KB100 SCR eSIG S26381-K101-Lx 20-*-1, FW-Version 2.0.0, HW-Version HOS: 01

CSV information ?

Status archived
Valid from 06.04.2018
Valid until 06.04.2023
Scheme 🇩🇪 DE
Manufacturer Fujitsu Technology Solutions GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ATE_COV.2, ADV_TDS.3, ATE_FUN.1, ASE_OBJ.2, ATE_IND.2, ASE_INT.1, ADV_ARC.1, ASE_CCL.1, ALC_DVS.1, ASE_SPD.1, ASE_TSS.1, ADV_FSP.4, AVA_VAN.3, ALC_CMS.3, ADV_IMP.1, AGD_OPE.1, ASE_ECD.1, ALC_CMC.3, ASE_REQ.2, ALC_TAT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.1
Maintenance updates KB100 SCR eSIG, S26381-K101-Lx 20-*-1, FW-Version 2.0.0, HW-Version HOS: 01 (06.10.2020) Certification report

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1046-2018

Certificate ?

Extracted keywords

Security level
EAL 2
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Certificates
BSI-DSZ-CC-1046-2018

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certification Report BSI-DSZ-CC-1046-2018
Subject KB100 SCR eSIG series, S26381-K101-Lx 20-*-1, FW-Version 2.0.0, HW-Version HOS: 01
Keywords "Common Criteria, Certification, Zertifizierung, Smartcard Keyboard, Secure PIN entry, HID, CCID"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20180423140831+02'00'
Modification date D:20180423144254+02'00'
Pages 1
Creator Writer
Producer LibreOffice 5.2

Certification report ?

Extracted keywords

Hash functions
SHA-256

Security level
EAL 2, EAL 1, EAL 4, EAL 2+, EAL 3, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_FLR, ALC_DEL, ALC_DEL.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FIA_UAU.7, FPT_EMS.1, FPT_PHP.1, FTA_TAB.1
Certificates
BSI-DSZ-CC-1046-2018
Evaluation facilities
SRC Security Research & Consulting

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, GmbH [7] Evaluation Technical Report, Version 1.6, 05.03.2018, SRC Security Research & Consulting, (confidential document) [8] Configuration list for the TOE, Version 0.30, 16.02.2018, Konfigurationsliste KB100SCReSIG

Standards
AIS 1, AIS 32, AIS 48, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1046-2018
Subject KB100 SCR eSIG series, S26381-K101-Lx 20-*-1, FW-Version 2.0.0, HW-Version HOS: 01
Keywords "Common Criteria, Certification, Zertifizierung, Smartcard Keyboard, Secure PIN entry, HID, CCID"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20180423140809+02'00'
Modification date D:20180423143141+02'00'
Pages 26
Creator Writer
Producer LibreOffice 5.2

Frontpage

Certificate ID BSI-DSZ-CC-1046-2018
Certified item KB100 SCR eSIG, S26381-K101-Lx 20-*-1, FW- Version 2.0.0, HW-Version HOS: 01
Certification lab BSI
Developer Fujitsu Technology Solutions GmbH

Security target ?

Extracted keywords

Hash functions
SHA-256
Protocols
PACE

Security level
EAL 3, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DEL.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, AVA_VAN.2, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ.1, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FIA_UAU.7, FIA_UAU.1, FIA_UAU.7.1, FIA_UID.7, FMT_MSA.3, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FTA_TAB.1, FTA_TAB.1.1
Protection profiles
BSI-CC-PP-0068-V2-2011-MA-01
Certificates
BSI-DSZ-CC-1046

Side-channel analysis
timing attacks, physical tampering
Certification process
security function SF.1, security function SF.2

Standards
AIS 48, ISO/IEC 7816-4, ISO/IEC 7816-8, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003

File metadata

Title Security Target for KB100 SCR eSIG
Subject Security Target
Keywords BSI-DSZ-CC-1046; KB100 SCR eSIG
Author Jürgen Meier;[email protected]
Creation date D:20180216151130+01'00'
Modification date D:20180216151130+01'00'
Pages 30
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics ?

Certificate ID: BSI-DSZ-CC-1046-2018

Extracted SARs

AGD_OPE.1, ASE_REQ.2, ALC_DVS.1, ALC_LCD.1, ALC_DEL.1, ADV_FSP.4, ASE_ECD.1, ASE_SPD.1, ASE_TSS.1, ASE_OBJ.2, AVA_VAN.3, AGD_PRE.1, ATE_COV.2, ASE_INT.1, ATE_DPT.1, ADV_TDS.3, ATE_IND.2, ATE_FUN.1, ALC_CMC.3, ALC_TAT.1, ADV_ARC.1, ASE_CCL.1, ADV_IMP.1, ALC_CMS.3

Similar certificates

Name Certificate ID
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35) None Compare
SmartCase KB SCR eSIG (S26381-K529-Vxxx) Hardware-Version HOS:01, Firmware-Version 1.20 BSI-DSZ-CC-0525-2010 Compare
ZEMO VML-GK2, V.3.1.0 FW-Version 3.1.0, HW-Version 2.0.0 BSI-DSZ-CC-0623-V2-2018 Compare
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. IC3S/BG01/HALTDOS/EAL2/0317/0008 Compare
Ricoh Aficio SP 5200S/5210SF/5210SR, Savin SP 5200S/5210SF/5210SR, Lanier SP 5200S/5210SF/5210SR, nashuatec SP 5200S/5210SF/5210SR, Rex-Rotary SP 5200S/5210SF/5210SR, Gestetner SP 5200S/5210SF/5210SR all of above with Facsimile Function Version: - Software: System/Copy 2.02, Network Support 10.63, Fax 02.00.00, RemoteFax 01.00.00, NetworkDocBox 1.04, Web Support 1.02, Web Uapl 1.02, animation 1.01, Scanner 01.03, Printer 1.02.1, PCL 1.02, PCL Font 1.05, Data Erase Std 1.01m, GWFCU3-24(WW) 02.00.00, Engine A2.0:20, Engine(Scanner) 1.01:00, OpePanel 1.02, LANG0 1.02, LANG1 1.02 Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0366 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
Showing 5 out of 6.

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9068c30d48fc8879bf243c33ad6831eb9d62e13e1e8f88c3ffbf86f34d822b1b', 'txt_hash': 'd8653c6d162d6bfc1d4290823261495646a49a186bfc9dbc0f4260ffa5641f0d'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c7c50d92792caf2d1b2f45c291a63eddd1c4c519ff741e3ff6af550887ea4129', 'txt_hash': '128293ba6e7d105fab0a83a833b9b15a9ff29d96eae8f286d6d1ecc2c4e92477'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4528380d357e6ead299c233ebd084f6b4f9f3a83236dac774680ff45c973c21a', 'txt_hash': '1979f23a59239189985bd0c70ef682a9b867bf66e49d1cf1c7f6e191e346079d'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1317842, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 26, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180423140809+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Smartcard Keyboard, Secure PIN entry, HID, CCID"', '/ModDate': "D:20180423143141+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'KB100 SCR eSIG series, S26381-K101-Lx 20-*-1, FW-Version 2.0.0, HW-Version HOS: 01', '/Title': 'Certification Report BSI-DSZ-CC-1046-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.sogisportal.eu/', 'https://www.bsi.bund.de/', 'http://support.ts.fujitsu.com/IndexDownload.asp', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/cc/', 'http://www.commoncriteriaportal.org/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 679005, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 30, '/Title': 'Security Target for KB100 SCR eSIG', '/Author': 'Jürgen Meier;[email protected]', '/Subject': 'Security Target', '/Keywords': 'BSI-DSZ-CC-1046; KB100 SCR eSIG', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20180216151130+01'00'", '/ModDate': "D:20180216151130+01'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 909847, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180423140831+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Smartcard Keyboard, Secure PIN entry, HID, CCID"', '/ModDate': "D:20180423144254+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'KB100 SCR eSIG series, S26381-K101-Lx 20-*-1, FW-Version 2.0.0, HW-Version HOS: 01', '/Title': 'Certification Report BSI-DSZ-CC-1046-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1046-2018', 'cert_item': 'KB100 SCR eSIG, S26381-K101-Lx 20-*-1, FW- Version 2.0.0, HW-Version HOS: 01', 'developer': 'Fujitsu Technology Solutions GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, AGD_OPE.1, AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1046-2018': 14}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 2, 'EAL 1': 1, 'EAL 4': 1, 'EAL 2+': 1, 'EAL 3': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 4, 'ADV_IMP.1': 4, 'ADV_TDS.3': 4}, 'AGD': {'AGD_OPE.1': 3, 'AGD_PRE.1': 3}, 'ALC': {'ALC_CMC.3': 3, 'ALC_CMS.3': 3, 'ALC_DVS.1': 3, 'ALC_LCD.1': 3, 'ALC_TAT.1': 4, 'ALC_FLR': 2, 'ALC_DEL': 2, 'ALC_DEL.1': 3}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.1': 3, 'ATE_FUN.1': 3, 'ATE_IND.2': 3}, 'AVA': {'AVA_VAN.3': 3, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 3, 'ASE_ECD.1': 3, 'ASE_INT.1': 3, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 3}}, 'cc_sfr': {'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_RIP.1': 1}, 'FIA': {'FIA_UAU.7': 1}, 'FPT': {'FPT_EMS.1': 1, 'FPT_PHP.1': 2}, 'FTA': {'FTA_TAB.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'SRC': {'SRC Security Research & Consulting': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 5}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 1': 1, 'AIS 32': 1, 'AIS 48': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'GmbH [7] Evaluation Technical Report, Version 1.6, 05.03.2018, SRC Security Research & Consulting, (confidential document) [8] Configuration list for the TOE, Version 0.30, 16.02.2018, Konfigurationsliste KB100SCReSIG': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1046': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0068-V2-2011-MA-01': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 3, 'EAL 3 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 4, 'ADV_IMP.1': 5, 'ADV_TDS.3': 4, 'ADV_ARC': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 3, 'AGD_PRE.1': 3}, 'ALC': {'ALC_DEL.1': 5, 'ALC_CMC.3': 3, 'ALC_CMS.3': 3, 'ALC_DVS.1': 3, 'ALC_LCD.1': 3, 'ALC_TAT.1': 4}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.1': 3, 'ATE_FUN.1': 3, 'ATE_IND.2': 3}, 'AVA': {'AVA_VAN.3': 3, 'AVA_VAN.2': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ.1': 2, 'ASE_ECD': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 3, 'ASE_ECD.1': 3, 'ASE_INT.1': 3, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_SPD.1': 3, 'ASE_TSS.1': 3}}, 'cc_sfr': {'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 10, 'FDP_RIP.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_UAU.7': 8, 'FIA_UAU.1': 3, 'FIA_UAU.7.1': 1, 'FIA_UID.7': 1}, 'FMT': {'FMT_MSA.3': 5}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 11, 'FPT_EMS.1.1': 3, 'FPT_PHP.1': 6, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1}, 'FTA': {'FTA_TAB.1': 7, 'FTA_TAB.1.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 5}}}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'timing attacks': 1}, 'FI': {'physical tampering': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 48': 3}, 'ISO': {'ISO/IEC 7816-4': 4, 'ISO/IEC 7816-8': 16}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'SecurityFunction': {'security function SF.1': 1, 'security function SF.2': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1046-2018': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 1046a_pdf.pdf.
    • The st_filename property was set to 1046b_pdf.pdf.
    • The cert_filename property was set to 1046c_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1046-2018.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1046a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1046b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name KB100 SCR eSIG S26381-K101-Lx 20-*-1, FW-Version 2.0.0, HW-Version HOS: 01 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1046c_pdf.pdf",
  "dgst": "b72b0ec554c98588",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1046-2018",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2020-10-06",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1046MA1a.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "KB100 SCR eSIG, S26381-K101-Lx 20-*-1, FW-Version 2.0.0, HW-Version HOS: 01"
      }
    ]
  },
  "manufacturer": "Fujitsu Technology Solutions GmbH",
  "manufacturer_web": "https://ts.fujitsu.com/",
  "name": "KB100 SCR eSIG S26381-K101-Lx 20-*-1, FW-Version 2.0.0, HW-Version HOS: 01",
  "not_valid_after": "2023-04-06",
  "not_valid_before": "2018-04-06",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1046c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1046-2018": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180423140831+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smartcard Keyboard, Secure PIN entry, HID, CCID\"",
      "/ModDate": "D:20180423144254+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "KB100 SCR eSIG series, S26381-K101-Lx 20-*-1, FW-Version 2.0.0, HW-Version HOS: 01",
      "/Title": "Certification Report BSI-DSZ-CC-1046-2018",
      "pdf_file_size_bytes": 909847,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1046a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, AGD_OPE.1, AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3",
        "cc_version": "Product specific Security Target Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1046-2018",
        "cert_item": "KB100 SCR eSIG, S26381-K101-Lx 20-*-1, FW- Version 2.0.0, HW-Version HOS: 01",
        "cert_lab": "BSI",
        "developer": "Fujitsu Technology Solutions GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "None"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1046-2018": 14
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 4,
          "ADV_TDS.3": 4
        },
        "AGD": {
          "AGD_OPE.1": 3,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.3": 3,
          "ALC_CMS.3": 3,
          "ALC_DEL": 2,
          "ALC_DEL.1": 3,
          "ALC_DVS.1": 3,
          "ALC_FLR": 2,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 4
        },
        "ASE": {
          "ASE_CCL.1": 3,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 3,
          "ASE_REQ.2": 3,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_COV.2": 3,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 3
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 3": 1,
          "EAL 3 augmented": 1,
          "EAL 4": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACF.1": 1,
          "FDP_RIP.1": 1
        },
        "FIA": {
          "FIA_UAU.7": 1
        },
        "FPT": {
          "FPT_EMS.1": 1,
          "FPT_PHP.1": 2
        },
        "FTA": {
          "FTA_TAB.1": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "GmbH [7] Evaluation Technical Report, Version 1.6, 05.03.2018, SRC Security Research \u0026 Consulting, (confidential document) [8] Configuration list for the TOE, Version 0.30, 16.02.2018, Konfigurationsliste KB100SCReSIG": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 32": 1,
          "AIS 48": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180423140809+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smartcard Keyboard, Secure PIN entry, HID, CCID\"",
      "/ModDate": "D:20180423143141+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "KB100 SCR eSIG series, S26381-K101-Lx 20-*-1, FW-Version 2.0.0, HW-Version HOS: 01",
      "/Title": "Certification Report BSI-DSZ-CC-1046-2018",
      "pdf_file_size_bytes": 1317842,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "http://support.ts.fujitsu.com/IndexDownload.asp",
          "https://www.bsi.bund.de/",
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    },
    "st_filename": "1046b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1046": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0068-V2-2011-MA-01": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 2,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 5,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 4
        },
        "AGD": {
          "AGD_OPE.1": 3,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.3": 3,
          "ALC_CMS.3": 3,
          "ALC_DEL.1": 5,
          "ALC_DVS.1": 3,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 4
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_CCL.1": 3,
          "ASE_ECD": 2,
          "ASE_ECD.1": 3,
          "ASE_INT": 2,
          "ASE_INT.1": 3,
          "ASE_OBJ.1": 2,
          "ASE_OBJ.2": 4,
          "ASE_REQ": 2,
          "ASE_REQ.2": 4,
          "ASE_SPD": 2,
          "ASE_SPD.1": 3,
          "ASE_TSS": 2,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_COV.2": 3,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 3
        },
        "AVA": {
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 3,
          "EAL 3 augmented": 2
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 10,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_RIP.1": 7,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_UAU.1": 3,
          "FIA_UAU.7": 8,
          "FIA_UAU.7.1": 1,
          "FIA_UID.7": 1
        },
        "FMT": {
          "FMT_MSA.3": 5
        },
        "FPT": {
          "FPT_EMS": 6,
          "FPT_EMS.1": 11,
          "FPT_EMS.1.1": 3,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1
        },
        "FTA": {
          "FTA_TAB.1": 7,
          "FTA_TAB.1.1": 1
        }
      },
      "certification_process": {
        "SecurityFunction": {
          "security function SF.1": 1,
          "security function SF.2": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 3
        },
        "SCA": {
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 48": 3
        },
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1
        },
        "ISO": {
          "ISO/IEC 7816-4": 4,
          "ISO/IEC 7816-8": 16
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "J\u00fcrgen Meier;[email protected]",
      "/CreationDate": "D:20180216151130+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "BSI-DSZ-CC-1046; KB100 SCR eSIG",
      "/ModDate": "D:20180216151130+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "Security Target",
      "/Title": "Security Target for KB100 SCR eSIG",
      "pdf_file_size_bytes": 679005,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 30
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1046a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_IMP.1",
      "ASE_INT.1",
      "ADV_FSP.4",
      "ADV_TDS.3",
      "ALC_LCD.1",
      "ALC_CMS.3",
      "ASE_CCL.1",
      "ATE_DPT.1",
      "ALC_TAT.1",
      "ASE_REQ.2",
      "ALC_DVS.1",
      "ASE_TSS.1",
      "ATE_COV.2",
      "ADV_ARC.1",
      "ATE_FUN.1",
      "ASE_ECD.1",
      "AVA_VAN.3",
      "ASE_OBJ.2",
      "ASE_SPD.1",
      "ATE_IND.2",
      "AGD_OPE.1",
      "ALC_CMC.3",
      "AGD_PRE.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1046b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4528380d357e6ead299c233ebd084f6b4f9f3a83236dac774680ff45c973c21a",
      "txt_hash": "1979f23a59239189985bd0c70ef682a9b867bf66e49d1cf1c7f6e191e346079d"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9068c30d48fc8879bf243c33ad6831eb9d62e13e1e8f88c3ffbf86f34d822b1b",
      "txt_hash": "d8653c6d162d6bfc1d4290823261495646a49a186bfc9dbc0f4260ffa5641f0d"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c7c50d92792caf2d1b2f45c291a63eddd1c4c519ff741e3ff6af550887ea4129",
      "txt_hash": "128293ba6e7d105fab0a83a833b9b15a9ff29d96eae8f286d6d1ecc2c4e92477"
    }
  },
  "status": "archived"
}