This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
HiSilicon MSP V1.0 NSCIB-CC-0138342-CR |
Xerox WorkCentre M35/M45/M55 and WorkCentre Pro 35/45/55 Advanced Multifunction System with Image Overwrite Security Service Maintenance Pack 2 CCEVS-VR-0093-2004 |
|
---|---|---|
name | HiSilicon MSP V1.0 | Xerox WorkCentre M35/M45/M55 and WorkCentre Pro 35/45/55 Advanced Multifunction System with Image Overwrite Security Service Maintenance Pack 2 |
category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Multi-Function Devices |
scheme | NL | US |
status | active | archived |
not_valid_after | 20.08.2025 | 07.09.2012 |
not_valid_before | 20.08.2020 | 11.02.2005 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-20-0138342.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0138342-CR.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10022-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/MSP%20V1.0%20on%20Kirin%209000%20Series%20Security%20Target%20V12.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10022-st.pdf |
manufacturer | HiSilicon | Xerox Corporation |
manufacturer_web | https://www.hisilicon.com/en/ | https://www.xerox.com |
security_level | ALC_DVS.2, EAL5+, AVA_VAN.5 | EAL2 |
dgst | 058c4cc41fe321e1 | 2b06d8484363c0f0 |
heuristics/cert_id | NSCIB-CC-0138342-CR | CCEVS-VR-0093-2004 |
heuristics/cert_lab | US | |
heuristics/cpe_matches | {} | cpe:2.3:h:xerox:workcentre_m55:2.97.20.032:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m55:2.28.11.000:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m35:2.97.20.032:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m45:2.28.11.000:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m45:2.97.20.032:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m35:2.28.11.000:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2005-1179, CVE-2005-0703 |
heuristics/extracted_sars | ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 | ATE_HLD.1, ADV_RCR.1, ADV_FSP.1, AVA_VLA.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
heuristics/extracted_versions | 1.0 | 55, 35, 2, 45 |
heuristics/report_references/directly_referenced_by | NSCIB-CC-0351648-CR | {} |
heuristics/report_references/indirectly_referenced_by | NSCIB-CC-0351648-CR | {} |
heuristics/scheme_data |
|
|
pdf_data/cert_filename | CC-20-0138342.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | NSCIB-CC-0138342-CR.pdf | st_vid10022-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | MSP V1.0 on Kirin 9000 Series Security Target V12.pdf | st_vid10022-st.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |