Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58)
ANSSI-CC-2023/58
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
ANSSI-CC-2023/17
name Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58) Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
category ICs, Smart Cards and Smart Card-Related Devices and Systems Mobility
not_valid_before 2023-12-28 2023-03-27
not_valid_after 2028-12-28 2028-03-27
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_58en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_17en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_58en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_17fr.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_58en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_17.pdf
state/cert/extract_ok True False
state/cert/pdf_hash aa1308aebbe2495a638eab65bd5e80db992bed1e7718aa13053a75e4cbdfe30c d6755b3f9bd5e3f137979cb110bf2fe963848d390bed4d0f12ecb15a48c34bd5
state/cert/txt_hash 5ed497c7602db8e0121211a132cad0cf0313a2fcb02e53227b0a7b2dc56c748c 30024e48601a69c6d62c5c0a2c2e4e99d1e3533bc50a9f1e70ed482c010288ca
state/report/extract_ok True False
state/report/pdf_hash 14df361cd1dca720cf1ee0b52c5e1c240be46753fa00cacc4bc3b026cb34a295 f3de8154a08716ee31304fa32ce66a4f2663c385e55fffbe8646edf2cdcca3a4
state/report/txt_hash 07c310aa55f4c1fcdc4dacba2631a1261617724d162b09969db735d1fe3d8149 3c24879ef7b5c0d3286a17e4c92b96112664fef465f2da6f3ab9d3c888f69152
state/st/extract_ok True False
state/st/pdf_hash 26c0804b543be2fcfd21ebba6f61d67ab3a2210e1ad677b066559fbeb4ddd088 9d23e11daf397ceca10c80c93e4b1039831186989e83ab76d6452f405382154e
state/st/txt_hash 195057752a39cb59cdd8d30e8f4016804141ba865d6b474fce016369226d4a33 642c6398f52005a3f9054223c8a5853a91b0681b109a046a1ca930728a6c204a
heuristics/cert_id ANSSI-CC-2023/58 ANSSI-CC-2023/17
heuristics/cpe_matches cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:8.5:*:*:*:*:*:*:*
heuristics/extracted_versions 16.4.1 8.5.1
heuristics/scheme_data/cert_id ANSSI-CC-2023/58 ANSSI-CC-2023/17
heuristics/scheme_data/description Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC. Le produit évalué est « Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1, Version 8.5.1 (build 19T252) » développé par APPLE INC.. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que
heuristics/scheme_data/enhanced
  • cert_id: ANSSI-CC-2023/58
  • certification_date: 28/12/2023
  • expiration_date: 28/12/2028
  • category: Divers
  • cc_version: Critères Communs version 3.1r5
  • developer: APPLE INC.
  • sponsor: APPLE INC.
  • evaluation_facility: THALES / CNES
  • level: EAL2+
  • protection_profile:
  • mutual_recognition: CCRA SOG-IS
  • augmented: ADV_FSP.3
  • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_58en.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_58en.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_58en.pdf
  • cert_id: ANSSI-CC-2023/17
  • certification_date: 27/03/2023
  • expiration_date: 26/03/2028
  • category: Divers
  • cc_version: Critères Communs version 3.1r5
  • developer: APPLE INC.
  • sponsor: APPLE INC.
  • evaluation_facility: THALES / CNES
  • level: EAL2+
  • protection_profile:
  • mutual_recognition: CCRA SOG-IS
  • augmented: ADV_FSP.3 et ALC_FLR.3
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_17.pdf
heuristics/scheme_data/enhanced/augmented ADV_FSP.3 ADV_FSP.3 et ALC_FLR.3
heuristics/scheme_data/enhanced/cert_id ANSSI-CC-2023/58 ANSSI-CC-2023/17
heuristics/scheme_data/enhanced/cert_link https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_58en.pdf https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_17.pdf
heuristics/scheme_data/enhanced/certification_date 28/12/2023 27/03/2023
heuristics/scheme_data/enhanced/expiration_date 28/12/2028 26/03/2028
heuristics/scheme_data/expiration_date 28 Décembre 2028 26 Mars 2028
heuristics/scheme_data/product Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1 (iOS 16.4.1 (build 20E252)) Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-se-3rd-generation-a15-bionic https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-apple-watch-avec-s7-executant
pdf_data/cert_filename certificat-CC-2023_58en.pdf certificat-cc-2023_17.pdf
pdf_data/cert_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/58: 2
  • ANSSI-CC-2023/17: 2
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 2
pdf_data/cert_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/cert_metadata
  • pdf_file_size_bytes: 138204
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20240222154440+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155211+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks:
None
pdf_data/report_filename ANSSI-CC-2023_58en.pdf anssi-cc-2023_17fr.pdf
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/58: 2
  • ANSSI-CC-2023/17: 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_FLR.3: 2
  • ALC_FLR: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL4: 1
  • EAL2 augmented: 1
  • EAL2: 3
  • EAL7: 1
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E3 Basic: 1
  • ITSEC E6 Elevé: 1
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/tee_name/IBM/SE 12 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 453717
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /CreationDate: D:20240222154309+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155212+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
None
pdf_data/st_filename ANSSI-cible-CC-2023_58en.pdf anssi-cible-cc-2023_17en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.COR-: 1
    • T.PHYSI-: 1
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.USURP: 2
    • T.SKIMMING: 1
    • T.CORRUPT: 1
    • T.PHYSICAL: 1
  • A:
    • A.DEVICE_AUTH: 2
    • A.PERSO: 3
    • A.CDCVM: 3
    • A.DE-: 1
  • OE:
    • OE.CDCVM: 3
  • D:
    • D.OS: 16
    • D.SEP_SE: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
  • A:
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
    • A.CDCVM: 3
    • A.IPHONE_USER: 3
  • OT:
    • OT.-: 1
  • OE:
    • OE.CDCVM: 3
pdf_data/st_keywords/cc_claims/A
  • A.DEVICE_AUTH: 2
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.DE-: 1
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.IPHONE_USER: 3
pdf_data/st_keywords/cc_claims/A/A.DEVICE_AUTH 2 3
pdf_data/st_keywords/cc_claims/D/D.OS 17 16
pdf_data/st_keywords/cc_claims/T
  • T.COR-: 1
  • T.PHYSI-: 1
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
  • T.CORRUPT: 1
  • T.PHYSICAL: 1
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIMMING: 2
  • T.USURP: 2
pdf_data/st_keywords/cc_claims/T/T.CORRUPT 1 2
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL 1 2
pdf_data/st_keywords/cc_claims/T/T.SKIMMING 1 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.3: 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 2: 1
  • EAL2: 1
  • EAL 2 augmented: 1
  • EAL 2: 1
  • EAL2: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 23
  • FDP_ACC.2: 4
  • FDP_ACF: 19
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 4
  • FDP_UCT.1: 1
  • FDP_UIT: 4
  • FDP_UIT.1: 2
  • FDP_RIP.1: 15
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 10
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 9
  • FDP_IFC.1: 7
  • FDP_ETC.2: 2
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 20
  • FDP_ACF: 16
  • FDP_ACC.2: 4
  • FDP_ACF.1: 12
  • FDP_ETC: 7
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UIT: 10
  • FDP_UCT.1: 1
  • FDP_UIT.1: 2
  • FDP_RIP.1: 9
  • FDP_SDI.1: 9
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1.1: 1
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 8
  • FDP_ETC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 23 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 9 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 19 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ETC 8 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 7 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 15 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 10 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT 4 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 4 10
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 11
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 3
  • FIA_AFL: 7
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 4
  • FIA_ATD.1.1: 2
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
  • FIA_UID.2: 6
  • FIA_UAU.2: 8
  • FIA_UAU.5: 5
  • FIA_AFL: 8
  • FIA_UID.2.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 5
  • FIA_ATD.1: 5
  • FIA_SOS.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1.1: 2
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 2
  • FIA_UID.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 7 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 3 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 4 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 11 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 5 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 7
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 11 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL 4 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 2 6
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 6
  • FTP_ITC.1: 5
  • FTP_TRP.1: 2
  • FTP_ITC: 14
  • FTP_ITC.1: 7
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 4
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 6 14
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 5 7
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 2 4
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover: 1
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • to return to its User. Note: Defending against device re-use after phys- ical compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 140-3: 1
  • FIPS 140-3: 1
  • FIPS 140-2: 1
pdf_data/st_keywords/tee_name/IBM/SE 66 4
pdf_data/st_metadata
  • pdf_file_size_bytes: 2448380
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /CreationDate: D:20231108181326Z
  • /Creator: Word
  • /ModDate: D:20231108181351Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A15Bionic_iPhoneSE3_iOS16_SecurityTarget_v1.4.docx
  • pdf_hyperlinks:
None
dgst a5696b3d01538604 cb2e15c281fc9c89