| name |
RADIUSS Core Version 2.0 |
ZTE Base Station Controller Series |
| category |
Other Devices and Systems |
Access Control Devices and Systems |
| scheme |
MY |
NO |
| status |
archived |
archived |
| not_valid_after |
19.10.2017 |
01.09.2019 |
| not_valid_before |
19.10.2012 |
14.09.2012 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr-ISCB-5-RPT-C024-v1a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-038%20CR%20v.1.0.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-RadmikSolutionEAL1RADIUSSCorev1_1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20ZTE%20Base%20Station%20Controllers%20Security%20Target%20v1.0.pdf |
| manufacturer |
Radmik Solutions Sdn Bhd |
ZTE Corporation |
| manufacturer_web |
https://www.radmik.com |
https://wwwen.zte.com.cn/global/index.html |
| security_level |
EAL1 |
EAL2+, ALC_FLR.2 |
| dgst |
0f05f3be40f84ebd |
f64f9dac4a49fc2b |
| heuristics/cert_id |
ISCB-5-RPT-C024-CR-v1a |
SERTIT-038 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
2.0 |
- |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2012-007-C024
- certification_date: 19.10.2012
- developer: Radmik Solutions Sdn Bhd
- enhanced:
- assurance_level: EAL1
- category: Other Devices and Systems
- cert_id: C024
- certification_date: 19.10.2012
- developer: Mohd Khairulfahmi Solong Suite 6-5, Main Tower Sunsuria Avenue, Persiaran Mahogani, Kota Damansara, 47810 Petaling Jaya, Selangor Darul Ehsan MALAYSIA URL: www.radmik.comEmail: [email protected]: 603 6150 0156Fax: 603 6142 4440
- expiration_date: 19.10.2017
- mutual_recognition: CCRA
- product: RADIUSS Core Version 2.0
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C024/ISCB-5-RPT-C024-CR-v1a.pdf
- scope: RADIUSS Core version 2.0 (hereafter referred as RADIUSS Core) from Radmik Sdn Bhd is the Target of Evaluation (TOE) for this Evaluation Assurance Level (EAL) 1 evaluation. RADIUSS Core is a Java software module designed to be used as a core security module for RADIUSS (Radmik Intelligent Universal Surveillance System) framework. RADIUSS framework is a management of IP based solution for CCTV system that connect directly to preferred network and is manageable remotely via a local area network or the internet. It can handle simultaneous recording, allows remote access to live views and playback of recorded videos. It supports IP cameras and analogue video sources, and open system architecture to ensure integration with other third party systems. The functions of the TOE that are within the scope of evaluation covering: The security audit logs, Access control whereby only authorized users can view the video feeds and logs, Identification and authentication of administrator and users before being allowed to perform any action in the TOE, and Security management functions that include user management, log management, ACL (Access Control List) management and video camera management.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C024/Security_Target.pdf
- type: Java software module designed to be used as a core security module for RADIUSS (Radmik Intelligent Universal Surveillance System) framework
- expiration_date: 19.10.2017
- level: EAL1
- product: RADIUSS Core Version 2.0
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/149
|
- category: Access Control Devices and Systems
- certification_date: 14.09.2012
- developer: ZTE Corporation
- enhanced:
- category: Access Control Devices and Systems
- cert_id: SERTIT-038
- certification_date: 14.09.2012
- description: SERTIT-038 C
- developer: ZTE Corporation
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134797-1607951074/SERTIT/Sertifikater/2012/38/%5BST%5D%20ZTE%20Base%20Station%20Controllers%20Security%20Target%20v1.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134794-1607951069/SERTIT/Sertifikater/2012/38/SERTIT-038%20CR%20v.1.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 2, ALC_FLR.2
- mutual_recognition: CCRA
- product: ZTE ZXG10 iBSC Base Station Controller, V6.20.614, ZXC10 BSCB CDMA2000 Base Station Controller, V8.0.3.400, and ZXWR RNC WCDMA Radio Network Controller, V3.09.30
- sponsor: ZTE Corporation
- product: ZTE Base Station Controller Series
- url: https://sertit.no/certified-products/product-archive/zte-base-station-controller-series
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
cr-ISCB-5-RPT-C024-v1a.pdf |
SERTIT-038 CR v.1.0.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C024-CR-v1a: 31
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 3
- EAL1: 1
- EAL2: 23
- EAL2 augmented: 22
- EAL2+: 1
- EAL7: 1
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 26
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 1
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAA.1: 1
- FCS:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FAU_STG.4: 1
- FDP:
- FDP_ACC.2: 1
- FDP_ACF.1: 1
- FDP_ITT.1: 2
- FIA:
- FIA_AFL.1: 1
- FIA_SOS.1: 1
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FTA:
- FTA_MCS.1: 1
- FTA_SSL.3: 1
|
| pdf_data/report_keywords/cc_claims |
|
- O:
- O.AUDITING: 1
- O.AUTHENTICATE: 1
- O.AUTHORISE: 1
- O.PROTECT_COMMUNICATION: 1
- OE:
- OE.CLIENT_SECURITY: 1
- OE.PROTECT_COMMUNICATION: 1
- OE.SERVER_SECURITY: 1
- OE.TIME: 1
- OE.TRUSTED_SYSTEMS: 1
- T:
- T.AUTHORISED: 1
- T.PHYSICAL_ATTACK: 1
- T.UNAUTHORISED: 1
- T.UNKNOWN_USER: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: ISCB Department
- /Category: PUBLIC
- /Caveat: FINAL
- /Classification: PUBLIC
- /Company: CyberSecurity Malaysia
- /CreationDate: D:20121019170356+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer: Radmik Sdn Bhd
- /Document Type: REPORT
- /Identifier: ISCB-5-RPT-C024-CR-v1a
- /Index: MyCB_TMP_011
- /Keywords: RADIUSS Core
- /ModDate: D:20121019170407+08'00'
- /Phase: Released
- /Producer: Adobe PDF Library 10.0
- /Project Code: C024
- /Released: 19 October 2012
- /ST Title: Radmik Solution RADIUSS Core EAL1 Security Target
- /ST Version: Version 1.1
- /SourceModified: D:20121019090340
- /Sponsor: Radmik Sdn Bhd
- /Subject: RADIUSS Core version 2.0
- /TOE Name: RADIUSS Core
- /TOE Version: version 2.0
- /Title: C024 Certification Report
- /Version: v1a
- pdf_file_size_bytes: 495026
- pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
- /Author: Kvassnes, Kjartan Jæger
- /CreationDate: D:20120913104603+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20120913104659+02'00'
- /Producer: Microsoft® Word 2010
- /Title: tittel
- pdf_file_size_bytes: 831867
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
| pdf_data/st_filename |
st-RadmikSolutionEAL1RADIUSSCorev1_1.pdf |
[ST] ZTE Base Station Controllers Security Target v1.0.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.1: 2
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 4
- FAU_ARP.1.1: 1
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAA.1: 6
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 3
- FCS_COP.1: 4
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 3
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 6
- FIA_UID.2: 5
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.3: 3
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ACC.2: 6
- FDP_ACC.2.2: 1
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 2
- FDP_ITT.1: 10
- FDP_ITT.1.1: 2
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UID: 2
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_MCS.1: 4
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
|
| pdf_data/st_keywords/cc_claims |
- OE:
- OE.ADMIN: 1
- OE.AUDIT: 1
- OE.INSTALL: 1
- OE.NETWORK: 1
- OE.PHYSICAL: 1
- OE.TIME: 1
|
- A:
- O:
- O.AUDITING: 4
- O.AUTHENTICATE: 4
- O.AUTHORISE: 3
- O.PROTECT_COMMUNICATION: 3
- OE:
- OE.CLIENT_SECURITY: 3
- OE.PROTECT_COMMUNICATION: 2
- OE.SERVER_SECURITY: 2
- OE.TIME: 3
- OE.TRUSTED_SYSTEMS: 2
- OSP:
- T:
- T.AUTHORISED: 2
- T.NETWORK: 1
- T.PHYSICAL_ATTACK: 2
- T.UNAUTHORISED: 2
- T.UNKNOWN_USER: 2
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Operations l Locking (of a user): a locked user can no longer: 1
- out of scope: 1
|
| pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20120717175346+08'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20120717175346+08'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 330512
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
- /Compression level: 6
- /Compression type: auto
- /Config File: C:\Program Files\PTC\Arbortext Editor\lib\standard.pdfcf
- /CreationDate: D:20120529183839+08'00'
- /Creator: Arbortext 5.4
- /EPS processor: PStill version 1.74.14
- /Graphics resolution: 600
- /Graphics resolution threshold: 900
- /JPEG quality: 80
- /Producer: PDFlib+PDI 7.0.4 (Win32)
- pdf_file_size_bytes: 535596
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 41
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |