Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)
ANSSI-CC-2023/59
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01)
ANSSI-CC-2023/11-R01
name Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01)
not_valid_before 2023-12-28 2024-02-09
not_valid_after 2028-12-28 2029-02-09
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2023_11-R01en.pdf
manufacturer Apple Inc. NXP Semiconductors Germany GmbH
manufacturer_web https://www.apple.com/ https://www.nxp.com
security_level ADV_FSP.3, EAL2+ EAL5+, AVA_VAN.5, ALC_DVS.2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_11-R01fr.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2023_11-R01fr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': frozenset({'EPASS_PACE_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_V1.0'})})
state/cert/pdf_hash ca798a8678c606e1a601ebb9e1da8ca09cbef656c1bfbb3f868d5046c0cec8e2 cdbc0cbee43f140eae4e2bdbf2864775141c79a84f0b227109c355f9c6d674b1
state/cert/txt_hash 3feff5c9858eae44a5dfd96fce55ab212e3848e962cd31c4aee4a3ff690d63cd fb0753441fd77a4e4f2ad47a4195f6d3056705767b3125b9d13d00f004dbe2e0
state/report/pdf_hash c69a76645d475619fb0cbcc158f980c919fac7230089331e95b51efdc7425d55 2fde0faddff9856a1ebe8a8126d288b7fb16d8558bf1a85a4fc66a7521c01289
state/report/txt_hash 18b914ee117db29eaca1475c6db21b5d4193cfd24f13bd710a53bede88726220 98f9e9a94109f89b6a869a4e2099ec196bffc12455a2be0844ecd4828a197455
state/st/pdf_hash e5fdd311e271e1438728e8016f96e69565dedfd6000ba5e316945c5693eab587 6be58e6bbdfb7356af0a29aa911b8d4eac7dd2a3afd50550145e1cbe6daf5fd2
state/st/txt_hash 97bc32b32d57ede87b39fdc22d66d61f13b1bdbb893d26d97fd5600c44810c93 f848e8884eb75ba4a9ed7018c32c25b6f0f8f9efbfdd1b81de6daa198c370068
heuristics/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/11-R01
heuristics/cpe_matches cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* None
heuristics/extracted_versions 16.4.1 4.5, 4.0.1.52
heuristics/related_cves CVE-2023-40431, CVE-2023-32361, CVE-2023-40399, CVE-2024-27871, CVE-2023-41069, CVE-2024-27811, CVE-2024-27808, CVE-2023-34352, CVE-2024-27857, CVE-2023-35990, CVE-2024-27806, CVE-2024-23225, CVE-2024-40840, CVE-2024-40806, CVE-2024-40798, CVE-2023-35984, CVE-2023-40432, CVE-2023-32368, CVE-2024-44170, CVE-2023-42957, CVE-2023-42841, CVE-2023-42871, CVE-2023-40391, CVE-2023-40419, CVE-2023-32384, CVE-2024-44204, CVE-2023-38600, CVE-2023-41981, CVE-2023-42914, CVE-2023-32422, CVE-2023-40452, CVE-2023-38593, CVE-2023-32428, CVE-2024-27840, CVE-2023-42922, CVE-2024-27819, CVE-2023-38611, CVE-2023-40409, CVE-2024-44158, CVE-2024-44139, CVE-2023-41982, CVE-2023-32434, CVE-2024-27815, CVE-2023-41063, CVE-2024-27828, CVE-2024-40856, CVE-2024-27845, CVE-2023-41980, CVE-2024-23218, CVE-2024-40799, CVE-2024-44180, CVE-2023-42936, CVE-2023-40438, CVE-2023-32413, CVE-2023-40439, CVE-2024-44191, CVE-2023-32419, CVE-2023-32396, CVE-2024-27799, CVE-2024-23208, CVE-2023-41992, CVE-2024-40815, CVE-2024-44164, CVE-2024-23282, CVE-2023-32372, CVE-2024-23222, CVE-2023-32392, CVE-2024-40796, CVE-2023-42956, CVE-2023-42919, CVE-2023-32432, CVE-2023-38572, CVE-2024-44131, CVE-2023-40446, CVE-2023-40414, CVE-2023-28204, CVE-2023-38594, CVE-2023-38592, CVE-2024-44171, CVE-2024-27807, CVE-2023-38599, CVE-2023-40395, CVE-2023-32371, CVE-2023-28191, CVE-2024-40863, CVE-2023-40400, CVE-2023-42925, CVE-2023-42890, CVE-2023-40416, CVE-2024-40835, CVE-2024-23210, CVE-2023-32441, CVE-2023-40456, CVE-2023-41061, CVE-2023-32388, CVE-2023-42934, CVE-2023-40403, CVE-2023-42869, CVE-2024-40850, CVE-2023-40423, CVE-2023-37450, CVE-2024-44187, CVE-2024-27832, CVE-2023-32357, CVE-2024-27873, CVE-2023-38425, CVE-2024-27880, CVE-2023-42883, CVE-2024-40844, CVE-2024-27855, CVE-2023-40447, CVE-2023-38595, CVE-2023-32411, CVE-2023-32403, CVE-2023-42866, CVE-2023-41991, CVE-2023-32445, CVE-2024-40787, CVE-2024-23273, CVE-2023-32402, CVE-2024-27848, CVE-2024-44207, CVE-2024-44183, CVE-2023-38596, CVE-2023-32423, CVE-2024-27801, CVE-2023-42846, CVE-2024-23214, CVE-2023-32412, CVE-2024-40809, CVE-2023-32385, CVE-2023-41071, CVE-2023-40434, CVE-2023-41064, CVE-2023-40394, CVE-2023-41995, CVE-2024-40776, CVE-2023-40528, CVE-2023-41976, CVE-2023-42888, CVE-2023-32439, CVE-2023-38598, CVE-2023-32416, CVE-2022-3970, CVE-2023-41068, CVE-2023-40454, CVE-2024-44176, CVE-2023-32354, CVE-2023-32415, CVE-2023-40392, CVE-2023-42824, CVE-2023-42884, CVE-2023-45866, CVE-2023-41074, CVE-2023-32359, CVE-2023-42899, CVE-2023-42893, CVE-2023-38136, CVE-2023-40428, CVE-2023-40384, CVE-2024-23223, CVE-2024-23212, CVE-2023-38133, CVE-2023-38410, CVE-2024-23270, CVE-2024-27800, CVE-2024-40791, CVE-2024-27851, CVE-2024-27831, CVE-2023-40429, CVE-2024-40813, CVE-2023-42857, CVE-2024-27802, CVE-2023-34425, CVE-2023-41997, CVE-2023-42852, CVE-2023-32398, CVE-2023-41254, CVE-2023-32400, CVE-2024-40833, CVE-2023-40448, CVE-2024-23217, CVE-2023-32391, CVE-2024-40818, CVE-2023-42950, CVE-2024-40795, CVE-2024-23219, CVE-2024-44165, CVE-2023-32365, CVE-2024-23215, CVE-2024-40794, CVE-2023-42870, CVE-2024-27820, CVE-2023-32367, CVE-2023-42941, CVE-2023-38597, CVE-2023-41065, CVE-2023-32390, CVE-2023-41174, CVE-2024-44198, CVE-2024-23206, CVE-2024-40789, CVE-2024-40830, CVE-2023-38565, CVE-2024-27833, CVE-2023-40417, CVE-2023-32425, CVE-2024-40857, CVE-2023-32734, CVE-2023-38590, CVE-2023-42896, CVE-2024-27823, CVE-2024-40822, CVE-2024-40785, CVE-2023-40437, CVE-2023-38604, CVE-2024-40779, CVE-2024-40826, CVE-2023-42937, CVE-2024-27838, CVE-2023-38603, CVE-2023-41983, CVE-2023-40420, CVE-2023-42923, CVE-2024-40793, CVE-2023-28202, CVE-2024-40788, CVE-2023-41993, CVE-2023-32420, CVE-2024-27884, CVE-2023-41977, CVE-2024-27817, CVE-2023-41232, CVE-2024-40778, CVE-2023-27930, CVE-2023-41984, CVE-2023-32408, CVE-2023-40520, CVE-2023-38612, CVE-2023-41986, CVE-2024-44184, CVE-2023-32409, CVE-2024-40786, CVE-2023-32394, CVE-2024-27805, CVE-2023-32407, CVE-2023-40412, CVE-2023-40441, CVE-2024-40774, CVE-2023-41060, CVE-2023-38261, CVE-2023-32399, CVE-2023-42849, CVE-2023-39434, CVE-2023-42949, CVE-2024-27830, CVE-2023-40410, CVE-2023-32381, CVE-2024-27836, CVE-2023-42833, CVE-2023-32437, CVE-2023-40408, CVE-2023-32389, CVE-2023-32433, CVE-2023-41073, CVE-2023-42916, CVE-2023-38605, CVE-2024-23211, CVE-2023-32376, CVE-2023-38610, CVE-2023-42947, CVE-2023-42917, CVE-2024-23251, CVE-2023-40424, CVE-2024-40812, CVE-2023-40443, CVE-2023-40442, CVE-2023-41974, CVE-2023-41070, CVE-2024-23213, CVE-2023-36495, CVE-2023-40529, CVE-2023-42872, CVE-2024-27863, CVE-2023-32352, CVE-2023-35074, CVE-2023-40427, CVE-2023-42962, CVE-2024-44124, CVE-2023-38424, CVE-2023-40449, CVE-2023-32373, CVE-2023-38606, CVE-2024-27850, CVE-2023-40413, CVE-2024-40780, CVE-2023-38580, CVE-2023-35993, CVE-2024-23296, CVE-2023-32404, CVE-2023-40385, CVE-2023-41968 None
heuristics/report_references/directly_referencing None NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-V2-2023
heuristics/report_references/indirectly_referencing None NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-1149-V2-2023
heuristics/scheme_data/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/11-R01
heuristics/scheme_data/description Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC.. Le produit évalué est « ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration, Version 4.0.1.52 » développé par NXP SEMICONDUCTORS. Il s’agit de documents électroniques, qui permettent différents types d’usage basés sur l’identité électronique.
heuristics/scheme_data/developer APPLE INC. NXP SEMICONDUCTORS
heuristics/scheme_data/enhanced/augmented ADV_FSP.3 ALC_DVS.2, AVA_VAN.5
heuristics/scheme_data/enhanced/category Divers Cartes à puce
heuristics/scheme_data/enhanced/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/11-R01
heuristics/scheme_data/enhanced/cert_link https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/certificat-2023_11-R01fr.pdf
heuristics/scheme_data/enhanced/certification_date 28/12/2023 09/02/2024
heuristics/scheme_data/enhanced/developer APPLE INC. NXP SEMICONDUCTORS
heuristics/scheme_data/enhanced/expiration_date 28/12/2028 09/02/2029
heuristics/scheme_data/enhanced/level EAL2+ EAL5+
heuristics/scheme_data/enhanced/protection_profile Machine Readable Travel Document with « ICAO Application », Extended Access Control with PACE, version 1.3.2, certifié BSI-CC-PP-0056-V2-2012-MA-02 ; Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1, certifié BSI-CC-PP-0068-V2-2011-MA-01.
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_11-R01fr.pdf
heuristics/scheme_data/enhanced/sponsor APPLE INC. NXP SEMICONDUCTORS
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2023_11-R01en.pdf
heuristics/scheme_data/expiration_date 28 Décembre 2028 9 Février 2029
heuristics/scheme_data/level EAL2+ EAL5+
heuristics/scheme_data/product Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252) ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52)
heuristics/scheme_data/sponsor APPLE INC. NXP SEMICONDUCTORS
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios https://cyber.gouv.fr/produits-certifies/chipdoc-v4-jcop-45-p71-icao-eac12-pace-configuration-version-40152-0
heuristics/st_references/directly_referencing None BSI-DSZ-CC-1149-V2-2023
heuristics/st_references/indirectly_referencing None BSI-DSZ-CC-1149-V2-2023
pdf_data/cert_filename certificat-CC-2023_59en.pdf certificat-2023_11-R01fr.pdf
pdf_data/cert_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/59: 2
  • ANSSI-CC-2023/11-R01: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_security_level/EAL
  • EAL2: 2
  • EAL5: 1
  • EAL2: 1
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 2 1
pdf_data/cert_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/cert_keywords/eval_facility/Thales/THALES/CNES 2 1
pdf_data/cert_keywords/os_name
  • JCOP:
    • JCOP 4: 1
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 2
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 2
pdf_data/cert_metadata//CreationDate D:20240222154612+01'00' D:20240214225001+01'00'
pdf_data/cert_metadata//ModDate D:20240222155210+01'00' D:20240214231042+01'00'
pdf_data/cert_metadata/pdf_file_size_bytes 138174 194428
pdf_data/report_filename ANSSI-CC-2023_59en.pdf ANSSI-CC-2023_11-R01fr.pdf
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/59: 2
  • DE:
    • BSI-DSZ-CC-1149-V2-2023: 1
  • FR:
    • ANSSI-CC-2023/11-R01: 2
  • NL:
    • NSCIB-CC-0313985-CR: 1
    • NSCIB-CC-0313985-1MA2: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/59: 2
  • ANSSI-CC-2023/11-R01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
    • BSI-CC-PP-0056-V2-2012-MA02: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
    • AVA_VAN: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_DVS.2: 1
  • ALC_FLR: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL4: 1
  • EAL2 augmented: 1
  • EAL5: 1
  • EAL2: 2
  • EAL7: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL2 3 2
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E3 Basic: 1
  • ITSEC E6 Elevé: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 15
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/ic_data_group
  • EF:
    • EF.CardAccess: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 4: 7
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ICAO:
    • ICAO: 8
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 5
    • NXP Semiconductors: 1
pdf_data/report_metadata//CreationDate D:20240222154515+01'00' D:20240214224452+01'00'
pdf_data/report_metadata//ModDate D:20240222155210+01'00' D:20240214231042+01'00'
pdf_data/report_metadata/pdf_file_size_bytes 427149 406038
pdf_data/st_filename ANSSI-cible-CC-2023_59en.pdf ANSSI-Cible-CC-2023_11-R01en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
  • RSA:
    • RSA 1024: 1
    • RSA-PSS: 1
  • ECC:
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 3
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 1
  • ECDH:
    • ECDH: 3
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 1 3
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1149-V2-2023: 2
pdf_data/st_keywords/cc_claims
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
  • A:
    • A.DE-: 2
    • A.PERSO: 3
    • A.CDCVM: 3
    • A.WATCH_USER: 3
    • A.DEVICE_AUTH: 1
  • OE:
    • OE.CDCVM: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012-MA-02: 2
    • BSI-CC-PP-0068-: 2
    • BSI-CC-PP-0086: 1
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0087-V2-MA-01: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_ARC.1: 5
  • ADV_FSP.5: 6
  • ADV_IMP.1: 5
  • ADV_INT.2: 2
  • ADV_TDS.4: 8
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 3 5
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 4 5
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_DVS.2: 6
  • ALC_CMC.4: 2
  • ALC_CMS.5: 1
  • ALC_DEL.1: 2
  • ALC_LCD.1: 3
  • ALC_TAT.2: 3
  • ALC_DVS.1: 1
  • ALC_TAT.1: 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL.1: 2
  • ASE_ECD.1: 3
  • ASE_INT.1: 2
  • ASE_OBJ.2: 2
  • ASE_REQ.2: 2
  • ASE_SPD.1: 1
  • ASE_TSS.1: 2
  • ASE_REQ.1: 2
  • ASE_INT.1: 4
  • ASE_CCL.1: 2
  • ASE_SPD.1: 1
  • ASE_OBJ.2: 3
  • ASE_ECD.1: 2
  • ASE_REQ.2: 4
  • ASE_TSS.1: 2
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 3 2
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 2 4
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 2 3
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 2 4
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 4
  • ATE_FUN.1: 3
  • ATE_IND.2: 1
  • ATE_COV.2: 4
  • ATE_DPT.3: 1
  • ATE_FUN.1: 3
  • ATE_IND.2: 1
  • ATE_DPT.1: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 2
  • AVA_VAN.5: 4
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 2: 1
  • EAL2: 1
  • EAL 2 augmented: 1
  • EAL5: 7
  • EAL5 augmented: 3
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ACC: 25
    • FDP_ACC.2: 4
    • FDP_ACF: 23
    • FDP_ACF.1: 12
    • FDP_ITT.1: 4
    • FDP_ITT.1.1: 1
    • FDP_ETC: 8
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_RIP.1: 15
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 10
    • FDP_SDI.1.1: 1
    • FDP_ACC.1: 11
    • FDP_IFC.1: 9
    • FDP_ETC.2: 2
  • FIA:
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_AFL.1: 3
    • FIA_AFL: 7
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_UAU.6.1: 2
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 2
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
  • FPR:
    • FPR_UNO.1: 14
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 10
    • FPT_RPL.1: 4
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
  • FAU:
    • FAU_SAS: 1
    • FAU_SAS.1: 8
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RND: 1
    • FCS_CKM: 50
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP: 58
    • FCS_COP.1: 1
    • FCS_RND.1: 14
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_SDC: 10
    • FDP_SDC.1: 6
    • FDP_SDI: 1
    • FDP_SDC.1.1: 1
    • FDP_RIP: 27
    • FDP_ACC: 13
    • FDP_ACC.1: 1
    • FDP_ACF: 19
    • FDP_ACF.1: 16
    • FDP_UCT: 8
    • FDP_UCT.1: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
    • FDP_RIP.1: 3
  • FIA:
    • FIA_API: 26
    • FIA_UAU.4: 2
    • FIA_UAU: 85
    • FIA_AFL: 32
    • FIA_AFL.1: 3
    • FIA_API.1: 3
    • FIA_UID: 35
    • FIA_UID.1: 4
    • FIA_UAU.1: 4
    • FIA_UAU.5: 2
    • FIA_UAU.6: 1
  • FMT:
    • FMT_LIM: 1
    • FMT_MTD: 96
    • FMT_MOF: 5
    • FMT_MOF.1: 2
    • FMT_MTD.1: 4
    • FMT_MTD.3: 9
    • FMT_MTD.3.1: 1
    • FMT_LIM.1: 7
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 7
    • FMT_LIM.2.1: 1
    • FMT_SMF: 21
    • FMT_SMF.1: 2
    • FMT_SMR: 18
    • FMT_SMR.1: 2
    • FMT_MSA.3: 3
    • FMT_MSA.1: 1
  • FPT:
    • FPT_EMS: 7
    • FPT_EMS.1: 3
    • FPT_FLS: 11
    • FPT_FLS.1: 2
    • FPT_TST: 7
    • FPT_PHP: 7
    • FPT_PHP.3: 1
    • FPT_TST.1: 3
  • FTP:
    • FTP_ITC: 22
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 15
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 10
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
  • FDP_SDC: 10
  • FDP_SDC.1: 6
  • FDP_SDI: 1
  • FDP_SDC.1.1: 1
  • FDP_RIP: 27
  • FDP_ACC: 13
  • FDP_ACC.1: 1
  • FDP_ACF: 19
  • FDP_ACF.1: 16
  • FDP_UCT: 8
  • FDP_UCT.1: 1
  • FDP_UIT: 7
  • FDP_UIT.1: 2
  • FDP_RIP.1: 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 25 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 11 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 23 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 12 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 15 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT 10 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 10 7
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 11
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 3
  • FIA_AFL: 7
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_SOS.2: 4
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
  • FIA_API: 26
  • FIA_UAU.4: 2
  • FIA_UAU: 85
  • FIA_AFL: 32
  • FIA_AFL.1: 3
  • FIA_API.1: 3
  • FIA_UID: 35
  • FIA_UID.1: 4
  • FIA_UAU.1: 4
  • FIA_UAU.5: 2
  • FIA_UAU.6: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 7 32
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 1 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 5 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 11 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 1 4
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR.1: 10
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 6
  • FMT_SMF.1.1: 1
  • FMT_MSA.1: 6
  • FMT_MSA.3: 11
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 2
  • FMT_MTD.1: 4
  • FMT_MTD.1.1: 1
  • FMT_MTD.3: 4
  • FMT_MTD.3.1: 1
  • FMT_LIM: 1
  • FMT_MTD: 96
  • FMT_MOF: 5
  • FMT_MOF.1: 2
  • FMT_MTD.1: 4
  • FMT_MTD.3: 9
  • FMT_MTD.3.1: 1
  • FMT_LIM.1: 7
  • FMT_LIM.1.1: 1
  • FMT_LIM.2: 7
  • FMT_LIM.2.1: 1
  • FMT_SMF: 21
  • FMT_SMF.1: 2
  • FMT_SMR: 18
  • FMT_SMR.1: 2
  • FMT_MSA.3: 3
  • FMT_MSA.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 6 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.3 4 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 10 2
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_ITC.1: 4
  • FPT_ITC.1.1: 1
  • FPT_RPL: 10
  • FPT_RPL.1: 4
  • FPT_EMS: 7
  • FPT_EMS.1: 3
  • FPT_FLS: 11
  • FPT_FLS.1: 2
  • FPT_TST: 7
  • FPT_PHP: 7
  • FPT_PHP.3: 1
  • FPT_TST.1: 3
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 14
  • FTP_ITC.1: 7
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 4
  • FTP_ITC: 22
  • FTP_ITC.1: 3
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 14 22
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 7 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
  • PACE:
    • PACE: 316
pdf_data/st_keywords/crypto_scheme/MAC/MAC 1 5
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 2
      • SHA-512: 3
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG14: 5
    • EF.DG1: 5
    • EF.DG2: 2
    • EF.DG3: 8
    • EF.DG4: 8
    • EF.DG16: 4
    • EF.DG15: 2
    • EF.DG5: 1
    • EF.COM: 1
    • EF.CardAccess: 1
    • EF.SOD: 2
    • EF.ChipSecurity: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 102
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • physical probing: 3
  • FI:
    • physical tampering: 2
    • Physical Tampering: 3
    • malfunction: 8
    • Malfunction: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-3: 1
    • FIPS 140-2: 1
  • FIPS:
    • FIPS180-4: 1
    • FIPS 180-4: 1
    • FIPS 46-3: 3
    • FIPS 197: 4
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#3: 1
    • PKCS#1: 2
  • BSI:
    • AIS31: 1
  • ISO:
    • ISO/IEC 9796-2: 1
  • ICAO:
    • ICAO: 149
    • ICAO-SAC: 1
  • SCP:
    • SCP03: 10
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 140-3: 1
  • FIPS 140-2: 1
  • FIPS180-4: 1
  • FIPS 180-4: 1
  • FIPS 46-3: 3
  • FIPS 197: 4
  • FIPS PUB 46-3: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 22
  • DES:
    • DES:
      • DES: 4
    • 3DES:
      • TDES: 6
  • constructions:
    • MAC:
      • KMAC: 2
      • CMAC: 6
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 1 22
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 6
pdf_data/st_keywords/vendor
  • NXP:
    • NXP Semiconductors: 38
    • NXP: 106
pdf_data/st_metadata
  • pdf_file_size_bytes: 2520806
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
  • /CreationDate: D:20231109105238Z
  • /Creator: Word
  • /ModDate: D:20231109105301Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 807888
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 87
  • /Title: Security Target Lite
  • /Author: NXP B.V.
  • /Subject: ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration
  • /Keywords: Common Criteria, Security Target Lite, ChipDoc v4, JCOP 4.5 P71, ICAO EAC with BAC, ICAO EAC with PACE
  • /Creator: DITA Open Toolkit 3.3.1
  • /Producer: Apache FOP Version 2.3
  • /CreationDate: D:20231011000545+02'00'
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20231109105238Z D:20231011000545+02'00'
pdf_data/st_metadata//Creator Word DITA Open Toolkit 3.3.1
pdf_data/st_metadata//Producer Adobe Mac PDF Plug-in Apache FOP Version 2.3
pdf_data/st_metadata//Title Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 2520806 807888
pdf_data/st_metadata/pdf_number_of_pages 56 87
dgst 204cb8d5dbf8e997 2fdb7ebde10e8402