name |
Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258)) |
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) |
category |
Mobility |
Mobility |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
27.03.2028 |
27.03.2028 |
not_valid_before |
27.03.2023 |
27.03.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_15.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_18.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_15fr-2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_18fr-2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_15en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_18en.pdf |
manufacturer |
Apple Inc. |
Apple Inc. |
manufacturer_web |
https://www.apple.com/ |
https://www.apple.com/ |
security_level |
ADV_FSP.3, EAL2+, ALC_FLR.3 |
ADV_FSP.3, EAL2+, ALC_FLR.3 |
dgst |
dbd63b4bb015bf39 |
e70bd18f9606a20a |
heuristics/cert_id |
ANSSI-CC-2023/15 |
ANSSI-CC-2023/18 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.2, ASE_INT.1, ATE_FUN.1, ATE_COV.1, ADV_TDS.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMS.2, ADV_ARC.1, ALC_FLR.3, ALC_DEL.1, AGD_OPE.1, ASE_ECD.1, ADV_FSP.3, AVA_VAN.2 |
ALC_CMC.2, ASE_INT.1, ATE_FUN.1, ATE_COV.1, ADV_TDS.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMS.2, ADV_ARC.1, ALC_FLR.3, ALC_DEL.1, AGD_OPE.1, ASE_ECD.1, ADV_FSP.3, AVA_VAN.2 |
heuristics/extracted_versions |
15.4.1 |
15.4.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/15
- description: Le produit évalué est « Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1, Version 15.4.1 (build 19E258) » développé par APPLE INC. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers
- developer: APPLE INC.
- enhanced:
- augmented: ADV_FSP.3 et ALC_FLR.3
- category: Divers
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/15
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_15.pdf
- certification_date: 27.03.2023
- developer: APPLE INC.
- evaluation_facility: THALES / CNES
- expiration_date: 26.03.2028
- level: EAL2+
- mutual_recognition: CCRA SOG-IS
- protection_profile:
- sponsor: APPLE INC.
- expiration_date: 26.03.2028
- level: EAL2+
- product: Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258))
- sponsor: APPLE INC.
- url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-iphone-se-2nde-generation-avec
|
- cert_id: ANSSI-CC-2023/18
- description: Le produit évalué est « Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1, Version 15.4.1 (build 19E258) » développé par APPLE INC. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour
- developer: APPLE INC.
- enhanced:
- augmented: ADV_FSP.3 et ALC_FLR.3
- category: Divers
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/18
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_18.pdf
- certification_date: 27.03.2023
- developer: APPLE INC.
- evaluation_facility: THALES / CNES
- expiration_date: 26.03.2028
- level: EAL2+
- mutual_recognition: CCRA SOG-IS
- protection_profile:
- sponsor: APPLE INC.
- expiration_date: 26.03.2028
- level: EAL2+
- product: Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258)
- sponsor: APPLE INC.
- url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-iphone-13-avec-a15-bionic
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-cc-2023_15.pdf |
certificat-cc-2023_18.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
anssi-cc-2023_15fr-2.pdf |
anssi-cc-2023_18fr-2.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
anssi-cible-cc-2023_15en.pdf |
anssi-cible-cc-2023_18en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_FSP.3: 3
- ADV_TDS.1: 4
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR: 1
- ALC_FLR.3: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_FSP.3: 3
- ADV_TDS.1: 4
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR: 1
- ALC_FLR.3: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC: 21
- FDP_ACC.1: 9
- FDP_ACC.2: 4
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 16
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 4
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 8
- FDP_ETC.2: 2
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC.1: 7
- FDP_ITC: 5
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 4
- FDP_ITT.1.1: 1
- FDP_RIP.1: 13
- FDP_RIP.1.1: 1
- FDP_SDI.1: 10
- FDP_SDI.1.1: 1
- FDP_UCT: 3
- FDP_UCT.1: 1
- FDP_UIT: 4
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 7
- FIA_AFL.1: 3
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD.1: 4
- FIA_ATD.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 5
- FMT_MSA.1.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 11
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITC.1: 4
- FPT_ITC.1.1: 1
- FPT_RPL: 4
- FPT_RPL.1: 2
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
- FDP:
- FDP_ACC: 23
- FDP_ACC.1: 11
- FDP_ACC.2: 4
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 19
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 4
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 8
- FDP_ETC.2: 2
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC.1: 9
- FDP_ITC: 5
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 4
- FDP_ITT.1.1: 1
- FDP_RIP.1: 15
- FDP_RIP.1.1: 1
- FDP_SDI.1: 10
- FDP_SDI.1.1: 1
- FDP_UCT: 9
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 7
- FIA_AFL.1: 3
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_SOS.2: 4
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 14
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITC.1: 4
- FPT_ITC.1.1: 1
- FPT_RPL: 8
- FPT_RPL.1: 6
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CDCVM: 3
- A.DEVICE_AUTH: 3
- A.PERSO: 3
- D:
- OE:
- OT:
- T:
- T.CORRUPT: 2
- T.PHYSICAL: 2
- T.RECOVER: 2
- T.REPLAY: 2
- T.SILENT: 2
- T.SKIM-: 1
- T.SKIMMING: 1
- T.USURP: 2
|
- A:
- A.CDCVM: 3
- A.DEVICE_AUTH: 3
- A.PERSO: 3
- A.WATCH_USER: 3
- D:
- OE:
- OT:
- T:
- T.CORRUPT: 2
- T.PHYSICAL: 2
- T.RECOVER: 2
- T.REPLAY: 2
- T.SILENT: 2
- T.SKIMMING: 2
- T.USURP: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS 140-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
- out of scope: 2
- to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover: 1
|
- OutOfScope:
- Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
- out of scope: 2
- ted to return to its User. Note: Defending against device re-use after phys- ical compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
False |
False |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
False |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |