This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| Lexmark CX920, CX921, CX922, CX923, CX924, XC9235, XC9245, XC9255, and XC9265 Multi-Function Printers 383-4-434 |
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.1.1) ANSSI-CC-2022/30 |
|
|---|---|---|
| name | Lexmark CX920, CX921, CX922, CX923, CX924, XC9235, XC9245, XC9255, and XC9265 Multi-Function Printers | NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.1.1) |
| category | Multi-Function Devices | Trusted Computing |
| scheme | CA | FR |
| status | archived | active |
| not_valid_after | 07.02.2023 | 27.06.2027 |
| not_valid_before | 07.02.2018 | 27.06.2022 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-434%20CT%201.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2022_301.3.1.1.pdf |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-434%20CR%201.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_30fr1.3.1.1.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20HD%20CXTMH%20Security%20Target%2016.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_30fr1.3.1.1.pdf |
| manufacturer | Lexmark International, Inc. | Nuvoton Technology |
| manufacturer_web | https://www.lexmark.com/ | |
| security_level | {} | EAL4+, AVA_VAN.4, ALC_DVS.2, ALC_FLR.1 |
| dgst | a9944579de84e71d | a0bbe22481966bec |
| heuristics/cert_id | 383-4-434 | ANSSI-CC-2022/30 |
| heuristics/cpe_matches | cpe:2.3:h:lexmark:xc9255:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx922:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:xc9265:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx920:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:xc9245:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:xc9235:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx924:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx921:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx923:-:*:*:*:*:*:*:* | cpe:2.3:h:nuvoton:npct7xx:-:*:*:*:*:*:*:* |
| heuristics/extracted_sars | {} | ALC_FLR.1, AVA_VAN.4, ALC_DVS.2 |
| heuristics/extracted_versions | - | 1.3.1.1, 2.0, 1.59 |
| heuristics/report_references/directly_referencing | {} | ANSSI-CC-2021/51 |
| heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-PP-2018/03, ANSSI-CC-2018/61, ANSSI-CC-2021/51, ANSSI-CC-2020/21 |
| heuristics/st_references/directly_referencing | {} | ANSSI-CC-2021/51 |
| heuristics/st_references/indirectly_referencing | {} | ANSSI-CC-2021/51 |
| heuristics/protection_profiles | b2cfec7a92fa2940 | edccaca44d27fedc |
| maintenance_updates |
|
|
| protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf |
| pdf_data/cert_filename | 383-4-434 CT 1.0e.pdf | certificat-2022_301.3.1.1.pdf |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | 383-4-434 CR 1.0e.pdf | anssi-cc-2022_30fr1.3.1.1.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | anssi-cc-2022_30fr1.3.1.1.pdf | |
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr | ||
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor | ||
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto | ||
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme | ||
| pdf_data/st_keywords/crypto_protocol | ||
| pdf_data/st_keywords/randomness | ||
| pdf_data/st_keywords/cipher_mode | ||
| pdf_data/st_keywords/ecc_curve | ||
| pdf_data/st_keywords/crypto_engine | ||
| pdf_data/st_keywords/tls_cipher_suite | ||
| pdf_data/st_keywords/crypto_library | ||
| pdf_data/st_keywords/vulnerability | ||
| pdf_data/st_keywords/side_channel_analysis | ||
| pdf_data/st_keywords/technical_report_id | ||
| pdf_data/st_keywords/device_model | ||
| pdf_data/st_keywords/tee_name | ||
| pdf_data/st_keywords/os_name | ||
| pdf_data/st_keywords/cplc_data | ||
| pdf_data/st_keywords/ic_data_group | ||
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version | ||
| pdf_data/st_keywords/javacard_api_const | ||
| pdf_data/st_keywords/javacard_packages | ||
| pdf_data/st_keywords/certification_process | ||
| pdf_data/st_metadata |
|
|
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/convert_ok | False | True |
| state/st/download_ok | False | True |
| state/st/extract_ok | False | True |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |