This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| Lexmark MX522 and MX622h Multi-Function Printers with firmware version MXTGM.052.025 & Lexmark Secure Element (P/N 57X0185) 383-4-463 |
ASEPcos-CNS/CIE with with Digital Signature Application embedded on secure microcontroller AT90SC12872RCFT ANSSI-CC-2008/22 |
|
|---|---|---|
| name | Lexmark MX522 and MX622h Multi-Function Printers with firmware version MXTGM.052.025 & Lexmark Secure Element (P/N 57X0185) | ASEPcos-CNS/CIE with with Digital Signature Application embedded on secure microcontroller AT90SC12872RCFT |
| category | Multi-Function Devices | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme | CA | FR |
| not_valid_after | 05.03.2024 | 01.09.2019 |
| not_valid_before | 05.03.2019 | 28.07.2008 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-463%20CT%20v1.1e%20-%20original%20signed.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-463%20CR%201.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_22en.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20HD%20MXTGM%20Security%20Target%2015.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2008_22en.pdf |
| manufacturer | Lexmark International, Inc. | Athena Smartcard Solutions Inc |
| manufacturer_web | https://www.lexmark.com/ | https://www.athena-scs.com/ |
| security_level | {} | EAL4+, AVA_VLA.4, AVA_MSU.3 |
| dgst | 7049a80999dc6757 | dce5810d915c2926 |
| heuristics/cert_id | 383-4-463 | ANSSI-CC-2008/22 |
| heuristics/cert_lab | [] | CEACI |
| heuristics/cpe_matches | cpe:2.3:o:lexmark:mx522_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:* | {} |
| heuristics/related_cves | CVE-2023-22960, CVE-2021-44734, CVE-2021-44738, CVE-2021-44735, CVE-2022-29850, CVE-2021-44737, CVE-2023-23560 | {} |
| heuristics/extracted_sars | {} | ADV_LLD.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, ATE_IND.2, AVA_VLA.4, ADV_RCR.1, ADV_HLD.2, AVA_SOF.1, ATE_FUN.1, AGD_USR.1, ATE_COV.2, ADV_IMP.1, AVA_MSU.3, ADV_SPM.1, ALC_DVS.1 |
| heuristics/extracted_versions | 052.025 | - |
| heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2009/04 |
| heuristics/report_references/directly_referencing | {} | ANSSI-CC-2008/05, ANSSI-CC-2007/22 |
| heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2010/05, ANSSI-CC-2009/04, ANSSI-CC-2009/59, ANSSI-CC-2010/60, ANSSI-CC-2009/41 |
| heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2008/05, ANSSI-CC-2008/03, ANSSI-CC-2007/22, ANSSI-CC-2007/04 |
| heuristics/st_references/directly_referencing | {} | ANSSI-CC-2008/05 |
| heuristics/st_references/indirectly_referencing | {} | ANSSI-CC-2008/05 |
| heuristics/protection_profiles | b2cfec7a92fa2940 | {} |
| protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | {} |
| pdf_data/cert_filename | 383-4-463 CT v1.1e - original signed.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id | ||
| pdf_data/cert_keywords/cc_security_level | ||
| pdf_data/cert_keywords/cc_sar | ||
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | 383-4-463 CR 1.0e.pdf | dcssi-2008_22en.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | dcssi-cible2008_22en.pdf | |
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor | ||
| pdf_data/st_keywords/eval_facility | ||
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto | ||
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol | ||
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve | ||
| pdf_data/st_keywords/crypto_engine | ||
| pdf_data/st_keywords/tls_cipher_suite | ||
| pdf_data/st_keywords/crypto_library | ||
| pdf_data/st_keywords/vulnerability | ||
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id | ||
| pdf_data/st_keywords/device_model | ||
| pdf_data/st_keywords/tee_name | ||
| pdf_data/st_keywords/os_name | ||
| pdf_data/st_keywords/cplc_data | ||
| pdf_data/st_keywords/ic_data_group | ||
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version | ||
| pdf_data/st_keywords/javacard_api_const | ||
| pdf_data/st_keywords/javacard_packages | ||
| pdf_data/st_keywords/certification_process | ||
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | True | False |
| state/cert/download_ok | True | False |
| state/cert/extract_ok | True | False |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/convert_ok | False | True |
| state/st/download_ok | False | True |
| state/st/extract_ok | False | True |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |