name |
TOSHIBA e-STUDIO2555C/3055C/3555C/4555C/5055C/2555CSE/3055CSE/3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0 |
imagio Security Card Type 9 (Japanese name), DataOverwriteSecurity Unit Type I (English name) Version: 1.02m |
category |
Multi-Function Devices |
Other Devices and Systems |
scheme |
JP |
JP |
status |
archived |
archived |
not_valid_after |
01.05.2018 |
01.09.2019 |
not_valid_before |
26.04.2013 |
29.11.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0388_erpt2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0417_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0388_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0417_est.pdf |
manufacturer |
Toshiba TEC Corporation |
Ricoh Company, Ltd. |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.ricoh.com/ |
security_level |
ALC_FLR.2, EAL3+ |
EAL3 |
dgst |
a7263024c5c36e3f |
221bca7fbf6eb6af |
heuristics/cert_id |
JISEC-CC-CRP-C0388 |
JISEC-CC-CRP-C0417 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_FLR.2, ASE_SPD.1, ASE_CCL.1, ALC_LCD.1, ATE_COV.2, AVA_VAN.2, ALC_CMS.3, ASE_REQ.2, ALC_CMC.3, ASE_OBJ.2, ASE_TSS.1, AGD_PRE.1, ASE_ECD.1, ALC_DEL.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.2, ALC_DVS.1, ADV_ARC.1, ATE_DPT.1, ADV_FSP.3, ATE_IND.2 |
ASE_INT.1, ASE_SPD.1, ASE_CCL.1, ALC_LCD.1, ATE_COV.2, AVA_VAN.2, ALC_CMS.3, ASE_REQ.2, ALC_CMC.3, ASE_OBJ.2, ASE_TSS.1, AGD_PRE.1, ASE_ECD.1, ALC_DEL.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.2, ALC_DVS.1, ADV_ARC.1, ATE_DPT.1, ADV_FSP.3, ATE_IND.2 |
heuristics/extracted_versions |
1.0 |
1.02 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0388
- certification_date: 01.04.2013
- claim: EAL3+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL3 Augmented with ALC_FLR.2
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0388_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan, filing, and internet fax. In general office environment, it is assumed that MFPs are utilized from the control panel of the TOE or the user terminal connected to LAN or USB with the TOE. TOE Security functions The TOE provides the following security features: - User Authentication function Function that allows the use of the TOE to only users who succeeded in the identification and authentication. - User Access Control function Function to perform the control of permit/ deny for the operation of various functions and user data, based on the privileges granted to the users who are identified and authenticated. - Secure Erase function Function to erase and overwrite the area in the HDD, where the document data has been stored, upon completion of copy function, etc. - Secure Channel function Function to protect communication data using the SSL protocol when the TOE communicates with the various servers or client PC. - Data Encryption function Function to encrypt and decrypt the document data stored in the HDD of the TOE. - Audit Data Generation and Review function Function to generate security audit log when security events occurred to be audited, and to allow only specific administrators to view that log. - TSF Data Protection function Function that allows the change of TOE configuration information only to the TOE administrator. - TSF Self Protection function Function to verify the integrity of the executable code of the security features. If any abnormalities are detected TOE will be unusable.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: TOSHIBA e-STUDIO2555C/3055C/ 3555C/4555C/5055C/2555CSE/3055CSE/ 3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS
- product_type: Multifunction Peripheral
- protection_profile: IEEE Std 2600.1-2009
- report_link: https://www.ipa.go.jp/en/security/c0388_erpt2.pdf
- target_link: https://www.ipa.go.jp/en/security/c0388_est.pdf
- toe_version: SYS V1.0
- vendor: Toshiba Tec Corporation
- expiration_date: 01.05.2018
- supplier: Toshiba Tec Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0388_it2432.html
- toe_overseas_name: TOSHIBA e-STUDIO 2555C/3055C/3555C/ 4555C/5055C/2555CSE/3055CSE/3555CSE/ 4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS SYS V1.0
|
- cert_id: JISEC-CC-CRP-C0417
- certification_date: 01.11.2013
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0417_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; - RICOH MP C3503 - RICOH MP C3003 - Ricoh MP C3003 - Ricoh MP C3003G - Ricoh MP C3503 - Ricoh MP C3503G - Savin MP C3003 - Savin MP C3003G - Savin MP C3503 - Savin MP C3503G - Lanier MP C3003 - Lanier MP C3003G - Lanier MP C3503 - Lanier MP C3503G - nashuatec MP C3003 - nashuatec MP C3503 - Rex-Rotary MP C3003 - Rex-Rotary MP C3503 - Gestetner MP C3003 - Gestetner MP C3503 - infotec MP C3003 - infotec MP C3503 TOE security functionality Same as above.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: imagio Security Card Type 9 (Japanese name) DataOverwriteSecurity Unit Type I (English name)
- product_type: Software to overwrite data
- report_link: https://www.ipa.go.jp/en/security/c0417_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0417_est.pdf
- toe_version: 1.02m
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.12.2018
- revalidations: [frozendict({'date': '2015-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0417_it3459_05.html'})]
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: imagio Security Card Type 91.02m
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0417_it3459.html
- toe_overseas_name: DataOverwriteSecurity Unit Type I1.02m
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
32475ccb695b1644 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0388_erpt2.pdf |
c0417_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0388-02: 1
- Certification No. C0388: 1
|
- JP:
- CRP-C0417-01: 1
- Certification No. C0417: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 4
- EAL3 augmented: 2
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- D:
- D.CONF: 1
- D.DOC: 2
- D.FUNC: 1
- D.PROT: 2
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. Internet Fax function A function that allows scanned document data to be sent as a TIFF-FX: 1
- OutOfScope:
- out of scope: 1
- that the reliability of the hardware and the cooperating software shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. CRP-C0388-02 12 4.3 Clarification of Scope: 1
|
|
pdf_data/report_metadata |
- /CreationDate: D:20130619094434+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20130619094506+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 367918
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
- /CreationDate: D:20140204162732+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140204162753+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 173623
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
c0388_est.pdf |
c0417_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10340-2009: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 1
- EAL 3 augmented: 1
- EAL3: 2
- EAL3 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 4
- ALC_LCD.1: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 18
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 2
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 37
- FDP_ACC.1.1: 2
- FDP_ACF.1: 29
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 2
- FDP_IFF: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS.1: 10
- FIA_SOS.1.1: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 1
- FMT_MSA.1: 22
- FMT_MSA.1.1: 2
- FMT_MSA.3: 22
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 2
- FPT_FDI_EXP.1: 14
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FDP:
- FDP_RIP: 5
- FDP_RIP.1.1: 1
- FDP_SIP: 1
- FDP_SIP.1: 15
- FDP_SIP.1.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A: 2
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 7
- D.DOC: 48
- D.FUNC: 12
- D.PROT: 6
- O:
- O.AUDIT: 7
- O.AUDIT_ACCESS: 5
- O.AUDIT_ACCESS_AUTHORIZED: 1
- O.AUDIT_STORAGE: 6
- O.AUDIT_STORAGE_PROTECTED: 1
- O.CONF: 14
- O.CRYPTOGRAPHY: 7
- O.DOC: 23
- O.FUNC: 7
- O.INTERFACE: 7
- O.PROT: 7
- O.SOFTWARE: 5
- O.USER: 11
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 1
- OE.AUDIT_STRAGE: 1
- OE.INTERFACE: 3
- OE.PHYISCAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 4
- Microsoft Corporation: 1
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5: 1
|
|
pdf_data/st_metadata |
- /Author: TOSHIBA TEC CORPORATION
- /CreationDate: D:20130417131602+09'00'
- /Creator: Microsoft® Word 2010
- /Keywords: IEEE 2600.1™-2009
EAL3+ALC_FLR.2
- /ModDate: D:20130417135319+09'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target
- /Title: SecurityTarget
- pdf_file_size_bytes: 1417924
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 65
|
- /Author:
- /CreationDate: D:20140131135801+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20140131135802+09'00'
- /Producer: GPL Ghostscript 9.06; modified using iText® 5.3.2 ©2000-2012 1T3XT BVBA (AGPL-version)
- /Subject:
- /Title:
- pdf_file_size_bytes: 153617
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |