Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RSA Archer Suite v6.7
ISCB-5-RPT-C113-CR-v1
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
ANSSI-CC-2024/41
name RSA Archer Suite v6.7 Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme MY FR
not_valid_after 15.10.2025 08.01.2030
not_valid_before 15.10.2020 08.01.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C113-CERTIFICATE-v1%20signed.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_41fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C113-CR-V1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_41fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%206.7_ST_v1.0_09-29-2020.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_41en.pdf
manufacturer RSA Security LLC Apple Inc.
manufacturer_web https://rsa.com https://www.apple.com/
security_level EAL2+, ALC_FLR.2 EAL2+, ADV_FSP.3, ALC_FLR.3
dgst 15b820d1481c0d81 e5bae93bf2719158
heuristics/cert_id ISCB-5-RPT-C113-CR-v1 ANSSI-CC-2024/41
heuristics/cpe_matches cpe:2.3:a:rsa:archer:6.7:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:10.4:*:*:*:*:*:*:*
heuristics/related_cves CVE-2022-30585, CVE-2020-5335, CVE-2020-29537, CVE-2020-29538, CVE-2022-26951, CVE-2020-5337, CVE-2020-5333, CVE-2020-5334, CVE-2022-26947, CVE-2022-26950, CVE-2020-5331, CVE-2022-37317, CVE-2022-26949, CVE-2020-5332, CVE-2021-33615, CVE-2020-5336, CVE-2020-29536, CVE-2020-29535, CVE-2021-38362, CVE-2021-29253, CVE-2021-29252, CVE-2021-33616, CVE-2021-41594, CVE-2022-30584, CVE-2022-26948 CVE-2024-44255, CVE-2024-54534, CVE-2024-44302, CVE-2024-27801, CVE-2024-54502, CVE-2025-24160, CVE-2024-44192, CVE-2024-54542, CVE-2024-44225, CVE-2024-44254, CVE-2024-27805, CVE-2024-40850, CVE-2024-54514, CVE-2024-40784, CVE-2024-54525, CVE-2024-27821, CVE-2024-44278, CVE-2024-27834, CVE-2024-40806, CVE-2024-44191, CVE-2025-24123, CVE-2024-54551, CVE-2024-44269, CVE-2024-27808, CVE-2025-24117, CVE-2024-44183, CVE-2024-40822, CVE-2024-44198, CVE-2024-27840, CVE-2024-40793, CVE-2024-44194, CVE-2024-40795, CVE-2024-40824, CVE-2024-40835, CVE-2024-54530, CVE-2024-27880, CVE-2024-27830, CVE-2024-44244, CVE-2024-44297, CVE-2024-27851, CVE-2024-40774, CVE-2024-44296, CVE-2024-54468, CVE-2024-44290, CVE-2024-54479, CVE-2025-24137, CVE-2024-54517, CVE-2024-27826, CVE-2024-27811, CVE-2024-54499, CVE-2024-40857, CVE-2024-44240, CVE-2024-40818, CVE-2025-24158, CVE-2024-44187, CVE-2025-24086, CVE-2024-44233, CVE-2024-44170, CVE-2024-54497, CVE-2024-27838, CVE-2024-54527, CVE-2024-40779, CVE-2024-54523, CVE-2024-27823, CVE-2024-27815, CVE-2024-40813, CVE-2024-40788, CVE-2024-40776, CVE-2024-54494, CVE-2025-24124, CVE-2024-54500, CVE-2024-27814, CVE-2024-44144, CVE-2024-54538, CVE-2024-27816, CVE-2024-27884, CVE-2024-44215, CVE-2024-40815, CVE-2025-24131, CVE-2024-54560, CVE-2024-27820, CVE-2024-44176, CVE-2024-40785, CVE-2024-44282, CVE-2025-24159, CVE-2024-44273, CVE-2024-54543, CVE-2024-54501, CVE-2024-27806, CVE-2025-24162, CVE-2024-44155, CVE-2024-27832, CVE-2025-24126, CVE-2024-23282, CVE-2025-24161, CVE-2024-54478, CVE-2024-54486, CVE-2024-27800, CVE-2024-27810, CVE-2024-27804, CVE-2024-54522, CVE-2024-40812, CVE-2024-54513, CVE-2024-54512, CVE-2024-54508, CVE-2024-54510, CVE-2024-40777, CVE-2024-54467, CVE-2024-44212, CVE-2024-40787, CVE-2024-40805, CVE-2024-44185, CVE-2024-40799, CVE-2024-40829, CVE-2024-27828, CVE-2024-44285, CVE-2024-54535, CVE-2024-44239, CVE-2024-44234, CVE-2025-24163, CVE-2025-24129, CVE-2024-44274, CVE-2024-40782, CVE-2024-44171, CVE-2024-54505, CVE-2024-40809, CVE-2024-27863, CVE-2024-23251, CVE-2024-44169, CVE-2024-54526, CVE-2024-27856, CVE-2024-54541, CVE-2024-40780, CVE-2025-24085, CVE-2024-54518, CVE-2025-24149, CVE-2025-24107, CVE-2024-40836, CVE-2024-40789, CVE-2024-44232
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 6.7 10.4
pdf_data/cert_filename ISCB-5-CERT-C113-CERTIFICATE-v1 signed.pdf Certificat-ANSSI-CC-2024_41fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2024/41: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_metadata
  • /CreationDate: D:20201105094515+08'00'
  • /Creator: ISCB Printer
  • /ModDate: D:20201105130733+08'00'
  • /Producer: KONICA MINOLTA bizhub C360i
  • /Title: SISCB Print20110509450
  • pdf_file_size_bytes: 206626
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20250110100051+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20250110101612+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 144030
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ISCB-5-RPT-C113-CR-V1.pdf ANSSI-CC-2024_41fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C113-CR-V1: 36
  • FR:
    • ANSSI-CC-2024/41: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 5
    • EAL2: 1
  • EAL:
    • EAL2: 3
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 9
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.CRYPTO: 1
    • A.MANAGE: 1
    • A.PROTECT: 1
    • A.SECURE_COMMS: 1
    • A.TIME: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 11
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • CC:
    • CCMB-2022-11-001: 1
    • CCMB-2022-11-002: 1
    • CCMB-2022-11-003: 1
    • CCMB-2022-11-005: 1
    • CCMB-2022-11-006: 1
pdf_data/report_metadata
  • /CreationDate: D:20201019095731Z00'00'
  • /Creator: Word
  • /ModDate: D:20201019095731Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H2) Quartz PDFContext
  • pdf_file_size_bytes: 817137
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename RSA Archer 6.7_ST_v1.0_09-29-2020.pdf ANSSI-Cible-CC-2024_41en.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 2
    • EAL2: 1
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.2: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 11
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 8
    • ALC_CMS: 1
    • ALC_CMS.2: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 16
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 14
    • ASE_ECD: 1
    • ASE_ECD.1: 10
    • ASE_INT: 1
    • ASE_INT.1: 12
    • ASE_OBJ: 1
    • ASE_OBJ.2: 10
    • ASE_REQ: 1
    • ASE_REQ.2: 13
    • ASE_SPD: 1
    • ASE_SPD.1: 7
    • ASE_TSS: 1
    • ASE_TSS.1: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 3
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR: 1
    • ALC_FLR.3: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 6
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR: 9
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 5
    • FAU_SAR.3.1: 1
  • FCS:
    • FCS_COP.1: 2
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS: 3
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 5
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 5
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 2
    • FMT_REV: 3
    • FMT_REV.1: 4
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
  • FTA:
    • FTA_SSL: 6
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 5
    • FTA_SSL.4.1: 1
    • FTA_TAB: 3
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE: 3
    • FTA_TSE.1: 4
    • FTA_TSE.1.1: 1
  • FDP:
    • FDP_ACC: 22
    • FDP_ACC.1: 10
    • FDP_ACC.2: 6
    • FDP_ACF: 20
    • FDP_ACF.1: 16
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 7
    • FDP_ETC.2: 10
    • FDP_IFC.1: 8
    • FDP_ITC.1: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 2
    • FDP_UIT: 10
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1: 4
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 12
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.CRYPTO: 3
    • A.MANAGE: 2
    • A.PROTECT: 2
    • A.SECURE_COMMS: 3
    • A.TIME: 2
  • O:
    • O.ACCESS_CONTROL: 4
    • O.AUDIT: 4
    • O.AUDIT_REVIEW: 4
    • O.I_AND_A: 3
    • O.LOGON_BANNER: 4
    • O.PASSWORD_CONTROLS: 3
    • O.SECURITY_MANAGEMENT: 4
    • O.SESSION_LIMITATION: 3
    • O.SESSION_TERMINATION: 4
    • O.THROTTLE: 3
  • OE:
    • OE.CRYPTO: 3
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
    • OE.SECURE_COMMS: 2
    • OE.TIME: 3
  • T:
    • T.BRUTE_FORCE: 3
    • T.DATA_COMPROMISE: 2
    • T.INAPPROPRIATE_USE: 2
    • T.INAPPRORIATE_USE: 1
    • T.NO_ACCOUNTABILITY: 2
    • T.UNATTENDED_SESSION: 3
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_ACTIVITY: 3
  • A:
    • A.CDCVM: 4
    • A.DE-: 2
    • A.DEVICE_AUTH: 1
    • A.IPH-: 2
    • A.IPHONE_USER: 1
    • A.PERSO: 4
  • D:
    • D.OS: 16
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • T:
    • T.CORRUPT: 4
    • T.PHYSICAL: 2
    • T.RECOVER: 4
    • T.REPLAY: 2
    • T.SILENT: 3
    • T.SKIMMING: 3
    • T.USURP: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 13
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.2: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_metadata
  • /CreationDate: D:20201019095805Z00'00'
  • /Creator: Word
  • /ModDate: D:20201019095805Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H2) Quartz PDFContext
  • pdf_file_size_bytes: 765259
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
  • /CreationDate: D:20241014150418Z
  • /Creator: Word
  • /ModDate: D:20241014160450+01'00'
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] Watch_S9_watchOS10_SecurityTarget_v5.0.docx
  • pdf_file_size_bytes: 2646136
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different