This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Huawei iTrustee 5.0 NSCIB-CC-19-0016828-CR |
Lexmark MX521, MX931, CX730, CX930, and CX931 MFPs with Trusted Platform Module without Fax and Hard Drive and with Firmware Version 081.234 589-EWA |
|
---|---|---|
name | Huawei iTrustee 5.0 | Lexmark MX521, MX931, CX730, CX930, and CX931 MFPs with Trusted Platform Module without Fax and Hard Drive and with Firmware Version 081.234 |
category | Operating Systems | Multi-Function Devices |
scheme | NL | CA |
status | archived | active |
not_valid_after | 19.12.2024 | 23.06.2028 |
not_valid_before | 19.12.2019 | 23.06.2023 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cert%20019-016828.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589-EWA%20CT.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-19-0016828-CR.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589%20EWA%20CR.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20CC%20Huawei%20iTrustee%20Software%20V5.0%20Security%20Target%20V6.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589-EWA_Lexmark_TPM_noFax_noHD_ST_112.pdf |
manufacturer | Huawei Technologies Co., Ltd. | Lexmark International, Inc. |
manufacturer_web | https://www.huawei.com | https://www.lexmark.com/ |
security_level | AVA_TEE.2, EAL2 | {} |
dgst | 5d570a7228cacac4 | c6f126baeb1591a3 |
heuristics/cert_id | NSCIB-CC-19-0016828-CR | 589-EWA |
heuristics/cert_lab | CANADA | |
heuristics/cpe_matches | {} | cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx521_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2021-44738, CVE-2023-23560, CVE-2021-44734, CVE-2022-29850, CVE-2021-44737, CVE-2021-44735, CVE-2023-22960 |
heuristics/extracted_sars | AVA_TEE.2 | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions | 5.0 | 081.234 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | {} | b2cfec7a92fa2940 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
pdf_data/cert_filename | cert 019-016828.pdf | 589-EWA CT.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | NSCIB-CC-19-0016828-CR.pdf | 589 EWA CR.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 589-EWA_Lexmark_TPM_noFax_noHD_ST_112.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme | ||
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library | ||
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/convert_garbage | True | False |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |