Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4(iOS 17.4 (build 21E219)) (ANSSI-CC-2024/39)

CSV information ?

Status active
Valid from 08.01.2025
Valid until 08.01.2030
Scheme 🇫🇷 FR
Manufacturer Apple Inc.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_FSP.3, EAL2+, ALC_FLR.3

Heuristics summary ?

Certificate ?

Certification report ?

Security target ?

Heuristics ?

No heuristics are available for this certificate.

Extracted SARs

ADV_FSP.3, ALC_FLR.3

Similar certificates

Name Certificate ID
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58) ANSSI-CC-2023/58 Compare
Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) ANSSI-CC-2023/59 Compare
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) ANSSI-CC-2023/18 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258)) ANSSI-CC-2023/15 Compare
Strong Customer Authentication for Apple Pay on iPhone 15 Pro with A17 Pro running iOS 17.4(iOS 17.4 (Build 21E219)) None Compare
Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) ANSSI-CC-2023/60 Compare
Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4(macOS Sonoma 14.4 (build 23E214)) (ANSSI-CC-2024/42) None Compare
Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61) ANSSI-CC-2023/61 Compare
Strong Customer Authentication pour Apple Pay sur iPhone (SoC A12 Bionic) exécutant iOS 14.5.1 Version 18E212 ANSSI-CC-2022/04 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (de seconde génération) exécutant iOS 14.5.1 Version 18E212 ANSSI-CC-2022/05 Compare
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252)) ANSSI-CC-2023/17 Compare
Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201) ANSSI-CC-2023/13 Compare
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) None Compare
S3K250A/S3K232A/S3K212A (S3K250A_20231028) (ANSSI-CC-2024/17) ANSSI-CC-2024/17 Compare
Strong Customer Authentication pour Apple Pay sur MacBook Air 2020 avec M1 exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/16 Compare
Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/19 Compare
Trustway IP Protect (Version 6.01.17) (ANSSI-CC-2024/32) ANSSI-CC-2024/32 Compare
Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) ANSSI-CC-2024/33 Compare
Showing 5 out of 18.

Scheme data ?

Product Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4 (iOS 17.4 (build 21E219))
Url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-se-3rd-generation-a15-bionic-0
Description Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4, iOS 17.4 (build 21E219) » développé par APPLE INC..
Sponsor APPLE INC.
Developer APPLE INC.
Cert Id ANSSI-CC-2024/39
Level EAL2+
Expiration Date 08.01.2030
Enhanced
Cert Id ANSSI-CC-2024/39
Certification Date 08.01.2025
Expiration Date 08.01.2030
Category Divers
Cc Version Critères Communs CC:2022 révision 1
Developer APPLE INC.
Sponsor APPLE INC.
Evaluation Facility THALES / CNES
Level EAL2+
Protection Profile
Mutual Recognition CCRA SOG-IS
Augmented ADV_FSP.3, ALC_FLR.3
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_39en.pdf
Target Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2024_39_fr.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_39en.pdf

References ?

No references are available for this certificate as its ID was not successfully extracted.

Updates ?

  • 27.01.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4(iOS 17.4 (build 21E219)) (ANSSI-CC-2024/39) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_39fr.pdf",
  "dgst": "a2effca18709d4c6",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "17.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2024/39",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4, iOS 17.4 (build 21E219) \u00bb d\u00e9velopp\u00e9 par APPLE INC..",
      "developer": "APPLE INC.",
      "enhanced": {
        "augmented": "ADV_FSP.3, ALC_FLR.3",
        "category": "Divers",
        "cc_version": "Crit\u00e8res Communs CC:2022 r\u00e9vision 1",
        "cert_id": "ANSSI-CC-2024/39",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_39en.pdf",
        "certification_date": "2025-01-08",
        "developer": "APPLE INC.",
        "evaluation_facility": "THALES / CNES",
        "expiration_date": "2030-01-08",
        "level": "EAL2+",
        "mutual_recognition": "CCRA SOG-IS",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_39en.pdf",
        "sponsor": "APPLE INC.",
        "target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2024_39_fr.pdf"
      },
      "expiration_date": "2030-01-08",
      "level": "EAL2+",
      "product": "Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4 (iOS 17.4 (build 21E219))",
      "sponsor": "APPLE INC.",
      "url": "https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-se-3rd-generation-a15-bionic-0"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Apple Inc.",
  "manufacturer_web": "https://www.apple.com/",
  "name": "Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4(iOS 17.4 (build 21E219)) (ANSSI-CC-2024/39)",
  "not_valid_after": "2030-01-08",
  "not_valid_before": "2025-01-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": null,
    "report_frontpage": null,
    "report_keywords": null,
    "report_metadata": null,
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_39fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.3",
      "ADV_FSP.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_39_fr.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "active"
}