Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
2019-48-INF-3811
Xerox D95/D110/D125 Copier/Printer Controller+PS ROM Ver. 1.204.17
JISEC-CC-CRP-C0618-01-2018
name Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A Xerox D95/D110/D125 Copier/Printer Controller+PS ROM Ver. 1.204.17
category ICs, Smart Cards and Smart Card-Related Devices and Systems Multi-Function Devices
scheme ES JP
status active archived
not_valid_after 07.06.2027 28.09.2023
not_valid_before 07.06.2022 28.09.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48_Certificado.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0618_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20INF-3811.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0618_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20ST_lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0618_est.pdf
manufacturer Winbond Electonics Corporation Xerox Corporation
manufacturer_web https://www.winbond.com/ https://www.xerox.com
security_level AVA_VAN.5, EAL5+, ALC_DVS.2 ALC_FLR.2, EAL2+
dgst 51a1149f945dea23 663487d9670a8f4f
heuristics/cert_id 2019-48-INF-3811 JISEC-CC-CRP-C0618-01-2018
heuristics/extracted_sars ATE_COV.2, ASE_TSS.1, ALC_CMS.5, ASE_ECD.1, AGD_PRE.1, AVA_VAN.5, ALC_TAT.2, ASE_OBJ.2, AGD_OPE.1, ALC_DVS.2, ATE_FUN.1, ADV_TDS.4, ADV_INT.2, ATE_DPT.3, ASE_REQ.2, ADV_ARC.1, ADV_IMP.1, ALC_DEL.1, ASE_INT.1, ALC_CMC.4, ASE_CCL.1, ALC_LCD.1, ADV_FSP.5, ASE_SPD.1 ASE_TSS.1, ASE_ECD.1, ALC_CMC.2, AGD_PRE.1, ATE_IND.2, ASE_OBJ.2, AGD_OPE.1, ATE_FUN.1, ASE_REQ.2, ADV_TDS.1, ADV_ARC.1, ATE_COV.1, AVA_VAN.2, ALC_DEL.1, ALC_FLR.2, ASE_INT.1, ALC_CMS.2, ASE_CCL.1, ADV_FSP.2, ASE_SPD.1
heuristics/extracted_versions - 1.204.17
heuristics/scheme_data
  • category: Smart Cards and similiar devices
  • certification_date: 07.06.2022
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1478
    • certification_date: 07.06.2022
    • description: The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc. and will be working in a hostile environment. In particular, the TOE main function is the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC.
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: Winbond Electronics Corporation
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1479
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1477
    • type: Product
  • manufacturer: Winbond Electronics Corporation
  • product: Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/826-winbond-spiflash-trustme-secure-flash-memory-w75f40wbyjeg-version-a
  • cert_id: JISEC-CC-CRP-C0618
  • certification_date: 01.09.2018
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_id: JISEC-CC-CRP-C0618
    • cert_link: https://www.ipa.go.jp/en/security/c0618_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, and scan. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE Security functions To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Xerox D95/D110/D125 Copier/Printer
    • product_type: Multi-Function Device
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0618_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0618_est.pdf
    • toe_version: Controller+PS ROM Ver. 1.204.17
    • vendor: Xerox Corporation
  • expiration_date: 01.10.2023
  • supplier: Xerox Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0618_it7650.html
  • toe_overseas_name: Xerox D95/D110/D125 Copier/Printer Controller+PS ROM Ver. 1.204.17
heuristics/protection_profiles {} 43ce79b420f23a00
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/cert_filename 2019-48_Certificado.pdf c0618_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0618-01-2018: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL5: 1
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/report_filename 2019-48 INF-3811.pdf c0618_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2019-48-INF-3811- v1: 1
  • JP:
    • JISEC-CC-CRP-C0618-01-2018: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 8
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 9
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFC.1: 1
    • FDP_RIP.1: 1
    • FDP_SDI.2: 1
    • FDP_UIT.1: 1
  • FMT:
    • FMT_LIM.1: 1
  • FPT:
    • FPT_FLS: 2
    • FPT_ITT.1: 1
    • FPT_TRP.1: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 16
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 5
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 4
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 5
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 2
  • other:
    • JIL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 964023
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /CreationDate: D:20181220165356+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20181220165832+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 378338
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 37
pdf_data/st_filename 2019-48 ST_lite.pdf c0618_est.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 6
    • EAL5 augmented: 2
  • EAL:
    • EAL 2: 1
    • EAL2: 2
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 3
    • ADV_FSP.4: 1
    • ADV_FSP.5: 8
    • ADV_IMP.1: 9
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 9
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 5
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 10
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF: 1
    • FDP_IFC.1: 27
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 4
    • FDP_ITT.1: 13
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_SDC: 4
    • FDP_SDC.1: 16
    • FDP_SDC.1.1: 2
    • FDP_SDI: 1
    • FDP_SDI.2: 11
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 22
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 2
  • FPT:
    • FPT_FLS: 24
    • FPT_FLS.1: 3
    • FPT_ITT.1: 12
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 14
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 12
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_COP: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 74
    • FDP_ACC.1.1: 6
    • FDP_ACF.1: 67
    • FDP_ACF.1.1: 6
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 6
    • FDP_IFC: 1
    • FDP_IFC.1: 6
    • FDP_IFF: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 21
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 8
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID: 4
    • FIA_UID.1: 13
    • FIA_UID.2: 20
    • FIA_UID.2.1: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 76
    • FMT_MSA.1.1: 6
    • FMT_MSA.3: 68
    • FMT_MSA.3.1: 6
    • FMT_MSA.3.2: 6
    • FMT_MTD.1: 21
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 33
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 37
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 16
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 13
    • D.DOC: 54
    • D.FUNC: 17
    • D.PROT: 4
  • O:
    • O.AUDIT: 8
    • O.AUDIT_ACCESS: 10
    • O.AUDIT_STORAGE: 9
    • O.CIPHER: 8
    • O.CONF: 16
    • O.DOC: 16
    • O.FUNC: 8
    • O.INTERFACE: 8
    • O.PROT: 8
    • O.SOFTWARE: 8
    • O.USER: 14
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 4
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_STORAGE: 1
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
  • DES:
    • 3DES:
      • Triple-DES: 4
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 1
    • SHA2:
      • SHA256: 6
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 19
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Fault Injection: 1
    • Malfunction: 17
    • fault injection: 2
    • malfunction: 3
    • physical tampering: 3
  • SCA:
    • Leak-Inherent: 17
    • Physical Probing: 2
    • physical probing: 5
  • FI:
    • malfunction: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
  • X509:
    • X.509: 3
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
pdf_data/st_metadata
  • /CreationDate: D:20181220110735+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20181220113101+09'00'
  • /Producer: Acrobat Distiller 10.1.16 (Windows)
  • /Subject: Security Target
  • /Title: Xerox D95/D110/D125 Copier/Printer
  • pdf_file_size_bytes: 740005
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 124
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different