name |
MAWIS-Security Rev. 4.0 |
NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
NL |
status |
active |
active |
not_valid_after |
23.01.2030 |
04.04.2029 |
not_valid_before |
24.01.2025 |
04.04.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300172-01-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300172-01%20CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300172-01-ST%20Lite_v4.14.pdf |
manufacturer |
MOBA Mobile Automation AG |
NXP Semiconductors Germany GmbH |
manufacturer_web |
https://www.moba.de/ |
https://www.nxp.com |
security_level |
ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
EAL6+, ASE_TSS.2, ALC_FLR.1 |
dgst |
c8c9125bad005bbe |
ed2eb00bba5313c3 |
heuristics/cert_id |
BSI-DSZ-CC-0496-V2-2025 |
NSCIB-CC-2300172-01-CR |
heuristics/cert_lab |
BSI |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ASE_OBJ.2, AGD_OPE.1, ASE_ECD.1, ASE_REQ.2 |
ALC_FLR.1, AVA_VAN.5, ADV_FSP.4, ASE_TSS.2, AGD_OPE.1, ADV_SPM.1 |
heuristics/extracted_versions |
4.0 |
1.02.4, 1.00.4, 1.01.4, 2.00.11, 2.03.11, 4.7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2021/18-R01, NSCIB-CC-2400004-01-CR, ANSSI-CC-2020/73-R01, ANSSI-CC-2020/72-R01, ANSSI-CC-2021/20-R01, ANSSI-CC-2025/01, ANSSI-CC-2021/19-R01, ANSSI-CC-2020/10-R01, ANSSI-CC-2025/02, ANSSI-CC-2025/03 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V4-2024 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2021/18-R01, NSCIB-CC-2400004-01-CR, ANSSI-CC-2020/73-R01, ANSSI-CC-2020/72-R01, ANSSI-CC-2021/20-R01, ANSSI-CC-2025/01, ANSSI-CC-2021/19-R01, ANSSI-CC-2020/10-R01, ANSSI-CC-2025/02, ANSSI-CC-2025/03 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-2021, BSI-DSZ-CC-1136-V4-2024, BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-1136-V3-2022 |
heuristics/scheme_data |
- category: Other products
- cert_id: BSI-DSZ-CC-0496-V2-2025
- certification_date: 24.01.2025
- enhanced:
- applicant: MOBA Mobile Automation AG Kapellenstraße 15 65555 Limburg
- assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
- certification_date: 24.01.2025
- description: The TOE is the Waste Bin Identification Systems (WBIS) MAWIS-Security Rev 4.0. The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0496-V2-2025', 'description': 'The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0496-2017'})]
- evaluation_facility: Deutsches Forschungszentrum für Künstliche Intelligenz GmbH
- expiration_date: 23.01.2030
- product: MAWIS-Security Rev. 4.0
- protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
- product: MAWIS-Security Rev. 4.0
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/0496.html
- vendor: MOBA Mobile Automation AG
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2021/18-R01, NSCIB-CC-2300154-01-CR, NSCIB-CC-2400004-01-CR, ANSSI-CC-2020/73-R01, ANSSI-CC-2020/72-R01, NSCIB-CC-2300157-01-CR, ANSSI-CC-2021/20-R01, ANSSI-CC-2025/01, ANSSI-CC-2021/19-R01, ANSSI-CC-2020/10-R01, ANSSI-CC-2025/02, ANSSI-CC-2025/03, NSCIB-CC-2300156-01-CR, NSCIB-CC-2300155-01-CR |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V4-2024 |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2021/18-R01, NSCIB-CC-2400004-01-CR, NSCIB-CC-2300154-01-CR, ANSSI-CC-2020/73-R01, ANSSI-CC-2020/72-R01, NSCIB-CC-2300157-01-CR, ANSSI-CC-2021/20-R01, ANSSI-CC-2025/01, ANSSI-CC-2021/19-R01, ANSSI-CC-2020/10-R01, ANSSI-CC-2025/02, ANSSI-CC-2025/03, NSCIB-CC-2300156-01-CR, NSCIB-CC-2300155-01-CR |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V4-2024 |
heuristics/protection_profiles |
f1e8c937d15e713a |
7f886b64878b68c1 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf |
pdf_data/cert_filename |
0496V2c_pdf.pdf |
NSCIB-CC-2300172-01-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0496-V2-2025: 1
|
- NL:
- NSCIB-2300172-01: 1
- NSCIB-CC-2300172-01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
- ASE:
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
|
- ALC:
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.3: 1
- ASE:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
- /Title: Zertifikat BSI-DSZ-CC-0496-V2-2025
- pdf_file_size_bytes: 386689
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Haak
- /CreationDate: D:20240408165553+01'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20240408165553+01'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 93660
- pdf_hyperlinks: https://www.tuv-nederland.nl/
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0496V2a_pdf.pdf |
NSCIB-CC-2300172-01 CR.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0496-V2-2025
- cert_item: MAWIS-Security Rev. 4.0
- cert_lab: BSI
- developer: MOBA Mobile Automation AG
- match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
- NL:
|
- DE:
- NL:
- cert_id: NSCIB-CC-2300172-01-CR
- cert_item: JCOP 4 P71, versions JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
- cert_lab: SGS Brightsight B.V.
- developer: NXP Semiconductors Germany GmbH
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0496-V2-2025: 10
|
- DE:
- BSI-DSZ-CC-1136-V4-2024: 2
- NL:
- NSCIB-2300172-01: 1
- NSCIB-CC-2300172-01-CR: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0010-2004: 1
- BSI-PP-0010-: 1
- BSI-PP-0010-2004: 1
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 5
- EAL 2: 1
- EAL 4: 1
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 3
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ASE:
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 9
- NXP Semiconductors: 10
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 3
- SGS Brightsight: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 4
- CMAC: 2
- HMAC: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- side channel: 1
- side-channel: 2
- other:
- JIL: 2
- JIL-AAPS: 1
- JIL-AM: 2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- provided by the composite (certified hardware and crypto library). The items in light-grey are out of scope. 2.5 Documentation The following documentation is provided with the product by the developer to the: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
- /Title: Zertifizierungsreport BSI-DSZ-CC-0496-V2-2025
- pdf_file_size_bytes: 484994
- pdf_hyperlinks: https://www.sogis.eu/, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
|
pdf_data/st_filename |
0496V2b_pdf.pdf |
NSCIB-CC-2300172-01-ST Lite_v4.14.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V4-2024: 1
- NL:
- CC-1136: 1
- NSCIB-2300172-01: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0099-2017: 1
- BSI-PP-0055: 1
- BSI-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1+: 1
- EAL1: 9
- EAL1 augmented: 2
|
- EAL:
- EAL6: 9
- EAL6 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- ALC:
- ASE:
- ASE_ECD.1: 2
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 5
- ASE_REQ.1: 1
- ASE_REQ.2: 5
- ASE_SPD.1: 6
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_FSP.4: 1
- ADV_SPM.1: 3
- AGD:
- ALC:
- ASE:
- ASE_CCL: 2
- ASE_ECD: 1
- ASE_INT: 2
- ASE_REQ: 2
- ASE_SPD: 2
- ASE_TSS: 2
- ASE_TSS.2: 3
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_DAU: 2
- FDP_DAU.1: 8
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ITT: 4
- FDP_ITT.1: 1
- FDP_ITT.5: 20
- FDP_ITT.5.1: 2
- FDP_SDI: 2
- FDP_SDI.1: 9
- FDP_SDI.1.1: 1
- FPT:
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 8
- FRU_FLT.1.1: 1
|
- FAU:
- FAU_ARP.1: 22
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_SAA.1: 3
- FAU_SAS: 6
- FAU_SAS.1: 8
- FAU_SAS.1.1: 3
- FCO:
- FCO_NRO: 1
- FCO_NRO.1: 1
- FCO_NRO.2: 7
- FCO_NRO.2.1: 2
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 2
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 4
- FCS_CKM.2: 11
- FCS_CKM.2.1: 1
- FCS_CKM.3: 9
- FCS_CKM.3.1: 1
- FCS_CKM.4: 16
- FCS_CKM.4.1: 4
- FCS_COP.1: 16
- FCS_COP.1.1: 25
- FCS_RNG.1: 10
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 64
- FDP_ACC.1.1: 2
- FDP_ACC.2: 26
- FDP_ACC.2.1: 5
- FDP_ACC.2.2: 4
- FDP_ACF: 1
- FDP_ACF.1: 49
- FDP_ACF.1.1: 12
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 8
- FDP_IFC: 2
- FDP_IFC.1: 38
- FDP_IFC.1.1: 2
- FDP_IFC.2: 19
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF: 2
- FDP_IFF.1: 36
- FDP_IFF.1.1: 6
- FDP_IFF.1.2: 5
- FDP_IFF.1.3: 5
- FDP_IFF.1.4: 5
- FDP_IFF.1.5: 5
- FDP_ITC: 1
- FDP_ITC.1: 8
- FDP_ITC.2: 18
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP.1: 78
- FDP_RIP.1.1: 9
- FDP_ROL.1: 18
- FDP_ROL.1.1: 2
- FDP_ROL.1.2: 3
- FDP_SDI.1: 2
- FDP_SDI.2: 11
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UIT: 1
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 16
- FIA_ATD.1.1: 2
- FIA_UAU.1: 17
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UID: 1
- FIA_UID.1: 52
- FIA_UID.1.1: 4
- FIA_UID.1.2: 4
- FIA_UID.2: 5
- FIA_UID.2.1: 1
- FIA_USB.1: 10
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MSA: 5
- FMT_MSA.1: 89
- FMT_MSA.1.1: 10
- FMT_MSA.2: 4
- FMT_MSA.2.1: 2
- FMT_MSA.3: 86
- FMT_MSA.3.1: 12
- FMT_MSA.3.2: 11
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_REV: 1
- FMT_SMF: 2
- FMT_SMF.1: 88
- FMT_SMF.1.1: 9
- FMT_SMR: 2
- FMT_SMR.1: 80
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 5
- FPR:
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS.1: 47
- FPT_FLS.1.1: 6
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_RCV.2: 1
- FPT_RCV.3: 6
- FPT_RCV.3.1: 2
- FPT_RCV.3.2: 2
- FPT_RCV.3.3: 2
- FPT_RCV.3.4: 1
- FPT_TDC.1: 6
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 14
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 7
- A.APPS-PROVIDER: 9
- A.DELETION: 1
- A.PROCESS-SEC-IC: 8
- A.USE_: 1
- A.USE_DIAG: 8
- A.USE_KEYS: 9
- A.VERIFICATION: 6
- A.VERIFICATION-AUTHORITY: 9
- D:
- D.API_: 1
- D.API_DATA: 2
- D.APP_: 2
- D.APP_CODE: 5
- D.APP_C_: 1
- D.APP_C_DATA: 4
- D.APP_I_: 2
- D.APP_I_DATA: 5
- D.APP_KEYS: 10
- D.APSD_KEYS: 3
- D.ATTACK_: 1
- D.ATTACK_COUNTER: 6
- D.CARD_MNGT_DATA: 3
- D.CONFIG_ITEM: 8
- D.CRYPTO: 6
- D.ISD_KEYS: 4
- D.JCS_: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.MODULE_: 1
- D.MODULE_CODE: 5
- D.MODULE_DATA: 2
- D.PIN: 11
- D.SEC_DATA: 6
- D.VASD_KEYS: 3
- O:
- O.APPLET: 19
- O.CODE_: 1
- O.CODE_MODULE: 16
- O.CODE_PKG: 17
- O.DELETION: 4
- O.EXT-MEM: 1
- O.EXT_: 4
- O.EXT_MEM_: 2
- O.EXT_MEM_IN: 2
- O.EXT_MEM_INSTANCE: 4
- O.INSTALL: 3
- O.JAVAOBJECT: 65
- O.LOAD: 5
- O.NON_: 2
- O.NON_SB_: 1
- O.NON_SB_SFR: 3
- O.PUF: 1
- O.REMOTE: 1
- O.SB_SFR: 4
- OE:
- OE.APPLET: 11
- OE.APPS-PROVIDER: 5
- OE.CARD-MANAGEMENT: 3
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 19
- OE.KEY-CHANGE: 6
- OE.PROCESS_SEC_IC: 5
- OE.SCP: 12
- OE.SECURITY-DOMAINS: 5
- OE.USE_DIAG: 6
- OE.USE_KEYS: 6
- OE.VERIFICATION: 30
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 4
- OP:
- OP.ARRAY_: 1
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 4
- OP.ARRAY_LENGTH: 3
- OP.CREATE: 7
- OP.CREATE_EXT_MEM_IN-: 1
- OP.CREATE_EXT_MEM_INSTANCE: 2
- OP.DELETE_: 2
- OP.DELETE_APPLET: 3
- OP.DELETE_MODULE: 2
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.INVOKE_MODULE: 4
- OP.JAVA: 5
- OP.PUT: 6
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.READ_EXT_MEM: 3
- OP.SB_ACCESS: 4
- OP.SB_ACCESS_SFR: 4
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OP.WRITE_EXT_MEM: 3
- OSP:
- OSP.KEY-CHANGE: 8
- OSP.PROCESS-TOE: 8
- OSP.SECURE-BOX: 8
- OSP.SECURITY-DOMAINS: 8
- OSP.VERIFICATION: 7
- OT:
- OT.ALARM: 23
- OT.APPLI-AUTH: 14
- OT.ATTACK-COUNTER: 5
- OT.CARD-: 2
- OT.CARD-CONFIGURATION: 9
- OT.CARD-MANAGEMENT: 29
- OT.CIPHER: 10
- OT.COMM_: 1
- OT.COMM_AUTH: 11
- OT.COMM_CONFIDENTIALITY: 9
- OT.COMM_INTEGRITY: 10
- OT.DOMAIN-RIGHTS: 13
- OT.EXT-MEM: 19
- OT.FIREWALL: 14
- OT.GLOBAL_ARRAYS_CONFID: 10
- OT.GLOBAL_ARRAYS_INTEG: 8
- OT.IDENTIFICATION: 10
- OT.KEY-MNGT: 9
- OT.NATIVE: 13
- OT.OBJ-DELETION: 7
- OT.OPERATE: 38
- OT.PIN-MNGT: 10
- OT.REALLOCATION: 9
- OT.RESOURCES: 9
- OT.RESTRICTED-MODE: 8
- OT.RND: 8
- OT.RNG: 7
- OT.SCP: 61
- OT.SEC_BOX_FW: 10
- OT.SENSITIVE_RESULTS_INTEG: 7
- OT.SID: 18
- OT.SID_MODULE: 17
- OT.TRANSACTION: 9
- R:
- SA:
- SA.ALARM: 2
- SA.CARD-MANAGEMENT: 1
- SA.CIPHER: 2
- SA.CONFID-APPLI-DATA: 2
- SA.CONFID-JCS-CODE: 2
- SA.CONFID-JCS-DATA: 2
- SA.CONFIGURATION-MODULE: 1
- SA.DELETION: 2
- SA.EXE-: 1
- SA.EXE-APPLI-CODE: 3
- SA.EXE-JCS-CODE: 2
- SA.EXT-MNGT: 1
- SA.FIREWALL: 2
- SA.INSTALL: 3
- SA.INTEG-APPLI-CODE: 3
- SA.INTEG-APPLI-DATA: 3
- SA.INTEG-APPLI-DATA-PHYS: 2
- SA.INTEG-JCS-CODE: 2
- SA.INTEG-JCS-DATA: 2
- SA.KEY-MNGT: 2
- SA.MODULAR-DESIGN: 4
- SA.MODULE-: 1
- SA.MODULE-INVOCATION: 1
- SA.NATIVE: 4
- SA.OBJ-DELETION: 3
- SA.OPERATE: 2
- SA.PIN-MNGT: 2
- SA.RESOURCES: 3
- SA.RM: 1
- SA.SCP: 5
- SA.SID: 3
- SA.TRANSACTION: 2
- SA.VERIFICATION: 2
- T:
- T.ATTACK-COUNTER: 6
- T.COM_EXPLOIT: 7
- T.CONFID-APPLI-DATA: 6
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 6
- T.CONFIG: 7
- T.DELETION: 2
- T.EXE-CODE: 10
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 2
- T.INTEG-APPLI-: 2
- T.INTEG-APPLI-CODE: 11
- T.INTEG-APPLI-DATA: 13
- T.INTEG-APPLIDATA: 1
- T.INTEG-JCS-CODE: 6
- T.INTEG-JCS-DATA: 6
- T.LIFE_CYCLE: 7
- T.MODULE_EXEC: 7
- T.MODULE_REPLACEMENT: 7
- T.NATIVE: 6
- T.OBJ-DELETION: 5
- T.OS_OPERATE: 7
- T.PHYSICAL: 5
- T.RESOURCES: 5
- T.RND: 7
- T.SEC_BOX_BORDER: 4
- T.SID: 12
- T.UNAUTHORIZED_CARD_MNGT: 7
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 197
- NXP Semiconductors: 27
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 3
- Triple-DES: 1
- TripleDES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 6
- CMAC: 3
- HMAC: 7
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Fault Injection: 2
- Physical Tampering: 2
- malfunction: 3
- physical tampering: 2
- SCA:
- DPA: 5
- SPA: 2
- physical probing: 3
- side channel: 2
- side-channel: 1
- timing attack: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ISO:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 197: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14888-3: 1
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_: 1
- ALG_AES_BLOCK_128_CBC_: 1
- ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD: 1
- ALG_AES_CBC_ISO9797_M1: 1
- ALG_AES_CBC_ISO9797_M2: 1
- ALG_AES_CMAC16_STANDARD: 1
- ALG_AES_CMAC8: 1
- ALG_AES_CMAC_128: 1
- ALG_AES_CTR: 1
- ALG_AES_ECB_: 1
- ALG_AES_ECB_ISO9797_M1: 1
- ALG_AES_MAC_128_ISO9797_1_M2_ALG3: 1
- ALG_AES_MAC_128_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_ECB_ISO9797_: 1
- ALG_DES_ECB_ISO9797_M2: 1
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_MAC4_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC4_ISO9797_M1: 1
- ALG_DES_MAC4_ISO9797_M2: 1
- ALG_DES_MAC8_: 2
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- ALG_DES_MAC8_NOPAD: 1
- EC:
- ALG_EC_SVDP_: 1
- ALG_EC_SVDP_DH: 1
- ALG_EC_SVDP_DHC: 1
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN_XY: 1
- ECDSA:
- ALG_ECDSA_SHA_: 1
- ALG_ECDSA_SHA_256: 2
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_ISO9796: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 1
- ALG_RSA_SHA_384_PKCS1_PSS: 1
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_ISO9796: 1
- ALG_RSA_SHA_PKCS1: 1
- SHA:
- ALG_SHA_224: 2
- ALG_SHA_256: 2
- ALG_SHA_384: 3
- ALG_SHA_512: 2
- misc:
- CIPHER_ECDSA: 1
- LENGTH_AES_128: 2
- LENGTH_AES_192: 3
- LENGTH_AES_256: 1
- LENGTH_DES3_2KEY: 2
- LENGTH_DES3_3KEY: 2
- LENGTH_EC_: 3
- LENGTH_EC_FP_160: 5
- LENGTH_EC_FP_192: 3
- LENGTH_EC_FP_224: 4
- LENGTH_EC_FP_256: 6
- LENGTH_EC_FP_320: 4
- LENGTH_EC_FP_384: 3
- LENGTH_EC_FP_521: 3
- LENGTH_RSA_1024: 1
- LENGTH_RSA_2048: 1
- LENGTH_RSA_4096: 2
- LENGTH_SHA: 1
- LENGTH_SHA_224: 1
- LENGTH_SHA_256: 1
- LENGTH_SHA_384: 1
- PAD_PKCS1_OAEP: 1
- SIG_CIPHER_ECDSA_PLAIN: 1
- SIG_CIPHER_RSA: 1
- TYPE_ACCESS: 5
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.nxp.id.jcopx.security: 2
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.applet: 1
- javacard.security: 3
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Holz, Stephan
- /Subject: Sicherheitsvorgaben nach WBIS-PP
- /Title: MAWIS-Security, Rev. 4.0
- pdf_file_size_bytes: 1129671
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: NXP B.V.
- /CreationDate: D:20240117160928Z
- /Creator: DITA Open Toolkit 3.3.1
- /Keywords: ASE, JCOP, Common Criteria, EAL6 augmented
- /Producer: Apache FOP Version 2.3
- /Subject: JCOP 4 P71 Security Target Lite
- /Title: Security Target for JCOP 4 P71/SE050
- pdf_file_size_bytes: 1648076
- pdf_hyperlinks: http://dx.doi.org/10.6028/NIST.SP.800-73-4, http://SF.MM, https://www.docstore.nxp.com, http://csrc.nist.gov/publications/fips/%20fips197/fips-%20197.pdf, mailto:[email protected], http://SF.OM, http://dx.doi.org/10.6028/NIST.SP.800-56Ar2, http://www.nxp.com/documents/user_manual/UM10204.pdf.
- pdf_is_encrypted: False
- pdf_number_of_pages: 152
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |