name |
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) |
Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) |
category |
Mobility |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
27.03.2028 |
19.01.2029 |
not_valid_before |
27.03.2023 |
19.01.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_18.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_60en.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_18fr-2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_18en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf |
manufacturer |
Apple Inc. |
Apple Inc. |
manufacturer_web |
https://www.apple.com/ |
https://www.apple.com/ |
security_level |
ADV_FSP.3, ALC_FLR.3, EAL2+ |
EAL2+, ADV_FSP.3 |
dgst |
e70bd18f9606a20a |
6207e27699db6695 |
heuristics/cert_id |
ANSSI-CC-2023/18 |
ANSSI-CC-2023/60 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:* |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, ALC_FLR.3, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ASE_OBJ.2, ADV_FSP.3 |
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_ARC.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, ALC_CMC.2, AVA_VAN.2, ASE_INT.1, AGD_PRE.1, ASE_OBJ.2, ADV_FSP.3 |
heuristics/extracted_versions |
15.4.1 |
9.4 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2023-40417, CVE-2023-41988, CVE-2024-23207, CVE-2024-44185, CVE-2023-38600, CVE-2023-41065, CVE-2023-41997, CVE-2024-44171, CVE-2023-41968, CVE-2023-40420, CVE-2024-44176, CVE-2023-40424, CVE-2023-32396, CVE-2024-44233, CVE-2023-32352, CVE-2023-32403, CVE-2023-38133, CVE-2023-32388, CVE-2023-40419, CVE-2024-23218, CVE-2024-44234, CVE-2024-40822, CVE-2023-32354, CVE-2023-42937, CVE-2024-27832, CVE-2024-40857, CVE-2024-44215, CVE-2023-40400, CVE-2024-23225, CVE-2023-41174, CVE-2023-40452, CVE-2023-32368, CVE-2023-38598, CVE-2023-42888, CVE-2023-40432, CVE-2023-38592, CVE-2023-41982, CVE-2023-42852, CVE-2023-40528, CVE-2023-32381, CVE-2024-27863, CVE-2024-40795, CVE-2023-32404, CVE-2023-40399, CVE-2023-40427, CVE-2023-32399, CVE-2023-32357, CVE-2023-35993, CVE-2023-32445, CVE-2024-23213, CVE-2023-32433, CVE-2023-40408, CVE-2023-38596, CVE-2023-38136, CVE-2024-40818, CVE-2024-44198, CVE-2024-27884, CVE-2024-27815, CVE-2023-42949, CVE-2023-32441, CVE-2024-44282, CVE-2024-44155, CVE-2023-38594, CVE-2023-40409, CVE-2024-44183, CVE-2024-44297, CVE-2023-32402, CVE-2024-23212, CVE-2023-32390, CVE-2024-23296, CVE-2023-32408, CVE-2023-41070, CVE-2023-38593, CVE-2024-40774, CVE-2023-40413, CVE-2023-38606, CVE-2024-27808, CVE-2023-27930, CVE-2023-32413, CVE-2024-27840, CVE-2024-27814, CVE-2023-40456, CVE-2023-38572, CVE-2023-38565, CVE-2024-27880, CVE-2024-44144, CVE-2024-40813, CVE-2023-36495, CVE-2023-34352, CVE-2023-40410, CVE-2023-39434, CVE-2023-32384, CVE-2023-32400, CVE-2024-40789, CVE-2024-27800, CVE-2024-40809, CVE-2024-23217, CVE-2024-27805, CVE-2023-41061, CVE-2023-41074, CVE-2023-40403, CVE-2023-40412, CVE-2023-38590, CVE-2023-28191, CVE-2023-41073, CVE-2024-23204, CVE-2024-44302, CVE-2024-23215, CVE-2023-32407, CVE-2023-38595, CVE-2023-32391, CVE-2024-44187, CVE-2024-40787, CVE-2023-40448, CVE-2023-32373, CVE-2023-41981, CVE-2023-28204, CVE-2024-40793, CVE-2024-44194, CVE-2024-27806, CVE-2023-32376, CVE-2023-42899, CVE-2024-40850, CVE-2024-27823, CVE-2024-40776, CVE-2023-42849, CVE-2023-42883, CVE-2024-23251, CVE-2023-38604, CVE-2024-27851, CVE-2023-32394, CVE-2024-23206, CVE-2023-32434, CVE-2023-42957, CVE-2023-32428, CVE-2023-42890, CVE-2024-40806, CVE-2023-32417, CVE-2024-44269, CVE-2023-35074, CVE-2023-41071, CVE-2023-32420, CVE-2023-32425, CVE-2023-32389, CVE-2024-44191, CVE-2024-27828, CVE-2024-27801, CVE-2024-27820, CVE-2023-40429, CVE-2023-32416, CVE-2024-23210, CVE-2023-41068, CVE-2023-32398, CVE-2024-44170, CVE-2024-40780, CVE-2023-35990, CVE-2024-40835, CVE-2024-27830, CVE-2023-28202, CVE-2023-42866, CVE-2023-32361, CVE-2024-40785, CVE-2023-32372, CVE-2023-32734, CVE-2023-37450, CVE-2024-44273, CVE-2023-32392, CVE-2023-42936, CVE-2023-42898, CVE-2024-44274, CVE-2023-38580, CVE-2023-40414, CVE-2023-40520, CVE-2024-23208, CVE-2023-42846, CVE-2024-23223, CVE-2024-40788, CVE-2023-38599, CVE-2024-44285, CVE-2023-34425, CVE-2023-41254, CVE-2023-42947, CVE-2023-40447, CVE-2023-32412, CVE-2023-42914, CVE-2023-41984, CVE-2024-44255, CVE-2023-42950, CVE-2023-32423, CVE-2023-42893, CVE-2023-32409, CVE-2024-40815, CVE-2024-44239, CVE-2024-44244, CVE-2024-27838, CVE-2023-40454, CVE-2023-38611, CVE-2024-44254, CVE-2024-40799, CVE-2024-44232, CVE-2024-23211, CVE-2024-40779, CVE-2024-23282, CVE-2024-27811, CVE-2023-41976, CVE-2023-32432, CVE-2023-40395, CVE-2024-40812, CVE-2023-35984 |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/18
- description: Le produit évalué est « Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1, Version 15.4.1 (build 19E258) » développé par APPLE INC. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour
- developer: APPLE INC.
- enhanced:
- augmented: ADV_FSP.3 et ALC_FLR.3
- category: Divers
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/18
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_18.pdf
- certification_date: 2023-03-27
- developer: APPLE INC.
- evaluation_facility: THALES / CNES
- expiration_date: 2028-03-26
- level: EAL2+
- mutual_recognition: CCRA SOG-IS
- protection_profile:
- sponsor: APPLE INC.
- expiration_date: 2028-03-26
- level: EAL2+
- product: Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258)
- sponsor: APPLE INC.
- url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-iphone-13-avec-a15-bionic
|
- cert_id: ANSSI-CC-2023/60
- description: Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC.. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie
- developer: APPLE INC
- enhanced:
- augmented: ADV_FSP.3
- category: Divers
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/60
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf
- certification_date: 2024-01-19
- developer: APPLE INC
- evaluation_facility: THALES / CNES
- expiration_date: 2029-01-19
- level: EAL2+
- mutual_recognition: CCRA SOG-IS
- protection_profile:
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf
- sponsor: APPLE INC
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf
- expiration_date: 2029-01-19
- level: EAL2+
- product: Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)
- sponsor: APPLE INC
- url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-cc-2023_18.pdf |
certificat-CC-2023_60en.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20240222154647+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240222155209+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 138059
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
anssi-cc-2023_18fr-2.pdf |
ANSSI-CC-2023_60en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 3
- EAL2 augmented: 1
- EAL4: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
anssi-cible-cc-2023_18en.pdf |
ANSSI-cible-CC-2023_60en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_FSP.3: 3
- ADV_TDS.1: 4
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR: 1
- ALC_FLR.3: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_FSP.3: 2
- ADV_TDS.1: 4
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC: 23
- FDP_ACC.1: 11
- FDP_ACC.2: 4
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 19
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 4
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 8
- FDP_ETC.2: 2
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC.1: 9
- FDP_ITC: 5
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 4
- FDP_ITT.1.1: 1
- FDP_RIP.1: 15
- FDP_RIP.1.1: 1
- FDP_SDI.1: 10
- FDP_SDI.1.1: 1
- FDP_UCT: 9
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 7
- FIA_AFL.1: 3
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_SOS.2: 4
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 14
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITC.1: 4
- FPT_ITC.1.1: 1
- FPT_RPL: 8
- FPT_RPL.1: 6
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
- FDP:
- FDP_ACC: 22
- FDP_ACC.1: 11
- FDP_ACC.2: 4
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 20
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 4
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 7
- FDP_ETC.2: 2
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC.1: 8
- FDP_ITC: 5
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FDP_SDI.1: 9
- FDP_SDI.1.1: 1
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 9
- FIA_AFL.1: 5
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_SOS.2: 4
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 12
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITC.1: 4
- FPT_ITC.1.1: 1
- FPT_RPL: 8
- FPT_RPL.1: 6
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CDCVM: 3
- A.DEVICE_AUTH: 3
- A.PERSO: 3
- A.WATCH_USER: 3
- D:
- OE:
- OT:
- T:
- T.CORRUPT: 2
- T.PHYSICAL: 2
- T.RECOVER: 2
- T.REPLAY: 2
- T.SILENT: 2
- T.SKIMMING: 2
- T.USURP: 2
|
- A:
- A.CDCVM: 3
- A.DE-: 2
- A.DEVICE_AUTH: 1
- A.IPH-: 2
- A.IPHONE_USER: 1
- A.PERSO: 3
- D:
- OE:
- T:
- T.CORRUPT: 2
- T.PHYSICAL: 2
- T.RECOVER: 2
- T.REPLAY: 2
- T.SILENT: 2
- T.SKIMMING: 2
- T.USURP: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 140-3: 1
|
- FIPS:
- FIPS 140-2: 1
- FIPS 140-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
- out of scope: 2
- ted to return to its User. Note: Defending against device re-use after phys- ical compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
|
- OutOfScope:
- Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
- out of scope: 2
- pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
|
pdf_data/st_metadata |
|
- /CreationDate: D:20231109133713Z
- /Creator: Word
- /ModDate: D:20231109133737Z
- /Producer: Adobe Mac PDF Plug-in
- /Title: Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx
- pdf_file_size_bytes: 2365643
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
False |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |