This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) ANSSI-CC-2023/18 |
Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) ANSSI-CC-2023/60 |
|
---|---|---|
name | Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) | Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) |
category | Mobility | ICs, Smart Cards and Smart Card-Related Devices and Systems |
not_valid_before | 2023-03-27 | 2024-01-19 |
not_valid_after | 2028-03-27 | 2029-01-19 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_18en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_18fr-2.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_18.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_60en.pdf |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | 01c917da9205c5938540b6d32e0772a53387e3f1d7d8f3e4bab625cf478d6b03 | 5484f9225194fb80f4936f7fc05e17a6b4193024fabd540321f557163e7ea14e |
state/cert/txt_hash | 29c09ca9ca8c0a2a28ea27c8e0642a68dbec26f37bacb1e4033d50059b3c2ac5 | 1e00b0721b5e01d10f2e0ba7052fc0b0478f1196180bcee7b9bc21c27965fd4f |
state/report/extract_ok | False | True |
state/report/pdf_hash | 490d9c3dc871eb4a7e83e36813b9951dad1fb256079b1906ca2e9c07258de9e7 | c7fe41baa75b869067263842cc44bb4f43ffa4d0b42bc8c332d44a58d24f7808 |
state/report/txt_hash | 2064c67338126d58fa57ab4689536dd82223acc83a1981523d61686a4866497c | 73c0b750b752064dc9c6b7257313bf1ea6b2f89bee4040eb27ec6ab8dd2ed61f |
state/st/extract_ok | False | True |
state/st/pdf_hash | 0d2cf124e1d430a4ddf4a2e4b5a0889766b36cd8ba9632ad7b3d2c7fa6e55699 | e723453c42e1b2a7775e09dbac95077a96bfde5f91be9ffac6144e43102c1d99 |
state/st/txt_hash | 3cc366766c4e88db1d0f306f0f4872567d9d034d4b6e5505da1e636acda3369c | 577b9a17afa8f6ef94207e56754ef3e0d82be3ac29742c9ab7d913ad6464bb55 |
heuristics/cert_id | ANSSI-CC-2023/18 | ANSSI-CC-2023/60 |
heuristics/cpe_matches | None | cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:* |
heuristics/extracted_versions | 15.4.1 | 9.4 |
heuristics/related_cves | None | CVE-2023-32361, CVE-2023-40399, CVE-2024-27811, CVE-2024-27808, CVE-2023-34352, CVE-2023-35990, CVE-2024-27806, CVE-2024-23225, CVE-2024-40806, CVE-2023-35984, CVE-2023-40432, CVE-2023-32368, CVE-2024-44170, CVE-2023-42957, CVE-2023-41981, CVE-2023-40419, CVE-2023-38600, CVE-2023-32384, CVE-2023-42914, CVE-2023-40452, CVE-2023-38593, CVE-2023-32428, CVE-2024-27840, CVE-2023-40409, CVE-2023-38611, CVE-2023-41982, CVE-2023-32434, CVE-2023-42898, CVE-2024-27815, CVE-2024-27828, CVE-2024-23218, CVE-2024-40799, CVE-2023-42936, CVE-2023-32413, CVE-2024-44191, CVE-2023-32396, CVE-2024-23208, CVE-2024-40815, CVE-2024-23282, CVE-2023-32372, CVE-2024-27814, CVE-2023-32392, CVE-2024-23204, CVE-2023-40414, CVE-2023-32432, CVE-2023-38572, CVE-2023-28204, CVE-2023-38594, CVE-2023-38592, CVE-2024-44171, CVE-2023-38599, CVE-2023-40395, CVE-2023-28191, CVE-2023-40400, CVE-2023-42890, CVE-2024-40835, CVE-2024-23210, CVE-2023-40456, CVE-2023-32441, CVE-2023-41061, CVE-2023-32388, CVE-2023-40403, CVE-2024-40850, CVE-2023-37450, CVE-2024-44187, CVE-2024-27832, CVE-2023-32357, CVE-2024-27880, CVE-2023-42883, CVE-2023-40447, CVE-2023-38595, CVE-2023-32403, CVE-2023-42866, CVE-2023-32445, CVE-2024-40787, CVE-2023-32417, CVE-2024-44183, CVE-2023-38596, CVE-2023-32423, CVE-2024-27801, CVE-2023-42846, CVE-2024-40809, CVE-2023-32412, CVE-2023-41071, CVE-2024-40776, CVE-2023-40528, CVE-2023-41976, CVE-2023-42888, CVE-2023-38598, CVE-2023-41068, CVE-2023-40454, CVE-2024-44176, CVE-2023-32354, CVE-2023-41074, CVE-2023-42899, CVE-2023-42893, CVE-2023-38136, CVE-2024-23212, CVE-2024-23223, CVE-2024-27800, CVE-2023-38133, CVE-2024-27851, CVE-2023-40429, CVE-2024-40813, CVE-2023-34425, CVE-2023-41997, CVE-2023-42852, CVE-2023-32398, CVE-2023-41254, CVE-2023-32400, CVE-2023-40448, CVE-2024-23217, CVE-2023-32391, CVE-2024-40818, CVE-2023-42950, CVE-2024-40795, CVE-2024-23215, CVE-2024-27820, CVE-2023-41065, CVE-2023-32390, CVE-2023-41174, CVE-2024-44198, CVE-2024-23206, CVE-2024-40789, CVE-2023-38565, CVE-2023-41988, CVE-2023-40417, CVE-2023-32425, CVE-2024-40857, CVE-2023-32734, CVE-2023-38590, CVE-2024-27823, CVE-2024-40822, CVE-2024-40785, CVE-2023-38604, CVE-2024-40779, CVE-2023-42937, CVE-2024-27838, CVE-2023-40420, CVE-2024-40793, CVE-2023-28202, CVE-2024-40788, CVE-2023-32420, CVE-2023-27930, CVE-2024-27884, CVE-2023-41984, CVE-2023-32416, CVE-2023-32402, CVE-2024-27805, CVE-2023-32408, CVE-2023-40520, CVE-2023-38580, CVE-2023-32409, CVE-2023-32394, CVE-2023-32407, CVE-2023-40412, CVE-2024-40774, CVE-2023-32399, CVE-2023-42849, CVE-2023-39434, CVE-2023-42949, CVE-2024-27830, CVE-2023-40410, CVE-2023-32381, CVE-2023-40408, CVE-2023-32389, CVE-2023-32433, CVE-2023-41073, CVE-2024-23211, CVE-2023-32376, CVE-2023-42947, CVE-2024-23251, CVE-2023-40424, CVE-2024-40812, CVE-2023-41070, CVE-2024-23213, CVE-2023-36495, CVE-2024-27863, CVE-2023-32352, CVE-2023-35074, CVE-2023-40427, CVE-2023-32373, CVE-2023-40413, CVE-2023-38606, CVE-2024-40780, CVE-2023-35993, CVE-2024-23296, CVE-2023-32404, CVE-2024-23207, CVE-2023-41968 |
heuristics/scheme_data/cert_id | ANSSI-CC-2023/18 | ANSSI-CC-2023/60 |
heuristics/scheme_data/description | Le produit évalué est « Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1, Version 15.4.1 (build 19E258) » développé par APPLE INC. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour | Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC.. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie |
heuristics/scheme_data/developer | APPLE INC. | APPLE INC |
heuristics/scheme_data/enhanced |
|
|
heuristics/scheme_data/enhanced/augmented | ADV_FSP.3 et ALC_FLR.3 | ADV_FSP.3 |
heuristics/scheme_data/enhanced/cert_id | ANSSI-CC-2023/18 | ANSSI-CC-2023/60 |
heuristics/scheme_data/enhanced/cert_link | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_18.pdf | https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf |
heuristics/scheme_data/enhanced/certification_date | 27/03/2023 | 19/01/2024 |
heuristics/scheme_data/enhanced/developer | APPLE INC. | APPLE INC |
heuristics/scheme_data/enhanced/expiration_date | 26/03/2028 | 19/01/2029 |
heuristics/scheme_data/enhanced/sponsor | APPLE INC. | APPLE INC |
heuristics/scheme_data/expiration_date | 26 Mars 2028 | 19 Janvier 2029 |
heuristics/scheme_data/product | Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) | Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253) |
heuristics/scheme_data/sponsor | APPLE INC. | APPLE INC |
heuristics/scheme_data/url | https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-iphone-13-avec-a15-bionic | https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94 |
pdf_data/cert_filename | certificat-cc-2023_18.pdf | certificat-CC-2023_60en.pdf |
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/eval_facility | |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | anssi-cc-2023_18fr-2.pdf | ANSSI-CC-2023_60en.pdf |
pdf_data/report_keywords/cc_cert_id/FR |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/eval_facility | |
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_metadata | None |
|
pdf_data/st_filename | anssi-cible-cc-2023_18en.pdf | ANSSI-cible-CC-2023_60en.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_claims/A |
|
|
pdf_data/st_keywords/cc_claims/A/A.DEVICE_AUTH | 3 | 1 |
pdf_data/st_keywords/cc_claims/D/D.OS | 17 | 16 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.3 | 3 | 2 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC | 23 | 22 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF | 19 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ETC | 8 | 7 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 9 | 8 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 | 15 | 12 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 10 | 9 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT | 9 | 10 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL | 7 | 9 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 | 3 | 5 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 | 10 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 6 | 7 |
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 | 14 | 12 |
pdf_data/st_keywords/certification_process/OutOfScope |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/tee_name/IBM/SE | 6 | 4 |
pdf_data/st_metadata | None |
|
dgst | e70bd18f9606a20a | 6207e27699db6695 |