Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MAWIS-Security Rev. 4.0
BSI-DSZ-CC-0496-V2-2025
ePass Applet on Sm@rtCafé® Expert 8.0 C2 v1.0
NSCIB-CC-2300051-01-CR
name MAWIS-Security Rev. 4.0 ePass Applet on Sm@rtCafé® Expert 8.0 C2 v1.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme DE NL
not_valid_after 23.01.2030 12.12.2028
not_valid_before 24.01.2025 12.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2300051-01-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2300051-01-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2300051-01_STLite%20v2.pdf
manufacturer MOBA Mobile Automation AG Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei
manufacturer_web https://www.moba.de/ https://www.veridos.com
security_level ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ ALC_DVS.2, EAL5+, AVA_VAN.5
dgst c8c9125bad005bbe 901e89b0e69f416b
heuristics/cert_id BSI-DSZ-CC-0496-V2-2025 NSCIB-CC-2300051-01-CR
heuristics/cert_lab BSI
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ASE_OBJ.2, AGD_OPE.1, ASE_ECD.1, ASE_REQ.2 ALC_DVS.2, ALC_FLR.1, AVA_VAN.5, ATE_DPT.2
heuristics/extracted_versions 4.0 1.0, 8.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300005-01-CR
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300005-01-CR
heuristics/scheme_data
  • category: Other products
  • cert_id: BSI-DSZ-CC-0496-V2-2025
  • certification_date: 24.01.2025
  • enhanced:
    • applicant: MOBA Mobile Automation AG Kapellenstraße 15 65555 Limburg
    • assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
    • certification_date: 24.01.2025
    • description: The TOE is the Waste Bin Identification Systems (WBIS) MAWIS-Security Rev 4.0. The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0496-V2-2025', 'description': 'The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0496-2017'})]
    • evaluation_facility: Deutsches Forschungszentrum für Künstliche Intelligenz GmbH
    • expiration_date: 23.01.2030
    • product: MAWIS-Security Rev. 4.0
    • protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
  • product: MAWIS-Security Rev. 4.0
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/0496.html
  • vendor: MOBA Mobile Automation AG
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/protection_profiles f1e8c937d15e713a 60455fc9564e2545, a33327d40f253f46, b380aabf93b29692
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/cert_filename 0496V2c_pdf.pdf NSCIB-2300051-01-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0496-V2-2025: 1
  • NL:
    • NSCIB-2300051-01: 1
    • NSCIB-CC-2300051-01: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0010-2004: 1
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
  • EAL:
    • EAL2: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ASE:
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
  • ALC:
    • ALC_DVS.2: 3
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 2
pdf_data/cert_keywords/vendor
  • GD:
    • Giesecke+Devrient: 2
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
  • /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
  • /Title: Zertifikat BSI-DSZ-CC-0496-V2-2025
  • pdf_file_size_bytes: 386689
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Microsoft Office User
  • /CreationDate: D:20240207150315+00'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20240207150315+00'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 72381
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 0496V2a_pdf.pdf NSCIB-2300051-01-CR.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0496-V2-2025
    • cert_item: MAWIS-Security Rev. 4.0
    • cert_lab: BSI
    • developer: MOBA Mobile Automation AG
    • match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
  • NL:
  • DE:
  • NL:
    • cert_id: NSCIB-CC-2300051-01-CR
    • cert_item: ePass Applet on Sm@rtCafé® Expert 8.0 C2 v1.0
    • cert_lab: SGS Brightsight B.V.
    • developer: Giesecke+Devrient Mobile Security GmbH
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0496-V2-2025: 10
  • DE:
    • BSI-DSZ-CC-1107-: 2
    • BSI-DSZ-CC-1107-V3-2022: 2
  • NL:
    • NSCIB-2300051-01: 1
    • NSCIB-CC-2300005-01: 1
    • NSCIB-CC-2300051-01-CR: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0010-2004: 1
    • BSI-PP-0010-: 1
    • BSI-PP-0010-2004: 1
  • BSI:
    • BSI-CC-PP-0055-2009: 1
    • BSI-CC-PP-0056-V2-: 1
    • BSI-CC-PP-0068-V2-MA-01: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
    • EAL 2: 1
    • EAL 4: 1
  • EAL:
    • EAL 4: 1
    • EAL 5: 2
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ASE:
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 4
    • ASE_SPD.1: 4
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_DVS.2: 6
  • ATE:
    • ATE_DPT.2: 2
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/vendor
  • GD:
    • Giesecke+Devrient: 4
pdf_data/report_keywords/eval_facility
  • DFKI:
    • DFKI: 3
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 8
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 2
    • JIL-AAPS: 1
    • JIL-AM: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • BSI:
    • AIS 36: 1
  • ICAO:
    • ICAO: 5
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • V3-2022, Version 5, 2022-05-11, “ETR for Composition”, TÜV Informationstechnik GmbH (confidential document) [HW-ST] Security Target Lite BSI-DSZ-CC-1107-V3-2022, Version 4.3.1, 2022-05-10, “IFX_CCI_00002Dh: 1
pdf_data/report_metadata
pdf_data/st_filename 0496V2b_pdf.pdf NSCIB-2300051-01_STLite v2.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 2
  • NL:
    • CC-22-0289060: 1
    • NSCIB-CC-23-2300005-01-CR: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0010-2004: 2
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0099-V2-2020: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1+: 1
    • EAL1: 9
    • EAL1 augmented: 2
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL5: 5
    • EAL5 augmented: 3
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.1: 1
  • ASE:
    • ASE_ECD.1: 2
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 5
    • ASE_REQ.1: 1
    • ASE_REQ.2: 5
    • ASE_SPD.1: 6
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ALC:
    • ALC_DVS.2: 9
    • ALC_FLR.1: 1
  • ATE:
    • ATE_DPT.2: 3
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_DAU: 2
    • FDP_DAU.1: 8
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ITT: 4
    • FDP_ITT.1: 1
    • FDP_ITT.5: 20
    • FDP_ITT.5.1: 2
    • FDP_SDI: 2
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
  • FPT:
    • FPT_FLS.1: 2
  • FRU:
    • FRU_FLT: 2
    • FRU_FLT.1: 8
    • FRU_FLT.1.1: 1
  • FAU:
    • FAU_ARP.1: 1
    • FAU_SAS: 3
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
    • FAU_UAU.4: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 16
    • FCS_CKM.1: 22
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.3: 1
    • FCS_CKM.4: 23
    • FCS_CKM.4.1: 1
    • FCS_COP: 51
    • FCS_COP.1: 32
    • FCS_RND.1: 6
    • FCS_RND.1.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF: 9
    • FDP_ACF.1: 25
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 4
    • FDP_IFF: 2
    • FDP_ITC: 1
    • FDP_ITC.1: 11
    • FDP_ITC.2: 11
    • FDP_RIP: 15
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_ROL: 1
    • FDP_SDI.2: 1
    • FDP_UCT: 4
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
    • FDP_UIT: 5
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 4
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 5
    • FIA_API.1: 4
    • FIA_API.1.1: 1
    • FIA_ATD: 1
    • FIA_UAU: 30
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 11
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID: 10
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
  • FMT:
    • FMT_LIM: 6
    • FMT_LIM.1: 12
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 13
    • FMT_LIM.2.1: 3
    • FMT_MSA: 9
    • FMT_MSA.3: 3
    • FMT_MTD: 48
    • FMT_MTD.1: 18
    • FMT_MTD.3: 6
    • FMT_MTD.3.1: 1
    • FMT_SMF: 5
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR: 12
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 7
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS: 10
    • FPT_FLS.1: 11
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 8
    • FPT_PHP.3.1: 1
    • FPT_RCV: 1
    • FPT_TDC.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 9
    • FTP_ITC.1: 8
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 1
    • A.CAP_FILE: 1
    • A.VERIFICATION: 1
  • O:
    • O.ALARM: 1
    • O.ARRAY_VIEWS_CONFID: 1
    • O.ARRAY_VIEWS_INTEG: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CON: 1
    • O.GLOBAL_ARRAYS_INTE: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RNG: 1
    • O.SCP: 1
    • O.SID: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.BAC_PP: 1
    • OE.CAP_FILE: 1
    • OE.CODE-EVIDENCE: 1
    • OE.VERIFICATION: 1
  • OT:
    • OT.SCP: 2
  • T:
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DELETION: 1
    • T.EXE-CODE: 2
    • T.INSTALL: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.SECURE_DELETION: 1
    • T.SID: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 1
  • GD:
    • G+D: 5
    • Giesecke+Devrient: 10
  • Infineon:
    • Infineon: 3
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 3
      • Triple-DES: 13
    • DES:
      • DES: 8
  • constructions:
    • MAC:
      • CMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 86
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
    • P-521: 4
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
    • physical tampering: 5
  • SCA:
    • physical probing: 2
    • side channel: 2
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 8
    • EF.DG1: 14
    • EF.DG14: 3
    • EF.DG15: 1
    • EF.DG16: 14
    • EF.DG2: 5
    • EF.DG3: 11
    • EF.DG4: 11
    • EF.DG5: 5
    • EF.SOD: 12
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ISO:
    • ISO/IEC 18000-63: 2
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS20: 6
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-294: 1
    • FIPS 197: 1
    • FIPS 46-3: 2
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 2
    • FIPS197: 1
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 14888-3: 4
    • ISO/IEC 7816-2: 3
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS#3: 2
    • PKCS1: 2
  • RFC:
    • RFC 5639: 1
    • RFC5639: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • No contradiction to this ST. FDP_IFF.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
    • No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
    • No contradiction to this ST. FIA_UID.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FIA_USB.1/AID IP_SFR No correspondence Out of scope (internal Java Card functionality: 1
    • No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_MSA.3/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No correspondence Out of scope (internal Java Card functionality: 1
    • No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_SMR.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No correspondence Out of scope (internal Java Card func tionality: 1
    • 20 of 92 Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction tothis ST. O.FIREWALL No correspondence Out of scope. No contradiction tothis ST: 1
    • 92 Platform SFR Correspondence in this ST References/Remarks FDP_IFC.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1/CM IP_SFR No: 1
    • ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL IP_SFR No: 1
    • DRG.3) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
    • FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm: 1
    • FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm. There are no: 1
    • FDP_RIP.1/ADEL FDP_RIP.1/ODEL FDP_RIP.1/ABORT) All IP_SFRs FMT_MSA.1/JCRE IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence: 1
    • FDP_RIP.1/bArray FDP_RIP.1/KEYS FDP_RIP.1/TRANSIENT No correspondence. Out of scope (internal Java Card Firewall). No contradiction to this ST. 3 Conformance Claims Security Target: 1
    • G OT.Data-Integrity No contradiction to this ST. O.ARRAY_VIEWS_CONFID No correspondence Out of scope. No contradiction to this ST. O.ARRAY_VIEWS_INTEG No correspondence Out of scope. No contradiction: 1
    • Java Card Firewall). No contradiction to this ST. FMT_MSA.2/FIREWALL- JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
    • No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to this ST. OT.SCP.IC OT.Prot_Phys-Tamper The objectives are related. No con-: 1
    • O.ALARM No correspondence Out of scope. No contradiction to this ST. O.CIPHER No correspondence Indirectly relevant for the correct: 1
    • O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this: 1
    • O.TRANSACTION No correspondence Out of scope. No contradiction to this ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
    • Out of scope: 86
    • Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
    • Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_USB.1/AID IP_SFR No: 1
    • Out of scope (internal Java Card fun tionality). No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No: 1
    • Out of scope (internal Java Card func tionality). No contradiction to this ST. FPT_FLS.1/Installer IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. CMGR Security Functional: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. ODELG Security Functional: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/KEYS IP_SFR No: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_ROL.1/FIREWALL IP_SFR No: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_MTD.1/JCRE IP_SFR No: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. INSTG Security Functional: 1
    • Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1 (FDP_RIP.1/OBJECTS FDP_RIP: 1
    • Platform Threat Correspondence in this ST References/Remarks T.CONFID-APPLI-DATA No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to: 1
    • SFR Correspondence in this ST References/Remarks FPT_RCV.3/Installer IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional: 1
    • SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this: 1
    • ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall. The resulting requirements for applets are reflected in the User: 1
    • ST. O.DELETION No correspondence Out of scope. No contradiction to this ST. O.LOAD No correspondence Out of scope. No contradiction to this ST. O: 1
    • ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
    • ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST: 1
    • T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to: 1
    • T.INTEG-APPLI-DATA T.Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to: 1
    • T.Information_Leakage No contradiction to this ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No: 1
    • T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this: 1
    • The objectives are related. No con- tradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to this 3 Conformance Claims Security Target Lite ePass Applet on Sm@rtCafé®: 1
    • chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
    • chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality: 1
    • complement Java Card OS mechanisms. No contradiction tothis ST. FPT_TDC.1 IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FPT_TST.1 RP_SFR-SERV FPT_TST.1: 1
    • defined quality metric (DRG.3) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/APDU IP_SFR No: 1
    • for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional: 1
    • internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
    • internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
    • internal Java Card Firewall). No contradiction to this ST. FMT_SMR.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. Application Programming Interface: 1
    • internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine: 1
    • managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out of scope (managed within Java Card OS: 1
    • no corresponding objectives for the TOE of this ST. No contradictions. O.KEY-MNGT No correspondence Out of scope. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this: 1
    • of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
    • of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence: 1
    • of the TOE. No contradiction to this ST. FDP_ACF.1/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
    • of the TOE. No contradiction to this ST. FDP_IFC.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No: 1
    • or that has been modified after bytecode verification. FCO_NRO.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security: 1
    • owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL RP_SFR-SERV: 1
    • start-up. AID Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_UID.2/AID IP_SFR No: 1
    • this ST. O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST: 1
    • to this ST. FCS_CKM.2 IP_SFR No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out: 1
    • which addresses security aspects outside the runtime. FDP_ITC.2/Installer IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No: 1
pdf_data/st_metadata
  • /Author: Holz, Stephan
  • /Subject: Sicherheitsvorgaben nach WBIS-PP
  • /Title: MAWIS-Security, Rev. 4.0
  • pdf_file_size_bytes: 1129671
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
  • /Author: G+D / stut
  • /CreationDate: D:20231009104359+02'00'
  • /Creator: Microsoft® Word für Microsoft 365
  • /Keywords: Version 2.0/Status 09.10.2023
  • /ModDate: D:20231009104359+02'00'
  • /Producer: Microsoft® Word für Microsoft 365
  • /Subject: ePass Applet on Sm@rtCafé® Expert 8.0 C2
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1276094
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 92
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different