This page was not yet optimized for use on mobile devices.
Protection Profile for Peripheral Sharing Switch, Version 3.0
Web information ?
Status: archivedCertification date: 2015-02-13
Archived date: 2020-01-18
Scheme: 🇺🇸
Category: Other Devices and Systems
Security level: EAL1
Certification report ?
Extracted keywords
Claims
O.COMPUTER_INTERFACE_ISOLATION, O.COMPUTER_INTERFACE_ISOLATION_TOE_, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.PURGE_TOE_KB_DATA_WHILE_SWITCHING, O.NO_DOCKING_PROTOCOLS, O.NO_OTHER_EXTERNAL_INTERFACES, O.NO_ANALOG_AUDIO_INPUT, O.UNIDIRECTIONAL_AUDIO_OUT, O.COMPUTER_TO_AUDIO_ISOLATION, O.USER_AUTHENTICATION_ISOLATION, O.USER_AUTHENTICATION_RESET, O.USER_AUTHENTICATION_TERMINATION, O.USER_AUTHENTICATION_ADMIN, O.AUTHORIZED_SWITCHING, O.NO_AMBIGUOUS_CONTROL, O.CONTINUOUS_INDICATION, O.KEYBOARD_AND_MOUSE_TIED, O.NO_CONNECTED_COMPUTER_CONTROL, O.PERIPHERAL_PORTS_ISOLATION, O.DISABLE_UNAUTHORIZED_PERIPHERAL, O.DISABLE_UNAUTHORIZED_ENDPOINTS, O.KEYBOARD_MOUSE_EMULATED, O.KEYBOARD_MOUSE_UNIDIRECTIONAL, O.UNIDIRECTIONAL_VIDEO, O.UNIDIRERCTIONAL_EDID, O.DISPLAYPORT_AUX_FILTERING, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.ANTI_TAMPERING_BACKUP_POWER, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER, O.ANTI_TAMPERING_INDICATION, O.ANTI_TAMPERING_PERMANENTLY_DISABLE_, O.NO_TOE_ACCESS, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_SWITCHING, T.UNAUTHORIZED_DEVICES, T.AUTHORIZED_BUT_UNTRUSTED_DEVICES, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, A.NO_TEMPEST, A.NO_SPECIAL_ANALOG_CAPABILITIES, A.PHYSICAL, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, OE.PHYSICAL, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1, APE_SPD.1, APE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FDP_IFC.1, FDP_IFF.1, FDP_ACC, FDP_ACF, FDP_RIP, FIA_UAU, FIA_UID, FMT_MOF, FMT_SMF, FMT_SMR, FPT_PHP, FPT_FLS, FPT_TST, FTA_CIN_EXT, FTA_ATH_EXTSide-channel analysis
physical tamperingFile metadata
Creation date | D:20180227155530-05'00' |
---|---|
Modification date | D:20180227155530-05'00' |
Pages | 14 |
Profile ?
Extracted keywords
Asymmetric Algorithms
DSAClaims
O.COMPUTER_INTERFACE_ISOLATION, O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.PURGE_TOE_KB_DATA_WHILE_SWITCHING, O.NO_DOCKING_PROTOCOLS, O.NO_OTHER_EXTERNAL_INTERFACES, O.NO_ANALOG_AUDIO_INPUT, O.UNIDIRECTIONAL_AUDIO_OUT, O.COMPUTER_TO_AUDIO_ISOLATION, O.USER_AUTHENTICATION_ISOLATION, O.USER_AUTHENTICATION_RESET, O.USER_AUTHENTICATION_TERMINATION, O.USER_AUTHENTICATION_ADMIN, O.AUTHORIZED_SWITCHING, O.NO_AMBIGUOUS_CONTROL, O.CONTINUOUS_INDICATION, O.KEYBOARD_AND_MOUSE_TIED, O.NO_CONNECTED_COMPUTER_CONTROL, O.PERIPHERAL_PORTS_ISOLATION, O.DISABLE_UNAUTHORIZED_PERIPHERAL, O.DISABLE_UNAUTHORIZED_ENDPOINTS, O.KEYBOARD_MOUSE_EMULATED, O.KEYBOARD_MOUSE_UNIDIRECTIONAL, O.UNIDIRECTIONAL_VIDEO, O.UNIDIRERCTIONAL_EDID, O.DISPLAYPORT_AUX_FILTERING, O.NO_TOE_ACCESS, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.ANTI_TAMPERING_BACKUP_POWER, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER, O.ANTI_TAMPERING_INDICATION, O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, O.COMPUTER_INTERFACE_ISOLATION_TOE_, O.PURGE_TOE_KB_DATA_WHILE_SWITCHIN, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE, O.ANTI_TAMPERING_PERMANENTLY_DISAB, O.COMPUTER_INTERFACE_ISOLATI, O.NO_OTHER_EXTERNAL_INTERFAC, O.USER_AUTHENTICATION_ISOLATI, O.COMPUTER_TO_AUDIO_ISOLATI, O.NO_CONNECTED_COMPUTER_C, O.NO_CONNECTED_COMPUTER_CO, O.PURGE_TOE_KB_DATA_WHILE_S, O.USER_AUTHENTICATION_TERMIN, O.DISABLE_UNAUTHORIZED_PERIP, O.DISABLE_UNAUTHORIZED_ENDP, O.KEYBOARD_MOUSE_UNIDIRECTI, O.ANTI_TAMPERING_BACKUP_PO, O.ANTI_TAMPERING_BACKUP_FAIL, O.ANTI_TAMPERING_PERMANENTL, O.PURGE_TOE, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_SWITCHING, T.UNAUTHORIZED_DEVICES, T.AUTHORIZED_BUT_UNTRUSTED_DEVICES, T.MICROPHONE_USE, T.AUDIO_REVERSED, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, T.UNINTENDED_SWITCHI, T.UNAUTHORIZED_DEVIC, T.AUTHORIZED_BUT_UNT, A.NO_TEMPEST, A.NO_SPECIAL_ANALOG_CAPABILITIES, A.PHYSICAL, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.NO_SPECIAL_ANALOG_CAP, OE.PHYSICAL, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMS.1, ALC_CMC.2, ALC_CMS.2, ATE_IND.1, ATE_IND, AVA_VANSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FDP_IFF, FDP_IFC.1, FDP_ACC, FDP_ACF, FDP_RIP, FDP_IFF.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FIA_UAU.2, FIA_UID.2, FIA_UID.1, FIA_UID.2.1, FIA_UAU.1, FIA_UAU.2.1, FMT_MSA.3, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MOF, FMT_SMF, FMT_SMR.1.1, FPT_PHP, FPT_FLS, FPT_TST, FPT_PHP.1, FPT_PHP.3, FPT_FLS.1, FPT_TST.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_PHP.3.2, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_CIN_EXT, FTA_ATH_EXT, FTA_CIN_EXT.1, FTA_ATH_EXT.1, FTA_ATH_EXT.2, FTA_CIN_EXT.1.1, FTA_ATH_EXT.1.1, FTA_ATH_EXT.2.1, FTA_TAB.1, FTA_SSL.4Side-channel analysis
physical tamperingStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date | D:20150226165518-05'00' |
---|---|
Modification date | D:20150226165518-05'00' |
Pages | 167 |
References ?
- ATEN Secure KVM Switch Series (models CS118xxx, CS114xxx) archived
- ATEN Secure KVM Switch Series (models CS118xxx, CS114xxx) archived
- Belkin Secure KM models F1DN102K-3, F1DN104K-3, and F1DN108K-3 archived
- Belkin Secure KM models F1DN102K-3, F1DN104K-3, and F1DN108K-3 archived
- Belkin Secure KVM models F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, and F1DN108F-3 archived
- Belkin Secure KVM models F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, and F1DN108F-3 archived
- Belkin Secure KVM models F1DN102FLP-DP-3, F1DN202FLP-DP-3 v33303-C6C6 archived
- Belkin Secure KVM models F1DN102KVM-HA-3, F1DN202KVM-HA-3, F1DN104KVM-HA-3, F1DN204KVM-HA-3 Version 33303-C6C6 active
- Belkin Secure KVM models F1DN102KVM-UN-3, F1DN202KVM-UN-3, F1DN104KVM-UN-3, F1DN204KVM-UN-3 v33303-C6C6 archived
- Black Box SSXP Secure KVM Switches Series archived
- HSL Secure KM Models SM20N-3, SM40N-3, SM40NU-3, SM80N-3, SM80NU-3 archived
- HSL Secure KM Models SM20N-3, SM40N-3, SM40NU-3, SM80N-3, SM80NU-3 archived
- HSL Secure KVM Models SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3, DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, and SK161DU-3 archived
- HSL Secure KVM Models SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3, DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, and SK161DU-3 archived
- High Sec Labs Secure SK/DK/SX KVMs v33303-C6C6 archived
- High Sec Labs Secure SK/DK/SX KVMs w/ fUSB v33303-C6C6 archived
- I/O Interconnect Secure KVM v1.0 archived
- IOGEAR Secure KVM Switch Series (models GCS12xxTAA3, GCS13xxTAA3, and GCS14xxTAA3) archived
- IOGEAR Secure KVM Switch Series (models GCS12xxTAA3, GCS13xxTAA3, and GCS14xxTAA3) archived
- IPGARD Secure KVM Switch (DPMST models) archived
- IPGARD Secure KVM/KM Switch (SDVN, SDPN, SDHN, SKMN models) archived
- IPGARD Secure KVM/KM Switch (SDVN, SDPN, SDHN, SKMN models) archived
- IPGARD Secure KVM/Matrix Switch (SDVN, SUHN, SDMN, SDPN models) archived
- Raritan Secure KVM Switch Series (model RSS-102, RSS-102C, RSS-104, RSS-104C) archived
- Tripp Lite B002 Secure KVM Switches Series archived
- Tripp Lite B002a Secure KVM Switch Series archived
- Vertiv Secure KM (formerly as Emerson Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185) archived
- Vertiv Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185 archived
- Vertiv Secure KVM Models SC820DP, SC920DP, SC920XP, SC840DP, SC940DP v33303-C6C6 archived
- Vertiv Secure KVM Models SC845DP, SC945DP, SC945XP, SCM145DP, SCM185DP, SC885DP, SC985DP, SCM185 v33303-C6C6 archived
- Vertiv Secure KVM and Matrix (formerly as Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165) archived
- Vertiv Secure KVM and Matrix models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165 archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile for Peripheral Sharing Switch, Version 3.0 was processed.
Raw data
{
"_id": "da2e45c9b3fbb700",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "da2e45c9b3fbb700",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_pss_v3.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_SPECIAL_ANALOG_CAP": 1,
"A.NO_SPECIAL_ANALOG_CAPABILITIES": 1,
"A.NO_TEMPEST": 2,
"A.PHYSICAL": 2,
"A.TRUSTED_ADMIN": 2,
"A.TRUSTED_CONFIG": 2
},
"O": {
"O.ANTI_TAMPERING": 5,
"O.ANTI_TAMPERING_BACKUP_FAIL": 2,
"O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE": 1,
"O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER": 2,
"O.ANTI_TAMPERING_BACKUP_PO": 2,
"O.ANTI_TAMPERING_BACKUP_POWER": 3,
"O.ANTI_TAMPERING_INDICATION": 5,
"O.ANTI_TAMPERING_PERMANENTL": 2,
"O.ANTI_TAMPERING_PERMANENTLY_DISAB": 1,
"O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE": 2,
"O.AUTHORIZED_SWITCHING": 5,
"O.COMPUTER_INTERFACE_ISOLATI": 6,
"O.COMPUTER_INTERFACE_ISOLATION": 3,
"O.COMPUTER_INTERFACE_ISOLATION_TOE_": 1,
"O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED": 2,
"O.COMPUTER_TO_AUDIO_ISOLATI": 2,
"O.COMPUTER_TO_AUDIO_ISOLATION": 3,
"O.CONTINUOUS_INDICATION": 5,
"O.DISABLE_UNAUTHORIZED_ENDP": 2,
"O.DISABLE_UNAUTHORIZED_ENDPOINTS": 3,
"O.DISABLE_UNAUTHORIZED_PERIP": 2,
"O.DISABLE_UNAUTHORIZED_PERIPHERAL": 3,
"O.DISPLAYPORT_AUX_FILTERING": 5,
"O.KEYBOARD_AND_MOUSE_TIED": 5,
"O.KEYBOARD_MOUSE_EMULATED": 5,
"O.KEYBOARD_MOUSE_UNIDIRECTI": 2,
"O.KEYBOARD_MOUSE_UNIDIRECTIONAL": 3,
"O.NO_AMBIGUOUS_CONTROL": 5,
"O.NO_ANALOG_AUDIO_INPUT": 5,
"O.NO_CONNECTED_COMPUTER_C": 1,
"O.NO_CONNECTED_COMPUTER_CO": 1,
"O.NO_CONNECTED_COMPUTER_CONTROL": 3,
"O.NO_DOCKING_PROTOCOLS": 5,
"O.NO_OTHER_EXTERNAL_INTERFAC": 5,
"O.NO_OTHER_EXTERNAL_INTERFACES": 3,
"O.NO_TOE_ACCESS": 5,
"O.NO_USER_DATA_RETENTION": 5,
"O.PERIPHERAL_PORTS_ISOLATION": 7,
"O.PURGE_TOE": 1,
"O.PURGE_TOE_KB_DATA_WHILE_S": 2,
"O.PURGE_TOE_KB_DATA_WHILE_SWITCHIN": 1,
"O.PURGE_TOE_KB_DATA_WHILE_SWITCHING": 1,
"O.SELF_TEST": 5,
"O.SELF_TEST_FAIL_INDICATION": 5,
"O.SELF_TEST_FAIL_TOE_DISABLE": 5,
"O.TAMPER_EVIDENT_LABEL": 7,
"O.UNIDIRECTIONAL_AUDIO_OUT": 5,
"O.UNIDIRECTIONAL_VIDEO": 5,
"O.UNIDIRERCTIONAL_EDID": 5,
"O.USER_AUTHENTICATION_ADMIN": 5,
"O.USER_AUTHENTICATION_ISOLATI": 2,
"O.USER_AUTHENTICATION_ISOLATION": 3,
"O.USER_AUTHENTICATION_RESET": 9,
"O.USER_AUTHENTICATION_TERMIN": 2,
"O.USER_AUTHENTICATION_TERMINATION": 3,
"O.USER_DATA_ISOLATION": 5
},
"OE": {
"OE.PHYSICAL": 3,
"OE.TRUSTED_ADMIN": 4
},
"T": {
"T.AUDIO_REVERSED": 1,
"T.AUTHORIZED_BUT_UNT": 1,
"T.AUTHORIZED_BUT_UNTRUSTED_DEVICES": 2,
"T.DATA_LEAK": 3,
"T.FAILED": 3,
"T.LOGICAL_TAMPER": 3,
"T.MICROPHONE_USE": 1,
"T.PHYSICAL_TAMPER": 3,
"T.REPLACEMENT": 3,
"T.RESIDUAL_LEAK": 3,
"T.SIGNAL_LEAK": 3,
"T.UNAUTHORIZED_DEVIC": 1,
"T.UNAUTHORIZED_DEVICES": 2,
"T.UNINTENDED_SWITCHI": 1,
"T.UNINTENDED_SWITCHING": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 10
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 12,
"AGD_PRE": 1,
"AGD_PRE.1": 8
},
"ALC": {
"ALC_CMC.1": 7,
"ALC_CMC.2": 1,
"ALC_CMS.1": 3,
"ALC_CMS.2": 4
},
"ATE": {
"ATE_IND": 1,
"ATE_IND.1": 7
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 4,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 9,
"FDP_ACC.1.1": 1,
"FDP_ACF": 2,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 27,
"FDP_IFC.1.1": 2,
"FDP_IFF": 4,
"FDP_IFF.1": 27,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 24,
"FDP_IFF.1.3": 5,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 49,
"FDP_RIP": 2,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_UAU.1": 1,
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 4,
"FIA_UID.2": 4,
"FIA_UID.2.1": 2
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 5,
"FMT_MSA.3": 6,
"FMT_SMF": 1,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 4,
"FMT_SMR.1": 6,
"FMT_SMR.1.1": 1
},
"FPT": {
"FPT_FLS": 2,
"FPT_FLS.1": 4,
"FPT_FLS.1.1": 1,
"FPT_PHP": 2,
"FPT_PHP.1": 8,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 2,
"FPT_PHP.3.2": 2,
"FPT_TST": 2,
"FPT_TST.1": 7,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_ATH_EXT": 2,
"FTA_ATH_EXT.1": 8,
"FTA_ATH_EXT.1.1": 2,
"FTA_ATH_EXT.2": 9,
"FTA_ATH_EXT.2.1": 2,
"FTA_CIN_EXT": 5,
"FTA_CIN_EXT.1": 5,
"FTA_CIN_EXT.1.1": 4,
"FTA_SSL.4": 1,
"FTA_TAB.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 10
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20150226165518-05\u002700\u0027",
"/ModDate": "D:20150226165518-05\u002700\u0027",
"pdf_file_size_bytes": 2357040,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://en.wikipedia.org/wiki/Mini-DIN_connector",
"http://en.wikipedia.org/wiki/Shift_register",
"http://www.extron.com/download/dltrack.aspx?file=EDID_ManagerV1x0.exe\u0026id=38772",
"http://en.wikipedia.org/wiki/Computer_keyboard",
"http://www.internationaltestinstruments.com/products/97-1480a-usb-20-protocol-analyzer.aspx",
"http://www.atmel.com/Images/doc8445.pdf",
"http://www.ringbell.co.uk/software/audio.htm",
"http://www.digikey.com/product-detail/en/A-USBPB-R/AE10178-ND/1119639",
"http://www.passmark.com/products/keytest.htm",
"http://www.digikey.com/product-detail/en/SP-3501/CP-3502-ND/96987",
"http://www.digikey.com/product-search/en?mpart=ATEVK1100\u0026vendor=313",
"http://en.wikipedia.org/wiki/Computer_mouse",
"http://en.wikipedia.org/wiki/PC_compatible",
"http://download.cnet.com/Screen-Bright/3000-18514_4-76168604.html",
"http://www.digikey.com/product-detail/en/TMC0102R500FE02/TMC10-2.5-ND/269926",
"http://freeusbanalyzer.com/",
"http://www.unigraf.fi/products/testing-display-electronics/displayport/dp-aux-channel-monitor"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 167
},
"report_filename": "pp_pss_v3.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_SPECIAL_ANALOG_CAPABILITIES": 1,
"A.NO_TEMPEST": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1,
"A.TRUSTED_CONFIG": 1
},
"O": {
"O.ANTI_TAMPERING": 1,
"O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER": 1,
"O.ANTI_TAMPERING_BACKUP_POWER": 1,
"O.ANTI_TAMPERING_INDICATION": 1,
"O.ANTI_TAMPERING_PERMANENTLY_DISABLE_": 1,
"O.AUTHORIZED_SWITCHING": 1,
"O.COMPUTER_INTERFACE_ISOLATION": 1,
"O.COMPUTER_INTERFACE_ISOLATION_TOE_": 1,
"O.COMPUTER_TO_AUDIO_ISOLATION": 1,
"O.CONTINUOUS_INDICATION": 1,
"O.DISABLE_UNAUTHORIZED_ENDPOINTS": 1,
"O.DISABLE_UNAUTHORIZED_PERIPHERAL": 1,
"O.DISPLAYPORT_AUX_FILTERING": 1,
"O.KEYBOARD_AND_MOUSE_TIED": 1,
"O.KEYBOARD_MOUSE_EMULATED": 1,
"O.KEYBOARD_MOUSE_UNIDIRECTIONAL": 1,
"O.NO_AMBIGUOUS_CONTROL": 1,
"O.NO_ANALOG_AUDIO_INPUT": 1,
"O.NO_CONNECTED_COMPUTER_CONTROL": 1,
"O.NO_DOCKING_PROTOCOLS": 1,
"O.NO_OTHER_EXTERNAL_INTERFACES": 1,
"O.NO_TOE_ACCESS": 1,
"O.NO_USER_DATA_RETENTION": 1,
"O.PERIPHERAL_PORTS_ISOLATION": 1,
"O.PURGE_TOE_KB_DATA_WHILE_SWITCHING": 1,
"O.SELF_TEST": 1,
"O.SELF_TEST_FAIL_INDICATION": 1,
"O.SELF_TEST_FAIL_TOE_DISABLE": 1,
"O.TAMPER_EVIDENT_LABEL": 1,
"O.UNIDIRECTIONAL_AUDIO_OUT": 1,
"O.UNIDIRECTIONAL_VIDEO": 1,
"O.UNIDIRERCTIONAL_EDID": 1,
"O.USER_AUTHENTICATION_ADMIN": 1,
"O.USER_AUTHENTICATION_ISOLATION": 1,
"O.USER_AUTHENTICATION_RESET": 1,
"O.USER_AUTHENTICATION_TERMINATION": 1,
"O.USER_DATA_ISOLATION": 1
},
"OE": {
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1
},
"T": {
"T.AUTHORIZED_BUT_UNTRUSTED_DEVICES": 1,
"T.DATA_LEAK": 1,
"T.FAILED": 1,
"T.LOGICAL_TAMPER": 1,
"T.PHYSICAL_TAMPER": 1,
"T.REPLACEMENT": 1,
"T.RESIDUAL_LEAK": 1,
"T.SIGNAL_LEAK": 1,
"T.UNAUTHORIZED_DEVICES": 1,
"T.UNINTENDED_SWITCHING": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1,
"APE_TSS.1": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACF": 1,
"FDP_IFC.1": 2,
"FDP_IFF.1": 2,
"FDP_RIP": 1
},
"FIA": {
"FIA_UAU": 1,
"FIA_UID": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_SMF": 1,
"FMT_SMR": 1
},
"FPT": {
"FPT_FLS": 1,
"FPT_PHP": 2,
"FPT_TST": 1
},
"FTA": {
"FTA_ATH_EXT": 2,
"FTA_CIN_EXT": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20180227155530-05\u002700\u0027",
"/ModDate": "D:20180227155530-05\u002700\u0027",
"pdf_file_size_bytes": 538173,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1248c6eb76f1e260846cfd5e20e606949a425bb623eef1272f7c7b0a2940efb4",
"txt_hash": "8b8913a22a3aa2eedfac9d2070c741f0629ba770d3073261d5baf81361dc9e66"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "86a68f20816d75839d60e2a82fa9274529e771c1fb71cb5dcc66de8bb4c35149",
"txt_hash": "aa7b04e801aabd7d0b4840f6d4d5f855ef59292e9a9b3c5bcd319ae3a969cab6"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Other Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile for Peripheral Sharing Switch, Version 3.0",
"not_valid_after": "2020-01-18",
"not_valid_before": "2015-02-13",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "archived",
"version": "3.0"
}
}