This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58) ANSSI-CC-2023/58 |
Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201) ANSSI-CC-2023/13 |
|
---|---|---|
name | Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58) | Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201) |
category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Mobility |
not_valid_before | 2023-12-28 | 2023-03-01 |
not_valid_after | 2028-12-28 | 2028-03-01 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_58en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2023_13en.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_58en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_13.pdf |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_58en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_13fr.pdf |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | aa1308aebbe2495a638eab65bd5e80db992bed1e7718aa13053a75e4cbdfe30c | 9ab78a6d84a931c25349727a05e8164268981aeb844204059e86a9b48cbbbca1 |
state/cert/txt_hash | 5ed497c7602db8e0121211a132cad0cf0313a2fcb02e53227b0a7b2dc56c748c | 2b9b7c125e4dd47b75a16b986227011d5ccb8f4aa6d899708a4f6f6d90163ea2 |
state/report/extract_ok | True | False |
state/report/pdf_hash | 14df361cd1dca720cf1ee0b52c5e1c240be46753fa00cacc4bc3b026cb34a295 | 85828919202436363549b23bf5bb44e35f2ce509cab7e7ca929cfbb1ec1a220a |
state/report/txt_hash | 07c310aa55f4c1fcdc4dacba2631a1261617724d162b09969db735d1fe3d8149 | 3cd862a45c78db03af947d4ddd2ec5bf2edb7ee0ccd3b2238deabcde3f3f8973 |
state/st/extract_ok | True | False |
state/st/pdf_hash | 26c0804b543be2fcfd21ebba6f61d67ab3a2210e1ad677b066559fbeb4ddd088 | 6106e3e797dd032ada6848a812bc0e7ee805fc98068bbb19fe1b2b2a2f62cb0f |
state/st/txt_hash | 195057752a39cb59cdd8d30e8f4016804141ba865d6b474fce016369226d4a33 | c2cb1210156602f783668a8b2524a1afd5dfaf1fae0de9f2550d9ba1da811c10 |
heuristics/cert_id | ANSSI-CC-2023/58 | ANSSI-CC-2023/13 |
heuristics/cpe_matches | cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* | cpe:2.3:o:apple:watchos:7.4.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:watchos:7.4:*:*:*:*:*:*:* |
heuristics/extracted_versions | 16.4.1 | 7.4.1 |
heuristics/scheme_data/cert_id | ANSSI-CC-2023/58 | ANSSI-CC-2023/13 |
heuristics/scheme_data/description | Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC. | Le produit évalué est « Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1, Version 18T201 » développé par Apple Inc.. Apple Pay est une solution de paiement mobile développée par la société Apple Inc. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paieme |
heuristics/scheme_data/developer | APPLE INC. | Apple Inc. |
heuristics/scheme_data/enhanced/augmented | ADV_FSP.3 | (ADV_FSP.3, ALC_FLR.3) |
heuristics/scheme_data/enhanced/cert_id | ANSSI-CC-2023/58 | ANSSI-CC-2023/13 |
heuristics/scheme_data/enhanced/cert_link | https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_58en.pdf | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_13fr.pdf |
heuristics/scheme_data/enhanced/certification_date | 28/12/2023 | 01/03/2023 |
heuristics/scheme_data/enhanced/developer | APPLE INC. | Apple Inc. |
heuristics/scheme_data/enhanced/evaluation_facility | THALES / CNES | SERMA SAFETY & SECURITY et OPPIDA |
heuristics/scheme_data/enhanced/expiration_date | 28/12/2028 | 29/02/2028 |
heuristics/scheme_data/enhanced/protection_profile | NA | |
heuristics/scheme_data/enhanced/report_link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_58en.pdf | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_13.pdf |
heuristics/scheme_data/enhanced/sponsor | APPLE INC. | Apple Inc. |
heuristics/scheme_data/enhanced/target_link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_58en.pdf | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-2023_13en.pdf |
heuristics/scheme_data/expiration_date | 28 Décembre 2028 | 29 Février 2028 |
heuristics/scheme_data/product | Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1 (iOS 16.4.1 (build 20E252)) | Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201) |
heuristics/scheme_data/sponsor | APPLE INC. | Apple Inc. |
heuristics/scheme_data/url | https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-se-3rd-generation-a15-bionic | https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-apple-watch-serie-4-executant |
pdf_data/cert_filename | certificat-CC-2023_58en.pdf | certificat-cc-2023_13fr.pdf |
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sar/ADV/ADV_FSP.3 | 1 | 2 |
pdf_data/cert_keywords/cc_security_level/EAL |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_metadata |
|
None |
pdf_data/report_filename | ANSSI-CC-2023_58en.pdf | anssi-cc-2023_13.pdf |
pdf_data/report_keywords/cc_cert_id/FR |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.3 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 3 | 4 |
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto | |
|
pdf_data/report_keywords/tee_name/IBM/SE | 12 | 1 |
pdf_data/report_metadata |
|
None |
pdf_data/st_filename | ANSSI-cible-CC-2023_58en.pdf | anssi-cible-2023_13en.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_claims/A |
|
|
pdf_data/st_keywords/cc_claims/A/A.DE- | 1 | 2 |
pdf_data/st_keywords/cc_claims/A/A.DEVICE_AUTH | 2 | 1 |
pdf_data/st_keywords/cc_claims/T |
|
|
pdf_data/st_keywords/cc_claims/T/T.CORRUPT | 1 | 2 |
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL | 1 | 2 |
pdf_data/st_keywords/cc_claims/T/T.SKIMMING | 1 | 2 |
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC | 23 | 22 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 9 | 11 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF | 19 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ETC | 8 | 7 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 7 | 8 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 | 15 | 12 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 10 | 9 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT | 4 | 10 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT | 4 | 10 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL | 7 | 9 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 | 3 | 5 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 | 11 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 5 | 6 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 6 | 7 |
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 | 11 | 12 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL | 4 | 8 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 | 2 | 6 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC | 6 | 14 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 5 | 7 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 2 | 4 |
pdf_data/st_keywords/certification_process/OutOfScope |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC | 1 | 4 |
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/tee_name/IBM/SE | 66 | 5 |
pdf_data/st_metadata |
|
None |
dgst | a5696b3d01538604 | 143764f03c38df35 |