name |
Panasonic Connect TOUGHBOOK Devices on Android 11 |
Fuji Xerox ApeosPort C7550 I/C6550 I/C5540 I, DocuCentre C7550 I/C6550 I/C5540 I Series Security Kit for Asia Pacific Controller ROM Ver1.102.2 |
category |
Mobility |
Multi-Function Devices |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
16.12.2024 |
27.12.2010 |
not_valid_before |
16.12.2022 |
07.09.2006 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11315-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11315-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0053_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11315-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0053_est.pdf |
manufacturer |
Panasonic Connect of North America |
Fuji Xerox Co., Ltd. |
manufacturer_web |
https://www.panasonic.com |
https://www.fujixerox.co.jp/eng/ |
security_level |
{} |
EAL2 |
dgst |
29f8b0e8b53d064c |
a3f99c28875a7b7d |
heuristics/cert_id |
CCEVS-VR-11315-2022 |
JISEC-CC-CRP-C0053 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.1, AGD_PRE.1, ADV_FSP.1, AVA_VAN.1, ALC_TSU_EXT.1, ATE_IND.1, ALC_CMC.1, AGD_OPE.1 |
ATE_IND.2, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, ADV_HLD.1, AVA_SOF.1, ADV_RCR.1, AGD_ADM.1, ATE_COV.1, AVA_VLA.1 |
heuristics/extracted_versions |
11 |
1.102.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0053
- certification_date: 01.09.2006
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0053_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is an option for ApeosPort C7550 I/C6550 I/C5540 I, DocuCentre C7550 I/C6550 I/C5540 I Series digital multifunction device with copy, print and scan. Data security kit is a firmware for digital multifunction device protecting the residual document data in HDD from iniquity disclosure after scan, copy and print. This TOE has the following security functions. - HDD overwriting for residual data. - HDD data encryption. - Key operator authentication. - Customer engineer operation restriction.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Fuji Xerox ApeosPort C7550 I/C6550 I/C5540 I, DocuCentre C7550 I/C6550 I/C5540 I Series Security Kit for Asia Pacific
- product_type: IT Product (data protection function in digital Copier)
- report_link: https://www.ipa.go.jp/en/security/c0053_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0053_est.pdf
- toe_version: Controller ROM Ver1.102.2
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.01.2011
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0053_it6087.html
- toe_overseas_name: Fuji Xerox ApeosPort C7550 I/C6550 I/C5540 I, DocuCentre C7550I/C6550I/C5540I Series Security Kit for Asia Pacific Controller ROM Ver1.102.2
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
83014eb399a802f3, c40ae795865a0dba, 731bdcc989507942, c88af12926be2779 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf |
{} |
pdf_data/cert_filename |
st_vid11315-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11315-2022: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20221220140031-05'00'
- /ModDate: D:20221220140031-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 182708
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11315-vr.pdf |
c0053_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-11315-2022
- cert_item: Panasonic Connect TOUGHBOOK Devices on Android 11
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0053-01: 1
- Certification No. C0053: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.NET: 1
- A.SECMODE: 1
- T:
- T.CONFDATA: 1
- T.RECOVER: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: comptont
- /CreationDate: D:20221220135301-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20221220135301-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 320589
- pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search, http://www.kb.cert.org/vuls/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /CreationDate: D:20070709164120+09'00'
- /ModDate: D:20070709164120+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 142989
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
st_vid11315-st.pdf |
c0053_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 11
- AGD_PRE: 1
- AGD_PRE.1: 7
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 5
- ALC_CMS: 1
- ALC_CMS.1: 6
- ALC_TSU_EXT: 2
- ALC_TSU_EXT.1: 2
- ATE:
- AVA:
|
- ACM:
- ADO:
- ADO_DEL.1: 5
- ADO_IGS.1: 3
- ADV:
- ADV_FSP: 1
- ADV_FSP.1: 10
- ADV_HLD.1: 4
- ADV_RCR.1: 5
- AGD:
- AGD_ADM.1: 6
- AGD_USR.1: 4
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 5
- ATE_IND.2: 4
- AVA:
- AVA_SOF.1: 4
- AVA_VLA.1: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 2
- FAU_SAR.1: 1
- FAU_STG.4: 1
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 3
- FCS_CKM.2: 1
- FCS_CKM_EXT.1: 1
- FCS_CKM_EXT.2: 1
- FCS_CKM_EXT.3: 2
- FCS_CKM_EXT.4: 4
- FCS_CKM_EXT.4.1: 1
- FCS_CKM_EXT.5: 1
- FCS_CKM_EXT.6: 1
- FCS_CKM_EXT.7: 1
- FCS_CKM_EXT.8: 1
- FCS_COP: 9
- FCS_COP.1: 12
- FCS_RBG_EXT.1: 12
- FCS_STG_EXT.1: 1
- FCS_STG_EXT.2: 3
- FCS_STG_EXT.2.1: 1
- FCS_STG_EXT.3: 1
- FCS_TLSC_EXT: 2
- FCS_TLSC_EXT.1: 2
- FCS_TLSC_EXT.2: 1
- FCS_TLSC_EXT.3: 1
- FCS_TLSC_EXT.5: 1
- FCS_TLSS_EXT.1.1: 1
- FCS_TLS_EXT.1: 1
- FDP:
- FDP_ACC.1: 3
- FDP_ACF_EXT.1: 1
- FDP_BCK_EXT.1: 1
- FDP_DAR_EXT.1: 2
- FDP_DAR_EXT.2: 1
- FDP_IFC_EXT.1: 2
- FDP_STG_EXT.1: 1
- FDP_UPC_EXT: 2
- FIA:
- FIA_AFL_EXT.1: 2
- FIA_BLT_EXT.2: 1
- FIA_BLT_EXT.3: 1
- FIA_BLT_EXT.4: 1
- FIA_BLT_EXT.6: 1
- FIA_BLT_EXT.7: 1
- FIA_PAE_EXT.1: 1
- FIA_PMG_EXT.1: 2
- FIA_TRT_EXT.1: 1
- FIA_UAU.5: 1
- FIA_UAU.5.1: 2
- FIA_UAU.6: 1
- FIA_UAU_EXT.1: 1
- FIA_UAU_EXT.2: 2
- FIA_UAU_EXT.2.1: 3
- FMT:
- FMT_MOF_EXT.1: 2
- FMT_MOF_EXT.1.2: 1
- FMT_SMF_EXT: 2
- FMT_SMF_EXT.1: 3
- FMT_SMF_EXT.1.1: 1
- FMT_SMF_EXT.2: 1
- FPT:
- FPT_AEX_EXT.1: 1
- FPT_AEX_EXT.2: 1
- FPT_AEX_EXT.3: 1
- FPT_AEX_EXT.4: 1
- FPT_BBD_EXT.1: 1
- FPT_JTA_EXT.1: 1
- FPT_KST_EXT.1: 1
- FPT_KST_EXT.2: 1
- FPT_KST_EXT.3: 1
- FPT_NOT_EXT.1: 1
- FPT_STM.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 1
- FPT_TUD_EXT.1: 1
- FPT_TUD_EXT.2: 1
- FTA:
- FTA_SSL_EXT.1: 1
- FTA_TAB.1: 1
- FTP:
- FTP_BLT_EXT: 2
- FTP_BLT_EXT.1: 1
- FTP_BLT_EXT.2: 1
- FTP_ITC_EXT: 1
- FTP_ITC_EXT.1: 1
|
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.4: 6
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_RIP.1: 14
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 15
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 18
- FIA_UAU.7: 11
- FIA_UAU.7.1: 1
- FIA_UID.1: 11
- FIA_UID.2: 16
- FMT:
- FMT_MOF.1: 47
- FMT_MOF.1.1: 3
- FMT_MSA.2: 6
- FMT_MTD.1: 39
- FMT_MTD.1.1: 3
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 25
- FPT_RVM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_USER: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
|
- A:
- A.ADMIN: 4
- A.NET: 3
- A.SECMODE: 4
- O:
- O.DECIPHER: 8
- O.MANAGE: 6
- O.RESIDUAL: 8
- OE:
- OE.ADMIN: 4
- OE.AUTH: 4
- OE.FUNCON: 4
- OE.NET: 6
- R:
- R.CONFDATA: 2
- R.DOCDATA: 2
- T:
- T.CONFDATA: 3
- T.RECOVER: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 28
- AES-128: 1
- AES-256: 15
- constructions:
- MAC:
- CMAC: 1
- HMAC: 6
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 3
- SHA-512: 3
- SHA256: 1
- scrypt:
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- TLS:
- TLS:
- TLS: 64
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XEX:
- XTS:
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 6
- P-521: 4
- secp256r1: 3
- secp384r1: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 6
- FIPS 197: 4
- FIPS 198-1: 3
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 800-108: 4
- SP 800-38A: 6
- SP 800-38B: 1
- SP 800-38C: 2
- SP 800-38D: 1
- SP 800-38E: 2
- SP 800-38F: 1
- SP 800-56A: 1
- SP 800-90A: 2
- RFC:
- RFC 2246: 1
- RFC 2818: 2
- RFC 3394: 2
- RFC 4346: 1
- RFC 5216: 1
- RFC 5246: 4
- RFC 5280: 4
- RFC 5288: 3
- RFC 5289: 8
- RFC 5746: 1
- RFC 6125: 1
- RFC 6960: 1
- RFC 8017: 1
- X509:
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC15408: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20221220135411-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20221220135411-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 1298183
- pdf_hyperlinks: https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9459, http://www.globalplatform.org/mediaguidetee.asp, https://source.android.com/devices/tech/security/index.html, https://developer.android.com/reference/android/app/admin/SecurityLog#constants_1, https://developer.android.com/reference/javax/net/ssl/SSLSocket, https://source.android.com/setup/contribute/report-bugs, https://developer.android.com/reference/javax/net/ssl/HttpsURLConnection, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9410, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=15047, mailto:[email protected], https://developer.android.com/reference/android/app/admin/SecurityLog.SecurityEvent, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9411, http://developer.android.com/reference/android/bluetooth/package-summary.html, https://developer.android.com/reference/packages, https://na.panasonic.com/us/support/computers-tablets-handhelds-security-updates, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9458, https://source.android.com/devices/architecture/kernel/modular-kernels#core-kernel-requirements, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=8370, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9460, http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35371, http://www.wi-fi.org/certification, https://na.panasonic.com/us/support/computers-tablets-handhelds-get-service-support, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 67
|
- /CreationDate: D:20070624153200+09'00'
- /ModDate: D:20070624153200+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 227670
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |