name |
MAWIS-Security Rev. 4.0 |
NXP P541G072V0P (JCOP 41 v2.3.1) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
active |
archived |
not_valid_after |
23.01.2030 |
01.09.2019 |
not_valid_before |
24.01.2025 |
10.08.2007 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0426a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0426b.pdf |
manufacturer |
MOBA Mobile Automation AG |
IBM Deutschland Entwicklung GmbH |
manufacturer_web |
https://www.moba.de/ |
https://www.ibm.com/de/entwicklung/ |
security_level |
ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
dgst |
c8c9125bad005bbe |
1c12f1d98a292597 |
heuristics/cert_id |
BSI-DSZ-CC-0496-V2-2025 |
BSI-DSZ-CC-0426-2007 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ASE_OBJ.2, AGD_OPE.1, ASE_ECD.1, ASE_REQ.2 |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ADV_INT.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, AVA_CCA.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
4.0 |
2.3.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0294-2006, BSI-DSZ-CC-0348-2006 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0294-2006, BSI-DSZ-CC-0348-2006 |
heuristics/scheme_data |
- category: Other products
- cert_id: BSI-DSZ-CC-0496-V2-2025
- certification_date: 24.01.2025
- enhanced:
- applicant: MOBA Mobile Automation AG Kapellenstraße 15 65555 Limburg
- assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
- certification_date: 24.01.2025
- description: The TOE is the Waste Bin Identification Systems (WBIS) MAWIS-Security Rev 4.0. The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0496-V2-2025', 'description': 'The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0496-2017'})]
- evaluation_facility: Deutsches Forschungszentrum für Künstliche Intelligenz GmbH
- expiration_date: 23.01.2030
- product: MAWIS-Security Rev. 4.0
- protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
- product: MAWIS-Security Rev. 4.0
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/0496.html
- vendor: MOBA Mobile Automation AG
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/protection_profiles |
f1e8c937d15e713a |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf |
{} |
pdf_data/cert_filename |
0496V2c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0496-V2-2025: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ASE:
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
- /Title: Zertifikat BSI-DSZ-CC-0496-V2-2025
- pdf_file_size_bytes: 386689
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
0496V2a_pdf.pdf |
0426a.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0496-V2-2025
- cert_item: MAWIS-Security Rev. 4.0
- cert_lab: BSI
- developer: MOBA Mobile Automation AG
- match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
|
- DE:
- cert_id: BSI-DSZ-CC-0426-2007
- cert_item: NXP P541G072V0P (JCOP 41 v2.3.1
- cert_lab: BSI
- developer: IBM Deutschland Entwicklung GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0496-V2-2025: 10
|
- DE:
- BSI-DSZ-CC-0294-: 1
- BSI-DSZ-CC-0294-2006: 1
- BSI-DSZ-CC-0348: 1
- BSI-DSZ-CC-0348-2006: 2
- BSI-DSZ-CC-0426-2007: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0010-2004: 1
- BSI-PP-0010-: 1
- BSI-PP-0010-2004: 1
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 5
- EAL 2: 1
- EAL 4: 1
|
- EAL:
- EAL 1: 1
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 11
- EAL4 augmented: 1
- EAL5: 7
- EAL5 augmented: 1
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ASE:
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.3: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 1
- ADV_HLD: 2
- ADV_HLD.3: 1
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.2: 1
- ADV_SPM: 2
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 2
- ALC_TAT.2: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.2: 2
- AVA_MSU.3: 8
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 3
- AVA_VLA.2: 3
- AVA_VLA.3: 1
- AVA_VLA.4: 9
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 1
- FCS_COP: 7
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACF: 2
- FDP_ETC.1: 1
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_ITC.1: 1
- FDP_RIP: 6
- FDP_ROL: 1
- FDP_SDI.2: 1
- FIA:
- FIA_AFL: 2
- FIA_ATD: 1
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UID: 2
- FIA_USB.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 8
- FMT_MTD: 1
- FMT_MTD.3: 1
- FMT_SMF.1: 1
- FMT_SMR: 3
- FPR:
- FPT:
- FPT_AMT: 1
- FPT_FLS: 2
- FPT_PHP: 1
- FPT_PHP.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 1
- FRU:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.DLV_PROTECT: 1
- A.NATIVE: 1
- A.NO-DELETION: 1
- A.NO-INSTALL: 1
- A.TEST_OPERATE: 1
- A.USE_DIAG: 1
- A.USE_KEYS: 1
- A.VERIFICATION: 1
- OSP:
- T:
- T.ACCESS_DATA: 1
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DEL: 1
- T.DEL_IC_NOS: 1
- T.DEV_IC: 1
- T.DEV_NOS: 1
- T.EXE-CODE: 2
- T.FAULT: 1
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.LEAKAGE: 1
- T.NATIVE: 1
- T.OS_DECEIVE: 1
- T.OS_OPERATE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.RND: 1
- T.SID: 2
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 25
- NXP Semiconductors: 3
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Fault Injection: 1
- malfunction: 1
- SCA:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 20: 4
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 3
- AIS 36: 3
- ISO:
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
- Java Card 2.2.1: 1
- JavaCard 2.2.1: 2
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 3.1) Secure Smart Card Controller, Version 2.13, 01. June 2007, IBM Deutschland Entwicklung GmbH (confidential document) [7] Security Target lite NXP P541G072V0P (JCOP 41, v2.3.1) Secure Smart Card Controller, Version 1: 1
- 8] Evaluation Technical Report (ETR), Version 1, 27. July 2007, NXP P541G072V0P (JCOP 41 v2.3.1) (confidential document) [9] Java Card System – Minimal Configuration Protection Profile (registered at DCSSI under: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
- /Title: Zertifizierungsreport BSI-DSZ-CC-0496-V2-2025
- pdf_file_size_bytes: 484994
- pdf_hyperlinks: https://www.sogis.eu/, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20070816101337+02'00'
- /Creator: Acrobat PDFMaker 8.1 für Word
- /Keywords: Common Criteria, Certification, Zertifizierung, NXP P541G072V0P (JCOP 41 v2.3.1) , IBM Deutschland Entwirklung GmbH
- /ModDate: D:20070816102333+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20070816081328
- /Title: Certification Report BSI-DSZ-CC-0426-2007
- pdf_file_size_bytes: 389804
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 48
|
pdf_data/st_filename |
0496V2b_pdf.pdf |
0426b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0348: 1
- BSI-DSZ-CC-0348-2006: 3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 2
- BSI-PP-0017: 4
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1+: 1
- EAL1: 9
- EAL1 augmented: 2
|
- EAL:
- EAL4: 46
- EAL4 augmented: 7
- EAL5: 2
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- ALC:
- ASE:
- ASE_ECD.1: 2
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 5
- ASE_REQ.1: 1
- ASE_REQ.2: 5
- ASE_SPD.1: 6
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_HLD.2: 3
- ADV_IMP.1: 3
- ADV_IMP.2: 16
- ADV_LLD.1: 4
- ADV_RCR.1: 3
- ADV_SPM.1: 14
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 6
- AGD_USR: 2
- AGD_USR.1: 4
- ALC:
- ALC_DVS.1: 2
- ALC_DVS.2: 16
- ALC_LCD.1: 2
- ALC_TAT.1: 3
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 3
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 2
- AVA_MSU.3: 15
- AVA_SOF.1: 2
- AVA_VLA.2: 2
- AVA_VLA.3: 1
- AVA_VLA.4: 17
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_DAU: 2
- FDP_DAU.1: 8
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ITT: 4
- FDP_ITT.1: 1
- FDP_ITT.5: 20
- FDP_ITT.5.1: 2
- FDP_SDI: 2
- FDP_SDI.1: 9
- FDP_SDI.1.1: 1
- FPT:
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 8
- FRU_FLT.1.1: 1
|
- FAU:
- FAU_ARP: 15
- FAU_ARP.1: 7
- FAU_GEN.1: 5
- FAU_SAA.1: 23
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FCS:
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 6
- FCS_CKM.3.1: 1
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 26
- FCS_COP.1: 6
- FCS_COP.1.1: 7
- FCS_RND: 3
- FCS_RND.1: 15
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 9
- FDP_ACC.1: 21
- FDP_ACC.2: 3
- FDP_ACF: 8
- FDP_ACF.1: 22
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 4
- FDP_IFC.1: 22
- FDP_IFC.2: 5
- FDP_IFF: 4
- FDP_IFF.1: 16
- FDP_IFF.2: 11
- FDP_IFF.2.7: 3
- FDP_ITC.1: 15
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_RIP: 12
- FDP_RIP.1: 12
- FDP_ROL: 3
- FDP_ROL.1: 17
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 7
- FIA_ATD: 3
- FIA_ATD.1: 5
- FIA_UAU: 6
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 6
- FIA_UAU.4: 5
- FIA_UID: 7
- FIA_UID.1: 12
- FIA_UID.2: 4
- FIA_USB.1: 8
- FIA_USB.1.1: 2
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 19
- FMT_LIM.1.1: 2
- FMT_LIM.2: 18
- FMT_LIM.2.1: 2
- FMT_MSA: 25
- FMT_MSA.1: 26
- FMT_MSA.2: 22
- FMT_MSA.3: 25
- FMT_MTD: 3
- FMT_MTD.1: 7
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_REV.1: 2
- FMT_SMF: 5
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 18
- FMT_SMR.1: 32
- FPR:
- FPR_UNO.1: 6
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT: 5
- FPT_AMT.1: 5
- FPT_FLS: 20
- FPT_FLS.1: 11
- FPT_PHP: 5
- FPT_PHP.1: 9
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_RCV: 10
- FPT_RCV.3: 10
- FPT_RCV.3.1: 1
- FPT_RCV.4: 3
- FPT_RVM: 3
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_SEP: 6
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 2
- FPT_TDC.1: 6
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 5
- FRU_FLT.1: 1
- FRU_FLT.2: 8
- FRU_RSA: 1
- FRU_RSA.1: 4
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 11
- FTP_TDC.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.DLV_DATA: 2
- A.DLV_PROTECT: 4
- A.NATIVE: 9
- A.NO: 1
- A.NO-DELETION: 5
- A.NO-INSTALL: 5
- A.TEST_OPERATE: 7
- A.USE_DIAG: 6
- A.USE_KEY: 1
- A.USE_KEYS: 5
- A.VERIFICATION: 6
- D:
- D.API_DATA: 3
- D.APP_CODE: 9
- D.APP_C_DATA: 3
- D.APP_I_DATA: 7
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.JAVA_OBJECT: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.PIN: 15
- D.SEC_DATA: 5
- O:
- O.ALARM: 4
- O.CARD-MANAGEMENT: 5
- O.CIPHER: 9
- O.FAULT_PROTECT: 3
- O.FIREWALL: 11
- O.JAVAOBJECT: 5
- O.KEY-: 1
- O.KEY-MNGT: 7
- O.NATIVE: 6
- O.OPERATE: 11
- O.OS_DECEIVE: 5
- O.PHYSICAL: 6
- O.PIN-MNGT: 6
- O.PROTECT_DATA: 6
- O.REALLOCATION: 3
- O.RESOURCES: 7
- O.RMI_SERVICE: 1
- O.RND: 6
- O.SCP: 24
- O.SHRD_VAR_CONFID: 3
- O.SHRD_VAR_INTEG: 6
- O.SID: 9
- O.SIDE_CHANNEL: 4
- O.TRANSACTION: 6
- O.XYZ: 1
- OE:
- OE.CARD-: 1
- OE.CARD-MANAGEMENT: 1
- OE.DEL_NOS: 4
- OE.DEV_NOS: 3
- OE.DLV_DATA: 6
- OE.DLV_PROTECT: 3
- OE.IC_ORG: 5
- OE.NATIVE: 4
- OE.NO-DELETION: 3
- OE.NO-INSTALL: 4
- OE.SCP: 6
- OE.TEST_OPERATE: 6
- OE.USE_DIAG: 7
- OE.USE_KEY: 1
- OE.USE_KEYS: 7
- OE.VERIFICATION: 13
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.BYTECODE: 1
- OP.CREATE: 9
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 5
- OP.PUT: 7
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- T:
- T.ACCESS_DATA: 4
- T.CONFID-APPLI-DATA: 5
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 5
- T.DEL: 6
- T.DEL_IC_NOS: 7
- T.DEV_IC: 5
- T.DEV_NOS: 6
- T.EXE-CODE: 8
- T.FAULT: 4
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 5
- T.INTEG-JCS-CODE: 4
- T.INTEG-JCS-DATA: 3
- T.LEAKAGE: 4
- T.NATIVE: 6
- T.OS: 2
- T.OS_DECEIVE: 4
- T.OS_OPERATE: 5
- T.PHYSICAL: 4
- T.RESOURCES: 4
- T.RND: 4
- T.SID: 9
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Physical tampering: 4
- malfunction: 4
- physical tampering: 3
- SCA:
- DPA: 3
- SPA: 2
- physical probing: 4
- side channel: 1
- side-channel: 1
- timing attack: 1
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ISO:
|
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-1: 3
- FIPS 197: 3
- FIPS 46-3: 3
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.1.1: 3
- GlobalPlatform 2.1.1: 2
- JavaCard:
- Java Card 2.1.1: 3
- Java Card 2.1.2: 1
- Java Card 2.2: 3
- Java Card 2.2.1: 9
- JavaCard 2.2.1: 3
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 3
- javacard.framework.applet: 1
- javacard.framework.service: 1
- javacard.security: 8
- javacardx:
- javacardx.crypto: 6
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Holz, Stephan
- /Subject: Sicherheitsvorgaben nach WBIS-PP
- /Title: MAWIS-Security, Rev. 4.0
- pdf_file_size_bytes: 1129671
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: atp01700
- /CreationDate: D:20070723101548+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords: Secure Smart Card Controller, IBM, SECURITY TARGET LITE
- /ModDate: D:20070823110604+02'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: NXP P541G072V0P (JCOP 41 v2.3.1) Secure Smart Card Controller
- pdf_file_size_bytes: 679852
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 149
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |