Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
2023-9-INF-4307
Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201)
ANSSI-CC-2023/13
name Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201)
not_valid_before 2024-05-15 2023-03-01
not_valid_after 2029-05-15 2028-03-01
scheme ES FR
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09-ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2023_13en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09-INF-4307.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_13.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09_Certificado.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_13fr.pdf
state/cert/extract_ok True False
state/cert/pdf_hash 9f857eb27d27b882fa66587147ce2e161c10e870ee6589819afb3a744ac5e5cf 9ab78a6d84a931c25349727a05e8164268981aeb844204059e86a9b48cbbbca1
state/cert/txt_hash 65e87155c07d89368a1cf4bbca887fd0d7b6cb87efb577e08743b7f0a29acdb6 2b9b7c125e4dd47b75a16b986227011d5ccb8f4aa6d899708a4f6f6d90163ea2
state/report/extract_ok True False
state/report/pdf_hash 90e1b36e2afd181b267758da46f8d2e04c957b252e870674d60cc86a8e1f7377 85828919202436363549b23bf5bb44e35f2ce509cab7e7ca929cfbb1ec1a220a
state/report/txt_hash 42cc1b3e320b28e3f1810d4fa8ec2df043288a77ea7a4130c33a8d03422c22a2 3cd862a45c78db03af947d4ddd2ec5bf2edb7ee0ccd3b2238deabcde3f3f8973
state/st/extract_ok True False
state/st/pdf_hash 5a14372c75c98be66dd3c9708f8a1cd04edb12aa2a1c66aff7f5ca35d75d056f 6106e3e797dd032ada6848a812bc0e7ee805fc98068bbb19fe1b2b2a2f62cb0f
state/st/txt_hash e5cfbae567dbec53aaec682baa60117cc379290700dd3d17c4b0eb2903094089 c2cb1210156602f783668a8b2524a1afd5dfaf1fae0de9f2550d9ba1da811c10
heuristics/cert_id 2023-9-INF-4307 ANSSI-CC-2023/13
heuristics/cpe_matches cpe:2.3:o:apple:macos:13.3.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.3:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:7.4.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:watchos:7.4:*:*:*:*:*:*:*
heuristics/extracted_versions 13.3.1 7.4.1
heuristics/scheme_data
  • product: Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1012-strong-customer-authentication-for-apple-pay-on-macbook-air-2022-with-m2-running-macos-ventura-13-3-1
  • category: Others
  • manufacturer: Apple Inc.
  • certification_date: 15/05/2024
  • product: Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201)
  • url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-apple-watch-serie-4-executant
  • description: Le produit évalué est « Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1, Version 18T201 » développé par Apple Inc.. Apple Pay est une solution de paiement mobile développée par la société Apple Inc. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paieme
  • sponsor: Apple Inc.
  • developer: Apple Inc.
  • cert_id: ANSSI-CC-2023/13
  • level: EAL2+
  • expiration_date: 29 Février 2028
  • enhanced:
    • cert_id: ANSSI-CC-2023/13
    • certification_date: 01/03/2023
    • expiration_date: 29/02/2028
    • category: Divers
    • cc_version: Critères Communs version 3.1r5
    • developer: Apple Inc.
    • sponsor: Apple Inc.
    • evaluation_facility: SERMA SAFETY & SECURITY et OPPIDA
    • level: EAL2+
    • protection_profile: NA
    • mutual_recognition: CCRA SOG-IS
    • augmented: (ADV_FSP.3, ALC_FLR.3)
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_13.pdf
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_13fr.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-2023_13en.pdf
heuristics/scheme_data/product Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201)
pdf_data/cert_filename 2023-09_Certificado.pdf certificat-cc-2023_13fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/13: 2
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/cc_sar/ADV/ADV_FSP.3 1 2
pdf_data/cert_keywords/cc_sar/ALC/ALC_FLR.3 1 3
pdf_data/cert_keywords/cc_security_level/EAL
  • EAL2: 1
  • EAL2: 2
  • EAL4: 1
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 1 2
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
  • Serma:
    • Serma Safety & Security: 1
    • SERMA: 1
  • OPPIDA:
    • OPPIDA: 1
pdf_data/cert_metadata
  • pdf_file_size_bytes: 892676
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Trapped:
  • /Creator:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks:
None
pdf_data/report_filename 2023-09-INF-4307.pdf anssi-cc-2023_13.pdf
pdf_data/report_frontpage
  • FR:
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2023-9-INF-4307- v1: 1
  • FR:
    • ANSSI-CC-2023/13: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 8
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_FLR.3: 8
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ADV:
    • ADV_FSP.3: 2
  • ALC:
    • ALC_FLR.3: 3
    • ALC_FLR: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_FSP.3: 8
  • ADV_ARC.1: 1
  • ADV_TDS.1: 1
  • ADV_FSP.3: 2
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.3 8 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.3: 8
  • ALC_CMC.2: 1
  • ALC_DEL.1: 1
  • ALC_FLR: 2
  • ALC_FLR.3: 3
  • ALC_FLR: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.3 8 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 8
  • EAL 1: 1
  • EAL 4: 2
  • EAL 2: 1
  • EAL2: 4
  • EAL4: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL2 8 4
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC Evaluation: 1
  • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_DAU.1: 1
    • FDP_ACC: 3
    • FDP_ACF: 3
    • FDP_ITT.1: 1
    • FDP_ETC: 1
    • FDP_ITC.1: 1
    • FDP_UCT: 2
    • FDP_UIT: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_UID.2: 1
    • FIA_UAU.2: 1
    • FIA_AFL: 3
    • FIA_UAU.6: 1
    • FIA_ATD.1: 1
  • FMT:
    • FMT_SMR.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_ITC.1: 1
    • FPT_RPL: 2
  • FTP:
    • FTP_ITC: 2
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 4
  • Serma:
    • SERMA: 1
  • OPPIDA:
    • OPPIDA: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 547654
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Creator:
  • /Trapped:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
None
pdf_data/st_filename 2023-09-ST.pdf anssi-cible-2023_13en.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.USURP: 2
    • T.SKIMMING: 1
  • A:
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
    • A.WATCH_USER: 3
    • A.NO_EXTERNAL_KEY-: 2
    • A.NO_EVIL_ROOT_USER: 2
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
  • A:
    • A.DE-: 2
    • A.PERSO: 3
    • A.CDCVM: 3
    • A.IPH-: 2
    • A.DEVICE_AUTH: 1
    • A.IPHONE_USER: 1
  • OE:
    • OE.CDCVM: 3
pdf_data/st_keywords/cc_claims/A
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.WATCH_USER: 3
  • A.NO_EXTERNAL_KEY-: 2
  • A.NO_EVIL_ROOT_USER: 2
  • A.DE-: 2
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.IPH-: 2
  • A.DEVICE_AUTH: 1
  • A.IPHONE_USER: 1
pdf_data/st_keywords/cc_claims/A/A.DEVICE_AUTH 3 1
pdf_data/st_keywords/cc_claims/T
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIMMING: 2
  • T.USURP: 2
pdf_data/st_keywords/cc_claims/T/T.SKIMMING 1 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.3 3 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.3: 3
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.3: 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 2: 1
  • EAL2: 1
  • EAL 2 augmented: 1
  • EAL 2: 1
  • EAL2: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 4
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 13
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 9
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 10
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 22
  • FDP_ACC.2: 4
  • FDP_ACF: 20
  • FDP_ACF.1: 12
  • FDP_ETC: 7
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 12
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 9
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 8
  • FDP_ETC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 25 22
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 10 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 23 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_ETC 8 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 9 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 13 12
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 11
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 3
  • FIA_AFL: 7
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_SOS.2: 4
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 8
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL: 9
  • FIA_AFL.1: 5
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_SOS.2: 4
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 2
  • FIA_UID.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 7 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 3 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 11 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 14 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 7
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 16 12
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Recov- ery An: 1
  • out of scope: 2
  • settings for the device, operating system and applications. The Secure Element of the device is out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_keywords/crypto_scheme/MAC/MAC 1 4
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 140-3: 1
  • FIPS 140-2: 1
  • FIPS 140-2: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS 140-2 1 2
pdf_data/st_keywords/tee_name/IBM/SE 4 5
pdf_data/st_metadata
  • pdf_file_size_bytes: 1325478
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Creator:
  • /Trapped:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks: https://support.apple.com/HT201222, https://support.apple.com/guide/security/welcome/web, https://checkcoverage.apple.com/, https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0, https://support.apple.com/apple-pay, https://www.apple.com/, https://support.apple.com/HT212225, https://support.apple.com/guide/mac-help/mh35902/mac, https://support.apple.com/HT201541, https://support.apple.com/en-gb/HT212030, https://support.apple.com/guide/macbook-air/set-up-your-mac-apd831707cb3/mac, https://support.apple.com/HT212190, https://support.apple.com/en-us/guide/macbook-air/apd3a3bbed27/2023/mac/13.4, https://support.apple.com/HT202860, https://lists.apple.com/mailman/listinfo/security-announce/, https://support.apple.com/HT201862, https://support.apple.com/HT204899, https://support.apple.com/en-us/HT204587, https://support.apple.com/en-us/HT201581, https://support.apple.com/HT201221, https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac, https://developer.apple.com/documentation/security/, https://support.apple.com/HT201220, https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web, https://support.apple.com/HT212749, https://support.apple.com/HT201260
None
dgst cfc7b542029e1c6d 143764f03c38df35