FIDO Universal Second Factor (U2F) Authenticator Version 2.3

Web information

Status: active
Certification date: 2018-07-20
Scheme: 🇩🇪
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+, AVA_VAN.5

Certification report

Extracted keywords

Schemes
MAC
Randomness
RNG

Security level
EAL 4, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2
Security Functional Requirements (SFR)
FCS_CKM.5, FCS_CKM
Protection profiles
BSI-CC-PP-0096-V2-2018, BSI-CC-PP-0096-, BSI-CC-PP-0096-2017, BSI-PP-CC-0096-V2-2018

Standards
AIS 14, AIS 19, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI 7148

File metadata

Title Certification Report BSI-CC-PP-0096-V2-2018
Subject FIDO Universal Second Factor (U2F) Authenticator, Version 2.3
Keywords "Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil, FIDO, U2F, second factor"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20180724113406+02'00'
Modification date D:20180724114748+02'00'
Pages 14
Creator Writer
Producer LibreOffice 5.2

Profile

Extracted keywords

Schemes
MAC
Protocols
TLS
Randomness
RNG

Vendor
NXP Semiconductors, Infineon Technologies AG, STMicroelectronics

Security level
EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ATE_DPT.1, AVA_VAN.5
Security Functional Requirements (SFR)
FCS_RNG, FCS_CKM.5, FCS_RNG.1, FCS_CKM.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.5.1, FCS_COP, FDP_ITC.1, FDP_ITC.2, FDP_IFC, FDP_IFF.1, FDP_IFF, FDP_IFC.1.1, FDP_IFC.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FIA_SOS.2, FIA_UAU.2, FIA_UAU.6, FIA_UAU.1, FIA_UID.1, FIA_UAU.2.1, FIA_UAU.6.1, FMT_MSA.3, FMT_MSA, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MSA.1, FMT_MSA.3.2, FPR_ANO.1, FPR_ANO.1.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3
Protection profiles
BSI-PP-CC-0096-V2-2018, BSI-CC-PP-0096-V2-2018, BSI-CC-PP-0084-2014

Side-channel analysis
physical probing, side channels, side channel, SPA, DPA, timing attacks, Physical tampering, physical tampering, fault injection, reverse engineering

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title FIDO Universal Second Factor (U2F) Authenticator
Subject PP FIDO U2F
Keywords Common Criteria, Protection Profile, PP0096, FIDO, U2F, EAL4
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20180719104602+02'00'
Modification date D:20180801165736+02'00'
Pages 42
Creator Writer
Producer LibreOffice 5.2

References

No references are available for this protection profile.

Updates

  • 22.04.2025 The protection profile data changed.
    Protection Profile changed

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 388704, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180724113406+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil, FIDO, U2F, second factor"', '/ModDate': "D:20180724114748+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'FIDO Universal Second Factor (U2F) Authenticator, Version 2.3', '/Title': 'Certification Report BSI-CC-PP-0096-V2-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/', 'http://www.sogisportal.eu/']}}.
    • The pp_metadata property was set to {'pdf_file_size_bytes': 1358287, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik ', '/CreationDate': "D:20180719104602+02'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Protection Profile, PP0096, FIDO, U2F, EAL4', '/ModDate': "D:20180801165736+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'PP FIDO U2F', '/Title': 'FIDO Universal Second Factor (U2F) Authenticator', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0096-V2-2018': 8, 'BSI-CC-PP-0096-': 1, 'BSI-CC-PP-0096-2017': 2, 'BSI-PP-CC-0096-V2-2018': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL 2': 1, 'EAL 4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.2': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.5': 1, 'FCS_CKM': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 14': 1, 'AIS 19': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The pp_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-CC-0096-V2-2018': 1, 'BSI-CC-PP-0096-V2-2018': 1, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4': 12, 'EAL4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 2, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ATE': {'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 5}}, 'cc_sfr': {'FCS': {'FCS_RNG': 5, 'FCS_CKM.5': 6, 'FCS_RNG.1': 14, 'FCS_CKM.1': 10, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 15, 'FCS_CKM.2': 4, 'FCS_COP.1': 9, 'FCS_CKM.4': 10, 'FCS_CKM.5.1': 1, 'FCS_COP': 5}, 'FDP': {'FDP_ITC.1': 3, 'FDP_ITC.2': 3, 'FDP_IFC': 20, 'FDP_IFF.1': 5, 'FDP_IFF': 20, 'FDP_IFC.1.1': 4, 'FDP_IFC.1': 9, 'FDP_IFF.1.1': 4, 'FDP_IFF.1.2': 4, 'FDP_IFF.1.3': 4, 'FDP_IFF.1.4': 4, 'FDP_IFF.1.5': 4, 'FDP_SDI.1': 3, 'FDP_SDI.1.1': 1, 'FDP_ACC.1': 4}, 'FIA': {'FIA_SOS.2': 1, 'FIA_UAU.2': 8, 'FIA_UAU.6': 8, 'FIA_UAU.1': 1, 'FIA_UID.1': 2, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1}, 'FMT': {'FMT_MSA.3': 5, 'FMT_MSA': 24, 'FMT_SMF.1': 11, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 21, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.1': 6, 'FMT_MSA.1': 5, 'FMT_MSA.3.2': 4}, 'FPR': {'FPR_ANO.1': 3, 'FPR_ANO.1.1': 1}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 7, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_PHP.3': 3, 'FPT_PHP.3.1': 1, 'FPT_TST.1': 5, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors': 1}, 'Infineon': {'Infineon Technologies AG': 1}, 'STMicroelectronics': {'STMicroelectronics': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 22}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 2}}}, 'randomness': {'RNG': {'RNG': 13}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side channels': 1, 'side channel': 4, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'Physical tampering': 1, 'physical tampering': 1, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The state of the protection profile object was updated.

    • The pp property was updated, with the {'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7c9fb41b1e5a63f6e092bbdf657f00335d66632a9c2f7af60f076aed9fe38ca5', 'txt_hash': '7351376ce60ba0d317e3014cf228cbb3c65a4264f55ac2340ddc750cdb571621'} data.
    • The report property was updated, with the {'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4838ce676b244fea11e5ae25755497e8f47fe7ebe679d812499159342484541e', 'txt_hash': '5f607f57b2b4f8530309965fce7b4887c75b0c8b2faf591fd5b851348061320b'} data.
  • 14.04.2025 The protection profile data changed.
    Protection Profile changed

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The pp_metadata property was set to None.
    • The report_keywords property was set to None.
    • The pp_keywords property was set to None.

    The state of the protection profile object was updated.

    • The pp property was updated, with the {'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None} data.
    • The report property was updated, with the {'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None} data.
  • 04.02.2025 The protection profile was first processed.
    New Protection Profile

    A new Protection Profile with the name FIDO Universal Second Factor (U2F) Authenticator Version 2.3 was processed.

Raw data

{
  "_id": "5e214c0bea1103af",
  "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
  "dgst": "5e214c0bea1103af",
  "heuristics": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
  },
  "pdf_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
    "pp_filename": "pp0096V2b_pdf.pdf",
    "pp_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0096-V2-2018": 1,
          "BSI-PP-CC-0096-V2-2018": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ATE": {
          "ATE_DPT.1": 2
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 12,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 15,
          "FCS_CKM.1": 10,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 10,
          "FCS_CKM.5": 6,
          "FCS_CKM.5.1": 1,
          "FCS_COP": 5,
          "FCS_COP.1": 9,
          "FCS_RNG": 5,
          "FCS_RNG.1": 14,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 4,
          "FDP_IFC": 20,
          "FDP_IFC.1": 9,
          "FDP_IFC.1.1": 4,
          "FDP_IFF": 20,
          "FDP_IFF.1": 5,
          "FDP_IFF.1.1": 4,
          "FDP_IFF.1.2": 4,
          "FDP_IFF.1.3": 4,
          "FDP_IFF.1.4": 4,
          "FDP_IFF.1.5": 4,
          "FDP_ITC.1": 3,
          "FDP_ITC.2": 3,
          "FDP_SDI.1": 3,
          "FDP_SDI.1.1": 1
        },
        "FIA": {
          "FIA_SOS.2": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.6": 8,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 2
        },
        "FMT": {
          "FMT_MSA": 24,
          "FMT_MSA.1": 5,
          "FMT_MSA.3": 5,
          "FMT_MSA.3.2": 4,
          "FMT_MTD.1": 6,
          "FMT_SMF.1": 11,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_ANO.1": 3,
          "FPR_ANO.1.1": 1
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 7,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_PHP.3": 3,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 5,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 22
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 13
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Physical tampering": 1,
          "fault injection": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 1,
          "side channel": 4,
          "side channels": 1,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies AG": 1
        },
        "NXP": {
          "NXP Semiconductors": 1
        },
        "STMicroelectronics": {
          "STMicroelectronics": 1
        }
      },
      "vulnerability": {}
    },
    "pp_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik ",
      "/CreationDate": "D:20180719104602+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Protection Profile, PP0096, FIDO, U2F, EAL4",
      "/ModDate": "D:20180801165736+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "PP FIDO U2F",
      "/Title": "FIDO Universal Second Factor (U2F) Authenticator",
      "pdf_file_size_bytes": 1358287,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 42
    },
    "report_filename": "pp0096V2a_pdf.pdf",
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0096-": 1,
          "BSI-CC-PP-0096-2017": 2,
          "BSI-CC-PP-0096-V2-2018": 8,
          "BSI-PP-CC-0096-V2-2018": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 3,
          "EAL 4 augmented": 2
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.5": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 14": 1,
          "AIS 19": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180724113406+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil, FIDO, U2F, second factor\"",
      "/ModDate": "D:20180724114748+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "FIDO Universal Second Factor (U2F) Authenticator, Version 2.3",
      "/Title": "Certification Report BSI-CC-PP-0096-V2-2018",
      "pdf_file_size_bytes": 388704,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogisportal.eu/",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    }
  },
  "state": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
    "pp": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7c9fb41b1e5a63f6e092bbdf657f00335d66632a9c2f7af60f076aed9fe38ca5",
      "txt_hash": "7351376ce60ba0d317e3014cf228cbb3c65a4264f55ac2340ddc750cdb571621"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4838ce676b244fea11e5ae25755497e8f47fe7ebe679d812499159342484541e",
      "txt_hash": "5f607f57b2b4f8530309965fce7b4887c75b0c8b2faf591fd5b851348061320b"
    }
  },
  "web_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
    "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
    "is_collaborative": false,
    "maintenances": [],
    "name": "FIDO Universal Second Factor (U2F) Authenticator Version 2.3",
    "not_valid_after": null,
    "not_valid_before": "2018-07-20",
    "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0096V2b_pdf.pdf",
    "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0096V2a_pdf.pdf",
    "scheme": "DE",
    "security_level": {
      "_type": "Set",
      "elements": [
        "AVA_VAN.5",
        "EAL4+"
      ]
    },
    "status": "active",
    "version": "2.3"
  }
}