Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
2023-9-INF-4307
Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61)
ANSSI-CC-2023/61
name Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61)
category Mobility ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_before 2024-05-15 2023-12-28
not_valid_after 2029-05-15 2028-12-28
scheme ES FR
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09-ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_61en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09-INF-4307.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_61en.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-09_Certificado.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_61en.pdf
state/cert/pdf_hash 9f857eb27d27b882fa66587147ce2e161c10e870ee6589819afb3a744ac5e5cf f9904c33a3da40eceacbea0a231cfd0a52340cb34599c1a160574f96336ebf57
state/cert/txt_hash 65e87155c07d89368a1cf4bbca887fd0d7b6cb87efb577e08743b7f0a29acdb6 964e8be87743c7c4d6827e3dfc178ca3755d651db7b5797d8209c52c1fffe466
state/report/pdf_hash 90e1b36e2afd181b267758da46f8d2e04c957b252e870674d60cc86a8e1f7377 1aa2706b18f951f16655b8e5d76bb670d733f005b0144e5478c3756a92853151
state/report/txt_hash 42cc1b3e320b28e3f1810d4fa8ec2df043288a77ea7a4130c33a8d03422c22a2 bedda77fe46aa241810159a366524aebfeefca15fd147bf8e3125949a7a5b3ff
state/st/pdf_hash 5a14372c75c98be66dd3c9708f8a1cd04edb12aa2a1c66aff7f5ca35d75d056f e2ce81c073ea3d6f4b5b0fa8962b1889260c8e7eb293c3760bd60011a5032949
state/st/txt_hash e5cfbae567dbec53aaec682baa60117cc379290700dd3d17c4b0eb2903094089 a6cd365236aa1a5ecedfb11531f99c1581659e19f1a77698a403b81b075b9ade
heuristics/cert_id 2023-9-INF-4307 ANSSI-CC-2023/61
heuristics/scheme_data
  • product: Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1012-strong-customer-authentication-for-apple-pay-on-macbook-air-2022-with-m2-running-macos-ventura-13-3-1
  • category: Others
  • manufacturer: Apple Inc.
  • certification_date: 15/05/2024
  • product: Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 macOS Ventura 13.3.1 (build 22E261)
  • url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-mac-mini-m2-and-magic-keyboard-touch-id
  • description: Le produit évalué est « Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1, macOS Ventura 13.3.1 (build 22E261) » développé par APPLE INC.
  • sponsor: APPLE INC.
  • developer: APPLE INC.
  • cert_id: ANSSI-CC-2023/61
  • level: EAL2+
  • expiration_date: 28 Décembre 2028
  • enhanced:
    • cert_id: ANSSI-CC-2023/61
    • certification_date: 28/12/2023
    • expiration_date: 28/12/2028
    • category: Divers
    • cc_version: Critères Communs version 3.1r5
    • developer: APPLE INC.
    • sponsor: APPLE INC.
    • evaluation_facility: THALES / CNES
    • level: EAL2+
    • protection_profile:
    • mutual_recognition: CCRA SOG-IS
    • augmented: ADV_FSP.3
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_61en.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_61en.pdf
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_61en.pdf
heuristics/scheme_data/product Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 macOS Ventura 13.3.1 (build 22E261)
pdf_data/cert_filename 2023-09_Certificado.pdf certificat-CC-2023_61en.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/61: 2
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
  • ADV:
    • ADV_FSP.3: 1
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 1 2
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
  • Thales:
    • THALES/CNES: 2
pdf_data/cert_metadata
  • pdf_file_size_bytes: 892676
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Trapped:
  • /Creator:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 136188
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20240222154936+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155209+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks:
pdf_data/cert_metadata//CreationDate D:20240222154936+01'00'
pdf_data/cert_metadata//Creator Acrobat PDFMaker 23 pour Word
pdf_data/cert_metadata//ModDate D:20240222155209+01'00'
pdf_data/cert_metadata//Producer Adobe PDF Library 23.1.175
pdf_data/cert_metadata/pdf_file_size_bytes 892676 136188
pdf_data/report_filename 2023-09-INF-4307.pdf ANSSI-CC-2023_61en.pdf
pdf_data/report_frontpage
  • FR:
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2023-9-INF-4307- v1: 1
  • FR:
    • ANSSI-CC-2023/61: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 8
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_FLR.3: 8
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_FSP.3: 8
  • ADV_ARC.1: 1
  • ADV_TDS.1: 1
  • ADV_FSP.3: 1
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.3 8 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.3: 8
  • ALC_CMC.2: 1
  • ALC_DEL.1: 1
  • ALC_FLR: 2
  • ALC_FLR: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 2 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 8
  • EAL 1: 1
  • EAL 4: 2
  • EAL 2: 1
  • EAL2: 3
  • EAL4: 1
  • EAL2 augmented: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL2 8 3
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC Evaluation: 1
  • ITSEC E3 Basic: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_DAU.1: 1
    • FDP_ACC: 3
    • FDP_ACF: 3
    • FDP_ITT.1: 1
    • FDP_ETC: 1
    • FDP_ITC.1: 1
    • FDP_UCT: 2
    • FDP_UIT: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_UID.2: 1
    • FIA_UAU.2: 1
    • FIA_AFL: 3
    • FIA_UAU.6: 1
    • FIA_ATD.1: 1
  • FMT:
    • FMT_SMR.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_ITC.1: 1
    • FPT_RPL: 2
  • FTP:
    • FTP_ITC: 2
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 4
  • Thales:
    • THALES/CNES: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 547654
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Creator:
  • /Trapped:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
  • pdf_file_size_bytes: 396092
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /CreationDate: D:20240222155049+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155208+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
pdf_data/report_metadata//CreationDate D:20240222155049+01'00'
pdf_data/report_metadata//Creator Acrobat PDFMaker 23 pour Word
pdf_data/report_metadata//ModDate D:20240222155208+01'00'
pdf_data/report_metadata//Producer Adobe PDF Library 23.1.175
pdf_data/report_metadata/pdf_file_size_bytes 547654 396092
pdf_data/report_metadata/pdf_number_of_pages 17 13
pdf_data/st_filename 2023-09-ST.pdf ANSSI-cible-CC-2023_61en.pdf
pdf_data/st_keywords/cc_claims/A
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.WATCH_USER: 3
  • A.NO_EXTERNAL_KEY-: 2
  • A.NO_EVIL_ROOT_USER: 2
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.WATCH_USER: 3
  • A.NO_EVIL_ROOT_USER: 2
pdf_data/st_keywords/cc_claims/T
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
  • T.COR-: 1
  • T.PHYSI-: 1
  • T.RE-: 1
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
  • T.RECOVER: 1
  • T.CORRUPT: 1
  • T.PHYSICAL: 1
pdf_data/st_keywords/cc_claims/T/T.CORRUPT 2 1
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL 2 1
pdf_data/st_keywords/cc_claims/T/T.RECOVER 2 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.3: 3
  • ADV_ARC.1: 3
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.3 3 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.3: 3
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 1 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 4
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 13
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 9
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 10
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 4
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_ITT: 8
  • FDP_ITT.1.1: 2
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 13
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 9
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 13
  • FDP_IFC.1: 10
  • FDP_ETC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 10 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 9 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 14 11
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 16 17
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL 8 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 6 4
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Recov- ery An: 1
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • to re- turn to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.Keyboard_Secret D.SEP_Watch* Strong: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 1325478
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /Title:
  • /CreationDate:
  • /Producer:
  • /ModDate:
  • /Creator:
  • /Trapped:
  • /Keywords:
  • /Author:
  • /Subject:
  • pdf_hyperlinks: https://support.apple.com/HT201222, https://support.apple.com/guide/security/welcome/web, https://checkcoverage.apple.com/, https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0, https://support.apple.com/apple-pay, https://www.apple.com/, https://support.apple.com/HT212225, https://support.apple.com/guide/mac-help/mh35902/mac, https://support.apple.com/HT201541, https://support.apple.com/en-gb/HT212030, https://support.apple.com/guide/macbook-air/set-up-your-mac-apd831707cb3/mac, https://support.apple.com/HT212190, https://support.apple.com/en-us/guide/macbook-air/apd3a3bbed27/2023/mac/13.4, https://support.apple.com/HT202860, https://lists.apple.com/mailman/listinfo/security-announce/, https://support.apple.com/HT201862, https://support.apple.com/HT204899, https://support.apple.com/en-us/HT204587, https://support.apple.com/en-us/HT201581, https://support.apple.com/HT201221, https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac, https://developer.apple.com/documentation/security/, https://support.apple.com/HT201220, https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web, https://support.apple.com/HT212749, https://support.apple.com/HT201260
  • pdf_file_size_bytes: 2390078
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /CreationDate: D:20231108164206Z
  • /Creator: Word
  • /ModDate: D:20231108164224Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] Macmini_M2_Keyboard_macOS13_SecurityTarget_v1.5.docx
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20231108164206Z
pdf_data/st_metadata//Creator Word
pdf_data/st_metadata//ModDate D:20231108164224Z
pdf_data/st_metadata//Producer Adobe Mac PDF Plug-in
pdf_data/st_metadata//Title Microsoft Word - [ST] Macmini_M2_Keyboard_macOS13_SecurityTarget_v1.5.docx
pdf_data/st_metadata/pdf_file_size_bytes 1325478 2390078
pdf_data/st_metadata/pdf_hyperlinks https://support.apple.com/HT201222, https://support.apple.com/guide/security/welcome/web, https://checkcoverage.apple.com/, https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0, https://support.apple.com/apple-pay, https://www.apple.com/, https://support.apple.com/HT212225, https://support.apple.com/guide/mac-help/mh35902/mac, https://support.apple.com/HT201541, https://support.apple.com/en-gb/HT212030, https://support.apple.com/guide/macbook-air/set-up-your-mac-apd831707cb3/mac, https://support.apple.com/HT212190, https://support.apple.com/en-us/guide/macbook-air/apd3a3bbed27/2023/mac/13.4, https://support.apple.com/HT202860, https://lists.apple.com/mailman/listinfo/security-announce/, https://support.apple.com/HT201862, https://support.apple.com/HT204899, https://support.apple.com/en-us/HT204587, https://support.apple.com/en-us/HT201581, https://support.apple.com/HT201221, https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac, https://developer.apple.com/documentation/security/, https://support.apple.com/HT201220, https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web, https://support.apple.com/HT212749, https://support.apple.com/HT201260
dgst cfc7b542029e1c6d 7ace7bd5d375474d