This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Citrix XenDesktop 7.15 LTSR Platinum Edition and Citrix XenApp 7.15 LTSR Platinum Edition 383-4-433 |
ID One™ ePass v2.1 with configuration EAC RSA & ECC on NXP P5CD040V0B, P5CD080V0B, P5CD144V0B ANSSI-CC-2009/19 |
|
---|---|---|
name | Citrix XenDesktop 7.15 LTSR Platinum Edition and Citrix XenApp 7.15 LTSR Platinum Edition | ID One™ ePass v2.1 with configuration EAC RSA & ECC on NXP P5CD040V0B, P5CD080V0B, P5CD144V0B |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
not_valid_after | 30.01.2023 | 01.09.2019 |
not_valid_before | 30.01.2018 | 23.07.2009 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-433%20CT%20v1.0e.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-433%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-2009_19en.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-433%20ST%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2009_19en.pdf |
manufacturer | Citrix Systems, Inc. | Oberthur Card System / Philips (NXP) |
manufacturer_web | https://www.citrix.com | https://www.oberthur.com/ |
security_level | EAL2+, ALC_FLR.2 | EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst | d055b72fdf802923 | 61c31bdcb23b6f20 |
heuristics/cert_id | 383-4-433 | ANSSI-CC-2009/19 |
heuristics/cert_lab | [] | CEACI |
heuristics/cpe_matches | cpe:2.3:a:citrix:xenapp:7.15:cu6:*:*:ltsr:*:*:*, cpe:2.3:a:citrix:xendesktop:7.15:-:*:*:ltsr:*:*:*, cpe:2.3:a:citrix:xenapp:7.15:cu7:*:*:ltsr:*:*:*, cpe:2.3:a:citrix:xendesktop:7.15:cu6:*:*:ltsr:*:*:*, cpe:2.3:a:citrix:xendesktop:7.15:cu7:*:*:ltsr:*:*:*, cpe:2.3:a:citrix:xenapp:7.15:-:*:*:ltsr:*:*:* | {} |
heuristics/related_cves | CVE-2020-8283, CVE-2020-8269, CVE-2021-22928 | {} |
heuristics/extracted_sars | ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 | AVA_VLA.4, AVA_VAN.5, ALC_DVS.2, ADV_ARC.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions | 7.15 | 2.1 |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0410-2007 |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0410-2007 |
maintenance_updates |
|
|
pdf_data/cert_filename | 383-4-433 CT v1.0e.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-433 CR v1.0e.pdf | anssi-2009_19en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 383-4-433 ST v1.0.pdf | anssi-cible2009_19en.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |