Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.20 AR-FR5: version E.20
JISEC-CC-CRP-C0018
ECC CPU card (Version 1.2)
CRP277
name Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.20 AR-FR5: version E.20 ECC CPU card (Version 1.2)
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP UK
not_valid_after 07.01.2013 19.10.2019
not_valid_before 17.09.2004 19.10.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0018_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP277.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0018_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST277.pdf
manufacturer Sharp Corporation Gemalto
manufacturer_web https://sharp-world.com/ https://www.gemalto.com/
security_level EAL4 EAL4+, ALC_DVS.2, AVA_VAN.5
dgst 03749c220b32bdce 00c1aeb0ae6b7195
heuristics/cert_id JISEC-CC-CRP-C0018 CRP277
heuristics/extracted_sars ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, AGD_FSP.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1
heuristics/extracted_versions 20 1.2
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0018
  • certification_date: 01.09.2004
  • claim: EAL4
  • enhanced:
    • assurance_level: EAL4
    • cert_link: https://www.ipa.go.jp/en/security/c0018_eimg.pdf
    • description: PRODUCT DESCRIPTION The TOE is a firmware intended to reduce the danger against the disclosure of document data and image data that are temporarily spooled in the Multi-Function Device (hereafter referred to as “MFD”). TOE is offered as an upgraded kit for firmware of the MFD. The TOE provides security function to counter the threat against document data and image data that are temporarily spooled in the Mass Storage Device ( hereafter referred to as MSD) which is defined for each configuration of the functional unit in M FD. When MFD executes basic function as copy, print, Fax or image scanning, MFD executes data encryption before spooling document image data in MSD. Moreover MFD erases image data in MSD automatically after finishing copy, print, Fax or image scanning jobs or at the time of power-on. As a result, MFD keeps high confidentiality of the document/ image data in MSD, and it opposes fraudulent disclosure.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Data Security Kit AR-FR4, Data Security Kit AR-FR5
    • product_type: IT product (Data protection function inside digital MFD)
    • protection_profile: N/A
    • report_link: https://www.ipa.go.jp/en/security/c0018_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0018_est.pdf
    • toe_version: AR-FR4: version M.20 AR-FR5: version E.20
    • vendor: Sharp Corporation
  • expiration_date: 01.03.2013
  • revalidations: [frozendict({'date': '2005-03', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0018_it4026_01.html'})]
  • supplier: Sharp Corporation
  • toe_japan_name: Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.20 AR-FR5: version E.20
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0018_it4026.html
  • toe_overseas_name: Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.21 AR-FR5: version E.21
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0883-2013
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0883-2013
pdf_data/report_filename c0018_erpt.pdf CRP277.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0018-01: 1
    • Certification No. C0018: 1
  • DE:
    • BSI-DSZ-CC-0883: 1
  • UK:
    • CRP277: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 3
  • EAL:
    • EAL1: 1
    • EAL4: 5
    • EAL4 augmented: 2
    • EAL7: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 2
  • ALC:
    • ALC_DVS.2: 5
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.OFFICE: 1
    • A.PROCEDURE: 1
  • T:
    • T.ALTER: 1
    • T.RECOVER: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 11
  • Infineon:
    • Infineon Technologies: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 28
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20050214150436+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /Manager: IPA
  • /ModDate: D:20050214150557+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /SourceModified: D:20050214053206
  • /Title: CRP-e
  • pdf_file_size_bytes: 260158
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename c0018_est.pdf ST277.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0883: 4
    • BSI-DSZ-CC-0883-: 1
    • BSI-DSZ-CC-0883-2013: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 14
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 3
    • EAL4+: 2
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 4
    • ACM_CAP.3: 6
    • ACM_CAP.4: 3
    • ACM_SCP.1: 2
    • ACM_SCP.2: 4
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 6
  • ADV:
    • ADV_FSP.1: 19
    • ADV_FSP.2: 4
    • ADV_HLD.1: 1
    • ADV_HLD.2: 7
    • ADV_IMP.1: 7
    • ADV_LLD.1: 6
    • ADV_RCR.1: 12
    • ADV_SPM.1: 4
  • AGD:
    • AGD_ADM.1: 11
    • AGD_FSP.1: 1
    • AGD_USR.1: 10
  • ALC:
    • ALC_DVS.1: 6
    • ALC_LCD.1: 4
    • ALC_TAT.1: 6
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.1: 3
    • ATE_FUN.1: 9
    • ATE_IND.2: 4
  • AVA:
    • AVA_MSU.2: 4
    • AVA_SOF.1: 4
    • AVA_VLA.2: 4
  • ADV:
    • ADV_ARC.1: 8
    • ADV_COMP.1: 2
    • ADV_FSP.1: 5
    • ADV_FSP.2: 4
    • ADV_FSP.4: 11
    • ADV_IMP: 1
    • ADV_IMP.1: 5
    • ADV_TDS.1: 3
    • ADV_TDS.2: 1
    • ADV_TDS.3: 11
  • AGD:
    • AGD_OPE.1: 8
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.1: 2
    • ALC_CMS.4: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_LCD.1: 5
    • ALC_TAT.1: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV.1: 4
    • ATE_COV.2: 4
    • ATE_DPT.1: 2
    • ATE_FUN.1: 8
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 27
    • FCS_CKM.4: 20
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 20
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_SOS.1: 9
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 4
  • FMT:
    • FMT_MOF.1: 23
    • FMT_MOF.1.1: 1
    • FMT_MSA.2: 13
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FAU:
    • FAU_ARP.1: 11
    • FAU_ARP.1.1: 2
    • FAU_GEN: 1
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_SAA: 1
    • FAU_SAA.1: 13
    • FAU_SAA.1.1: 3
    • FAU_SAA.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 3
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAS.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.1: 3
    • FCO_NRO.2: 2
    • FCO_NRO.2.2: 3
    • FCO_NRO.2.3: 3
  • FCS:
    • FCS_CKM: 13
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 2
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 2
    • FCS_COP: 13
    • FCS_COP.1: 16
    • FCS_COP.1.1: 2
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 31
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 1
    • FDP_ACC.2: 9
    • FDP_ACC.2.2: 1
    • FDP_ACF: 11
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 12
    • FDP_IFC.1: 19
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 3
    • FDP_IFCC: 1
    • FDP_IFF: 5
    • FDP_IFF.1: 14
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 6
    • FDP_ITC.1: 8
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 4
    • FDP_ITT.1: 1
    • FDP_RIP: 10
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_ROL: 8
    • FDP_ROL.1: 4
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_SDI.1: 4
    • FDP_SDI.2: 6
    • FDP_SDI.2.2: 2
    • FDP_UCT: 1
    • FDP_UCT.1: 5
    • FDP_UCT.1.1: 2
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 2
    • FDP_UIT.1.2: 2
    • FDP_UTC.1: 1
  • FIA:
    • FIA_ATD: 5
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.2: 6
    • FIA_SOS.2.1: 2
    • FIA_SOS.2.2: 2
    • FIA_UAU: 23
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 2
    • FIA_UAU.3.1: 2
    • FIA_UAU.3.2: 2
    • FIA_UAU.4: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 2
    • FIA_UAU.6.1: 1
    • FIA_UID: 4
    • FIA_UID.1: 21
    • FIA_UID.2: 1
    • FIA_USB: 4
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM.1: 2
    • FMT_LIM.2: 2
    • FMT_MOF.1: 5
    • FMT_MSA: 38
    • FMT_MSA.1: 13
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 1
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 2
    • FMT_SMF: 4
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 2
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 2
    • FPT_ITC: 1
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 2
    • FPT_ITI: 1
    • FPT_ITI.1: 8
    • FPT_ITI.1.1: 2
    • FPT_ITI.1.2: 2
    • FPT_ITT.1: 1
    • FPT_PHP: 2
    • FPT_PHP.1: 2
    • FPT_PHP.2: 4
    • FPT_PHP.2.2: 2
    • FPT_PHP.2.3: 2
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 2
    • FPT_RCV.4: 7
    • FPT_RCV.4.1: 2
    • FPT_RPL: 1
    • FPT_RPL.1: 5
    • FPT_RPL.1.1: 2
    • FPT_RPL.1.2: 2
    • FPT_STM.1: 5
    • FPT_TDC: 3
    • FPT_TDC.1: 3
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC.1: 9
    • FTP_TRP.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.OFFICE: 2
    • A.PROCEDURE: 1
  • O:
    • O.AUTHEN: 5
    • O.AUTHENTICATION: 1
    • O.REMOVE: 4
    • O.RESIDUAL: 6
  • OE:
    • OE.OPERATE: 1
    • OE.SECURE: 2
  • T:
    • T.ALTER: 3
    • T.RECOVER: 5
  • A:
    • A.PHYSICAL: 4
    • A.PROTECTION_AFTER_TOE_DE: 1
    • A.PROTECTION_AFTER_TOE_DELIVERY: 3
  • D:
    • D.COUNTERS: 6
    • D.EM: 13
    • D.EP_CODE: 5
    • D.EP_IVDATA: 3
    • D.EP_IV_DATA: 1
    • D.EP_STATE: 5
    • D.KEYS: 9
    • D.LOG_DATA: 4
  • O:
    • O.AUTH: 13
    • O.CONFID_DATA: 1
    • O.CONF_DATA: 12
    • O.EM: 6
    • O.INTEG_DATA: 7
    • O.JAVAOBJECT: 10
    • O.MEM_ACCE: 1
    • O.OPERATE: 17
    • O.RECORD: 5
    • O.REPLAY: 7
    • O.RND: 1
    • O.TAMPER: 16
  • OE:
    • OE.DEBIT_BEFORE_CREDIT: 3
    • OE.PHYSICAL: 3
    • OE.PROTECTION_AFTER_TOE_DELIVERY: 3
    • OE.PURSE_BEHAVIOR: 3
    • OE.SECRET_MNGT: 3
  • OP:
    • OP.ARRAY_ACCESS: 2
    • OP.CREATE: 4
    • OP.INSTANCE_FIELD: 1
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 2
    • OP.JAVA: 3
    • OP.PUT: 3
    • OP.THROW: 2
    • OP.TYPE_ACCESS: 2
  • OSP:
    • OSP.DEBIT_BEFORE_CREDIT: 3
    • OSP.PURSE_BEHAVIOR: 4
    • OSP.SECRET_MNGT: 4
  • R:
    • R.JAVA: 5
  • T:
    • T.COUNTERFEITING: 2
    • T.COUNTERFEITING_AUTH: 2
    • T.COUNTERFEITING_AUTOLOAD: 6
    • T.COUNTERFEITING_CREDIT: 2
    • T.COUNTERFEITING_DEBIT: 6
    • T.COUNTERFEITING_UPDATE: 4
    • T.DISCLOSURE_KEYS: 10
    • T.INTEG: 4
    • T.INTEG_: 1
    • T.INTEG_CODE: 6
    • T.INTEG_COUNTERS: 6
    • T.INTEG_EM: 6
    • T.INTEG_EP_IVDATA: 2
    • T.INTEG_EP_STATE: 6
    • T.INTEG_IVDATA: 1
    • T.INTEG_KEYS: 3
    • T.INTEG_LOG_DATA: 3
    • T.REPLAY: 2
    • T.REPLAY_AUTOLOAD: 4
    • T.REPLAY_CREDIT: 3
    • T.REPLAY_DEBIT: 4
    • T.REPLAY_UPDATE: 3
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 21
  • Infineon:
    • Infineon: 11
    • Infineon Technologies: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
    • Rijndael:
      • Rijndael: 3
  • AES_competition:
    • AES:
      • AES: 23
  • DES:
    • 3DES:
      • 3DES: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 244
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 12
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 3
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 4
    • Physical tampering: 1
    • malfunction: 3
    • physical tampering: 13
  • SCA:
    • Leak-Inherent: 3
    • Physical Probing: 2
    • Side channel: 1
    • physical probing: 3
  • other:
    • JIL: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-033: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • RFC:
    • RFC3447: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 2
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Crypto libs) written in native language, The IC M7794 The elements out of scope of the TOE are: Other application(s: 1
    • libraries itself) (Crypto libs) written in native language, The IC M7794 The elements out of scope of the TOE are: Other application(s) written in java language 2.3.2 Logical scope of the TOE The: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: A.Iwasaki
  • /Company: Pigs, Inc.
  • /CreationDate: D:20050214174331+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /ModDate: D:20050214175221+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /SourceModified: D:20050214052924
  • /Subject: デジタル複合機データセキュリティキット
  • /Title: セキュリティターゲット
  • /_AdHocReviewCycleID: -4335251
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Yamanaka Toshihiro/副参事
  • /_EmailSubject: NIAPへの認証製品掲載の件
  • pdf_file_size_bytes: 552988
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
  • /Author: C. Teri
  • /CreationDate: D:20140930094956+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20141110132727Z
  • /Producer: Microsoft® Office Word 2007
  • /Title: Security Target ECC CPU card
  • pdf_file_size_bytes: 1345514
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 104
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different