This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Lexmark MS822 and MS826 Single-Function Printers with firmware version MSTGW.052.025 with Lexmark Secure Element (P/N 57X0185) 383-4-472 |
S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software ANSSI-CC-2017/24 |
|
---|---|---|
name | Lexmark MS822 and MS826 Single-Function Printers with firmware version MSTGW.052.025 with Lexmark Secure Element (P/N 57X0185) | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software |
category | Multi-Function Devices | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
not_valid_after | 24.01.2024 | 11.05.2022 |
not_valid_before | 24.01.2019 | 11.05.2017 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-472%20CT%20v1.1e%20-%20original%20signed.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-472%20CR%201.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_24fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20SFP%20MSTGW%20Security%20Target%2014.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible2017_24en.pdf |
manufacturer | Lexmark International, Inc. | Samsung Electronics Co., Ltd. |
manufacturer_web | https://www.lexmark.com/ | https://www.samsung.com |
security_level | {} | EAL6+, ASE_TSS.2 |
dgst | 4f3bb38002e116ad | b13211f522604a24 |
heuristics/cert_id | 383-4-472 | ANSSI-CC-2017/24 |
heuristics/cert_lab | [] | CEA |
heuristics/cpe_matches | cpe:2.3:h:lexmark:ms826:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:ms822_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:ms826_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:ms822:-:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2021-44738, CVE-2023-23560, CVE-2021-44734, CVE-2022-29850, CVE-2021-44737, CVE-2021-44735, CVE-2023-22960 | {} |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions | 052.025 | 16 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2018/32, ANSSI-CC-2018/58, ANSSI-CC-2018/56v2, ANSSI-CC-2018/58v2, ANSSI-CC-2018/57, ANSSI-CC-2019/07, ANSSI-CC-2018/57v2, ANSSI-CC-2019/31, ANSSI-CC-2018/32v2, ANSSI-CC-2018/33, ANSSI-CC-2018/53, ANSSI-CC-2018/56 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2016/59 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2020/93, ANSSI-CC-2018/32, ANSSI-CC-2018/58, ANSSI-CC-2018/56v2, ANSSI-CC-2018/58v2, ANSSI-CC-2018/57, ANSSI-CC-2019/07, ANSSI-CC-2018/57v2, ANSSI-CC-2019/31, ANSSI-CC-2020/12, ANSSI-CC-2018/32v2, ANSSI-CC-2018/33, ANSSI-CC-2018/53, ANSSI-CC-2018/56 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2015/66, ANSSI-CC-2016/59 |
heuristics/st_references/directly_referenced_by | {} | ANSSI-CC-2018/32, ANSSI-CC-2018/56v2, ANSSI-CC-2018/58, ANSSI-CC-2018/58v2, ANSSI-CC-2018/57, ANSSI-CC-2018/57v2, ANSSI-CC-2019/31, ANSSI-CC-2018/32v2, ANSSI-CC-2018/56 |
heuristics/st_references/indirectly_referenced_by | {} | ANSSI-CC-2018/32, ANSSI-CC-2018/56v2, ANSSI-CC-2018/58, ANSSI-CC-2018/58v2, ANSSI-CC-2018/57, ANSSI-CC-2018/57v2, ANSSI-CC-2019/31, ANSSI-CC-2018/32v2, ANSSI-CC-2018/56 |
heuristics/protection_profiles | b2cfec7a92fa2940 | cf0f01bcd7be3e9c |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename | 383-4-472 CT v1.1e - original signed.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-472 CR 1.0e.pdf | anssi-cc-2017_24fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Lexmark SFP MSTGW Security Target 14.pdf | anssi_cible2017_24en.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |