Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258)
ANSSI-CC-2023/18
Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61)
ANSSI-CC-2023/61
name Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61)
category Mobility ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_before 2023-03-27 2023-12-28
not_valid_after 2028-03-27 2028-12-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_18en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_61en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_18fr-2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_61en.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_18.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_61en.pdf
state/cert/extract_ok False True
state/cert/pdf_hash 01c917da9205c5938540b6d32e0772a53387e3f1d7d8f3e4bab625cf478d6b03 f9904c33a3da40eceacbea0a231cfd0a52340cb34599c1a160574f96336ebf57
state/cert/txt_hash 29c09ca9ca8c0a2a28ea27c8e0642a68dbec26f37bacb1e4033d50059b3c2ac5 964e8be87743c7c4d6827e3dfc178ca3755d651db7b5797d8209c52c1fffe466
state/report/extract_ok False True
state/report/pdf_hash 490d9c3dc871eb4a7e83e36813b9951dad1fb256079b1906ca2e9c07258de9e7 1aa2706b18f951f16655b8e5d76bb670d733f005b0144e5478c3756a92853151
state/report/txt_hash 2064c67338126d58fa57ab4689536dd82223acc83a1981523d61686a4866497c bedda77fe46aa241810159a366524aebfeefca15fd147bf8e3125949a7a5b3ff
state/st/extract_ok False True
state/st/pdf_hash 0d2cf124e1d430a4ddf4a2e4b5a0889766b36cd8ba9632ad7b3d2c7fa6e55699 e2ce81c073ea3d6f4b5b0fa8962b1889260c8e7eb293c3760bd60011a5032949
state/st/txt_hash 3cc366766c4e88db1d0f306f0f4872567d9d034d4b6e5505da1e636acda3369c a6cd365236aa1a5ecedfb11531f99c1581659e19f1a77698a403b81b075b9ade
heuristics/cert_id ANSSI-CC-2023/18 ANSSI-CC-2023/61
heuristics/cpe_matches None cpe:2.3:o:apple:macos:13.3.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.3:*:*:*:*:*:*:*
heuristics/extracted_versions 15.4.1 13.3.1
heuristics/related_cves None CVE-2023-32361, CVE-2023-41979, CVE-2023-35984, CVE-2023-40432, CVE-2023-42957, CVE-2023-42914, CVE-2023-40409, CVE-2023-32428, CVE-2024-40801, CVE-2023-42932, CVE-2023-38611, CVE-2023-41067, CVE-2024-40799, CVE-2024-27799, CVE-2023-41992, CVE-2024-40815, CVE-2023-38607, CVE-2024-44134, CVE-2023-40414, CVE-2023-32432, CVE-2023-38572, CVE-2023-38594, CVE-2023-39233, CVE-2024-40803, CVE-2023-42925, CVE-2023-40388, CVE-2023-32382, CVE-2023-40389, CVE-2023-32414, CVE-2023-32418, CVE-2024-23237, CVE-2023-42866, CVE-2023-4734, CVE-2024-23261, CVE-2023-42829, CVE-2023-41064, CVE-2024-40848, CVE-2024-40776, CVE-2023-32405, CVE-2023-32429, CVE-2023-38598, CVE-2023-40402, CVE-2023-40406, CVE-2023-40392, CVE-2023-42899, CVE-2024-44168, CVE-2023-40384, CVE-2023-32387, CVE-2023-38410, CVE-2024-27831, CVE-2023-34425, CVE-2024-23203, CVE-2023-32398, CVE-2024-44133, CVE-2023-32391, CVE-2024-40818, CVE-2024-23268, CVE-2023-32367, CVE-2023-38616, CVE-2024-27885, CVE-2023-32390, CVE-2023-40417, CVE-2024-40785, CVE-2024-27872, CVE-2024-40779, CVE-2023-32410, CVE-2024-44130, CVE-2024-27858, CVE-2024-44129, CVE-2023-40541, CVE-2024-44177, CVE-2024-27817, CVE-2024-27884, CVE-2024-40770, CVE-2023-32416, CVE-2023-42828, CVE-2024-44128, CVE-2024-44189, CVE-2023-32407, CVE-2023-40441, CVE-2024-40774, CVE-2023-4750, CVE-2024-27875, CVE-2023-4781, CVE-2023-32363, CVE-2023-42833, CVE-2023-41073, CVE-2024-44188, CVE-2023-38610, CVE-2023-32443, CVE-2023-35074, CVE-2023-40413, CVE-2024-40831, CVE-2024-40780, CVE-2023-35993, CVE-2024-23296, CVE-2023-32404, CVE-2024-44146, CVE-2023-41968, CVE-2023-40399, CVE-2023-42871, CVE-2023-32368, CVE-2023-38600, CVE-2023-40391, CVE-2023-32422, CVE-2023-38593, CVE-2024-40832, CVE-2023-40450, CVE-2023-38601, CVE-2023-38602, CVE-2023-40407, CVE-2024-40845, CVE-2024-40807, CVE-2023-40438, CVE-2023-32396, CVE-2024-27809, CVE-2024-44164, CVE-2023-32372, CVE-2023-40455, CVE-2024-44131, CVE-2024-44186, CVE-2023-32371, CVE-2023-40426, CVE-2023-41078, CVE-2023-32441, CVE-2023-32388, CVE-2023-38609, CVE-2024-40866, CVE-2023-40423, CVE-1999-0590, CVE-2023-28320, CVE-2023-4752, CVE-2024-23209, CVE-2023-38595, CVE-2023-32411, CVE-2023-32403, CVE-2023-32445, CVE-2024-40787, CVE-2023-32364, CVE-2023-42933, CVE-2023-40434, CVE-2024-44148, CVE-2023-32385, CVE-2023-41995, CVE-2023-32380, CVE-2023-40528, CVE-2024-44182, CVE-2023-42888, CVE-2023-32439, CVE-2024-40775, CVE-2024-44176, CVE-2023-42884, CVE-2023-36862, CVE-2023-40429, CVE-2024-27802, CVE-2023-40393, CVE-2024-40842, CVE-2023-32355, CVE-2023-40448, CVE-2023-42844, CVE-2023-38259, CVE-2024-40795, CVE-2024-44198, CVE-2023-38565, CVE-2023-28205, CVE-2023-32734, CVE-2023-42924, CVE-2023-40437, CVE-2023-38604, CVE-2023-42937, CVE-2024-23224, CVE-2023-42886, CVE-2023-38603, CVE-2023-40420, CVE-2024-44125, CVE-2024-40793, CVE-2023-28202, CVE-2023-32420, CVE-2023-41984, CVE-2023-41986, CVE-2024-27805, CVE-2024-23272, CVE-2023-32409, CVE-2023-23495, CVE-2023-38258, CVE-2023-40412, CVE-2023-41060, CVE-2023-41077, CVE-2023-32399, CVE-2023-38608, CVE-2023-42891, CVE-2024-44154, CVE-2024-27836, CVE-2024-40837, CVE-2023-29497, CVE-2023-32433, CVE-2023-42947, CVE-2023-32442, CVE-2024-27795, CVE-2023-40430, CVE-2023-41070, CVE-2023-36495, CVE-2023-42872, CVE-2023-38424, CVE-2024-23276, CVE-2023-38606, CVE-2023-42832, CVE-2024-23207, CVE-2024-27806, CVE-2022-3970, CVE-2024-44190, CVE-2024-40834, CVE-2024-40806, CVE-2024-40798, CVE-2023-35990, CVE-2023-40390, CVE-2024-40797, CVE-2023-42841, CVE-2023-41981, CVE-2023-32384, CVE-2024-44158, CVE-2024-27840, CVE-2024-44149, CVE-2023-34241, CVE-2024-23274, CVE-2023-32434, CVE-2023-41063, CVE-2023-38564, CVE-2023-41975, CVE-2023-41980, CVE-2023-42856, CVE-2024-27853, CVE-2024-44191, CVE-2023-37285, CVE-2023-32392, CVE-2024-40796, CVE-2024-23204, CVE-2023-42881, CVE-2023-38592, CVE-2023-38599, CVE-2023-40395, CVE-2023-28191, CVE-2023-40416, CVE-2024-40835, CVE-2023-38403, CVE-2023-40403, CVE-2024-40850, CVE-2024-44187, CVE-2023-32357, CVE-2023-38425, CVE-2023-32395, CVE-2024-40816, CVE-2023-32383, CVE-2024-44183, CVE-2023-38596, CVE-2024-40809, CVE-2023-41071, CVE-2023-38421, CVE-2023-38571, CVE-2023-42948, CVE-2023-2953, CVE-2023-28206, CVE-2023-40454, CVE-2023-42935, CVE-2023-42893, CVE-2024-27800, CVE-2024-23270, CVE-2024-40791, CVE-2023-32369, CVE-2024-40804, CVE-2023-41066, CVE-2023-38586, CVE-2024-27883, CVE-2023-32400, CVE-2023-38615, CVE-2024-40794, CVE-2023-42870, CVE-2023-28321, CVE-2023-35983, CVE-2023-38597, CVE-2024-40789, CVE-2024-40823, CVE-2024-44178, CVE-2024-40857, CVE-2024-44166, CVE-2023-38590, CVE-2023-41996, CVE-2024-40826, CVE-2024-27877, CVE-2024-23299, CVE-2023-42854, CVE-2023-42831, CVE-2023-41993, CVE-2023-32402, CVE-2024-40778, CVE-2023-37448, CVE-2023-40421, CVE-2023-42931, CVE-2024-40859, CVE-2024-44184, CVE-2023-38261, CVE-2023-39434, CVE-2024-27882, CVE-2023-28319, CVE-2023-40436, CVE-2024-40838, CVE-2023-28322, CVE-2023-41987, CVE-2023-38605, CVE-2023-32377, CVE-2023-32376, CVE-2023-32444, CVE-2023-32373, CVE-2023-40449, CVE-2024-23267, CVE-2023-42894, CVE-2024-44163, CVE-2024-40847, CVE-2024-27871, CVE-2023-34352, CVE-2024-23225, CVE-2024-44170, CVE-2023-40452, CVE-2024-40827, CVE-2023-42922, CVE-2024-40846, CVE-2023-42929, CVE-2024-40856, CVE-2023-32397, CVE-2023-42936, CVE-2023-32413, CVE-2023-40439, CVE-2023-32375, CVE-2023-40397, CVE-2024-23222, CVE-2023-42919, CVE-2023-28204, CVE-2023-40401, CVE-2023-40400, CVE-2023-42913, CVE-2023-42934, CVE-2023-42869, CVE-2023-37450, CVE-2024-44153, CVE-2024-40817, CVE-2023-40386, CVE-2024-27873, CVE-2024-27880, CVE-2024-40844, CVE-2024-27855, CVE-2023-4733, CVE-2023-40411, CVE-2023-41991, CVE-2023-32654, CVE-2023-42887, CVE-2023-36854, CVE-2023-32423, CVE-2023-32412, CVE-2023-42930, CVE-2023-42892, CVE-2023-30774, CVE-2024-27861, CVE-2023-32415, CVE-2023-41074, CVE-2001-0102, CVE-2024-23212, CVE-2023-27940, CVE-2023-38133, CVE-2023-41079, CVE-2023-42876, CVE-2024-27887, CVE-2023-32360, CVE-2023-41994, CVE-2024-44152, CVE-2023-41254, CVE-2024-44135, CVE-2024-40833, CVE-2023-22809, CVE-2024-44165, CVE-2024-40843, CVE-2023-32421, CVE-2023-41065, CVE-2023-32379, CVE-2024-23206, CVE-2023-32401, CVE-2023-42943, CVE-2024-44161, CVE-2023-42896, CVE-2024-27823, CVE-2024-40822, CVE-2024-23266, CVE-2023-42826, CVE-2024-27792, CVE-2024-40788, CVE-2024-44151, CVE-2023-27930, CVE-2023-41232, CVE-2024-40786, CVE-2023-38580, CVE-2023-32408, CVE-2023-38612, CVE-2023-32394, CVE-2023-42849, CVE-2023-42949, CVE-2023-40410, CVE-2023-32381, CVE-2023-32386, CVE-2024-27860, CVE-2023-32389, CVE-2024-44181, CVE-2023-40422, CVE-2024-23275, CVE-2023-40424, CVE-2024-27881, CVE-2024-27863, CVE-2023-32352, CVE-2023-40427, CVE-2023-40385, CVE-2024-40860
heuristics/scheme_data/cert_id ANSSI-CC-2023/18 ANSSI-CC-2023/61
heuristics/scheme_data/description Le produit évalué est « Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1, Version 15.4.1 (build 19E258) » développé par APPLE INC. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour Le produit évalué est « Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1, macOS Ventura 13.3.1 (build 22E261) » développé par APPLE INC.
heuristics/scheme_data/enhanced
  • cert_id: ANSSI-CC-2023/18
  • certification_date: 27/03/2023
  • expiration_date: 26/03/2028
  • category: Divers
  • cc_version: Critères Communs version 3.1r5
  • developer: APPLE INC.
  • sponsor: APPLE INC.
  • evaluation_facility: THALES / CNES
  • level: EAL2+
  • protection_profile:
  • mutual_recognition: CCRA SOG-IS
  • augmented: ADV_FSP.3 et ALC_FLR.3
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_18.pdf
  • cert_id: ANSSI-CC-2023/61
  • certification_date: 28/12/2023
  • expiration_date: 28/12/2028
  • category: Divers
  • cc_version: Critères Communs version 3.1r5
  • developer: APPLE INC.
  • sponsor: APPLE INC.
  • evaluation_facility: THALES / CNES
  • level: EAL2+
  • protection_profile:
  • mutual_recognition: CCRA SOG-IS
  • augmented: ADV_FSP.3
  • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_61en.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_61en.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_61en.pdf
heuristics/scheme_data/enhanced/augmented ADV_FSP.3 et ALC_FLR.3 ADV_FSP.3
heuristics/scheme_data/enhanced/cert_id ANSSI-CC-2023/18 ANSSI-CC-2023/61
heuristics/scheme_data/enhanced/cert_link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_18.pdf https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_61en.pdf
heuristics/scheme_data/enhanced/certification_date 27/03/2023 28/12/2023
heuristics/scheme_data/enhanced/expiration_date 26/03/2028 28/12/2028
heuristics/scheme_data/expiration_date 26 Mars 2028 28 Décembre 2028
heuristics/scheme_data/product Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 macOS Ventura 13.3.1 (build 22E261)
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-pour-apple-pay-sur-iphone-13-avec-a15-bionic https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-mac-mini-m2-and-magic-keyboard-touch-id
pdf_data/cert_filename certificat-cc-2023_18.pdf certificat-CC-2023_61en.pdf
pdf_data/cert_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/18: 2
  • ANSSI-CC-2023/61: 2
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
  • ADV:
    • ADV_FSP.3: 1
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 2
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 136188
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20240222154936+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155209+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks:
pdf_data/report_filename anssi-cc-2023_18fr-2.pdf ANSSI-CC-2023_61en.pdf
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/18: 2
  • ANSSI-CC-2023/61: 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.3: 2
  • ALC_FLR: 1
  • ALC_FLR: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL7: 1
  • EAL2: 3
  • EAL4: 1
  • EAL2 augmented: 1
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E6 Elevé: 1
  • ITSEC E3 Basic: 1
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_metadata None
  • pdf_file_size_bytes: 396092
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /CreationDate: D:20240222155049+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155208+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
pdf_data/st_filename anssi-cible-cc-2023_18en.pdf ANSSI-cible-CC-2023_61en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
  • A:
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
    • A.CDCVM: 3
    • A.WATCH_USER: 3
  • OT:
    • OT.-: 1
  • OE:
    • OE.CDCVM: 3
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.COR-: 1
    • T.PHYSI-: 1
    • T.RE-: 1
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.USURP: 2
    • T.SKIMMING: 1
    • T.RECOVER: 1
    • T.CORRUPT: 1
    • T.PHYSICAL: 1
  • A:
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
    • A.WATCH_USER: 3
    • A.NO_EVIL_ROOT_USER: 2
pdf_data/st_keywords/cc_claims/A
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.WATCH_USER: 3
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.WATCH_USER: 3
  • A.NO_EVIL_ROOT_USER: 2
pdf_data/st_keywords/cc_claims/T
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIMMING: 2
  • T.USURP: 2
  • T.COR-: 1
  • T.PHYSI-: 1
  • T.RE-: 1
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
  • T.RECOVER: 1
  • T.CORRUPT: 1
  • T.PHYSICAL: 1
pdf_data/st_keywords/cc_claims/T/T.CORRUPT 2 1
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL 2 1
pdf_data/st_keywords/cc_claims/T/T.RECOVER 2 1
pdf_data/st_keywords/cc_claims/T/T.SKIMMING 2 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.3: 3
  • ADV_ARC.1: 3
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.3 3 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.3: 3
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 1 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 23
  • FDP_ACF: 19
  • FDP_ITT.1: 4
  • FDP_ACC.2: 4
  • FDP_ACF.1: 12
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 9
  • FDP_UIT: 10
  • FDP_UCT.1: 1
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_RIP.1: 15
  • FDP_SDI.1: 10
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1.1: 1
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 4
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_ITT: 8
  • FDP_ITT.1.1: 2
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 13
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 9
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 13
  • FDP_IFC.1: 10
  • FDP_ETC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 23 25
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 11 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 19 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 9 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 5 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 15 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 10 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT 9 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 10 11
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 14 17
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL 8 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 6 4
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • ted to return to its User. Note: Defending against device re-use after phys- ical compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • to re- turn to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.Keyboard_Secret D.SEP_Watch* Strong: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tee_name/IBM/SE 6 4
pdf_data/st_metadata None
  • pdf_file_size_bytes: 2390078
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /CreationDate: D:20231108164206Z
  • /Creator: Word
  • /ModDate: D:20231108164224Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] Macmini_M2_Keyboard_macOS13_SecurityTarget_v1.5.docx
  • pdf_hyperlinks:
dgst e70bd18f9606a20a 7ace7bd5d375474d