Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, FaxController ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8
CSV information ?
Status | archived |
---|---|
Valid from | 22.05.2018 |
Valid until | 22.05.2023 |
Scheme | 🇯🇵 JP |
Manufacturer | Xerox Corporation |
Category | Multi-Function Devices |
Security level | ALC_FLR.2, EAL2+ |
Heuristics summary ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AESHash functions
SHA-256, SHA256Protocols
TLS, IPsecVendor
MicrosoftSecurity level
EAL2, EAL2 augmentedClaims
T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMINSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
JISEC-CC-CRP-C0599-01-2018Evaluation facilities
Information Technology Security CenterCertification process
out of scope, of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As describedCertification process
out of scope, of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As describedStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date: | D:20180723133907+09'00' |
---|---|
Modification date: | D:20180723133922+09'00' |
Pages: | 37 |
Creator: | Microsoft® Word 2010 |
Producer: | Microsoft® Word 2010 |
References
No references.
Security target ?
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, HMACHash functions
SHA1, SHA-1, SHA256, SHA384, SHA512, SHA-2Protocols
TLSTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256Security level
EAL2, EAL 2, EAL2 augmentedClaims
D.DOC, D.FUNC, D.PROT, D.CONF, O.AUDIT_STORAGE, O.AUDIT_ACCESS, O.CIPHER, O.DOC, O.FUNC, O.PROT, O.CONF, O.USER, O.INTERFACE, O.SOFTWARE, O.AUDIT, T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMIN, OE.AUDIT_STORAGE, OE.AUDIT_ACCESS, OE.PHYSICAL, OE.USER, OE.ADMIN, OE.AUDIT, OE.INTERFACE, OE.PHYISCALSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FAU_STG, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1.1, FCS_COP.1.1, FCS_CKM, FCS_COP, FDP_ACC.1, FDP_ACF.1, FDP_IFF, FDP_IFC, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FDP_ACC, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.7, FIA_UID.1, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.2, FMT_MSA.1, FMT_SMR.1, FMT_MOF.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA, FPT_FDI_EXP, FPT_FDI_EXP.1, FPT_FDI_EXP.1.1, FPT_STM.1, FPT_TST.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certification process
is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is aSide-channel analysis
malfunction, cold bootCertification process
is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is aStandards
FIPS PUB 180-2, FIPS PUB 197, RFC 2104, X.509, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title: | Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer |
---|---|
Subject: | Security Target |
Creation date: | D:20180712133520+09'00' |
Modification date: | D:20180712143347+09'00' |
Pages: | 121 |
Creator: | PScript5.dll Version 5.2.2 |
Producer: | Acrobat Distiller 10.1.16 (Windows) |
References
No references.
Heuristics ?
Extracted SARs
ADV_FSP.2, ASE_TSS.1, ATE_FUN.1, ALC_CMC.2, ASE_CCL.1, ASE_INT.1, ALC_FLR.2, ATE_COV.1, ALC_CMS.2, AVA_VAN.2, ASE_REQ.2, ASE_SPD.1, ALC_DEL.1, AGD_PRE.1, AGD_OPE.1, ASE_OBJ.2, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ADV_ARC.1CPE matches
Scheme data ?
Cert Id | C0599 | |
---|---|---|
Supplier | Xerox Corporation | |
Toe Overseas Name | Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, Fax Controller ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8 | |
Claim | PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) | |
Certification Date | 2018-05 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0599_it7628.html | |
Toe Japan Name | ----- | |
Enhanced | ||
Product | Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, Fax | |
Toe Version | Controller ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8 | |
Product Type | Multi-Function Device | |
Cert Id | JISEC-C0599 | |
Certification Date | 2018-05-22 | |
Cc Version | 3.1 Release4 | |
Assurance Level | EAL2 Augmented by ALC_FLR.2 | |
Protection Profile | U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) | |
Vendor | Xerox Corporation | |
Evaluation Facility | Information Technology Security Center Evaluation Department | |
Report Link | https://www.ipa.go.jp/en/security/c0599_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0599_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0599_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data. |
References ?
No references are available for this certificate.
Updates ?
-
21.09.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'C0599', 'toe_overseas_name': 'Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, Fax\n Controller ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8', 'certification_date': '2018-05', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0599_it7628.html', 'enhanced': {'__insert__': {'cert_id': 'JISEC-C0599'}, '__update__': {'product': 'Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, Fax', 'toe_version': 'Controller ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8', 'certification_date': '2018-05-22', 'report_link': 'https://www.ipa.go.jp/en/security/c0599_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0599_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0599_est.pdf', 'description': "PRODUCT DESCRIPTION \n Description of TOE \n The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. \n \n TOE security functionality \n To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: \n \n \n \n - \n Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. \n \n \n - \n Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. \n \n \n - \n User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. \n \n \n - \n System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. \n \n \n - \n Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. \n \n \n - \n Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. \n \n \n - \n Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. \n \n \n - \n Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. \n \n \n - \n Self testA function to verify the integrity of TSF executable code and TOE setting data."}}}
data.
- The scheme_data property was updated, with the
-
20.06.2023 The certificate data changed.
Certificate changed
The Status was updated.
- The new value is
archived
.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'C0590', 'toe_overseas_name': 'Xerox VersaLink B7025/B7030/B7035 Multifunction Printer models with Hard Disk, Fax\n Controller ROM Ver. 1.10.33, FAX ROM Ver. 2.0.8', 'certification_date': '2018-03', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0590_it6606.html', 'enhanced': {'__update__': {'product': 'Xerox VersaLink B7025/B7030/B7035 Multifunction Printer models with Hard Disk, Fax', 'toe_version': 'Controller ROM Ver. 1.10.33, FAX ROM Ver. 2.0.8', 'certification_date': '2018-03-16', 'evaluation_facility': 'Information Technology Security Center\n Evaluation Department', 'report_link': 'https://www.ipa.go.jp/en/security/c0590_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0590_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0590_est.pdf', 'description': "PRODUCT DESCRIPTION \n Description of TOE \n The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. \n \n TOE security functionality \n To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: \n \n \n \n - \n Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. \n \n \n - \n Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. \n \n \n - \n User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. \n \n \n - \n System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. \n \n \n - \n Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. \n \n \n - \n Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. \n \n \n - \n Internal Network Data Protection A function to protect communication data by using encryption communication protocols. \n \n \n - \n Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. \n \n \n - \n Self test A function to verify the integrity of TSF executable code and TOE setting data."}, '__delete__': ['cert_id']}}
data.
- The new value is
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'cert_id': 'C0610', 'supplier': 'Xerox Corporation', 'toe_overseas_name': 'Xerox VersaLink B605/B615\n Multifunction Printer models with Fax\n Controller ROM Ver. 1.13.32', 'claim': 'PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)', 'certification_date': '2018-08', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0610_it7632.html', 'toe_japan_name': '-----', 'enhanced': {'product': 'Xerox VersaLink B605/B615 Multifunction Printer models with Fax', 'toe_version': 'Controller ROM Ver. 1.13.32', 'product_type': 'Multi-Function Device', 'cert_id': 'JISEC-C0610', 'certification_date': '2018-8-02', 'cc_version': '3.1 Release4', 'assurance_level': 'EAL2 Augmented by ALC_FLR.2', 'protection_profile': 'U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)', 'vendor': 'Xerox Corporation', 'evaluation_facility': 'Information Technology Security Center Evaluation Department', 'report_link': 'https://www.ipa.go.jp/en/security/c0610_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0610_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0610_est.pdf', 'description': "PRODUCT DESCRIPTION \n Description of TOE \n The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. \n \n TOE Security functions \n To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: \n \n \n \n - \n Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. \n \n \n - \n Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. \n \n \n - \n User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. \n \n \n - \n System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. \n \n \n - \n Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. \n \n \n - \n Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. \n \n \n - \n Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. \n \n \n - \n Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. \n \n \n - \n Self testA function to verify the integrity of TSF executable code and TOE setting data."}}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0599_erpt.pdf, code: nok']
.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
3a5574442d696179372ad3e3ec1b9cd1b8721b5fbcb162efa65af5196bec562c
. - The st_txt_hash property was set to
1c9b13d43c40673003904833c945861550f664230a10f93aa7b0698724d2e291
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 684900, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 121, '/CreationDate': "D:20180712133520+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20180712143347+09'00'", '/Producer': 'Acrobat Distiller 10.1.16 (Windows)', '/Subject': 'Security Target', '/Title': 'Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2, 'EAL 2': 1, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 15, 'FAU_GEN.2': 9, 'FAU_SAR.1': 10, 'FAU_SAR.2': 9, 'FAU_STG.1': 11, 'FAU_STG.4': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1, 'FAU_STG': 1}, 'FCS': {'FCS_CKM.1': 12, 'FCS_COP.1': 11, 'FCS_CKM.2': 1, 'FCS_CKM.4': 2, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM': 1, 'FCS_COP': 1}, 'FDP': {'FDP_ACC.1': 75, 'FDP_ACF.1': 68, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_RIP.1': 9, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1, 'FDP_ACC.1.1': 6, 'FDP_ACF.1.1': 6, 'FDP_ACF.1.2': 6, 'FDP_ACF.1.3': 6, 'FDP_ACF.1.4': 6, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 6, 'FDP_ACC': 2}, 'FIA': {'FIA_AFL.1': 19, 'FIA_ATD.1': 11, 'FIA_SOS.1': 8, 'FIA_UAU.1': 16, 'FIA_UAU.7': 10, 'FIA_UID.1': 22, 'FIA_USB.1': 9, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MSA.1': 75, 'FMT_SMR.1': 39, 'FMT_MOF.1': 11, 'FMT_MSA.3': 68, 'FMT_MTD.1': 23, 'FMT_SMF.1': 34, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 6, 'FMT_MSA.3.1': 6, 'FMT_MSA.3.2': 6, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 1}, 'FPT': {'FPT_FDI_EXP': 3, 'FPT_FDI_EXP.1': 16, 'FPT_FDI_EXP.1.1': 2, 'FPT_STM.1': 11, 'FPT_TST.1': 9, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3': 10, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.DOC': 41, 'D.FUNC': 19, 'D.PROT': 4, 'D.CONF': 13}, 'O': {'O.AUDIT_STORAGE': 10, 'O.AUDIT_ACCESS': 10, 'O.CIPHER': 8, 'O.DOC': 16, 'O.FUNC': 8, 'O.PROT': 8, 'O.CONF': 16, 'O.USER': 14, 'O.INTERFACE': 8, 'O.SOFTWARE': 8, 'O.AUDIT': 8}, 'T': {'T.DOC': 6, 'T.FUNC': 3, 'T.PROT': 3, 'T.CONF': 6}, 'A': {'A.ACCESS': 3, 'A.USER': 3, 'A.ADMIN': 6}, 'OE': {'OE.AUDIT_STORAGE': 2, 'OE.AUDIT_ACCESS': 2, 'OE.PHYSICAL': 2, 'OE.USER': 12, 'OE.ADMIN': 6, 'OE.AUDIT': 3, 'OE.INTERFACE': 3, 'OE.PHYISCAL': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'3DES': {'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2, 'SHA-1': 2}, 'SHA2': {'SHA256': 7, 'SHA384': 2, 'SHA512': 2, 'SHA-2': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 20}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}, 'other': {'cold boot': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 2, 'FIPS PUB 197': 1}, 'RFC': {'RFC 2104': 1}, 'X509': {'X.509': 3}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is a': 1}}}
. - The st_filename property was set to
c0599_est.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
https://www.commoncriteriaportal.org/files/epfiles/c0599_eimg.pdf
.
The manufacturer_web was updated.
- The new value is
https://www.xerox.com
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0599_est.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
None
.
The manufacturer_web was updated.
- The new value is
None
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_HCD_EAL2_V1.0', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
3a5574442d696179372ad3e3ec1b9cd1b8721b5fbcb162efa65af5196bec562c
. - The st_txt_hash property was set to
1c9b13d43c40673003904833c945861550f664230a10f93aa7b0698724d2e291
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 684900, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 121, '/CreationDate': "D:20180712133520+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20180712143347+09'00'", '/Producer': 'Acrobat Distiller 10.1.16 (Windows)', '/Subject': 'Security Target', '/Title': 'Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2, 'EAL 2': 1, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 15, 'FAU_GEN.2': 9, 'FAU_SAR.1': 10, 'FAU_SAR.2': 9, 'FAU_STG.1': 11, 'FAU_STG.4': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1, 'FAU_STG': 1}, 'FCS': {'FCS_CKM.1': 12, 'FCS_COP.1': 11, 'FCS_CKM.2': 1, 'FCS_CKM.4': 2, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM': 1, 'FCS_COP': 1}, 'FDP': {'FDP_ACC.1': 75, 'FDP_ACF.1': 68, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_RIP.1': 9, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1, 'FDP_ACC.1.1': 6, 'FDP_ACF.1.1': 6, 'FDP_ACF.1.2': 6, 'FDP_ACF.1.3': 6, 'FDP_ACF.1.4': 6, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 6, 'FDP_ACC': 2}, 'FIA': {'FIA_AFL.1': 19, 'FIA_ATD.1': 11, 'FIA_SOS.1': 8, 'FIA_UAU.1': 16, 'FIA_UAU.7': 10, 'FIA_UID.1': 22, 'FIA_USB.1': 9, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MSA.1': 75, 'FMT_SMR.1': 39, 'FMT_MOF.1': 11, 'FMT_MSA.3': 68, 'FMT_MTD.1': 23, 'FMT_SMF.1': 34, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 6, 'FMT_MSA.3.1': 6, 'FMT_MSA.3.2': 6, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 1}, 'FPT': {'FPT_FDI_EXP': 3, 'FPT_FDI_EXP.1': 16, 'FPT_FDI_EXP.1.1': 2, 'FPT_STM.1': 11, 'FPT_TST.1': 9, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3': 10, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.DOC': 41, 'D.FUNC': 19, 'D.PROT': 4, 'D.CONF': 13}, 'O': {'O.AUDIT_STORAGE': 10, 'O.AUDIT_ACCESS': 10, 'O.CIPHER': 8, 'O.DOC': 16, 'O.FUNC': 8, 'O.PROT': 8, 'O.CONF': 16, 'O.USER': 14, 'O.INTERFACE': 8, 'O.SOFTWARE': 8, 'O.AUDIT': 8}, 'T': {'T.DOC': 6, 'T.FUNC': 3, 'T.PROT': 3, 'T.CONF': 6}, 'A': {'A.ACCESS': 3, 'A.USER': 3, 'A.ADMIN': 6}, 'OE': {'OE.AUDIT_STORAGE': 2, 'OE.AUDIT_ACCESS': 2, 'OE.PHYSICAL': 2, 'OE.USER': 12, 'OE.ADMIN': 6, 'OE.AUDIT': 3, 'OE.INTERFACE': 3, 'OE.PHYISCAL': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'3DES': {'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2, 'SHA-1': 2}, 'SHA2': {'SHA256': 7, 'SHA384': 2, 'SHA512': 2, 'SHA-2': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 20}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}, 'other': {'cold boot': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 2, 'FIPS PUB 197': 1}, 'RFC': {'RFC 2104': 1}, 'X509': {'X.509': 3}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is a': 1}}}
. - The st_filename property was set to
c0599_est.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0599_est.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'c0599_erpt.pdf', 'st_filename': 'c0599_est.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'JP': {'__update__': {'JISEC-CC-CRP-C0599-01-2018': 1}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 4}}}}, 'cc_claims': {'__update__': {'T': {'T.DOC': 4, 'T.FUNC': 2, 'T.PROT': 2, 'T.CONF': 4}, 'A': {'A.ACCESS': 1, 'A.USER': 1, 'A.ADMIN': 2}}, '__delete__': ['R', 'OT']}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 2}}}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described': 1}, '__delete__': ['lity of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described']}}}}
data. - The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 5}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_SAR': 1, 'FAU_STG': 1}}, 'FCS': {'__insert__': {'FCS_CKM': 1, 'FCS_COP': 1}}, 'FDP': {'__insert__': {'FDP_ACC': 2}}, 'FIA': {'__update__': {'FIA_UID.1': 22}}, 'FMT': {'__insert__': {'FMT_MSA': 1}, '__update__': {'FMT_SMR.1': 39}}}}, 'cc_claims': {'__update__': {'O': {'__insert__': {'O.AUDIT_ACCESS': 10, 'O.DOC': 16, 'O.FUNC': 8, 'O.PROT': 8, 'O.CONF': 16, 'O.USER': 14, 'O.INTERFACE': 8, 'O.SOFTWARE': 8, 'O.AUDIT': 8}, '__update__': {'O.AUDIT_STORAGE': 10}, '__delete__': ['O.AUDIT_STORAGE.PROTECTED', 'O.AUDIT_ACCESS.AUTHORIZED', 'O.DOC.NO_DIS', 'O.DOC.NO_ALT', 'O.FUNC.NO_ALT', 'O.PROT.NO_ALT', 'O.CONF.NO_DIS', 'O.CONF.NO_ALT', 'O.USER.AUTHORIZED', 'O.INTERFACE.MANAGED', 'O.SOFTWARE.VERIFIED', 'O.AUDIT.LOGGED', 'O.AUDIT_STORAGE.PROTEC', 'O.AUDIT_ACCESS.AUTHORI', 'O.SOFTWARE.VERIFI', 'O.INTERFACE.MANA', 'O.USER.AUTHORIZE', 'O.AUDIT_ACCESS.A']}, 'T': {'T.DOC': 6, 'T.FUNC': 3, 'T.PROT': 3, 'T.CONF': 6}, 'A': {'A.ACCESS': 3, 'A.USER': 3, 'A.ADMIN': 6}, 'OE': {'OE.AUDIT_STORAGE': 2, 'OE.AUDIT_ACCESS': 2, 'OE.PHYSICAL': 2, 'OE.USER': 12, 'OE.ADMIN': 6, 'OE.AUDIT': 3, 'OE.INTERFACE': 3, 'OE.PHYISCAL': 1}}, '__delete__': ['R', 'OT']}, 'vendor': {}, 'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA256': 7}}}}}}, 'crypto_scheme': {}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__delete__': ['TLSv1.2']}}}}}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS PUB 180-2': 2}}}}}
data.
The computed heuristics were updated.
- The cert_id property was set to
C0599
.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'JISEC-CC-CRP-C0599-01-2018': 37}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 3}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DOC.DIS': 2, 'T.DOC.ALT': 1, 'T.FUNC.ALT': 1, 'T.PROT.ALT': 2, 'T.CONF.DIS': 2, 'T.CONF.ALT': 1, 'T.LOGGING': 1}, 'A': {'A.ACCESS.MANAGED': 1, 'A.USER.TRAINING': 1, 'A.ADMIN.TRAINING': 1, 'A.ADMIN.TRUST': 1}, 'R': {'R.AUTHORIZATION': 1, 'R.TRAINING': 1}, 'OT': {'OT.ALT': 2}}, 'vendor': {'Microsoft': {'Microsoft': 14}}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1, 'SHA256': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}}, 'IPsec': {'IPsec': 6}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'lity of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 1, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1, 'ALC_FLR.2': 3}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 15, 'FAU_GEN.2': 9, 'FAU_SAR.1': 10, 'FAU_SAR.2': 9, 'FAU_STG.1': 11, 'FAU_STG.4': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_CKM.1': 12, 'FCS_COP.1': 11, 'FCS_CKM.2': 1, 'FCS_CKM.4': 2, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 75, 'FDP_ACF.1': 68, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_RIP.1': 9, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1, 'FDP_ACC.1.1': 6, 'FDP_ACF.1.1': 6, 'FDP_ACF.1.2': 6, 'FDP_ACF.1.3': 6, 'FDP_ACF.1.4': 6, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 6}, 'FIA': {'FIA_AFL.1': 19, 'FIA_ATD.1': 11, 'FIA_SOS.1': 8, 'FIA_UAU.1': 16, 'FIA_UAU.7': 10, 'FIA_UID.1': 19, 'FIA_USB.1': 9, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MSA.1': 75, 'FMT_SMR.1': 48, 'FMT_MOF.1': 11, 'FMT_MSA.3': 68, 'FMT_MTD.1': 23, 'FMT_SMF.1': 34, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 6, 'FMT_MSA.3.1': 6, 'FMT_MSA.3.2': 6, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FDI_EXP': 3, 'FPT_FDI_EXP.1': 16, 'FPT_FDI_EXP.1.1': 2, 'FPT_STM.1': 11, 'FPT_TST.1': 9, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3': 10, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.DOC': 41, 'D.FUNC': 19, 'D.PROT': 4, 'D.CONF': 13}, 'O': {'O.AUDIT_STORAGE.PROTECTED': 8, 'O.AUDIT_ACCESS.AUTHORIZED': 8, 'O.CIPHER': 8, 'O.DOC.NO_DIS': 8, 'O.DOC.NO_ALT': 8, 'O.FUNC.NO_ALT': 8, 'O.PROT.NO_ALT': 8, 'O.CONF.NO_DIS': 8, 'O.CONF.NO_ALT': 8, 'O.USER.AUTHORIZED': 13, 'O.INTERFACE.MANAGED': 7, 'O.SOFTWARE.VERIFIED': 7, 'O.AUDIT.LOGGED': 8, 'O.AUDIT_STORAGE.PROTEC': 1, 'O.AUDIT_ACCESS.AUTHORI': 1, 'O.SOFTWARE.VERIFI': 1, 'O.INTERFACE.MANA': 1, 'O.USER.AUTHORIZE': 1, 'O.AUDIT_STORAGE': 1, 'O.AUDIT_ACCESS.A': 1}, 'T': {'T.LOGGING': 4, 'T.DOC.DIS': 3, 'T.DOC.ALT': 3, 'T.FUNC.ALT': 3, 'T.PROT.ALT': 3, 'T.CONF.DIS': 3, 'T.CONF.ALT': 3, 'T.NO_ALT': 8, 'T.LOGGED': 8, 'T.REVIEWED': 3}, 'A': {'A.ACCESS.MANAGED': 3, 'A.USER.TRAINING': 3, 'A.ADMIN.TRAINING': 3, 'A.ADMIN.TRUST': 3}, 'R': {'R.AUTHORIZATION': 2, 'R.TRAINING': 3, 'R.AUTHORIZED': 22, 'R.TRAINED': 3, 'R.AUTHORIZATIO': 1, 'R.AUTHORIZE': 1}, 'OT': {'OT.ALT': 3, 'OT.NO_ALT': 8}, 'OE': {'OE': 1, 'OE.AUDIT_STORAGE.PROTECTED': 2, 'OE.AUDIT_ACCESS.AUTHORIZED': 2, 'OE.PHYSICAL.MANAGED': 2, 'OE.USER.AUTHORIZED': 9, 'OE.USER.TRAINED': 3, 'OE.ADMIN.TRAINED': 3, 'OE.ADMIN.TRUSTED': 2, 'OE.AUDIT.REVIEWED': 3, 'OE.INTERFACE.MANAGED': 3, 'OE.PHYISCAL.MANAGED': 1, 'OE.ADMIN.TRUST': 1}}, 'vendor': {'STMicroelectronics': {'STM': 12}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 1}, '3DES': {'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2, 'SHA-1': 2}, 'SHA2': {'SHA256': 9, 'SHA384': 2, 'SHA512': 2, 'SHA-2': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 20, 'TLSv1.2': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}, 'other': {'cold boot': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 1, 'FIPS PUB 197': 1}, 'RFC': {'RFC 2104': 1}, 'X509': {'X.509': 3}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is a': 1}}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '79541d1979f5a1ad93fad402235f2db6d37d1a8d3f66722c17eccec85fc7e15a', 'st_pdf_hash': '3a5574442d696179372ad3e3ec1b9cd1b8721b5fbcb162efa65af5196bec562c', 'report_txt_hash': '93ef4f3e97397394931ef4ff18d0163916b5998163d58afd54ff95ed6607db96', 'st_txt_hash': '1c9b13d43c40673003904833c945861550f664230a10f93aa7b0698724d2e291'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-256': 1, 'SHA256': 4}, 'rules_crypto_schemes': {'TLS': 3}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 8, 'DES': 1, 'HMAC': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 2, 'SHA-1': 2, 'SHA256': 9, 'SHA384': 2, 'SHA512': 2}, 'rules_crypto_schemes': {'MAC': 1, 'TLS': 20}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'malfunction': 1, 'cold boot': 1}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
True
. - The report_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 430190, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 37, '/CreationDate': "D:20180723133907+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20180723133922+09'00'", '/Producer': 'Microsoft® Word 2010'}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 684900, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 121, '/CreationDate': "D:20180712133520+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20180712143347+09'00'", '/Producer': 'Acrobat Distiller 10.1.16 (Windows)', '/Subject': 'Security Target', '/Title': 'Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer'}
. - The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The report_keywords property was updated, with the
{'rules_cert_id': {'JISEC-CC-CRP-C0599-01-2018': 37}}
data.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['2.0.8', '1.11.33']}
. - The cpe_matches property was set to
{'_type': 'Set', 'elements': ['cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*']}
. - The cert_id property was set to
JISEC-CC-CRP-C0599-01-2018
.
- The st_extract_ok property was set to
-
12.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[0, 'cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
11.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[2, 'cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
03.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[2, 'cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
02.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[0, 'cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, FaxController ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Multi-Function Devices",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/c0599_eimg.pdf",
"dgst": "4ab3110b9fd5d845",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "C0599",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.11.33",
"2.0.8"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "C0599",
"certification_date": "2018-05",
"claim": "PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2\u2122-2009)",
"enhanced": {
"assurance_level": "EAL2 Augmented by ALC_FLR.2",
"cc_version": "3.1 Release4",
"cert_id": "JISEC-C0599",
"cert_link": "https://www.ipa.go.jp/en/security/c0599_eimg.pdf",
"certification_date": "2018-05-22",
"description": "PRODUCT DESCRIPTION \n Description of TOE \n The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. \n \n TOE security functionality \n To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: \n \n \n \n - \n Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. \n \n \n - \n Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. \n \n \n - \n User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. \n \n \n - \n System Administrator\u0027s Security ManagementA function to allow only system administrators to configure the settings of security functions. \n \n \n - \n Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. \n \n \n - \n Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. \n \n \n - \n Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. \n \n \n - \n Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. \n \n \n - \n Self testA function to verify the integrity of TSF executable code and TOE setting data.",
"evaluation_facility": "Information Technology Security Center\n Evaluation Department",
"product": "Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, Fax",
"product_type": "Multi-Function Device",
"protection_profile": "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2\u2122-2009)",
"report_link": "https://www.ipa.go.jp/en/security/c0599_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0599_est.pdf",
"toe_version": "Controller ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8",
"vendor": "Xerox Corporation"
},
"supplier": "Xerox Corporation",
"toe_japan_name": "-----",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0599_it7628.html",
"toe_overseas_name": "Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, Fax\n Controller ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Xerox Corporation",
"manufacturer_web": "https://www.xerox.com",
"name": "Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, FaxController ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8",
"not_valid_after": "2023-05-22",
"not_valid_before": "2018-05-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "c0599_erpt.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"JISEC-CC-CRP-C0599-01-2018": 1
}
},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.ADMIN": 2,
"A.USER": 1
},
"T": {
"T.CONF": 4,
"T.DOC": 4,
"T.FUNC": 2,
"T.PROT": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 4
}
},
"cc_security_level": {
"EAL": {
"EAL2": 4,
"EAL2 augmented": 2
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 6
},
"TLS": {
"TLS": {
"TLS": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ITSC": {
"Information Technology Security Center": 4
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA256": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 14
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20180723133907+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20180723133922+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 430190,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 37
},
"st_filename": "c0599_est.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.ADMIN": 6,
"A.USER": 3
},
"D": {
"D.CONF": 13,
"D.DOC": 41,
"D.FUNC": 19,
"D.PROT": 4
},
"O": {
"O.AUDIT": 8,
"O.AUDIT_ACCESS": 10,
"O.AUDIT_STORAGE": 10,
"O.CIPHER": 8,
"O.CONF": 16,
"O.DOC": 16,
"O.FUNC": 8,
"O.INTERFACE": 8,
"O.PROT": 8,
"O.SOFTWARE": 8,
"O.USER": 14
},
"OE": {
"OE.ADMIN": 6,
"OE.AUDIT": 3,
"OE.AUDIT_ACCESS": 2,
"OE.AUDIT_STORAGE": 2,
"OE.INTERFACE": 3,
"OE.PHYISCAL": 1,
"OE.PHYSICAL": 2,
"OE.USER": 12
},
"T": {
"T.CONF": 6,
"T.DOC": 6,
"T.FUNC": 3,
"T.PROT": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 5
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 2,
"EAL2 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 15,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 9,
"FAU_GEN.2.1": 1,
"FAU_SAR": 1,
"FAU_SAR.1": 10,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 9,
"FAU_SAR.2.1": 1,
"FAU_STG": 1,
"FAU_STG.1": 11,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 9,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 12,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 2,
"FCS_COP": 1,
"FCS_COP.1": 11,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 75,
"FDP_ACC.1.1": 6,
"FDP_ACF.1": 68,
"FDP_ACF.1.1": 6,
"FDP_ACF.1.2": 6,
"FDP_ACF.1.3": 6,
"FDP_ACF.1.4": 6,
"FDP_IFC": 1,
"FDP_IFC.1": 6,
"FDP_IFF": 1,
"FDP_ITC.1": 1,
"FDP_ITC.2": 1,
"FDP_RIP.1": 9,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 19,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 2,
"FIA_ATD.1": 11,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 8,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 16,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 10,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 22,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_UID.2": 1,
"FIA_USB.1": 9,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 11,
"FMT_MOF.1.1": 1,
"FMT_MSA": 1,
"FMT_MSA.1": 75,
"FMT_MSA.1.1": 6,
"FMT_MSA.3": 68,
"FMT_MSA.3.1": 6,
"FMT_MSA.3.2": 6,
"FMT_MTD.1": 23,
"FMT_MTD.1.1": 2,
"FMT_SMF.1": 34,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 39,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FDI_EXP": 3,
"FPT_FDI_EXP.1": 16,
"FPT_FDI_EXP.1.1": 2,
"FPT_STM.1": 11,
"FPT_STM.1.1": 1,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.3": 10,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 13,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is a": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 20
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2,
"SHA1": 2
},
"SHA2": {
"SHA-2": 3,
"SHA256": 7,
"SHA384": 2,
"SHA512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
},
"other": {
"cold boot": 1
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS PUB 180-2": 2,
"FIPS PUB 197": 1
},
"RFC": {
"RFC 2104": 1
},
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"Triple-DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA256": 1
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20180712133520+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20180712143347+09\u002700\u0027",
"/Producer": "Acrobat Distiller 10.1.16 (Windows)",
"/Subject": "Security Target",
"/Title": "Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer",
"pdf_file_size_bytes": 684900,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 121
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf",
"pp_name": "U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2\u2122-200..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0599_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0599_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "79541d1979f5a1ad93fad402235f2db6d37d1a8d3f66722c17eccec85fc7e15a",
"report_txt_hash": "93ef4f3e97397394931ef4ff18d0163916b5998163d58afd54ff95ed6607db96",
"st_convert_garbage": false,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "3a5574442d696179372ad3e3ec1b9cd1b8721b5fbcb162efa65af5196bec562c",
"st_txt_hash": "1c9b13d43c40673003904833c945861550f664230a10f93aa7b0698724d2e291"
},
"status": "archived"
}