Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
2023-9-INF-4307
Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))
ANSSI-CC-2023/19
name Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))
not_valid_before 2024-05-15 2023-03-27
not_valid_after 2029-05-15 2028-03-27
scheme ES FR
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09-ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_19en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09-INF-4307.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_19fr-2.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09_Certificado.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_19.pdf
state/cert/extract_ok True False
state/cert/pdf_hash 9f857eb27d27b882fa66587147ce2e161c10e870ee6589819afb3a744ac5e5cf a98b1eea87c2d2255425d55f7afdbc3247eb1c60f8c0238baaaf318fb8917cdd
state/cert/txt_hash 65e87155c07d89368a1cf4bbca887fd0d7b6cb87efb577e08743b7f0a29acdb6 defae4a13ae232a30f9fa6a5f4d6b225d19787f4da43fdaf179d5c0e53e04d60
state/report/extract_ok True False
state/report/pdf_hash 90e1b36e2afd181b267758da46f8d2e04c957b252e870674d60cc86a8e1f7377 ea3b0c48b41ec4fa131af6ae6636b28bc1f319fa9bbe170def0c9a3eb36beec3
state/report/txt_hash 42cc1b3e320b28e3f1810d4fa8ec2df043288a77ea7a4130c33a8d03422c22a2 905daf4881d52a2fa7466600f8d110518698dc07d4977cb29f101e4d3c7097d0
state/st/extract_ok True False
state/st/pdf_hash 5a14372c75c98be66dd3c9708f8a1cd04edb12aa2a1c66aff7f5ca35d75d056f cb5454791a072c000cb50e5e5c93c58cc6c954c5b598ae6a71127da88a89d060
state/st/txt_hash e5cfbae567dbec53aaec682baa60117cc379290700dd3d17c4b0eb2903094089 bf36bbc397a1bf669e563192a383146ed28ed9f776ec67c7ebeb0be3b8586ffb
heuristics/cert_id 2023-9-INF-4307 ANSSI-CC-2023/19
heuristics/cpe_matches cpe:2.3:o:apple:macos:13.3.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.3:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:12.3:*:*:*:*:*:*:*
heuristics/extracted_versions 13.3.1 12.3.1
heuristics/scheme_data
  • product: Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1012-strong-customer-authentication-for-apple-pay-on-macbook-air-2022-with-m2-running-macos-ventura-13-3-1
  • category: Others
  • manufacturer: Apple Inc.
  • certification_date: 15/05/2024
  • product: Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))
  • url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-mac-mini-avec-m1-et-magic
  • description: Le produit évalué est « Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1, Version 12.3.1 (build 21E258) » développé par APPLE INC. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paie
  • sponsor: APPLE INC.
  • developer: APPLE INC.
  • cert_id: ANSSI-CC-2023/19
  • level: EAL2+
  • expiration_date: 26 Mars 2028
  • enhanced:
    • cert_id: ANSSI-CC-2023/19
    • certification_date: 27/03/2023
    • expiration_date: 26/03/2028
    • category: Divers
    • cc_version: Critères Communs version 3.1r5
    • developer: APPLE INC.
    • sponsor: APPLE INC.
    • evaluation_facility: THALES / CNES
    • level: EAL2+
    • protection_profile:
    • mutual_recognition: CCRA SOG-IS
    • augmented: ADV_FSP.3 et ALC_FLR.3
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_19.pdf
heuristics/scheme_data/product Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))
pdf_data/cert_filename 2023-09_Certificado.pdf certificat-cc-2023_19.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/19: 2
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 1 2
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_metadata
  • pdf_file_size_bytes: 892676
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Trapped:
  • /Creator:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks:
None
pdf_data/report_filename 2023-09-INF-4307.pdf anssi-cc-2023_19fr-2.pdf
pdf_data/report_frontpage
  • FR:
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2023-9-INF-4307- v1: 1
  • FR:
    • ANSSI-CC-2023/19: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 8
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_FLR.3: 8
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 2
    • ALC_FLR: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_FSP.3: 8
  • ADV_ARC.1: 1
  • ADV_TDS.1: 1
  • ADV_FSP.3: 1
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.3 8 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.3: 8
  • ALC_CMC.2: 1
  • ALC_DEL.1: 1
  • ALC_FLR: 2
  • ALC_FLR.3: 2
  • ALC_FLR: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.3 8 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 8
  • EAL 1: 1
  • EAL 4: 2
  • EAL 2: 1
  • EAL2: 3
  • EAL7: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL2 8 3
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC Evaluation: 1
  • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_DAU.1: 1
    • FDP_ACC: 3
    • FDP_ACF: 3
    • FDP_ITT.1: 1
    • FDP_ETC: 1
    • FDP_ITC.1: 1
    • FDP_UCT: 2
    • FDP_UIT: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_UID.2: 1
    • FIA_UAU.2: 1
    • FIA_AFL: 3
    • FIA_UAU.6: 1
    • FIA_ATD.1: 1
  • FMT:
    • FMT_SMR.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_ITC.1: 1
    • FPT_RPL: 2
  • FTP:
    • FTP_ITC: 2
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 4
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 547654
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Creator:
  • /Trapped:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
None
pdf_data/st_filename 2023-09-ST.pdf anssi-cible-cc-2023_19en.pdf
pdf_data/st_keywords/cc_claims/A
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.WATCH_USER: 3
  • A.NO_EXTERNAL_KEY-: 2
  • A.NO_EVIL_ROOT_USER: 2
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.WATCH_USER: 3
  • A.NO_EVIL_ROOT_USER: 2
pdf_data/st_keywords/cc_claims/T
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
  • T.COR-: 1
  • T.PHYSIC-: 1
  • T.RECOV-: 1
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
  • T.RECOVER: 1
  • T.CORRUPT: 1
  • T.PHYSICAL: 1
pdf_data/st_keywords/cc_claims/T/T.CORRUPT 2 1
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL 2 1
pdf_data/st_keywords/cc_claims/T/T.RECOVER 2 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 4
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 13
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 9
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 10
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 23
  • FDP_ACF: 19
  • FDP_ACC.2: 4
  • FDP_ACF.1: 12
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 4
  • FDP_ITT: 8
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_ITT.1.1: 2
  • FDP_UCT: 9
  • FDP_UIT: 10
  • FDP_UCT.1: 1
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_RIP.1: 12
  • FDP_SDI.1: 9
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1.1: 1
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 13
  • FDP_IFC.1: 10
  • FDP_ETC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 25 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 10 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 23 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 9 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 13 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT 10 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2 4 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 14 11
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 16 17
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Recov- ery An: 1
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.Keyboard_Secret D.SEP_Watch* T.RECOV- ER: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 1325478
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Creator:
  • /Trapped:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks: https://support.apple.com/HT201222, https://support.apple.com/guide/security/welcome/web, https://checkcoverage.apple.com/, https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0, https://support.apple.com/apple-pay, https://www.apple.com/, https://support.apple.com/HT212225, https://support.apple.com/guide/mac-help/mh35902/mac, https://support.apple.com/HT201541, https://support.apple.com/en-gb/HT212030, https://support.apple.com/guide/macbook-air/set-up-your-mac-apd831707cb3/mac, https://support.apple.com/HT212190, https://support.apple.com/en-us/guide/macbook-air/apd3a3bbed27/2023/mac/13.4, https://support.apple.com/HT202860, https://lists.apple.com/mailman/listinfo/security-announce/, https://support.apple.com/HT201862, https://support.apple.com/HT204899, https://support.apple.com/en-us/HT204587, https://support.apple.com/en-us/HT201581, https://support.apple.com/HT201221, https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac, https://developer.apple.com/documentation/security/, https://support.apple.com/HT201220, https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web, https://support.apple.com/HT212749, https://support.apple.com/HT201260
None
dgst cfc7b542029e1c6d 0a22e011bdec54c4