This page was not yet optimized for use on mobile
devices.
Protection Profile for Peripheral Sharing Switch, Version 3.0
Web information
| Status | archived |
|---|---|
| Valid from | 13.02.2015 |
| Valid until | 18.01.2020 |
| Scheme | 🇺🇸 US |
| Category | Other Devices and Systems |
| Security level | EAL1 |
Certification report
Extracted keywords
Claims
O.COMPUTER_INTERFACE_ISOLATION, O.COMPUTER_INTERFACE_ISOLATION_TOE_, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.PURGE_TOE_KB_DATA_WHILE_SWITCHING, O.NO_DOCKING_PROTOCOLS, O.NO_OTHER_EXTERNAL_INTERFACES, O.NO_ANALOG_AUDIO_INPUT, O.UNIDIRECTIONAL_AUDIO_OUT, O.COMPUTER_TO_AUDIO_ISOLATION, O.USER_AUTHENTICATION_ISOLATION, O.USER_AUTHENTICATION_RESET, O.USER_AUTHENTICATION_TERMINATION, O.USER_AUTHENTICATION_ADMIN, O.AUTHORIZED_SWITCHING, O.NO_AMBIGUOUS_CONTROL, O.CONTINUOUS_INDICATION, O.KEYBOARD_AND_MOUSE_TIED, O.NO_CONNECTED_COMPUTER_CONTROL, O.PERIPHERAL_PORTS_ISOLATION, O.DISABLE_UNAUTHORIZED_PERIPHERAL, O.DISABLE_UNAUTHORIZED_ENDPOINTS, O.KEYBOARD_MOUSE_EMULATED, O.KEYBOARD_MOUSE_UNIDIRECTIONAL, O.UNIDIRECTIONAL_VIDEO, O.UNIDIRERCTIONAL_EDID, O.DISPLAYPORT_AUX_FILTERING, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.ANTI_TAMPERING_BACKUP_POWER, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER, O.ANTI_TAMPERING_INDICATION, O.ANTI_TAMPERING_PERMANENTLY_DISABLE_, O.NO_TOE_ACCESS, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_SWITCHING, T.UNAUTHORIZED_DEVICES, T.AUTHORIZED_BUT_UNTRUSTED_DEVICES, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, A.NO_TEMPEST, A.NO_SPECIAL_ANALOG_CAPABILITIES, A.PHYSICAL, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, OE.PHYSICAL, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1, APE_SPD.1, APE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FDP_IFC.1, FDP_IFF.1, FDP_ACC, FDP_ACF, FDP_RIP, FIA_UAU, FIA_UID, FMT_MOF, FMT_SMF, FMT_SMR, FPT_PHP, FPT_FLS, FPT_TST, FTA_CIN_EXT, FTA_ATH_EXTSide-channel analysis
physical tamperingFile metadata
| Creation date | D:20180227155530-05'00' |
|---|---|
| Modification date | D:20180227155530-05'00' |
| Pages | 14 |
Protection Profile
Extracted keywords
Asymmetric Algorithms
DSAClaims
O.COMPUTER_INTERFACE_ISOLATION, O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED, O.USER_DATA_ISOLATION, O.NO_USER_DATA_RETENTION, O.PURGE_TOE_KB_DATA_WHILE_SWITCHING, O.NO_DOCKING_PROTOCOLS, O.NO_OTHER_EXTERNAL_INTERFACES, O.NO_ANALOG_AUDIO_INPUT, O.UNIDIRECTIONAL_AUDIO_OUT, O.COMPUTER_TO_AUDIO_ISOLATION, O.USER_AUTHENTICATION_ISOLATION, O.USER_AUTHENTICATION_RESET, O.USER_AUTHENTICATION_TERMINATION, O.USER_AUTHENTICATION_ADMIN, O.AUTHORIZED_SWITCHING, O.NO_AMBIGUOUS_CONTROL, O.CONTINUOUS_INDICATION, O.KEYBOARD_AND_MOUSE_TIED, O.NO_CONNECTED_COMPUTER_CONTROL, O.PERIPHERAL_PORTS_ISOLATION, O.DISABLE_UNAUTHORIZED_PERIPHERAL, O.DISABLE_UNAUTHORIZED_ENDPOINTS, O.KEYBOARD_MOUSE_EMULATED, O.KEYBOARD_MOUSE_UNIDIRECTIONAL, O.UNIDIRECTIONAL_VIDEO, O.UNIDIRERCTIONAL_EDID, O.DISPLAYPORT_AUX_FILTERING, O.NO_TOE_ACCESS, O.TAMPER_EVIDENT_LABEL, O.ANTI_TAMPERING, O.ANTI_TAMPERING_BACKUP_POWER, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER, O.ANTI_TAMPERING_INDICATION, O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE, O.SELF_TEST, O.SELF_TEST_FAIL_TOE_DISABLE, O.SELF_TEST_FAIL_INDICATION, O.COMPUTER_INTERFACE_ISOLATION_TOE_, O.PURGE_TOE_KB_DATA_WHILE_SWITCHIN, O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE, O.ANTI_TAMPERING_PERMANENTLY_DISAB, O.COMPUTER_INTERFACE_ISOLATI, O.NO_OTHER_EXTERNAL_INTERFAC, O.USER_AUTHENTICATION_ISOLATI, O.COMPUTER_TO_AUDIO_ISOLATI, O.NO_CONNECTED_COMPUTER_C, O.NO_CONNECTED_COMPUTER_CO, O.PURGE_TOE_KB_DATA_WHILE_S, O.USER_AUTHENTICATION_TERMIN, O.DISABLE_UNAUTHORIZED_PERIP, O.DISABLE_UNAUTHORIZED_ENDP, O.KEYBOARD_MOUSE_UNIDIRECTI, O.ANTI_TAMPERING_BACKUP_PO, O.ANTI_TAMPERING_BACKUP_FAIL, O.ANTI_TAMPERING_PERMANENTL, O.PURGE_TOE, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_SWITCHING, T.UNAUTHORIZED_DEVICES, T.AUTHORIZED_BUT_UNTRUSTED_DEVICES, T.MICROPHONE_USE, T.AUDIO_REVERSED, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, T.UNINTENDED_SWITCHI, T.UNAUTHORIZED_DEVIC, T.AUTHORIZED_BUT_UNT, A.NO_TEMPEST, A.NO_SPECIAL_ANALOG_CAPABILITIES, A.PHYSICAL, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.NO_SPECIAL_ANALOG_CAP, OE.PHYSICAL, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMS.1, ALC_CMC.2, ALC_CMS.2, ATE_IND.1, ATE_IND, AVA_VANSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FDP_IFF, FDP_IFC.1, FDP_ACC, FDP_ACF, FDP_RIP, FDP_IFF.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FIA_UAU.2, FIA_UID.2, FIA_UID.1, FIA_UID.2.1, FIA_UAU.1, FIA_UAU.2.1, FMT_MSA.3, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MOF, FMT_SMF, FMT_SMR.1.1, FPT_PHP, FPT_FLS, FPT_TST, FPT_PHP.1, FPT_PHP.3, FPT_FLS.1, FPT_TST.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_PHP.3.2, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_CIN_EXT, FTA_ATH_EXT, FTA_CIN_EXT.1, FTA_ATH_EXT.1, FTA_ATH_EXT.2, FTA_CIN_EXT.1.1, FTA_ATH_EXT.1.1, FTA_ATH_EXT.2.1, FTA_TAB.1, FTA_SSL.4Side-channel analysis
physical tamperingStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Creation date | D:20150226165518-05'00' |
|---|---|
| Modification date | D:20150226165518-05'00' |
| Pages | 167 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- ATEN Secure KVM Switch Series (models CS118xxx, CS114xxx) archived
- ATEN Secure KVM Switch Series (models CS118xxx, CS114xxx) archived
- Belkin Secure KM models F1DN102K-3, F1DN104K-3, and F1DN108K-3 archived
- Belkin Secure KM models F1DN102K-3, F1DN104K-3, and F1DN108K-3 archived
- Belkin Secure KVM models F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, and F1DN108F-3 archived
- Belkin Secure KVM models F1DN102F-3, F1DN102N-3, F1DN102V-3, F1DN102H-3, F1DN104P-3, F1DN104W-3, F1DN104B-3, F1DN104C-3, F1DN104E-3, F1DN104F-3, F1DN104Q-3, F1DN108C-3, F1DN116C-3, and F1DN108F-3 archived
- Belkin Secure KVM models F1DN102FLP-DP-3, F1DN202FLP-DP-3 v33303-C6C6 archived
- Belkin Secure KVM models F1DN102KVM-HA-3, F1DN202KVM-HA-3, F1DN104KVM-HA-3, F1DN204KVM-HA-3 Version 33303-C6C6 active
- Belkin Secure KVM models F1DN102KVM-UN-3, F1DN202KVM-UN-3, F1DN104KVM-UN-3, F1DN204KVM-UN-3 v33303-C6C6 archived
- Black Box SSXP Secure KVM Switches Series archived
- HSL Secure KM Models SM20N-3, SM40N-3, SM40NU-3, SM80N-3, SM80NU-3 archived
- HSL Secure KM Models SM20N-3, SM40N-3, SM40NU-3, SM80N-3, SM80NU-3 archived
- HSL Secure KVM Models SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3, DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, and SK161DU-3 archived
- HSL Secure KVM Models SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3, DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, and SK161DU-3 archived
- High Sec Labs Secure SK/DK/SX KVMs v33303-C6C6 archived
- High Sec Labs Secure SK/DK/SX KVMs w/ fUSB v33303-C6C6 archived
- I/O Interconnect Secure KVM v1.0 archived
- IOGEAR Secure KVM Switch Series (models GCS12xxTAA3, GCS13xxTAA3, and GCS14xxTAA3) archived
- IOGEAR Secure KVM Switch Series (models GCS12xxTAA3, GCS13xxTAA3, and GCS14xxTAA3) archived
- IPGARD Secure KVM Switch (DPMST models) archived
- IPGARD Secure KVM/KM Switch (SDVN, SDPN, SDHN, SKMN models) archived
- IPGARD Secure KVM/KM Switch (SDVN, SDPN, SDHN, SKMN models) archived
- IPGARD Secure KVM/Matrix Switch (SDVN, SUHN, SDMN, SDPN models) archived
- Raritan Secure KVM Switch Series (model RSS-102, RSS-102C, RSS-104, RSS-104C) archived
- Tripp Lite B002 Secure KVM Switches Series archived
- Tripp Lite B002a Secure KVM Switch Series archived
- Vertiv Secure KM (formerly as Emerson Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185) archived
- Vertiv Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185 archived
- Vertiv Secure KVM Models SC820DP, SC920DP, SC920XP, SC840DP, SC940DP v33303-C6C6 archived
- Vertiv Secure KVM Models SC845DP, SC945DP, SC945XP, SCM145DP, SCM185DP, SC885DP, SC985DP, SCM185 v33303-C6C6 archived
- Vertiv Secure KVM and Matrix (formerly as Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165) archived
- Vertiv Secure KVM and Matrix models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165 archived
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "da2e45c9b3fbb700",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "da2e45c9b3fbb700",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_pss_v3.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_SPECIAL_ANALOG_CAP": 1,
"A.NO_SPECIAL_ANALOG_CAPABILITIES": 1,
"A.NO_TEMPEST": 2,
"A.PHYSICAL": 2,
"A.TRUSTED_ADMIN": 2,
"A.TRUSTED_CONFIG": 2
},
"O": {
"O.ANTI_TAMPERING": 5,
"O.ANTI_TAMPERING_BACKUP_FAIL": 2,
"O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE": 1,
"O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER": 2,
"O.ANTI_TAMPERING_BACKUP_PO": 2,
"O.ANTI_TAMPERING_BACKUP_POWER": 3,
"O.ANTI_TAMPERING_INDICATION": 5,
"O.ANTI_TAMPERING_PERMANENTL": 2,
"O.ANTI_TAMPERING_PERMANENTLY_DISAB": 1,
"O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE": 2,
"O.AUTHORIZED_SWITCHING": 5,
"O.COMPUTER_INTERFACE_ISOLATI": 6,
"O.COMPUTER_INTERFACE_ISOLATION": 3,
"O.COMPUTER_INTERFACE_ISOLATION_TOE_": 1,
"O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED": 2,
"O.COMPUTER_TO_AUDIO_ISOLATI": 2,
"O.COMPUTER_TO_AUDIO_ISOLATION": 3,
"O.CONTINUOUS_INDICATION": 5,
"O.DISABLE_UNAUTHORIZED_ENDP": 2,
"O.DISABLE_UNAUTHORIZED_ENDPOINTS": 3,
"O.DISABLE_UNAUTHORIZED_PERIP": 2,
"O.DISABLE_UNAUTHORIZED_PERIPHERAL": 3,
"O.DISPLAYPORT_AUX_FILTERING": 5,
"O.KEYBOARD_AND_MOUSE_TIED": 5,
"O.KEYBOARD_MOUSE_EMULATED": 5,
"O.KEYBOARD_MOUSE_UNIDIRECTI": 2,
"O.KEYBOARD_MOUSE_UNIDIRECTIONAL": 3,
"O.NO_AMBIGUOUS_CONTROL": 5,
"O.NO_ANALOG_AUDIO_INPUT": 5,
"O.NO_CONNECTED_COMPUTER_C": 1,
"O.NO_CONNECTED_COMPUTER_CO": 1,
"O.NO_CONNECTED_COMPUTER_CONTROL": 3,
"O.NO_DOCKING_PROTOCOLS": 5,
"O.NO_OTHER_EXTERNAL_INTERFAC": 5,
"O.NO_OTHER_EXTERNAL_INTERFACES": 3,
"O.NO_TOE_ACCESS": 5,
"O.NO_USER_DATA_RETENTION": 5,
"O.PERIPHERAL_PORTS_ISOLATION": 7,
"O.PURGE_TOE": 1,
"O.PURGE_TOE_KB_DATA_WHILE_S": 2,
"O.PURGE_TOE_KB_DATA_WHILE_SWITCHIN": 1,
"O.PURGE_TOE_KB_DATA_WHILE_SWITCHING": 1,
"O.SELF_TEST": 5,
"O.SELF_TEST_FAIL_INDICATION": 5,
"O.SELF_TEST_FAIL_TOE_DISABLE": 5,
"O.TAMPER_EVIDENT_LABEL": 7,
"O.UNIDIRECTIONAL_AUDIO_OUT": 5,
"O.UNIDIRECTIONAL_VIDEO": 5,
"O.UNIDIRERCTIONAL_EDID": 5,
"O.USER_AUTHENTICATION_ADMIN": 5,
"O.USER_AUTHENTICATION_ISOLATI": 2,
"O.USER_AUTHENTICATION_ISOLATION": 3,
"O.USER_AUTHENTICATION_RESET": 9,
"O.USER_AUTHENTICATION_TERMIN": 2,
"O.USER_AUTHENTICATION_TERMINATION": 3,
"O.USER_DATA_ISOLATION": 5
},
"OE": {
"OE.PHYSICAL": 3,
"OE.TRUSTED_ADMIN": 4
},
"T": {
"T.AUDIO_REVERSED": 1,
"T.AUTHORIZED_BUT_UNT": 1,
"T.AUTHORIZED_BUT_UNTRUSTED_DEVICES": 2,
"T.DATA_LEAK": 3,
"T.FAILED": 3,
"T.LOGICAL_TAMPER": 3,
"T.MICROPHONE_USE": 1,
"T.PHYSICAL_TAMPER": 3,
"T.REPLACEMENT": 3,
"T.RESIDUAL_LEAK": 3,
"T.SIGNAL_LEAK": 3,
"T.UNAUTHORIZED_DEVIC": 1,
"T.UNAUTHORIZED_DEVICES": 2,
"T.UNINTENDED_SWITCHI": 1,
"T.UNINTENDED_SWITCHING": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 10
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 12,
"AGD_PRE": 1,
"AGD_PRE.1": 8
},
"ALC": {
"ALC_CMC.1": 7,
"ALC_CMC.2": 1,
"ALC_CMS.1": 3,
"ALC_CMS.2": 4
},
"ATE": {
"ATE_IND": 1,
"ATE_IND.1": 7
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 4,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 9,
"FDP_ACC.1.1": 1,
"FDP_ACF": 2,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 27,
"FDP_IFC.1.1": 2,
"FDP_IFF": 4,
"FDP_IFF.1": 27,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 24,
"FDP_IFF.1.3": 5,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 49,
"FDP_RIP": 2,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_UAU.1": 1,
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 4,
"FIA_UID.2": 4,
"FIA_UID.2.1": 2
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 5,
"FMT_MSA.3": 6,
"FMT_SMF": 1,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 4,
"FMT_SMR.1": 6,
"FMT_SMR.1.1": 1
},
"FPT": {
"FPT_FLS": 2,
"FPT_FLS.1": 4,
"FPT_FLS.1.1": 1,
"FPT_PHP": 2,
"FPT_PHP.1": 8,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 2,
"FPT_PHP.3.2": 2,
"FPT_TST": 2,
"FPT_TST.1": 7,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_ATH_EXT": 2,
"FTA_ATH_EXT.1": 8,
"FTA_ATH_EXT.1.1": 2,
"FTA_ATH_EXT.2": 9,
"FTA_ATH_EXT.2.1": 2,
"FTA_CIN_EXT": 5,
"FTA_CIN_EXT.1": 5,
"FTA_CIN_EXT.1.1": 4,
"FTA_SSL.4": 1,
"FTA_TAB.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 10
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20150226165518-05\u002700\u0027",
"/ModDate": "D:20150226165518-05\u002700\u0027",
"pdf_file_size_bytes": 2357040,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://en.wikipedia.org/wiki/Shift_register",
"http://www.atmel.com/Images/doc8445.pdf",
"http://www.digikey.com/product-search/en?mpart=ATEVK1100\u0026vendor=313",
"http://www.digikey.com/product-detail/en/A-USBPB-R/AE10178-ND/1119639",
"http://www.digikey.com/product-detail/en/SP-3501/CP-3502-ND/96987",
"http://en.wikipedia.org/wiki/PC_compatible",
"http://en.wikipedia.org/wiki/Mini-DIN_connector",
"http://en.wikipedia.org/wiki/Computer_keyboard",
"http://www.passmark.com/products/keytest.htm",
"http://www.unigraf.fi/products/testing-display-electronics/displayport/dp-aux-channel-monitor",
"http://www.internationaltestinstruments.com/products/97-1480a-usb-20-protocol-analyzer.aspx",
"http://download.cnet.com/Screen-Bright/3000-18514_4-76168604.html",
"http://freeusbanalyzer.com/",
"http://www.extron.com/download/dltrack.aspx?file=EDID_ManagerV1x0.exe\u0026id=38772",
"http://www.ringbell.co.uk/software/audio.htm",
"http://www.digikey.com/product-detail/en/TMC0102R500FE02/TMC10-2.5-ND/269926",
"http://en.wikipedia.org/wiki/Computer_mouse"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 167
},
"report_filename": "pp_pss_v3.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_SPECIAL_ANALOG_CAPABILITIES": 1,
"A.NO_TEMPEST": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1,
"A.TRUSTED_CONFIG": 1
},
"O": {
"O.ANTI_TAMPERING": 1,
