Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)
ANSSI-CC-2023/59
Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201)
ANSSI-CC-2023/13
name Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201)
category ICs, Smart Cards and Smart Card-Related Devices and Systems Mobility
not_valid_before 2023-12-28 2023-03-01
not_valid_after 2028-12-28 2028-03-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2023_13en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_13.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_13fr.pdf
state/cert/extract_ok True False
state/cert/pdf_hash ca798a8678c606e1a601ebb9e1da8ca09cbef656c1bfbb3f868d5046c0cec8e2 9ab78a6d84a931c25349727a05e8164268981aeb844204059e86a9b48cbbbca1
state/cert/txt_hash 3feff5c9858eae44a5dfd96fce55ab212e3848e962cd31c4aee4a3ff690d63cd 2b9b7c125e4dd47b75a16b986227011d5ccb8f4aa6d899708a4f6f6d90163ea2
state/report/extract_ok True False
state/report/pdf_hash c69a76645d475619fb0cbcc158f980c919fac7230089331e95b51efdc7425d55 85828919202436363549b23bf5bb44e35f2ce509cab7e7ca929cfbb1ec1a220a
state/report/txt_hash 18b914ee117db29eaca1475c6db21b5d4193cfd24f13bd710a53bede88726220 3cd862a45c78db03af947d4ddd2ec5bf2edb7ee0ccd3b2238deabcde3f3f8973
state/st/extract_ok True False
state/st/pdf_hash e5fdd311e271e1438728e8016f96e69565dedfd6000ba5e316945c5693eab587 6106e3e797dd032ada6848a812bc0e7ee805fc98068bbb19fe1b2b2a2f62cb0f
state/st/txt_hash 97bc32b32d57ede87b39fdc22d66d61f13b1bdbb893d26d97fd5600c44810c93 c2cb1210156602f783668a8b2524a1afd5dfaf1fae0de9f2550d9ba1da811c10
heuristics/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/13
heuristics/cpe_matches cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:7.4.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:watchos:7.4:*:*:*:*:*:*:*
heuristics/extracted_versions 16.4.1 7.4.1
heuristics/scheme_data/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/13
heuristics/scheme_data/description Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC.. Le produit évalué est « Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1, Version 18T201 » développé par Apple Inc.. Apple Pay est une solution de paiement mobile développée par la société Apple Inc. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paieme
heuristics/scheme_data/developer APPLE INC. Apple Inc.
heuristics/scheme_data/enhanced/augmented ADV_FSP.3 (ADV_FSP.3, ALC_FLR.3)
heuristics/scheme_data/enhanced/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/13
heuristics/scheme_data/enhanced/cert_link https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_13fr.pdf
heuristics/scheme_data/enhanced/certification_date 28/12/2023 01/03/2023
heuristics/scheme_data/enhanced/developer APPLE INC. Apple Inc.
heuristics/scheme_data/enhanced/evaluation_facility THALES / CNES SERMA SAFETY & SECURITY et OPPIDA
heuristics/scheme_data/enhanced/expiration_date 28/12/2028 29/02/2028
heuristics/scheme_data/enhanced/protection_profile NA
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_13.pdf
heuristics/scheme_data/enhanced/sponsor APPLE INC. Apple Inc.
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-2023_13en.pdf
heuristics/scheme_data/expiration_date 28 Décembre 2028 29 Février 2028
heuristics/scheme_data/product Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252) Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201)
heuristics/scheme_data/sponsor APPLE INC. Apple Inc.
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-apple-watch-serie-4-executant
pdf_data/cert_filename certificat-CC-2023_59en.pdf certificat-cc-2023_13fr.pdf
pdf_data/cert_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/59: 2
  • ANSSI-CC-2023/13: 2
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ADV:
    • ADV_FSP.3: 2
  • ALC:
    • ALC_FLR.3: 3
pdf_data/cert_keywords/cc_sar/ADV/ADV_FSP.3 1 2
pdf_data/cert_keywords/cc_security_level/EAL
  • EAL2: 2
  • EAL2: 2
  • EAL4: 1
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 2
  • Serma:
    • Serma Safety & Security: 1
    • SERMA: 1
  • OPPIDA:
    • OPPIDA: 1
pdf_data/cert_metadata
  • pdf_file_size_bytes: 138174
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20240222154612+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155210+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks:
None
pdf_data/report_filename ANSSI-CC-2023_59en.pdf anssi-cc-2023_13.pdf
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/59: 2
  • ANSSI-CC-2023/13: 2
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.3 1 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_FLR.3: 3
  • ALC_FLR: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL4: 1
  • EAL2 augmented: 1
  • EAL2: 4
  • EAL4: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL2 3 4
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E3 Basic: 1
  • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
  • Serma:
    • SERMA: 1
  • OPPIDA:
    • OPPIDA: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 427149
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /CreationDate: D:20240222154515+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155210+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
None
pdf_data/st_filename ANSSI-cible-CC-2023_59en.pdf anssi-cible-2023_13en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/cc_claims/A
  • A.DE-: 2
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.WATCH_USER: 3
  • A.DEVICE_AUTH: 1
  • A.DE-: 2
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.IPH-: 2
  • A.DEVICE_AUTH: 1
  • A.IPHONE_USER: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.3: 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 2: 1
  • EAL2: 1
  • EAL 2 augmented: 1
  • EAL 2: 1
  • EAL2: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 15
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 10
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 22
  • FDP_ACC.2: 4
  • FDP_ACF: 20
  • FDP_ACF.1: 12
  • FDP_ETC: 7
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 12
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 9
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 8
  • FDP_ETC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 25 22
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 23 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_ETC 8 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 9 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 15 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 10 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 11
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 3
  • FIA_AFL: 7
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_SOS.2: 4
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 8
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL: 9
  • FIA_AFL.1: 5
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_SOS.2: 4
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 2
  • FIA_UID.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 7 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 3 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 11 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 7
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 14 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL 10 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 4 6
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
  • out of scope: 2
  • settings for the device, operating system and applications. The Secure Element of the device is out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_keywords/crypto_scheme/MAC/MAC 1 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 140-3: 1
  • FIPS 140-2: 1
  • FIPS 140-2: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS 140-2 1 2
pdf_data/st_keywords/tee_name/IBM/SE 6 5
pdf_data/st_metadata
  • pdf_file_size_bytes: 2520806
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
  • /CreationDate: D:20231109105238Z
  • /Creator: Word
  • /ModDate: D:20231109105301Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx
  • pdf_hyperlinks:
None
dgst 204cb8d5dbf8e997 143764f03c38df35