name |
bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version: A0P00Y0-0100-GM0-24 |
cv act ePasslet/BAC v1.8 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
01.09.2016 |
01.09.2019 |
not_valid_before |
31.08.2011 |
10.09.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0312_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0798a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0312_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0798b_pdf.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
cv cryptovision GmbH |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.cryptovision.com |
security_level |
EAL3 |
EAL4+, ALC_DVS.2 |
dgst |
49e78f2ac0541c3b |
1ecc1605bb86601a |
heuristics/cert_id |
JISEC-CC-CRP-C0312 |
BSI-DSZ-CC-0798-2012 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ADV_FSP.6, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, APE_OBJ.2, ASE_CCL.1, ADV_TDS.6, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
0100, 452, 552, 652, 24 |
1.8 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0410-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0439-2008, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0609-2010, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0410-2007 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0312
- certification_date: 01.08.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0312_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese : bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Zentai Seigyo Software English : bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0312_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0312_est.pdf
- toe_version: A0P00Y0-0100-GM0-24
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.09.2016
- revalidations: [frozendict({'date': '2012-02', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0312_it1345_01.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Zentai Seigyo Software A0P00Y0-0100-GM0-24
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0312_it1345.html
- toe_overseas_name: bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c / D700 / D701 / D705 / D706 Control Software A0P00Y0-0100-GM0-24
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0410-2007 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0410-2007 |
heuristics/protection_profiles |
{} |
60455fc9564e2545 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0312_erpt.pdf |
0798a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0798-2012
- cert_item: cv act ePasslet/BAC v1.8
- cert_lab: BSI
- developer: cv cryptovision GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0312-01: 1
- Certification No. C0312: 1
|
- DE:
- BSI-DSZ-CC-0404: 1
- BSI-DSZ-CC-0404-2007: 4
- BSI-DSZ-CC-0410: 1
- BSI-DSZ-CC-0410-2007: 2
- BSI-DSZ-CC-0410-2010: 2
- BSI-DSZ-CC-0555: 1
- BSI-DSZ-CC-0555-2009: 3
- BSI-DSZ-CC-0633: 1
- BSI-DSZ-CC-0633-2010: 3
- BSI-DSZ-CC-0674: 1
- BSI-DSZ-CC-0674-2011: 5
- BSI-DSZ-CC-0675: 1
- BSI-DSZ-CC-0675-2011: 4
- BSI-DSZ-CC-0709: 1
- BSI-DSZ-CC-0709-2010: 4
- BSI-DSZ-CC-0710: 1
- BSI-DSZ-CC-0710-2010: 4
- BSI-DSZ-CC-0730: 1
- BSI-DSZ-CC-0730-2011: 5
- BSI-DSZ-CC-0797-2012: 4
- BSI-DSZ-CC-0798-2012: 26
- BSI-DSZ-CC-0799-2012: 2
- BSI-DSZ-CC-0804-2012: 3
- NL:
- CC-0555-2009: 1
- CC-0633-2010: 1
- CC-0675-2011: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 7
- EAL 4 augmented: 3
- EAL 5: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 6
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-B: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-B: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-P: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BRING-OUT-STORA: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRA: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 27
- NXP Semiconductors: 15
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- TUV:
- TÜV Informationstechnik: 3
- TÜViT: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 27: 1
- BSI 7125: 2
- BSI 7148: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 2
- AIS 38: 2
- AIS36: 4
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 46-3: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is a medium to: 1
|
- ConfidentialDocument:
- Report, cv act ePasslet/BACv1 v1.8, Version 7, Date 22.08.2012, TÜV Informationstechnik GmbH (confidential document) [9] Certification Report - BSI-DSZ-CC-0404-2007 for NXP Secure Smart Card Controller P5CD040V0B: 1
- OutOfScope:
- out of scope: 1
- variants of this composite TOE provide MIFARE functionality; please note that this functionality is out of scope of the TOE’s security functionality. The MRTD in context of this security target contains (i: 1
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20111005174550+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20111013102822+09'00'
- /Producer: Acrobat Distiller 8.2.0 (Windows)
- /SourceModified: D:20111005032324
- /Title: CRP-e
- pdf_file_size_bytes: 743788
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 40
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20121009140144+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0798-2012, cv act ePasslet/BAC v1.8, cv cryptovision GmbH"
- /ModDate: D:20121026093136+02'00'
- /Producer: LibreOffice 3.5
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0798-2012
- pdf_file_size_bytes: 1046730
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
pdf_data/st_filename |
c0312_est.pdf |
0798b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0404-2007: 2
- BSI-DSZ-CC-0410-2007: 1
- BSI-DSZ-CC-0410-2010: 1
- BSI-DSZ-CC-0555-2009: 2
- BSI-DSZ-CC-0633-2010: 2
- BSI-DSZ-CC-0674-2011: 2
- BSI-DSZ-CC-0675-2011: 2
- BSI-DSZ-CC-0709-2010: 2
- BSI-DSZ-CC-0710-2010: 2
- BSI-DSZ-CC-0730-2011: 2
- BSI-DSZ-CC-0798: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP0055: 3
- BSI-PP-0002-2001: 1
- BSI-PP-0035-2007: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4+: 1
- EAL 5+: 2
- EAL4: 7
- EAL4 augmented: 1
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 72
- FDP_ACC.1.1: 4
- FDP_ACF.1: 55
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ACP.1: 1
- FDP_IFC.1: 14
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 71
- FIA_AFL.1.1: 9
- FIA_AFL.1.2: 9
- FIA_ATD.1: 29
- FIA_ATD.1.1: 1
- FIA_MSA.3: 1
- FIA_SOS: 1
- FIA_SOS.1: 44
- FIA_SOS.1.1: 5
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU: 2
- FIA_UAU.1: 43
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 44
- FIA_UAU.2.1: 4
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 48
- FIA_UID.2.1: 7
- FIA_USB.1: 26
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 31
- FMT_MOF.1.1: 3
- FMT_MSA: 5
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.3: 42
- FMT_MSA.3.1: 8
- FMT_MSA.3.2: 7
- FMT_MTD.1: 119
- FMT_MTD.1.1: 13
- FMT_SMF.1: 112
- FMT_SMF.1.1: 1
- FMT_SMR.1: 171
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ARP: 1
- FAU_GEN: 1
- FAU_SAA.1: 1
- FAU_SAS: 7
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 28
- FCS_CKM.1.1: 2
- FCS_CKM.2: 3
- FCS_CKM.3: 1
- FCS_CKM.4: 23
- FCS_CKM.4.1: 4
- FCS_COP: 52
- FCS_COP.1: 19
- FCS_LIM: 1
- FCS_RND: 7
- FCS_RND.1: 15
- FCS_RND.1.1: 3
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 18
- FDP_ACC.1.1: 3
- FDP_ACF: 6
- FDP_ACF.1: 11
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 4
- FDP_ETC.1: 1
- FDP_IFC: 2
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC: 2
- FDP_ITC.1: 11
- FDP_ITC.2: 10
- FDP_ITT: 1
- FDP_RIP.1: 1
- FDP_ROL: 1
- FDP_SDI.2: 1
- FDP_UCT: 2
- FDP_UCT.1: 11
- FDP_UCT.1.1: 3
- FDP_UIT: 3
- FDP_UIT.1: 10
- FDP_UIT.1.1: 3
- FDP_UIT.1.2: 2
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 8
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 1
- FIA_SOS.2: 1
- FIA_UAU: 8
- FIA_UAU.1: 11
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 15
- FIA_UAU.4.1: 2
- FIA_UAU.5: 9
- FIA_UAU.5.1: 4
- FIA_UAU.5.2: 6
- FIA_UAU.6: 12
- FIA_UAU.6.1: 2
- FIA_UID: 3
- FIA_UID.1: 12
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FIA_USB.1: 1
- FMT:
- FMT_LIM: 12
- FMT_LIM.1: 26
- FMT_LIM.1.1: 6
- FMT_LIM.2: 23
- FMT_LIM.2.1: 7
- FMT_MSA: 6
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 30
- FMT_MTD.1: 15
- FMT_MTD.3: 1
- FMT_SMF: 1
- FMT_SMF.1: 22
- FMT_SMF.1.1: 2
- FMT_SMR: 5
- FMT_SMR.1: 21
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 4
- FPR:
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 11
- FPT_FLS.1.1: 3
- FPT_ITT: 1
- FPT_PHP: 1
- FPT_PHP.1: 1
- FPT_PHP.3: 13
- FPT_PHP.3.1: 2
- FPT_RCV: 2
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 5
- A.NETWORK: 6
- A.SECRET: 3
- A.SERVICE: 4
- A.SETTING: 5
- O:
- O.AUTH: 2
- O.AUTH-CAPABILITY: 5
- O.CONFIG: 12
- O.CRYPT: 4
- O.CRYPTO: 4
- O.CRYPTO-CAPABILITY: 5
- O.CRYPTO-KEY: 2
- O.CRYPTO-MAIL: 2
- O.FAX: 2
- O.FAX-CONTROL: 6
- O.GROUP: 3
- O.GROUP-BOX: 3
- O.OVERWRITE: 3
- O.OVERWRITE-ALL: 5
- O.P: 2
- O.PRIVATE: 1
- O.PRIVATE-BOX: 3
- O.PUBLIC: 3
- O.PUBLIC-BOX: 6
- O.REGISTERED: 3
- O.REGISTERED-USER: 12
- O.SECURE: 4
- O.SECURE-PRINT: 6
- O.TRUSTED: 3
- O.TRUSTED-PASS: 5
- OE:
- OE.ADMIN: 3
- OE.FAX: 2
- OE.FAX-UNIT: 2
- OE.FEED: 2
- OE.FEED-BACK: 9
- OE.NETWORK: 4
- OE.S: 1
- OE.SECRET: 3
- OE.SERVER: 5
- OE.SERVICE: 3
- OE.SESSION: 9
- OE.SETTING: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS: 19
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.BACKUP: 3
- T.BACKUP-RESTORE: 1
- T.BRING: 3
- T.DISCARD: 3
- T.DISCARD-MFP: 1
- T.UNEXPECTED: 2
- T.UNEXPECTED-TRANSMISSION: 1
|
- A:
- O:
- O.ALARM: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.FAULT_PROTECT: 1
- O.FIREWALL: 1
- O.IDENTIFICATION: 1
- O.KEY-MNGT: 1
- O.MF_FW: 1
- O.OPERATE: 1
- O.OS_DECEIVE: 1
- O.PHYSICAL: 1
- O.PIN-MNGT: 1
- O.PROTECT_DATA: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RND: 1
- O.SCP: 3
- O.SHRD_VAR_CONFID: 1
- O.SHRD_VAR_INTEG: 1
- O.SID: 1
- O.SIDE_CHANNEL: 1
- O.TRANSACTION: 1
- OE:
- T:
- T.ACCESS_DATA: 1
- T.CONFID-JCSCODE: 1
- T.CONFID-JCSDATA: 1
- T.CONFIDAPPLI-DATA: 1
- T.EXE-CODE: 2
- T.FAULT: 1
- T.INTEG-APPLICODE: 1
- T.INTEG-APPLIDATA: 1
- T.INTEG-JCSCODE: 1
- T.INTEG-JCSDATA: 1
- T.LEAKAGE: 1
- T.OS_DECEIVE: 1
- T.OS_OPERATE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.RND: 1
- T.SID: 2
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 24
- NXP Semiconductors: 8
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 4
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 5
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 12
- EF.DG1: 32
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 1
- EF.DG16: 32
- EF.DG2: 9
- EF.DG3: 9
- EF.DG4: 8
- EF.DG5: 8
- EF.SOD: 13
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 186: 2
- FIPS 186-2: 4
- FIPS PUB 197: 2
- X509:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 180-2: 2
- FIPS 197: 1
- FIPS 46-3: 5
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS197: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.cryptovision: 5
- com.cryptovision.applet: 2
- com.cryptovision.eid: 1
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
|
- OutOfScope:
- 1 No correspondence Out of scope No contradiction to this ST T.EXE-CODE.2 No correspondence Out of scope No contradiction to this ST T.RESOURCES No correspondence Out of scope No contradiction to this ST: 1
- JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP applet manage- ment: 1
- JCOP LF state handling) No contradiction to this ST FMT_SMF.1 No correspondence Out of scope (JCOP applet handling: 1
- JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out of scope (JCOP access control mechanisms: 1
- JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of scope (JCOP data control mech- anisms: 1
- JCOP data control mech- anisms) No contradiction to this ST FDP_IFC.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_IFC.1/SCP No correspondence No: 1
- JCOP firewall mecha- nism) No contradiction to this ST FDP_ACF.1/FIREWALL No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/CMGR No correspondence Out: 1
- JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.2/JCRE No correspondence Out of scope (JCOP object handling: 1
- JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/CMGR No correspondence Out of scope (JCOP firewall mecha- nism: 1
- JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/SCP No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MTD.1/JCRE FMT_MTD.1, FMT_MTD.1/INI_ENA: 1
- JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism: 1
- JCOP object handling) No contradiction to this ST FMT_MSA.3/FIREWALL No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.3/CMGR No correspondence Out of: 1
- JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope (JCOP specific roles: 1
- LC state before Applet instan- tiation No contradiction to this ST FDP_ACC.1/SCP No correspondence Out of scope (JCOP memory manage- ment) No contradiction to this ST FDP_ACC.2/FIREWALL No correspondence Out of: 1
- LC state before Applet instan- tiation No contradiction to this ST FIA_UID.2/AID No correspondence Out of scope (JCOP AID management) No contradiction to this ST FIA_USB.1 No correspondence Out of scope (JCOP: 1
- No contradiction to this ST FIA: Identification and Authentication FIA_AFL.1/PIN No correspondence Out of scope (no PINs used within ap- plet) No contradiction to this ST FIA_AFL.1/CMGR No correspondence Out of: 1
- No contradiction to this ST T.SID.1 No correspondence Out of scope No contradiction to this ST T.SID.2 No correspondence Out of scope No contradiction to this ST T: 1
- No correspondence Out of scope No contradiction to this ST O.OPERATE No correspondence Out of scope No contradiction to this ST O.RESOURCES No correspondence Out of scope cv act ePasslet/BAC: 1
- No correspondence Out of scope No contradiction to this ST O.SCP.RECOVERY No correspondence Out of scope No contradiction to this ST O.SCP.SUPPORT No correspondence Out of scope No contradiction to this: 1
- O.CIPHER No correspondence Out of scope No contradiction to this ST O.PIN-MNGT No correspondence Out of scope No contradiction to this ST O.KEY-MNGT No correspondence Out of scope No contradiction to this ST O: 1
- O.PHYSICAL OT.Prot_Phys-Tamper O.IDENTIFICATION OT.Identification O.RND No correspondence Out of scope No contradiction to this ST O.SID No correspondence Out of scope No contradiction to this ST O: 1
- O.SCP.IC No correspondence Out of scope No contradiction to this ST Table 4: Relevant platform objectives and their correspondence 2.2.4: 1
- O.SHRD_VAR_CONFID No correspondence Out of scope No contradiction to this ST O.SHRD_VAR_INTEG No correspondence Out of scope No contradiction to: 1
- Out of scope: 65
- Out of scope (JCOP internal) No contradiction to this ST Table 3: Relevant platform SFRs and their: 1
- Platform SFR Correspondence in this ST References/Remarks FDP_ROL.1/FIREWALL No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_SDI.2 No correspondence Out of scope: 1
- Relevant Platform SFR Correspondence in this ST References/Remarks FMT_MSA.1/CMGR No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST FMT_MSA.2/JCRE No correspondence Out of: 1
- ST O.ALARM No correspondence Out of scope No contradiction to this ST O.TRANSACTION No correspondence Out of scope No contradiction to this: 1
- ST References/Remarks T.LEAKAGE T.Information_Leakage T.FAULT T.Malfunction T.RND No correspondence Out of scope No contradiction to this ST T.PHYSICAL T.Phys-Tamper T.CONFID-JCSCODE No correspondence Out of: 1
- ST T.INTEG-JCSCODE No correspondence Out of scope No contradiction to this ST T.INTEG-APPLIDATA T.Forgery T.INTEG-JCSDATA No correspondence Out of: 1
- The platform SFR leads to the fulfill- ment of these SFR of this ST. FMT_MTD.3 No correspondence Out of scope (JCOP LF state handling) No contradiction to this ST FMT_SMF.1 No correspondence Out of scope (JCOP: 1
- The requirement in this ST is equiva- lent to parts of the platform ST. FCS_CKM.2 No correspondence Out of scope (managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed: 1
- data control mech- anisms) No contradiction to this ST FDP_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) No contradiction to this ST FDP_RIP.1 FCS_CKM.4 Relied on for key: 1
- equivalent. No contradiction to the ST. FRU: Resource Utilisation FRU_FLT.2/SCP No correspondence Out of scope (JCOP internal) No contradiction to this ST FTP: Trusted Path/Channels FTP_ITC.1/CMGR No: 1
- for detecting security violations complement JCOP mechanisms FPT_ITT.1/SCP No correspondence Out of scope (platform internal data transfer) cv act ePasslet/BAC Security Target 18 of 75 Relevant Platform: 1
- handling) No contradiction to this ST FMT_SMR.1/JCRE No correspondence Out of scope (JCOP specific roles) No contradiction to this ST FMT_SMR.1/CMGR No correspondence Out of scope: 1
- in this ST References/Remarks No contradiction to this ST FPT_PHP.1 No correspondence Out of scope (hardware mechanism) No contradiction to this ST FPT_PHP.3/SCP FPT_PHP.3 The SFRs are identical: 1
- in this ST References/Remarks No contradiction to this ST O.FIREWALL No correspondence Out of scope No contradiction to this ST O.REALLOCATION No correspondence Out of scope No contradiction to this: 1
- in this ST References/Remarks T.ACCESS_DATA T.Eavesdropping T.OS_OPERATE No correspondence Out of scope No contradiction to this ST T.OS_DECEIVE No correspondence Out of scope No contradiction to this ST: 1
- is refinement of the platform SFR. No contradictions to this ST. FMT_MSA.1/JCRE No correspondence Out of scope (JCOP firewall mecha- nism) No contradiction to this ST cv act ePasslet/BAC Security Target 17 of: 1
- managed within JCOP) No contradiction to this ST FCS_CKM.3 No correspondence Out of scope (managed within JCOP: 1
- no PINs used within ap- plet) No contradiction to this ST FIA_AFL.1/CMGR No correspondence Out of scope (refers to card manager: 1
- out of scope: 1
- refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope (JCOP data control mech- anisms: 1
- refers to Virtual Ma- chine) No contradiction to this ST FDP_SDI.2 No correspondence Out of scope (JCOP internal data integ- rity protection: 1
- refers to card manager) No contradiction to this ST FIA_ATD.1/AID No correspondence Out of scope (JCOP AID management) No contradiction to this ST FIA_UAU.1 No correspondence Refers to LC state: 1
- scope (JCOP access control mechanisms) No contradiction to this ST FDP_ACF.1/SCP No correspondence Out of scope (JCOP access control mechanisms) No contradiction to this ST FDP_ETC.1 No correspondence Out of: 1
- specific roles) No contradiction to this ST FPR: Privacy FPR_UNO.1 No correspondence Out of scope (JCOP package separa- tion) No contradiction to this ST FPT: Protection of the TSF FPT_EMSEC.1: 1
- to this ST FDP_IFF.1/JCVM No correspondence Out of scope (refers to Virtual Ma- chine) No contradiction to this ST FDP_ITC.1 No correspondence Out of scope: 1
- to this ST T.CONFIDAPPLI-DATA T.Information_Leakage T.CONFID-JCSDATA No correspondence Out of scope No contradiction to this ST T.INTEG-APPLICODE No correspondence Out of scope No contradiction to: 1
- variants of this composite TOE provide MIFARE functionality; please note that this functionality is out of scope of the TOE’s security functionality claimed by this Security Target. 1.3.3 TOE usage and security: 1
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20111004144740+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20111004144745+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title:
- pdf_file_size_bytes: 1155878
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 111
|
- /Author: cryptovision GmbH
- /CreationDate: D:20120816153349+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: ePasslet Suite, ICAO LDS, Basic Access Control
- /ModDate: D:20121019160104+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Common Criteria Certification BSI-DSZ-CC-0798
- /Title: Security Target - cv act ePasslet/BAC v1.8
- pdf_file_size_bytes: 1730732
- pdf_hyperlinks: file:///C:/tzeggel/Desktop/glossar.htm%23aes
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |