SK e-Pass V1.0
CSV information ?
Status | archived |
---|---|
Valid from | 22.07.2010 |
Valid until | 01.06.2019 |
Scheme | 🇰🇷 KR |
Manufacturer | SK C&C |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.4, EAL4+, ATE_DPT.2, ADV_IMP.2 |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
TDESAsymmetric Algorithms
ECC, DHHash functions
SHA-1, SHA-224, SHA-256Schemes
MACRandomness
RNGJavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1, Global Platform 2.1.1IC data groups
EF.COM, EF.SODTrusted Execution Environments
SSCVendor
SamsungSecurity level
EAL4+, EAL4, EAL5+Security Assurance Requirements (SAR)
ADO_DEL.1, ADV_IMP.2, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV, ATE_DPT, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VLA.4, AVA_VAN.4, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Certificates
KECS-ISIS-0254-2010Evaluation facilities
KISASide-channel analysis
malfunction, reverse engineeringStandards
PKCS#3, ISO/IEC 14443-4, ICAO, SCP02File metadata
Title | Microsoft Word - CR_-_SK_e-pass_V1.0_KECS-ISIS-0254-2010__-_Final.docx |
---|---|
Author | ITSCC |
Creation date | D:20110217141144 |
Modification date | D:20110217141144 |
Pages | 32 |
Creator | PScript5.dll Version 5.2 |
Producer | GPL Ghostscript 8.15 |
Security target ?
Extracted keywords
Symmetric Algorithms
DES, TDESAsymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256Schemes
MACRandomness
RNGJavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1IC data groups
EF.DG1, EF.DG2, EF.DG5, EF.DG13, EF.DG16, EF.DG3, EF.DG4, EF.DG15, EF.DG14, EF.DG6, EF.DG7, EF.DG8, EF.DG9, EF.DG10, EF.DG11, EF.DG12, EF.COM, EF.SODTrusted Execution Environments
SSCVendor
SamsungSecurity level
EAL4+, EAL5+, EAL4, EAL4 augmentedClaims
O.S, O.AASecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_IMP.1, ADV_FSP.2, ADV_DPT.1, ADV_DPT.2, ADV_ATC.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_CMS.4, ALC_DVS.1, ALC_TAT.1, ALC_CMC.5, ALC_CMS.1, ALC_CMC, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.4, AVA_VAN, AVA_VLA.4, AVA_VLA.3, ASE_INT.1, ASE_SPD.1, ASE_ECD.1, ASE_TSS.1, ASE_CCL.1, ASE_OBJ.2, ASE_REQ.2, ASE_REQ.1Security Functional Requirements (SFR)
FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_DAU.1, FDP_ACF.1, FDP_UCT.1, FDP_UIT.1, FDP_ACC.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU.1.1, FDP_DAU.1.2, FDP_RIP.1.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FIA_UAU.2, FIA_AFL.1, FIA_UAU.1, FIA_UAU.4, FIA_UID.1, FIA_UAU.5, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.2.1, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MTD.1, FMT_MSA.3, FMT_SMR.1, FMT_MSA.1, FMT_MTD.3, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.3.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_CKM.4, FPR_UNO.1, FPT_TST.1, FPT_FLS.1, FPT_ITI.1, FPT_FLS.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1Side-channel analysis
DPA, SPA, Malfunction, malfunction, reverse engineering, Reverse EngineeringStandards
PKCS#3, ISO/IEC 14443-4, ISO/IEC 11770-2, ISO/IEC 15946-3, ISO/IEC 10118-3, ISO/IEC 15946-2, ISO/IEC 14443, ICAO, SCP02, CCMB-2009-97-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
Title | 보안목표명세서 |
---|---|
Author | SK C&C |
Creation date | D:20100812101156Z |
Modification date | D:20100817111056+09'00' |
Pages | 117 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, AVA_VAN.4, AVA_VLA.4, ADV_DPT.2, ALC_CMC.5, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_IMP.2, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, ALC_DVS.1, ASE_ECD.1, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, ADV_ATC.1, ALC_LCD.1, ATE_DPT.2, ASE_OBJ.2Scheme data ?
Product | SK e-Pass V1.0 | |
---|---|---|
Cert Id | KECS-ISIS-0254-2010 | |
Product Link | https://itscc.kr/certprod/view.do?product_id=254&product_class=4 | |
Vendor | SK C&C Co., Ltd. | |
Level | EAL4+ | |
Category | e-Passport | |
Certification Date | 22.07.2010 | |
Enhanced | ||
Product | SK e-Pass V1.0 | |
Cc Version | CC V3.1 R3 | |
Assurance Level | EAL4+ | |
Certification Date | 22.07.2010 | |
Expiration Date | 01.06.2019 | |
Product Type | e-Passport | |
Cert Id | KECS-ISIS-0254-2010 | |
Report Link | https://itscc.kr/file/download.do?file=KPR100000001215 | |
Target Link | https://itscc.kr/file/download.do?file=KPR100000001217 | |
Cert Link | https://itscc.kr/file/download.do?file=KPR100000001216 | |
Protection Profile | ePassport Protection Profile V2.1 | |
Developer | SK C&C Co., Ltd. | |
Holder | SK C&C Co., Ltd. |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'SK e-Pass V1.0', 'cert_id': 'KECS-ISIS-0254-2010', 'product_link': 'https://itscc.kr/certprod/view.do?product_id=254&product_class=4', 'vendor': 'SK C&C Co., Ltd.', 'level': 'EAL4+', 'category': 'e-Passport', 'certification_date': '2010-07-22', 'enhanced': {'product': 'SK e-Pass V1.0', 'cc_version': 'CC V3.1 R3', 'assurance_level': 'EAL4+', 'certification_date': '2010-07-22', 'expiration_date': '2019-06-01', 'product_type': 'e-Passport', 'cert_id': 'KECS-ISIS-0254-2010', 'report_link': 'https://itscc.kr/file/download.do?file=KPR100000001215', 'target_link': 'https://itscc.kr/file/download.do?file=KPR100000001217', 'cert_link': 'https://itscc.kr/file/download.do?file=KPR100000001216', 'protection_profile': 'ePassport Protection Profile V2.1', 'developer': 'SK C&C Co., Ltd.', 'holder': 'SK C&C Co., Ltd.'}}
.
- The scheme_data property was set to
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'ePassport Protection Profile V2.1, Version 2.1', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/20110221143918.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EPASS_V2.1']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '71a09964a8a498aec2c007d394c5f0d5e1103ef0b1f4b0960b37b99e785024c5', 'txt_hash': '1934ac5ad645139a12c359582ed86c53ef2b2b1be272a62558ddd4db7d6f9f04'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0eb855f0cd73621fc001f967e465ece7f64fc56fa84779b9168f0b2241f06c2a', 'txt_hash': '8ec0fdf224cd8a01e0d903043563ef90031979acac88b6269bb358ddad14e976'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 598026, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 32, '/Producer': 'GPL Ghostscript 8.15', '/CreationDate': 'D:20110217141144', '/ModDate': 'D:20110217141144', '/Title': 'Microsoft Word - CR_-_SK_e-pass_V1.0_KECS-ISIS-0254-2010__-_Final.docx', '/Creator': 'PScript5.dll Version 5.2', '/Author': 'ITSCC', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1107779, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 117, '/CreationDate': 'D:20100812101156Z', '/Author': 'SK C&C', '/Creator': 'Microsoft® Office Word 2007', '/Producer': 'Microsoft® Office Word 2007', '/ModDate': "D:20100817111056+09'00'", '/Title': '보안목표명세서', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'KR': {'KECS-ISIS-0254-2010': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL4': 1, 'EAL5+': 2}}, 'cc_sar': {'ADO': {'ADO_DEL.1': 1}, 'ADV': {'ADV_IMP.2': 2, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 2, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.4': 1, 'AVA_VAN.4': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD': 2, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 3}}, 'eval_facility': {'KISA': {'KISA': 2}}, 'symmetric_crypto': {'DES': {'3DES': {'TDES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 2}}, 'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.COM': 1, 'EF.SOD': 1}}, 'standard_id': {'PKCS': {'PKCS#3': 1}, 'ISO': {'ISO/IEC 14443-4': 1}, 'ICAO': {'ICAO': 11}, 'SCP': {'SCP02': 7}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 1, 'Global Platform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 4, 'EAL5+': 3, 'EAL4': 13, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 21, 'ADV_ARC.1': 16, 'ADV_FSP.4': 14, 'ADV_TDS.3': 20, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_IMP.1': 4, 'ADV_FSP.2': 2, 'ADV_DPT.1': 2, 'ADV_DPT.2': 1, 'ADV_ATC.1': 1}, 'AGD': {'AGD_OPE.1': 16, 'AGD_PRE.1': 11}, 'ALC': {'ALC_CMC.4': 17, 'ALC_DEL.1': 8, 'ALC_LCD.1': 10, 'ALC_CMS.4': 8, 'ALC_DVS.1': 7, 'ALC_TAT.1': 10, 'ALC_CMC.5': 5, 'ALC_CMS.1': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_DPT.2': 15, 'ATE_COV.2': 8, 'ATE_FUN.1': 15, 'ATE_IND.2': 8, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.4': 12, 'AVA_VAN': 1, 'AVA_VLA.4': 6, 'AVA_VLA.3': 1}, 'ASE': {'ASE_INT.1': 17, 'ASE_SPD.1': 11, 'ASE_ECD.1': 15, 'ASE_TSS.1': 8, 'ASE_CCL.1': 15, 'ASE_OBJ.2': 12, 'ASE_REQ.2': 14, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 31, 'FCS_COP.1': 20, 'FCS_CKM.2': 22, 'FCS_CKM.4': 17, 'FCS_CKM.1.1': 2, 'FCS_CKM.2.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_DAU.1': 9, 'FDP_ACF.1': 13, 'FDP_UCT.1': 12, 'FDP_UIT.1': 12, 'FDP_ACC.1': 17, 'FDP_RIP.1': 8, 'FDP_ITC.1': 8, 'FDP_ITC.2': 8, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 6, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1}, 'FIA': {'FIA_UAU.2': 9, 'FIA_AFL.1': 12, 'FIA_UAU.1': 31, 'FIA_UAU.4': 10, 'FIA_UID.1': 19, 'FIA_UAU.5': 8, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UAU.2.1': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 20, 'FMT_MTD.1': 51, 'FMT_MSA.3': 14, 'FMT_SMR.1': 21, 'FMT_MSA.1': 14, 'FMT_MTD.3': 10, 'FMT_SMF.1': 26, 'FMT_MOF.1.1': 2, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 5, 'FMT_MTD.3.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_CKM.4': 2}, 'FPR': {'FPR_UNO.1': 2}, 'FPT': {'FPT_TST.1': 12, 'FPT_FLS.1': 11, 'FPT_ITI.1': 11, 'FPT_FLS.1.1': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 6, 'FTP_TRP.1': 5}}, 'cc_claims': {'O': {'O.S': 1, 'O.AA': 1}}, 'vendor': {'Samsung': {'Samsung': 10}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 12}, '3DES': {'TDES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 6}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 4}}, 'FF': {'DH': {'DH': 7, 'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-224': 6, 'SHA-256': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 37}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'DPA': 1, 'SPA': 1}, 'FI': {'Malfunction': 6, 'malfunction': 8}, 'other': {'reverse engineering': 2, 'Reverse Engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 13}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 3, 'EF.DG2': 3, 'EF.DG5': 2, 'EF.DG13': 2, 'EF.DG16': 3, 'EF.DG3': 3, 'EF.DG4': 3, 'EF.DG15': 3, 'EF.DG14': 2, 'EF.DG6': 1, 'EF.DG7': 1, 'EF.DG8': 1, 'EF.DG9': 1, 'EF.DG10': 1, 'EF.DG11': 1, 'EF.DG12': 1, 'EF.COM': 6, 'EF.SOD': 4}}, 'standard_id': {'PKCS': {'PKCS#3': 3}, 'ISO': {'ISO/IEC 14443-4': 2, 'ISO/IEC 11770-2': 3, 'ISO/IEC 15946-3': 2, 'ISO/IEC 10118-3': 1, 'ISO/IEC 15946-2': 1, 'ISO/IEC 14443': 2}, 'ICAO': {'ICAO': 24}, 'SCP': {'SCP02': 162}, 'CC': {'CCMB-2009-97-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 3}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
20110217175953.pdf
. - The st_filename property was set to
20110217161721.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
KECS-ISIS-0254-2010
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ATC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20110217175953.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20110217161721.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ATC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name SK e-Pass V1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "108132864aac3532",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "KECS-ISIS-0254-2010",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ATC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "e-Passport",
"cert_id": "KECS-ISIS-0254-2010",
"certification_date": "2010-07-22",
"enhanced": {
"assurance_level": "EAL4+",
"cc_version": "CC V3.1 R3",
"cert_id": "KECS-ISIS-0254-2010",
"cert_link": "https://itscc.kr/file/download.do?file=KPR100000001216",
"certification_date": "2010-07-22",
"developer": "SK C\u0026C Co., Ltd.",
"expiration_date": "2019-06-01",
"holder": "SK C\u0026C Co., Ltd.",
"product": "SK e-Pass V1.0",
"product_type": "e-Passport",
"protection_profile": "ePassport Protection Profile V2.1",
"report_link": "https://itscc.kr/file/download.do?file=KPR100000001215",
"target_link": "https://itscc.kr/file/download.do?file=KPR100000001217"
},
"level": "EAL4+",
"product": "SK e-Pass V1.0",
"product_link": "https://itscc.kr/certprod/view.do?product_id=254\u0026product_class=4",
"vendor": "SK C\u0026C Co., Ltd."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SK C\u0026C",
"manufacturer_web": "https://www.skcc.com",
"name": "SK e-Pass V1.0",
"not_valid_after": "2019-06-01",
"not_valid_before": "2010-07-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "20110217175953.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
}
},
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {
"KR": {
"KECS-ISIS-0254-2010": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADO": {
"ADO_DEL.1": 1
},
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.2": 2,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD": 2,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.2": 2,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 1,
"AVA_VLA.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL4+": 2,
"EAL5+": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"KISA": {
"KISA": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 1
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 1,
"EF.SOD": 1
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.1.1": 1,
"GlobalPlatform 2.1.1": 1
},
"JavaCard": {
"Java Card 2.2.2": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"ICAO": {
"ICAO": 11
},
"ISO": {
"ISO/IEC 14443-4": 1
},
"PKCS": {
"PKCS#3": 1
},
"SCP": {
"SCP02": 7
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ITSCC",
"/CreationDate": "D:20110217141144",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20110217141144",
"/Producer": "GPL Ghostscript 8.15",
"/Title": "Microsoft Word - CR_-_SK_e-pass_V1.0_KECS-ISIS-0254-2010__-_Final.docx",
"pdf_file_size_bytes": 598026,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
},
"st_filename": "20110217161721.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 6
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 7,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.AA": 1,
"O.S": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 16,
"ADV_ATC.1": 1,
"ADV_DPT.1": 2,
"ADV_DPT.2": 1,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 14,
"ADV_IMP.1": 4,
"ADV_IMP.2": 21,
"ADV_TDS.1": 2,
"ADV_TDS.3": 20
},
"AGD": {
"AGD_OPE.1": 16,
"AGD_PRE.1": 11
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 17,
"ALC_CMC.5": 5,
"ALC_CMS.1": 1,
"ALC_CMS.4": 8,
"ALC_DEL.1": 8,
"ALC_DVS.1": 7,
"ALC_LCD.1": 10,
"ALC_TAT.1": 10
},
"ASE": {
"ASE_CCL.1": 15,
"ASE_ECD.1": 15,
"ASE_INT.1": 17,
"ASE_OBJ.2": 12,
"ASE_REQ.1": 2,
"ASE_REQ.2": 14,
"ASE_SPD.1": 11,
"ASE_TSS.1": 8
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 8,
"ATE_DPT.1": 2,
"ATE_DPT.2": 15,
"ATE_FUN.1": 15,
"ATE_IND.2": 8
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.4": 12,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL4": 13,
"EAL4 augmented": 1,
"EAL4+": 4,
"EAL5+": 3
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 31,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 22,
"FCS_CKM.2.1": 2,
"FCS_CKM.4": 17,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 20,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 17,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 13,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 2,
"FDP_DAU.1": 9,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_IFC.1": 6,
"FDP_ITC.1": 8,
"FDP_ITC.2": 8,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1,
"FDP_UCT.1": 12,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 12,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 12,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU.1": 31,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.2": 9,
"FIA_UAU.2.1": 1,
"FIA_UAU.4": 10,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 19,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_CKM.4": 2,
"FMT_MOF.1": 20,
"FMT_MOF.1.1": 2,
"FMT_MSA.1": 14,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 14,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 51,
"FMT_MTD.1.1": 5,
"FMT_MTD.3": 10,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 26,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 21,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 2
},
"FPT": {
"FPT_FLS.1": 11,
"FPT_FLS.1.1": 1,
"FPT_ITI.1": 11,
"FPT_ITI.1.1": 1,
"FPT_ITI.1.2": 1,
"FPT_TST.1": 12,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC.1": 6,
"FTP_TRP.1": 5
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 37
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-224": 6,
"SHA-256": 5
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 6,
"EF.DG1": 3,
"EF.DG10": 1,
"EF.DG11": 1,
"EF.DG12": 1,
"EF.DG13": 2,
"EF.DG14": 2,
"EF.DG15": 3,
"EF.DG16": 3,
"EF.DG2": 3,
"EF.DG3": 3,
"EF.DG4": 3,
"EF.DG5": 2,
"EF.DG6": 1,
"EF.DG7": 1,
"EF.DG8": 1,
"EF.DG9": 1,
"EF.SOD": 4
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 3
},
"JavaCard": {
"Java Card 2.2.2": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 6,
"malfunction": 8
},
"SCA": {
"DPA": 1,
"SPA": 1
},
"other": {
"Reverse Engineering": 1,
"reverse engineering": 2
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-97-001": 1
},
"ICAO": {
"ICAO": 24
},
"ISO": {
"ISO/IEC 10118-3": 1,
"ISO/IEC 11770-2": 3,
"ISO/IEC 14443": 2,
"ISO/IEC 14443-4": 2,
"ISO/IEC 15946-2": 1,
"ISO/IEC 15946-3": 2
},
"PKCS": {
"PKCS#3": 3
},
"SCP": {
"SCP02": 162
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 2
},
"DES": {
"DES": 12
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 13
}
},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 10
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "SK C\u0026C",
"/CreationDate": "D:20100812101156Z",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20100817111056+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "\ubcf4\uc548\ubaa9\ud45c\uba85\uc138\uc11c",
"pdf_file_size_bytes": 1107779,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 117
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"EPASS_V2.1"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/20110221143918.pdf",
"pp_name": "ePassport Protection Profile V2.1, Version 2.1"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20110217175953.pdf",
"scheme": "KR",
"security_level": {
"_type": "Set",
"elements": [
"ATE_DPT.2",
"ADV_IMP.2",
"AVA_VAN.4",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20110217161721.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "71a09964a8a498aec2c007d394c5f0d5e1103ef0b1f4b0960b37b99e785024c5",
"txt_hash": "1934ac5ad645139a12c359582ed86c53ef2b2b1be272a62558ddd4db7d6f9f04"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0eb855f0cd73621fc001f967e465ece7f64fc56fa84779b9168f0b2241f06c2a",
"txt_hash": "8ec0fdf224cd8a01e0d903043563ef90031979acac88b6269bb358ddad14e976"
}
},
"status": "archived"
}