name |
ST19WR66I secure microcontroller |
DataOverwriteSecurity Unit Type H Software Version: 1.01x |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
FR |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
07.10.2013 |
not_valid_before |
07.11.2006 |
28.02.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2006_18en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0145_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2006_18en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0145_est.pdf |
manufacturer |
STMicroelectronics |
Ricoh Company, Ltd. |
manufacturer_web |
https://www.st.com/ |
https://www.ricoh.com/ |
security_level |
AVA_VLA.3, ADV_IMP.2, EAL5+, ALC_LCD.2, ADV_SPM.3, ACM_SCP.3, ALC_DVS.2, ALC_TAT.2 |
EAL3 |
dgst |
0da2756da6f67e80 |
663b9c1bde7447b3 |
heuristics/cert_id |
ANSSI-CC-2006/18 |
JISEC-CC-CRP-C0145 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_ENV.1, ALC_LCD.2, ASE_INT.1, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ATE_DPT.2, AGD_ADM.1, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, AVA_VLA.3, ADV_HLD.3, ASE_SRE.1, ASE_OBJ.1, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1, AVA_MSU.3 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
- |
1.01 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0422-2008 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0422-2008 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0145
- certification_date: 01.02.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0145_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; Ricoh imagio MP C6000 series Ricoh imagio MP C7500 series Ricoh Aficio MP C6000 series Ricoh Aficio MP C7500 series Savin C6055/C7570 series Lanier LD260c/275c series Lanier MP C6000/C7500 series Gestetner MP C6000/C7500 series Infotec MP C6000/C7500 series NRG MP C6000/C7500 series TOE security functions Same as above.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: imagio Security Card Type 7 Software (Japanese name) DataOverwriteSecurity Unit Type H Software (English name)
- product_type: IT Product (software to overwrite data)
- report_link: https://www.ipa.go.jp/en/security/c0145_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0145_est.pdf
- toe_version: 1.01x
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2009-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169_02.html'})]
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: imagio Security Card Type 7 Software 1.01x
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169.html
- toe_overseas_name: DataOverwriteSecurity Unit Type H Software 1.01x
|
heuristics/st_references/directly_referenced_by |
BSI-DSZ-CC-0422-2008 |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
BSI-DSZ-CC-0422-2008 |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
2006_18en.pdf |
c0145_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- AU:
- Certification Report 2006/18: 13
- FR:
- Certification Report 2006/18: 13
- Rapport de certification 2006/12: 1
|
- JP:
- CRP-C0145-01: 1
- Certification No. C0145: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL1: 1
- EAL3: 1
- EAL4: 2
- EAL5: 4
- EAL5+: 2
- EAL51: 1
- EAL7: 2
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.3: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.3: 1
- ADV_HLD: 1
- ADV_HLD.3: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 1
- ADV_RCR.2: 1
- ADV_SPM: 1
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.2: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.2: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 1
- AVA_CCA.1: 1
- AVA_MSU: 1
- AVA_MSU.3: 3
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.4: 3
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_SAA.1: 1
- FAU_SAS.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_COP.1: 1
- FCS_RDN.1: 1
- FDP:
- FDP_ACC.2: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FDP_ITT.1: 1
- FDP_RIP.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPR:
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.2: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FPT_TST.1: 1
- FRU:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- STMicroelectronics:
- STM: 10
- STMicroelectronics: 29
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- FIPS:
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: DCSSI
- /CreationDate: D:20061108090951+01'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: CER/F/07.3
- /ModDate: D:20061108091000+01'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: ST19WR66I secure microcontroller
- /Title: Certification Report 2006/18
- pdf_file_size_bytes: 657908
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 23
|
- /CreationDate: D:20080911170342+09'00'
- /ModDate: D:20080911170342+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 98465
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
cible2006_18en.pdf |
c0145_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0002-2001: 3
- BSI-PP-002-2001: 36
- BSI-PP-002-2001/PP/9806: 2
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 5
- EAL 5 augmented: 3
- EAL5: 12
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.3: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 1
- ADV_FSP.3: 1
- ADV_HLD.3: 1
- ADV_IMP.2: 1
- ADV_INT.1: 1
- ADV_LLD.1: 1
- ADV_RCR.2: 1
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_LCD.2: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA.1: 1
- AVA_MSU.3: 3
- AVA_SOF.1: 1
- AVA_VLA.4: 3
|
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 1
- AVA_VLA.1: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAA.1: 2
- FAU_SAS: 1
- FAU_SAS.1: 2
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.2: 1
- FCS_CKM.4: 2
- FCS_COP.1: 9
- FCS_RND: 1
- FCS_RND.1: 3
- FDP:
- FDP_ACC.2: 2
- FDP_ACF.1: 2
- FDP_IFC.1: 2
- FDP_IFF.1: 2
- FDP_ITC.1: 1
- FDP_ITT.1: 4
- FDP_RIP.1: 2
- FDP_SDI.1: 2
- FDP_SDI.2: 2
- FIA:
- FIA_ATD.1: 2
- FIA_UAU.2: 2
- FIA_UID.2: 2
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 4
- FMT_LIM.2: 3
- FMT_MOF.1: 4
- FMT_MSA.1: 5
- FMT_MSA.2: 2
- FMT_MSA.3: 5
- FMT_SMF.1: 2
- FMT_SMR.1: 2
- FPR:
- FPT:
- FPT_FLS.1: 4
- FPT_ITT.1: 3
- FPT_PHP.2: 2
- FPT_PHP.3: 2
- FPT_SEP.1: 2
- FPT_TST.1: 2
- FRU:
|
- FDP:
- FDP_RIP.1: 5
- FDP_SIP.1: 13
- FDP_SIP.1.1: 1
- FPT:
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.DEV_ORG: 1
- A.DLV_AUDIT: 1
- A.DLV_PROTECT: 1
- A.DLV_RESP: 1
- A.SOFT_ARCHI: 1
- A.USE_DIAG: 1
- A.USE_PROD: 1
- A.USE_SYS: 1
- A.USE_TEST: 1
- O:
- O.CLON: 1
- O.DESIGN_ACS: 1
- O.DEV_DIS: 1
- O.DEV_TOOLS: 1
- O.DIS_MECHANISM: 1
- O.DIS_MEMORY: 1
- O.DLV_AUDIT: 1
- O.DLV_PROTECT: 1
- O.DLV_RESP: 1
- O.DSOFT_ACS: 1
- O.FLAW: 1
- O.IC_DLV: 1
- O.MASK_FAB: 1
- O.MECH_ACS: 1
- O.MOD_MEMORY: 1
- O.OPERATE: 1
- O.RND: 1
- O.SOFT_ACS: 1
- O.SOFT_DLV: 1
- O.SOFT_MECH: 1
- O.TAMPER: 1
- O.TEST_OPERATE: 1
- O.TI_ACS: 1
- O.TOE_PRT: 1
- O.USE_DIAG: 1
- O.USE_SYS: 1
- T:
- T.CLON: 1
- T.DIS_DEL: 1
- T.DIS_DESIGN: 1
- T.DIS_DSOFT: 1
- T.DIS_INFO: 1
- T.DIS_PHOTOMASK: 1
- T.DIS_SOFT: 1
- T.DIS_TEST: 1
- T.DIS_TOOLS: 1
- T.MOD_DEL: 1
- T.MOD_DESIGN: 1
- T.MOD_DSOFT: 1
- T.MOD_PHOTOMASK: 1
- T.MOD_SOFT: 1
- T.RND: 2
- T.T_DEL: 1
- T.T_PHOTOMASK: 1
- T.T_PRODUCT: 1
- T.T_SAMPLE: 1
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- Philips:
- STMicroelectronics:
- STM: 28
- STMicroelectronics: 9
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 4
- Physical tampering: 2
- malfunction: 1
- physical tampering: 4
- SCA:
- DPA: 3
- Leak-Inherent: 6
- Physical Probing: 2
- SPA: 2
- physical probing: 2
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCIMB-2004-01-001: 2
- CCIMB-2004-01-002: 11
- CCIMB-2004-01-003: 2
- FIPS:
- FIPS PUB 186: 2
- FIPS PUB 197: 2
- ISO:
- ISO/IEC 10116:1997: 2
- ISO/IEC 9796-: 1
- ISO/IEC 9797:1994: 2
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- attack capability is needed for attacks such as bypassing or tampering TSF, but those are out of scope of this evaluation. That is to say, an analysis of apparent vulnerability (AVA_VLA.1) is sufficient: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Christiane DROULERS
- /CreationDate: D:20050119135501Z
- /Creator: FrameMaker 7.0
- /ModDate: D:20050927152131+02'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: ST_ST19WR66V1_2.fm
- pdf_file_size_bytes: 684412
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 61
|
- /CreationDate: D:20080820185804+09'00'
- /ModDate: D:20080820185804+09'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- pdf_file_size_bytes: 406573
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 30
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |