Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MAWIS-Security Rev. 4.0
BSI-DSZ-CC-0496-V2-2025
SIAVAL PKI VERSION 1
2020-34-INF-3784
name MAWIS-Security Rev. 4.0 SIAVAL PKI VERSION 1
category Other Devices and Systems Key Management Systems
scheme DE ES
not_valid_after 23.01.2030 21.04.2027
not_valid_before 24.01.2025 21.04.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-34_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-34%20INF-3784.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-34%20ST.pdf
manufacturer MOBA Mobile Automation AG SIA Sistemas Informáticos Abiertos S.A.
manufacturer_web https://www.moba.de/ https://sia.es
security_level ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ EAL4+, ALC_FLR.1
dgst c8c9125bad005bbe 077319415aa6197e
heuristics/cert_id BSI-DSZ-CC-0496-V2-2025 2020-34-INF-3784
heuristics/cert_lab BSI []
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ASE_OBJ.2, AGD_OPE.1, ASE_ECD.1, ASE_REQ.2 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 4.0 1
heuristics/scheme_data
  • category: Other products
  • cert_id: BSI-DSZ-CC-0496-V2-2025
  • certification_date: 24.01.2025
  • enhanced:
    • applicant: MOBA Mobile Automation AG Kapellenstraße 15 65555 Limburg
    • assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
    • certification_date: 24.01.2025
    • description: The TOE is the Waste Bin Identification Systems (WBIS) MAWIS-Security Rev 4.0. The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0496-V2-2025', 'description': 'The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0496-2017'})]
    • evaluation_facility: Deutsches Forschungszentrum für Künstliche Intelligenz GmbH
    • expiration_date: 23.01.2030
    • product: MAWIS-Security Rev. 4.0
    • protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
  • product: MAWIS-Security Rev. 4.0
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/0496.html
  • vendor: MOBA Mobile Automation AG
  • category: Others
  • certification_date: 21.04.2022
  • enhanced:
    • category: Others
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1442
    • certification_date: 21.04.2022
    • description: SIAVAL PKI comprises all the security functions required by a Certification Authority, allowing the issuance of certificates and CRLs, the management of the life cycle of these certificates and the capacity to provide information about the revocation status so that from a VA its status can be verified. The main functionality offered by the TOE is detailed next: Access Control: Access control is established for the operations performed in the TOE so that only authorized users can perform the operations for which they have been authorized. Only the HealthCheck service does not establish user access control but performs IP access control to validate the origin of the requests. Key Management: The private keys of the CAs will reside in a cryptographic module outside the TOE scope and the TSF will make use of them for the issuance of certificates and CRLs, invoking the signature operation on the device. The public keys are stored in x509 certificates and protected in integrity Management of the issuance of certificates and CRLs: Several CA’s can be managed by establishing a hierarchy among them, so that a Root CA and subordinate CA's can be established to issue for example certificates with different purposes, personal signature certificates, SSL/TLS Web certificates, etcCertificates and signed CRLs are generated, making it possible to request certificates through CSR using a mechanism such as PKCS # 10 or CRMF.Profiles and configurations are established for the issuance of certificates and generation of CRLs, so that it is possible to establish your own characteristics depending on the configuration of the profile.It enables the publication of certificates and CRLs in different repositories as well as the recovery of these certificates and CRLs from the TOE itself. Transmission Data security: The user keys will always be exported in keystores and certificates and CRLs will always be issued in a way that preserves their integrity. Audit Data: Audit trail is recorded for all operations performed by users in the system. A value calculated by the TSF will be added so that the integrity of the contained data can be checked. The analysis and consultation of audit data is not part of the scope of the TOE.
    • evaluation_facility: DEKRA Testing and Certification S.A.U.
    • level: EAL4 + ALC_FLR.1
    • manufacturer: Sistemas Informáticos Abiertos S.A.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1443
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1441
    • type: Product
  • manufacturer: Sistemas Informáticos Abiertos S.A.
  • product: SIAVAL PKI VERSION 1
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/813-siaval-pki-version-1
heuristics/protection_profiles f1e8c937d15e713a {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf {}
pdf_data/cert_filename 0496V2c_pdf.pdf 2020-34_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0496-V2-2025: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0010-2004: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ASE:
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.1: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
  • /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
  • /Title: Zertifikat BSI-DSZ-CC-0496-V2-2025
  • pdf_file_size_bytes: 386689
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 842811
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 0496V2a_pdf.pdf 2020-34 INF-3784.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0496-V2-2025
    • cert_item: MAWIS-Security Rev. 4.0
    • cert_lab: BSI
    • developer: MOBA Mobile Automation AG
    • match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0496-V2-2025: 10
  • ES:
    • 2020-34-INF-3784- v1: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0010-2004: 1
    • BSI-PP-0010-: 1
    • BSI-PP-0010-2004: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
    • EAL 2: 1
    • EAL 4: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL4: 7
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ASE:
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 4
    • ASE_SPD.1: 4
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 9
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_STG.5: 1
  • FCO:
    • FCO_NRO.1: 1
  • FCS:
    • FCS_COP.1: 1
    • FCS_COP.2: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_UCT.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A: 1
    • A.U: 4
pdf_data/report_keywords/eval_facility
  • DFKI:
    • DFKI: 3
  • DEKRA:
    • DEKRA Testing and Certification: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS#11: 1
    • PKCS11: 1
pdf_data/report_metadata
pdf_data/st_filename 0496V2b_pdf.pdf 2020-34 ST.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0010-2004: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1+: 1
    • EAL1: 9
    • EAL1 augmented: 2
  • EAL:
    • EAL 4: 2
    • EAL4: 3
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.1: 1
  • ASE:
    • ASE_ECD.1: 2
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 5
    • ASE_REQ.1: 1
    • ASE_REQ.2: 5
    • ASE_SPD.1: 6
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_DAU: 2
    • FDP_DAU.1: 8
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ITT: 4
    • FDP_ITT.1: 1
    • FDP_ITT.5: 20
    • FDP_ITT.5.1: 2
    • FDP_SDI: 2
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
  • FPT:
    • FPT_FLS.1: 2
  • FRU:
    • FRU_FLT: 2
    • FRU_FLT.1: 8
    • FRU_FLT.1.1: 1
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 1
    • FAU_STG.5: 10
    • FAU_STG.5.1: 2
  • FCO:
    • FCO_NRO.1: 5
    • FCO_NRO.1.1: 1
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 1
  • FCS:
    • FCS_CKM.1: 4
    • FCS_CKM.4: 4
    • FCS_COP: 2
    • FCS_COP.1: 20
    • FCS_COP.1.1: 1
    • FCS_COP.2: 20
    • FCS_COP.2.1: 2
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
  • FIA:
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 5
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 5
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.CPS: 2
    • A.U: 1
  • OE:
    • OE.CPS: 4
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 1
pdf_data/st_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 11
      • HMAC-SHA-256: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ISO:
    • ISO/IEC 18000-63: 2
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 140-2: 1
    • FIPS140-2: 2
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 19790: 2
  • PKCS:
    • PKCS#11: 3
    • PKCS#12: 2
    • PKCS11: 1
  • RFC:
    • RFC 5280: 9
    • RFC5280: 2
  • X509:
    • X.509: 14
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1 as it specifies that the TSF must prevent or detect data alterations, leaving such operations out of scope in FAU_STG.5. Component levelling FAU_STG.5 Audit log signing event, incorporate a computation: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Holz, Stephan
  • /Subject: Sicherheitsvorgaben nach WBIS-PP
  • /Title: MAWIS-Security, Rev. 4.0
  • pdf_file_size_bytes: 1129671
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 773365
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different