Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)
ANSSI-CC-2023/59
Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)
ANSSI-CC-2023/60
name Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)
not_valid_before 2023-12-28 2024-01-19
not_valid_after 2028-12-28 2029-01-19
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_60en.pdf
state/cert/pdf_hash ca798a8678c606e1a601ebb9e1da8ca09cbef656c1bfbb3f868d5046c0cec8e2 5484f9225194fb80f4936f7fc05e17a6b4193024fabd540321f557163e7ea14e
state/cert/txt_hash 3feff5c9858eae44a5dfd96fce55ab212e3848e962cd31c4aee4a3ff690d63cd 1e00b0721b5e01d10f2e0ba7052fc0b0478f1196180bcee7b9bc21c27965fd4f
state/report/pdf_hash c69a76645d475619fb0cbcc158f980c919fac7230089331e95b51efdc7425d55 c7fe41baa75b869067263842cc44bb4f43ffa4d0b42bc8c332d44a58d24f7808
state/report/txt_hash 18b914ee117db29eaca1475c6db21b5d4193cfd24f13bd710a53bede88726220 73c0b750b752064dc9c6b7257313bf1ea6b2f89bee4040eb27ec6ab8dd2ed61f
state/st/pdf_hash e5fdd311e271e1438728e8016f96e69565dedfd6000ba5e316945c5693eab587 e723453c42e1b2a7775e09dbac95077a96bfde5f91be9ffac6144e43102c1d99
state/st/txt_hash 97bc32b32d57ede87b39fdc22d66d61f13b1bdbb893d26d97fd5600c44810c93 577b9a17afa8f6ef94207e56754ef3e0d82be3ac29742c9ab7d913ad6464bb55
heuristics/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/60
heuristics/cpe_matches cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:*
heuristics/extracted_versions 16.4.1 9.4
heuristics/scheme_data/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/60
heuristics/scheme_data/description Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC.. Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC.. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie
heuristics/scheme_data/developer APPLE INC. APPLE INC
heuristics/scheme_data/enhanced/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/60
heuristics/scheme_data/enhanced/cert_link https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf
heuristics/scheme_data/enhanced/certification_date 28/12/2023 19/01/2024
heuristics/scheme_data/enhanced/developer APPLE INC. APPLE INC
heuristics/scheme_data/enhanced/expiration_date 28/12/2028 19/01/2029
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf
heuristics/scheme_data/enhanced/sponsor APPLE INC. APPLE INC
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_59en.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf
heuristics/scheme_data/expiration_date 28 Décembre 2028 19 Janvier 2029
heuristics/scheme_data/product Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252) Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)
heuristics/scheme_data/sponsor APPLE INC. APPLE INC
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94
pdf_data/cert_filename certificat-CC-2023_59en.pdf certificat-CC-2023_60en.pdf
pdf_data/cert_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/59: 2
  • ANSSI-CC-2023/60: 2
pdf_data/cert_metadata//CreationDate D:20240222154612+01'00' D:20240222154647+01'00'
pdf_data/cert_metadata//ModDate D:20240222155210+01'00' D:20240222155209+01'00'
pdf_data/cert_metadata/pdf_file_size_bytes 138174 138059
pdf_data/report_filename ANSSI-CC-2023_59en.pdf ANSSI-CC-2023_60en.pdf
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/59: 2
  • ANSSI-CC-2023/60: 2
pdf_data/report_metadata//CreationDate D:20240222154515+01'00' D:20240222154716+01'00'
pdf_data/report_metadata//ModDate D:20240222155210+01'00' D:20240222155205+01'00'
pdf_data/report_metadata/pdf_file_size_bytes 427149 403804
pdf_data/st_filename ANSSI-cible-CC-2023_59en.pdf ANSSI-cible-CC-2023_60en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/cc_claims/A
  • A.DE-: 2
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.WATCH_USER: 3
  • A.DEVICE_AUTH: 1
  • A.DE-: 2
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.IPH-: 2
  • A.DEVICE_AUTH: 1
  • A.IPHONE_USER: 1
pdf_data/st_keywords/cc_claims/D/D.OS 17 16
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 2: 1
  • EAL2: 1
  • EAL 2 augmented: 1
  • EAL 2: 1
  • EAL2: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 15
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 10
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 22
  • FDP_ACC.2: 4
  • FDP_ACF: 20
  • FDP_ACF.1: 12
  • FDP_ETC: 7
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 12
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 9
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 8
  • FDP_ETC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 25 22
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 23 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_ETC 8 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 9 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 15 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 10 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 11
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 3
  • FIA_AFL: 7
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_SOS.2: 4
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 8
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL: 9
  • FIA_AFL.1: 5
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_SOS.2: 4
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 2
  • FIA_UID.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 7 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 3 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 11 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 7
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 14 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL 10 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 4 6
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tee_name/IBM/SE 6 4
pdf_data/st_metadata//CreationDate D:20231109105238Z D:20231109133713Z
pdf_data/st_metadata//ModDate D:20231109105301Z D:20231109133737Z
pdf_data/st_metadata//Title Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx
pdf_data/st_metadata/pdf_file_size_bytes 2520806 2365643
pdf_data/st_metadata/pdf_number_of_pages 56 54
dgst 204cb8d5dbf8e997 6207e27699db6695