This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
MONEO electronic wallet card carrier (ST19SF16B RCL v. B303) and PSAM retailer security module (ST19SF16B RCL v. C103) ANSSI-CC-1999/03 |
Strong Customer Authentication for Apple Pay on iPhone 15 Pro with A17 Pro running iOS 17.4(iOS 17.4 (Build 21E219)) ANSSI-CC-2024/40 |
|
---|---|---|
name | MONEO electronic wallet card carrier (ST19SF16B RCL v. B303) and PSAM retailer security module (ST19SF16B RCL v. C103) | Strong Customer Authentication for Apple Pay on iPhone 15 Pro with A17 Pro running iOS 17.4(iOS 17.4 (Build 21E219)) |
status | archived | active |
not_valid_after | 01.09.2019 | 08.01.2030 |
not_valid_before | 01.01.1999 | 08.01.2025 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_40fr.pdf | |
report_link | https://www.commoncriteriaportal.org/files/epfiles/9903.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_40fr.pdf |
st_link | https://www.commoncriteriaportal.org/files/epfiles/ | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_40en.pdf |
manufacturer | Société Européenne de Monnaie Electronique | Apple Inc. |
manufacturer_web | https://www.apple.com/ | |
security_level | EAL1+, AVA_VLA.2 | ADV_FSP.3, EAL2+, ALC_FLR.3 |
dgst | b99f93793f333c8a | ecbeeaa7c47eedea |
heuristics/cert_id | ANSSI-CC-1999/03 | ANSSI-CC-2024/40 |
heuristics/extracted_sars | ASE_INT.1, ADV_FSP.1, ASE_OBJ.1, ASE_PPC.1, AGD_USR.1, ATE_IND.1, ADV_RCR.1, ASE_REQ.1, ASE_TSS.1, AGD_ADM.1, ASE_DES.1, ASE_SRE.1, AVA_VLA.2, ASE_ENV.1 | ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ALC_FLR.3, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, ADV_TDS.1, ADV_FSP.3, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1 |
heuristics/extracted_versions | - | 17.4 |
protection_profile_links | {} | {} |
pdf_data/cert_filename | Certificat-ANSSI-CC-2024_40fr.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 9903.pdf | ANSSI-CC-2024_40fr.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ANSSI-Cible-CC-2024_40en.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor | ||
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function | ||
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness | ||
pdf_data/st_keywords/cipher_mode | ||
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library | ||
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis | ||
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |