name |
IMELO-Secure, Version 1.1 |
Motorola RFS7000 RF Switch |
category |
Other Devices and Systems |
Access Control Devices and Systems |
scheme |
DE |
NO |
status |
active |
archived |
not_valid_after |
14.04.2027 |
01.09.2019 |
not_valid_before |
14.12.2022 |
09.07.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20090709_SERTIT-010_CR_v1_0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/MOTOROLA_ST-v1.5.pdf |
manufacturer |
SSI Schäfer Plastics GmbH |
Motorola, Inc. |
manufacturer_web |
https://ssi-plastic.com |
https://www.motorola.com/ |
security_level |
ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
EAL4+, ALC_FLR.2 |
dgst |
3da0a90c7bb5a9cd |
360053f8c7550b7e |
heuristics/cert_id |
BSI-DSZ-CC-1013-V2-2022 |
SERTIT-010 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ALC_DEL.1, ATE_IND.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2 |
ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
heuristics/extracted_versions |
1.1 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1013-2017 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1013-2017 |
{} |
heuristics/scheme_data |
- category: Other products
- cert_id: BSI-DSZ-CC-1013-V2-2022
- certification_date: 14.12.2022
- enhanced:
- applicant: SSI Schäfer Plastics GmbH Kalkofen 6 58638 Iserlohn
- assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 14.12.2022
- description: The TOE is referred to as IMELO-Secure 1.0. It is a waste bin identification system developed by Institut für Entsorgung und Umwelttechnik GmbH. The TOE is evaluated and certified conform to the PP „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste bin identification systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1013-V2-2022', 'description': 'Environment.'}), frozendict({'id': 'BSI-DSZ-CC.1013-2017', 'description': 'Security Target'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 13.12.2027
- product: IMELO-Secure, Version 1.1
- protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2b_pdf.pdf?__blob=publicationFile&v=3
- product: IMELO-Secure, Version 1.1
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/1013_1013V2.html
- vendor: SSI Schäfer Plastics GmbH
|
- category: Other Devices and Systems
- certification_date: 09.07.2009
- developer: Motorola, Inc.
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-010
- certification_date: 09.07.2009
- description: SERTIT-010 C
- developer: Motorola, Inc.
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135534-1610011059/SERTIT/Sertifikater/2009/10/MOTOROLA_ST-v1.5.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134620-1607949745/SERTIT/Sertifikater/2009/10/20090709_SERTIT-010_CR_v1_0.pdf'})]})
- evaluation_facility: Aspect Labs
- level: EAL 4, ALC_FLR.2
- mutual_recognition: CCRA, SOG-IS
- product: HW: RFS7000; SW: RFS7000-1.0.0.0-022GR
- protection_profile: US Government Wireless Local Area Network (WLAN) Access System Protection Profile for Basic Robustness Environments, Version 1.0, April 2006
- sponsor: Motorola, Inc.
- product: Motorola RFS7000 RF Switch
- url: https://sertit.no/certified-products/product-archive/motorola-rfs7000-rf-switch
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
f1e8c937d15e713a |
a91e9c889e6f3e47 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_as_br_v1.0.pdf |
pdf_data/cert_filename |
1013V2c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1013-V2-2022: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ASE:
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem
- /Title: Zertifikat BSI-DSZ-CC-1013-V2-2022
- pdf_file_size_bytes: 457534
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1013V2a_pdf.pdf |
20090709_SERTIT-010_CR_v1_0.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-1013-V2-2022
- cert_item: IMELO-Secure, Version 1.1
- cert_lab: BSI
- developer: SSI Schäfer Plastics GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1013-: 1
- BSI-DSZ-CC-1013-2017: 2
- BSI-DSZ-CC-1013-V2-2022: 11
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0010-2004: 1
- BSI-PP-0010-2004: 2
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 5
- EAL 2: 1
- EAL 4: 1
- EAL1+: 1
|
- EAL:
- EAL 4: 27
- EAL 4 augmented: 23
- EAL1: 1
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ASE:
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
|
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SEL.1: 1
- FCS:
- FCS_BCM_EXP.1: 1
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_CKM_EXP.2: 1
- FCS_COP_EXP.1: 1
- FCS_COP_EXP.2: 1
- FDP:
- FDP_PUD_EXP.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UAU_EXP.5: 1
- FIA_UID.2: 1
- FIA_USB.1: 2
- FMT:
- FMT_MOF.1: 3
- FMT_MSA.2: 1
- FMT_MTD.1: 2
- FMT_SMF.1: 3
- FMT_SMR.1: 1
- FPT:
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM_EXP.1: 1
- FPT_TST_EXP.1: 1
- FPT_TST_EXP.2: 1
- FTA:
- FTA_SSL.3: 1
- FTA_TAB.1: 1
- FTP:
- FTP_ITC_EXP.1: 1
- FTP_TRP.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem
- /Title: Zertifizierungsreport BSI-DSZ-CC-1013-V2-2022
- pdf_file_size_bytes: 758234
- pdf_hyperlinks: https://www.sogis.eu/, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: ragea
- /CR issue: 1.0
- /CRNumber: 010
- /Company: SERTIT
- /CreationDate: D:20090709131957+02'00'
- /Creator: Acrobat PDFMaker 8.1 for Word
- /Day Month Year: 9 July 2009
- /Developers name: Motorola, Inc.
- /EAL: EAL 4 augmented with ALC_FLR.2
- /ETR date final: 28 May 2009
- /Keywords: ugradert
- /ModDate: D:20090709132004+02'00'
- /Name of EVIT: Aspect Labs, a division of BKP Security, Inc.
- /PP name: US Government Wireless Local Network Access System Protection Profile for Basic Robustness Environments
- /Prod name and version platform: Motorola RFS7000 RF Switch
- /Producer: Adobe PDF Library 8.0
- /Product name: Motorola RFS7000 RF Switch
- /Product version: HW: RFS7000 SW: RFS7000-1.0.0.0-022GR
- /Sponsor name: Motorola, Inc.
- /Title: tittel
- pdf_file_size_bytes: 475259
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
1013V2b_pdf.pdf |
MOTOROLA_ST-v1.5.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0010-: 1
- BSI-PP-0010-2004: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL1: 1
- EAL1 augmented: 1
- EAL1+: 8
|
- EAL:
- EAL4: 9
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMS: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 2
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.1: 1
- ACM_CAP.2: 1
- ACM_CAP.4: 2
- ACM_SCP.1: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.1: 2
- ADO_DEL.2: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_HLD.1: 1
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 6
- ADV_SPM.1: 3
- AGD:
- AGD_ADM.1: 6
- AGD_USR.1: 3
- ALC:
- ALC_DVS.1: 2
- ALC_FLR.2: 8
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 4
- AVA:
- AVA_MSU.1: 2
- AVA_MSU.2: 2
- AVA_SOF.1: 5
- AVA_VLA.1: 3
- AVA_VLA.2: 2
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_DAU: 6
- FDP_DAU.1: 6
- FDP_DAU.1.1: 5
- FDP_DAU.1.2: 5
- FDP_ITT: 5
- FDP_ITT.1: 1
- FDP_ITT.5: 16
- FDP_ITT.5.1: 6
- FDP_SDI: 3
- FDP_SDI.1: 9
- FDP_SDI.1.1: 5
- FPT:
- FRU:
- FRU_FLT.1: 6
- FRU_FLT.1.1: 5
|
- FAU:
- FAU_GEN.1: 23
- FAU_GEN.1.1: 4
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FAU_STG: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 6
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP.1: 11
- FCS_BCM_EXP.1.1: 1
- FCS_BCM_EXP.1.2: 1
- FCS_BCM_EXP.1.3: 1
- FCS_CKM: 1
- FCS_CKM.1: 16
- FCS_CKM.2: 5
- FCS_CKM.4: 15
- FCS_CKM_EXP.2: 16
- FCS_CKM_EXP.2.1: 1
- FCS_COP: 2
- FCS_COP.1: 3
- FCS_COP_EXP.1: 16
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 23
- FCS_COP_EXP.2.1: 2
- FDP:
- FDP_ACC.1: 1
- FDP_AFC: 1
- FDP_IFC: 1
- FDP_IFC.1: 1
- FDP_PUD: 1
- FDP_PUD_EXP: 2
- FDP_PUD_EXP.1: 8
- FDP_PUD_EXP.1.1: 1
- FDP_PUP_EXP.1: 1
- FDP_RIP.1: 15
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 15
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 15
- FIA_ATD.1.1: 2
- FIA_UAU: 4
- FIA_UAU.1: 16
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5.1: 1
- FIA_UAU_EXP.5: 14
- FIA_UAU_EXP.5.1: 2
- FIA_UAU_EXP.5.2: 2
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB.1: 14
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF.1: 29
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 15
- FMT_MSA.2.1: 1
- FMT_MTD.1: 33
- FMT_MTD.1.1: 5
- FMT_SMF.1: 34
- FMT_SMF.1.1: 5
- FMT_SMR.1: 24
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 2
- FPT_SEP.1: 12
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_STM_EXP.1: 8
- FPT_STM_EXP.1.1: 1
- FPT_TST.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST_EXP.1: 9
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 8
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 3
- FTP_ITC_EXP.1: 17
- FTP_ITC_EXP.1.1: 3
- FTP_ITC_EXP.1.2: 2
- FTP_ITC_EXP.1.3: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMINISTRATION: 1
- A.NO_EVIL: 1
- A.NO_GENERAL_P: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- O:
- O.ACCESS: 1
- O.ADMIN_GUIDANCE: 6
- O.AUDIT_GENERATION: 4
- O.CONFIGURATION_: 4
- O.CONFIGURATION_IDENTIF: 2
- O.CORRECT_: 3
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 8
- O.CRYPTOGRAPHY_VAL: 1
- O.CRYPTOGRAPHY_VALID: 2
- O.CRYPTOGRAPHY_VALIDA: 2
- O.CRYPTOGRAPHY_VALIDATED: 1
- O.DISPLAY_BANNER: 4
- O.DOCUMENTED_: 2
- O.DOCUMENTED_DESIG: 1
- O.DOCUMENTED_DESIGN: 3
- O.MANAGE: 10
- O.MEDIATE: 6
- O.PARTIAL_: 1
- O.PARTIAL_FUNCTIONA: 1
- O.PARTIAL_FUNCTIONAL_: 2
- O.PARTIAL_FUNCTIONAL_T: 2
- O.RESIDUAL_: 5
- O.RESIDUAL_INFORMATIO: 1
- O.RESIDUAL_INFORMATION: 4
- O.SELF_PROTECTION: 6
- O.TIME_STAMPS: 4
- O.TOE_ACCESS: 10
- O.VULNERABILITY_: 5
- O.VULNERABILITY_ANALYSI: 3
- O.VULNERABILITY_ANALYSIS: 1
- OE:
- OE.ADMIN: 1
- OE.AUDIT_PROTECTION: 4
- OE.AUDIT_REVIEW: 4
- OE.MANAGE: 8
- OE.NO_EVIL: 7
- OE.NO_GENERAL_PURP: 1
- OE.NO_GENERAL_PURPO: 1
- OE.NO_GENERAL_PURPOS: 1
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 3
- OE.PROTECT_MGMT_CO: 1
- OE.PROTECT_MGMT_COM: 1
- OE.PROTECT_MGMT_COMM: 1
- OE.PROTECT_MGMT_COMMS: 1
- OE.RESIDUAL_INFORMA: 1
- OE.RESIDUAL_INFORMATI: 3
- OE.RESIDUAL_INFORMATIO: 2
- OE.RESIDUAL_INFORMATION: 1
- OE.SELF_PROTECTION: 6
- OE.TIME_STAMPS: 4
- OE.TOE_ACCESS: 8
- OE.TOE_NO_BYPASS: 7
- T:
- T.ACCIDENTAL_: 1
- T.ACCIDENTAL_ADMIN_: 2
- T.ACCIDENTAL_CRYPTO_COM: 1
- T.MASQUERADE: 2
- T.POOR_DESIGN: 2
- T.POOR_IMPLEMENTATION: 2
- T.POOR_TEST: 2
- T.RESIDUAL_DATA: 2
- T.SIGNAL_DETECT: 1
- T.TSF_COMPROMISE: 2
- T.UNATTENDED_: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_: 1
- T.UNAUTH_ADMIN_ACCESS: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-20012-09-001: 1
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 3
- CCMB-2012-09-003: 3
- CCMB-2012-09-004: 1
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- FIPS:
- FIPS 140: 1
- FIPS 140-1: 1
- FIPS 140-2: 13
- FIPS PUB 140-2: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Hartmut Möllmann;[email protected];Matthias Spielmann;Ulrich Schurkus
- /Keywords: CC-Dokumentation
- /Subject: Sicherheitsvorgaben
- /Title: Sicherheitsvorgabe für das Behälter Identifikationssystem „IMELO-Secure“ Version 1.0
- pdf_file_size_bytes: 747264
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
- /Author: User
- /CreationDate: D:20090520174815
- /Creator: Pdf995
- /Keywords:
- /ModDate: D:20090520174815
- /Producer: GPL Ghostscript 8.15
- /Subject:
- /Title:
- pdf_file_size_bytes: 546993
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |