Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Strong Customer Authentication for Apple Pay on Apple Watch Series 10 with S10 running watchOS 11.4(watchOS 11.4 (build 22T251)) (ANSSI-CC-2025/35)
ANSSI-CC-2025/35
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35)
None
name Strong Customer Authentication for Apple Pay on Apple Watch Series 10 with S10 running watchOS 11.4(watchOS 11.4 (build 22T251)) (ANSSI-CC-2025/35) Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35)
category ICs, Smart Cards and Smart Card-Related Devices and Systems Network and Network-Related Devices and Systems
scheme FR IN
status active archived
not_valid_after 23.10.2030 15.04.2022
not_valid_before 23.10.2025 16.04.2017
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_35fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ECI_Lightsoft.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_35fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-ECI-NPT_EAL2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2025_35en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ECI_LightSoft-EMS-APT-NPT_Security_Targetv1.8.pdf
manufacturer Apple Inc. ECI telecom India Pvt. Ltd.
manufacturer_web https://www.apple.com/ https://www.ecitele.com/
security_level EAL2+, ADV_FSP.3, ALC_FLR.3 EAL2
dgst fc225d3d10cfcfb6 6c9fe6528a0c24b3
heuristics/cert_id ANSSI-CC-2025/35
heuristics/cpe_matches cpe:2.3:o:apple:watchos:11.4:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2025-43503, CVE-2026-28863, CVE-2025-31217, CVE-2025-43317, CVE-2025-31251, CVE-2025-43462, CVE-2025-43480, CVE-2025-43349, CVE-2026-20611, CVE-2026-20687, CVE-2025-43303, CVE-2025-43230, CVE-2026-20671, CVE-2025-43211, CVE-2025-43374, CVE-2025-43209, CVE-2025-43392, CVE-2025-31209, CVE-2026-20700, CVE-2025-43457, CVE-2025-43213, CVE-2025-43443, CVE-2025-43444, CVE-2026-20665, CVE-2025-43529, CVE-2025-43533, CVE-2025-43210, CVE-2025-43355, CVE-2025-31219, CVE-2025-43216, CVE-2025-31278, CVE-2025-31222, CVE-2026-28868, CVE-2025-43413, CVE-2025-43329, CVE-2026-20637, CVE-2025-31238, CVE-2025-31277, CVE-2025-6558, CVE-2025-43346, CVE-2026-20698, CVE-2025-43459, CVE-2025-43372, CVE-2026-20667, CVE-2025-43376, CVE-2025-43431, CVE-2025-31215, CVE-2026-20628, CVE-2025-31233, CVE-2025-31239, CVE-2026-28878, CVE-2025-43354, CVE-2025-43425, CVE-2025-43398, CVE-2025-31226, CVE-2025-31257, CVE-2026-20635, CVE-2025-31241, CVE-2025-43344, CVE-2025-43500, CVE-2025-31208, CVE-2025-43379, CVE-2026-20634, CVE-2026-20617, CVE-2025-43440, CVE-2025-46279, CVE-2025-31221, CVE-2025-43190, CVE-2025-43436, CVE-2026-28856, CVE-2025-43434, CVE-2026-28852, CVE-2025-24223, CVE-2025-31273, CVE-2025-46288, CVE-2026-28877, CVE-2024-27828, CVE-2025-43447, CVE-2025-31255, CVE-2025-43458, CVE-2026-28886, CVE-2026-28822, CVE-2025-43494, CVE-2025-43433, CVE-2025-43282, CVE-2026-20609, CVE-2025-31223, CVE-2025-43361, CVE-2025-31206, CVE-2026-28865, CVE-2026-20690, CVE-2026-20654, CVE-2025-46277, CVE-2026-20650, CVE-2025-43214, CVE-2025-43445, CVE-2026-20627, CVE-2025-43531, CVE-2025-43520, CVE-2025-31200, CVE-2025-43272, CVE-2025-43347, CVE-2025-31205, CVE-2025-43430, CVE-2026-20649, CVE-2025-43227, CVE-2025-43302, CVE-2025-46298, CVE-2025-46299, CVE-2025-43186, CVE-2025-43419, CVE-2025-43223, CVE-2025-43435, CVE-2025-43432, CVE-2025-43226, CVE-2026-28867, CVE-2025-43429, CVE-2025-43455, CVE-2025-14174, CVE-2025-43212, CVE-2025-31212, CVE-2025-43323, CVE-2026-28870, CVE-2025-43265, CVE-2025-43356, CVE-2026-20691, CVE-2026-28882, CVE-2025-43345, CVE-2025-43359, CVE-2025-43343, CVE-2025-43448, CVE-2025-24224, CVE-2026-28864, CVE-2026-20675, CVE-2026-28859, CVE-2025-43438, CVE-2025-43234, CVE-2025-43496, CVE-2025-43342, CVE-2025-43507, CVE-2025-31204, CVE-2025-43510, CVE-2026-28879, CVE-2026-20641 {}
heuristics/extracted_sars ALC_DEL.1, ATE_FUN.1, ASE_INT.1, ADV_FSP.3, ALC_CMS.2, AGD_OPE.1, ATE_COV.1, ASE_CCL.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, AGD_PRE.1, ALC_CMC.2, ASE_TSS.1, ASE_REQ.2, ALC_FLR.3, ASE_OBJ.2 ALC_DEL.1, ATE_FUN.1, ASE_INT.1, ALC_CMS.2, AGD_OPE.1, ATE_COV.1, ASE_CCL.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ADV_FSP.2, AGD_PRE.1, ALC_CMC.2, ASE_TSS.1, ASE_REQ.2, ASE_OBJ.2
heuristics/extracted_versions 11.4 4.0, 11.2
pdf_data/cert_filename Certificat-ANSSI-CC-2025_35fr.pdf ECI_Lightsoft.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2025/35: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/report_filename ANSSI-CC-2025_35fr.pdf CR-ECI-NPT_EAL2.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2025/35: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
  • EAL:
    • EAL2: 6
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ECI: 1
    • A.LOCATE: 1
    • A.MANAGE: 1
    • A.MGMTNET: 1
    • A.NOEVIL: 1
    • A.NOTRST: 1
    • A.PROTCT: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • ERTL:
    • Common Criteria Test Laboratory, ERTL: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2022-11-001: 1
  • ISO:
    • ISO/IEC 15408-: 1
    • ISO/IEC 18045:2022: 1
pdf_data/report_metadata
  • /Author: Mitali Chatterjee
  • /CreationDate: D:20190207153657+05'30'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190207153657+05'30'
  • /Producer: Microsoft® Word 2010
  • /Title: LOGO
  • pdf_file_size_bytes: 654812
  • pdf_hyperlinks: http://www.commoncriteria-india.gov.in/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename ANSSI-Cible-CC-2025_35en.pdf ECI_LightSoft-EMS-APT-NPT_Security_Targetv1.8.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
  • EAL:
    • EAL2: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 3
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR: 1
    • ALC_FLR.3: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC: 22
    • FDP_ACC.1: 10
    • FDP_ACC.2: 6
    • FDP_ACF: 20
    • FDP_ACF.1: 16
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 7
    • FDP_ETC.2: 10
    • FDP_IFC.1: 8
    • FDP_ITC.1: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 2
    • FDP_UIT: 10
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1: 4
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 12
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
    • FAU_STG.2: 9
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC.1: 9
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 16
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CDCVM: 4
    • A.DE-: 2
    • A.DEVICE_AUTH: 1
    • A.IPH-: 2
    • A.IPHONE_USER: 1
    • A.PERSO: 4
  • D:
    • D.OS: 16
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • T:
    • T.CORRUPT: 4
    • T.PHYSICAL: 2
    • T.RECOVER: 4
    • T.REPLAY: 2
    • T.SILENT: 3
    • T.SKIMMING: 3
    • T.USURP: 4
  • A:
    • A.ECI: 3
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.MGMTNETW: 1
    • A.MGMTNETWORK: 2
    • A.NOEVIL: 3
    • A.NOTRST: 3
    • A.PROTCT: 3
  • O:
    • O.ACCESS: 9
    • O.AUDITS: 3
    • O.EADMIN: 5
    • O.IDAUTH: 13
    • O.INFFLW: 5
    • O.INVFLW: 1
    • O.PROTCT: 5
  • OE:
    • OE.CREDEN: 4
    • OE.ECI: 3
    • OE.INSTAL: 4
    • OE.MGMTNET: 1
    • OE.MGMTNETWORK: 1
    • OE.PERSON: 5
    • OE.PHYCAL: 6
    • OE.TIME: 4
  • T:
    • T.COMINT: 3
    • T.INVSRC: 3
    • T.LOSSOF: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.UNAUTHDST: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 12
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.2: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-3: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_metadata
  • /CreationDate: D:20250812102957Z
  • /Creator: Word
  • /ModDate: D:20250812113028+01'00'
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] WatchSeries10_S10_watchOS11_SecurityTarget_v1.2.docx
  • pdf_file_size_bytes: 2815624
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
  • /Author: User
  • /Company: Hewlett-Packard
  • /CreationDate: D:20170710162021+05'30'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /ModDate: D:20170710162027+05'30'
  • /Producer: Adobe PDF Library 9.0
  • /SourceModified: D:20170710104904
  • /Title: SECURITY TARGET
  • pdf_file_size_bytes: 299013
  • pdf_hyperlinks: http://www.consulting-cc.com/, http://www.ecitele.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different