name |
MX-FR44 C.10 |
STMicroelectronics ST54L A02 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
active |
not_valid_after |
02.12.2019 |
19.04.2029 |
not_valid_before |
27.11.2014 |
19.04.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2300182-01-CERT.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0450_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300182-01-CR2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0450_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300182-01-ST.pdf |
manufacturer |
Sharp Corporation |
STMicroelectronics |
manufacturer_web |
https://sharp-world.com/ |
https://www.st.com/ |
security_level |
EAL3 |
ALC_FLR.2, EAL6+ |
dgst |
74868fc3bd18775e |
2bd2cc8a67ea9a19 |
heuristics/cert_id |
JISEC-CC-CRP-C0450 |
NSCIB-CC-2300182-01-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.3, ADV_ARC.1, ADV_TDS.2, ATE_IND.2, ADV_FSP.3, AGD_PRE.1, AGD_OPE.1, ALC_CMS.3, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ATE_COV.2, ASE_OBJ.2, ASE_SPD.1, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_DVS.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 |
ALC_TAT.3, AVA_VAN.5, ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ATE_FUN.2, AGD_OPE.1, ASE_REQ.2, ADV_IMP.2, ASE_ECD.1, ALC_DVS.2, ASE_OBJ.2, ASE_SPD.1, ADV_TDS.5, ALC_CMS.5, ADV_SPM.1, ATE_DPT.3, ADV_FSP.5, ASE_INT.1, ASE_TSS.1, ATE_COV.3, ALC_DEL.1, ALC_CMC.5, ADV_INT.3, ASE_CCL.1, ALC_LCD.1, ALC_FLR.2 |
heuristics/extracted_versions |
10 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2025/04, ANSSI-CC-2024/33 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2025/04, ANSSI-CC-2024/33 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0450
- certification_date: 01.11.2014
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0450_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an IT product, composed of 2 parts, to protect data in a Multi Function Device (hereafter referred to as an“MFD”). One part is a hardware part in an MFD and provided in the form of an MFD. The other part is a firmware product and provided as an upgrade kit for the firmware of the MFD. An MFD is an office machine that has imaging functions such as copy, printer, image scanning and fax. TOE security functions The TOE counters unauthorized disclosure of image data by: - the encryption function, which encrypts data, such as image data that the MFD handles, before storing the data to the HDD in the MFD, - the cryptographic key generation function, generates a seed for a cryptographic key once when the TOE is installed, and generates a constant cryptographic key from the seed whenever the MFD is powered, and stores the key in a volatile memory for the encryption function, - the data erasure function, which automatically overwrites to erase image data no longer in use in the HDD, and overwrites to erase all data when invoked by the administrator of an MFD in use or no longer in use, - the authentication function, which authenticates the TOE administrator with a password, and provides the TOE administrator with a management function for changing his password, - the confidential file function, which provides image data filed by users with password protection, and - the network protection functions, which counters malicious attempts (of unauthorized network-accesses, communication data wiretaps, and network settings falsifications), and - the fax flow control function, which counters attempts to access to the internal network via the MFD network interface from public telephone networks on the MFD fax interface.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: MX-FR44
- product_type: data protection function in Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0450_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0450_est.pdf
- toe_version: C.10
- vendor: Sharp Corporation
- expiration_date: 01.12.2019
- supplier: Sharp Corporation
- toe_japan_name: MX-FR44C.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0450_it4497.html
- toe_overseas_name: MX-FR44C.10
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2025/04, ANSSI-CC-2024/33 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2025/04, ANSSI-CC-2024/33 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
|
NSCIB-2300182-01-CERT.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- NL:
- CC-23-0638980: 1
- NSCIB-2300182-01: 1
- NSCIB-CC-2300182-01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL2: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_FLR: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: JM2
- /CreationDate: D:20240424204220+01'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20240424204220+01'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 91592
- pdf_hyperlinks: https://www.tuv-nederland.nl/
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0450_erpt.pdf |
NSCIB-CC-2300182-01-CR2.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-2300182-01-CR
- cert_item: ST54L A02
- cert_lab: SGS Brightsight B.V.
- developer: STMicroelectronics
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0450-01: 1
- Certification No. C0450: 1
|
- NL:
- CC-23-0638980: 1
- NSCIB-2300182-01: 1
- NSCIB-CC-2300182-01-CR: 1
- NSCIB-CC-2300182-01-CR2: 10
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 1
- EAL6: 2
- EAL6 augmented: 1
- EAL6+: 2
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_FLR.1: 1
- ALC_FLR.2: 3
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.OPERATOR: 1
- T:
- T.RECOVER: 2
- T.REMOTE: 2
- T.SPOOF: 1
- T.TAMPER: 1
- T.TAP: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- BrightSight:
- SGS:
- SGS: 3
- SGS Brightsight: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 2
- JIL-AM: 2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20150126175302+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20150126175328+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 239311
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
|
pdf_data/st_filename |
c0450_est.pdf |
NSCIB-CC-2300182-01-ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 10
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 64
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL6: 23
- EAL6 augmented: 2
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_SPM: 3
- ADV_SPM.1: 3
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 4
- ASE_CCL.1: 1
- ASE_ECD: 4
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 12
- ASE_OBJ.2: 1
- ASE_REQ: 31
- ASE_REQ.2: 1
- ASE_SPD: 9
- ASE_SPD.1: 1
- ASE_TSS: 7
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 3
- ATE_COV.3: 1
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 21
- FIA_AFL.1: 4
- FIA_SOS: 15
- FIA_SOS.1: 2
- FIA_UAU: 46
- FIA_UAU.1: 10
- FIA_UAU.2: 2
- FIA_UAU.7: 2
- FIA_UID: 25
- FIA_UID.1: 10
- FIA_UID.2: 2
- FMT:
- FMT_MOF: 27
- FMT_MOF.1: 3
- FMT_MSA.3: 5
- FMT_MTD: 29
- FMT_MTD.1: 3
- FMT_SMF.1: 36
- FMT_SMF.1.1: 1
- FMT_SMR: 20
- FMT_SMR.1: 16
- FTA:
- FTA_TSE.1: 9
- FTA_TSE.1.1: 1
- FTP:
- FTP_TRP.1: 18
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 8
- FAU_SAR.1: 25
- FAU_SAS: 2
- FAU_SAS.1: 28
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 4
- FCS_COP.1: 17
- FCS_RNG: 2
- FCS_RNG.1: 6
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.2: 14
- FDP_ACF: 1
- FDP_ACF.1: 30
- FDP_IFC.1: 16
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_ITT.1: 10
- FDP_SDC: 2
- FDP_SDC.1: 8
- FDP_SDI.2: 14
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FDP_UCT.1: 16
- FDP_UIT.1: 16
- FIA:
- FIA_API: 2
- FIA_API.1: 6
- FIA_UAU.1: 14
- FIA_UID.1: 16
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 29
- FMT_LIM.2: 30
- FMT_MSA.1: 28
- FMT_MSA.3: 28
- FMT_SMF.1: 23
- FMT_SMR.1: 17
- FPT:
- FPT_FLS.1: 22
- FPT_ITT.1: 9
- FPT_PHP.3: 11
- FRU:
- FTP:
- FTP_ITC.1: 27
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 4
- A.OPERATOR: 4
- O:
- O.FAXTONET: 6
- O.FILTER: 9
- O.MANAGE: 13
- O.REMOVE: 7
- O.RESIDUAL: 7
- O.TRP: 8
- O.USER: 7
- OE:
- OE.CIPHER: 3
- OE.ERASEALL: 3
- OE.FIREWALL: 3
- OE.OPERATE: 3
- OE.PC-USER: 4
- OE.SUBNET: 3
- OE.USER: 3
- T:
- T.RECOVER: 5
- T.REMOTE: 3
- T.SPOOF: 4
- T.TAMPER: 3
- T.TAP: 4
|
- O:
- O.C: 1
- O.RND: 4
- O.TOE-: 1
- R:
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- NXP:
- Philips:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 13
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 13
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 14
- Physical Probing: 4
- physical probing: 3
- side channel: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 23
- CCMB-2017-04-003: 2
- FIPS:
- ISO:
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-67: 3
- SP 800-38A: 2
- SP 800-67: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- The ST54L_SE is in the scope of this evaluation, while the ST54L_CLF is out of scope of this evaluation: 1
- ES) is in User NVM. 46 Note: The ES is not part of the TOE and is out of scope of the evaluation: 1
- Features Possible values NVM size 3.3 Mbytes, 2.5 Mbytes or 2 Mbytes MIFARE accelerator (out of scope) Active, Inactive SM3 accelerator (out of scope) Active, Inactive SM4 accelerator (out of scope: 1
- Security IC Embedded Software (ES) is in User NVM. 46 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 47 The user guidance documentation, part of the TOE: 1
- out of scope: 5
- out of scope) Active, Inactive SM3 accelerator (out of scope) Active, Inactive SM4 accelerator (out of scope: 1
- to as the ST54L_SE). The ST54L_SE is in the scope of this evaluation, while the ST54L_CLF is out of scope of this evaluation. 19 Furthermore, the ST54L_SE features a MIFARE(a) Classic® cryptographic: 1
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20141022170835+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /GTS_PDFXConformance: PDF/X-1a:2001
- /GTS_PDFXVersion: PDF/X-1:2001
- /ModDate: D:20141022170840+09'00'
- /Producer: Adobe PDF Library 11.0
- /Title: Security Target
- /Trapped: /False
- pdf_file_size_bytes: 854471
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /Author: Christiane DROULERS
- /CreationDate: D:20240222122049Z
- /Creator: FrameMaker 11.0.2
- /ModDate: D:20240223170819+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title: SMD_ST54L_VA02_1P.book
- pdf_file_size_bytes: 719927
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 82
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |