Secure Analogue and Digital KVM Switches - Adder models AVSD1002-XX, AVSD1004-XX, AVSV1002-XX, AVSV1004-XX, AVSC1102-XX, AVSC1104-XX

CSV information ?

Status archived
Valid from 04.01.2011
Valid until 04.01.2016
Scheme 🇬🇧 UK
Manufacturer Adder Technology Ltd
Category Other Devices and Systems
Security level ALC_FLR.2, EAL4+, ATE_DPT.2

Heuristics summary ?

Certificate ID: CRP259

Certificate ?

Certification report ?

Extracted keywords

Security level
EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2, ATE_DPT.2
Certificates
CRP259
Certification process
out of scope, only): this provides product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although

Certification process
out of scope, only): this provides product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title: Certification Report
Author: User
Creation date: D:20110111164700Z
Modification date: D:20110111164701Z
Pages: 16
Creator: Acrobat PDFMaker 7.0.5 for Word
Producer: Acrobat Elements 7.0.5 (Windows)

References

Incoming
  • CRP268 - Adder Secure Analogue and Digital KVM Switches, Version 1.0, AVSD1002-XX, AVSD1004-XX, AVSV1002-XX, AVSV1004-XX; where XX is one of the following: UK (United Kingdom), US (United States), EURO (Europe), AUS (Australia)

Security target ?

Extracted keywords

Security level
EAL4, EAL4 augmented
Claims
O.SWITCH, O.CONF, O.CONNECT, O.INDICATE, O.SELECT, O.INVOKE, O.NOPROG, O.ROM, T.BYPASS, T.INSTALL, T.LOGICAL, T.PHYSICAL, T.RESIDUAL, T.SPOOF, T.STATE, T.TRANSFER, A.SCENARIO, A.ACCESS, A.MANAGE, A.NOEVIL, A.PHYSICAL, A.EMISSION, A.ISOLATE, OE.ACCESS, OE.MANAGE, OE.NOEVIL, OE.PHYSICAL, OE.SCENARIO, OE.EMISSION, OE.ISOLATE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT, ATE_DPT.1, AVA_VAN.3
Security Functional Requirements (SFR)
FAU_GEN, FDP_ETC, FDP_IFF, FDP_ITC, FDP_ETC.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_MSA.1, FMT_MSA, FMT_SMF, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1

Side-channel analysis
malfunction

Standards
CCMB-2009-07-004

File metadata

Title:
Author: Ian Mearns
Creation date: D:20101206093805
Modification date: D:20101206093805
Pages: 38
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

References

Incoming

Heuristics ?

Certificate ID: CRP259

Extracted SARs

ALC_CMC.4, ALC_CMS.4, ADV_ARC.1, AVA_VAN.3, ATE_DPT.2, ALC_FLR.2, ADV_TDS.3, ADV_IMP.1, ATE_IND.2, ALC_LCD.1, AGD_PRE.1, AGD_OPE.1, ADV_FSP.4, ALC_DVS.1, ALC_TAT.1, ALC_DEL.1, ATE_FUN.1, ATE_COV.2

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5f4b59e125498d73d8be1ec41775edea2f13f44ab2e61996641e1df22d891c16', 'txt_hash': '8b11e482c88f97ffd5a04198d38e3419225edf8fce1c059c59922497e1d7580b'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '842c04aa6cdab4a566c602b2ff6f7f69403ec76d7f770ec4c62c1dfeae7387a8', 'txt_hash': '68ed8a0bffe65cb23ce383a1128dde7d1ba5d2d21d7263bc91a9f35d000aa073'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/crp259.pdf, code: 408'].
    • The st_pdf_hash property was set to 842c04aa6cdab4a566c602b2ff6f7f69403ec76d7f770ec4c62c1dfeae7387a8.
    • The st_txt_hash property was set to 68ed8a0bffe65cb23ce383a1128dde7d1ba5d2d21d7263bc91a9f35d000aa073.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 580697, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Title': ' ', '/Author': 'Ian Mearns', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20101206093805', '/ModDate': 'D:20101206093805', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 11, 'EAL4 augmented': 5}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_TDS.3': 4, 'ADV_FSP.4': 3, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 5, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 2, 'ATE_DPT': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.3': 3}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FDP': {'FDP_ETC': 1, 'FDP_IFF': 1, 'FDP_ITC': 1, 'FDP_ETC.1': 5, 'FDP_ACC.1': 3, 'FDP_IFC.1': 10, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 3, 'FDP_IFF.1': 7, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 5, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 3, 'FDP_ITC.1.3': 1, 'FDP_MSA.1': 1}, 'FMT': {'FMT_MSA': 1, 'FMT_SMF': 1, 'FMT_MSA.3': 10, 'FMT_MSA.1': 5, 'FMT_SMR.1': 4, 'FMT_SMF.1': 7, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 2, 'FMT_SMF.1.1': 2}}, 'cc_claims': {'O': {'O.SWITCH': 9, 'O.CONF': 5, 'O.CONNECT': 8, 'O.INDICATE': 3, 'O.SELECT': 3, 'O.INVOKE': 1, 'O.NOPROG': 5, 'O.ROM': 5}, 'T': {'T.BYPASS': 2, 'T.INSTALL': 2, 'T.LOGICAL': 3, 'T.PHYSICAL': 2, 'T.RESIDUAL': 2, 'T.SPOOF': 2, 'T.STATE': 2, 'T.TRANSFER': 4}, 'A': {'A.SCENARIO': 4, 'A.ACCESS': 2, 'A.MANAGE': 2, 'A.NOEVIL': 2, 'A.PHYSICAL': 2, 'A.EMISSION': 1, 'A.ISOLATE': 1}, 'OE': {'OE.ACCESS': 2, 'OE.MANAGE': 5, 'OE.NOEVIL': 5, 'OE.PHYSICAL': 4, 'OE.SCENARIO': 2, 'OE.EMISSION': 1, 'OE.ISOLATE': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to t265_st.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/t265_st.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/crp259.pdf, code: nok'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/crp259.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'crp259.pdf', 'st_filename': 't265_st.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'UK': {'__update__': {'CRP259': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'only): this provides product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although': 1}, '__delete__': ['. These features are out of scope of the evaluation', 'e only): this provides product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although']}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ATE': {'__insert__': {'ATE_DPT.1': 1}}, 'AVA': {'__update__': {'AVA_VAN.3': 3}}}}, 'cc_sfr': {'__update__': {'FMT': {'__update__': {'FMT_MSA.3': 10, 'FMT_SMR.1': 4}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.CONF': 5}}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['CRP268']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['CRP268']}} data.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 203891, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': 'D:20110111164700Z', '/_EmailSubject': 'Word -> PDF (3) ', '/Author': 'User', '/Creator': 'Acrobat PDFMaker 7.0.5 for Word', '/_AuthorEmailDisplayName': 'WhittakerAxon, Nigel', '/Producer': 'Acrobat Elements 7.0.5 (Windows)', '/_AuthorEmail': 'Nigel.WhittakerAxon@cesg.gsi.gov.uk', '/ModDate': 'D:20110111164701Z', '/_PreviousAdHocReviewCycleID': '1885515888', '/_AdHocReviewCycleID': '-1657598661', '/Company': 'Certification Body, CESG', '/Title': 'Certification Report', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.

    The computed heuristics were updated.

    • The cert_lab property was set to [''].
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/f1f3ee0c612ba3ea.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/f1f3ee0c612ba3ea.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CRP259': 34}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 2}, 'ATE': {'ATE_DPT.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '. These features are out of scope of the evaluation': 1, 'e only): this provides product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 11, 'EAL4 augmented': 5}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_TDS.3': 4, 'ADV_FSP.4': 3, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 5, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 2, 'ATE_DPT': 1}, 'AVA': {'AVA_VAN.3': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FDP': {'FDP_ETC': 1, 'FDP_IFF': 1, 'FDP_ITC': 1, 'FDP_ETC.1': 5, 'FDP_ACC.1': 3, 'FDP_IFC.1': 10, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 3, 'FDP_IFF.1': 7, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 5, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 3, 'FDP_ITC.1.3': 1, 'FDP_MSA.1': 1}, 'FMT': {'FMT_MSA': 1, 'FMT_SMF': 1, 'FMT_MSA.3': 7, 'FMT_MSA.1': 5, 'FMT_SMR.1': 3, 'FMT_SMF.1': 7, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 2, 'FMT_SMF.1.1': 2}}, 'cc_claims': {'O': {'O.SWITCH': 9, 'O.CONF': 8, 'O.CONNECT': 8, 'O.INDICATE': 3, 'O.SELECT': 3, 'O.INVOKE': 1, 'O.NOPROG': 5, 'O.ROM': 5}, 'T': {'T.BYPASS': 2, 'T.INSTALL': 2, 'T.LOGICAL': 3, 'T.PHYSICAL': 2, 'T.RESIDUAL': 2, 'T.SPOOF': 2, 'T.STATE': 2, 'T.TRANSFER': 4}, 'A': {'A.SCENARIO': 4, 'A.ACCESS': 2, 'A.MANAGE': 2, 'A.NOEVIL': 2, 'A.PHYSICAL': 2, 'A.EMISSION': 1, 'A.ISOLATE': 1}, 'OE': {'OE.ACCESS': 2, 'OE.MANAGE': 5, 'OE.NOEVIL': 5, 'OE.PHYSICAL': 4, 'OE.SCENARIO': 2, 'OE.EMISSION': 1, 'OE.ISOLATE': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_lab property was set to None.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '5f4b59e125498d73d8be1ec41775edea2f13f44ab2e61996641e1df22d891c16', 'st_pdf_hash': '842c04aa6cdab4a566c602b2ff6f7f69403ec76d7f770ec4c62c1dfeae7387a8', 'report_txt_hash': '8b11e482c88f97ffd5a04198d38e3419225edf8fce1c059c59922497e1d7580b', 'st_txt_hash': '68ed8a0bffe65cb23ce383a1128dde7d1ba5d2d21d7263bc91a9f35d000aa073'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'malfunction': 2}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to [''].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {'cert_id': '', 'cert_item': 'liability in respect of those judgements or for loss sustained as a result of reliance placed by a third party upon those judgements. 122-B January 2011 Issue 1.0 Page 1 of 16 CERTIFICATION REPORT No. CRP259 Adder Secure Analogue and Digital KVM Switches, Version 1.0, AVSD1002-XX AVSD1004-XX AVSV1002-XX AVSV1004-XX AVSC1102-XX AVSC1104-XX where XX is the following: UK (United Kingdom) US (United States) EURO (Europe) AUS (Australia) Issue 1.0 January 2011 © Crown Copyright 2011 – All Rights Reserved Reproduction is authorised, provided that this report is copied in its entirety. CESG Certification Body IACS Delivery Office, CESG Hubble Road, Cheltenham Gloucestershire, GL51 0EX United Kingdom CRP259 – Adder Secure KVM Switches Page 2 of 16 Issue 1.0 January 2011 CERTIFICATION STATEMENT The products detailed below have been evaluated under the terms of the UK IT Security Evaluation and Certification Scheme and have met the specified Common Criteria requirements. The scope of the evaluation and the assumed usage environment are specified in the body of this report', 'developer': '', 'cert_lab': ''}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Secure Analogue and Digital KVM Switches - Adder models AVSD1002-XX, AVSD1004-XX, AVSV1002-XX, AVSV1004-XX, AVSC1102-XX, AVSC1104-XX was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "f1f3ee0c612ba3ea",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP259",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP268"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP268"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Adder Technology Ltd",
  "manufacturer_web": "https://www.adder.com/",
  "name": "Secure Analogue and Digital KVM Switches - Adder models AVSD1002-XX, AVSD1004-XX, AVSV1002-XX, AVSV1004-XX, AVSC1102-XX, AVSC1104-XX",
  "not_valid_after": "2016-01-04",
  "not_valid_before": "2011-01-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "crp259.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CRP259": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 2
        },
        "ATE": {
          "ATE_DPT.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "only): this provides product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "User",
      "/Company": "Certification Body, CESG",
      "/CreationDate": "D:20110111164700Z",
      "/Creator": "Acrobat PDFMaker 7.0.5 for Word",
      "/ModDate": "D:20110111164701Z",
      "/Producer": "Acrobat Elements 7.0.5 (Windows)",
      "/Title": "Certification Report",
      "/_AdHocReviewCycleID": "-1657598661",
      "/_AuthorEmail": "Nigel.WhittakerAxon@cesg.gsi.gov.uk",
      "/_AuthorEmailDisplayName": "WhittakerAxon, Nigel",
      "/_EmailSubject": "Word -\u003e PDF (3) ",
      "/_PreviousAdHocReviewCycleID": "1885515888",
      "pdf_file_size_bytes": 203891,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "t265_st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 2,
          "A.EMISSION": 1,
          "A.ISOLATE": 1,
          "A.MANAGE": 2,
          "A.NOEVIL": 2,
          "A.PHYSICAL": 2,
          "A.SCENARIO": 4
        },
        "O": {
          "O.CONF": 5,
          "O.CONNECT": 8,
          "O.INDICATE": 3,
          "O.INVOKE": 1,
          "O.NOPROG": 5,
          "O.ROM": 5,
          "O.SELECT": 3,
          "O.SWITCH": 9
        },
        "OE": {
          "OE.ACCESS": 2,
          "OE.EMISSION": 1,
          "OE.ISOLATE": 1,
          "OE.MANAGE": 5,
          "OE.NOEVIL": 5,
          "OE.PHYSICAL": 4,
          "OE.SCENARIO": 2
        },
        "T": {
          "T.BYPASS": 2,
          "T.INSTALL": 2,
          "T.LOGICAL": 3,
          "T.PHYSICAL": 2,
          "T.RESIDUAL": 2,
          "T.SPOOF": 2,
          "T.STATE": 2,
          "T.TRANSFER": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 3,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 4
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.2": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 5,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.3": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 11,
          "EAL4 augmented": 5
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FDP": {
          "FDP_ACC.1": 3,
          "FDP_ETC": 1,
          "FDP_ETC.1": 5,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 3,
          "FDP_IFC.1": 10,
          "FDP_IFC.1.1": 1,
          "FDP_IFF": 1,
          "FDP_IFF.1": 7,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ITC": 1,
          "FDP_ITC.1": 5,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 3,
          "FDP_ITC.1.3": 1,
          "FDP_MSA.1": 1
        },
        "FMT": {
          "FMT_MSA": 1,
          "FMT_MSA.1": 5,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 10,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 2,
          "FMT_SMF": 1,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 2,
          "FMT_SMR.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Ian Mearns",
      "/CreationDate": "D:20101206093805",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20101206093805",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "       ",
      "pdf_file_size_bytes": 580697,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/crp259.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ATE_DPT.2",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/t265_st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5f4b59e125498d73d8be1ec41775edea2f13f44ab2e61996641e1df22d891c16",
      "txt_hash": "8b11e482c88f97ffd5a04198d38e3419225edf8fce1c059c59922497e1d7580b"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "842c04aa6cdab4a566c602b2ff6f7f69403ec76d7f770ec4c62c1dfeae7387a8",
      "txt_hash": "68ed8a0bffe65cb23ce383a1128dde7d1ba5d2d21d7263bc91a9f35d000aa073"
    }
  },
  "status": "archived"
}