This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
NATEK NSM GUI v2.4.1 with NSM SERVER v2.3.9 0.01/TSE-CCCS-030 |
KYOCERA ECOSYS MA6000ifx, MA5500ifx, MA4500ifx,TA Triumph Adler P-6039i MFP, P-5539i MFP, P-4539i MFP,UTAX P-6039i MFP, P-5539i MFP, P-4539i MFP,with system firmware C0V_S0IS.C04.002 CSEC2022011 |
|
---|---|---|
name | NATEK NSM GUI v2.4.1 with NSM SERVER v2.3.9 | KYOCERA ECOSYS MA6000ifx, MA5500ifx, MA4500ifx,TA Triumph Adler P-6039i MFP, P-5539i MFP, P-4539i MFP,UTAX P-6039i MFP, P-5539i MFP, P-4539i MFP,with system firmware C0V_S0IS.C04.002 |
category | Network and Network-Related Devices and Systems | Multi-Function Devices |
scheme | TR | SE |
status | archived | active |
not_valid_after | 22.06.2018 | 22.06.2028 |
not_valid_before | 22.06.2015 | 22.06.2023 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA_MA6000.pdf | |
report_link | https://www.commoncriteriaportal.org/files/epfiles/NATEK%20Network%20and%20System%20Manager%20NSM%20GUI%202%204%201%20with%20NSM%20SERVER%202%203%209%20%20Certification%20Report%20v1%200.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Kyocera%20ECOSYS%20MA6000ifx,%20MA5500ifx,%20MA4500ifx_1-0_22FMV6381-24.pdf |
st_link | https://www.commoncriteriaportal.org/files/epfiles/NATEK%20Network%20and%20System%20Manager%20NSM%20GUI%202%204%201%20with%20NSM%20SERVER%202%203%209%20ST%20v1%2013.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_ECOSYS_MA6000ifx_v100.pdf |
manufacturer | NATEK BİLİŞİM | KYOCERA Document Solutions Inc. |
manufacturer_web | https://www.kyoceradocumentsolutions.com/ | |
security_level | EAL3 | EAL2+, ALC_FLR.2 |
dgst | cb097d67d75e4a7d | 7c78e33bc02e807a |
heuristics/cert_id | 0.01/TSE-CCCS-030 | CSEC2022011 |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions | 2.4.1, 2.3.9 | 04.002 |
maintenance_updates |
|
|
protection_profile_links | {} | {} |
pdf_data/cert_filename | CCRA_MA6000.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | NATEK Network and System Manager NSM GUI 2 4 1 with NSM SERVER 2 3 9 Certification Report v1 0.pdf | Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx_1-0_22FMV6381-24.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | NATEK Network and System Manager NSM GUI 2 4 1 with NSM SERVER 2 3 9 ST v1 13.pdf | ST_ECOSYS_MA6000ifx_v100.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | False | True |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |