name |
MAWIS-Security Rev. 4.0 |
Motorola WS5100 Wireless Switch |
category |
Other Devices and Systems |
Access Control Devices and Systems |
scheme |
DE |
NO |
status |
active |
archived |
not_valid_after |
23.01.2030 |
01.09.2019 |
not_valid_before |
24.01.2025 |
09.07.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20090709_SERTIT-009_CR_v1_0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/MOTOROLA_ST-v1.5.pdf |
manufacturer |
MOBA Mobile Automation AG |
Motorola, Inc. |
manufacturer_web |
https://www.moba.de/ |
https://www.motorola.com/ |
security_level |
ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
EAL4+, ALC_FLR.2 |
dgst |
c8c9125bad005bbe |
35a0ae25dbb74530 |
heuristics/cert_id |
BSI-DSZ-CC-0496-V2-2025 |
SERTIT-009 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ASE_OBJ.2, AGD_OPE.1, ASE_ECD.1, ASE_REQ.2 |
ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
heuristics/extracted_versions |
4.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Other products
- cert_id: BSI-DSZ-CC-0496-V2-2025
- certification_date: 24.01.2025
- enhanced:
- applicant: MOBA Mobile Automation AG Kapellenstraße 15 65555 Limburg
- assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
- certification_date: 24.01.2025
- description: The TOE is the Waste Bin Identification Systems (WBIS) MAWIS-Security Rev 4.0. The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0496-V2-2025', 'description': 'The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0496-2017'})]
- evaluation_facility: Deutsches Forschungszentrum für Künstliche Intelligenz GmbH
- expiration_date: 23.01.2030
- product: MAWIS-Security Rev. 4.0
- protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
- product: MAWIS-Security Rev. 4.0
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/0496.html
- vendor: MOBA Mobile Automation AG
|
- category: Other Devices and Systems
- certification_date: 09.07.2009
- developer: Motorola, Inc.
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-009
- certification_date: 09.07.2009
- description: SERTIT-009 C
- developer: Motorola, Inc.
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134617-1607949712/SERTIT/Sertifikater/2009/09/MOTOROLA_ST-v1.5.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134614-1607949708/SERTIT/Sertifikater/2009/09/20090709_SERTIT-009_CR_v1_0.pdf'})]})
- evaluation_facility: Aspect Labs
- level: EAL 4, ALC_FLR.2
- mutual_recognition: CCRA, SOG-IS
- product: HW: WS5100; SW: WS5100-3.0.0.0-022GR
- protection_profile: US Government Wireless Local Area Network (WLAN) Access System Protection Profile for Basic Robustness Environments, Version 1.0, April 2006
- sponsor: Motorola, Inc.
- product: Motorola WS5100 Wireless Switch
- url: https://sertit.no/certified-products/product-archive/motorola-ws5100-wireless-switch
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
f1e8c937d15e713a |
a91e9c889e6f3e47 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_as_br_v1.0.pdf |
pdf_data/cert_filename |
0496V2c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0496-V2-2025: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ASE:
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
- /Title: Zertifikat BSI-DSZ-CC-0496-V2-2025
- pdf_file_size_bytes: 386689
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
0496V2a_pdf.pdf |
20090709_SERTIT-009_CR_v1_0.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0496-V2-2025
- cert_item: MAWIS-Security Rev. 4.0
- cert_lab: BSI
- developer: MOBA Mobile Automation AG
- match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0496-V2-2025: 10
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0010-2004: 1
- BSI-PP-0010-: 1
- BSI-PP-0010-2004: 1
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 5
- EAL 2: 1
- EAL 4: 1
|
- EAL:
- EAL 4: 27
- EAL 4 augmented: 23
- EAL1: 1
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ASE:
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SEL.1: 1
- FCS:
- FCS_BCM_EXP.1: 1
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_CKM_EXP.2: 1
- FCS_COP_EXP.1: 1
- FCS_COP_EXP.2: 1
- FDP:
- FDP_PUD_EXP.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UAU_EXP.5: 1
- FIA_UID.2: 1
- FIA_USB.1: 2
- FMT:
- FMT_MOF.1: 3
- FMT_MSA.2: 1
- FMT_MTD.1: 2
- FMT_SMF.1: 3
- FMT_SMR.1: 1
- FPT:
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM_EXP.1: 1
- FPT_TST_EXP.1: 1
- FPT_TST_EXP.2: 1
- FTA:
- FTA_SSL.3: 1
- FTA_TAB.1: 1
- FTP:
- FTP_ITC_EXP.1: 1
- FTP_TRP.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
- /Title: Zertifizierungsreport BSI-DSZ-CC-0496-V2-2025
- pdf_file_size_bytes: 484994
- pdf_hyperlinks: https://www.sogis.eu/, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: ragea
- /CR issue: 1.0
- /CRNumber: 009
- /Company: SERTIT
- /CreationDate: D:20090709131724+02'00'
- /Creator: Acrobat PDFMaker 8.1 for Word
- /Day Month Year: 9 July 2009
- /Developers name: Motorola, Inc.
- /EAL: EAL 4 augmented with ALC_FLR.2
- /ETR date final: 28 May 2009
- /Keywords: ugradert
- /ModDate: D:20090709131731+02'00'
- /Name of EVIT: Aspect Labs, a division of BKP Security, Inc.
- /PP name: US Government Wireless Local Network Access System Protection Profile for Basic Robustness Environments
- /Prod name and version platform: Motorola WS5100 Wireless Switch
- /Producer: Adobe PDF Library 8.0
- /Product name: Motorola WS5100 Wireless Switch
- /Product version: HW: WS5100 SW: WS5100-3.0.0.0-022GR
- /Sponsor name: Motorola, Inc.
- /Title: tittel
- pdf_file_size_bytes: 474373
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
0496V2b_pdf.pdf |
MOTOROLA_ST-v1.5.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1+: 1
- EAL1: 9
- EAL1 augmented: 2
|
- EAL:
- EAL4: 9
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- ALC:
- ASE:
- ASE_ECD.1: 2
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 5
- ASE_REQ.1: 1
- ASE_REQ.2: 5
- ASE_SPD.1: 6
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.1: 1
- ACM_CAP.2: 1
- ACM_CAP.4: 2
- ACM_SCP.1: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.1: 2
- ADO_DEL.2: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_HLD.1: 1
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 6
- ADV_SPM.1: 3
- AGD:
- AGD_ADM.1: 6
- AGD_USR.1: 3
- ALC:
- ALC_DVS.1: 2
- ALC_FLR.2: 8
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 4
- AVA:
- AVA_MSU.1: 2
- AVA_MSU.2: 2
- AVA_SOF.1: 5
- AVA_VLA.1: 3
- AVA_VLA.2: 2
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_DAU: 2
- FDP_DAU.1: 8
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ITT: 4
- FDP_ITT.1: 1
- FDP_ITT.5: 20
- FDP_ITT.5.1: 2
- FDP_SDI: 2
- FDP_SDI.1: 9
- FDP_SDI.1.1: 1
- FPT:
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 8
- FRU_FLT.1.1: 1
|
- FAU:
- FAU_GEN.1: 23
- FAU_GEN.1.1: 4
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FAU_STG: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 6
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP.1: 11
- FCS_BCM_EXP.1.1: 1
- FCS_BCM_EXP.1.2: 1
- FCS_BCM_EXP.1.3: 1
- FCS_CKM: 1
- FCS_CKM.1: 16
- FCS_CKM.2: 5
- FCS_CKM.4: 15
- FCS_CKM_EXP.2: 16
- FCS_CKM_EXP.2.1: 1
- FCS_COP: 2
- FCS_COP.1: 3
- FCS_COP_EXP.1: 16
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 23
- FCS_COP_EXP.2.1: 2
- FDP:
- FDP_ACC.1: 1
- FDP_AFC: 1
- FDP_IFC: 1
- FDP_IFC.1: 1
- FDP_PUD: 1
- FDP_PUD_EXP: 2
- FDP_PUD_EXP.1: 8
- FDP_PUD_EXP.1.1: 1
- FDP_PUP_EXP.1: 1
- FDP_RIP.1: 15
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 15
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 15
- FIA_ATD.1.1: 2
- FIA_UAU: 4
- FIA_UAU.1: 16
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5.1: 1
- FIA_UAU_EXP.5: 14
- FIA_UAU_EXP.5.1: 2
- FIA_UAU_EXP.5.2: 2
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB.1: 14
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF.1: 29
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 15
- FMT_MSA.2.1: 1
- FMT_MTD.1: 33
- FMT_MTD.1.1: 5
- FMT_SMF.1: 34
- FMT_SMF.1.1: 5
- FMT_SMR.1: 24
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 2
- FPT_SEP.1: 12
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_STM_EXP.1: 8
- FPT_STM_EXP.1.1: 1
- FPT_TST.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST_EXP.1: 9
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 8
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 3
- FTP_ITC_EXP.1: 17
- FTP_ITC_EXP.1.1: 3
- FTP_ITC_EXP.1.2: 2
- FTP_ITC_EXP.1.3: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMINISTRATION: 1
- A.NO_EVIL: 1
- A.NO_GENERAL_P: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- O:
- O.ACCESS: 1
- O.ADMIN_GUIDANCE: 6
- O.AUDIT_GENERATION: 4
- O.CONFIGURATION_: 4
- O.CONFIGURATION_IDENTIF: 2
- O.CORRECT_: 3
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 8
- O.CRYPTOGRAPHY_VAL: 1
- O.CRYPTOGRAPHY_VALID: 2
- O.CRYPTOGRAPHY_VALIDA: 2
- O.CRYPTOGRAPHY_VALIDATED: 1
- O.DISPLAY_BANNER: 4
- O.DOCUMENTED_: 2
- O.DOCUMENTED_DESIG: 1
- O.DOCUMENTED_DESIGN: 3
- O.MANAGE: 10
- O.MEDIATE: 6
- O.PARTIAL_: 1
- O.PARTIAL_FUNCTIONA: 1
- O.PARTIAL_FUNCTIONAL_: 2
- O.PARTIAL_FUNCTIONAL_T: 2
- O.RESIDUAL_: 5
- O.RESIDUAL_INFORMATIO: 1
- O.RESIDUAL_INFORMATION: 4
- O.SELF_PROTECTION: 6
- O.TIME_STAMPS: 4
- O.TOE_ACCESS: 10
- O.VULNERABILITY_: 5
- O.VULNERABILITY_ANALYSI: 3
- O.VULNERABILITY_ANALYSIS: 1
- OE:
- OE.ADMIN: 1
- OE.AUDIT_PROTECTION: 4
- OE.AUDIT_REVIEW: 4
- OE.MANAGE: 8
- OE.NO_EVIL: 7
- OE.NO_GENERAL_PURP: 1
- OE.NO_GENERAL_PURPO: 1
- OE.NO_GENERAL_PURPOS: 1
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 3
- OE.PROTECT_MGMT_CO: 1
- OE.PROTECT_MGMT_COM: 1
- OE.PROTECT_MGMT_COMM: 1
- OE.PROTECT_MGMT_COMMS: 1
- OE.RESIDUAL_INFORMA: 1
- OE.RESIDUAL_INFORMATI: 3
- OE.RESIDUAL_INFORMATIO: 2
- OE.RESIDUAL_INFORMATION: 1
- OE.SELF_PROTECTION: 6
- OE.TIME_STAMPS: 4
- OE.TOE_ACCESS: 8
- OE.TOE_NO_BYPASS: 7
- T:
- T.ACCIDENTAL_: 1
- T.ACCIDENTAL_ADMIN_: 2
- T.ACCIDENTAL_CRYPTO_COM: 1
- T.MASQUERADE: 2
- T.POOR_DESIGN: 2
- T.POOR_IMPLEMENTATION: 2
- T.POOR_TEST: 2
- T.RESIDUAL_DATA: 2
- T.SIGNAL_DETECT: 1
- T.TSF_COMPROMISE: 2
- T.UNATTENDED_: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_: 1
- T.UNAUTH_ADMIN_ACCESS: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ISO:
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- FIPS:
- FIPS 140: 1
- FIPS 140-1: 1
- FIPS 140-2: 13
- FIPS PUB 140-2: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Holz, Stephan
- /Subject: Sicherheitsvorgaben nach WBIS-PP
- /Title: MAWIS-Security, Rev. 4.0
- pdf_file_size_bytes: 1129671
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: User
- /CreationDate: D:20090520174815
- /Creator: Pdf995
- /Keywords:
- /ModDate: D:20090520174815
- /Producer: GPL Ghostscript 8.15
- /Subject:
- /Title:
- pdf_file_size_bytes: 546993
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |