Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)
ANSSI-CC-2023/59
Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
2023-9-INF-4307
name Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
category ICs, Smart Cards and Smart Card-Related Devices and Systems Mobility
not_valid_before 2023-12-28 2024-05-15
not_valid_after 2028-12-28 2029-05-15
scheme FR ES
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09-ST.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09-INF-4307.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09_Certificado.pdf
state/cert/pdf_hash ca798a8678c606e1a601ebb9e1da8ca09cbef656c1bfbb3f868d5046c0cec8e2 9f857eb27d27b882fa66587147ce2e161c10e870ee6589819afb3a744ac5e5cf
state/cert/txt_hash 3feff5c9858eae44a5dfd96fce55ab212e3848e962cd31c4aee4a3ff690d63cd 65e87155c07d89368a1cf4bbca887fd0d7b6cb87efb577e08743b7f0a29acdb6
state/report/pdf_hash c69a76645d475619fb0cbcc158f980c919fac7230089331e95b51efdc7425d55 90e1b36e2afd181b267758da46f8d2e04c957b252e870674d60cc86a8e1f7377
state/report/txt_hash 18b914ee117db29eaca1475c6db21b5d4193cfd24f13bd710a53bede88726220 42cc1b3e320b28e3f1810d4fa8ec2df043288a77ea7a4130c33a8d03422c22a2
state/st/pdf_hash e5fdd311e271e1438728e8016f96e69565dedfd6000ba5e316945c5693eab587 5a14372c75c98be66dd3c9708f8a1cd04edb12aa2a1c66aff7f5ca35d75d056f
state/st/txt_hash 97bc32b32d57ede87b39fdc22d66d61f13b1bdbb893d26d97fd5600c44810c93 e5cfbae567dbec53aaec682baa60117cc379290700dd3d17c4b0eb2903094089
heuristics/cert_id ANSSI-CC-2023/59 2023-9-INF-4307
heuristics/cpe_matches cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:13.3.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.3:*:*:*:*:*:*:*
heuristics/extracted_versions 16.4.1 13.3.1
heuristics/scheme_data
  • product: Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252)
  • url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios
  • description: Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC..
  • sponsor: APPLE INC.
  • developer: APPLE INC.
  • cert_id: ANSSI-CC-2023/59
  • level: EAL2+
  • expiration_date: 28 Décembre 2028
  • enhanced:
    • cert_id: ANSSI-CC-2023/59
    • certification_date: 28/12/2023
    • expiration_date: 28/12/2028
    • category: Divers
    • cc_version: Critères Communs version 3.1r5
    • developer: APPLE INC.
    • sponsor: APPLE INC.
    • evaluation_facility: THALES / CNES
    • level: EAL2+
    • protection_profile:
    • mutual_recognition: CCRA SOG-IS
    • augmented: ADV_FSP.3
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_59en.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_59en.pdf
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf
  • product: Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1012-strong-customer-authentication-for-apple-pay-on-macbook-air-2022-with-m2-running-macos-ventura-13-3-1
  • category: Others
  • manufacturer: Apple Inc.
  • certification_date: 15/05/2024
heuristics/scheme_data/product Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252) Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
pdf_data/cert_filename certificat-CC-2023_59en.pdf 2023-09_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/59: 2
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 2 1
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 2
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_metadata
  • pdf_file_size_bytes: 138174
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20240222154612+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155210+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 892676
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Trapped:
  • /Creator:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks:
pdf_data/cert_metadata//CreationDate D:20240222154612+01'00'
pdf_data/cert_metadata//Creator Acrobat PDFMaker 23 pour Word
pdf_data/cert_metadata//ModDate D:20240222155210+01'00'
pdf_data/cert_metadata//Producer Adobe PDF Library 23.1.175
pdf_data/cert_metadata/pdf_file_size_bytes 138174 892676
pdf_data/report_filename ANSSI-CC-2023_59en.pdf 2023-09-INF-4307.pdf
pdf_data/report_frontpage
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/59: 2
  • ES:
    • 2023-9-INF-4307- v1: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
  • ADV:
    • ADV_FSP.3: 8
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_FLR.3: 8
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_FSP.3: 1
  • ADV_FSP.3: 8
  • ADV_ARC.1: 1
  • ADV_TDS.1: 1
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.3 1 8
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_FLR.3: 8
  • ALC_CMC.2: 1
  • ALC_DEL.1: 1
  • ALC_FLR: 2
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL4: 1
  • EAL2 augmented: 1
  • EAL2: 8
  • EAL 1: 1
  • EAL 4: 2
  • EAL 2: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL2 3 8
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E3 Basic: 1
  • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_DAU.1: 1
    • FDP_ACC: 3
    • FDP_ACF: 3
    • FDP_ITT.1: 1
    • FDP_ETC: 1
    • FDP_ITC.1: 1
    • FDP_UCT: 2
    • FDP_UIT: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_UID.2: 1
    • FIA_UAU.2: 1
    • FIA_AFL: 3
    • FIA_UAU.6: 1
    • FIA_ATD.1: 1
  • FMT:
    • FMT_SMR.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_ITC.1: 1
    • FPT_RPL: 2
  • FTP:
    • FTP_ITC: 2
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
  • Applus:
    • Applus Laboratories: 4
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 427149
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /CreationDate: D:20240222154515+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155210+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
  • pdf_file_size_bytes: 547654
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Creator:
  • /Trapped:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata//CreationDate D:20240222154515+01'00'
pdf_data/report_metadata//Creator Acrobat PDFMaker 23 pour Word
pdf_data/report_metadata//ModDate D:20240222155210+01'00'
pdf_data/report_metadata//Producer Adobe PDF Library 23.1.175
pdf_data/report_metadata/pdf_file_size_bytes 427149 547654
pdf_data/report_metadata/pdf_number_of_pages 13 17
pdf_data/st_filename ANSSI-cible-CC-2023_59en.pdf 2023-09-ST.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
  • A:
    • A.DE-: 2
    • A.PERSO: 3
    • A.CDCVM: 3
    • A.WATCH_USER: 3
    • A.DEVICE_AUTH: 1
  • OE:
    • OE.CDCVM: 3
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.USURP: 2
    • T.SKIMMING: 1
  • A:
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
    • A.WATCH_USER: 3
    • A.NO_EXTERNAL_KEY-: 2
    • A.NO_EVIL_ROOT_USER: 2
pdf_data/st_keywords/cc_claims/A
  • A.DE-: 2
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.WATCH_USER: 3
  • A.DEVICE_AUTH: 1
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.WATCH_USER: 3
  • A.NO_EXTERNAL_KEY-: 2
  • A.NO_EVIL_ROOT_USER: 2
pdf_data/st_keywords/cc_claims/A/A.DEVICE_AUTH 1 3
pdf_data/st_keywords/cc_claims/T
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIMMING: 2
  • T.USURP: 2
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
pdf_data/st_keywords/cc_claims/T/T.SKIMMING 2 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_FSP.3: 3
  • ADV_ARC.1: 3
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.3 2 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR: 1
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.3: 3
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 15
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 10
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 4
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 13
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 9
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 10
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 11 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 15 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 10 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 14
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 14 16
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL 10 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 4 6
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Recov- ery An: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tee_name/IBM/SE 6 4
pdf_data/st_metadata
  • pdf_file_size_bytes: 2520806
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
  • /CreationDate: D:20231109105238Z
  • /Creator: Word
  • /ModDate: D:20231109105301Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1325478
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Creator:
  • /Trapped:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks: https://support.apple.com/HT201222, https://support.apple.com/guide/security/welcome/web, https://checkcoverage.apple.com/, https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0, https://support.apple.com/apple-pay, https://www.apple.com/, https://support.apple.com/HT212225, https://support.apple.com/guide/mac-help/mh35902/mac, https://support.apple.com/HT201541, https://support.apple.com/en-gb/HT212030, https://support.apple.com/guide/macbook-air/set-up-your-mac-apd831707cb3/mac, https://support.apple.com/HT212190, https://support.apple.com/en-us/guide/macbook-air/apd3a3bbed27/2023/mac/13.4, https://support.apple.com/HT202860, https://lists.apple.com/mailman/listinfo/security-announce/, https://support.apple.com/HT201862, https://support.apple.com/HT204899, https://support.apple.com/en-us/HT204587, https://support.apple.com/en-us/HT201581, https://support.apple.com/HT201221, https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac, https://developer.apple.com/documentation/security/, https://support.apple.com/HT201220, https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web, https://support.apple.com/HT212749, https://support.apple.com/HT201260
pdf_data/st_metadata//CreationDate D:20231109105238Z
pdf_data/st_metadata//Creator Word
pdf_data/st_metadata//ModDate D:20231109105301Z
pdf_data/st_metadata//Producer Adobe Mac PDF Plug-in
pdf_data/st_metadata//Title Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx
pdf_data/st_metadata/pdf_file_size_bytes 2520806 1325478
pdf_data/st_metadata/pdf_hyperlinks https://support.apple.com/HT201222, https://support.apple.com/guide/security/welcome/web, https://checkcoverage.apple.com/, https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0, https://support.apple.com/apple-pay, https://www.apple.com/, https://support.apple.com/HT212225, https://support.apple.com/guide/mac-help/mh35902/mac, https://support.apple.com/HT201541, https://support.apple.com/en-gb/HT212030, https://support.apple.com/guide/macbook-air/set-up-your-mac-apd831707cb3/mac, https://support.apple.com/HT212190, https://support.apple.com/en-us/guide/macbook-air/apd3a3bbed27/2023/mac/13.4, https://support.apple.com/HT202860, https://lists.apple.com/mailman/listinfo/security-announce/, https://support.apple.com/HT201862, https://support.apple.com/HT204899, https://support.apple.com/en-us/HT204587, https://support.apple.com/en-us/HT201581, https://support.apple.com/HT201221, https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac, https://developer.apple.com/documentation/security/, https://support.apple.com/HT201220, https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web, https://support.apple.com/HT212749, https://support.apple.com/HT201260
pdf_data/st_metadata/pdf_number_of_pages 56 51
dgst 204cb8d5dbf8e997 cfc7b542029e1c6d