Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Citrix MetaFrame Presentation Server 4.0
CRP219
bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software Version: A2WU0Y0-0100-GM0-00
JISEC-CC-CRP-C0290
name Citrix MetaFrame Presentation Server 4.0 bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software Version: A2WU0Y0-0100-GM0-00
category Access Control Devices and Systems Other Devices and Systems
scheme UK JP
not_valid_after 05.03.2013 06.06.2016
not_valid_before 01.08.2005 30.05.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP219.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0290_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LFS_T488_Citrix_ST_V10.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0290_est.pdf
manufacturer Citrix Systems, Inc. Konica Minolta Business Technologies, Inc
manufacturer_web https://www.citrix.com https://www.konicaminolta.com/
security_level EAL2 EAL3
dgst 7da57a5dc5ab73a9 389366efa076a48a
heuristics/cert_id CRP219 JISEC-CC-CRP-C0290
heuristics/extracted_sars ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, ADV_SPM.1, ATE_COV.1, AGD_ADM.1, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2 ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 4.0 00, 0100, 552, 502, 652, 602
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0290
  • certification_date: 01.05.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0290_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as“MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese : bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Zentai Seigyo Software English : bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0290_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0290_est.pdf
    • toe_version: A2WU0Y0-0100-GM0-00
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.06.2016
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Zentai Seigyo Software A2WU0Y0-0100-GM0-00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0290_it0309.html
  • toe_overseas_name: bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software A2WU0Y0-0100-GM0-00
pdf_data/report_filename CRP219.pdf c0290_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • UK:
    • CERTIFICATION REPORT No. P219: 1
  • JP:
    • CRP-C0290-01: 1
    • Certification No. C0290: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
  • EAL:
    • EAL3: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
pdf_data/report_keywords/cc_sfr
  • FTP:
    • FTP_ITC.1: 1
    • FTP_ITC.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-BOX: 2
    • T.ACCESS-PRIVATE-BOX: 2
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRIN: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 2
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRANSM: 1
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 16
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 8
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-2004-01-001: 1
    • CCIMB-2004-01-002: 1
    • CCIMB-2004-01-003: 1
    • CCIMB-2004-01-004: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is the medium to: 1
pdf_data/report_metadata
  • /Author: racook
  • /CreationDate: D:20050906112345Z
  • /Creator: LFS T488 CITRIX_V40_CertRep_P219_10 - Microsoft Word
  • /ModDate: D:20131119172038Z
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Title: LFS T488 CITRIX_V40_CertRep_P219_10.doc
  • pdf_file_size_bytes: 1021419
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110802102725+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110802103212+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 3264295
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 39
pdf_data/st_filename LFS_T488_Citrix_ST_V10.pdf c0290_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 8
    • EAL2 augmented: 2
    • EAL2+: 1
  • EAL:
    • EAL3: 3
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_FLR.2: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 9
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 16
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 21
    • FCS_COP.1.1: 3
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACF.1: 16
    • FDP_IFC.1: 3
    • FDP_ITT.1: 17
    • FDP_ITT.1.1: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 10
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 12
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 6
    • FPT_AMT.1.1: 1
    • FPT_ITT.1: 15
    • FPT_ITT.1.1: 2
    • FPT_RVM.1: 12
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 2
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 1
    • FTP_ITC.2: 9
    • FTP_ITC.2.1: 1
    • FTP_ITC.2.2: 1
    • FTP_ITC.2.3: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 72
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 55
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 71
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 29
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 44
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 43
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 44
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 48
    • FIA_UID.2.1: 7
    • FIA_USB.1: 26
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 31
    • FMT_MOF.1.1: 3
    • FMT_MSA: 5
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 42
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 119
    • FMT_MTD.1.1: 13
    • FMT_SMF.1: 112
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 171
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.APP_: 1
    • A.APP_CONFIG: 1
    • A.PUBLISHED_: 1
    • A.SMARTCARD: 1
    • A.THIRD_PARTY_: 1
    • A.TRUSTADMIN: 1
    • A.USER_: 1
  • OE:
    • OE.CERTIFICATES: 3
    • OE.CLIENT_: 1
    • OE.CLIENT_PHYSICAL: 1
    • OE.CLIENT_TPSW: 3
    • OE.IPSEC: 8
    • OE.LIMIT_AUT: 1
    • OE.LIMIT_AUTH: 2
    • OE.MALWARE_: 1
    • OE.MALWARE_PROT: 1
    • OE.MALWARE_PROTECT: 2
    • OE.MEMORY: 4
    • OE.OS_CONFIG: 2
    • OE.OS_CONFIG_: 2
    • OE.OS_CONFIG_CLIENT: 2
    • OE.OS_CONFIG_SERVER: 2
    • OE.PASSWORD: 1
    • OE.PASSWORD_: 1
    • OE.PASSWORD_SETUP: 1
    • OE.SECURE_: 1
    • OE.SECURE_EN: 1
    • OE.SECURE_ENCRYPTION: 2
    • OE.SERVER_: 1
    • OE.SERVER_PHYSICAL: 2
    • OE.SERVER_TH: 1
    • OE.SERVER_THIRD_: 1
    • OE.SERVER_THIRD_PARTY_SW: 1
    • OE.SESSION_K: 1
    • OE.SESSION_KEYS: 3
    • OE.TRUSTED_: 1
    • OE.TRUSTED_OPS: 2
  • OSP:
    • OSP.CRYPTO: 4
  • OT:
    • OT.APPS_: 1
    • OT.APPS_AVAIL: 2
    • OT.AUTHENTIC_: 4
    • OT.AUTHENTIC_CLIENT: 1
    • OT.AUTHENTIC_SERVER: 1
    • OT.CONF: 3
    • OT.CONF_: 1
    • OT.CONF_CLIENT: 2
    • OT.CUTPASTE: 1
    • OT.CUT_PASTE: 2
    • OT.DRIVES: 3
    • OT.GATE_ALLO: 1
    • OT.GATE_ALLOW: 2
    • OT.INTEG: 3
    • OT.INTEG_: 1
    • OT.INTEG_CLIENT: 2
    • OT.SECURE_ENC: 1
    • OT.SECURE_ENCRYP: 1
    • OT.SECURE_ENCRYPTION: 2
  • T:
    • T.AUTHENTIC: 4
    • T.AVAIL: 4
    • T.MISDIRECT: 2
    • T.MOD_CONF: 4
    • T.MOD_HW_CLIENT: 1
    • T.MOD_HW_SERVER: 1
  • A:
    • A.ADMIN: 5
    • A.NETWORK: 6
    • A.SECRET: 3
    • A.SERVICE: 4
    • A.SETTING: 5
  • O:
    • O.AUTH: 2
    • O.AUTH-CAPABILITY: 5
    • O.CONFIG: 12
    • O.CRYPT: 4
    • O.CRYPTO: 4
    • O.CRYPTO-CAPABILITY: 5
    • O.CRYPTO-KEY: 2
    • O.CRYPTO-MAIL: 2
    • O.FAX: 2
    • O.FAX-CONTROL: 6
    • O.GROUP: 3
    • O.GROUP-BOX: 3
    • O.OVERWRITE: 3
    • O.OVERWRITE-ALL: 5
    • O.PRIVATE: 3
    • O.PRIVATE-BOX: 3
    • O.PUBLIC: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED: 3
    • O.REGISTERED-USER: 12
    • O.SECURE: 4
    • O.SECURE-PRINT: 6
    • O.TRUSTED: 3
    • O.TRUSTED-PASS: 5
  • OE:
    • OE.ADMIN: 3
    • OE.FAX: 2
    • OE.FAX-UNIT: 2
    • OE.FEED: 2
    • OE.FEED-BACK: 9
    • OE.NETWORK: 4
    • OE.S: 1
    • OE.SECRET: 3
    • OE.SERVER: 5
    • OE.SERVICE: 3
    • OE.SESSION: 10
    • OE.SETTING: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS: 19
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.BACKUP: 3
    • T.BACKUP-RESTORE: 1
    • T.BRING: 3
    • T.DISCARD: 3
    • T.DISCARD-MFP: 1
    • T.UNEXPECTED: 2
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 19
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 6
      • TripleDES: 4
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 6
    • TLS:
      • TLS: 34
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 3
    • FIPS 140-1: 1
    • FIPS 140-2: 3
    • FIPS 186-2: 1
    • FIPS140: 10
    • FIPS140-1: 2
    • FIPS140-2: 2
  • RFC:
    • RFC 2246: 3
    • RFC 2412: 1
    • RFC 2451: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186: 2
    • FIPS 186-2: 4
    • FIPS PUB 197: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-: 1
    • out of scope: 2
    • the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Version 1.0 Page 35 of 56 July 2005: 1
  • ConfidentialDocument:
    • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
pdf_data/st_metadata
  • /CreationDate: 9:9 7/25/2005
  • /Creator: Windows NT 4.0
  • /Producer: GNU Ghostscript 7.05
  • /Title: Untitled Document
  • pdf_file_size_bytes: 328607
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
  • /Author:
  • /CreationDate: D:20110720085904+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20110720085911+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1134986
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 112
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different