This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| KYOCERA ECOSYS MA6000ifx, MA5500ifx, MA4500ifx,TA Triumph Adler P-6039i MFP, P-5539i MFP, P-4539i MFP,UTAX P-6039i MFP, P-5539i MFP, P-4539i MFP,with system firmware C0V_S0IS.C04.002 CSEC2022011 |
WorkCentre® 3655/3655i 2016 Xerox® ConnectKey® Technology 383-4-377 |
|
|---|---|---|
| name | KYOCERA ECOSYS MA6000ifx, MA5500ifx, MA4500ifx,TA Triumph Adler P-6039i MFP, P-5539i MFP, P-4539i MFP,UTAX P-6039i MFP, P-5539i MFP, P-4539i MFP,with system firmware C0V_S0IS.C04.002 | WorkCentre® 3655/3655i 2016 Xerox® ConnectKey® Technology |
| scheme | SE | CA |
| status | active | archived |
| not_valid_after | 22.06.2028 | 17.08.2021 |
| not_valid_before | 22.06.2023 | 17.08.2016 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA_MA6000.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-377%20Certificate%20original%20signed%20v1.0e.docx |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Kyocera%20ECOSYS%20MA6000ifx,%20MA5500ifx,%20MA4500ifx_1-0_22FMV6381-24.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-377%20CR%20v1.0e.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_ECOSYS_MA6000ifx_v100.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Xerox%20CK2.0%20WorkCentre%203655_ST_1.2.pdf |
| manufacturer | KYOCERA Document Solutions Inc. | Xerox Corporation |
| manufacturer_web | https://www.kyoceradocumentsolutions.com/ | https://www.xerox.com |
| security_level | EAL2+, ALC_FLR.2 | ALC_FLR.3, EAL2+ |
| dgst | 7c78e33bc02e807a | f086be82cffe6a92 |
| heuristics/cert_id | CSEC2022011 | 383-4-377 |
| heuristics/cpe_matches | {} | cpe:2.3:h:xerox:workcentre_3655:-:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_3655i:-:*:*:*:*:*:*:* |
| heuristics/extracted_sars | ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 | ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions | 04.002 | 2016, 3655 |
| maintenance_updates |
|
|
| pdf_data/cert_filename | CCRA_MA6000.pdf | 383-4-377 Certificate original signed v1.0e.docx |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id | ||
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx_1-0_22FMV6381-24.pdf | 383-4-377 CR v1.0e.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | ST_ECOSYS_MA6000ifx_v100.pdf | Xerox CK2.0 WorkCentre 3655_ST_1.2.pdf |
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | True | False |
| state/cert/extract_ok | True | False |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |