This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| Xerox WorkCentre 4265 383-4-325 |
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4(iOS 17.4 (build 21E219)) (ANSSI-CC-2024/39) ANSSI-CC-2024/39 |
|
|---|---|---|
| name | Xerox WorkCentre 4265 | Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4(iOS 17.4 (build 21E219)) (ANSSI-CC-2024/39) |
| category | Multi-Function Devices | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme | CA | FR |
| status | archived | active |
| not_valid_after | 15.05.2020 | 08.01.2030 |
| not_valid_before | 15.05.2015 | 08.01.2025 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-325%20CT%20v1.0e.docx | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_39fr.pdf |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-325%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_39fr.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-325%20Xerox%204265_ST_1.3.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_39_fr.pdf |
| manufacturer | Xerox Corporation | Apple Inc. |
| manufacturer_web | https://www.xerox.com | https://www.apple.com/ |
| security_level | ALC_FLR.3, EAL2+ | EAL2+, ALC_FLR.3, ADV_FSP.3 |
| dgst | ad64c2df40c51042 | a2effca18709d4c6 |
| heuristics/cert_id | 383-4-325 | ANSSI-CC-2024/39 |
| heuristics/cert_lab | CANADA | [] |
| heuristics/cpe_matches | cpe:2.3:h:xerox:workcentre_265:-:*:*:*:*:*:*:* | {} |
| heuristics/related_cves | CVE-2006-6438, CVE-2006-6441, CVE-2006-5290, CVE-2006-0827, CVE-2006-6430, CVE-2006-0828, CVE-2006-0825, CVE-2006-0826, CVE-2006-6434, CVE-2006-6440, CVE-2006-6439, CVE-2006-6436 | {} |
| heuristics/extracted_sars | ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 | ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions | 4265 | 17.4 |
| pdf_data/cert_filename | 383-4-325 CT v1.0e.docx | Certificat-ANSSI-CC-2024_39fr.pdf |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id | ||
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility | ||
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | 383-4-325 CR v1.0e.pdf | ANSSI-CC-2024_39fr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | 383-4-325 Xerox 4265_ST_1.3.pdf | ANSSI-Cible-CC-2024_39_fr.pdf |
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | False | True |
| state/cert/extract_ok | False | True |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |