Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
2019-48-INF-3811
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
ANSSI-CC-2023/17
name Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
category ICs, Smart Cards and Smart Card-Related Devices and Systems Mobility
scheme ES FR
not_valid_after 07.06.2027 27.03.2028
not_valid_before 07.06.2022 27.03.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48_Certificado.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_17.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20INF-3811.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_17fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20ST_lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_17en.pdf
manufacturer Winbond Electonics Corporation Apple Inc.
manufacturer_web https://www.winbond.com/ https://www.apple.com/
security_level EAL5+, AVA_VAN.5, ALC_DVS.2 ADV_FSP.3, ALC_FLR.3, EAL2+
dgst 51a1149f945dea23 cb2e15c281fc9c89
heuristics/cert_id 2019-48-INF-3811 ANSSI-CC-2023/17
heuristics/cpe_matches {} cpe:2.3:o:apple:watchos:8.5:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-40456, CVE-2024-23226, CVE-2023-38572, CVE-2023-32424, CVE-2022-32926, CVE-2024-40806, CVE-2024-44296, CVE-2022-26757, CVE-2022-26702, CVE-2023-32434, CVE-2024-44185, CVE-2022-46695, CVE-2023-23519, CVE-2023-32420, CVE-2024-40812, CVE-2022-42852, CVE-2023-23535, CVE-2023-42883, CVE-2022-32923, CVE-2022-32924, CVE-2024-54530, CVE-2024-40784, CVE-2024-23211, CVE-2023-40414, CVE-2023-38133, CVE-2022-2294, CVE-2024-23271, CVE-2024-54508, CVE-2025-24111, CVE-2023-37450, CVE-2024-27826, CVE-2022-26706, CVE-2025-24162, CVE-2024-23286, CVE-2023-42839, CVE-2023-40447, CVE-2023-41997, CVE-2024-54502, CVE-2022-48503, CVE-2023-32425, CVE-2023-38580, CVE-2022-32835, CVE-2023-23502, CVE-2024-40782, CVE-2023-32384, CVE-2025-24123, CVE-2024-54514, CVE-2025-31217, CVE-2022-32788, CVE-2023-23512, CVE-2022-32879, CVE-2022-32792, CVE-2024-23208, CVE-2024-23223, CVE-2024-40805, CVE-2023-42893, CVE-2024-23280, CVE-2024-54527, CVE-2025-24149, CVE-2022-46694, CVE-2022-42795, CVE-2024-40835, CVE-2025-31203, CVE-2024-23246, CVE-2024-23282, CVE-2022-32932, CVE-2022-32894, CVE-2024-23287, CVE-2023-41071, CVE-2023-42947, CVE-2023-32432, CVE-2023-41990, CVE-2022-48610, CVE-2023-38598, CVE-2023-32352, CVE-2023-40448, CVE-2023-38611, CVE-2023-36495, CVE-2024-23289, CVE-2022-32913, CVE-2022-32864, CVE-2023-41981, CVE-2024-23254, CVE-2024-27801, CVE-2024-23235, CVE-2022-26710, CVE-2023-41065, CVE-2023-42898, CVE-2023-38596, CVE-2023-38604, CVE-2023-40520, CVE-2023-32402, CVE-2023-32392, CVE-2024-44187, CVE-2023-23505, CVE-2023-41174, CVE-2024-40787, CVE-2024-27800, CVE-2024-44144, CVE-2023-38593, CVE-2023-42852, CVE-2024-23217, CVE-2025-31251, CVE-2023-41068, CVE-2023-23499, CVE-2024-40829, CVE-2022-32928, CVE-2023-42957, CVE-2024-40836, CVE-2023-40408, CVE-2024-40777, CVE-2024-44269, CVE-2024-54523, CVE-2023-27942, CVE-2023-27928, CVE-2022-32944, CVE-2024-44155, CVE-2022-42859, CVE-2024-23206, CVE-2023-23527, CVE-2024-54510, CVE-2023-42888, CVE-2025-24107, CVE-2022-26714, CVE-2025-24161, CVE-2022-23308, CVE-2022-32899, CVE-2024-23251, CVE-2024-40822, CVE-2023-41976, CVE-2024-23210, CVE-2022-26709, CVE-2024-44194, CVE-2024-27838, CVE-2022-46693, CVE-2024-44240, CVE-2025-24144, CVE-2023-40432, CVE-2023-27931, CVE-2025-24160, CVE-2022-32821, CVE-2022-26768, CVE-2024-27832, CVE-2024-54541, CVE-2024-23212, CVE-2024-27828, CVE-2024-40793, CVE-2023-38599, CVE-2024-27830, CVE-2023-27929, CVE-2022-42867, CVE-2024-54560, CVE-2023-40409, CVE-2024-40799, CVE-2023-38565, CVE-2022-42864, CVE-2022-42824, CVE-2023-42949, CVE-2023-41968, CVE-2024-27820, CVE-2025-31262, CVE-2025-24117, CVE-2022-26763, CVE-2023-38592, CVE-2023-42866, CVE-2022-32826, CVE-2025-31209, CVE-2022-32891, CVE-2022-42842, CVE-2022-32889, CVE-2023-32400, CVE-2022-32832, CVE-2023-27933, CVE-2023-42865, CVE-2023-28181, CVE-2024-54468, CVE-2023-32403, CVE-2022-32875, CVE-2025-31241, CVE-2024-54467, CVE-2023-32357, CVE-2022-32881, CVE-2022-32898, CVE-2022-46699, CVE-2022-42801, CVE-2024-44198, CVE-2024-23207, CVE-2024-27814, CVE-2022-46705, CVE-2023-41061, CVE-2024-44254, CVE-2023-23517, CVE-2023-40410, CVE-2023-32396, CVE-2023-42875, CVE-2024-44244, CVE-2024-23293, CVE-2022-22675, CVE-2022-32841, CVE-2021-36690, CVE-2024-27851, CVE-2024-44176, CVE-2025-24131, CVE-2024-27815, CVE-2024-23213, CVE-2022-32819, CVE-2024-40779, CVE-2024-40815, CVE-2023-27956, CVE-2023-32404, CVE-2024-54522, CVE-2024-44302, CVE-2024-44290, CVE-2022-42811, CVE-2023-32388, CVE-2023-42946, CVE-2022-32947, CVE-2022-42813, CVE-2023-23511, CVE-2024-54534, CVE-2022-42863, CVE-2023-27963, CVE-2023-42936, CVE-2023-32399, CVE-2025-24163, CVE-2025-24137, CVE-2024-54543, CVE-2024-40785, CVE-2023-38606, CVE-2022-42849, CVE-2022-42843, CVE-2023-32428, CVE-2023-32389, CVE-2022-42837, CVE-2022-1622, CVE-2025-31208, CVE-2025-24251, CVE-2024-54501, CVE-2023-32416, CVE-2022-32787, CVE-2022-32854, CVE-2023-35984, CVE-2024-27856, CVE-2022-26771, CVE-2022-26766, CVE-2023-40413, CVE-2025-24126, CVE-2025-24086, CVE-2024-40818, CVE-2023-40429, CVE-2022-32925, CVE-2023-42849, CVE-2023-34425, CVE-2023-40395, CVE-2024-54518, CVE-2023-32394, CVE-2024-54526, CVE-2022-42803, CVE-2022-42800, CVE-2023-32373, CVE-2024-44192, CVE-2023-42890, CVE-2022-32844, CVE-2024-54478, CVE-2024-40850, CVE-2023-42953, CVE-2023-41073, CVE-2023-32398, CVE-2023-42834, CVE-2024-54497, CVE-2022-42825, CVE-2024-23297, CVE-2024-27810, CVE-2022-26981, CVE-2023-32423, CVE-2025-24159, CVE-2023-23537, CVE-2023-27930, CVE-2022-32845, CVE-2025-31204, CVE-2022-32857, CVE-2023-32734, CVE-2024-44282, CVE-2023-40454, CVE-2025-31239, CVE-2024-23204, CVE-2024-54551, CVE-2024-44225, CVE-2024-40776, CVE-2023-40400, CVE-2024-27816, CVE-2023-40417, CVE-2024-40795, CVE-2024-40780, CVE-2024-27811, CVE-2022-32813, CVE-2023-32438, CVE-2023-28185, CVE-2024-27804, CVE-2023-35993, CVE-2025-24129, CVE-2024-44169, CVE-2024-27880, CVE-2022-40304, CVE-2024-54505, CVE-2022-32814, CVE-2024-44274, CVE-2023-41984, CVE-2022-32824, CVE-2023-42823, CVE-2023-38600, CVE-2022-46696, CVE-2022-46690, CVE-2022-32815, CVE-2023-23496, CVE-2022-26717, CVE-2024-23288, CVE-2023-28202, CVE-2023-32354, CVE-2024-40813, CVE-2022-32914, CVE-2023-27954, CVE-2024-27805, CVE-2023-32391, CVE-2022-32888, CVE-2024-23201, CVE-2023-42937, CVE-2022-32823, CVE-2022-32883, CVE-2025-31221, CVE-2023-32433, CVE-2023-32376, CVE-2025-31215, CVE-2024-44278, CVE-2022-46692, CVE-2022-32816, CVE-2022-26711, CVE-2022-32870, CVE-2022-46700, CVE-2024-27808, CVE-2023-42846, CVE-2024-0258, CVE-2024-44171, CVE-2024-40809, CVE-2025-24158, CVE-2024-54525, CVE-2023-27937, CVE-2023-40427, CVE-2024-44183, CVE-2022-26719, CVE-2024-54486, CVE-2022-42823, CVE-2022-46689, CVE-2024-23239, CVE-2022-46691, CVE-2023-38594, CVE-2024-44255, CVE-2024-40857, CVE-2025-31206, CVE-2023-32390, CVE-2022-32825, CVE-2025-31223, CVE-2025-31233, CVE-2023-23518, CVE-2023-40403, CVE-2024-23290, CVE-2022-42866, CVE-2024-27863, CVE-2022-32866, CVE-2022-32820, CVE-2022-32790, CVE-2023-41074, CVE-2023-23524, CVE-2022-32858, CVE-2024-54535, CVE-2024-23218, CVE-2022-48618, CVE-2022-26764, CVE-2023-35990, CVE-2024-23263, CVE-2023-40528, CVE-2025-24223, CVE-2022-42808, CVE-2023-40424, CVE-2023-32412, CVE-2023-41988, CVE-2024-44297, CVE-2023-32361, CVE-2022-32903, CVE-2023-40420, CVE-2022-32810, CVE-2024-44170, CVE-2024-44285, CVE-2023-42862, CVE-2024-27884, CVE-2023-32372, CVE-2023-32381, CVE-2024-40788, CVE-2022-32793, CVE-2023-32368, CVE-2024-23296, CVE-2024-54499, CVE-2022-43454, CVE-2024-54542, CVE-2023-32417, CVE-2022-32911, CVE-2025-31226, CVE-2022-46698, CVE-2023-27969, CVE-2022-32847, CVE-2022-42798, CVE-2023-23504, CVE-2022-42865, CVE-2023-32413, CVE-2023-32408, CVE-2024-44233, CVE-2022-26716, CVE-2024-27859, CVE-2023-38136, CVE-2023-23500, CVE-2023-28204, CVE-2023-38590, CVE-2022-37434, CVE-2024-23215, CVE-2024-40789, CVE-2024-40774, CVE-2023-32407, CVE-2022-32908, CVE-2025-24189, CVE-2025-24124, CVE-2022-42845, CVE-2023-27932, CVE-2023-23503, CVE-2024-23278, CVE-2024-44273, CVE-2023-27961, CVE-2023-41070, CVE-2025-31222, CVE-2024-27823, CVE-2023-32409, CVE-2023-42899, CVE-2022-26765, CVE-2025-31219, CVE-2025-24085, CVE-2024-54658, CVE-2022-42799, CVE-2024-54479, CVE-2024-44212, CVE-2023-40419, CVE-2023-32441, CVE-2023-40399, CVE-2025-31212, CVE-2024-54494, CVE-2023-40412, CVE-2024-23225, CVE-2023-42970, CVE-2023-32445, CVE-2022-26726, CVE-2022-32840, CVE-2025-24184, CVE-2024-44239, CVE-2025-31205, CVE-2023-42942, CVE-2024-40824, CVE-2024-44215, CVE-2022-32839, CVE-2024-23231, CVE-2024-44191, CVE-2023-42848, CVE-2023-40452, CVE-2022-32817, CVE-2023-42950, CVE-2022-42817, CVE-2024-44234, CVE-2023-41982, CVE-2024-54538, CVE-2022-32940, CVE-2024-23291, CVE-2023-39434, CVE-2022-26700, CVE-2024-27821, CVE-2023-34352, CVE-2023-40396, CVE-2024-54512, CVE-2022-32907, CVE-2023-32393, CVE-2024-23265, CVE-2024-27840, CVE-2025-31238, CVE-2023-42914, CVE-2024-23250, CVE-2023-35074, CVE-2023-41254, CVE-2023-42878, CVE-2024-54500, CVE-2024-54513, CVE-2024-27806, CVE-2022-40303, CVE-2023-28191, CVE-2024-54517, CVE-2023-38595, CVE-2024-27834, CVE-2024-44232, CVE-2024-23284, CVE-2025-31257
heuristics/extracted_sars ALC_LCD.1, ASE_CCL.1, AGD_OPE.1, ASE_SPD.1, ASE_OBJ.2, ATE_DPT.3, ATE_COV.2, ALC_CMS.5, ADV_ARC.1, ATE_FUN.1, ADV_IMP.1, ALC_DVS.2, ALC_TAT.2, ASE_INT.1, AVA_VAN.5, ASE_TSS.1, ADV_TDS.4, ALC_CMC.4, ADV_INT.2, ASE_REQ.2, ALC_DEL.1, ADV_FSP.5, AGD_PRE.1, ASE_ECD.1 ATE_IND.2, ALC_FLR.3, ASE_CCL.1, ALC_CMS.2, AGD_OPE.1, ASE_SPD.1, AVA_VAN.2, ADV_FSP.3, ASE_OBJ.2, ADV_ARC.1, ALC_CMC.2, ATE_FUN.1, ASE_INT.1, ASE_TSS.1, ASE_REQ.2, ALC_DEL.1, AGD_PRE.1, ATE_COV.1, ADV_TDS.1, ASE_ECD.1
heuristics/extracted_versions - 8.5.1
heuristics/scheme_data
  • category: Smart Cards and similiar devices
  • certification_date: 07.06.2022
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1478
    • certification_date: 07.06.2022
    • description: The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc. and will be working in a hostile environment. In particular, the TOE main function is the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC.
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: Winbond Electronics Corporation
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1479
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1477
    • type: Product
  • manufacturer: Winbond Electronics Corporation
  • product: Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/826-winbond-spiflash-trustme-secure-flash-memory-w75f40wbyjeg-version-a
pdf_data/cert_filename 2019-48_Certificado.pdf certificat-cc-2023_17.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/17: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL5: 1
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 880365
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 2019-48 INF-3811.pdf anssi-cc-2023_17fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2019-48-INF-3811- v1: 1
  • FR:
    • ANSSI-CC-2023/17: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 8
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL2: 3
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 ElevĂ©: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 9
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFC.1: 1
    • FDP_RIP.1: 1
    • FDP_SDI.2: 1
    • FDP_UIT.1: 1
  • FMT:
    • FMT_LIM.1: 1
  • FPT:
    • FPT_FLS: 2
    • FPT_ITT.1: 1
    • FPT_TRP.1: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 5
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 2
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 964023
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename 2019-48 ST_lite.pdf anssi-cible-cc-2023_17en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 6
    • EAL5 augmented: 2
  • EAL:
    • EAL 2: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 3
    • ADV_FSP.4: 1
    • ADV_FSP.5: 8
    • ADV_IMP.1: 9
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 9
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 5
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 10
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 2
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.3: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF: 1
    • FDP_IFC.1: 27
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 4
    • FDP_ITT.1: 13
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_SDC: 4
    • FDP_SDC.1: 16
    • FDP_SDC.1.1: 2
    • FDP_SDI: 1
    • FDP_SDI.2: 11
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 22
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 2
  • FPT:
    • FPT_FLS: 24
    • FPT_FLS.1: 3
    • FPT_ITT.1: 12
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 14
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 12
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 11
    • FDP_ACC.2: 4
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 16
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 7
    • FDP_ETC.2: 2
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 8
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 8
    • FIA_AFL.1: 5
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 12
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.CDCVM: 3
    • A.DEVICE_AUTH: 3
    • A.IPHONE_USER: 3
    • A.PERSO: 3
  • D:
    • D.OS: 16
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • OT:
    • OT.-: 1
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Fault Injection: 1
    • Malfunction: 17
    • fault injection: 2
    • malfunction: 3
    • physical tampering: 3
  • SCA:
    • Leak-Inherent: 17
    • Physical Probing: 2
    • physical probing: 5
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • to return to its User. Note: Defending against device re-use after phys- ical compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_metadata
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/extract_ok True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different