name |
Oracle Identity and Access Management 10g Release 10.1.4.0.1 |
MorphoSmart Optic 301 Version 1.0 |
category |
Access Control Devices and Systems |
Biometric Systems and Devices |
scheme |
UK |
DE |
status |
archived |
archived |
not_valid_after |
23.08.2013 |
01.09.2019 |
not_valid_before |
27.06.2008 |
31.01.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP245.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OIAM%20T245_ST_v0.9.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790b_pdf.pdf |
manufacturer |
Oracle Corporation UK Limited |
Safran Morpho |
manufacturer_web |
https://www.oracle.com/uk/ |
https://morpho.com |
security_level |
EAL4+, ALC_FLR.3 |
ADV_TDS.1, ASE_REQ.2, ALC_DEL.1, ASE_ECD.1, ATE_FUN.1, ALC_FLR.1, AGD_OPE.1, ASE_TSS.1, ATE_COV.1, ADV_FSP.2, ASE_INT.1, ATE_IND.2, ALC_CMS.2, ASE_CCL.1, AGD_PRE.1, ALC_CMC.2, ASE_SPD.1, ASE_OBJ.2, ADV_ARC.1 |
dgst |
8c31d4a6be21ae91 |
a9925b1140bde436 |
heuristics/cert_id |
CRP245 |
BSI-DSZ-CC-0790-2013 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.2, AVA_MSU.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ALC_FLR.3, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, ADV_IMP.1 |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_TAT.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, APE_REQ.2, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, ALC_CMC.2, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
10.1.4.0.1 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b02ed76d2545326a |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0062b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP245.pdf |
0790a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0790-2013
- cert_item: MorphoSmart Optic 301, Version 1.0
- cert_lab: BSI
- developer: Safran Morpho
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL4: 2
- EAL4 augmented: 2
|
- EAL:
- EAL 4: 2
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 6
- EAL5: 6
- EAL6: 3
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 5
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 5
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 5
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 5
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 5
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 5
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 5
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 5
- ASE_ECD: 1
- ASE_ECD.1: 5
- ASE_INT: 1
- ASE_INT.1: 5
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 5
- ASE_REQ.1: 1
- ASE_REQ.2: 5
- ASE_SPD: 1
- ASE_SPD.1: 5
- ASE_TSS: 1
- ASE_TSS.1: 5
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 5
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 5
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 5
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAR: 2
- FAU_STG: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
- TÜViT: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 19 September 2012, MorphoSmart Optic 301 – Life Cycle Support (ALC) (chapter 2.1), Safran Morpho (confidential document) [13] MSO 301– GUIDES, Version 12, 18 September 2012, Safran Morpho [14] MorphoSmart Programmer’s: 1
- 8] Evaluation Technical Report, Version 6, 21 January 2013, TÜV Informationstechnik GmbH, (confidential document) [9] Fingerprint Spoof Detection Evaluation Guidance (FSDEG), Version 2.1, 18 December 2009: 1
- Target, Version 8, 12 September 2012, MorphoSmart Optic 301 Security Target, Safran Morpho (confidential document) [7] Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies: 1
- OutOfScope:
- out of scope: 1
- relevant events and protection of residual and security relevant data. Biometric verification is out of scope of the certification. The Security Target [6] is the basis for this certification. It is based on: 1
|
pdf_data/report_metadata |
- /Author: Bhavin
- /CreationDate: D:20081124103627Z00'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20081124103627Z00'00'
- /Producer: GPL Ghostscript 8.63
- /Title: Microsoft Word - 081124 T245 CR v1.0.doc
- pdf_file_size_bytes: 510885
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Federal Office for Information Security
- /CreationDate: D:20130306111458+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Fingerprint Spoof Detection, Fingerprint, Biometrics, Fingerprint Fake Detection"
- /ModDate: D:20130306154334+01'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0790-2013
- pdf_file_size_bytes: 880965
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
OIAM T245_ST_v0.9.pdf |
0790b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 11
- EAL4 augmented: 2
- EAL4+: 2
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_FLR.3: 10
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.1: 2
- ADV_FSP.2: 7
- ADV_TDS.1: 5
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR.1: 6
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 5
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 3
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 5
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 18
- FAU_GEN.1: 1
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 3
- FAU_SAR: 38
- FAU_SAR.1: 2
- FAU_SAR.3: 1
- FAU_STG: 24
- FAU_STG.1: 2
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 3
- FDP_ACF.1: 9
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD.1: 7
- FIA_ATD.1.1: 3
- FIA_SOS.1: 4
- FIA_SOS.1.1: 3
- FIA_UAU.1: 5
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 3
- FIA_UAU.6: 4
- FIA_UAU.6.1: 3
- FIA_UID.1: 8
- FIA_UID.1.1: 3
- FIA_UID.1.2: 3
- FIA_USB.1: 3
- FIA_USB.1.1: 3
- FIA_USB.1.2: 3
- FIA_USB.1.3: 3
- FIA_USB.6: 1
- FMT:
- FMT_MSA.1: 12
- FMT_MSA.1.1: 3
- FMT_MSA.3: 10
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 2
- FMT_MTD: 13
- FMT_MTD.1: 8
- FMT_MTD.1.1: 3
- FMT_REV: 1
- FMT_REV.1: 6
- FMT_REV.1.1: 3
- FMT_REV.1.2: 3
- FMT_SMF: 9
- FMT_SMF.1: 13
- FMT_SMF.1.1: 5
- FMT_SMR.1: 14
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FMT_STG: 1
- FPT:
- FPT_RVM.1: 4
- FPT_RVM.1.1: 3
- FPT_SEP: 8
- FPT_STM: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 4
- FTA_TSE.1.1: 3
|
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FDP:
- FDP_RIP: 3
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FMT:
- FMT_MTD: 3
- FMT_MTD.1: 1
- FMT_MTD.3: 7
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FPT:
- FPT_SPOD: 6
- FPT_SPOD.1: 14
- FPT_SPOD.1.1: 3
- FPT_SPOD.1.2: 3
- FPT_SPOD.1.3: 3
- FPT_SPOD.1.4: 3
- FPT_STM.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 6
- A.MANAGE: 12
- A.PEER: 4
- A.PHYSICAL: 3
- A.SYS: 3
- A.TOE: 3
- O:
- O.AC-: 1
- O.ACCESS: 9
- O.ADMIN: 10
- O.AU-: 1
- O.AUDIT: 9
- OE:
- OE.ADMIN: 15
- OE.AU-: 1
- OE.AUDIT: 8
- OE.AUDIT-: 1
- OE.AUDITLOG: 5
- OE.AUTHDATA: 6
- OE.FILES: 13
- OE.INSTALL: 9
- OE.MEDIA: 4
- OE.PHYSICAL: 4
- OE.RECOVERY: 4
- OE.SEP: 9
- OE.TRUST: 5
- SA:
- SA.ACC: 15
- SA.ATT: 6
- SA.CHPWD: 14
- SA.OEFF: 4
- SA.UATT: 13
- SA.UEFF: 6
- T:
- T.ABUSE: 8
- T.ACCESS: 8
- T.ATTACK: 9
- T.CRASH: 1
- T.DATA: 8
- T.OPERATE: 1
|
- A:
- O:
- O.AUDIT: 7
- O.MANAGEMENT: 7
- O.RESIDUAL: 5
- O.SPOOF_DETECTION: 5
- OE:
- OE.ADMINISTRATION: 9
- OE.BIO: 2
- OE.PHYSICAL: 7
- OE.PLATFORM: 14
- OSP:
- OSP.AUDIT: 4
- OSP.MANAGEMENT: 4
- OSP.RESIDUAL: 4
- OSP.SPOOF_DETECTION: 5
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- RFC:
- RFC 2396: 1
- RFC2616: 2
- RFC2965: 2
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- and the fingerprint if genuine. Please be aware that the mechanism for biometric matching is out of scope of the certification. The MSO Demonstrator Application is a software which enables using the MSO: 1
- of the TOE but do not realize any part of the fake finger detection functionality and are therefore out of scope of the certified security functionality. The storage of the generated log, i.e., the Audit log, is: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: bakraniay
- /CreationDate: D:20080327132737Z
- /Creator: FrameMaker 6.0
- /ModDate: D:20080327133026Z
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: st.book
- pdf_file_size_bytes: 1162333
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 82
|
- /Author: Safran Morpho
- /CreationDate: D:20130121143511
- /Creator: Microsoft® Office Word 2007
- /Keywords: MSO 301, Common Criteria, CC, Securtiy Target, ST, ST-lite
- /ModDate: D:20130121144124+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: ST-lite
- /Title: MSO FFD Public Security Target
- pdf_file_size_bytes: 476138
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |