This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) ANSSI-CC-2023/60 |
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 |
|
---|---|---|
name | Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) | ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_60en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_67fr.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_67fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_67en.pdf |
manufacturer | Apple Inc. | NXP Semiconductors |
manufacturer_web | https://www.apple.com/ | https://www.nxp.com/ |
security_level | ADV_FSP.3, EAL2+ | ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ADV_TDS.4, ATE_DPT.3, ADV_INT.2, EAL4+, ADV_FSP.5 |
dgst | 6207e27699db6695 | ce3b298b22c15e82 |
heuristics/cert_id | ANSSI-CC-2023/60 | ANSSI-CC-2023/67 |
heuristics/cpe_matches | cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2023-32408, CVE-2024-40818, CVE-2023-32404, CVE-2023-32445, CVE-2023-41988, CVE-2023-32361, CVE-2023-42834, CVE-2023-32381, CVE-2024-23223, CVE-2023-41074, CVE-2023-32373, CVE-2023-42878, CVE-2023-41174, CVE-2024-44254, CVE-2023-32391, CVE-2023-38136, CVE-2024-44232, CVE-2023-32400, CVE-2023-40396, CVE-2023-40427, CVE-2023-42947, CVE-2024-27800, CVE-2023-41982, CVE-2023-32388, CVE-2024-27863, CVE-2023-40413, CVE-2024-44274, CVE-2024-23286, CVE-2023-40419, CVE-2023-40454, CVE-2024-27826, CVE-2023-32417, CVE-2023-40395, CVE-2023-40400, CVE-2024-54534, CVE-2024-44144, CVE-2023-40520, CVE-2024-44198, CVE-2024-27815, CVE-2024-23297, CVE-2023-41997, CVE-2024-23218, CVE-2024-23217, CVE-2023-38604, CVE-2023-40409, CVE-2023-42866, CVE-2024-27834, CVE-2023-32432, CVE-2023-27930, CVE-2023-42950, CVE-2024-23226, CVE-2024-40789, CVE-2023-42893, CVE-2024-44215, CVE-2024-40850, CVE-2024-23225, CVE-2024-40806, CVE-2024-23201, CVE-2023-32409, CVE-2024-27816, CVE-2023-42942, CVE-2023-32403, CVE-2023-28191, CVE-2023-38565, CVE-2024-27851, CVE-2023-41976, CVE-2024-44273, CVE-2023-42914, CVE-2024-23204, CVE-2024-23280, CVE-2024-44240, CVE-2024-27838, CVE-2023-32423, CVE-2024-54526, CVE-2024-23282, CVE-2023-38572, CVE-2023-32357, CVE-2024-27811, CVE-2023-32384, CVE-2024-23239, CVE-2023-38594, CVE-2024-27820, CVE-2023-40414, CVE-2024-54510, CVE-2024-44176, CVE-2023-38600, CVE-2023-32734, CVE-2023-35990, CVE-2024-44185, CVE-2023-40403, CVE-2023-28204, CVE-2024-40776, CVE-2023-32416, CVE-2023-37450, CVE-2023-42848, CVE-2023-32407, CVE-2024-23289, CVE-2024-27880, CVE-2024-40857, CVE-2024-23271, CVE-2024-54513, CVE-2024-23287, CVE-2023-40452, CVE-2024-40779, CVE-2024-27884, CVE-2024-23215, CVE-2024-40774, CVE-2024-44234, CVE-2023-42823, CVE-2023-42849, CVE-2023-32420, CVE-2024-23291, CVE-2024-23206, CVE-2023-38598, CVE-2024-23263, CVE-2023-32433, CVE-2023-38580, CVE-2024-44302, CVE-2023-32394, CVE-2024-44297, CVE-2023-42852, CVE-2023-42949, CVE-2023-40399, CVE-2023-41070, CVE-2024-40787, CVE-2023-41061, CVE-2023-32412, CVE-2024-27823, CVE-2024-44239, CVE-2024-23212, CVE-2024-27840, CVE-2024-23213, CVE-2024-27821, CVE-2023-42898, CVE-2023-32398, CVE-2023-41968, CVE-2024-54486, CVE-2023-38606, CVE-2023-32352, CVE-2023-38593, CVE-2023-38133, CVE-2024-40805, CVE-2023-40528, CVE-2024-44155, CVE-2023-34352, CVE-2023-42953, CVE-2024-23207, CVE-2024-23210, CVE-2024-40822, CVE-2024-40824, CVE-2023-42937, CVE-2023-38611, CVE-2023-38590, CVE-2024-40829, CVE-2024-54500, CVE-2023-42883, CVE-2023-41984, CVE-2023-32434, CVE-2024-27832, CVE-2024-44194, CVE-2023-40412, CVE-2024-23293, CVE-2024-54494, CVE-2023-40432, CVE-2023-41065, CVE-2024-40784, CVE-2024-23296, CVE-2023-39434, CVE-2024-40793, CVE-2024-27828, CVE-2024-23211, CVE-2023-32389, CVE-2024-23251, CVE-2024-27814, CVE-2024-27810, CVE-2023-35074, CVE-2023-40408, CVE-2023-32372, CVE-2024-23231, CVE-2024-44169, CVE-2024-54527, CVE-2024-40812, CVE-2024-44269, CVE-2024-40782, CVE-2024-27830, CVE-2024-44290, CVE-2023-42890, CVE-2024-27801, CVE-2024-40780, CVE-2023-41981, CVE-2023-35984, CVE-2023-32428, CVE-2024-27804, CVE-2023-42936, CVE-2023-40429, CVE-2024-44191, CVE-2024-44233, CVE-2024-54508, CVE-2023-41254, CVE-2024-23235, CVE-2023-32396, CVE-2024-44255, CVE-2024-40795, CVE-2024-23265, CVE-2024-40809, CVE-2023-28202, CVE-2024-44285, CVE-2024-54479, CVE-2024-44244, CVE-2024-54505, CVE-2024-40799, CVE-2023-42957, CVE-2023-40447, CVE-2024-23288, CVE-2023-42946, CVE-2023-34425, CVE-2023-40424, CVE-2024-44278, CVE-2024-40777, CVE-2023-32392, CVE-2024-44212, CVE-2024-40785, CVE-2023-32425, CVE-2023-42899, CVE-2023-42888, CVE-2024-40813, CVE-2024-23208, CVE-2024-27806, CVE-2024-44171, CVE-2023-35993, CVE-2023-42846, CVE-2023-36495, CVE-2023-42839, CVE-2023-41073, CVE-2024-27805, CVE-2024-44296, CVE-2024-40815, CVE-2023-38595, CVE-2024-23254, CVE-2023-38592, CVE-2024-23284, CVE-2023-32399, CVE-2024-23290, CVE-2024-44170, CVE-2023-38599, CVE-2023-40410, CVE-2023-41068, CVE-2023-32413, CVE-2023-32354, CVE-2024-0258, CVE-2024-23250, CVE-2023-40417, CVE-2023-32402, CVE-2023-40456, CVE-2023-32390, CVE-2024-23278, CVE-2023-41071, CVE-2024-44282, CVE-2023-32376, CVE-2023-32368, CVE-2023-32441, CVE-2024-44187, CVE-2024-44183, CVE-2023-40448, CVE-2024-23246, CVE-2024-40835, CVE-2024-27808, CVE-2024-40836, CVE-2024-40788, CVE-2023-40420, CVE-2023-38596 | {} |
heuristics/extracted_sars | ALC_CMC.2, ASE_INT.1, ATE_FUN.1, ATE_COV.1, ADV_TDS.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMS.2, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ASE_ECD.1, ADV_FSP.3, AVA_VAN.2 | ALC_CMS.5, ASE_INT.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, AVA_VAN.3, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
heuristics/extracted_versions | 9.4 | 4.1, 4.1.1.52, 4.5 |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-1149-V2-2023, NSCIB-CC-0313985-CR |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-1149-V2-2023, NSCIB-CC-0313985-CR |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-1149-V2-2023 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-1149-V2-2023 |
protection_profiles |
|
|
pdf_data/cert_filename | certificat-CC-2023_60en.pdf | Certificat-CC-2023_67fr.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | ANSSI-CC-2023_60en.pdf | ANSSI-CC-2023_67fr.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ANSSI-cible-CC-2023_60en.pdf | ANSSI-cible-CC-2023_67en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |