name |
Citrix XenDesktop 4 Platinum Edition |
Data Security Kit(B) Software V1.10E |
category |
Access Control Devices and Systems |
Other Devices and Systems |
scheme |
UK |
JP |
status |
archived |
archived |
not_valid_after |
05.01.2016 |
07.10.2013 |
not_valid_before |
20.08.2010 |
09.09.2005 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp256.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0035_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp256st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0035_est.pdf |
manufacturer |
Citrix Systems, Inc. |
KYOCERA MITA Corporation |
manufacturer_web |
https://www.citrix.com |
https://www.kyoceramita.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL3 |
dgst |
cd043f860d336c69 |
04b252f7910c7505 |
heuristics/cert_id |
CRP256 |
JISEC-CC-CRP-C0035 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
cpe:2.3:a:citrix:xendesktop:4.0:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2016-6493, CVE-2014-4700 |
{} |
heuristics/direct_transitive_cves |
CVE-2012-6314, CVE-2016-6493, CVE-2014-4700 |
{} |
heuristics/indirect_transitive_cves |
CVE-2016-6493, CVE-2012-6314, CVE-2016-4810, CVE-2014-4700 |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
4 |
1.10 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
CRP271 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
CRP271, CRP282, CRP281 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0035
- certification_date: 01.11.2005
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0035_eimg.pdf
- description: PRODUCT DESCRIPTION This TOE is a software module that is installed on the MFPs "KM-8030/KM-6030, CS-8030/CS-6030" of KYOCERA MITA Corporation, and which provides the ordinary functions, and also security functions for protecting residue data. This TOE is installed on the above-mentioned MFPs and protects image data remaining on the HDDs from unjust exposure, after various copying, printing, and network scanning processings, by providing an HDD overwriting function. And it has the administrator authentication function that identifies and authenticates a TOE machine administrator who sets the HDD overwrite deletion method and operates it.
- evaluation_facility: Japan Electronics & Information Technology Industries Association, Information Technology Security Center
- product: Data Security Kit(B) Software
- product_type: IT Product ( data protection function in Multi Function Device )
- report_link: https://www.ipa.go.jp/en/security/c0035_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0035_est.pdf
- toe_version: V1.10E
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2009-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0035_it4035_01.html'})]
- supplier: KYOCERA MITA Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0035_it4035.html
- toe_overseas_name: Data Security Kit(B) Software V2.00E
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
crp256.pdf |
c0035_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0035-01: 1
- Certification No. C0035: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.CE: 1
- A.PHYSICAL: 1
- T:
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /Company: CESG Certification Body
- /CreationDate: D:20100823173833+01'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20100831083026+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20100823163452
- /Title: Certification Report CRP256
- /_AdHocReviewCycleID: 703382741
- /_AuthorEmail: Nigel.WhittakerAxon@cesg.gsi.gov.uk
- /_AuthorEmailDisplayName: WhittakerAxon, Nigel
- /_EmailSubject: T005 - certified!
- pdf_file_size_bytes: 500557
- pdf_hyperlinks: https://www.citrix.com/security
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20051221115430+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /Manager: IPA
- /ModDate: D:20051221115715+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20051221023637
- /Title: CRP-e
- pdf_file_size_bytes: 390269
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
crp256st.pdf |
c0035_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 5
- EAL2 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 3
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
pdf_data/st_keywords/cc_sfr |
- FCO:
- FCO_SCO: 38
- FCO_SCO.1: 21
- FCO_SCO.1.1: 1
- FCO_SCO.1.2: 1
- FCO_SCO.1.3: 2
- FCO_SCO.1.4: 1
- FCS:
- FCS_ECA: 18
- FCS_ECA.1: 7
- FCS_ECA.1.1: 1
- FDP:
- FDP_ACC: 24
- FDP_ACC.1: 5
- FDP_ACF: 23
- FDP_ACF.1: 10
- FDP_IFC.1: 1
- FDP_RIP: 7
- FDP_RIP.1: 1
- FIA:
- FIA_ATD: 8
- FIA_ATD.1: 1
- FIA_UAU: 8
- FIA_UAU.2: 1
- FIA_UID: 10
- FIA_UID.1: 2
- FIA_UID.2: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 1
- FMT_MSA: 35
- FMT_MSA.1: 3
- FMT_MSA.3: 6
- FMT_SMF: 17
- FMT_SMF.1: 4
- FMT_SMR: 18
- FMT_SMR.1: 6
|
- FDP:
- FDP_RIP: 1
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FIA:
- FIA_SOS.1: 15
- FIA_SOS.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 16
- FIA_UAU.7: 15
- FIA_UAU.7.1: 1
- FIA_UID.1: 7
- FIA_UID.2: 15
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MTD.1: 13
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 19
- FPT_RVM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN: 3
- A.CE: 2
- A.PHYSICA: 1
- A.PHYSICAL: 2
- O:
- OE:
- OE.ADMIN: 2
- OE.CE: 2
- OE.PHYSICAL: 2
- OE.POWER: 4
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 9
- FIPS PUB 140-2: 1
- FIPS140-2: 10
- RFC:
|
- CC:
- CCIMB-99-031: 2
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
- ISO/IEC 15408: 6
- ISO/IEC 15408:1999: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 17 1.4.3 Summary of items out of scope of the TOE : 2
- Ver 1-0 SPB 17 August 2010 Page 18 of 53 Figure 4: Logical boundaries 1.4.3 Summary of items out of scope of the TOE The items out of scope of the TOE include the Microsoft components with which Citrix: 1
- integrates, as detailed in section 1.2.3. Also out of scope of the TOE are the following Citrix components which are included in XenDesktop Platinum Edition: •: 1
- out of scope: 4
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20100816144755Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20100831083207+01'00'
- /Producer: GPL Ghostscript 8.15
- /Title: CIN2-ST-0001 v1-0
- pdf_file_size_bytes: 1833337
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
- /Author:
- /Company:
- /CreationDate: D:20051221114017+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20051221114547+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20051220094657
- /Subject:
- /Title: untitled
- pdf_file_size_bytes: 886113
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 65
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |