This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
MS6001 embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèque Wear Levelling version 06.03.02.02 (révision E) ( ANSSI-CC-2018/02-R01) None |
Lexmark CS622 Single Function Printer with firmware version CSTZJ.052.025 & Lexmark Secure Element (P/N 57X0185) 383-4-466 |
|
---|---|---|
name | MS6001 embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèque Wear Levelling version 06.03.02.02 (révision E) ( ANSSI-CC-2018/02-R01) | Lexmark CS622 Single Function Printer with firmware version CSTZJ.052.025 & Lexmark Secure Element (P/N 57X0185) |
category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Multi-Function Devices |
scheme | FR | CA |
status | active | archived |
not_valid_after | 30.03.2030 | 04.03.2024 |
not_valid_before | 30.03.2025 | 04.03.2019 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2018_02-R01fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-466%20CT%20v1.1e%20-%20original%20signed.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018_02-R01fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-466%20CR%201.0e.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2018_02-R01.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20SFP%20CSTZJ%20Security%20Target%2015.pdf |
manufacturer | SEALSQ France | Lexmark International, Inc. |
manufacturer_web | https://www.sealsq.com/ | https://www.lexmark.com/ |
security_level | EAL5+, ALC_DVS.2, AVA_VAN.5 | {} |
dgst | ec30d9d5e231d788 | 92ddea0618a91acf |
heuristics/cert_id | 383-4-466 | |
heuristics/cpe_matches | {} | cpe:2.3:o:lexmark:cs622_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cs622:-:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2021-44738, CVE-2023-23560, CVE-2021-44734, CVE-2022-29850, CVE-2021-44737, CVE-2021-44735, CVE-2023-22960 |
heuristics/extracted_sars | ALC_DVS.2, AVA_VAN.5 | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions | 06.04.01.07, 06.03.02.02 | 052.025 |
heuristics/protection_profiles | cf0f01bcd7be3e9c | b2cfec7a92fa2940 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
pdf_data/cert_filename | 383-4-466 CT v1.1e - original signed.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-466 CR 1.0e.pdf | |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id | ||
pdf_data/report_keywords/cc_security_level | ||
pdf_data/report_keywords/cc_sar | ||
pdf_data/report_keywords/cc_sfr | ||
pdf_data/report_keywords/cc_claims | ||
pdf_data/report_keywords/vendor | ||
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto | ||
pdf_data/report_keywords/pq_crypto | ||
pdf_data/report_keywords/hash_function | ||
pdf_data/report_keywords/crypto_scheme | ||
pdf_data/report_keywords/crypto_protocol | ||
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode | ||
pdf_data/report_keywords/ecc_curve | ||
pdf_data/report_keywords/crypto_engine | ||
pdf_data/report_keywords/tls_cipher_suite | ||
pdf_data/report_keywords/crypto_library | ||
pdf_data/report_keywords/vulnerability | ||
pdf_data/report_keywords/side_channel_analysis | ||
pdf_data/report_keywords/technical_report_id | ||
pdf_data/report_keywords/device_model | ||
pdf_data/report_keywords/tee_name | ||
pdf_data/report_keywords/os_name | ||
pdf_data/report_keywords/cplc_data | ||
pdf_data/report_keywords/ic_data_group | ||
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version | ||
pdf_data/report_keywords/javacard_api_const | ||
pdf_data/report_keywords/javacard_packages | ||
pdf_data/report_keywords/certification_process | ||
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Lexmark SFP CSTZJ Security Target 15.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme | ||
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library | ||
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/convert_ok | False | True |
state/report/download_ok | False | True |
state/report/extract_ok | False | True |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |