Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Motorola Network Router, S6000 and GGM 8000 with EOS version 16.9
CCEVS-VR-VID-10738-2017
Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)
ANSSI-CC-2023/59
name Motorola Network Router, S6000 and GGM 8000 with EOS version 16.9 Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
status archived active
not_valid_after 23.03.2019 28.12.2028
not_valid_before 23.03.2017 28.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10738-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_59en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10738-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_59en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10738-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_59en.pdf
manufacturer Motorola Solutions, Inc. Apple Inc.
manufacturer_web https://www.motorolasolutions.com https://www.apple.com/
security_level {} EAL2+, ADV_FSP.3
dgst ff6a1bf1b2337dd8 204cb8d5dbf8e997
heuristics/cert_id CCEVS-VR-VID-10738-2017 ANSSI-CC-2023/59
heuristics/cert_lab US []
heuristics/cpe_matches {} cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-27791, CVE-2024-27801, CVE-2023-32416, CVE-2023-38592, CVE-2023-41073, CVE-2024-23215, CVE-2023-40400, CVE-2025-30426, CVE-2024-23214, CVE-2024-54542, CVE-2024-44254, CVE-2025-24283, CVE-2024-40863, CVE-2024-23226, CVE-2024-27796, CVE-2023-32390, CVE-2023-42836, CVE-2024-40850, CVE-2024-54514, CVE-2024-40784, CVE-2023-35993, CVE-2023-41982, CVE-2023-42870, CVE-2023-41074, CVE-2025-24127, CVE-2024-27821, CVE-2023-32402, CVE-2024-23296, CVE-2024-54551, CVE-2025-24113, CVE-2024-27808, CVE-2023-42941, CVE-2024-54470, CVE-2025-24117, CVE-2024-40822, CVE-2025-24200, CVE-2024-44179, CVE-2024-44198, CVE-2024-44201, CVE-2024-27871, CVE-2025-24177, CVE-2024-54530, CVE-2024-27830, CVE-2023-42890, CVE-2024-23293, CVE-2023-40384, CVE-2024-44297, CVE-2023-42946, CVE-2024-27851, CVE-2024-40774, CVE-2025-30463, CVE-2023-40441, CVE-2023-42869, CVE-2023-42947, CVE-2023-34425, CVE-2025-24194, CVE-2024-4558, CVE-2025-24137, CVE-2024-27826, CVE-2023-28826, CVE-2024-44240, CVE-2023-32361, CVE-2023-41254, CVE-2023-32357, CVE-2024-40818, CVE-2024-44131, CVE-2023-38605, CVE-2024-44233, CVE-2024-44218, CVE-2025-24201, CVE-2024-23289, CVE-2023-38606, CVE-2023-45866, CVE-2024-23262, CVE-2024-27803, CVE-2024-40779, CVE-2024-54523, CVE-2023-42962, CVE-2024-40788, CVE-2024-54494, CVE-2024-23231, CVE-2023-42919, CVE-2025-31201, CVE-2024-54538, CVE-2024-44206, CVE-2023-32381, CVE-2023-40520, CVE-2023-38133, CVE-2023-41063, CVE-2023-32396, CVE-2025-30456, CVE-2023-32394, CVE-2024-40796, CVE-2024-54560, CVE-2024-27820, CVE-2023-32354, CVE-2024-23263, CVE-2023-32367, CVE-2023-40429, CVE-2024-44273, CVE-2024-23235, CVE-2023-41976, CVE-2024-54503, CVE-2024-23280, CVE-2023-40412, CVE-2023-38410, CVE-2023-42878, CVE-2025-24154, CVE-2025-24161, CVE-2024-40826, CVE-2024-23287, CVE-2024-54564, CVE-2024-54486, CVE-2024-44200, CVE-2024-23223, CVE-2023-41064, CVE-2024-27804, CVE-2023-32437, CVE-2024-54522, CVE-2024-40812, CVE-2024-54492, CVE-2023-32365, CVE-2024-54508, CVE-2023-41968, CVE-2024-27879, CVE-2024-44212, CVE-2024-44229, CVE-2023-38572, CVE-2024-23210, CVE-2023-28202, CVE-2023-40528, CVE-2024-40830, CVE-2023-42834, CVE-2024-44167, CVE-2023-40408, CVE-2025-24129, CVE-2024-27819, CVE-2024-0258, CVE-2024-40782, CVE-2024-44251, CVE-2023-38261, CVE-2025-24192, CVE-2024-27863, CVE-2023-32411, CVE-2023-40413, CVE-2024-44204, CVE-2023-41992, CVE-2024-23211, CVE-2023-42848, CVE-2025-24198, CVE-2025-30434, CVE-2025-24211, CVE-2024-54534, CVE-2025-24160, CVE-2023-41983, CVE-2023-32433, CVE-2024-27805, CVE-2023-40439, CVE-2023-42950, CVE-2024-23201, CVE-2024-27834, CVE-2023-32407, CVE-2024-54488, CVE-2025-24178, CVE-2024-40853, CVE-2024-44276, CVE-2024-23257, CVE-2024-44269, CVE-2024-44127, CVE-2023-40414, CVE-2023-32734, CVE-2025-24095, CVE-2024-23297, CVE-2024-27840, CVE-2023-39434, CVE-2024-44235, CVE-2024-40835, CVE-2024-23255, CVE-2024-27850, CVE-2025-31183, CVE-2023-42974, CVE-2023-41070, CVE-2024-44244, CVE-2023-42884, CVE-2023-32423, CVE-2024-23290, CVE-2023-40447, CVE-2023-32434, CVE-2024-54479, CVE-2024-54517, CVE-2024-27811, CVE-2024-54499, CVE-2024-23288, CVE-2024-44261, CVE-2023-42841, CVE-2023-38603, CVE-2023-42953, CVE-2024-40794, CVE-2024-23246, CVE-2023-42942, CVE-2025-24167, CVE-2024-23225, CVE-2025-24086, CVE-2024-23205, CVE-2024-44170, CVE-2024-54497, CVE-2023-40443, CVE-2024-23208, CVE-2024-27815, CVE-2024-40839, CVE-2023-38580, CVE-2024-27799, CVE-2024-23213, CVE-2024-23220, CVE-2025-30447, CVE-2025-30454, CVE-2024-40854, CVE-2023-32389, CVE-2025-30439, CVE-2024-44227, CVE-2024-44124, CVE-2024-27852, CVE-2023-41984, CVE-2024-44263, CVE-2024-27818, CVE-2023-36495, CVE-2024-40785, CVE-2024-44164, CVE-2024-44282, CVE-2025-31191, CVE-2024-44123, CVE-2023-42922, CVE-2023-32388, CVE-2025-30433, CVE-2024-27806, CVE-2023-40394, CVE-2024-23270, CVE-2024-44155, CVE-2024-23217, CVE-2025-24126, CVE-2024-27832, CVE-2023-32400, CVE-2024-27845, CVE-2024-23250, CVE-2023-32384, CVE-2023-38599, CVE-2024-40852, CVE-2024-23286, CVE-2023-42949, CVE-2023-40385, CVE-2024-54510, CVE-2023-41232, CVE-2025-24145, CVE-2023-41997, CVE-2023-28191, CVE-2024-54558, CVE-2023-32413, CVE-2023-42916, CVE-2023-38600, CVE-2024-44239, CVE-2024-44234, CVE-2025-24163, CVE-2024-44180, CVE-2023-40449, CVE-2023-42937, CVE-2024-40867, CVE-2023-40420, CVE-2023-28204, CVE-2023-42871, CVE-2024-44258, CVE-2023-38425, CVE-2024-23273, CVE-2025-31200, CVE-2023-38590, CVE-2024-40809, CVE-2023-41974, CVE-2023-32371, CVE-2024-23241, CVE-2025-24085, CVE-2024-23264, CVE-2023-41993, CVE-2025-30438, CVE-2024-44252, CVE-2024-23212, CVE-2024-44277, CVE-2023-40391, CVE-2024-44232, CVE-2023-40416, CVE-2023-37450, CVE-2025-30467, CVE-2024-54502, CVE-2023-42833, CVE-2024-40771, CVE-2024-44191, CVE-2023-35990, CVE-2024-27835, CVE-2023-40409, CVE-2024-23228, CVE-2024-40798, CVE-2023-42846, CVE-2024-40793, CVE-2024-23222, CVE-2023-32408, CVE-2024-27876, CVE-2023-42852, CVE-2024-27880, CVE-2024-40844, CVE-2024-44299, CVE-2023-41977, CVE-2023-40410, CVE-2023-42928, CVE-2024-44126, CVE-2023-40446, CVE-2023-35074, CVE-2023-40396, CVE-2024-27873, CVE-2024-23291, CVE-2023-40452, CVE-2024-44158, CVE-2023-41061, CVE-2023-34352, CVE-2024-23219, CVE-2025-31184, CVE-2024-40857, CVE-2023-38611, CVE-2025-24243, CVE-2024-54485, CVE-2023-32399, CVE-2025-30427, CVE-2023-40431, CVE-2023-40428, CVE-2023-32422, CVE-2023-42952, CVE-2023-41071, CVE-2024-27838, CVE-2023-41060, CVE-2024-54527, CVE-2024-27855, CVE-2024-44139, CVE-2024-40813, CVE-2023-42899, CVE-2023-42934, CVE-2023-40417, CVE-2023-32403, CVE-2024-40776, CVE-2025-24212, CVE-2023-42923, CVE-2025-24180, CVE-2024-44144, CVE-2023-40399, CVE-2024-23206, CVE-2023-42957, CVE-2024-54550, CVE-2024-27839, CVE-2024-23239, CVE-2024-40815, CVE-2025-24131, CVE-2025-24104, CVE-2023-42896, CVE-2023-38565, CVE-2024-44176, CVE-2024-27869, CVE-2023-32392, CVE-2024-44242, CVE-2023-40432, CVE-2025-24210, CVE-2024-44136, CVE-2023-38597, CVE-2024-27800, CVE-2024-27810, CVE-2023-40434, CVE-2023-42925, CVE-2025-24209, CVE-2023-32368, CVE-2024-54512, CVE-2023-40529, CVE-2023-32428, CVE-2024-23243, CVE-2024-27817, CVE-2024-54467, CVE-2025-30432, CVE-2023-32439, CVE-2023-42883, CVE-2022-3970, CVE-2024-54658, CVE-2023-32419, CVE-2024-40799, CVE-2024-27828, CVE-2025-24230, CVE-2025-24182, CVE-2024-27859, CVE-2023-42956, CVE-2023-42917, CVE-2023-32373, CVE-2023-41991, CVE-2024-44274, CVE-2023-32432, CVE-2023-32372, CVE-2024-27874, CVE-2023-41986, CVE-2023-41995, CVE-2023-27930, CVE-2024-23251, CVE-2024-54526, CVE-2024-44184, CVE-2024-44169, CVE-2024-23242, CVE-2024-23218, CVE-2023-38598, CVE-2024-54518, CVE-2023-42914, CVE-2023-42936, CVE-2025-24205, CVE-2023-42872, CVE-2023-40427, CVE-2023-40454, CVE-2023-32412, CVE-2024-44207, CVE-2023-41174, CVE-2024-40789, CVE-2024-23240, CVE-2024-44255, CVE-2024-44302, CVE-2023-42951, CVE-2025-24190, CVE-2023-42849, CVE-2024-27857, CVE-2023-32359, CVE-2023-38593, CVE-2023-40419, CVE-2024-44192, CVE-2025-24216, CVE-2024-27848, CVE-2023-32409, CVE-2024-54525, CVE-2023-32425, CVE-2025-24221, CVE-2024-23283, CVE-2024-44278, CVE-2024-54469, CVE-2024-40806, CVE-2023-40395, CVE-2023-40424, CVE-2025-24193, CVE-2025-24244, CVE-2025-31192, CVE-2025-24123, CVE-2023-32441, CVE-2023-41981, CVE-2023-38610, CVE-2024-40786, CVE-2025-31182, CVE-2023-32376, CVE-2024-44183, CVE-2024-40833, CVE-2023-41069, CVE-2024-44194, CVE-2024-40795, CVE-2024-40824, CVE-2023-40423, CVE-2024-23278, CVE-2024-40840, CVE-2023-35984, CVE-2024-23284, CVE-2024-27802, CVE-2023-42866, CVE-2024-44308, CVE-2024-23292, CVE-2025-24097, CVE-2024-23259, CVE-2025-24217, CVE-2023-32385, CVE-2024-27847, CVE-2023-42939, CVE-2024-44296, CVE-2023-40438, CVE-2024-54468, CVE-2024-44290, CVE-2023-32404, CVE-2025-30471, CVE-2024-23271, CVE-2024-23265, CVE-2025-30425, CVE-2025-30430, CVE-2025-24158, CVE-2023-42824, CVE-2024-44187, CVE-2024-44202, CVE-2023-41065, CVE-2023-42893, CVE-2025-24173, CVE-2023-32352, CVE-2023-32398, CVE-2023-40442, CVE-2024-27823, CVE-2024-54507, CVE-2025-30469, CVE-2023-42873, CVE-2023-32415, CVE-2023-38136, CVE-2025-24124, CVE-2024-54500, CVE-2024-27807, CVE-2023-38424, CVE-2024-27833, CVE-2024-27831, CVE-2024-27816, CVE-2024-44205, CVE-2024-27884, CVE-2023-42843, CVE-2025-24257, CVE-2024-44215, CVE-2025-24208, CVE-2025-24202, CVE-2023-32445, CVE-2025-30428, CVE-2025-24159, CVE-2023-41980, CVE-2024-44309, CVE-2024-54543, CVE-2023-42839, CVE-2024-54501, CVE-2023-38594, CVE-2024-27841, CVE-2025-24162, CVE-2023-40456, CVE-2024-40856, CVE-2024-23282, CVE-2023-40437, CVE-2023-38604, CVE-2024-54478, CVE-2025-30470, CVE-2024-44145, CVE-2025-24128, CVE-2024-44241, CVE-2024-40791, CVE-2023-32420, CVE-2023-32391, CVE-2023-40403, CVE-2024-54513, CVE-2024-1580, CVE-2024-40777, CVE-2023-42857, CVE-2024-40787, CVE-2024-40805, CVE-2023-42855, CVE-2023-40392, CVE-2024-44185, CVE-2024-40829, CVE-2025-24237, CVE-2024-44217, CVE-2024-40778, CVE-2024-44147, CVE-2024-23256, CVE-2024-54535, CVE-2023-38612, CVE-2023-38596, CVE-2025-30429, CVE-2024-44171, CVE-2025-24141, CVE-2024-54505, CVE-2023-41068, CVE-2024-44259, CVE-2023-42888, CVE-2024-54541, CVE-2024-40780, CVE-2024-27856, CVE-2025-24150, CVE-2024-27836, CVE-2024-23254, CVE-2025-24264, CVE-2023-38595, CVE-2024-44165, CVE-2025-24214, CVE-2023-40448, CVE-2025-24238, CVE-2025-24149, CVE-2023-42823, CVE-2024-40851, CVE-2024-27789, CVE-2025-24107, CVE-2024-40836, CVE-2025-24213
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 16.9 16.4.1
heuristics/scheme_data
  • category: Network Device
  • certification_date: 23.03.2017
  • evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
  • expiration_date: 23.03.2019
  • id: CCEVS-VR-VID10738
  • product: Motorola Network Router, S6000 and GGM 8000 with EOS version 16.9
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10738
  • vendor: Motorola Mobility LLC
heuristics/protection_profiles c7cf611c6bb1e4b0 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf {}
pdf_data/cert_filename st_vid10738-ci.pdf certificat-CC-2023_59en.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10738-2017: 1
  • FR:
    • ANSSI-CC-2023/59: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
pdf_data/cert_keywords/eval_facility
  • UL:
    • UL Verification Services: 1
  • Thales:
    • THALES/CNES: 2
pdf_data/cert_metadata
  • /CreationDate: D:20170324094121-04'00'
  • /ModDate: D:20170324094152-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 179923
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20240222154612+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155210+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 138174
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid10738-vr.pdf ANSSI-CC-2023_59en.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID10738-2017
    • cert_item: Motorola Solutions, Inc. Motorola Network Devices, S6000 and GGM 8000 with EOS version 16.9
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10738-2017: 1
  • FR:
    • ANSSI-CC-2023/59: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 1
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Basic: 1
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_VAN: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SEC: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTE: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY: 2
    • T.UNAUTHORIZED_ADMINIST: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICA: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_E: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/eval_facility
  • UL:
    • UL Verification Services: 6
  • Thales:
    • THALES/CNES: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 7
  • SSH:
    • SSH: 5
    • SSHv2: 3
  • VPN:
    • VPN: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • /Author: Steve Wilson
  • /Company: InfoGard Laboratories
  • /CreationDate: D:20170324091015-04'00'
  • /Creator: Acrobat PDFMaker 11 for Word
  • /Keywords:
  • /ModDate: D:20170324091018-04'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20170324131003
  • /Subject:
  • /Title: D
  • pdf_file_size_bytes: 318224
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename st_vid10738-st.pdf ANSSI-cible-CC-2023_59en.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 5
  • AGD:
    • AGD_OPE: 4
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
  • ASE:
    • ASE_CCL.1: 7
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_IND: 2
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP: 1
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 2
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 3
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 2
    • FAU_STG_EXT.1.2: 4
    • FAU_STG_EXT.1.3: 10
    • FAU_STG_EXT.2: 5
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 3
    • FCS_CKM.4: 5
    • FCS_COP: 1
    • FCS_COP.1: 26
    • FCS_COP.1.1: 12
    • FCS_PMG_EXT.1: 1
    • FCS_RBG_EXT.1: 5
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 4
    • FCS_SSHS_EXT.1: 4
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 2
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.1: 1
    • FCS_TLSC_EXT.2: 1
  • FIA:
    • FIA_PGM_EXT.1: 1
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 2
    • FIA_UAU_EXT.2: 3
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA_EXT.1: 8
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1: 28
    • FMT_MOF.1.1: 14
    • FMT_MTD: 4
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 2
  • FPT:
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TST_EXT.2: 3
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
    • FPT_TUD_EXT.2: 1
    • FPT_TUD_EXT.2.2: 2
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_ACC: 25
    • FDP_ACC.1: 11
    • FDP_ACC.2: 4
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 23
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 8
    • FDP_ETC.2: 2
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 9
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 4
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 15
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 10
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 7
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 14
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 10
    • FPT_RPL.1: 4
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SEC: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTE: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY: 2
    • T.UNAUTHORIZED_ADMINIST: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICA: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_E: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.CDCVM: 3
    • A.DE-: 2
    • A.DEVICE_AUTH: 1
    • A.PERSO: 3
    • A.WATCH_USER: 3
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
pdf_data/st_keywords/eval_facility
  • UL:
    • UL Verification Services: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
      • AES-: 1
      • AES-128: 1
  • constructions:
    • MAC:
      • HMAC: 11
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 3
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 7
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 22
  • FF:
    • DH:
      • DH: 29
      • Diffie-Hellman: 4
  • RSA:
    • RSA 2048: 1
    • RSA-2048: 1
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA-1: 13
      • SHA1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-224: 1
      • SHA-256: 11
      • SHA-384: 7
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 16
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 37
    • IKEv1: 51
    • IKEv2: 18
  • IPsec:
    • IPsec: 51
  • SSH:
    • SSH: 80
    • SSHv2: 3
  • TLS:
    • TLS:
      • TLS: 6
  • VPN:
    • VPN: 9
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 11
  • RNG:
    • RBG: 8
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 15
    • P-384: 13
    • P-521: 8
    • curve P-256: 1
    • curve P-384: 3
  • NIST:
    • P-256: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 6
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 140-2: 10
    • FIPS 186-4: 4
    • FIPS PUB 186-4: 5
  • ISO:
    • ISO/IEC 10118: 2
    • ISO/IEC 14888-: 1
    • ISO/IEC 18031:2011: 3
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-131A: 1
    • NIST SP 800-56B: 1
    • NIST SP 800-57: 2
    • SP 800-131A: 1
    • SP 800-56A: 1
    • SP 800-56B: 1
    • SP 800-90: 2
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2409: 1
    • RFC 2986: 1
    • RFC 3602: 2
    • RFC 4109: 1
    • RFC 4251: 1
    • RFC 4253: 4
    • RFC 4301: 4
    • RFC 4303: 1
    • RFC 4868: 2
    • RFC 4945: 1
    • RFC 5280: 3
    • RFC 5647: 4
    • RFC 5759: 1
    • RFC 5996: 2
    • RFC 6668: 1
  • X509:
    • X.509: 11
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH: 1
    • out of scope: 1
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
pdf_data/st_metadata
  • /Author: Bethany Henderson
  • /Company: Motorola
  • /CreationDate: D:20170324090837-04'00'
  • /Creator: Acrobat PDFMaker 11 for Word
  • /Date completed: July 28, 2016
  • /ModDate: D:20170324090852-04'00'
  • /Producer: Adobe PDF Library 11.0
  • /Revision: 1.0
  • /SourceModified: D:20170323180102
  • pdf_file_size_bytes: 907819
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 98
  • /CreationDate: D:20231109105238Z
  • /Creator: Word
  • /ModDate: D:20231109105301Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx
  • pdf_file_size_bytes: 2520806
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different