name |
Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258)) |
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35) |
category |
Mobility |
Network and Network-Related Devices and Systems |
scheme |
FR |
IN |
status |
active |
archived |
not_valid_after |
27.03.2028 |
15.04.2022 |
not_valid_before |
27.03.2023 |
16.04.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_15.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ECI_Lightsoft.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_15fr-2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-ECI-NPT_EAL2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_15en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ECI_LightSoft-EMS-APT-NPT_Security_Targetv1.8.pdf |
manufacturer |
Apple Inc. |
ECI telecom India Pvt. Ltd. |
manufacturer_web |
https://www.apple.com/ |
https://www.ecitele.com/ |
security_level |
ADV_FSP.3, EAL2+, ALC_FLR.3 |
EAL2 |
dgst |
dbd63b4bb015bf39 |
6c9fe6528a0c24b3 |
heuristics/cert_id |
ANSSI-CC-2023/15 |
|
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.2, ASE_INT.1, ATE_FUN.1, ATE_COV.1, ADV_TDS.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMS.2, ADV_ARC.1, ALC_FLR.3, ALC_DEL.1, AGD_OPE.1, ASE_ECD.1, ADV_FSP.3, AVA_VAN.2 |
ALC_CMC.2, ASE_INT.1, ATE_FUN.1, ATE_COV.1, ADV_TDS.1, ASE_TSS.1, ADV_FSP.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMS.2, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ASE_ECD.1, AVA_VAN.2 |
heuristics/extracted_versions |
15.4.1 |
4.0, 11.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/15
- description: Le produit évalué est « Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1, Version 15.4.1 (build 19E258) » développé par APPLE INC. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers
- developer: APPLE INC.
- enhanced:
- augmented: ADV_FSP.3 et ALC_FLR.3
- category: Divers
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/15
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_15.pdf
- certification_date: 27.03.2023
- developer: APPLE INC.
- evaluation_facility: THALES / CNES
- expiration_date: 26.03.2028
- level: EAL2+
- mutual_recognition: CCRA SOG-IS
- protection_profile:
- sponsor: APPLE INC.
- expiration_date: 26.03.2028
- level: EAL2+
- product: Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258))
- sponsor: APPLE INC.
- url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-iphone-se-2nde-generation-avec
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-cc-2023_15.pdf |
ECI_Lightsoft.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate:
- /Creator:
- /Producer:
- /Subject:
- /Title:
- pdf_file_size_bytes: 2149641
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 3
|
pdf_data/report_filename |
anssi-cc-2023_15fr-2.pdf |
CR-ECI-NPT_EAL2.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ECI: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.MGMTNET: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.PROTCT: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ERTL:
- Common Criteria Test Laboratory, ERTL: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: Mitali Chatterjee
- /CreationDate: D:20190207153657+05'30'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20190207153657+05'30'
- /Producer: Microsoft® Word 2010
- /Title: LOGO
- pdf_file_size_bytes: 654812
- pdf_hyperlinks: http://www.commoncriteria-india.gov.in/
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
anssi-cible-cc-2023_15en.pdf |
ECI_LightSoft-EMS-APT-NPT_Security_Targetv1.8.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_FSP.3: 3
- ADV_TDS.1: 4
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR: 1
- ALC_FLR.3: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC: 21
- FDP_ACC.1: 9
- FDP_ACC.2: 4
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 16
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 4
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 8
- FDP_ETC.2: 2
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC.1: 7
- FDP_ITC: 5
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 4
- FDP_ITT.1.1: 1
- FDP_RIP.1: 13
- FDP_RIP.1.1: 1
- FDP_SDI.1: 10
- FDP_SDI.1.1: 1
- FDP_UCT: 3
- FDP_UCT.1: 1
- FDP_UIT: 4
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 7
- FIA_AFL.1: 3
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD.1: 4
- FIA_ATD.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 5
- FMT_MSA.1.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 11
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITC.1: 4
- FPT_ITC.1.1: 1
- FPT_RPL: 4
- FPT_RPL.1: 2
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
- FAU:
- FAU_ARP.1: 1
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_SAR.3: 1
- FAU_SEL.1: 1
- FAU_STG.2: 9
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 16
- FMT_MTD.1.1: 2
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CDCVM: 3
- A.DEVICE_AUTH: 3
- A.PERSO: 3
- D:
- OE:
- OT:
- T:
- T.CORRUPT: 2
- T.PHYSICAL: 2
- T.RECOVER: 2
- T.REPLAY: 2
- T.SILENT: 2
- T.SKIM-: 1
- T.SKIMMING: 1
- T.USURP: 2
|
- A:
- A.ECI: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.MGMTNETW: 1
- A.MGMTNETWORK: 2
- A.NOEVIL: 3
- A.NOTRST: 3
- A.PROTCT: 3
- O:
- O.ACCESS: 9
- O.AUDITS: 3
- O.EADMIN: 5
- O.IDAUTH: 13
- O.INFFLW: 5
- O.INVFLW: 1
- O.PROTCT: 5
- OE:
- OE.CREDEN: 4
- OE.ECI: 3
- OE.INSTAL: 4
- OE.MGMTNET: 1
- OE.MGMTNETWORK: 1
- OE.PERSON: 5
- OE.PHYCAL: 6
- OE.TIME: 4
- T:
- T.COMINT: 3
- T.INVSRC: 3
- T.LOSSOF: 3
- T.NOHALT: 3
- T.PRIVIL: 3
- T.UNAUTHDST: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
- out of scope: 2
- to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover: 1
|
|
pdf_data/st_metadata |
|
- /Author: User
- /Company: Hewlett-Packard
- /CreationDate: D:20170710162021+05'30'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20170710162027+05'30'
- /Producer: Adobe PDF Library 9.0
- /SourceModified: D:20170710104904
- /Title: SECURITY TARGET
- pdf_file_size_bytes: 299013
- pdf_hyperlinks:
|