This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Aruba, a Hewlett Packard Enterprise Company 2930F, 2930M, 3810M, and 5400R Switch Series running ArubaOS version 16.08 CCEVS-VR-11099-2021 |
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) ANSSI-CC-2024/41 |
|
---|---|---|
name | Aruba, a Hewlett Packard Enterprise Company 2930F, 2930M, 3810M, and 5400R Switch Series running ArubaOS version 16.08 | Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) |
category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | US | FR |
status | archived | active |
not_valid_after | 08.01.2023 | 08.01.2030 |
not_valid_before | 08.01.2021 | 08.01.2025 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11099-ci.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_41fr.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11099-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_41fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11099-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_41en.pdf |
manufacturer | Aruba, a Hewlett Packard Enterprise Company | Apple Inc. |
manufacturer_web | https://www.arubanetworks.com/ | https://www.apple.com/ |
security_level | {} | EAL2+, ADV_FSP.3, ALC_FLR.3 |
dgst | 61ebcfb8c0e23fa1 | e5bae93bf2719158 |
heuristics/cert_id | CCEVS-VR-11099-2021 | ANSSI-CC-2024/41 |
heuristics/cert_lab | US | [] |
heuristics/cpe_matches | {} | cpe:2.3:o:apple:watchos:10.4:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2024-44255, CVE-2024-54534, CVE-2024-44302, CVE-2024-27801, CVE-2024-54502, CVE-2025-24160, CVE-2024-44192, CVE-2024-54542, CVE-2024-44225, CVE-2024-44254, CVE-2024-27805, CVE-2024-40850, CVE-2024-54514, CVE-2024-40784, CVE-2024-54525, CVE-2024-27821, CVE-2024-44278, CVE-2024-27834, CVE-2024-40806, CVE-2024-44191, CVE-2025-24123, CVE-2024-54551, CVE-2024-44269, CVE-2024-27808, CVE-2025-24117, CVE-2024-44183, CVE-2024-40822, CVE-2024-44198, CVE-2024-27840, CVE-2024-40793, CVE-2024-44194, CVE-2024-40795, CVE-2024-40824, CVE-2024-40835, CVE-2024-54530, CVE-2024-27880, CVE-2024-27830, CVE-2024-44244, CVE-2024-44297, CVE-2024-27851, CVE-2024-40774, CVE-2024-44296, CVE-2024-54468, CVE-2024-44290, CVE-2024-54479, CVE-2025-24137, CVE-2024-54517, CVE-2024-27826, CVE-2024-27811, CVE-2024-54499, CVE-2024-40857, CVE-2024-44240, CVE-2024-40818, CVE-2025-24158, CVE-2024-44187, CVE-2025-24086, CVE-2024-44233, CVE-2024-44170, CVE-2024-54497, CVE-2024-27838, CVE-2024-54527, CVE-2024-40779, CVE-2024-54523, CVE-2024-27823, CVE-2024-27815, CVE-2024-40813, CVE-2024-40788, CVE-2024-40776, CVE-2024-54494, CVE-2025-24124, CVE-2024-54500, CVE-2024-27814, CVE-2024-44144, CVE-2024-54538, CVE-2024-27816, CVE-2024-27884, CVE-2024-44215, CVE-2024-40815, CVE-2025-24131, CVE-2024-54560, CVE-2024-27820, CVE-2024-44176, CVE-2024-40785, CVE-2024-44282, CVE-2025-24159, CVE-2024-44273, CVE-2024-54543, CVE-2024-54501, CVE-2024-27806, CVE-2025-24162, CVE-2024-44155, CVE-2024-27832, CVE-2025-24126, CVE-2024-23282, CVE-2025-24161, CVE-2024-54478, CVE-2024-54486, CVE-2024-27800, CVE-2024-27810, CVE-2024-27804, CVE-2024-54522, CVE-2024-40812, CVE-2024-54513, CVE-2024-54512, CVE-2024-54508, CVE-2024-54510, CVE-2024-40777, CVE-2024-54467, CVE-2024-44212, CVE-2024-40787, CVE-2024-40805, CVE-2024-44185, CVE-2024-40799, CVE-2024-40829, CVE-2024-27828, CVE-2024-44285, CVE-2024-54535, CVE-2024-44239, CVE-2024-44234, CVE-2025-24163, CVE-2025-24129, CVE-2024-44274, CVE-2024-40782, CVE-2024-44171, CVE-2024-54505, CVE-2024-40809, CVE-2024-27863, CVE-2024-23251, CVE-2024-44169, CVE-2024-54526, CVE-2024-27856, CVE-2024-54541, CVE-2024-40780, CVE-2025-24085, CVE-2024-54518, CVE-2025-24149, CVE-2025-24107, CVE-2024-40836, CVE-2024-40789, CVE-2024-44232 |
heuristics/extracted_sars | ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 | ASE_INT.1, AVA_VAN.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions | 16.08 | 10.4 |
heuristics/scheme_data |
|
|
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf | {} |
pdf_data/cert_filename | st_vid11099-ci.pdf | Certificat-ANSSI-CC-2024_41fr.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid11099-vr.pdf | ANSSI-CC-2024_41fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid11099-st.pdf | ANSSI-Cible-CC-2024_41en.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |