SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; andBP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110400Q100

CSV information

Status active
Valid from 24.03.2025
Valid until 24.03.2030
Scheme 🇯🇵 JP
Manufacturer Sharp Corporation
Category Multi-Function Devices
Security level
Protection profiles

Heuristics summary

Certificate ID: JISEC-CC-CRP-C0838-01-2025

Certificate

Extracted keywords

Certificates
JISEC-CC-CRP-C0838-01-2025
Evaluation facilities
Information Technology Security Center

File metadata

Title C0838_Certificate_01
Author Information-technology Promotion Agency, Japan
Creation date D:20250507114310+09'00'
Modification date D:20250507114431+09'00'
Pages 2
Creator Word 用 Acrobat PDFMaker 20
Producer Adobe PDF Library 20.5.172

Certification report

Extracted keywords

Symmetric Algorithms
AES, AES-, HMAC, HMAC-SHA-256, HMAC-SHA-384
Asymmetric Algorithms
ECDSA
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512
Protocols
TLS 1.2, TLS
Randomness
DRBG
Block cipher modes
ECB, CBC, CTR, GCM

Vendor
Microsoft

Claims
D.USER, D.TSF, T.UNAUTHORIZED_ACCESS, T.TSF_COMPROMISE, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.NET_COMPROMISE, A.PHYSICAL, A.NETWORK, A.TRUSTED_ADMIN, A.TRAINED_USERS
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1
Certificates
JISEC-CC-CRP-C0838-01-2025
Evaluation facilities
Information Technology Security Center

Side-channel analysis
malfunction

Standards
CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date D:20250616142742+09'00'
Modification date D:20250616142904+09'00'
Pages 32
Creator Word 用 Acrobat PDFMaker 20
Producer Adobe PDF Library 20.5.28

Security target

Extracted keywords

Symmetric Algorithms
AES, AES-128, AES-256, HMAC, HMAC-SHA-256, HMAC-SHA-384
Asymmetric Algorithms
ECDSA
Hash functions
SHA-1, SHA-256, SHA-512, SHA-384
Schemes
MAC
Protocols
SSH, SSL, TLS, TLS 1.2, TLS 1.0, TLS 1.1
Randomness
DRBG, RBG
Elliptic Curves
P-256
Block cipher modes
CBC, GCM
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

Vendor
Microsoft

Claims
D.USER, D.TSF, O.AUDIT, O.COMMS_PROTECTION, O.STORAGE_ENCRYPTION, O.PURGE_DATA, O.UPDATE_VERIFICATION, O.ACCESS_CONTROL, O.USER_AUTHORIZATION, O.ADMIN_ROLES, O.TSF_SELF_TEST, O.KEY_MATERIAL, O.FAX_NET_SEPARATION, T.UNAUTHORIZED_ACCESS, T.TSF_COMPROMISE, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.NET_COMPROMISE, A.PHYSICAL, A.NETWORK, A.TRUSTED_ADMIN, A.TRAINED_USERS, OE.PHYSICAL_PROTECTION, OE.NETWORK_PROTECTION, OE.ADMIN_TRUST, OE.USER_TRAINING, OE.ADMIN_TRAINING
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_GEN, FAU_STG_EXT.1, FAU_GEN.1, FAU_STG_EXT.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.4, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FCS_CKM_EXT, FCS_KYC_EXT, FCS_RBG_EXT, FCS_SMC_EXT, FCS_TLS_EXT, FCS_CKM_EXT.4, FCS_CKM.1, FCS_CKM.4, FCS_CKM_EXT.4.1, FCS_TLS_EXT.1, FCS_KYC_EXT.1, FCS_COP.1, FCS_SMC_EXT.1, FCS_KDF_EXT.1, FCS_KYC_EXT.1.1, FCS_RBG_EXT.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SMC_EXT.1.1, FCS_TLS_EXT.1.1, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_SSH_EXT.1, FDP_DSK_EXT, FDP_FXS_EXT, FDP_DSK_EXT.1, FDP_DSK_EXT.1.1, FDP_DSK_EXT.1.2, FDP_FXS_EXT.1, FDP_FXS_EXT.1.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_ACC, FIA_PMG_EXT, FIA_PMG, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_PMG_EXT.1, FIA_PMG_EXT.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_KYP_EXT, FPT_SKP_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_SKP_EXT.1, FPT_SKP_EXT.1.1, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM, FPT_STM.1, FPT_KYP_EXT.1, FPT_STM.1.1, FPT_KYP_EXT.1.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Side-channel analysis
malfunction

Standards
FIPS PUB 186-4, FIPS PUB 198-1, FIPS PUB 180-3, FIPS PUB 197, NIST SP 800-90A, NIST SP 800-38A, NIST SP 800-38D, RFC 2818, RFC 2246, RFC 4346, RFC 5246, ISO/IEC 18033-3, ISO/IEC 10116, ISO/IEC 10118-, ISO/IEC 18031:2011, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20250613094502+09'00'
Modification date D:20250613094534+09'00'
Pages 67
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

Certificate ID: JISEC-CC-CRP-C0838-01-2025

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1, ATE_IND.1, AVA_VAN.1

Similar certificates

Name Certificate ID
SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110240Q100 JISEC-CC-CRP-C0772-01-2023 Compare
SHARP BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U and MX-PK130240Q100 JISEC-CC-CRP-C0773-01-2023 Compare
SHARP BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U and MX-PK130400Q100 JISEC-CC-CRP-C0839-01-2025 Compare
SHARP BP-70C65 / 70C55 / 70C45 / 70C26 / 60C36 / 60C31 / 60C26 / 50C65 / 50C55 / 50C45 fax-standardPS-standard model with BP-FR12U; BP-40C36 / 40C26 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70C65 / 70C55 / 70C45 / 70C36 / 70C31 / 60C45 / 60C36 / 60C31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-55C26 / 50C65 / 50C55 / 50C45 / 50C36 / 50C31 / 50C26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110400Q100 JISEC-CC-CRP-C0836-01-2025 Compare
SHARP BP-70C65 / 70C55 / 70C45 / 70C26 / 60C36 / 60C31 / 60C26 / 50C65 / 50C55 / 50C45 fax-standard PS-standard model with BP-FR12U; BP-40C36 / 40C26 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70C65 / 70C55 / 70C45 / 70C36 / 70C31 / 60C45 / 60C36 / 60C31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-55C26 / 50C65 / 50C55 / 50C45 / 50C36 / 50C31 / 50C26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX11 0220Q100 JISEC-CC-CRP-C0767-01-2022 Compare
SHARP BP-70C65 / 70C55 / 70C45 / 70C36 / 70C31 / 60C45 / 60C36 / 60C31 fax-optional PS-standard model with BP-FR12U; and BP-55C26 / 50C65 / 50C55 / 50C45 / 50C36 / 50C31 / 50C26 fax-optional PS-optional model with BP-FR12U and MX-PK13 0220Q100 JISEC-CC-CRP-C0768-01-2022 Compare
SHARP BP-70C65 / 70C55 / 70C45 / 70C36 / 70C31 / 60C45 / 60C36 / 60C31 fax-optional PS-standard model with BP-FR12U; and BP-55C26 / 50C65 / 50C55 / 50C45 / 50C36 / 50C31 / 50C26 fax-optional PS-optional model with BP-FR12U and MX-PK130400Q100 JISEC-CC-CRP-C0837-01-2025 Compare
SHARP MX-M6071 / M5071 / M4071 / M3531 fax standard model with MX-FR64U and MX-PK13; MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U and MX-FX15; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U, MX-PK13 and MX-FX15; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16, MX-PK13 and MX-FX150210zd00 JISEC-CC-CRP-C0677-01-2020 Compare
SHARP BP-30C25 fax standard model with BP-FR10U; and BP-30C25 fax option model with BP-FR10U, MX-PK13 and MX-FX150110Uc00 JISEC-CC-CRP-C0694-01-2020 Compare
SHARP BP-30C25 fax standard model with BP-FR10U; and BP-30C25 fax option model with BP-FR10U, MX-PK13 and MX-FX15 0110Uc00 JISEC-CC-CRP-C0694-01-2020 Compare
SHARP BP-70M90 / 70M75 fax-standard model with BP-FR12U; and BP-70M90 / 70M75 fax-optional model with BP FR12U and BP-FX110220t300 JISEC-CC-CRP-C0783-01-2023 Compare
SHARP MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U and MX-PK13; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16 and MX-PK130210zd00 JISEC-CC-CRP-C0678 Compare
SHARP MX-8081 fax standard model with MX-FR65U; and MX-8081 / 7081 fax option model with MX-FR65U and MX-FX150110Se00 JISEC-CC-CRP-C0710-01-2021 Compare
MX-M6070 / M5070 / M4070 fax standard model with MX-FR57U and MX-PK13; and MX-M6070 / M5070 / M4070 / M3570 / M3070 fax option model with MX-FR57U and MX-FX150210zc00 JISEC-CC-CRP-C0596-01-2018 Compare
Showing 5 out of 14.

Scheme data ?

Cert Id JISEC-CC-CRP-C0838
Supplier SHARP CORPORATION
Toe Overseas Name SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110400Q100
Expiration Date 01.03.2030
Claim PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
Certification Date 01.03.2025
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0838_it4893.html
Toe Japan Name SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110400Q100
Enhanced
Product SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX11
Toe Version 0400Q100
Product Type Multifunction Device
Cert Id JISEC-CC-CRP-C0838
Certification Date 24.03.2025
Expiration Date 24.03.2030
Cc Version 3.1 Release 5
Assurance Level ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
Protection Profile Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
Vendor SHARP CORPORATION
Evaluation Facility Information Technology Security Center Evaluation Department
Report Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/d662m3000000uu9l-att/c0838_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/d662m3000000uu9l-att/c0838_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/d662m3000000uu9l-att/c0838_est.pdf
Description PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device (MFD) that has the functions, such as copy, print, scan, fax and filing. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Stored Data Encryption Function Network Protection Function Security Management Function Audit Function Software Verification Function Self-testing Function Fax Line Separation Function

References

No references are available for this certificate.

Updates

  • 23.06.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; andBP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110400Q100 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Multi-Function Devices",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0838_eimg.pdf",
  "dgst": "31cbe3b9c2f6e5a4",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0838-01-2025",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:sharp:bp-70m31:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sharp:bp-50m36:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sharp:bp-50m26:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sharp:bp-70m45:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sharp:bp-50m31:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sharp:bp-50m55:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sharp:bp-70m55:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sharp:bp-70m65:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sharp:bp-70m36:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sharp:bp-50m45:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "b2cfec7a92fa2940"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0838",
      "certification_date": "2025-03-01",
      "claim": "PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)",
      "enhanced": {
        "assurance_level": "ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1",
        "cc_version": "3.1 Release 5",
        "cert_id": "JISEC-CC-CRP-C0838",
        "cert_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/d662m3000000uu9l-att/c0838_eimg.pdf",
        "certification_date": "2025-03-24",
        "description": "PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device (MFD) that has the functions, such as copy, print, scan, fax and filing. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Stored Data Encryption Function Network Protection Function Security Management Function Audit Function Software Verification Function Self-testing Function Fax Line Separation Function",
        "evaluation_facility": "Information Technology Security Center Evaluation Department",
        "expiration_date": "2030-03-24",
        "product": "SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX11",
        "product_type": "Multifunction Device",
        "protection_profile": "Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)",
        "report_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/d662m3000000uu9l-att/c0838_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/d662m3000000uu9l-att/c0838_est.pdf",
        "toe_version": "0400Q100",
        "vendor": "SHARP CORPORATION"
      },
      "expiration_date": "2030-03-01",
      "supplier": "SHARP CORPORATION",
      "toe_japan_name": "SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110400Q100",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0838_it4893.html",
      "toe_overseas_name": "SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110400Q100"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sharp Corporation",
  "manufacturer_web": "https://sharp-world.com/",
  "name": "SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; andBP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110400Q100",
  "not_valid_after": "2030-03-24",
  "not_valid_before": "2025-03-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "c0838_eimg.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "JISEC-CC-CRP-C0838-01-2025": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ITSC": {
          "Information Technology Security Center": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Information-technology Promotion Agency, Japan",
      "/CreationDate": "D:20250507114310+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 20",
      "/Keywords": "",
      "/ModDate": "D:20250507114431+09\u002700\u0027",
      "/Producer": "Adobe PDF Library 20.5.172",
      "/Subject": "",
      "/Title": "C0838_Certificate_01",
      "pdf_file_size_bytes": 231933,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 2
    },
    "report_filename": "c0838_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 2
          }
        }
      },
      "cc_cert_id": {
        "JP": {
          "JISEC-CC-CRP-C0838-01-2025": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.NETWORK": 1,
          "A.PHYSICAL": 1,
          "A.TRAINED_USERS": 1,
          "A.TRUSTED_ADMIN": 1
        },
        "D": {
          "D.TSF": 3,
          "D.USER": 3
        },
        "T": {
          "T.NET_COMPROMISE": 1,
          "T.TSF_COMPROMISE": 1,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNAUTHORIZED_UPDATE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 9,
            "TLS 1.2": 5
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ITSC": {
          "Information Technology Security Center": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2,
            "AES-": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20250616142742+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 20",
      "/Keywords": "",
      "/ModDate": "D:20250616142904+09\u002700\u0027",
      "/Producer": "Adobe PDF Library 20.5.28",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 515412,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 32
    },
    "st_filename": "c0838_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 4
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NETWORK": 1,
          "A.PHYSICAL": 1,
          "A.TRAINED_USERS": 1,
          "A.TRUSTED_ADMIN": 1
        },
        "D": {
          "D.TSF": 3,
          "D.USER": 13
        },
        "O": {
          "O.ACCESS_CONTROL": 7,
          "O.ADMIN_ROLES": 4,
          "O.AUDIT": 8,
          "O.COMMS_PROTECTION": 11,
          "O.FAX_NET_SEPARATION": 1,
          "O.KEY_MATERIAL": 1,
          "O.PURGE_DATA": 2,
          "O.STORAGE_ENCRYPTION": 6,
          "O.TSF_SELF_TEST": 1,
          "O.UPDATE_VERIFICATION": 2,
          "O.USER_AUTHORIZATION": 7
        },
        "OE": {
          "OE.ADMIN_TRAINING": 1,
          "OE.ADMIN_TRUST": 1,
          "OE.NETWORK_PROTECTION": 1,
          "OE.PHYSICAL_PROTECTION": 1,
          "OE.USER_TRAINING": 1
        },
        "T": {
          "T.NET_COMPROMISE": 1,
          "T.TSF_COMPROMISE": 1,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNAUTHORIZED_UPDATE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 17,
          "FAU_GEN.1": 17,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 4,
          "FAU_SAR.2.1": 1,
          "FAU_STG.1": 8,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 1,
          "FAU_STG.4": 5,
          "FAU_STG.4.1": 1,
          "FAU_STG_EXT": 4,
          "FAU_STG_EXT.1": 8,
          "FAU_STG_EXT.1.1": 2
        },
        "FCS": {
          "FCS_CKM.1": 42,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 8,
          "FCS_CKM.4.1": 1,
          "FCS_CKM_EXT": 4,
          "FCS_CKM_EXT.4": 28,
          "FCS_CKM_EXT.4.1": 2,
          "FCS_COP.1": 102,
          "FCS_COP.1.1": 5,
          "FCS_KDF_EXT.1": 4,
          "FCS_KYC_EXT": 5,
          "FCS_KYC_EXT.1": 8,
          "FCS_KYC_EXT.1.1": 3,
          "FCS_RBG_EXT": 4,
          "FCS_RBG_EXT.1": 21,
          "FCS_RBG_EXT.1.1": 2,
          "FCS_RBG_EXT.1.2": 2,
          "FCS_SMC_EXT": 4,
          "FCS_SMC_EXT.1": 13,
          "FCS_SMC_EXT.1.1": 2,
          "FCS_SSH_EXT.1": 6,
          "FCS_TLS_EXT": 7,
          "FCS_TLS_EXT.1": 26,
          "FCS_TLS_EXT.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 11,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_DSK_EXT": 4,
          "FDP_DSK_EXT.1": 10,
          "FDP_DSK_EXT.1.1": 2,
          "FDP_DSK_EXT.1.2": 2,
          "FDP_FXS_EXT": 4,
          "FDP_FXS_EXT.1": 6,
          "FDP_FXS_EXT.1.1": 2,
          "FDP_IFC.1": 1,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 4
        },
        "FIA": {
          "FIA_AFL.1": 4,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_PMG": 4,
          "FIA_PMG_EXT": 3,
          "FIA_PMG_EXT.1": 4,
          "FIA_PMG_EXT.1.1": 1,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.7": 4,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 4,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 5,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 8,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 16,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 17,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 15,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_KYP_EXT": 3,
          "FPT_KYP_EXT.1": 4,
          "FPT_KYP_EXT.1.1": 1,
          "FPT_SKP_EXT": 4,
          "FPT_SKP_EXT.1": 6,
          "FPT_SKP_EXT.1.1": 2,
          "FPT_STM": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1,
          "FPT_TST_EXT": 4,
          "FPT_TST_EXT.1": 6,
          "FPT_TST_EXT.1.1": 2,
          "FPT_TUD_EXT": 5,
          "FPT_TUD_EXT.1": 12,
          "FPT_TUD_EXT.1.1": 2,
          "FPT_TUD_EXT.1.2": 2,
          "FPT_TUD_EXT.1.3": 3
        },
        "FTA": {
          "FTA_SSL.3": 4,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 21,
          "FTP_ITC.1.1": 3,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 20,
          "FTP_TRP.1.1": 4,
          "FTP_TRP.1.2": 2,
          "FTP_TRP.1.3": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 3
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 40,
            "TLS 1.0": 1,
            "TLS 1.1": 1,
            "TLS 1.2": 7
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 2
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-256": 12,
            "SHA-384": 7,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 5
        },
        "RNG": {
          "RBG": 9
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS PUB 180-3": 1,
          "FIPS PUB 186-4": 2,
          "FIPS PUB 197": 1,
          "FIPS PUB 198-1": 2
        },
        "ISO": {
          "ISO/IEC 10116": 4,
          "ISO/IEC 10118-": 1,
          "ISO/IEC 18031:2011": 3,
          "ISO/IEC 18033-3": 2
        },
        "NIST": {
          "NIST SP 800-38A": 2,
          "NIST SP 800-38D": 2,
          "NIST SP 800-90A": 5
        },
        "RFC": {
          "RFC 2246": 1,
          "RFC 2818": 4,
          "RFC 4346": 1,
          "RFC 5246": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 14,
            "AES-128": 1,
            "AES-256": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 4,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 2,
          "TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 2,
          "TLS_RSA_WITH_AES_256_CBC_SHA256": 2
        }
      },
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20250613094502+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20250613094534+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 786313,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/archive/aes/katmct/katmct.htm"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 67
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0838_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0838_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1b369c70444eda33ca0106fe2d4e48f68932aea4d5dfb297365476c461327fd9",
      "txt_hash": "6bebc07cd1a52ae93275520769f8cc6d7fe3145e678bdc56d930a5d6ba5fee68"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b5074d4b25df6ef800c2b85ea64f08fff8d4bdd4d31f13dfec2c95257f5e31d1",
      "txt_hash": "4e43ddce5cf701bea1992995d1200e05bc0ddc8e7a16f9b73a02de617dea8357"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "931860103dd824690d4a8758f76c95f219fd9f83b8148a8dc2496fb9c0732258",
      "txt_hash": "9be4f75a0e9eff978079fc6987526921846b79f782f418c1bcbd6a11f3309b9d"
    }
  },
  "status": "active"
}