name |
Citrix XenDesktop 4 Platinum Edition |
Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
UK |
FR |
status |
archived |
archived |
not_valid_after |
05.01.2016 |
01.09.2019 |
not_valid_before |
20.08.2010 |
24.12.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp256.pdf |
https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp256st.pdf |
https://www.commoncriteriaportal.org/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf |
manufacturer |
Citrix Systems, Inc. |
Oberthur Technologies / STMicroelectronics |
manufacturer_web |
https://www.citrix.com |
|
security_level |
EAL2+, ALC_FLR.2 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
cd043f860d336c69 |
8843ddf8e55f6df6 |
heuristics/cert_id |
CRP256 |
ANSSI-CC-2013/65 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
cpe:2.3:a:citrix:xendesktop:4.0:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2016-6493, CVE-2014-4700 |
{} |
heuristics/direct_transitive_cves |
CVE-2012-6314, CVE-2016-6493, CVE-2014-4700 |
{} |
heuristics/indirect_transitive_cves |
CVE-2016-6493, CVE-2012-6314, CVE-2016-4810, CVE-2014-4700 |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
4 |
01.00.04 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
CRP271 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
CRP271, CRP282, CRP281 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
crp256.pdf |
ANSSI-CC-2013_65.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/65
- cert_item: Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME
- cert_item_version: MasterCard Mobile PayPass V1 – Version V01.00.04 Identification hardware 0768910, identification card Manager GOP Ref V1.8.v
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Oberthur Technologies 420, rue d’Estienne d’Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d’Estienne d’Orves - CS 40008, 92705 Colombes Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: néant
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2011/07: 1
- ANSSI-CC-2011/07-S01: 1
- ANSSI-CC-2012/39: 4
- ANSSI-CC-2013/65: 22
- ANSSI-CC-PP-2010/03: 1
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03: 1
- ANSSI-CC-PP-2010/04: 1
- BSI:
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 4
- EAL4+: 3
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Oberthur:
- Oberthur Technologies: 11
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /Company: CESG Certification Body
- /CreationDate: D:20100823173833+01'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20100831083026+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20100823163452
- /Title: Certification Report CRP256
- /_AdHocReviewCycleID: 703382741
- /_AuthorEmail: Nigel.WhittakerAxon@cesg.gsi.gov.uk
- /_AuthorEmailDisplayName: WhittakerAxon, Nigel
- /_EmailSubject: T005 - certified!
- pdf_file_size_bytes: 500557
- pdf_hyperlinks: https://www.citrix.com/security
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Duquesnoy
- /CreationDate: D:20140129142922+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.010
- /ModDate: D:20140129142922+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME
- /Title: ANSSI-CC-2013/65
- pdf_file_size_bytes: 774691
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
crp256st.pdf |
FQR 110 6672 Ed1 - ST JUBA Lite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2011/07: 1
- ANSSI-CC-2011/07-S01: 1
- ANSSI-CC-2012/39: 1
- ANSSI-CC-PP 2010/04: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 5
- EAL2 augmented: 2
|
- EAL:
- EAL 4: 1
- EAL4: 3
- EAL4 augmented: 2
- EAL4+: 10
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 8
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 5
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCO:
- FCO_SCO: 38
- FCO_SCO.1: 21
- FCO_SCO.1.1: 1
- FCO_SCO.1.2: 1
- FCO_SCO.1.3: 2
- FCO_SCO.1.4: 1
- FCS:
- FCS_ECA: 18
- FCS_ECA.1: 7
- FCS_ECA.1.1: 1
- FDP:
- FDP_ACC: 24
- FDP_ACC.1: 5
- FDP_ACF: 23
- FDP_ACF.1: 10
- FDP_IFC.1: 1
- FDP_RIP: 7
- FDP_RIP.1: 1
- FIA:
- FIA_ATD: 8
- FIA_ATD.1: 1
- FIA_UAU: 8
- FIA_UAU.2: 1
- FIA_UID: 10
- FIA_UID.1: 2
- FIA_UID.2: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 1
- FMT_MSA: 35
- FMT_MSA.1: 3
- FMT_MSA.3: 6
- FMT_SMF: 17
- FMT_SMF.1: 4
- FMT_SMR: 18
- FMT_SMR.1: 6
|
- FAU:
- FAU_ARP.1: 7
- FAU_ARP.1.1: 1
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 2
- FAU_SAR: 12
- FAU_SAR.1: 4
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 8
- FCS_CKM.2: 1
- FCS_CKM.4: 20
- FCS_CKM.4.1: 1
- FCS_COP: 40
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 149
- FDP_ACC.1: 14
- FDP_ACC.2: 14
- FDP_ACF: 133
- FDP_ACF.1: 35
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 1
- FDP_DAU.1: 5
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC.1: 15
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 77
- FDP_IFC.1: 11
- FDP_IFC.2: 8
- FDP_IFF: 62
- FDP_IFF.1: 24
- FDP_IFF.1.2: 4
- FDP_ITC: 28
- FDP_ITC.1: 27
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 17
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT.1: 13
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 16
- FIA_AFL.1: 4
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.2: 8
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 35
- FIA_UAU.1: 8
- FIA_UAU.3: 7
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.6: 1
- FIA_UID: 24
- FIA_UID.1: 10
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 7
- FMT_MOF.1: 1
- FMT_MSA: 9
- FMT_MSA.1: 3
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 29
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 4
- FMT_MTD.1: 1
- FMT_SMF: 17
- FMT_SMF.1: 5
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 4
- FPR_UNO.1.1: 1
- FPT:
- FPT_RPL: 1
- FPT_RPL.1: 4
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM.1: 3
- FPT_TDC.1: 16
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- O.APP_BLOC: 1
- O.APP_BLOCK: 13
- O.AUDIT: 14
- O.AUDIT_ACCESS: 10
- O.AUTHORISATION_CONTR: 1
- O.AUTHORISATION_CONTROL: 19
- O.CHANNELS: 9
- O.COMM_AUTH: 5
- O.COMM_INTEGRITY: 1
- O.DATA_DISCLOSURE: 44
- O.DATA_INTEGRITY: 62
- O.DATA_USERS: 10
- O.GUIS_AUTH: 13
- O.ISSUING_BANK_AUTH: 54
- O.MNO_AUTH: 8
- O.RISK_MNGT: 10
- O.SIM_UNLOCK: 10
- O.TRANSACTION_BYPASS: 53
- O.TRANSACTION_INTEG: 1
- O.TRANSACTION_INTEGRI: 1
- O.TRANSACTION_INTEGRITY: 38
- O.TRANSACTION_REPLAY: 13
- O.TRANSACTION_UNIQUE: 1
- O.TRANSACTION_UNIQUENE: 1
- O.TRANSACTION_UNIQUENES: 2
- O.TRANSACTION_UNIQUENESS: 33
- O.USER_AUTH: 55
- OE:
- OE.BANKS_PRIVILEGES: 4
- OE.CERTIFICATES_MNGT: 11
- OE.CHANNELS_SELECTION: 4
- OE.CUSTOMER_PC_CONFID: 8
- OE.GUIS_AUTH: 1
- OE.GUIS_IDENTIFICATION: 5
- OE.GUIS_TIMEOUT: 7
- OE.GUI_INST_ALERT: 7
- OE.LATENCY_CONTROL: 5
- OE.MERCHANT_AUTH: 8
- OE.MERCHANT_CONTROL: 7
- OE.NFC_PROTOCOL: 5
- OE.NO_VAD: 6
- OE.POLICY: 5
- OE.POS_APPLICATIONS: 10
- OE.POS_APPROVAL: 7
- OE.POS_DEACTIVATION: 6
- OE.TOE_USAGE: 9
- OE.TRANSACTION_DISPLAY: 5
- OSP:
- OSP.BANKS_PRIVILEGES: 4
- OSP.CERTIFICATES_MNGT: 4
- OSP.CUSTOMER_PC_CONFI: 1
- OSP.CUSTOMER_PC_CONFID: 3
- OSP.GUIS_IDENTIFICATION: 4
- OSP.MERCHANT_CONTROL: 6
- OSP.PISHING: 4
- OSP.POLICY: 4
- OSP.TOE_USAGE: 4
- T:
- T.APPLICATIONS_DOS: 7
- T.CERTIF_CORRUPTION: 5
- T.CUSTOMER_USURPATION: 7
- T.DISCLOSURE_KEYS: 6
- T.DISCLOSURE_REF_PC: 6
- T.INTEG_ACCOUNT_INFO: 6
- T.INTEG_COUNT: 7
- T.INTEG_KEYS: 8
- T.INTEG_LOG_FILE: 5
- T.INTEG_REF_PC: 6
- T.INTEG_SEL_ACT_PARAM: 6
- T.INTEG_TRANS_PARAM: 7
- T.ISSUING-: 2
- T.ISSUING-BANK_USURPATION: 3
- T.MAN-IN-THE-MIDDLE: 12
- T.MERCHANT_ACCOMPLICE: 9
- T.MNO_USURPATION: 5
- T.STEALING: 9
- T.TEMPORARY_DATA: 7
- T.TRANSACTION_COUNTERFEITING: 13
- T.TRANSACTION_REPLAY: 8
- T.TRANSACTION_REPUDIATION: 7
|
pdf_data/st_keywords/vendor |
|
- Oberthur:
- Oberthur: 8
- Oberthur Technologies: 137
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 9
- FIPS PUB 140-2: 1
- FIPS140-2: 10
- RFC:
|
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-3: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- FIPS PUB 81: 1
- ISO:
- ISO/IEC 9796-1: 1
- ISO/IEC 9797-1: 1
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 17 1.4.3 Summary of items out of scope of the TOE : 2
- Ver 1-0 SPB 17 August 2010 Page 18 of 53 Figure 4: Logical boundaries 1.4.3 Summary of items out of scope of the TOE The items out of scope of the TOE include the Microsoft components with which Citrix: 1
- integrates, as detailed in section 1.2.3. Also out of scope of the TOE are the following Citrix components which are included in XenDesktop Platinum Edition: •: 1
- out of scope: 4
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20100816144755Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20100831083207+01'00'
- /Producer: GPL Ghostscript 8.15
- /Title: CIN2-ST-0001 v1-0
- pdf_file_size_bytes: 1833337
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
- /Author: chrisduc
- /CreationDate: D:20130807110801+02'00
- /Creator: PDFCreator Version 0.8.1
- /ModDate: D:20130807110801+02'00
- /Producer: AFPL Ghostscript 8.50
- /Title: FQR 110 6672 Ed1 - ST JUBA Lite
- pdf_file_size_bytes: 1527189
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 131
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |