Security Target
Version 1.1
2022-03-08
9
The IOGEAR Secure KVM products implement a secure isolation design for all models to share a single set
of peripheral components. Each peripheral has its own dedicated data path. USB keyboard and mouse
peripherals are filtered and emulated. The USB authentication device connection is on a separate circuit
from the keyboard and mouse and, after filtering for qualification, has a direct connection path to the
selected computer. The TOE does not emulate the user authentication device function. DisplayPort video
from the selected computer is converted internally to HDMI, then back to DisplayPort for communication
with the connected video display and the AUX channel is monitored and converted to EDID.
The Secure KVM Switch products are designed to enforce the allowed and disallowed data flows between
user peripheral devices and connected computers as specified in [PSD]. Data leakage is prevented across
the TOE to avoid compromise of the user's information. The Secure KVM Switch products automatically
clear the internal TOE keyboard and mouse buffers.
Figure 1 shows the data path design using a 2-Port KVM as an example.
Figure 1: Simplified Block Diagram of a 2-Port KVM TOE
As shown in Figure 1 above, the internal components of the KVM consist of switches, emulators, USB host
controllers, processors, and embedded with non-updateable firmware v1.1.101. The internal hardware
components are identified in Appendix A and include the manufacturer and the part number. The data
flow of USB keyboard/mouse is controlled by the host controller for console HID keyboard and pointing
devices. Details of the data flow architecture are provided in the proprietary Secure KVM Isolation
Document. All keyboard and mouse connections are filtered first, and only authorized devices will be
allowed. The TOE emulates data from authorized USB keyboard and mouse to USB data for computer
sources.