name |
MAWIS-Security Rev. 4.0 |
Infineon IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step G11 and H11 with optional HSL v2.01.6198, optional SCL v2.13.001, optional ACL v3.03.003, optional HCL v1.13.001, optional RCL v1.10.006 and with specific IC-dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
NL |
status |
active |
active |
not_valid_after |
23.01.2030 |
10.12.2026 |
not_valid_before |
24.01.2025 |
10.12.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-certificate%2021-0173264_3.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-21-0173264-CR3-1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0173264-STLite.pdf |
manufacturer |
MOBA Mobile Automation AG |
Infineon Technologies AG |
manufacturer_web |
https://www.moba.de/ |
https://www.infineon.com/ |
security_level |
ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
EAL6+, ALC_FLR.1 |
dgst |
c8c9125bad005bbe |
3a8486e353d288c3 |
heuristics/cert_id |
BSI-DSZ-CC-0496-V2-2025 |
NSCIB-CC-0173264-CR3 |
heuristics/cert_lab |
BSI |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ASE_OBJ.2, AGD_OPE.1, ASE_ECD.1, ASE_REQ.2 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
4.0 |
2.13.001, 1.13.001, 2.01.6198, 8.06.001, 1.10.006, 80.203.00.3, 3.03.003 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1158-V2-2023 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-1158-V3-2025 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Other products
- cert_id: BSI-DSZ-CC-0496-V2-2025
- certification_date: 24.01.2025
- enhanced:
- applicant: MOBA Mobile Automation AG Kapellenstraße 15 65555 Limburg
- assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
- certification_date: 24.01.2025
- description: The TOE is the Waste Bin Identification Systems (WBIS) MAWIS-Security Rev 4.0. The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0496-V2-2025', 'description': 'The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0496-2017'})]
- evaluation_facility: Deutsches Forschungszentrum für Künstliche Intelligenz GmbH
- expiration_date: 23.01.2030
- product: MAWIS-Security Rev. 4.0
- protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
- product: MAWIS-Security Rev. 4.0
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/0496.html
- vendor: MOBA Mobile Automation AG
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
f1e8c937d15e713a |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
0496V2c_pdf.pdf |
NSCIB-certificate 21-0173264_3.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0496-V2-2025: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 7: 1
- EAL6: 1
- EAL6 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
- ASE:
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
|
- ALC:
- ALC_FLR.1: 1
- ALC_FLR.3: 1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
- ISO:
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
- /Title: Zertifikat BSI-DSZ-CC-0496-V2-2025
- pdf_file_size_bytes: 386689
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20211216135142+01'00'
- /Creator: C458-M
- /ModDate: D:20211216133847+01'00'
- /Producer: KONICA MINOLTA bizhub C458
- /Title: C458-M&S21121613510
- pdf_file_size_bytes: 84313
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0496V2a_pdf.pdf |
CC-21-0173264-CR3-1.0.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0496-V2-2025
- cert_item: MAWIS-Security Rev. 4.0
- cert_lab: BSI
- developer: MOBA Mobile Automation AG
- match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
- NL:
|
- DE:
- NL:
- cert_id: NSCIB-CC-0173264-CR3
- cert_item: IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step G11 and H11 with optional HSL v2.01.6198, optional SCL v2.13.001, optional ACL v3.03.003, optional HCL v1.13.001, optional RCL v1.10.006 and with specific IC- dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001
- cert_lab:
- developer: Infineon Technologies AG
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0496-V2-2025: 10
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0010-2004: 1
- BSI-PP-0010-: 1
- BSI-PP-0010-2004: 1
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 5
- EAL 2: 1
- EAL 4: 1
|
- EAL:
- EAL 6: 1
- EAL4: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ASE:
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 3
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 3
- JIL-AM: 2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
- /Title: Zertifizierungsreport BSI-DSZ-CC-0496-V2-2025
- pdf_file_size_bytes: 484994
- pdf_hyperlinks: https://www.sogis.eu/, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
|
pdf_data/st_filename |
0496V2b_pdf.pdf |
NSCIB-CC-0173264-STLite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1+: 1
- EAL1: 9
- EAL1 augmented: 2
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL6: 122
- EAL6 augmented: 119
- EAL6+: 120
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- ALC:
- ASE:
- ASE_ECD.1: 2
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 5
- ASE_REQ.1: 1
- ASE_REQ.2: 5
- ASE_SPD.1: 6
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_CMC.5: 1
- ADV_FSP: 1
- ADV_FSP.4: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_SPM: 2
- ADV_SPM.1: 7
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 3
- ALC_CMC.5: 2
- ALC_CMS: 2
- ALC_CMS.4: 2
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.1: 2
- ALC_DVS.2: 4
- ALC_FLR.1: 11
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 9
- ASE_CCL.1: 1
- ASE_ECD: 4
- ASE_ECD.1: 1
- ASE_INT: 26
- ASE_INT.1: 1
- ASE_OBJ: 9
- ASE_OBJ.2: 1
- ASE_REQ: 46
- ASE_REQ.2: 1
- ASE_SPD: 8
- ASE_SPD.1: 1
- ASE_TSS: 17
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 3
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_DAU: 2
- FDP_DAU.1: 8
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ITT: 4
- FDP_ITT.1: 1
- FDP_ITT.5: 20
- FDP_ITT.5.1: 2
- FDP_SDI: 2
- FDP_SDI.1: 9
- FDP_SDI.1.1: 1
- FPT:
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 8
- FRU_FLT.1.1: 1
|
- FAU:
- FAU_SAS: 3
- FAU_SAS.1: 11
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 49
- FCS_CKM.1: 28
- FCS_CKM.2: 4
- FCS_CKM.4: 29
- FCS_COP: 113
- FCS_COP.1: 24
- FCS_RNG: 61
- FCS_RNG.1: 18
- FDP:
- FDP_ACC: 17
- FDP_ACC.1: 27
- FDP_ACC.1.1: 1
- FDP_ACF: 17
- FDP_ACF.1: 23
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_AFC: 1
- FDP_IFC.1: 16
- FDP_ITC.1: 23
- FDP_ITC.2: 23
- FDP_ITT.1: 14
- FDP_PHP.3: 1
- FDP_SDC: 2
- FDP_SDC.1: 12
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 14
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 16
- FDP_UCT.1.1: 1
- FDP_UIT.1: 16
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 3
- FIA_API.1: 13
- FIA_API.1.1: 1
- FIA_SOS.2: 2
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FMT:
- FMT_ACF: 1
- FMT_LIM: 29
- FMT_LIM.1: 12
- FMT_LIM.2: 11
- FMT_MSA.1: 17
- FMT_MSA.1.1: 1
- FMT_MSA.3: 20
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_FLS.1: 22
- FPT_ITC.1: 2
- FPT_ITT.1: 15
- FPT_PHP.3: 19
- FPT_TST: 5
- FPT_TST.1: 11
- FPT_TST.2: 31
- FPT_TST.2.1: 1
- FRU:
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.AES: 4
- O.RND: 4
- O.TDES: 4
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 12
- Infineon Technologies: 21
- Infineon Technologies AG: 29
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 28
- Triple-DES: 2
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Malfunction: 11
- malfunction: 1
- SCA:
- DPA: 2
- Leak-Inherent: 11
- Physical Probing: 2
- SPA: 1
- physical probing: 1
- side channel: 7
- side-channel: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ISO:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 4
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 2
- ISO:
- ISO/IEC 11770-3: 1
- ISO/IEC 14888-3: 6
- ISO/IEC 15946-1: 1
- ISO/IEC 7816-3: 1
- ISO/IEC 9797-1: 2
- ISO/IEC 9798-2: 1
- NIST:
- SP 800-108: 1
- SP 800-38A: 9
- SP 800-38B: 5
- SP 800-67: 5
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. End of note: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Holz, Stephan
- /Subject: Sicherheitsvorgaben nach WBIS-PP
- /Title: MAWIS-Security, Rev. 4.0
- pdf_file_size_bytes: 1129671
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |