Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58)
ANSSI-CC-2023/58
Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
2023-9-INF-4307
name Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58) Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
category ICs, Smart Cards and Smart Card-Related Devices and Systems Mobility
not_valid_before 2023-12-28 2024-05-15
not_valid_after 2028-12-28 2029-05-15
scheme FR ES
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_58en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09-ST.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_58en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09-INF-4307.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_58en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09_Certificado.pdf
state/cert/pdf_hash aa1308aebbe2495a638eab65bd5e80db992bed1e7718aa13053a75e4cbdfe30c 9f857eb27d27b882fa66587147ce2e161c10e870ee6589819afb3a744ac5e5cf
state/cert/txt_hash 5ed497c7602db8e0121211a132cad0cf0313a2fcb02e53227b0a7b2dc56c748c 65e87155c07d89368a1cf4bbca887fd0d7b6cb87efb577e08743b7f0a29acdb6
state/report/pdf_hash 14df361cd1dca720cf1ee0b52c5e1c240be46753fa00cacc4bc3b026cb34a295 90e1b36e2afd181b267758da46f8d2e04c957b252e870674d60cc86a8e1f7377
state/report/txt_hash 07c310aa55f4c1fcdc4dacba2631a1261617724d162b09969db735d1fe3d8149 42cc1b3e320b28e3f1810d4fa8ec2df043288a77ea7a4130c33a8d03422c22a2
state/st/pdf_hash 26c0804b543be2fcfd21ebba6f61d67ab3a2210e1ad677b066559fbeb4ddd088 5a14372c75c98be66dd3c9708f8a1cd04edb12aa2a1c66aff7f5ca35d75d056f
state/st/txt_hash 195057752a39cb59cdd8d30e8f4016804141ba865d6b474fce016369226d4a33 e5cfbae567dbec53aaec682baa60117cc379290700dd3d17c4b0eb2903094089
heuristics/cert_id ANSSI-CC-2023/58 2023-9-INF-4307
heuristics/cpe_matches cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:13.3.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.3:*:*:*:*:*:*:*
heuristics/extracted_versions 16.4.1 13.3.1
heuristics/scheme_data
  • product: Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1 (iOS 16.4.1 (build 20E252))
  • url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-se-3rd-generation-a15-bionic
  • description: Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC.
  • sponsor: APPLE INC.
  • developer: APPLE INC.
  • cert_id: ANSSI-CC-2023/58
  • level: EAL2+
  • expiration_date: 28 Décembre 2028
  • enhanced:
    • cert_id: ANSSI-CC-2023/58
    • certification_date: 28/12/2023
    • expiration_date: 28/12/2028
    • category: Divers
    • cc_version: Critères Communs version 3.1r5
    • developer: APPLE INC.
    • sponsor: APPLE INC.
    • evaluation_facility: THALES / CNES
    • level: EAL2+
    • protection_profile:
    • mutual_recognition: CCRA SOG-IS
    • augmented: ADV_FSP.3
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_58en.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_58en.pdf
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_58en.pdf
  • product: Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1012-strong-customer-authentication-for-apple-pay-on-macbook-air-2022-with-m2-running-macos-ventura-13-3-1
  • category: Others
  • manufacturer: Apple Inc.
  • certification_date: 15/05/2024
heuristics/scheme_data/product Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1 (iOS 16.4.1 (build 20E252)) Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
pdf_data/cert_filename certificat-CC-2023_58en.pdf 2023-09_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/58: 2
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 2 1
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 2
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/cert_metadata
  • pdf_file_size_bytes: 138204
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20240222154440+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155211+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 892676
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Trapped:
  • /Creator:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks:
pdf_data/cert_metadata//CreationDate D:20240222154440+01'00'
pdf_data/cert_metadata//Creator Acrobat PDFMaker 23 pour Word
pdf_data/cert_metadata//ModDate D:20240222155211+01'00'
pdf_data/cert_metadata//Producer Adobe PDF Library 23.1.175
pdf_data/cert_metadata/pdf_file_size_bytes 138204 892676
pdf_data/report_filename ANSSI-CC-2023_58en.pdf 2023-09-INF-4307.pdf
pdf_data/report_frontpage
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/58: 2
  • ES:
    • 2023-9-INF-4307- v1: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
  • ADV:
    • ADV_FSP.3: 8
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_FLR.3: 8
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_FSP.3: 1
  • ADV_FSP.3: 8
  • ADV_ARC.1: 1
  • ADV_TDS.1: 1
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.3 1 8
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_FLR.3: 8
  • ALC_CMC.2: 1
  • ALC_DEL.1: 1
  • ALC_FLR: 2
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL4: 1
  • EAL2 augmented: 1
  • EAL2: 8
  • EAL 1: 1
  • EAL 4: 2
  • EAL 2: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL2 3 8
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E3 Basic: 1
  • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_DAU.1: 1
    • FDP_ACC: 3
    • FDP_ACF: 3
    • FDP_ITT.1: 1
    • FDP_ETC: 1
    • FDP_ITC.1: 1
    • FDP_UCT: 2
    • FDP_UIT: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_UID.2: 1
    • FIA_UAU.2: 1
    • FIA_AFL: 3
    • FIA_UAU.6: 1
    • FIA_ATD.1: 1
  • FMT:
    • FMT_SMR.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_ITC.1: 1
    • FPT_RPL: 2
  • FTP:
    • FTP_ITC: 2
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
  • Applus:
    • Applus Laboratories: 4
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 12
pdf_data/report_metadata
  • pdf_file_size_bytes: 453717
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /CreationDate: D:20240222154309+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155212+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
  • pdf_file_size_bytes: 547654
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Creator:
  • /Trapped:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata//CreationDate D:20240222154309+01'00'
pdf_data/report_metadata//Creator Acrobat PDFMaker 23 pour Word
pdf_data/report_metadata//ModDate D:20240222155212+01'00'
pdf_data/report_metadata//Producer Adobe PDF Library 23.1.175
pdf_data/report_metadata/pdf_file_size_bytes 453717 547654
pdf_data/report_metadata/pdf_number_of_pages 13 17
pdf_data/st_filename ANSSI-cible-CC-2023_58en.pdf 2023-09-ST.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.COR-: 1
    • T.PHYSI-: 1
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.USURP: 2
    • T.SKIMMING: 1
    • T.CORRUPT: 1
    • T.PHYSICAL: 1
  • A:
    • A.DEVICE_AUTH: 2
    • A.PERSO: 3
    • A.CDCVM: 3
    • A.DE-: 1
  • OE:
    • OE.CDCVM: 3
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.USURP: 2
    • T.SKIMMING: 1
  • A:
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
    • A.WATCH_USER: 3
    • A.NO_EXTERNAL_KEY-: 2
    • A.NO_EVIL_ROOT_USER: 2
pdf_data/st_keywords/cc_claims/A
  • A.DEVICE_AUTH: 2
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.DE-: 1
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.WATCH_USER: 3
  • A.NO_EXTERNAL_KEY-: 2
  • A.NO_EVIL_ROOT_USER: 2
pdf_data/st_keywords/cc_claims/A/A.DEVICE_AUTH 2 3
pdf_data/st_keywords/cc_claims/T
  • T.COR-: 1
  • T.PHYSI-: 1
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
  • T.CORRUPT: 1
  • T.PHYSICAL: 1
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
pdf_data/st_keywords/cc_claims/T/T.CORRUPT 1 2
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL 1 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_FSP.3: 3
  • ADV_ARC.1: 3
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.3 2 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR: 1
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.3: 3
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 23
  • FDP_ACC.2: 4
  • FDP_ACF: 19
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 4
  • FDP_UCT.1: 1
  • FDP_UIT: 4
  • FDP_UIT.1: 2
  • FDP_RIP.1: 15
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 10
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 9
  • FDP_IFC.1: 7
  • FDP_ETC.2: 2
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 4
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 13
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 9
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 10
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 23 25
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 9 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 19 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 7 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 15 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 10 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT 4 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 4 10
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 11
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 3
  • FIA_AFL: 7
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 4
  • FIA_ATD.1.1: 2
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 11
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 3
  • FIA_AFL: 7
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_SOS.2: 4
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 4 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 5 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 14
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 11 16
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL 4 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 2 6
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 6
  • FTP_ITC.1: 5
  • FTP_TRP.1: 2
  • FTP_ITC: 14
  • FTP_ITC.1: 7
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 4
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 6 14
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 5 7
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 2 4
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover: 1
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Recov- ery An: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 140-3: 1
  • FIPS 140-3: 1
  • FIPS 140-2: 1
pdf_data/st_keywords/tee_name/IBM/SE 66 4
pdf_data/st_metadata
  • pdf_file_size_bytes: 2448380
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /CreationDate: D:20231108181326Z
  • /Creator: Word
  • /ModDate: D:20231108181351Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A15Bionic_iPhoneSE3_iOS16_SecurityTarget_v1.4.docx
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1325478
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Creator:
  • /Trapped:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks: https://support.apple.com/HT201222, https://support.apple.com/guide/security/welcome/web, https://checkcoverage.apple.com/, https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0, https://support.apple.com/apple-pay, https://www.apple.com/, https://support.apple.com/HT212225, https://support.apple.com/guide/mac-help/mh35902/mac, https://support.apple.com/HT201541, https://support.apple.com/en-gb/HT212030, https://support.apple.com/guide/macbook-air/set-up-your-mac-apd831707cb3/mac, https://support.apple.com/HT212190, https://support.apple.com/en-us/guide/macbook-air/apd3a3bbed27/2023/mac/13.4, https://support.apple.com/HT202860, https://lists.apple.com/mailman/listinfo/security-announce/, https://support.apple.com/HT201862, https://support.apple.com/HT204899, https://support.apple.com/en-us/HT204587, https://support.apple.com/en-us/HT201581, https://support.apple.com/HT201221, https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac, https://developer.apple.com/documentation/security/, https://support.apple.com/HT201220, https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web, https://support.apple.com/HT212749, https://support.apple.com/HT201260
pdf_data/st_metadata//CreationDate D:20231108181326Z
pdf_data/st_metadata//Creator Word
pdf_data/st_metadata//ModDate D:20231108181351Z
pdf_data/st_metadata//Producer Adobe Mac PDF Plug-in
pdf_data/st_metadata//Title Microsoft Word - [ST] iPhone_A15Bionic_iPhoneSE3_iOS16_SecurityTarget_v1.4.docx
pdf_data/st_metadata/pdf_file_size_bytes 2448380 1325478
pdf_data/st_metadata/pdf_hyperlinks https://support.apple.com/HT201222, https://support.apple.com/guide/security/welcome/web, https://checkcoverage.apple.com/, https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0, https://support.apple.com/apple-pay, https://www.apple.com/, https://support.apple.com/HT212225, https://support.apple.com/guide/mac-help/mh35902/mac, https://support.apple.com/HT201541, https://support.apple.com/en-gb/HT212030, https://support.apple.com/guide/macbook-air/set-up-your-mac-apd831707cb3/mac, https://support.apple.com/HT212190, https://support.apple.com/en-us/guide/macbook-air/apd3a3bbed27/2023/mac/13.4, https://support.apple.com/HT202860, https://lists.apple.com/mailman/listinfo/security-announce/, https://support.apple.com/HT201862, https://support.apple.com/HT204899, https://support.apple.com/en-us/HT204587, https://support.apple.com/en-us/HT201581, https://support.apple.com/HT201221, https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac, https://developer.apple.com/documentation/security/, https://support.apple.com/HT201220, https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web, https://support.apple.com/HT212749, https://support.apple.com/HT201260
dgst a5696b3d01538604 cfc7b542029e1c6d