Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)
ANSSI-CC-2023/59
MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45)
ANSSI-CC-2023/45
name Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45)
not_valid_before 2023-12-28 2023-11-13
not_valid_after 2028-12-28 2028-11-13
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_45en.pdf
manufacturer Apple Inc. THALES DIS FRANCE SA
manufacturer_web https://www.apple.com/ https://www.thalesgroup.com/en/europe/france
security_level ADV_FSP.3, EAL2+ EAL7
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_45fr.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_45fr.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2024, 4, 4), 'maintenance_title': 'ANSSI-CC-2023/45-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_45-M01fr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_45-M01en.pdf'})
state/cert/pdf_hash ca798a8678c606e1a601ebb9e1da8ca09cbef656c1bfbb3f868d5046c0cec8e2 e8e346322a5c5c7cf8a4e888366382882aa9a71387e712598a352314be1431da
state/cert/txt_hash 3feff5c9858eae44a5dfd96fce55ab212e3848e962cd31c4aee4a3ff690d63cd bac458caf43a57a50dbd5a4cbc60f4578caeeb45b23f024afdec4ad2e01d4273
state/report/pdf_hash c69a76645d475619fb0cbcc158f980c919fac7230089331e95b51efdc7425d55 786da3eb99c210405ca5ff85d9f950317250326f7dcf561a2bb07498ff9666f2
state/report/txt_hash 18b914ee117db29eaca1475c6db21b5d4193cfd24f13bd710a53bede88726220 74cf28400f6c3e2a64deffed860a8a62b85d2937be459996ee79b03aab5cf296
state/st/pdf_hash e5fdd311e271e1438728e8016f96e69565dedfd6000ba5e316945c5693eab587 3773a1dc0b9f29b3735ebf7fbe627770d344e8eb9bd712fd2074241f388b8292
state/st/txt_hash 97bc32b32d57ede87b39fdc22d66d61f13b1bdbb893d26d97fd5600c44810c93 8f7a45b5a11368ef2aea048f2475bd6d0a5a36f23a2bc0f56732d220dcefefe3
heuristics/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/45
heuristics/cpe_matches cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* None
heuristics/extracted_versions 16.4.1 5.1
heuristics/related_cves CVE-2023-40431, CVE-2023-32361, CVE-2023-40399, CVE-2024-27871, CVE-2023-41069, CVE-2024-27811, CVE-2024-27808, CVE-2023-34352, CVE-2024-27857, CVE-2023-35990, CVE-2024-27806, CVE-2024-23225, CVE-2024-40840, CVE-2024-40806, CVE-2024-40798, CVE-2023-35984, CVE-2023-40432, CVE-2023-32368, CVE-2024-44170, CVE-2023-42957, CVE-2023-42841, CVE-2023-42871, CVE-2023-40391, CVE-2023-40419, CVE-2023-32384, CVE-2024-44204, CVE-2023-38600, CVE-2023-41981, CVE-2023-42914, CVE-2023-32422, CVE-2023-40452, CVE-2023-38593, CVE-2023-32428, CVE-2024-27840, CVE-2023-42922, CVE-2024-27819, CVE-2023-38611, CVE-2023-40409, CVE-2024-44158, CVE-2024-44139, CVE-2023-41982, CVE-2023-32434, CVE-2024-27815, CVE-2023-41063, CVE-2024-27828, CVE-2024-40856, CVE-2024-27845, CVE-2023-41980, CVE-2024-23218, CVE-2024-40799, CVE-2024-44180, CVE-2023-42936, CVE-2023-40438, CVE-2023-32413, CVE-2023-40439, CVE-2024-44191, CVE-2023-32419, CVE-2023-32396, CVE-2024-27799, CVE-2024-23208, CVE-2023-41992, CVE-2024-40815, CVE-2024-44164, CVE-2024-23282, CVE-2023-32372, CVE-2024-23222, CVE-2023-32392, CVE-2024-40796, CVE-2023-42956, CVE-2023-42919, CVE-2023-32432, CVE-2023-38572, CVE-2024-44131, CVE-2023-40446, CVE-2023-40414, CVE-2023-28204, CVE-2023-38594, CVE-2023-38592, CVE-2024-44171, CVE-2024-27807, CVE-2023-38599, CVE-2023-40395, CVE-2023-32371, CVE-2023-28191, CVE-2024-40863, CVE-2023-40400, CVE-2023-42925, CVE-2023-42890, CVE-2023-40416, CVE-2024-40835, CVE-2024-23210, CVE-2023-32441, CVE-2023-40456, CVE-2023-41061, CVE-2023-32388, CVE-2023-42934, CVE-2023-40403, CVE-2023-42869, CVE-2024-40850, CVE-2023-40423, CVE-2023-37450, CVE-2024-44187, CVE-2024-27832, CVE-2023-32357, CVE-2024-27873, CVE-2023-38425, CVE-2024-27880, CVE-2023-42883, CVE-2024-40844, CVE-2024-27855, CVE-2023-40447, CVE-2023-38595, CVE-2023-32411, CVE-2023-32403, CVE-2023-42866, CVE-2023-41991, CVE-2023-32445, CVE-2024-40787, CVE-2024-23273, CVE-2023-32402, CVE-2024-27848, CVE-2024-44207, CVE-2024-44183, CVE-2023-38596, CVE-2023-32423, CVE-2024-27801, CVE-2023-42846, CVE-2024-23214, CVE-2023-32412, CVE-2024-40809, CVE-2023-32385, CVE-2023-41071, CVE-2023-40434, CVE-2023-41064, CVE-2023-40394, CVE-2023-41995, CVE-2024-40776, CVE-2023-40528, CVE-2023-41976, CVE-2023-42888, CVE-2023-32439, CVE-2023-38598, CVE-2023-32416, CVE-2022-3970, CVE-2023-41068, CVE-2023-40454, CVE-2024-44176, CVE-2023-32354, CVE-2023-32415, CVE-2023-40392, CVE-2023-42824, CVE-2023-42884, CVE-2023-45866, CVE-2023-41074, CVE-2023-32359, CVE-2023-42899, CVE-2023-42893, CVE-2023-38136, CVE-2023-40428, CVE-2023-40384, CVE-2024-23223, CVE-2024-23212, CVE-2023-38133, CVE-2023-38410, CVE-2024-23270, CVE-2024-27800, CVE-2024-40791, CVE-2024-27851, CVE-2024-27831, CVE-2023-40429, CVE-2024-40813, CVE-2023-42857, CVE-2024-27802, CVE-2023-34425, CVE-2023-41997, CVE-2023-42852, CVE-2023-32398, CVE-2023-41254, CVE-2023-32400, CVE-2024-40833, CVE-2023-40448, CVE-2024-23217, CVE-2023-32391, CVE-2024-40818, CVE-2023-42950, CVE-2024-40795, CVE-2024-23219, CVE-2024-44165, CVE-2023-32365, CVE-2024-23215, CVE-2024-40794, CVE-2023-42870, CVE-2024-27820, CVE-2023-32367, CVE-2023-42941, CVE-2023-38597, CVE-2023-41065, CVE-2023-32390, CVE-2023-41174, CVE-2024-44198, CVE-2024-23206, CVE-2024-40789, CVE-2024-40830, CVE-2023-38565, CVE-2024-27833, CVE-2023-40417, CVE-2023-32425, CVE-2024-40857, CVE-2023-32734, CVE-2023-38590, CVE-2023-42896, CVE-2024-27823, CVE-2024-40822, CVE-2024-40785, CVE-2023-40437, CVE-2023-38604, CVE-2024-40779, CVE-2024-40826, CVE-2023-42937, CVE-2024-27838, CVE-2023-38603, CVE-2023-41983, CVE-2023-40420, CVE-2023-42923, CVE-2024-40793, CVE-2023-28202, CVE-2024-40788, CVE-2023-41993, CVE-2023-32420, CVE-2024-27884, CVE-2023-41977, CVE-2024-27817, CVE-2023-41232, CVE-2024-40778, CVE-2023-27930, CVE-2023-41984, CVE-2023-32408, CVE-2023-40520, CVE-2023-38612, CVE-2023-41986, CVE-2024-44184, CVE-2023-32409, CVE-2024-40786, CVE-2023-32394, CVE-2024-27805, CVE-2023-32407, CVE-2023-40412, CVE-2023-40441, CVE-2024-40774, CVE-2023-41060, CVE-2023-38261, CVE-2023-32399, CVE-2023-42849, CVE-2023-39434, CVE-2023-42949, CVE-2024-27830, CVE-2023-40410, CVE-2023-32381, CVE-2024-27836, CVE-2023-42833, CVE-2023-32437, CVE-2023-40408, CVE-2023-32389, CVE-2023-32433, CVE-2023-41073, CVE-2023-42916, CVE-2023-38605, CVE-2024-23211, CVE-2023-32376, CVE-2023-38610, CVE-2023-42947, CVE-2023-42917, CVE-2024-23251, CVE-2023-40424, CVE-2024-40812, CVE-2023-40443, CVE-2023-40442, CVE-2023-41974, CVE-2023-41070, CVE-2024-23213, CVE-2023-36495, CVE-2023-40529, CVE-2023-42872, CVE-2024-27863, CVE-2023-32352, CVE-2023-35074, CVE-2023-40427, CVE-2023-42962, CVE-2024-44124, CVE-2023-38424, CVE-2023-40449, CVE-2023-32373, CVE-2023-38606, CVE-2024-27850, CVE-2023-40413, CVE-2024-40780, CVE-2023-38580, CVE-2023-35993, CVE-2024-23296, CVE-2023-32404, CVE-2023-40385, CVE-2023-41968 None
heuristics/report_references/directly_referencing None ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/report_references/indirectly_referencing None ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/scheme_data/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/45
heuristics/scheme_data/description Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC.. Le produit évalué est la carte « MultiApp V5.1 Java Card Virtual Machine, version 5.1 » développé par THALES DIS FRANCE SAS et THALES DIS DESIGN SERVICES. La « plateforme MultiApp V5.1 » de la carte a déjà fait l’objet d’une certification au niveau EAL6 augmenté du composant ALC_FLR.2.
heuristics/scheme_data/developer APPLE INC. THALES DIS FRANCE SAS
heuristics/scheme_data/enhanced/augmented ADV_FSP.3 NA
heuristics/scheme_data/enhanced/category Divers Cartes à puce
heuristics/scheme_data/enhanced/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/45
heuristics/scheme_data/enhanced/cert_link https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_45fr_0.pdf
heuristics/scheme_data/enhanced/certification_date 28/12/2023 13/11/2023
heuristics/scheme_data/enhanced/developer APPLE INC. THALES DIS FRANCE SAS
heuristics/scheme_data/enhanced/evaluation_facility THALES / CNES THALES DIS FRANCE SAS
heuristics/scheme_data/enhanced/expiration_date 28/12/2028 13/11/2028
heuristics/scheme_data/enhanced/level EAL2+ EAL7
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_45fr_0.pdf
heuristics/scheme_data/enhanced/sponsor APPLE INC. THALES DIS FRANCE SAS
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_45en_0.pdf
heuristics/scheme_data/expiration_date 28 Décembre 2028 13 Novembre 2028
heuristics/scheme_data/level EAL2+ EAL7
heuristics/scheme_data/product Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252) MultiApp V5.1 Java Card Virtual Machine (version 5.1)
heuristics/scheme_data/sponsor APPLE INC. THALES DIS FRANCE SAS
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios https://cyber.gouv.fr/produits-certifies/multiapp-v51-java-card-virtual-machine-version-51
heuristics/st_references/directly_referencing None ANSSI-CC-2023/01
heuristics/st_references/indirectly_referencing None ANSSI-CC-2023/01
pdf_data/cert_filename certificat-CC-2023_59en.pdf Certificat-CC-2023_45fr.pdf
pdf_data/cert_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/59: 2
  • ANSSI-CC-2023/45: 2
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
pdf_data/cert_keywords/cc_security_level/EAL
  • EAL2: 2
  • EAL7: 1
  • EAL2: 1
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 2 1
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 2
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_metadata//CreationDate D:20240222154612+01'00' D:20231129170130+01'00'
pdf_data/cert_metadata//ModDate D:20240222155210+01'00' D:20231129170302+01'00'
pdf_data/cert_metadata/pdf_file_size_bytes 138174 130676
pdf_data/report_filename ANSSI-CC-2023_59en.pdf ANSSI-CC-2023_45fr.pdf
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/59: 2
  • ANSSI-CC-2023/45: 2
  • ANSSI-CC-2023/01: 1
  • ANSSI-CC-2023/31: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
  • AGD:
    • AGD_OPE: 5
    • AGD_PRE: 2
  • ALC:
    • ALC_FLR.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_FLR.2: 1
  • ALC_FLR: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL4: 1
  • EAL2 augmented: 1
  • EAL 7: 3
  • EAL2: 2
  • EAL6: 1
  • EAL7: 2
pdf_data/report_keywords/cc_security_level/EAL/EAL2 3 2
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E3 Basic: 1
  • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
  • CESTI:
    • CESTI: 3
  • CEA-LETI:
    • CEA - LETI: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_metadata//CreationDate D:20240222154515+01'00' D:20231129165959+01'00'
pdf_data/report_metadata//ModDate D:20240222155210+01'00' D:20231129170305+01'00'
pdf_data/report_metadata/pdf_file_size_bytes 427149 556910
pdf_data/report_metadata/pdf_number_of_pages 13 15
pdf_data/st_filename ANSSI-cible-CC-2023_59en.pdf ANSSI-cible-CC-2023_45en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
  • ECC:
    • ECC:
      • ECC: 3
  • FF:
    • DH:
      • DH: 1
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 1
  • ECC:
    • ECC: 3
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/01: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_claims
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
  • A:
    • A.DE-: 2
    • A.PERSO: 3
    • A.CDCVM: 3
    • A.WATCH_USER: 3
    • A.DEVICE_AUTH: 1
  • OE:
    • OE.CDCVM: 3
  • D:
    • D.APP_CODE: 5
    • D.APP_C_DATA: 2
    • D.APP_I_DATA: 3
    • D.PIN: 4
    • D.API_DATA: 3
    • D.CRYPTO: 3
    • D.JCS_CODE: 3
    • D.JCS_DATA: 4
    • D.SEC_DATA: 5
  • O:
    • O.FIREWALL: 15
    • O.ARRAY_VIEWS_CONFID: 4
    • O.GLOBAL_ARRAYS_INTEG: 4
    • O.ARRAY_VIEW_CONFID: 1
    • O.ARRAY_VIEWS_INTEG: 2
    • O.APPLET: 2
    • O.CODE_CAP_FILE: 3
    • O.JAVAOBJECT: 38
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 6
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.SID: 6
    • T.EXE-CODE: 6
    • T.NATIVE: 3
  • A:
    • A.VERIFICATION: 3
    • A.CAP_FILE: 3
  • R:
    • R.JAVA: 9
  • OP:
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_T_ALOAD: 3
    • OP.ARRAY_T_ASTORE: 3
    • OP.CREATE: 9
    • OP.DELETE_APPLET: 1
    • OP.DELETE_CAP_FILE: 1
    • OP.DELETE_CAP_FILE_APPLET: 1
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 6
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
  • OE:
    • OE.VERIFICATION: 25
    • OE.CAP_FILE: 4
    • OE.CODE-EVIDENCE: 11
    • OE.SID: 8
    • OE.NATIVE: 7
    • OE.OPERATE: 13
    • OE.REALLOCATION: 5
    • OE.LOAD: 5
    • OE.INSTALL: 4
    • OE.ALARM: 11
    • OE.CARD-MANAGEMENT: 2
    • OE.SCP: 16
    • OE.CARD_MANAGEMENT: 10
  • OSP:
    • OSP.VERIFICATION: 3
pdf_data/st_keywords/cc_claims/A
  • A.DE-: 2
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.WATCH_USER: 3
  • A.DEVICE_AUTH: 1
  • A.VERIFICATION: 3
  • A.CAP_FILE: 3
pdf_data/st_keywords/cc_claims/D
  • D.OS: 17
  • D.SEP_SE: 3
  • D.APP_CODE: 5
  • D.APP_C_DATA: 2
  • D.APP_I_DATA: 3
  • D.PIN: 4
  • D.API_DATA: 3
  • D.CRYPTO: 3
  • D.JCS_CODE: 3
  • D.JCS_DATA: 4
  • D.SEC_DATA: 5
pdf_data/st_keywords/cc_claims/OE
  • OE.CDCVM: 3
  • OE.VERIFICATION: 25
  • OE.CAP_FILE: 4
  • OE.CODE-EVIDENCE: 11
  • OE.SID: 8
  • OE.NATIVE: 7
  • OE.OPERATE: 13
  • OE.REALLOCATION: 5
  • OE.LOAD: 5
  • OE.INSTALL: 4
  • OE.ALARM: 11
  • OE.CARD-MANAGEMENT: 2
  • OE.SCP: 16
  • OE.CARD_MANAGEMENT: 10
pdf_data/st_keywords/cc_claims/T
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIMMING: 2
  • T.USURP: 2
  • T.CONFID-APPLI-DATA: 3
  • T.CONFID-JCS-CODE: 3
  • T.CONFID-JCS-DATA: 3
  • T.INTEG-APPLI-CODE: 6
  • T.INTEG-APPLI-DATA: 6
  • T.INTEG-JCS-CODE: 3
  • T.INTEG-JCS-DATA: 3
  • T.SID: 6
  • T.EXE-CODE: 6
  • T.NATIVE: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0099-V2-2020: 1
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_ARC.1: 6
  • ADV_FSP.6: 5
  • ADV_IMP.2: 5
  • ADV_INT.3: 2
  • ADV_SPM.1: 8
  • ADV_TDS.6: 7
  • ADV_FSP.4: 4
  • ADV_ARC: 1
  • ADV_TDS.1: 2
  • ADV_IMP.1: 4
  • ADV_TDS.3: 3
  • ADV_FSP.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.4: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 3 6
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.1 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 4 1
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.1 4 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 4
  • AGD_PRE.1: 4
  • AGD_OPE: 1
  • AGD_PRE: 1
  • AGD_OPE.1: 6
  • AGD_PRE.1: 6
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 4 6
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 4 6
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.2: 1
  • ALC_CMC.5: 4
  • ALC_CMS.5: 1
  • ALC_DEL.1: 2
  • ALC_DVS.2: 4
  • ALC_LCD.2: 3
  • ALC_TAT.3: 3
  • ALC_TAT.1: 2
  • ALC_TAT: 1
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL.1: 2
  • ASE_ECD.1: 3
  • ASE_INT.1: 2
  • ASE_OBJ.2: 2
  • ASE_REQ.2: 2
  • ASE_SPD.1: 1
  • ASE_TSS.1: 2
  • ASE_REQ.1: 2
  • ASE_TSS.2: 1
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 3 1
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 2 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 4
  • ATE_FUN.1: 3
  • ATE_IND.2: 1
  • ATE_COV.3: 3
  • ATE_DPT.4: 2
  • ATE_FUN.2: 4
  • ATE_IND.3: 2
  • ATE_FUN.1: 3
  • ATE_COV.1: 2
  • ATE_DPT.1: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 4 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 2
  • AVA_VAN.5: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 2: 1
  • EAL2: 1
  • EAL 2 augmented: 1
  • EAL7: 36
  • EAL6: 1
  • EAL 6+: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ACC: 25
    • FDP_ACC.2: 4
    • FDP_ACF: 23
    • FDP_ACF.1: 12
    • FDP_ITT.1: 4
    • FDP_ITT.1.1: 1
    • FDP_ETC: 8
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_RIP.1: 15
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 10
    • FDP_SDI.1.1: 1
    • FDP_ACC.1: 11
    • FDP_IFC.1: 9
    • FDP_ETC.2: 2
  • FIA:
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_AFL.1: 3
    • FIA_AFL: 7
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_UAU.6.1: 2
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 2
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
  • FPR:
    • FPR_UNO.1: 14
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 10
    • FPT_RPL.1: 4
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
  • FAU:
    • FAU_ARP.1: 1
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_RNG.1: 2
    • FCS_RNG: 1
  • FDP:
    • FDP_ACC: 21
    • FDP_ACF: 17
    • FDP_IFC: 16
    • FDP_IFF: 11
    • FDP_ROL: 2
    • FDP_RIP: 9
    • FDP_SDI: 3
    • FDP_ITC: 2
    • FDP_UIT: 2
    • FDP_ACC.2: 2
    • FDP_ACF.1: 9
    • FDP_IFC.1: 6
    • FDP_IFF.1: 8
    • FDP_ACC.1: 7
    • FDP_SDC.1: 1
    • FDP_SDI.2: 1
    • FDP_ITT.1: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_ATD: 2
    • FIA_UID: 5
    • FIA_USB: 1
    • FIA_UAU: 2
    • FIA_UID.1: 1
    • FIA_API.1: 1
  • FMT:
    • FMT_MSA: 61
    • FMT_SMF: 18
    • FMT_SMR: 19
    • FMT_MTD: 9
    • FMT_SMR.1: 9
    • FMT_SMF.1: 6
    • FMT_MSA.1: 6
    • FMT_MSA.2: 2
    • FMT_MSA.3: 9
    • FMT_MTD.1: 1
    • FMT_LIM.1: 1
    • FMT_LIM: 10
    • FMT_LIM.2: 1
  • FPR:
    • FPR_UNO.1: 1
    • FPR_UNO: 1
  • FPT:
    • FPT_FLS: 10
    • FPT_TDC.1: 1
    • FPT_RCV: 2
    • FPT_TST: 1
    • FPT_PHP: 3
    • FPT_ITT: 2
    • FPT_FLS.1: 1
    • FPT_PHP.3: 1
    • FPT_ITT.1: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 3
    • FTP_TRP: 1
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 15
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 10
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
  • FDP_ACC: 21
  • FDP_ACF: 17
  • FDP_IFC: 16
  • FDP_IFF: 11
  • FDP_ROL: 2
  • FDP_RIP: 9
  • FDP_SDI: 3
  • FDP_ITC: 2
  • FDP_UIT: 2
  • FDP_ACC.2: 2
  • FDP_ACF.1: 9
  • FDP_IFC.1: 6
  • FDP_IFF.1: 8
  • FDP_ACC.1: 7
  • FDP_SDC.1: 1
  • FDP_SDI.2: 1
  • FDP_ITT.1: 1
  • FDP_UCT.1: 1
  • FDP_UIT.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 25 21
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 11 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.2 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 23 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 12 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 9 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 5 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 10 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 2 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 11
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 3
  • FIA_AFL: 7
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_SOS.2: 4
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
  • FIA_ATD: 2
  • FIA_UID: 5
  • FIA_USB: 1
  • FIA_UAU: 2
  • FIA_UID.1: 1
  • FIA_API.1: 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR.1: 10
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 6
  • FMT_SMF.1.1: 1
  • FMT_MSA.1: 6
  • FMT_MSA.3: 11
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 2
  • FMT_MTD.1: 4
  • FMT_MTD.1.1: 1
  • FMT_MTD.3: 4
  • FMT_MTD.3.1: 1
  • FMT_MSA: 61
  • FMT_SMF: 18
  • FMT_SMR: 19
  • FMT_MTD: 9
  • FMT_SMR.1: 9
  • FMT_SMF.1: 6
  • FMT_MSA.1: 6
  • FMT_MSA.2: 2
  • FMT_MSA.3: 9
  • FMT_MTD.1: 1
  • FMT_LIM.1: 1
  • FMT_LIM: 10
  • FMT_LIM.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 10 9
pdf_data/st_keywords/cc_sfr/FPR
  • FPR_UNO.1: 14
  • FPR_UNO.1.1: 1
  • FPR_UNO.1: 1
  • FPR_UNO: 1
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 14 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_ITC.1: 4
  • FPT_ITC.1.1: 1
  • FPT_RPL: 10
  • FPT_RPL.1: 4
  • FPT_FLS: 10
  • FPT_TDC.1: 1
  • FPT_RCV: 2
  • FPT_TST: 1
  • FPT_PHP: 3
  • FPT_ITT: 2
  • FPT_FLS.1: 1
  • FPT_PHP.3: 1
  • FPT_ITT.1: 1
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 14
  • FTP_ITC.1: 7
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 4
  • FTP_ITC: 3
  • FTP_TRP: 1
  • FTP_ITC.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 14 3
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 7 1
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
  • out of scope: 8
  • • The DELETE and INSTALL APDU commands are out of scope of this SPM: 1
  • 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes The SFR FMT_MTD.3/JCRE is out of scope of the SPM: 1
  • because AID registry is created during loading phase, which is also out of scope of the SPM (Hypothesis 2 of the SPM document [MAV51_SPM]). MultiApp V5.1: Security Target Java: 1
  • the active context is not the same as the Selected Applet Context. Application note: This rule is out of scope of the SPM modelisation because CLEAR_ON_DESELECT objects can be created exclusively in the API: 1
  • is also out of scope (Hypothesis 4 of the SPM document [MAV51_SPM]).. 3) S.CAP_FILE performing OP.ARRAY_AASTORE of the: 1
  • as a null reference. Such a mechanism is implementation-dependent. The deletion of applets is out of scope of this SPM scope. In the case of an array type, fields are components of the array ([JVM], §2.14: 1
  • management functions: • Modify the Currently Active Context Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start The initial setting of: 1
  • and deletion; see #.DELETION and #.INSTALL). • The DELETE and INSTALL APDU commands are out of scope of this SPM. The list of registred applets’ AIDs is proven to be not modified during the execution: 1
pdf_data/st_keywords/certification_process/OutOfScope/out of scope 2 8
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
  • PACE:
    • PACE: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA3:
      • SHA3: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.iasclassic: 1
    • javacard.mspnp: 1
    • javacard.eid: 1
    • javacard.fido.ctap: 1
  • javacardx:
    • javacardx.gdp: 1
  • com:
    • com.gemalto.javacardx.gdp: 1
    • com.gemalto.javacard.iasclassic: 1
    • com.gemalto.moc.client: 1
    • com.gemalto.moc.server: 1
    • com.gemalto.javacard.mspnp: 1
    • com.gemalto.puredi: 1
    • com.gemalto.tacho: 1
    • com.gemalto.belpic: 1
    • com.gemalto.javacard.eid: 1
    • com.gemalto.mpcos: 1
    • com.gemalto.javacard.fido.ctap: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-3: 1
    • FIPS 140-2: 1
  • BSI:
    • BSI-AIS31: 1
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/tee_name/IBM/SE 6 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 1
  • Thales:
    • Thales: 32
pdf_data/st_metadata
  • pdf_file_size_bytes: 2520806
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
  • /CreationDate: D:20231109105238Z
  • /Creator: Word
  • /ModDate: D:20231109105301Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1232740
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 60
  • /Title: MultiApp V5.1: JCVM Security Target
  • /Author: OHAYON Franck
  • /Creator: Microsoft® Word for Microsoft 365
  • /CreationDate: D:20230606163814+02'00'
  • /ModDate: D:20230606163814+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20231109105238Z D:20230606163814+02'00'
pdf_data/st_metadata//Creator Word Microsoft® Word for Microsoft 365
pdf_data/st_metadata//ModDate D:20231109105301Z D:20230606163814+02'00'
pdf_data/st_metadata//Producer Adobe Mac PDF Plug-in Microsoft® Word for Microsoft 365
pdf_data/st_metadata//Title Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx MultiApp V5.1: JCVM Security Target
pdf_data/st_metadata/pdf_file_size_bytes 2520806 1232740
pdf_data/st_metadata/pdf_number_of_pages 56 60
dgst 204cb8d5dbf8e997 357e465d8baf8302