This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Xerox WorkCentre M35/M45/M55 and WorkCentre Pro 35/45/55 Advanced Multifunction System with Image Overwrite Security Service Maintenance Pack 2 CCEVS-VR-0093-2004 |
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.0.0.1) ANSSI-CC-2022/24 |
|
---|---|---|
name | Xerox WorkCentre M35/M45/M55 and WorkCentre Pro 35/45/55 Advanced Multifunction System with Image Overwrite Security Service Maintenance Pack 2 | NPCT7xx TPM2.0 rev 1.59 (configuration version 1.0.0.1) |
category | Multi-Function Devices | Trusted Computing |
scheme | US | FR |
status | archived | active |
not_valid_after | 07.09.2012 | 27.06.2027 |
not_valid_before | 11.02.2005 | 27.06.2022 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2022_241.0.0.1.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10022-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_24fr1.0.0.1.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10022-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_24en.pdf |
manufacturer | Xerox Corporation | Nuvoton Technology |
manufacturer_web | https://www.xerox.com | |
security_level | EAL2 | EAL4+, ALC_DVS.2, AVA_VAN.4, ALC_FLR.1 |
dgst | 2b06d8484363c0f0 | 7344c4e7c1d74982 |
heuristics/cert_id | CCEVS-VR-0093-2004 | ANSSI-CC-2022/24 |
heuristics/cert_lab | US | [] |
heuristics/cpe_matches | cpe:2.3:h:xerox:workcentre_m55:2.28.11.000:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m45:2.97.20.032:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m55:2.97.20.032:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m45:2.28.11.000:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m35:2.28.11.000:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m35:2.97.20.032:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2005-0703, CVE-2005-1179 | {} |
heuristics/extracted_sars | AVA_VLA.2, AGD_ADM.1, ATE_FUN.1, ATE_HLD.1, ATE_COV.1, AVA_SOF.1, ADV_RCR.1, ADV_FSP.1, AGD_USR.1, ATE_IND.2, ADV_HLD.1 | ALC_DVS.2, ALC_FLR.1, AVA_VAN.4 |
heuristics/extracted_versions | 45, 35, 2, 55 | 1.0.0.1, 1.59, 2.0 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2021/49 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-PP-2018/03, ANSSI-CC-2018/61, ANSSI-CC-2021/49, ANSSI-CC-2020/21 |
heuristics/protection_profiles | {} | edccaca44d27fedc |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf |
pdf_data/cert_filename | certificat-2022_241.0.0.1.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid10022-vr.pdf | anssi-cc-2022_24fr1.0.0.1.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid10022-st.pdf | anssi-cible-cc-2022_24en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |