name |
bizhub PRO C6500 Gazou Seigyo Program Overseas: bizhub PRO C6500 Image Control Program A03U0Y0-00I1-G00-15 |
Juniper Networks JUNOS 10.0 r4 for J-Series and SRX-Series Platforms |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
AU |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
13.07.2017 |
not_valid_before |
22.03.2007 |
15.07.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS%20T027%20Certification%20Report%201%203.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20JUNOS%2010-0%20EAL3%20Reval%20ST%20v2-0.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Juniper Networks, Inc. |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.juniper.net/ |
security_level |
EAL3 |
EAL3 |
dgst |
237f0a3d5ded3e29 |
f38a309403b4e023 |
heuristics/cert_id |
JISEC-CC-CRP-C0087 |
Certificate Number: 2011/75 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:o:juniper:junos:10.0:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2013-4689, CVE-2024-39555, CVE-2023-28975, CVE-2022-22242, CVE-2023-36840, CVE-2022-22244, CVE-2014-3818, CVE-2024-30380, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2021-31372, CVE-2022-22214, CVE-2024-39511, CVE-2023-28962, CVE-2024-39514, CVE-2023-36841, CVE-2024-39558, CVE-2013-6618, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2023-44184, CVE-2023-44175, CVE-2022-22243, CVE-2023-44186, CVE-2023-22406, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2024-39556, CVE-2022-22181, CVE-2022-22162, CVE-2022-22163, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2023-44194, CVE-2004-0468, CVE-2022-22220, CVE-2023-44201, CVE-2023-44197, CVE-2024-21594, CVE-2024-39517, CVE-2024-21591, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2013-6170, CVE-2021-31362, CVE-2022-22197, CVE-2022-22245, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2023-22391, CVE-2023-44176 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ALC_DVS.1, ATE_COV.2, ATE_FUN.1, ADV_TDS.2, ATE_IND.2, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ADV_FSP.3, AVA_VAN.2, ALC_CMC.3, ATE_DPT.1, ALC_CMS.3, AGD_PRE.1 |
heuristics/extracted_versions |
15 |
10.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0087
- certification_date: 01.03.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0087_eimg.pdf
- description: PRODUCT DESCRIPTION This product (bizhub PRO C6500 Image Control Program *1, that is installed with digital MFP (bizhub PRO C6500 Series) manufactured by Konica Minolta Business Technologies, Inc., is a software product for the purpose of reducing the risk for disclosure of document data in bizhub PRO C6500 Series. bizhub PRO C6500 Image Control Program prevents document data in bizhub PRO C6500 Series from disclosing during the use of functions such as copier and printer. It offers the protection function *2 with password lock system against the risk of reading data out illegally from HDD (Hard Disk Drive) which is a medium for storing temporarily document data. *1: with shows "bizhub PRO C6500 Gazou Seigyo Program" for Japan and "bizhub PRO C6500 Image Control Program" for overseas. *2: HDD has the password so that it cannot be removed and read in another equipment. HDD lock password is set in the HDD lock function.
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: Japan : bizhub PRO C6500 Gazou Seigyo Program Overseas: bizhub PRO C6500 Image Control Program
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0087_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0087_est.pdf
- toe_version: A03U0Y0-00I1-G00-15
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2009-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0087_it6100_03.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub PRO C6500 Gazou Seigyo Program A03U0Y0-00I1-G00-15
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0087_it6100.html
- toe_overseas_name: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/ bizhub PRO C6501/bizhub PRO C6501P/bizhub PRO C65hc/ineo+6501 Image Control Program A03U0Y0-00I1-G00-60
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
- maintenance_date: 05.08.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087kz_eacr3.pdf
- maintenance_st_link: None
- maintenance_title: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/bizhub PRO C6501/bizhub PRO C6501P/bizhub PRO C65hc/ineo+6501 Gazou Seigyo Program Overseas: bbizhub PRO C6500/bizhub PRO C6500P/ineo+6500/bizhub PRO C6501/bizhub PRO C6501P/bizhub PRO C65hc/ineo+6501 Image Control Program A03U0Y0-00I1-G00-60
- maintenance_date: 19.11.2008
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087kz_eacr2.pdf
- maintenance_st_link: None
- maintenance_title: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/ bizhub PRO C6501/bizhub PRO C6501P/ineo+6501 Gazou Seigyo Program Overseas: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/ bizhub PRO C6501/bizhub PRO C6501P/ineo+6501 Image Control Program A03U0Y0-00I1-G00-41
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0087_ecvr.pdf |
EFS T027 Certification Report 1 3.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0087: 1
|
- AU:
- Certificate Number: 2011/75: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- prior to any exchange. This covers all services used to exchange information, including telnet (out of scope), SSH, SSL, and FTP. Authentication services can be handled either internally (fixed user selected: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20070323205319+09'00'
- /ModDate: D:20070328204205+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13865
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /AISEF: stratsec
- /Author: Windows User
- /Category: Report
- /Cert_Level: EAL 3
- /Company: Australasian Information Security Evaluation Program
- /CreationDate: D:20110719125815+10'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Date completed: 15 July 2011
- /Developer: Juniper Networks
- /IssueDate: 15 July 2011
- /ModDate: D:20110719125849+10'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Product: Juniper Networks JUNOS 10.0 r4 for J-Series and SRX-Series Platforms
- /Recorded date: 15 July 2011
- /SourceModified: D:20110719025419
- /Subject: Certificate Number: 2011/75
- /Title: Certification Report
- /docVersion: 1.2
- pdf_file_size_bytes: 249278
- pdf_hyperlinks: http://www.juniper.net/techpubs/, http://www.dsd.gov.au/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
c0087_est.pdf |
JNPR JUNOS 10-0 EAL3 Reval ST v2-0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.3: 2
- ADV_TDS.2: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.3: 2
- ALC_CMS.3: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 23
- FIA_SOS.1.1: 2
- FIA_UAU.1: 7
- FIA_UAU.2: 19
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.1: 7
- FIA_UID.2: 14
- FMT:
- FMT_MOF.1: 26
- FMT_MOF.1.1: 1
- FMT_MSA.3: 3
- FMT_MTD.1: 27
- FMT_MTD.1.1: 3
- FMT_SMF: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_RVM.1: 21
- FPT_RVM.1.1: 1
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
- FAU:
- FAU_ARP.1: 6
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 5
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAA.1: 6
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCO:
- FCO_NRO.2: 6
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.4: 6
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 15
- FDP_IFC.1.1: 2
- FDP_IFF.1: 15
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ROL.1: 5
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_UCT.1: 6
- FDP_UCT.1.1: 1
- FDP_UIT.1: 6
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 13
- FMT_MTD.1.1: 3
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- OE:
- OE.ADMIN: 4
- OE.CE: 4
- OE.HDD: 6
- OE.NET: 4
- OE.SECMOD: 4
- OE.SECRET: 3
- T:
|
- A:
- A.CRYPTO: 2
- A.EAUTH: 1
- A.LOCATE: 2
- A.NOEVIL: 4
- A.TIME: 1
- O:
- O.ACCESS: 19
- O.AMANAGE: 21
- O.AUDIT: 23
- O.AUTHENTICITY: 14
- O.CONFIDENTIALITY: 16
- O.EADMIN: 12
- O.FLOW: 13
- O.INTEGRITY: 15
- O.PROTECT: 23
- O.ROLBAK: 8
- O.SECURE_KEY: 10
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 3
- OE.EAUTH: 3
- OE.PHYSICAL: 6
- OE.TIME: 3
- T:
- T.CONFLOSS: 5
- T.MANDAT: 5
- T.NOAUDIT: 3
- T.OPS: 6
- T.PRIVIL: 8
- T.ROUTE: 10
- T.UNTRUSTED_PATH: 7
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-003-003: 1
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 1
- ISO:
|
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 2
- PKCS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- prior to any exchange. This covers all services used to exchange information, including telnet (out of scope), SSH, SSL, and FTP. Authentication services can be handled either internally (fixed user selected: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20070531113225+09'00'
- /ModDate: D:20070531113225+09'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- pdf_file_size_bytes: 616321
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
- /AAPL:Keywords: []
- /Author: RAY POTTER
- /CreationDate: D:20110714053311Z00'00'
- /Creator: Microsoft Word
- /Keywords:
- /ModDate: D:20110714053311Z00'00'
- /Producer: Mac OS X 10.6.7 Quartz PDFContext
- /Title: Microsoft Word - JNPR JUNOS 10-0 EAL3 Reval ST v2-0.doc
- pdf_file_size_bytes: 1002176
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
True |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |