOD-DD-4, F1DN104MOD-XX-4, F1DN204MOD-XX-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Belkin F1DN104KVM-UN-4, F1DN204KVM-UN-4, F1DN102KVM-UN-4, F1DN202KVM-UN-4, F1DN108KVM-UN-4, F1DN208KVM-UN-4, F1DN116KVM-UN-4 Firmware Version 44444-E7E7 Peripheral Sharing Devices active
- Belkin F1DN104KVM-UNN4, F1DN204KVM-UNN4, F1DN102KVM-UNN4, F1DN202KVM-UNN4 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Black Box Secure KM Switch (CAC Models) active
- Black Box Secure KVM Switch (Non-CAC Models) active
- High Sec Labs FI11H-M, FI11D-M, FI11PH-M Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- High Sec Labs SC21H-4, SC82PH-4, SC162PH-4, SMX42D-M, SMX42H-M, SMX42P-M, SMX82D-M,SMX82H-M, SMX82P-M Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- High Sec Labs SK21PH-4, SK41PH-4, DK22PH-4, DK42PH-4, SK81PH-4, DK82PH-4, SX42PH-4, SX82PH-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- High Sec Labs SK41PHU-4, DK42PHU-4, SX42PHU-4, SX82PHU-4, SC42DHU-4, SC42PHU-4 Firmware Version 44444-E7E7 Peripheral Sharing Devices active
- IHSE K487-1PHCA-N, K487-1PHSA-N, K487-1PHCRA-N, K487-1PHSRA-N, K497-1PHCA-N, K497-1PHSA-N, K497-1PHCRA-N, K497-1PHSRA-N Firmware Version 4404-E7E7 Isolator Devices archived
- IOGEAR Secure KVM Switch Series (CAC Models) active
- IOGEAR Secure KVM Switch Series (Non-CAC Models) active
- IPGARD Secure KM Switches (CAC Models) active
- IPGARD Secure KVM Switch (Non-CAC Models) active
- IPGARD Secure KVM Switch/Isolator (CAC Models) active
- Raritan Secure KVM Switch Series with CAC active
- SK41D-4TR KVM, Firmware Version 44404-E7E7 active
- Sekuryx Secure KVM Switch (CAC Models) active
- Sekuryx Secure KVM Switch (Non-CAC Models) active
- Tripp Lite Secure KVM Switch (CAC Models) active
- Tripp Lite Secure KVM Switch (Non-CAC Models) active
- Vertiv CYBEXâ„¢ SC820DPH, SC840DPH, SC920DPH, SC940DPH, SC840DPHC, SC940DPHC, SC840DVI, SC940DVI Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Vertiv CYBEXâ„¢ SC845DPH, SC945DPH, SC845DPHC, SC945DPHC, SCM145DPH, SCM185DPH, SC985DPH, SCMV245DPH, SCMV285DPH Firmware Version 44444-E7E7 Peripheral Sharing Devices active
- Vertiv CYBEXâ„¢ SCMV2160DPH, SC840DVIE, SC940DVIE, SC840HE, SC940HE, SC840DPE, SC940DPE Firmware Version 44404-E7E7 Peripheral Sharing Devices active
- Vertiv CYBEXâ„¢ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEXâ„¢ SCKM140PP4 KM Switch Firmware Version 40404-0E7 active
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name PP-Module for Keyboard/Mouse Devices Version 1.0 was processed.
Raw data
{
"_id": "814f66c77bc7f33b",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "814f66c77bc7f33b",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "mod_km_v1.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_TEMPEST": 1
},
"O": {
"O.AUTHORIZED_USAGE": 1,
"O.COMPUTER_INTERFACE_ISOLATION": 1,
"O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED": 1,
"O.EMULATED_INPUT": 4,
"O.NO_USER_DATA_RETENTION": 1,
"O.PERIPHERAL_PORTS_ISOLATION": 1,
"O.REJECT_UNAUTHORIZED_ENDPOINTS": 1,
"O.REJECT_UNAUTHORIZED_PERIPHERAL": 2,
"O.UNIDIRECTIONAL_INPUT": 4,
"O.USER_DATA_ISOLATION": 1
},
"T": {
"T.DATA_LEAK": 2,
"T.LOGICAL_TAMPER": 1,
"T.RESIDUAL_LEAK": 1,
"T.SIGNAL_LEAK": 2,
"T.UNAUTHORIZED_DEVICES": 2,
"T.UNINTENDED_USE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 2
},
"FDP": {
"FDP_APC_EXT": 6,
"FDP_APC_EXT.1": 9,
"FDP_APC_EXT.1.1": 1,
"FDP_APC_EXT.1.2": 1,
"FDP_CDS_EXT.1": 1,
"FDP_FIL_EXT": 8,
"FDP_FIL_EXT.1": 15,
"FDP_FIL_EXT.1.1": 1,
"FDP_FIL_EXT.1.2": 1,
"FDP_FIL_EXT.1.3": 1,
"FDP_PDC_EXT": 12,
"FDP_PDC_EXT.1": 11,
"FDP_PDC_EXT.2": 12,
"FDP_PDC_EXT.2.1": 1,
"FDP_PDC_EXT.2.2": 1,
"FDP_PDC_EXT.3": 10,
"FDP_PDC_EXT.3.1": 2,
"FDP_PDC_EXT.3.2": 1,
"FDP_RDR_EXT": 4,
"FDP_RDR_EXT.1": 8,
"FDP_RDR_EXT.1.1": 2,
"FDP_RIP": 4,
"FDP_RIP.1": 1,
"FDP_RIP_EXT.1": 1,
"FDP_SWI_EXT": 3,
"FDP_SWI_EXT.1": 2,
"FDP_SWI_EXT.1.1": 3,
"FDP_SWI_EXT.2": 3,
"FDP_SWI_EXT.2.2": 1,
"FDP_SWI_EXT.3": 9,
"FDP_SWI_EXT.3.1": 2,
"FDP_UAI_EXT.1": 1,
"FDP_UDF_EXT": 7,
"FDP_UDF_EXT.1": 5,
"FDP_UDF_EXT.1.1": 1
},
"FIA": {
"FIA_UAU.2": 2,
"FIA_UID.2": 2
},
"FMT": {
"FMT_MOF.1": 2,
"FMT_SMF.1": 2,
"FMT_SMR.1": 2
},
"FPT": {
"FPT_FLS_EXT.1": 1,
"FPT_NTA_EXT.1": 1,
"FPT_PHP.1": 1,
"FPT_STM.1": 2,
"FPT_TST.1": 1,
"FPT_TST_EXT.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "mbdowne",
"/CreationDate": "D:20190719092133-04\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20190719092133-04\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "Microsoft Word - pp_psd_km_module_v1.0_20190719",
"pdf_file_size_bytes": 301555,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 31
},
"report_filename": "PP-Config PSD-AO-KM-VI CR v1.0.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_MICROPHONES": 1,
"A.NO_SPECIAL_ANALOG_": 1,
"A.NO_TEMPEST": 1,
"A.NO_WIRELESS_DEVICES": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1,
"A.TRUSTED_CONFIG": 1,
"A.USER_ALLOWED_ACCESS": 1
},
"O": {
"O.ANTI_TAMPERING": 1,
"O.AUTHORIZED_USAGE": 1,
"O.COMPUTER_INTERFACE": 2,
"O.COMPUTER_TO_AUDIO_": 1,
"O.EMULATED_INPUT": 1,
"O.LEAK_PREVENTION_SWITCHING": 1,
"O.NO_OTHER_EXTERNAL": 1,
"O.NO_TOE_ACCESS": 1,
"O.NO_USER_DATA_RETENTION": 1,
"O.PERIPHERAL_PORTS_ISOLATION": 1,
"O.PROTECTED_EDID": 1,
"O.REJECT_UNAUTHORIZED": 2,
"O.SELF_TEST": 1,
"O.SELF_TEST_FAIL_INDICATION": 1,
"O.SELF_TEST_FAIL_TOE_DISABLE": 1,
"O.TAMPER_EVIDENT_LABEL": 1,
"O.UNIDIRECTIONAL_AUDIO_OUT": 1,
"O.UNIDIRECTIONAL_INPUT": 1,
"O.UNIDIRECTIONAL_VIDEO": 1,
"O.USER_DATA_ISOLATION": 1
},
"OE": {
"OE.NO_MICROPHONES": 1,
"OE.NO_SPECIAL_ANALOG_": 1,
"OE.NO_TEMPEST": 1,
"OE.NO_WIRELESS_DEVICES": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1,
"OE.TRUSTED_CONFIG": 1
},
"T": {
"T.AUDIO_REVERSED": 1,
"T.DATA_LEAK": 1,
"T.FAILED": 1,
"T.LOGICAL_TAMPER": 1,
"T.MICROPHONE_USE": 1,
"T.PHYSICAL_TAMPER": 1,
"T.REPLACEMENT": 1,
"T.RESIDUAL_LEAK": 1,
"T.SIGNAL_LEAK": 1,
"T.UNAUTHORIZED_DEVICES": 1,
"T.UNINTENDED_USE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACE": {
"ACE_CCL": 1,
"ACE_CCO": 1,
"ACE_ECD": 1,
"ACE_INT": 1,
"ACE_MCO": 1,
"ACE_OBJ": 1,
"ACE_REQ": 1,
"ACE_SPD": 1
},
"ADV": {
"ADV_FSP": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 1
},
"FDP": {
"FDP_AFL_EXT": 1,
"FDP_APC_EXT": 4,
"FDP_APC_EXT.1": 4,
"FDP_CDS_EXT": 1,
"FDP_FIL_EXT": 1,
"FDP_IPC_EXT": 1,
"FDP_PDC_EXT": 6,
"FDP_PDC_EXT.1": 3,
"FDP_PUD_EXT": 1,
"FDP_RDR_EXT": 1,
"FDP_RIP": 1,
"FDP_RIP_EXT": 2,
"FDP_RIP_EXT.1": 1,
"FDP_RIP_EXT.2": 1,
"FDP_SPR_EXT": 6,
"FDP_SWI_EXT": 3,
"FDP_SWI_EXT.1": 2,
"FDP_SWI_EXT.2": 2,
"FDP_UDF_EXT": 3
},
"FIA": {
"FIA_UAU": 1,
"FIA_UAU.2": 1,
"FIA_UID": 1,
"FIA_UID.2": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS_EXT": 1,
"FPT_FLS_EXT.1": 1,
"FPT_NTA_EXT": 1,
"FPT_NTA_EXT.1": 1,
"FPT_PHP": 2,
"FPT_PHP.1": 2,
"FPT_PHP.3": 1,
"FPT_STM": 1,
"FPT_STM.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 1,
"FPT_TST_EXT": 1,
"FPT_TST_EXT.1": 2
},
"FTA": {
"FTA_CIN_EXT.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA-Canada": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Morey, Robert B.",
"/CreationDate": "D:20210712145517-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20210712145517-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 772994,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7cdf6c67d6d3d8af311515cb2d7bea6f449337124cf27ed72f8dd30411ed27d5",
"txt_hash": "5d5b87a17a16345413ac28ffe2ca2c0f7863039dcac32b70c231e7bdd9b2fcec"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a9a3f8e9dd1ba4aebb9979ea45f4dcef2bedb1527cb75cb46382d8b121ef6b33",
"txt_hash": "ec519625c7ce0d2de6949ae9b35e1247c2b8771aa24b1f970983e61be78e218a"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Other Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "PP-Module for Keyboard/Mouse Devices Version 1.0",
"not_valid_after": null,
"not_valid_before": "2019-07-19",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP-Config PSD-AO-KM-VI CR v1.0.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "active",
"version": "1.0"
}
}