This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Lexmark MX521, MX931, CX730, CX930, and CX931 MFPs with Trusted Platform Module without Fax and Hard Drive and with Firmware Version 081.234 589-EWA |
Infineon smart card IC (Security Controller) M7801 A12 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0727-2011 |
|
---|---|---|
name | Lexmark MX521, MX931, CX730, CX930, and CX931 MFPs with Trusted Platform Module without Fax and Hard Drive and with Firmware Version 081.234 | Infineon smart card IC (Security Controller) M7801 A12 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software |
category | Multi-Function Devices | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | DE |
status | active | archived |
not_valid_after | 23.06.2028 | 01.09.2019 |
not_valid_before | 23.06.2023 | 17.05.2011 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589-EWA%20CT.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589%20EWA%20CR.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0727a_pdf.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589-EWA_Lexmark_TPM_noFax_noHD_ST_112.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0727b_pdf.pdf |
manufacturer | Lexmark International, Inc. | Infineon Technologies AG |
manufacturer_web | https://www.lexmark.com/ | https://www.infineon.com/ |
security_level | {} | AVA_VAN.5, EAL5+, ALC_DVS.2 |
dgst | c6f126baeb1591a3 | be0228c6f5a05654 |
heuristics/cert_id | 589-EWA | BSI-DSZ-CC-0727-2011 |
heuristics/cert_lab | CANADA | BSI |
heuristics/cpe_matches | cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx521_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2023-22960, CVE-2021-44734, CVE-2023-23560, CVE-2021-44735, CVE-2021-44738, CVE-2022-29850, CVE-2021-44737 | {} |
heuristics/extracted_sars | AGD_OPE.1, AGD_PRE.1, ASE_OBJ.1, ATE_IND.1, ASE_ECD.1, AVA_VAN.1, ASE_CCL.1, ALC_CMC.1, ADV_FSP.1, ALC_CMS.1, ASE_SPD.1, ASE_INT.1, ASE_TSS.1, ASE_REQ.1 | AGD_OPE.1, ALC_CMS.5, APE_SPD.1, ALC_TAT.2, ASE_ECD.1, ADV_TDS.4, APE_OBJ.2, APE_CCL.1, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ADV_IMP.1, ASE_SPD.1, ADV_INT.2, ASE_INT.1, ASE_OBJ.2, APE_INT.1, ASE_CCL.1, ASE_REQ.2, APE_ECD.1, ATE_DPT.3, APE_REQ.2, ATE_IND.2, ADV_SPM.1, ALC_FLR.3, AVA_VAN.5, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, ALC_DVS.2, ADV_FSP.5, ALC_CMC.4, AGD_PRE.1 |
heuristics/extracted_versions | 081.234 | 1.01, 1.02.008 |
heuristics/report_references/directly_referenced_by | {} | BSI-DSZ-CC-0726-2012, BSI-DSZ-CC-0764-2012 |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-0606-2010 |
heuristics/report_references/indirectly_referenced_by | {} | BSI-DSZ-CC-1117-2019, BSI-DSZ-CC-0764-2012, BSI-DSZ-CC-0980-2017, BSI-DSZ-CC-1055-2018, BSI-DSZ-CC-0726-2012, BSI-DSZ-CC-0889-2013 |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-0606-2010 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by | {} | BSI-DSZ-CC-0726-2012, BSI-DSZ-CC-0764-2012, ANSSI-CC-2014/14 |
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-0606-2010 |
heuristics/st_references/indirectly_referenced_by | {} | BSI-DSZ-CC-0726-2012, BSI-DSZ-CC-0764-2012, ANSSI-CC-2014/14 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-0606-2010 |
heuristics/protection_profiles | b2cfec7a92fa2940 | f6d23054061d72ba |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename | 589-EWA CT.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 589 EWA CR.pdf | 0727a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 589-EWA_Lexmark_TPM_noFax_noHD_ST_112.pdf | 0727b_pdf.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |