name |
bizhub PRO 1050P zentai seigyo software Overseas: bizhub PRO 1050P control software |
Citrix Presentation Server with Feature Release 3 |
category |
Other Devices and Systems |
Access Control Devices and Systems |
scheme |
JP |
UK |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
05.03.2013 |
not_valid_before |
21.02.2005 |
01.04.2004 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0021_it4030_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP201.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LFS_T434_Citrix_ST16.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Citrix Systems, Inc. |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.citrix.com |
security_level |
EAL3 |
EAL2 |
dgst |
6cf4c2cf7687f4e8 |
efecb807490f07d6 |
heuristics/cert_id |
JISEC-CC-CRP-C0021 |
CRP201 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, ADV_SPM.1, ATE_COV.1, AGD_ADM.1, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2 |
heuristics/extracted_versions |
- |
3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0282
- certification_date: 01.02.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0282_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is the software which is installed in a digital Multi Function Peripheral (hereinafter referred to as "mfp") consisting of a copier, printer, scanner, and fax function, and controls the overall operation of the mfp. TOE security functionality This TOE offers a security function against disclosure of highly-confidential information stored in an mfp. In compliance with all sorts of overwritting standards, this TOE also offers an overwritting function to completely erase data on recording media such as HDD. This function is used when discarding an mfp or returning a leased one in order to prevent information leakage of an organization using the mfp.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Japanese : bizhub C35 Zentai Seigyo Software English : bizhub C35 Control Software
- product_type: Control Software for digital mfp
- toe_version: A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.03.2016
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C35 Zentai Seigyo Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0282_it0301.html
- toe_overseas_name: bizhub C35 Control Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0021_it4030_ecvr.pdf |
CRP201.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0021: 1
|
- UK:
- CERTIFICATION REPORT No. P201: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL1: 1
- EAL2: 17
- EAL2 augmented: 14
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FTP:
- FTP_ITC.1: 1
- FTP_ITC.2: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- the creation and management of users remains as part of the Windows 2000 Operating System, which is out of scope of the TOE. Citrix MetaFrame XP Presentation Serverfor Windows EAL2 augmented Feature Release 3: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20050222184150+09'00'
- /ModDate: D:20050222184150+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 16296
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: peharri
- /CreationDate: D:20040421162234Z
- /Creator: LFS_T434_CITRIX_CertRep_P201_Final - Microsoft Word
- /ModDate: D:20131204151438Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: LFS_T434_CITRIX_CertRep_P201_Final.doc
- pdf_file_size_bytes: 204390
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
pdf_data/st_filename |
|
LFS_T434_Citrix_ST16.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 8
- EAL2 augmented: 2
- EAL2+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
pdf_data/st_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 2
- FCS_CKM.4: 14
- FCS_CKM.4.1: 2
- FCS_COP.1: 18
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 16
- FDP_ACF.1: 10
- FDP_IFC.1: 3
- FDP_ITT.1: 16
- FDP_ITT.1.1: 2
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UID.1: 2
- FIA_UID.2: 8
- FIA_UID.2.1: 2
- FMT:
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 5
- FPT_AMT.1.1: 1
- FPT_ITT.1: 15
- FPT_ITT.1.1: 2
- FPT_RVM.1: 11
- FPT_RVM.1.1: 1
- FPT_SEP.1: 2
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 1
- FTP_ITC.2: 8
- FTP_ITC.2.1: 1
- FTP_ITC.2.2: 1
- FTP_ITC.2.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APP_: 1
- A.APP_CONFIG: 1
- A.PUBLISHED_: 1
- A.SMARTCARD: 1
- A.THIRD_PARTY_: 1
- A.TRUSTADMIN: 1
- A.USER_: 1
- OE:
- OE.CERTIFICATES: 3
- OE.CLIENT: 2
- OE.CLIENT_: 1
- OE.CLIENT_TPSW: 2
- OE.IPSEC: 8
- OE.LIMIT: 1
- OE.LIMIT_AUTH: 2
- OE.OS_CONFIG_: 2
- OE.OS_CONFIG_CLIENT: 3
- OE.OS_CONFIG_SERVER: 3
- OE.PASSWORD_: 1
- OE.PASSWORD_SETUP: 2
- OE.SECURE_: 1
- OE.SECURE_ENCRYPTION: 3
- OE.SERVER_: 1
- OE.SERVER_PHYSICAL: 2
- OE.SERVER_THIRD_: 1
- OE.SERVER_THIRD_PARTY_SW: 2
- OE.SESSION_KEYS: 4
- OE.TRUSTED_: 1
- OE.TRUSTED_OPS: 2
- OE.VIRUS_PROTECT: 4
- OSP:
- OT:
- OT.APPS_: 1
- OT.APPS_AVAIL: 2
- OT.AUTHENTIC_: 4
- OT.AUTHENTIC_CLIENT: 1
- OT.AUTHENTIC_SERVER: 1
- OT.CONF: 3
- OT.CONF_: 1
- OT.CONF_CLIENT: 2
- OT.GATE_ALLO: 1
- OT.GATE_ALLOW: 2
- OT.INTEG: 3
- OT.INTEG_: 1
- OT.INTEG_CLIENT: 2
- OT.SECURE_ENC: 1
- OT.SECURE_ENCRYP: 1
- OT.SECURE_ENCRYPTI: 1
- OT.SECURE_ENCRYPTION: 1
- T:
- T.ACCESS: 2
- T.AUTHENTIC: 4
- T.AVAIL: 4
- T.MISDIRECT: 2
- T.MOD_CONF: 4
- T.MOD_HW_CLIENT: 1
- T.MOD_HW_SERVER: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140: 3
- FIPS 140-1: 1
- FIPS 140-2: 3
- FIPS 186-2: 1
- FIPS140: 10
- FIPS140-1: 2
- FIPS140-2: 2
- RFC:
- RFC 2246: 3
- RFC 2412: 1
- RFC 2451: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Microsoft Windows 2000 Server, Service Pack 4 or later. All operating system and client devices are out of scope of the evaluation. They are assumed to be configured in a manner that introduces no security: 1
- Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Page 32 of 50 Version 1.6 Ref: 1
- The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-: 1
- out of scope: 3
|
pdf_data/st_metadata |
|
- /Author: peharri
- /CreationDate: D:20040421163707
- /Creator: LFS_T434_Citrix_ST16_Public - Microsoft Word
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: LFS_T434_Citrix_ST16_Public.doc
- pdf_file_size_bytes: 168181
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |