Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)
ANSSI-CC-2023/59
Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1
ANSSI-CC-2022/44
name Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1
category ICs, Smart Cards and Smart Card-Related Devices and Systems Mobility
not_valid_before 2023-12-28 2022-09-28
not_valid_after 2028-12-28 2027-09-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_44en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_44.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_44en.pdf
state/cert/pdf_hash ca798a8678c606e1a601ebb9e1da8ca09cbef656c1bfbb3f868d5046c0cec8e2 716753fe1fe962c4c86de512f989268ddc94cfa82d8635da20c26d1705858d2c
state/cert/txt_hash 3feff5c9858eae44a5dfd96fce55ab212e3848e962cd31c4aee4a3ff690d63cd 3952ed730fb7b70f0c13977a1c6537692e66679a72d1bde06873bc2293281f1b
state/report/pdf_hash c69a76645d475619fb0cbcc158f980c919fac7230089331e95b51efdc7425d55 0600c12fdefbd2602661018938b19729fc633d31b710d12c9bf0528a9a57e3f2
state/report/txt_hash 18b914ee117db29eaca1475c6db21b5d4193cfd24f13bd710a53bede88726220 a1150c3e02dd92edb6baf35bbeb54222d51f13ac490ff9a51ec986355ca581c4
state/st/pdf_hash e5fdd311e271e1438728e8016f96e69565dedfd6000ba5e316945c5693eab587 716753fe1fe962c4c86de512f989268ddc94cfa82d8635da20c26d1705858d2c
state/st/txt_hash 97bc32b32d57ede87b39fdc22d66d61f13b1bdbb893d26d97fd5600c44810c93 3952ed730fb7b70f0c13977a1c6537692e66679a72d1bde06873bc2293281f1b
heuristics/cert_id ANSSI-CC-2023/59 ANSSI-CC-2022/44
heuristics/cpe_matches cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:11.3:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:11.3.1:*:*:*:*:*:*:*
heuristics/extracted_versions 16.4.1 11.3.1
heuristics/scheme_data
  • product: Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252)
  • url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios
  • description: Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC..
  • sponsor: APPLE INC.
  • developer: APPLE INC.
  • cert_id: ANSSI-CC-2023/59
  • level: EAL2+
  • expiration_date: 28 Décembre 2028
  • enhanced:
    • cert_id: ANSSI-CC-2023/59
    • certification_date: 28/12/2023
    • expiration_date: 28/12/2028
    • category: Divers
    • cc_version: Critères Communs version 3.1r5
    • developer: APPLE INC.
    • sponsor: APPLE INC.
    • evaluation_facility: THALES / CNES
    • level: EAL2+
    • protection_profile:
    • mutual_recognition: CCRA SOG-IS
    • augmented: ADV_FSP.3
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_59en.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_59en.pdf
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf
None
pdf_data/cert_filename certificat-CC-2023_59en.pdf anssi-cible-cc-2022_44en.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/59: 2
pdf_data/cert_keywords/cc_claims
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.COR-: 1
    • T.PHYSI-: 1
    • T.RE-: 1
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.USURP: 2
    • T.SKIMMING: 1
    • T.RECOVER: 1
    • T.CORRUPT: 1
    • T.PHYSICAL: 1
  • A:
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
    • A.WATCH_USER: 3
    • A.NO_EXTERNAL_KEY-: 2
    • A.NO_EVIL_ROOT_USER: 2
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ADV:
    • ADV_FSP.3: 3
    • ADV_ARC.1: 3
    • ADV_TDS.1: 4
    • ADV_FSP.2: 4
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_FLR: 1
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.3: 3
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 2
    • ASE_REQ.1: 2
pdf_data/cert_keywords/cc_sar/ADV
  • ADV_FSP.3: 1
  • ADV_FSP.3: 3
  • ADV_ARC.1: 3
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
pdf_data/cert_keywords/cc_sar/ADV/ADV_FSP.3 1 3
pdf_data/cert_keywords/cc_security_level/EAL
  • EAL2: 2
  • EAL 2: 1
  • EAL2: 1
  • EAL 2 augmented: 1
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 2 1
pdf_data/cert_keywords/cc_sfr
  • FDP:
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ACC: 25
    • FDP_ACC.2: 4
    • FDP_ACF: 23
    • FDP_ACF.1: 12
    • FDP_ITT.1: 4
    • FDP_ITT.1.1: 1
    • FDP_ETC: 8
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC: 4
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_RIP.1: 13
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_ACC.1: 11
    • FDP_IFC.1: 9
    • FDP_ETC.2: 2
  • FIA:
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_AFL.1: 3
    • FIA_AFL: 7
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_UAU.6.1: 2
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 2
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
  • FPR:
    • FPR_UNO.1: 16
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/cert_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • preferences for the device, operating system and applications. The Secure Element of the device is out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RE- COVER Card Re- covery: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/cert_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 2
pdf_data/cert_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 2
pdf_data/cert_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/cert_keywords/tee_name
  • IBM:
    • SE: 9
pdf_data/cert_metadata
  • pdf_file_size_bytes: 138174
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20240222154612+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155210+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1844932
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
  • /Title: [ST] MacBook_M1_macOS11_SecurityTarget_v1.6
  • /Producer: macOS Version 12.3.1 (Build 21E258) Quartz PDFContext
  • /Author: ThanhHaLe
  • /Creator: Word
  • /CreationDate: D:20220608091744Z00'00'
  • /ModDate: D:20220608091744Z00'00'
  • pdf_hyperlinks:
pdf_data/cert_metadata//CreationDate D:20240222154612+01'00' D:20220608091744Z00'00'
pdf_data/cert_metadata//Creator Acrobat PDFMaker 23 pour Word Word
pdf_data/cert_metadata//ModDate D:20240222155210+01'00' D:20220608091744Z00'00'
pdf_data/cert_metadata//Producer Adobe PDF Library 23.1.175 macOS Version 12.3.1 (Build 21E258) Quartz PDFContext
pdf_data/cert_metadata/pdf_file_size_bytes 138174 1844932
pdf_data/cert_metadata/pdf_number_of_pages 2 49
pdf_data/report_filename ANSSI-CC-2023_59en.pdf anssi-cc-2022_44.pdf
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/59: 2
  • ANSSI-CC-2022/44: 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_FLR.3: 1
  • ALC_FLR: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL4: 1
  • EAL2 augmented: 1
  • EAL 2: 1
  • EAL2: 3
  • EAL4: 1
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E3 Basic: 1
  • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 427149
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /CreationDate: D:20240222154515+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155210+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
  • pdf_file_size_bytes: 507900
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /Author: [email protected]
  • /Category: Version 20E241
  • /Comments: ANSSI-CC-CER-F-07_v31.3
  • /Company: APPLE INC.
  • /CreationDate: D:20221010165312+02'00'
  • /Creator: Acrobat PDFMaker 21 pour Word
  • /Keywords: [ANSSI Crypto]
  • /ModDate: D:20221010165314+02'00'
  • /Producer: Adobe PDF Library 21.11.71
  • /SourceModified: D:20221010145254
  • /Subject: Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1
  • /Title: ANSSI-CC-2022/44
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
pdf_data/report_metadata//CreationDate D:20240222154515+01'00' D:20221010165312+02'00'
pdf_data/report_metadata//Creator Acrobat PDFMaker 23 pour Word Acrobat PDFMaker 21 pour Word
pdf_data/report_metadata//Keywords [ANSSI Crypto]
pdf_data/report_metadata//ModDate D:20240222155210+01'00' D:20221010165314+02'00'
pdf_data/report_metadata//Producer Adobe PDF Library 23.1.175 Adobe PDF Library 21.11.71
pdf_data/report_metadata/pdf_file_size_bytes 427149 507900
pdf_data/st_filename ANSSI-cible-CC-2023_59en.pdf anssi-cible-cc-2022_44en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
  • A:
    • A.DE-: 2
    • A.PERSO: 3
    • A.CDCVM: 3
    • A.WATCH_USER: 3
    • A.DEVICE_AUTH: 1
  • OE:
    • OE.CDCVM: 3
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.COR-: 1
    • T.PHYSI-: 1
    • T.RE-: 1
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.USURP: 2
    • T.SKIMMING: 1
    • T.RECOVER: 1
    • T.CORRUPT: 1
    • T.PHYSICAL: 1
  • A:
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
    • A.WATCH_USER: 3
    • A.NO_EXTERNAL_KEY-: 2
    • A.NO_EVIL_ROOT_USER: 2
pdf_data/st_keywords/cc_claims/A
  • A.DE-: 2
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.WATCH_USER: 3
  • A.DEVICE_AUTH: 1
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.WATCH_USER: 3
  • A.NO_EXTERNAL_KEY-: 2
  • A.NO_EVIL_ROOT_USER: 2
pdf_data/st_keywords/cc_claims/A/A.DEVICE_AUTH 1 3
pdf_data/st_keywords/cc_claims/T
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIMMING: 2
  • T.USURP: 2
  • T.COR-: 1
  • T.PHYSI-: 1
  • T.RE-: 1
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
  • T.RECOVER: 1
  • T.CORRUPT: 1
  • T.PHYSICAL: 1
pdf_data/st_keywords/cc_claims/T/T.CORRUPT 2 1
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL 2 1
pdf_data/st_keywords/cc_claims/T/T.RECOVER 2 1
pdf_data/st_keywords/cc_claims/T/T.SKIMMING 2 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_FSP.3: 3
  • ADV_ARC.1: 3
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.3 2 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR: 1
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.3: 3
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 5 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 15 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 10 9
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 14 16
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL 10 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 4 6
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
  • out of scope: 2
  • preferences for the device, operating system and applications. The Secure Element of the device is out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RE- COVER Card Re- covery: 1
pdf_data/st_keywords/crypto_scheme/MAC/MAC 1 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 140-3: 1
  • FIPS 140-2: 1
  • FIPS 140-2: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS 140-2 1 2
pdf_data/st_keywords/tee_name/IBM/SE 6 9
pdf_data/st_metadata
  • pdf_file_size_bytes: 2520806
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
  • /CreationDate: D:20231109105238Z
  • /Creator: Word
  • /ModDate: D:20231109105301Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1844932
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
  • /Title: [ST] MacBook_M1_macOS11_SecurityTarget_v1.6
  • /Producer: macOS Version 12.3.1 (Build 21E258) Quartz PDFContext
  • /Author: ThanhHaLe
  • /Creator: Word
  • /CreationDate: D:20220608091744Z00'00'
  • /ModDate: D:20220608091744Z00'00'
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20231109105238Z D:20220608091744Z00'00'
pdf_data/st_metadata//ModDate D:20231109105301Z D:20220608091744Z00'00'
pdf_data/st_metadata//Producer Adobe Mac PDF Plug-in macOS Version 12.3.1 (Build 21E258) Quartz PDFContext
pdf_data/st_metadata//Title Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx [ST] MacBook_M1_macOS11_SecurityTarget_v1.6
pdf_data/st_metadata/pdf_file_size_bytes 2520806 1844932
pdf_data/st_metadata/pdf_number_of_pages 56 49
dgst 204cb8d5dbf8e997 b251d68216f0fcb3