This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) ANSSI-CC-2023/59 |
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) ANSSI-CC-2023/18 |
|
---|---|---|
name | Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) | Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) |
category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Mobility |
not_valid_before | 2023-12-28 | 2023-03-27 |
not_valid_after | 2028-12-28 | 2028-03-27 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_59en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_18en.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_59en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_18fr-2.pdf |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_59en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_18.pdf |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | ca798a8678c606e1a601ebb9e1da8ca09cbef656c1bfbb3f868d5046c0cec8e2 | 01c917da9205c5938540b6d32e0772a53387e3f1d7d8f3e4bab625cf478d6b03 |
state/cert/txt_hash | 3feff5c9858eae44a5dfd96fce55ab212e3848e962cd31c4aee4a3ff690d63cd | 29c09ca9ca8c0a2a28ea27c8e0642a68dbec26f37bacb1e4033d50059b3c2ac5 |
state/report/extract_ok | True | False |
state/report/pdf_hash | c69a76645d475619fb0cbcc158f980c919fac7230089331e95b51efdc7425d55 | 490d9c3dc871eb4a7e83e36813b9951dad1fb256079b1906ca2e9c07258de9e7 |
state/report/txt_hash | 18b914ee117db29eaca1475c6db21b5d4193cfd24f13bd710a53bede88726220 | 2064c67338126d58fa57ab4689536dd82223acc83a1981523d61686a4866497c |
state/st/extract_ok | True | False |
state/st/pdf_hash | e5fdd311e271e1438728e8016f96e69565dedfd6000ba5e316945c5693eab587 | 0d2cf124e1d430a4ddf4a2e4b5a0889766b36cd8ba9632ad7b3d2c7fa6e55699 |
state/st/txt_hash | 97bc32b32d57ede87b39fdc22d66d61f13b1bdbb893d26d97fd5600c44810c93 | 3cc366766c4e88db1d0f306f0f4872567d9d034d4b6e5505da1e636acda3369c |
heuristics/cert_id | ANSSI-CC-2023/59 | ANSSI-CC-2023/18 |
heuristics/cpe_matches | cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* | None |
heuristics/extracted_versions | 16.4.1 | 15.4.1 |
heuristics/related_cves | CVE-2023-40431, CVE-2023-32361, CVE-2023-40399, CVE-2024-27871, CVE-2023-41069, CVE-2024-27811, CVE-2024-27808, CVE-2023-34352, CVE-2024-27857, CVE-2023-35990, CVE-2024-27806, CVE-2024-23225, CVE-2024-40840, CVE-2024-40806, CVE-2024-40798, CVE-2023-35984, CVE-2023-40432, CVE-2023-32368, CVE-2024-44170, CVE-2023-42957, CVE-2023-42841, CVE-2023-42871, CVE-2023-40391, CVE-2023-40419, CVE-2023-32384, CVE-2024-44204, CVE-2023-38600, CVE-2023-41981, CVE-2023-42914, CVE-2023-32422, CVE-2023-40452, CVE-2023-38593, CVE-2023-32428, CVE-2024-27840, CVE-2023-42922, CVE-2024-27819, CVE-2023-38611, CVE-2023-40409, CVE-2024-44158, CVE-2024-44139, CVE-2023-41982, CVE-2023-32434, CVE-2024-27815, CVE-2023-41063, CVE-2024-27828, CVE-2024-40856, CVE-2024-27845, CVE-2023-41980, CVE-2024-23218, CVE-2024-40799, CVE-2024-44180, CVE-2023-42936, CVE-2023-40438, CVE-2023-32413, CVE-2023-40439, CVE-2024-44191, CVE-2023-32419, CVE-2023-32396, CVE-2024-27799, CVE-2024-23208, CVE-2023-41992, CVE-2024-40815, CVE-2024-44164, CVE-2024-23282, CVE-2023-32372, CVE-2024-23222, CVE-2023-32392, CVE-2024-40796, CVE-2023-42956, CVE-2023-42919, CVE-2023-32432, CVE-2023-38572, CVE-2024-44131, CVE-2023-40446, CVE-2023-40414, CVE-2023-28204, CVE-2023-38594, CVE-2023-38592, CVE-2024-44171, CVE-2024-27807, CVE-2023-38599, CVE-2023-40395, CVE-2023-32371, CVE-2023-28191, CVE-2024-40863, CVE-2023-40400, CVE-2023-42925, CVE-2023-42890, CVE-2023-40416, CVE-2024-40835, CVE-2024-23210, CVE-2023-32441, CVE-2023-40456, CVE-2023-41061, CVE-2023-32388, CVE-2023-42934, CVE-2023-40403, CVE-2023-42869, CVE-2024-40850, CVE-2023-40423, CVE-2023-37450, CVE-2024-44187, CVE-2024-27832, CVE-2023-32357, CVE-2024-27873, CVE-2023-38425, CVE-2024-27880, CVE-2023-42883, CVE-2024-40844, CVE-2024-27855, CVE-2023-40447, CVE-2023-38595, CVE-2023-32411, CVE-2023-32403, CVE-2023-42866, CVE-2023-41991, CVE-2023-32445, CVE-2024-40787, CVE-2024-23273, CVE-2023-32402, CVE-2024-27848, CVE-2024-44207, CVE-2024-44183, CVE-2023-38596, CVE-2023-32423, CVE-2024-27801, CVE-2023-42846, CVE-2024-23214, CVE-2023-32412, CVE-2024-40809, CVE-2023-32385, CVE-2023-41071, CVE-2023-40434, CVE-2023-41064, CVE-2023-40394, CVE-2023-41995, CVE-2024-40776, CVE-2023-40528, CVE-2023-41976, CVE-2023-42888, CVE-2023-32439, CVE-2023-38598, CVE-2023-32416, CVE-2022-3970, CVE-2023-41068, CVE-2023-40454, CVE-2024-44176, CVE-2023-32354, CVE-2023-32415, CVE-2023-40392, CVE-2023-42824, CVE-2023-42884, CVE-2023-45866, CVE-2023-41074, CVE-2023-32359, CVE-2023-42899, CVE-2023-42893, CVE-2023-38136, CVE-2023-40428, CVE-2023-40384, CVE-2024-23223, CVE-2024-23212, CVE-2023-38133, CVE-2023-38410, CVE-2024-23270, CVE-2024-27800, CVE-2024-40791, CVE-2024-27851, CVE-2024-27831, CVE-2023-40429, CVE-2024-40813, CVE-2023-42857, CVE-2024-27802, CVE-2023-34425, CVE-2023-41997, CVE-2023-42852, CVE-2023-32398, CVE-2023-41254, CVE-2023-32400, CVE-2024-40833, CVE-2023-40448, CVE-2024-23217, CVE-2023-32391, CVE-2024-40818, CVE-2023-42950, CVE-2024-40795, CVE-2024-23219, CVE-2024-44165, CVE-2023-32365, CVE-2024-23215, CVE-2024-40794, CVE-2023-42870, CVE-2024-27820, CVE-2023-32367, CVE-2023-42941, CVE-2023-38597, CVE-2023-41065, CVE-2023-32390, CVE-2023-41174, CVE-2024-44198, CVE-2024-23206, CVE-2024-40789, CVE-2024-40830, CVE-2023-38565, CVE-2024-27833, CVE-2023-40417, CVE-2023-32425, CVE-2024-40857, CVE-2023-32734, CVE-2023-38590, CVE-2023-42896, CVE-2024-27823, CVE-2024-40822, CVE-2024-40785, CVE-2023-40437, CVE-2023-38604, CVE-2024-40779, CVE-2024-40826, CVE-2023-42937, CVE-2024-27838, CVE-2023-38603, CVE-2023-41983, CVE-2023-40420, CVE-2023-42923, CVE-2024-40793, CVE-2023-28202, CVE-2024-40788, CVE-2023-41993, CVE-2023-32420, CVE-2024-27884, CVE-2023-41977, CVE-2024-27817, CVE-2023-41232, CVE-2024-40778, CVE-2023-27930, CVE-2023-41984, CVE-2023-32408, CVE-2023-40520, CVE-2023-38612, CVE-2023-41986, CVE-2024-44184, CVE-2023-32409, CVE-2024-40786, CVE-2023-32394, CVE-2024-27805, CVE-2023-32407, CVE-2023-40412, CVE-2023-40441, CVE-2024-40774, CVE-2023-41060, CVE-2023-38261, CVE-2023-32399, CVE-2023-42849, CVE-2023-39434, CVE-2023-42949, CVE-2024-27830, CVE-2023-40410, CVE-2023-32381, CVE-2024-27836, CVE-2023-42833, CVE-2023-32437, CVE-2023-40408, CVE-2023-32389, CVE-2023-32433, CVE-2023-41073, CVE-2023-42916, CVE-2023-38605, CVE-2024-23211, CVE-2023-32376, CVE-2023-38610, CVE-2023-42947, CVE-2023-42917, CVE-2024-23251, CVE-2023-40424, CVE-2024-40812, CVE-2023-40443, CVE-2023-40442, CVE-2023-41974, CVE-2023-41070, CVE-2024-23213, CVE-2023-36495, CVE-2023-40529, CVE-2023-42872, CVE-2024-27863, CVE-2023-32352, CVE-2023-35074, CVE-2023-40427, CVE-2023-42962, CVE-2024-44124, CVE-2023-38424, CVE-2023-40449, CVE-2023-32373, CVE-2023-38606, CVE-2024-27850, CVE-2023-40413, CVE-2024-40780, CVE-2023-38580, CVE-2023-35993, CVE-2024-23296, CVE-2023-32404, CVE-2023-40385, CVE-2023-41968 | None |
heuristics/scheme_data/cert_id | ANSSI-CC-2023/59 | ANSSI-CC-2023/18 |
heuristics/scheme_data/description | Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC.. | Le produit évalué est « Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1, Version 15.4.1 (build 19E258) » développé par APPLE INC. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour |
heuristics/scheme_data/enhanced |
|
|
heuristics/scheme_data/enhanced/augmented | ADV_FSP.3 | ADV_FSP.3 et ALC_FLR.3 |
heuristics/scheme_data/enhanced/cert_id | ANSSI-CC-2023/59 | ANSSI-CC-2023/18 |
heuristics/scheme_data/enhanced/cert_link | https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_18.pdf |
heuristics/scheme_data/enhanced/certification_date | 28/12/2023 | 27/03/2023 |
heuristics/scheme_data/enhanced/expiration_date | 28/12/2028 | 26/03/2028 |
heuristics/scheme_data/expiration_date | 28 Décembre 2028 | 26 Mars 2028 |
heuristics/scheme_data/product | Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252) | Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) |
heuristics/scheme_data/url | https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios | https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-iphone-13-avec-a15-bionic |
pdf_data/cert_filename | certificat-CC-2023_59en.pdf | certificat-cc-2023_18.pdf |
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_metadata |
|
None |
pdf_data/report_filename | ANSSI-CC-2023_59en.pdf | anssi-cc-2023_18fr-2.pdf |
pdf_data/report_keywords/cc_cert_id/FR |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto | |
|
pdf_data/report_keywords/tee_name | |
|
pdf_data/report_metadata |
|
None |
pdf_data/st_filename | ANSSI-cible-CC-2023_59en.pdf | anssi-cible-cc-2023_18en.pdf |
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_claims/A |
|
|
pdf_data/st_keywords/cc_claims/A/A.DEVICE_AUTH | 1 | 3 |
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.3 | 2 | 3 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC | 25 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF | 23 | 19 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT | 10 | 9 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 | 11 | 10 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL | 10 | 8 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 | 4 | 6 |
pdf_data/st_keywords/certification_process/OutOfScope |
|
|
pdf_data/st_metadata |
|
None |
dgst | 204cb8d5dbf8e997 | e70bd18f9606a20a |