"O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER": 1,
"O.ANTI_TAMPERING_BACKUP_POWER": 1,
"O.ANTI_TAMPERING_INDICATION": 1,
"O.ANTI_TAMPERING_PERMANENTLY_DISABLE_": 1,
"O.AUTHORIZED_SWITCHING": 1,
"O.COMPUTER_INTERFACE_ISOLATION": 1,
"O.COMPUTER_INTERFACE_ISOLATION_TOE_": 1,
"O.COMPUTER_TO_AUDIO_ISOLATION": 1,
"O.CONTINUOUS_INDICATION": 1,
"O.DISABLE_UNAUTHORIZED_ENDPOINTS": 1,
"O.DISABLE_UNAUTHORIZED_PERIPHERAL": 1,
"O.DISPLAYPORT_AUX_FILTERING": 1,
"O.KEYBOARD_AND_MOUSE_TIED": 1,
"O.KEYBOARD_MOUSE_EMULATED": 1,
"O.KEYBOARD_MOUSE_UNIDIRECTIONAL": 1,
"O.NO_AMBIGUOUS_CONTROL": 1,
"O.NO_ANALOG_AUDIO_INPUT": 1,
"O.NO_CONNECTED_COMPUTER_CONTROL": 1,
"O.NO_DOCKING_PROTOCOLS": 1,
"O.NO_OTHER_EXTERNAL_INTERFACES": 1,
"O.NO_TOE_ACCESS": 1,
"O.NO_USER_DATA_RETENTION": 1,
"O.PERIPHERAL_PORTS_ISOLATION": 1,
"O.PURGE_TOE_KB_DATA_WHILE_SWITCHING": 1,
"O.SELF_TEST": 1,
"O.SELF_TEST_FAIL_INDICATION": 1,
"O.SELF_TEST_FAIL_TOE_DISABLE": 1,
"O.TAMPER_EVIDENT_LABEL": 1,
"O.UNIDIRECTIONAL_AUDIO_OUT": 1,
"O.UNIDIRECTIONAL_VIDEO": 1,
"O.UNIDIRERCTIONAL_EDID": 1,
"O.USER_AUTHENTICATION_ADMIN": 1,
"O.USER_AUTHENTICATION_ISOLATION": 1,
"O.USER_AUTHENTICATION_RESET": 1,
"O.USER_AUTHENTICATION_TERMINATION": 1,
"O.USER_DATA_ISOLATION": 1
},
"OE": {
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1
},
"T": {
"T.AUTHORIZED_BUT_UNTRUSTED_DEVICES": 1,
"T.DATA_LEAK": 1,
"T.FAILED": 1,
"T.LOGICAL_TAMPER": 1,
"T.PHYSICAL_TAMPER": 1,
"T.REPLACEMENT": 1,
"T.RESIDUAL_LEAK": 1,
"T.SIGNAL_LEAK": 1,
"T.UNAUTHORIZED_DEVICES": 1,
"T.UNINTENDED_SWITCHING": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1,
"APE_TSS.1": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACF": 1,
"FDP_IFC.1": 2,
"FDP_IFF.1": 2,
"FDP_RIP": 1
},
"FIA": {
"FIA_UAU": 1,
"FIA_UID": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_SMF": 1,
"FMT_SMR": 1
},
"FPT": {
"FPT_FLS": 1,
"FPT_PHP": 2,
"FPT_TST": 1
},
"FTA": {
"FTA_ATH_EXT": 2,
"FTA_CIN_EXT": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20180227155530-05\u002700\u0027",
"/ModDate": "D:20180227155530-05\u002700\u0027",
"pdf_file_size_bytes": 538173,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1248c6eb76f1e260846cfd5e20e606949a425bb623eef1272f7c7b0a2940efb4",
"txt_hash": "8b8913a22a3aa2eedfac9d2070c741f0629ba770d3073261d5baf81361dc9e66"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "86a68f20816d75839d60e2a82fa9274529e771c1fb71cb5dcc66de8bb4c35149",
"txt_hash": "aa7b04e801aabd7d0b4840f6d4d5f855ef59292e9a9b3c5bcd319ae3a969cab6"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Other Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile for Peripheral Sharing Switch, Version 3.0",
"not_valid_after": "2020-01-18",
"not_valid_before": "2015-02-13",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "archived",
"version": "3.0"
}
}