This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Lexmark CX920, CX921, CX922, CX923, CX924, XC9235, XC9245, XC9255, and XC9265 Multi-Function Printers 383-4-434 |
S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure Libraries including specific IC Dedicated software (Référence : S3FV9RR_20200925) ANSSI-CC-2021/09 |
|
---|---|---|
name | Lexmark CX920, CX921, CX922, CX923, CX924, XC9235, XC9245, XC9255, and XC9265 Multi-Function Printers | S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure Libraries including specific IC Dedicated software (Référence : S3FV9RR_20200925) |
category | Multi-Function Devices | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
status | archived | active |
not_valid_after | 07.02.2023 | 22.03.2026 |
not_valid_before | 07.02.2018 | 22.03.2021 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-434%20CT%201.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2021_09fr.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-434%20CR%201.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021-09fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20HD%20CXTMH%20Security%20Target%2016.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2021_09en.pdf |
manufacturer | Lexmark International, Inc. | Samsung Electronics Co., Ltd. |
manufacturer_web | https://www.lexmark.com/ | https://www.samsung.com |
security_level | {} | ASE_TSS.2, EAL6+ |
dgst | a9944579de84e71d | 1a32a59ae72b4fae |
heuristics/cert_id | 383-4-434 | ANSSI-CC-2021/09 |
heuristics/cpe_matches | cpe:2.3:h:lexmark:cx922:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx923:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:xc9255:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx924:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx921:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:xc9265:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:xc9235:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:xc9245:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx920:-:*:*:*:*:*:*:* | {} |
heuristics/extracted_sars | {} | ADV_SPM.1, AGD_OPE.1, ATE_COV.3, ALC_DEL.1, ADV_TDS.5, ASE_INT.1, ADV_ARC.1, ALC_CMC.5, ADV_FSP.5, AVA_VAN.5, ASE_ECD.1, ATE_DPT.3, ALC_LCD.1, ASE_REQ.2, ALC_DVS.2, ASE_OBJ.2, ATE_IND.2, ADV_IMP.2, ASE_TSS.2, ALC_CMS.5, ASE_CCL.1, ADV_INT.3, ATE_FUN.2, ASE_SPD.1, AGD_PRE.1, ALC_TAT.3 |
heuristics/extracted_versions | - | 32 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2021/34 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2020/71 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2021/34 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2020/71, ANSSI-CC-2018/40 |
heuristics/protection_profiles | b2cfec7a92fa2940 | cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename | 383-4-434 CT 1.0e.pdf | certificat_2021_09fr.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-434 CR 1.0e.pdf | anssi-cc-2021-09fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | anssi-cible-2021_09en.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library | ||
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |