| name |
Strong Customer Authentication for Apple Pay on iPhone 16 Pro with A18 Pro running iOS 18.4(iOS 18.4 (build 22E240)) (ANSSI-CC-2025/34) |
Strong Customer Authentication for Apple Pay on Mac mini with M4 running macOS Sequoia 15.4, paired with Magic keyboard with Touch ID(macOS Sequoia 15.4 (build 24E248)) (ANSSI-CC-2025/36) |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
FR |
FR |
| status |
active |
active |
| not_valid_after |
23.10.2030 |
23.10.2030 |
| not_valid_before |
23.10.2025 |
23.10.2025 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat_ANSSI-CC-2025_34fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_36fr.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_34fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_36fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2025_34en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2025_36en.pdf |
| manufacturer |
Apple Inc. |
Apple Inc. |
| manufacturer_web |
https://www.apple.com/ |
https://www.apple.com/ |
| security_level |
EAL2+, ALC_FLR.3, ADV_FSP.3 |
EAL2+, ALC_FLR.3, ADV_FSP.3 |
| dgst |
5e48434c89c4ddb5 |
f6a3a902436a298c |
| heuristics/cert_id |
ANSSI-CC-2025/34 |
ANSSI-CC-2025/36 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
cpe:2.3:o:apple:macos:15.4:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
CVE-2025-43266, CVE-2025-43316, CVE-2025-31270, CVE-2025-31257, CVE-2025-43295, CVE-2025-31222, CVE-1999-0590, CVE-2025-43195, CVE-2025-43190, CVE-2025-31255, CVE-2025-43249, CVE-2025-43282, CVE-2025-43331, CVE-2025-43194, CVE-2025-31268, CVE-2025-31258, CVE-2025-31244, CVE-2025-43185, CVE-2025-43299, CVE-2025-43318, CVE-2025-24224, CVE-2025-43312, CVE-2025-43333, CVE-2025-31223, CVE-2025-43245, CVE-2025-43253, CVE-2025-43276, CVE-2025-43310, CVE-2025-43193, CVE-2025-43347, CVE-2025-31247, CVE-2025-31204, CVE-2025-43235, CVE-2025-43244, CVE-2025-43321, CVE-2025-43237, CVE-2025-31269, CVE-2025-31251, CVE-2025-43272, CVE-2025-43293, CVE-2025-43220, CVE-2025-43188, CVE-2025-24197, CVE-2025-43325, CVE-2025-43327, CVE-2025-31234, CVE-2025-43213, CVE-2025-43344, CVE-2025-43209, CVE-2025-43279, CVE-2025-43356, CVE-2025-43368, CVE-2025-43232, CVE-2025-31232, CVE-2025-43346, CVE-2025-43192, CVE-2025-24088, CVE-2025-31235, CVE-2025-43251, CVE-2025-43311, CVE-2025-43227, CVE-2025-43214, CVE-2025-43369, CVE-2025-43298, CVE-2025-43326, CVE-2025-31224, CVE-2001-0102, CVE-2025-31233, CVE-2025-43343, CVE-2025-43216, CVE-2025-43314, CVE-2025-43240, CVE-2025-43256, CVE-2025-31278, CVE-2025-31220, CVE-2025-43400, CVE-2025-31212, CVE-2025-31201, CVE-2025-43281, CVE-2025-31213, CVE-2025-43283, CVE-2025-43340, CVE-2025-43260, CVE-2025-43286, CVE-2025-43248, CVE-2025-31246, CVE-2025-43208, CVE-2025-43189, CVE-2025-43355, CVE-2025-43252, CVE-2025-31275, CVE-2025-43221, CVE-2025-43275, CVE-2025-43265, CVE-2025-43212, CVE-2025-43247, CVE-2025-43319, CVE-2025-31239, CVE-2025-43226, CVE-2025-43329, CVE-2025-31205, CVE-2025-43294, CVE-2025-43191, CVE-2025-31218, CVE-2025-31256, CVE-2025-43250, CVE-2025-43353, CVE-2025-31242, CVE-2025-31260, CVE-2025-43337, CVE-2025-43307, CVE-2025-43274, CVE-2025-43218, CVE-2025-24274, CVE-2025-43261, CVE-2025-43204, CVE-2025-43225, CVE-2025-31259, CVE-2025-43239, CVE-2025-43367, CVE-2025-43313, CVE-2025-24188, CVE-2025-43215, CVE-2025-31277, CVE-2025-31226, CVE-2025-31221, CVE-2025-31209, CVE-2025-43303, CVE-2025-43291, CVE-2025-31241, CVE-2025-43207, CVE-2025-43359, CVE-2025-24223, CVE-2025-43267, CVE-2025-43330, CVE-2025-24222, CVE-2025-43308, CVE-2025-31217, CVE-2025-43315, CVE-2025-31200, CVE-2025-43372, CVE-2025-43223, CVE-2025-43341, CVE-2025-31240, CVE-2025-43270, CVE-2025-31249, CVE-2025-43254, CVE-2025-43317, CVE-2025-31208, CVE-2025-43285, CVE-2025-43296, CVE-2025-24142, CVE-2025-31206, CVE-2025-31281, CVE-2025-43366, CVE-2025-43304, CVE-2025-31279, CVE-2025-43206, CVE-2025-43241, CVE-2025-43262, CVE-2025-43349, CVE-2025-43186, CVE-2025-43211, CVE-2025-31273, CVE-2025-31250, CVE-2025-43302, CVE-2025-43328, CVE-2025-43243, CVE-2025-43297, CVE-2025-31271, CVE-2025-43196, CVE-2025-43198, CVE-2025-43342, CVE-2025-43197, CVE-2025-43292, CVE-2025-43358, CVE-2025-31238, CVE-2025-43357, CVE-2025-43354, CVE-2025-43234, CVE-2025-43233, CVE-2025-43259, CVE-2025-43229, CVE-2025-43230, CVE-2025-31237, CVE-2025-31243, CVE-2025-31236, CVE-2025-43305, CVE-2025-43246, CVE-2025-31245, CVE-2025-43301, CVE-2025-31215, CVE-2025-43222, CVE-2025-43287, CVE-2025-43332, CVE-2025-31280, CVE-2025-31219, CVE-2025-43224, CVE-2025-30440, CVE-2025-43199 |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_FLR.3, ASE_OBJ.2, ASE_SPD.1, ASE_CCL.1, AGD_PRE.1, ALC_CMC.2, ALC_DEL.1, ADV_TDS.1, ADV_FSP.3, ATE_FUN.1, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_REQ.2, AGD_OPE.1, ALC_CMS.2, ASE_TSS.1, ASE_ECD.1, ADV_ARC.1 |
ALC_FLR.3, ASE_OBJ.2, ASE_SPD.1, ASE_CCL.1, AGD_PRE.1, ALC_CMC.2, ALC_DEL.1, ADV_TDS.1, ADV_FSP.3, ATE_FUN.1, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_REQ.2, AGD_OPE.1, ALC_CMS.2, ASE_TSS.1, ASE_ECD.1, ADV_ARC.1 |
| heuristics/extracted_versions |
18.4 |
15.4 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
Certificat_ANSSI-CC-2025_34fr.pdf |
Certificat-ANSSI-CC-2025_36fr.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20251020155029+02'00'
- /Creator: Acrobat PDFMaker 25 pour Word
- /ModDate: D:20251023041349-07'00'
- /Producer: PDFKit.NET 12.3.654.0 DMV10
- pdf_file_size_bytes: 276115
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20251020161716+02'00'
- /Creator: Acrobat PDFMaker 25 pour Word
- /ModDate: D:20251023041359-07'00'
- /Producer: PDFKit.NET 12.3.654.0 DMV10
- pdf_file_size_bytes: 276737
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
ANSSI-CC-2025_34fr.pdf |
ANSSI-CC-2025_36fr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- ISO:
- ISO/IEC 15408-: 1
- ISO/IEC 18045:2022: 1
|
- CC:
- ISO:
- ISO/IEC 15408-: 1
- ISO/IEC 18045:2022: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename |
ANSSI-cible-CC-2025_34en.pdf |
ANSSI-Cible-CC-2025_36en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_FSP.3: 3
- ADV_TDS.1: 4
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR: 1
- ALC_FLR.3: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_FSP.3: 3
- ADV_TDS.1: 4
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR: 1
- ALC_FLR.3: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC: 25
- FDP_ACC.1: 10
- FDP_ACC.2: 4
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 23
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 4
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 8
- FDP_ETC.2: 2
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC.1: 9
- FDP_ITC.1: 5
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 4
- FDP_ITT.1.1: 1
- FDP_RIP.1: 15
- FDP_RIP.1.1: 1
- FDP_SDI.1: 10
- FDP_SDI.1.1: 1
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 1
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_SOS.2: 4
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 2
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 14
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITC.1: 4
- FPT_ITC.1.1: 1
- FPT_RPL: 10
- FPT_RPL.1: 4
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
- FDP:
- FDP_ACC: 25
- FDP_ACC.1: 12
- FDP_ACC.2: 4
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 23
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 4
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 8
- FDP_ETC.2: 2
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC.1: 10
- FDP_ITC.1: 4
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT: 8
- FDP_ITT.1.1: 2
- FDP_RIP.1: 13
- FDP_RIP.1.1: 1
- FDP_SDI.1: 9
- FDP_SDI.1.1: 1
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 1
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_SOS.2: 4
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 2
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 17
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITC.1: 4
- FPT_ITC.1.1: 1
- FPT_RPL: 10
- FPT_RPL.1: 4
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CDCVM: 5
- A.DE-: 2
- A.DEVICE_AUTH: 1
- A.PERSO: 5
- A.WATCH_USER: 3
- D:
- OE:
- T:
- T.CORRUPT: 5
- T.PHYSICAL: 2
- T.RECOVER: 5
- T.REPLAY: 2
- T.SILENT: 4
- T.SKIMMING: 3
- T.USURP: 5
|
- A:
- A.DEVICE_AUTH: 3
- A.NO_EVIL_ROOT_USER: 2
- A.PERSO: 4
- A.WATCH_USER: 4
- D:
- T:
- T.COR-: 1
- T.CORRUPT: 3
- T.PHYSI-: 1
- T.PHYSICAL: 1
- T.RE-: 1
- T.RECOVER: 3
- T.REPLAY: 2
- T.SILENT: 3
- T.SKIM-: 1
- T.SKIMMING: 2
- T.USURP: 4
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
- out of scope: 2
- pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
|
- OutOfScope:
- Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
- out of scope: 2
- to re- turn to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.Keyboard_Secret D.SEP_Watch* T.RE- COVER: 1
|
| pdf_data/st_metadata |
- /CreationDate: D:20250811153550Z
- /Creator: Word
- /ModDate: D:20250811163613+01'00'
- /Producer: Adobe Mac PDF Plug-in
- /Title: Microsoft Word - [ST] iPhone16Pro_A18Pro_iOS18_SecurityTarget_v1.3.docx
- pdf_file_size_bytes: 3681177
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
- /CreationDate: D:20250812181208Z
- /Creator: Word
- /ModDate: D:20250812191229+01'00'
- /Producer: Adobe Mac PDF Plug-in
- /Title: Microsoft Word - [ST] Macmini_M4_Keyboard_macOS15_SecurityTarget_v1.4.docx
- pdf_file_size_bytes: 2944602
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
| state/cert/convert_garbage |
False |
False |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
False |
False |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
False |
False |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |