Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C759 / AccurioPrint C759 / bizhub C659 /ineo+ 759 / ineo+ 659G00-09
JISEC-CC-CRP-C0604-01-2018
Hitachi Adaptable Modular Storage 2300 Microprogram Version:0862/ A-M
JISEC-CC-CRP-C0220
name bizhub C759 / AccurioPrint C759 / bizhub C659 /ineo+ 759 / ineo+ 659G00-09 Hitachi Adaptable Modular Storage 2300 Microprogram Version:0862/ A-M
category Multi-Function Devices Access Control Devices and Systems
not_valid_after 26.06.2023 11.01.2013
not_valid_before 26.06.2018 29.06.2009
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0604_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0604_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0220_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0604_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0220_est.pdf
manufacturer KONICA MINOLTA, INC. Hitachi, Ltd.
manufacturer_web https://www.konicaminolta.com/index.html https://www.hitachi.com/
security_level EAL2+, ALC_FLR.2 EAL2
dgst dd38f9af1a99091b 2664475a930e5e47
heuristics/cert_id JISEC-CC-CRP-C0604-01-2018 JISEC-CC-CRP-C0220
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_c759:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c659:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1
heuristics/extracted_versions 09, 759 0862, 2300
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0604
  • certification_date: 01.06.2018
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_id: JISEC-CC-CRP-C0604
    • cert_link: https://www.ipa.go.jp/en/security/c0604_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is an MFP (Multi-Function Printer) that offers Copy, Scan, Print, Fax, and Document storage and retrieval functions. The TOE provides security functions that conform to U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) which is the MFP security requirement specification, to prevent unauthorized disclosure and alteration of user’s document data. TOE Security functions The TOE provides the following security features: - Identification and authenticationFunction to identify and authenticate users. - User restriction control functionFunction to restrict available functions of users and to control the access to document data other than accumulated documents only to the authorized users. - Accumulated documents access control functionFunction to control the access to accumulated documents only to the authorized users. - HDD encryption functionFunction to encrypt the data that is stored in HDD. - Residual information deletion functionFunction to overwrite and delete the data stored in HDD, so that they cannot be reused. - Audit log functionFunction to record audit log related to security functions. - Network communication protection functionFunction to encrypt communication data on the LAN. - Self-test functionFunction to verify the integrity of executable codes of HDD encryption function and security functions. - Security management functionFunction to control the management of security functions only to the authorized users. - External interface separation functionFunction to prevent unauthorized transfer to LAN from external interface like public phone etc.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: bizhub C759 / AccurioPrint C759 / bizhub C659 / ineo+ 759 / ineo+ 659
    • product_type: Multi-Function Printer
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0604_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0604_est.pdf
    • toe_version: G00-09
    • vendor: KONICA MINOLTA, INC.
  • expiration_date: 01.07.2023
  • supplier: KONICA MINOLTA,INC.
  • toe_japan_name: bizhub C759 / AccurioPrint C759 / bizhub C659 / ineo+ 759 / ineo+ 659G00-09
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0604_it7637.html
  • toe_overseas_name: bizhub C759 / AccurioPrint C759 / bizhub C659 / ineo+ 759 / ineo+ 659 G00-09
  • cert_id: JISEC-CC-CRP-C0220
  • certification_date: 01.06.2009
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0220_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a control program (software) that runs on a disk array subsystem manufactured by Hitachi, Ltd.: 滴itachi Adaptable Modular Storage 2300・ The TOE controls data transfer between the disk array subsystem and the host (server) connected to the disk array subsystem and manages the data stored in the subsystem. The TOE provides a function to permit the management operation of the disk array subsystem only for the account of the authorized administrator and a function to record events of the management operation in logs as the security functions. TOE security functions The TOE has the following security functions. (1) Account Authentication function - Identification/Authentication When the administrator performs the setting operations of the disk array subsystem, this function performs the account identification/authentication of the administrator. - Execution control by roles If the role given to the account permits the setting operation, it is executed. If it is not permitted, the setting operation is not executed. - Time-out function If the operation is not performed for a certain period of time, the session of the account is disabled, and it is timed out. - Account management This function manages the user ID, password, account enabled/disabled attribute, and role assignment response per account as the account information. (2) Audit Logging function - Audit log acquisition When an audit event related to the security function in the TOE such as login success/failure of the account of the administrator occurs, this function acquires the event as an audit log. Furthermore, it performs enabled/disabled setting of the audit log acquisition. - Audit log erasing This function erases the audit logs (batch erasing of all audit logs acquired in the past). (3) Setting function This function enables or disables the Account Authentication function and the Audit Logging function.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Hitachi Adaptable Modular Storage 2300 Microprogram
    • product_type: IT Product (Disk Array Control Software)
    • report_link: https://www.ipa.go.jp/en/security/c0220_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0220_est.pdf
    • toe_version: 0862/ A-M
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.03.2013
  • revalidations: [frozendict({'date': '2010-09', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0220_it8210_01.html'})]
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0220_it8210.html
  • toe_japan_name: Hitachi Adaptable Modular Storage 2300 Microprogram 0862/ A-M
  • toe_overseas_link: None
  • toe_overseas_name: Hitachi Adaptable Modular Storage Microprogram 0862/A
heuristics/protection_profiles 43ce79b420f23a00 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf {}
pdf_data/cert_filename c0604_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0604-01-2018: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20180725154842+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180725154924+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 150426
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename c0604_erpt.pdf c0220_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0604-01-2018: 1
  • JP:
    • CRP-C0220-01: 1
    • Certification No. C0220: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
  • EAL:
    • EAL2: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408: 6
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_metadata
  • /CreationDate: D:20180726095038+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180726095057+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 522516
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /CreationDate: D:20090826102507+09'00'
  • /ModDate: D:20090826102507+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 195461
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename c0604_est.pdf c0220_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 1
  • EAL:
    • EAL 2: 1
    • EAL2: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • APE:
    • APE_ECD: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 1
    • AGD_USR.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 2
    • FAU_STG.4: 13
    • FAU_STG.4.1: 2
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 18
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 20
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 13
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_MTD.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 12
    • FIA_UID: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 13
    • FIA_USB: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 1
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 1
    • FMT_RVM: 1
    • FMT_RVM.1: 1
    • FMT_SEP: 1
    • FMT_SEP.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_STM: 1
    • FMT_STM.1: 1
    • FMT_USB.1: 1
  • FPT:
    • FPT_RVM.1: 20
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 19
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 13
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
    • FTA_TSE: 1
    • FTA_TSE.1: 9
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 7
    • D.DOC: 37
    • D.FUNC: 26
    • D.PROT: 8
  • O:
    • O.AUDIT: 6
    • O.CONF: 12
    • O.DOC: 13
    • O.FUNC: 6
    • O.HDD: 9
    • O.INTERFACE: 6
    • O.PROT: 6
    • O.SOFTWARE: 6
    • O.USER: 11
    • O.USER_AUTHORIZED: 1
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.SSL: 3
  • OE:
    • OE.SSL: 5
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • SSL:
      • SSL: 12
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • ISO:
    • ISO/IEC15408: 6
pdf_data/st_metadata
  • /Author: e08884
  • /CreationDate: D:20180725134100+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20180725134100+09'00'
  • /Producer: Acrobat Distiller 15.0 (Windows)
  • /Title: Microsoft Word - 【C0604】英文_ASE_MinervaMLK-2.00-180620.docx
  • pdf_file_size_bytes: 674277
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
  • /Author: m-ohara
  • /Company: (株)日立製作所
  • /CreationDate: D:20090825211947+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /ModDate: D:20090825212100+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20090825075858
  • /Title: DF800 Securyty Target
  • pdf_file_size_bytes: 649098
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different