name |
MAWIS-Security Rev. 4.0 |
Juniper vSRX3.0 with Junos OS 22.2R2 |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
DE |
US |
status |
active |
active |
not_valid_after |
23.01.2030 |
22.01.2026 |
not_valid_before |
24.01.2025 |
22.01.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11397-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11397-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11397-st.pdf |
manufacturer |
MOBA Mobile Automation AG |
Juniper Networks, Inc. |
manufacturer_web |
https://www.moba.de/ |
https://www.juniper.net/ |
security_level |
ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
{} |
dgst |
c8c9125bad005bbe |
de4fb07581e49c9e |
heuristics/cert_id |
BSI-DSZ-CC-0496-V2-2025 |
CCEVS-VR-VID-11397-2024 |
heuristics/cert_lab |
BSI |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ASE_OBJ.2, AGD_OPE.1, ASE_ECD.1, ASE_REQ.2 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
4.0 |
22.2, 3.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Other products
- cert_id: BSI-DSZ-CC-0496-V2-2025
- certification_date: 24.01.2025
- enhanced:
- applicant: MOBA Mobile Automation AG Kapellenstraße 15 65555 Limburg
- assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
- certification_date: 24.01.2025
- description: The TOE is the Waste Bin Identification Systems (WBIS) MAWIS-Security Rev 4.0. The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0496-V2-2025', 'description': 'The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0496-2017'})]
- evaluation_facility: Deutsches Forschungszentrum für Künstliche Intelligenz GmbH
- expiration_date: 23.01.2030
- product: MAWIS-Security Rev. 4.0
- protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
- product: MAWIS-Security Rev. 4.0
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/0496.html
- vendor: MOBA Mobile Automation AG
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
f1e8c937d15e713a |
a4784f14919bdbe6, bde3d7587cf42e78, 89f2a255423f4a20, 6448a1802bb874d8 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_IPS_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CFG_NDcPP-VPNGW_V1.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.4e.pdf |
pdf_data/cert_filename |
0496V2c_pdf.pdf |
st_vid11397-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0496-V2-2025: 1
|
- US:
- CCEVS-VR-VID11397-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ASE:
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
- /Title: Zertifikat BSI-DSZ-CC-0496-V2-2025
- pdf_file_size_bytes: 386689
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20240205142051-05'00'
- /ModDate: D:20240205142051-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 189263
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0496V2a_pdf.pdf |
st_vid11397-vr.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0496-V2-2025
- cert_item: MAWIS-Security Rev. 4.0
- cert_lab: BSI
- developer: MOBA Mobile Automation AG
- match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
- US:
|
- DE:
- US:
- cert_id: CCEVS-VR-VID11397-2024
- cert_item: Juniper vSRX3.0 with Junos OS 22.2R2
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0496-V2-2025: 10
|
- US:
- CCEVS-VR-VID11397-2024: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0010-2004: 1
- BSI-PP-0010-: 1
- BSI-PP-0010-2004: 1
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 5
- EAL 2: 1
- EAL 4: 1
|
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ASE:
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.CONNECTIONS: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- A.VS_CORRECT_CONFIGURATION: 1
- A.VS_ISOLATION: 1
- A.VS_REGULAR_UPDATES: 1
- A.VS_TRUSTED_ADMINISTRATOR: 1
- T:
- T.DATA_INTEGRITY: 1
- T.MALICIOUS_TRAFFIC: 1
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_DOS: 1
- T.NETWORK_MISUSE: 1
- T.PASSWORD_CRACKING: 1
- T.REPLAY_ATTACK: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 1
- Key exchange: 1
|
pdf_data/report_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- P-256: 1
- P-384: 2
- P-521: 2
- curve P-256: 1
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
- /Title: Zertifizierungsreport BSI-DSZ-CC-0496-V2-2025
- pdf_file_size_bytes: 484994
- pdf_hyperlinks: https://www.sogis.eu/, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /CreationDate: D:20240205141511-05'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20240205141511-05'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 509156
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
pdf_data/st_filename |
0496V2b_pdf.pdf |
st_vid11397-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1+: 1
- EAL1: 9
- EAL1 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- ALC:
- ASE:
- ASE_ECD.1: 2
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 5
- ASE_REQ.1: 1
- ASE_REQ.2: 5
- ASE_SPD.1: 6
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_DAU: 2
- FDP_DAU.1: 8
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ITT: 4
- FDP_ITT.1: 1
- FDP_ITT.5: 20
- FDP_ITT.5.1: 2
- FDP_SDI: 2
- FDP_SDI.1: 9
- FDP_SDI.1.1: 1
- FPT:
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 8
- FRU_FLT.1.1: 1
|
- FAU:
- FAU_GEN: 9
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 19
- FCS_COP.1: 4
- FCS_NTP_EXT.1: 4
- FCS_NTP_EXT.1.1: 1
- FCS_NTP_EXT.1.2: 1
- FCS_NTP_EXT.1.3: 1
- FCS_NTP_EXT.1.4: 2
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHS_EXT.1: 5
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.2.3: 1
- FDP:
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 5
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.2: 3
- FIA_PSK_EXT.2.1: 1
- FIA_PSK_EXT.3: 2
- FIA_UAU.7: 2
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 4
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 12
- FMT_MOF.1: 3
- FMT_MTD: 8
- FMT_MTD.1: 2
- FMT_SMF: 6
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FMT_SMT: 1
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS: 3
- FPT_FLS.1: 3
- FPT_ITC.1: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.3: 5
- FPT_TST_EXT.3.1: 1
- FPT_TST_EXT.3.2: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTA_SSL.4: 3
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_APW_EXT.1: 1
- FTP_ITC: 5
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.CONNECTIONS: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- A.VS_CORRECT_CONFIGURATION: 1
- A.VS_ISOLATION: 1
- A.VS_REGULAR_UPDATES: 1
- A.VS_TRUSTED_ADMINISTRATOR: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.FAIL_SECURE: 1
- O.IPS_ANALYZE: 1
- O.IPS_REACT: 1
- O.PORT_FILTERING: 1
- O.RESIDUAL_INFORMATION: 1
- O.STATEFUL_TRAFFIC_FILTERING: 1
- O.SYSTEM_MONITORING: 2
- O.TOE_ADMINISTRATION: 2
- O.TRUSTED_COMMUNICATIONS: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMN: 1
- OE.UPDATES: 1
- OE.VM_CONFIGURATION: 1
- T:
- T.DATA_INTEGRITY: 1
- T.MALICIOUS_TRAFFIC: 1
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_DOS: 1
- T.NETWORK_MISUSE: 1
- T.PASSWORD_CRACKING: 1
- T.REPLAY_ATTACK: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 6
- HMAC-SHA-256: 7
- HMAC-SHA-384: 2
- HMAC-SHA-512: 4
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 13
- SHA-384: 6
- SHA-512: 6
- SHA256: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- KEX:
- Key Exchange: 4
- Key exchange: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 43
- IKEv1: 23
- IKEv2: 22
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 44
- P-384: 44
- P-521: 18
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ISO:
|
- FIPS:
- ISO:
- ISO/IEC 10118-: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 1305: 1
- RFC 2409: 1
- RFC 2460: 3
- RFC 2463: 1
- RFC 2986: 3
- RFC 3513: 2
- RFC 3526: 3
- RFC 3602: 4
- RFC 4106: 2
- RFC 4109: 2
- RFC 4251: 1
- RFC 4252: 1
- RFC 4253: 3
- RFC 4301: 2
- RFC 4303: 1
- RFC 4306: 1
- RFC 4443: 1
- RFC 4868: 4
- RFC 4945: 2
- RFC 5077: 1
- RFC 5114: 1
- RFC 5280: 4
- RFC 5282: 1
- RFC 5656: 3
- RFC 5735: 2
- RFC 5905: 1
- RFC 5996: 1
- RFC 768: 3
- RFC 791: 4
- RFC 792: 2
- RFC 793: 4
- RFC 8200: 3
- RFC 959: 2
- RFC3526: 1
- RFC4344: 1
- RFC5656: 1
- RFC6668: 1
- RFC768: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Holz, Stephan
- /Subject: Sicherheitsvorgaben nach WBIS-PP
- /Title: MAWIS-Security, Rev. 4.0
- pdf_file_size_bytes: 1129671
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: Jenn Lobb
- /CreationDate: D:20240205141706-05'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20240205141706-05'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 1274831
- pdf_hyperlinks: https://support.juniper.net/support/downloads/?p=vsrx3
- pdf_is_encrypted: False
- pdf_number_of_pages: 88
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |