name |
SHARP MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U and MX-PK13; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16 and MX-PK130210zd00 |
Morpho_HC_Germany_G2_COS V1 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
03.06.2024 |
28.10.2021 |
not_valid_before |
27.07.2020 |
28.10.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0678_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0678_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0938a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0678_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0938b_pdf.pdf |
manufacturer |
Sharp Corporation |
Morpho Cards GmbH |
manufacturer_web |
https://sharp-world.com/ |
https://www.morpho.com/e-documents |
security_level |
{} |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
7fb1cc56d893f3ac |
7950b51171b0f96d |
heuristics/cert_id |
JISEC-CC-CRP-C0678 |
BSI-DSZ-CC-0938-2016 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:sharp:mx-m5051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m6071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3571:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m4071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m5071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m4051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m6051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m2651:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3551:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ASE_APD.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0678
- certification_date: 01.07.2020
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0678
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000wfu-att/c0678_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device (MFD) that has the functions, such as copy, print, scan and filing. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Stored Data Encryption Function Network Protection Function Security Management Function Audit Function Software Verification Function Self-testing Function Residual Data Overwrite Function Data Purging Function
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: SHARP MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U and MX-PK13; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16 and MX-PK13
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000wfu-att/c0678_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000wfu-att/c0678_est.pdf
- toe_version: 0210zd00
- vendor: SHARP CORPORATION
- expiration_date: 01.06.2024
- supplier: SHARP CORPORATION
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0678_it9720.html
- toe_overseas_name: SHARP MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U and MX-PK13; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16 and MX-PK130210zd00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
ecc28509c30de1a5 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082V2b_pdf.pdf |
pdf_data/cert_filename |
c0678_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0678-01-2020: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20200817104926+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /ModDate: D:20200817105556+09'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20200817012930
- /Subject:
- /Title:
- pdf_file_size_bytes: 113768
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0678_est.pdf |
0938a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5, ATE_DPT.2 and ALC_DVS.2
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0938-2016
- cert_item: Morpho_HC_Germany_G2_COS V1
- cert_lab: BSI
- developer: Morpho Cards GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 1.9, 18 November 2014, BSI-CC-PP-0082-V2-2014
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 8
- BSI-DSZ-CC-0938-2016: 30
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0082-V2-2014: 4
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 13
- EAL 4 augmented: 3
- EAL 5: 10
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN: 14
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 40
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 27
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 101
- FCS_COP.1.1: 6
- FCS_KDF_EXT.1: 4
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 25
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 4
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 3
- FCS_TLS_EXT.1: 26
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 3
- FDP_DSK_EXT.1: 9
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.1: 8
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 16
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 20
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FCS:
- FCS_CKM: 2
- FCS_COP: 20
- FCS_RNG: 3
- FPT:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_CONTROL: 7
- O.ADMIN_ROLES: 4
- O.AUDIT: 4
- O.COMMS_PROTECTION: 11
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 3
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 7
- Morpho:
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 18
- AES-128: 1
- AES-256: 2
- Rijndael:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 5
- SHA256: 2
- SHA384: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 40
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 7
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- SCA:
- DPA: 1
- Template attack: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03116-1: 1
- BSI TR-03143: 4
- BSI TR-03144: 14
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 2
- FIPS PUB 198-1: 2
- ISO:
- ISO/IEC 10116: 6
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 3
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- NIST SP 800-90A: 5
- RFC:
- RFC 2246: 1
- RFC 2818: 4
- RFC 4346: 1
- RFC 5246: 3
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 2
- AIS 23: 1
- AIS 25: 2
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 4
- AIS 38: 1
- AIS31: 1
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 1.11, 01.09.2016, Morpho Cards GmbH (confidential document) [11] Guidance Documentation Morpho_HC_Germany_G2_COS V1 - OS Preparation Guidance, Version 1.13: 1
- Security Target Morpho_HC_Germany_G2_COS V1, Version 1.09, 30.08.2016, Morpho Cards GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-0938-2016, Security Target Lite Morpho_HC_Germany_G2_COS V1: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- for Morpho_HC_Germany_G2_COS V1, Version 2.0, 02.09.2016, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0938-2016, Configuration List Morpho_HC_Germany_G2_COS V1: 1
- procedure BSI-DSZ-CC-0782-V2-2015, Version 7, 21 October 2015, TÜV Informationstechnik GmbH (confidential document) [18] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20201015095811+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /ModDate: D:20201015095846+09'00'
- /Producer: Adobe PDF Library 20.9.95
- /Title:
- pdf_file_size_bytes: 911294
- pdf_hyperlinks: http://csrc.nist.gov/archive/aes/katmct/katmct.htm
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20161124164918+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, eHC G2, PP-0082, Morpho"
- /ModDate: D:20161220121910+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0938-2016
- pdf_file_size_bytes: 1388001
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
pdf_data/st_filename |
c0678_est.pdf |
0938b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 2
- BSI-DSZ-CC-0938: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0035: 1
- BSI-CC-PP-0035-: 1
- BSI-CC-PP-0035-2007: 9
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0072: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0082-V2: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0035: 3
- BSI-PP-0035-: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 11
- EAL4 augmented: 5
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 16
- ADV_FSP: 1
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 20
- ADV_IMP: 1
- ADV_IMP.1: 11
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 24
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 15
- AGD_PRE: 1
- AGD_PRE.1: 11
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 16
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 7
- ALC_DEL: 1
- ALC_DEL.1: 6
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 20
- ALC_LCD: 1
- ALC_LCD.1: 9
- ALC_TAT: 1
- ALC_TAT.1: 10
- ASE:
- ASE_APD.1: 1
- ASE_CCL: 1
- ASE_CCL.1: 15
- ASE_ECD: 1
- ASE_ECD.1: 14
- ASE_INT: 1
- ASE_INT.1: 17
- ASE_OBJ: 1
- ASE_OBJ.2: 13
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD: 1
- ASE_SPD.1: 8
- ASE_TSS: 1
- ASE_TSS.1: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 2
- ATE_COV.2: 8
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 18
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 14
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 40
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 27
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 101
- FCS_COP.1.1: 6
- FCS_KDF_EXT.1: 4
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 25
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 4
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 3
- FCS_TLS_EXT.1: 26
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 3
- FDP_DSK_EXT.1: 9
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.1: 8
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 16
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 20
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_SAS: 11
- FAU_SAS.1: 4
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 63
- FCS_CKM.1: 18
- FCS_CKM.2: 4
- FCS_CKM.4: 39
- FCS_CKM.4.1: 1
- FCS_COP: 129
- FCS_COP.1: 16
- FCS_RNG: 10
- FCS_RNG.1: 16
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 71
- FDP_ACC.1: 20
- FDP_ACF: 59
- FDP_ACF.1: 32
- FDP_IFC: 12
- FDP_IFC.1: 7
- FDP_IFF.1: 2
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_ITT: 10
- FDP_ITT.1: 2
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 16
- FIA_AFL.1: 4
- FIA_API: 2
- FIA_API.1: 9
- FIA_API.1.1: 2
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 3
- FIA_UID.1.2: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 20
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 9
- FMT_LIM.2.1: 1
- FMT_MSA: 46
- FMT_MSA.1: 7
- FMT_MSA.3: 19
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 28
- FMT_MTD.1: 3
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 10
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS: 9
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_ITE: 6
- FPT_ITE.1: 10
- FPT_ITE.1.1: 2
- FPT_ITE.1.2: 2
- FPT_ITE.2: 13
- FPT_ITE.2.1: 4
- FPT_ITE.2.2: 2
- FPT_ITT: 10
- FPT_ITT.1: 2
- FPT_PHP: 10
- FPT_PHP.3: 3
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_CONTROL: 7
- O.ADMIN_ROLES: 4
- O.AUDIT: 4
- O.COMMS_PROTECTION: 11
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 3
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 8
- Morpho:
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 1
- TrustedLabs:
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 18
- AES-128: 1
- AES-256: 2
- Rijndael:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 5
- SHA256: 2
- SHA384: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-256: 13
- SHA-384: 5
- SHA-512: 4
- SHA2: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 40
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 7
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 20
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 19
- Physical Probing: 2
- SPA: 2
- physical probing: 1
- side channel: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 2
- FIPS PUB 198-1: 2
- ISO:
- ISO/IEC 10116: 6
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 3
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- NIST SP 800-90A: 5
- RFC:
- RFC 2246: 1
- RFC 2818: 4
- RFC 4346: 1
- RFC 5246: 3
|
- CC:
- CCMB-2012-09-001: 3
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 2
- ISO:
- ISO/IEC 7816: 4
- ISO/IEC 7816-3: 2
- ISO/IEC 9797-1: 1
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-67: 2
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- statements of SPD, security objectives and security requirements of the optional packages are out of scope. 4.5.1 TOE type consistency The TOE type is smart card without the application named as a whole: 1
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20201015095811+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /ModDate: D:20201015095846+09'00'
- /Producer: Adobe PDF Library 20.9.95
- /Title:
- pdf_file_size_bytes: 911294
- pdf_hyperlinks: http://csrc.nist.gov/archive/aes/katmct/katmct.htm
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
- /Author: Thomas HOFFMANN, Agnes DILLER, Sebastian BOND
- /CreationDate: D:20161206164752+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Security Target Morpho MORPHO_HC_GERMANY_G2_COS COS
- /ModDate: D:20161206164752+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: SECURITY TARGET LITE MORPHO_HC_GERMANY_G2_COS V1
- /Title: SECURITY TARGET LITE MORPHO_HC_GERMANY_G2_COS V1
- pdf_file_size_bytes: 1471239
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 185
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |