Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Lexmark CX622h, CX625h, CX921, CX922, CX923, CX924, MX522, MX622h, MX721h, MX722h, MX822, and MX826 with HD
CSEC2017017
Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)
ANSSI-CC-2023/60
name Lexmark CX622h, CX625h, CX921, CX922, CX923, CX924, MX522, MX622h, MX721h, MX722h, MX822, and MX826 with HD Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme SE FR
status archived active
not_valid_after 19.06.2024 19.01.2029
not_valid_before 19.06.2019 19.01.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificate%20Lexmark%20MFP%20wHD%202017%20CCRA.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_60en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Lexmark%202017%20MFD%20wHD.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20HD%20Security%20Target%20111.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf
manufacturer Lexmark International, Inc. Apple Inc.
manufacturer_web https://www.lexmark.com/ https://www.apple.com/
security_level EAL3, ALC_FLR.3 EAL2+, ADV_FSP.3
dgst 44e6981b1653ed8b 6207e27699db6695
heuristics/cert_id CSEC2017017 ANSSI-CC-2023/60
heuristics/cpe_matches cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx924:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx923:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx921:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx922:-:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-27801, CVE-2023-32416, CVE-2023-38592, CVE-2024-23215, CVE-2023-41073, CVE-2023-40400, CVE-2024-54542, CVE-2024-44225, CVE-2024-44254, CVE-2024-23226, CVE-2023-32390, CVE-2024-40850, CVE-2023-35993, CVE-2024-40784, CVE-2023-32402, CVE-2023-41982, CVE-2023-41074, CVE-2024-54514, CVE-2024-27821, CVE-2024-23296, CVE-2024-54551, CVE-2024-27808, CVE-2025-24117, CVE-2024-40822, CVE-2024-44198, CVE-2024-54530, CVE-2024-23207, CVE-2023-42890, CVE-2024-27830, CVE-2024-23293, CVE-2024-44297, CVE-2023-42946, CVE-2024-27851, CVE-2024-40774, CVE-2023-42947, CVE-2023-34425, CVE-2025-24137, CVE-2024-27826, CVE-2024-44240, CVE-2023-32361, CVE-2023-41254, CVE-2024-40818, CVE-2023-32357, CVE-2024-44233, CVE-2024-23289, CVE-2023-38606, CVE-2024-40779, CVE-2024-54523, CVE-2024-40788, CVE-2024-54494, CVE-2024-23231, CVE-2024-27814, CVE-2023-32381, CVE-2024-54538, CVE-2023-40520, CVE-2023-38133, CVE-2023-32396, CVE-2023-32394, CVE-2024-54560, CVE-2024-27820, CVE-2023-32354, CVE-2024-23263, CVE-2023-40429, CVE-2024-44273, CVE-2023-41976, CVE-2024-23235, CVE-2024-23280, CVE-2023-40412, CVE-2023-42878, CVE-2025-24161, CVE-2024-23287, CVE-2024-54486, CVE-2024-27804, CVE-2024-54522, CVE-2024-40812, CVE-2024-54508, CVE-2023-41968, CVE-2024-44212, CVE-2023-38572, CVE-2024-23210, CVE-2023-28202, CVE-2023-40528, CVE-2023-42834, CVE-2023-40408, CVE-2025-24129, CVE-2024-0258, CVE-2024-40782, CVE-2024-27863, CVE-2023-40413, CVE-2024-23211, CVE-2023-42848, CVE-2024-54534, CVE-2025-24160, CVE-2023-32433, CVE-2024-27805, CVE-2023-42950, CVE-2024-23201, CVE-2024-27834, CVE-2023-41988, CVE-2023-32407, CVE-2024-44269, CVE-2023-40414, CVE-2023-32734, CVE-2024-23297, CVE-2024-27840, CVE-2023-39434, CVE-2024-40835, CVE-2023-41070, CVE-2024-44244, CVE-2024-23290, CVE-2023-32423, CVE-2023-42898, CVE-2023-40447, CVE-2023-32434, CVE-2024-54479, CVE-2024-54517, CVE-2024-27811, CVE-2024-54499, CVE-2024-23288, CVE-2023-42953, CVE-2024-23246, CVE-2023-42942, CVE-2024-23225, CVE-2025-24086, CVE-2024-44170, CVE-2024-54497, CVE-2024-23208, CVE-2024-27815, CVE-2023-38580, CVE-2024-23213, CVE-2023-32389, CVE-2023-41984, CVE-2023-36495, CVE-2024-40785, CVE-2024-44282, CVE-2023-32388, CVE-2024-27806, CVE-2023-32400, CVE-2024-44155, CVE-2024-23217, CVE-2025-24126, CVE-2024-27832, CVE-2024-23250, CVE-2023-32384, CVE-2023-38599, CVE-2023-42949, CVE-2024-23286, CVE-2024-54510, CVE-2023-41997, CVE-2023-28191, CVE-2023-32413, CVE-2024-44285, CVE-2023-38600, CVE-2024-44239, CVE-2024-44234, CVE-2025-24163, CVE-2023-42937, CVE-2023-28204, CVE-2023-40420, CVE-2023-38590, CVE-2024-40809, CVE-2025-24085, CVE-2024-23212, CVE-2023-32417, CVE-2024-44232, CVE-2023-37450, CVE-2024-54502, CVE-2024-44191, CVE-2023-35990, CVE-2023-40409, CVE-2023-42846, CVE-2024-40793, CVE-2023-32408, CVE-2024-27880, CVE-2023-42852, CVE-2023-40410, CVE-2023-40396, CVE-2023-35074, CVE-2023-40452, CVE-2024-23291, CVE-2023-41061, CVE-2023-34352, CVE-2024-40857, CVE-2023-38611, CVE-2023-32399, CVE-2024-27838, CVE-2023-41071, CVE-2024-54527, CVE-2024-40813, CVE-2023-42899, CVE-2023-32403, CVE-2023-40417, CVE-2024-40776, CVE-2024-44144, CVE-2023-40399, CVE-2024-23206, CVE-2023-42957, CVE-2024-23239, CVE-2024-40815, CVE-2025-24131, CVE-2023-38565, CVE-2024-44176, CVE-2023-32392, CVE-2023-40432, CVE-2024-27800, CVE-2024-27810, CVE-2023-32368, CVE-2024-54512, CVE-2023-32428, CVE-2024-54467, CVE-2023-42883, CVE-2024-54658, CVE-2024-40799, CVE-2024-27828, CVE-2024-27859, CVE-2023-32373, CVE-2024-44274, CVE-2023-32432, CVE-2023-32372, CVE-2023-27930, CVE-2024-23251, CVE-2024-44169, CVE-2024-54526, CVE-2024-23218, CVE-2023-38598, CVE-2024-54518, CVE-2023-42914, CVE-2023-42936, CVE-2023-40427, CVE-2023-40454, CVE-2023-32412, CVE-2023-41174, CVE-2024-40789, CVE-2024-44255, CVE-2024-44302, CVE-2023-42849, CVE-2024-44192, CVE-2023-40419, CVE-2023-38593, CVE-2023-32409, CVE-2024-54525, CVE-2023-32425, CVE-2024-44278, CVE-2024-40806, CVE-2023-40395, CVE-2023-40424, CVE-2025-24123, CVE-2023-32441, CVE-2023-41981, CVE-2024-23204, CVE-2023-32376, CVE-2024-44183, CVE-2024-44194, CVE-2024-40795, CVE-2024-40824, CVE-2024-23278, CVE-2023-35984, CVE-2024-23284, CVE-2023-42866, CVE-2024-44296, CVE-2024-54468, CVE-2024-44290, CVE-2023-32404, CVE-2024-23271, CVE-2024-23265, CVE-2025-24158, CVE-2024-44187, CVE-2023-41065, CVE-2023-42893, CVE-2023-32352, CVE-2023-32398, CVE-2024-27823, CVE-2023-38136, CVE-2025-24124, CVE-2024-54500, CVE-2024-27816, CVE-2024-27884, CVE-2024-44215, CVE-2023-32445, CVE-2025-24159, CVE-2024-54543, CVE-2023-42839, CVE-2024-54501, CVE-2023-38594, CVE-2025-24162, CVE-2023-40456, CVE-2024-23282, CVE-2023-38604, CVE-2024-54478, CVE-2023-32420, CVE-2023-32391, CVE-2023-40403, CVE-2024-54513, CVE-2024-40777, CVE-2024-40787, CVE-2024-40805, CVE-2024-44185, CVE-2024-40829, CVE-2024-54535, CVE-2023-38596, CVE-2024-44171, CVE-2024-54505, CVE-2023-41068, CVE-2023-42888, CVE-2024-54541, CVE-2024-40780, CVE-2024-27856, CVE-2024-23254, CVE-2023-38595, CVE-2023-40448, CVE-2025-24149, CVE-2023-42823, CVE-2025-24107, CVE-2024-40836, CVE-2024-23223
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions - 9.4
pdf_data/cert_filename Certificate Lexmark MFP wHD 2017 CCRA.pdf certificat-CC-2023_60en.pdf
pdf_data/cert_keywords/cc_cert_id
  • SE:
    • CSEC2017017: 1
  • FR:
    • ANSSI-CC-2023/60: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL3+: 1
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • ADV:
    • ADV_FSP.3: 1
pdf_data/cert_keywords/eval_facility
  • Combitech:
    • Combitech AB: 1
  • EWA:
    • EWA-Canada: 1
  • Thales:
    • THALES/CNES: 2
pdf_data/cert_metadata
  • /CreationDate: D:20190619093135+02'00'
  • /Creator: RICOH MP C4504ex
  • /ModDate: D:20190619110000+02'00'
  • /Producer: RICOH MP C4504ex
  • pdf_file_size_bytes: 971223
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20240222154647+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155209+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 138059
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename Certification Report Lexmark 2017 MFD wHD.pdf ANSSI-CC-2023_60en.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • SE:
    • CSEC2017017: 1
  • FR:
    • ANSSI-CC-2023/60: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL2: 1
    • EAL3: 1
    • EAL3+: 1
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 1
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Basic: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 5
    • ALC_LCD.1: 1
  • APE:
    • APE_ECD: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SPD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.IPSEC: 1
    • A.USER: 1
    • A.VIPER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/eval_facility
  • Combitech:
    • Combitech AB: 5
  • EWA:
    • EWA-Canada: 3
  • Thales:
    • THALES/CNES: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ISO:
    • ISO/IEC 17025: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • /Author: Imre Juhasz
  • /CreationDate: D:20190619091437+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20190619115718+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 17FMV8490-21:1
  • /Title: Certification Report - Lexmark MFP wHD 2017
  • pdf_file_size_bytes: 423770
  • pdf_hyperlinks: http://www.fmv.se/Global/Dokument/Verksamhet/CSEC/Scheme_Note_15.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename Lexmark HD Security Target 111.pdf ANSSI-cible-CC-2023_60en.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 4
    • EAL3 augmented: 3
    • EAL3+: 2
    • EAL5+: 1
  • EAL:
    • EAL 2: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 6
    • ALC_LCD.1: 1
  • APE:
    • APE_ECD: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SPD: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 2
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 1
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 1
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 13
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 21
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 24
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 1
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 21
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 15
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 22
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 13
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FDP:
    • FDP_ACC: 22
    • FDP_ACC.1: 11
    • FDP_ACC.2: 4
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 20
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 7
    • FDP_ETC.2: 2
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 8
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 9
    • FIA_AFL.1: 5
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 12
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.IPSEC: 4
    • A.TYPE: 1
    • A.USER: 3
    • A.VIPER: 3
  • D:
    • D.CONF: 8
    • D.DOC: 7
    • D.FUNC: 6
    • D.PROT: 3
  • O:
    • O.AUDIT: 5
    • O.CONF: 10
    • O.DOC: 10
    • O.FUNC: 5
    • O.INTERFACE: 5
    • O.MANAGE: 6
    • O.PROT: 3
    • O.SOFTWARE: 5
    • O.TIME_STAMP: 6
    • O.USER: 9
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 2
    • OE.IPSEC: 4
    • OE.PHYSICAL: 3
    • OE.TIME_STAMP: 4
    • OE.USER: 11
    • OE.VIPER: 3
  • OSP:
    • OSP: 1
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
    • T.TYPE: 1
  • A:
    • A.CDCVM: 3
    • A.DE-: 2
    • A.DEVICE_AUTH: 1
    • A.IPH-: 2
    • A.IPHONE_USER: 1
    • A.PERSO: 3
  • D:
    • D.OS: 16
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • TDES: 1
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 4
      • SHA-384: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 9
  • IPsec:
    • IPsec: 3
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 2
  • TRNG:
    • TRNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 1
    • FIPS 186-4: 1
    • FIPS 197: 1
    • FIPS 198-1: 1
  • ISO:
    • ISO/IEC 10116: 1
    • ISO/IEC 18033-3: 1
  • NIST:
    • NIST SP 800-56B: 1
    • NIST SP 800-90A: 2
    • SP 800-56B: 1
    • SP 800-90A: 1
  • RFC:
    • RFC 3164: 1
    • RFC2409: 1
  • X509:
    • X.509: 2
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_metadata
  • /CreationDate: D:20231109133713Z
  • /Creator: Word
  • /ModDate: D:20231109133737Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx
  • pdf_file_size_bytes: 2365643
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different