Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Remote Communication Gate A Version: Machine Code (First 4 characters): D459, Firmware Version: A2.06-C2.04-P2.01-K2.02
JISEC-CC-CRP-C0283
VoiceIdent Unit 1.0
BSI-DSZ-CC-0359-2007
name Remote Communication Gate A Version: Machine Code (First 4 characters): D459, Firmware Version: A2.06-C2.04-P2.01-K2.02 VoiceIdent Unit 1.0
category Network and Network-Related Devices and Systems Access Control Devices and Systems
scheme JP DE
not_valid_after 03.03.2016 01.09.2019
not_valid_before 25.02.2011 10.01.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0283_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0359a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0283_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0359b.pdf
manufacturer Ricoh Company, Ltd. Deutsche Telekom AG / T-COM
manufacturer_web https://www.ricoh.com/ https://www.t-online.de/
security_level EAL3 ADV_SPM.1, EAL2+
dgst 172c0a4dc5fcb821 44ac63b485b1d9d0
heuristics/cert_id JISEC-CC-CRP-C0283 BSI-DSZ-CC-0359-2007
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ATE_FUN.1, ADV_RCR.1, ASE_INT.1, ASE_ENV.1, ATE_IND.2, AGD_AGD.1, AGD_USR.1, ASE_REQ.1, ASE_SRE.1, AVA_VLA.1, ASE_PPC.1, ASE_DES.1, ADV_HLD.1, AGD_ADM.1, ATE_COV.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ADV_SPM.1, ADV_FSP.1
heuristics/extracted_versions 2.01, 2.04, 2.06, 2.02 1.0
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0469-2008
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0469-2008
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0283
  • certification_date: 01.02.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0283_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a communication device that enables digital MFPs and printers (hereafter "devices") to be connected to the communication server (hereafter "CS") in the maintenance center. Functions this TOE can provide include notification of device troubles (service call function), automatic counter checking of prints (device counter collection function), automatic ordering of supplies such as toner (supply call function), and device firmware updating. It also provides Web-based user interface functions for TOE operations. TOE security functionality The major security functions this TOE can provide are as follows: - Communication data protection function between the TOE and the device for the service This function is used for communication between the TOE and devices for the service if the service call function, the device counter collection function, and the supply call function are enabled. The communication data between the TOE and the Ricoh device will be secured, and the data tampering will be detected by using a SSL protocol. - Communication data protection function between the TOE and the CS The TOE specifies only the genuine CS as the communication destination via Internet. The communication data between the TOE and the CS will be secured, and the data tampering will be detected by using a SSL protocol. - Communication data protection function between the TOE and computers This function is applied to data communication between the TOE and computers if Web-based functions are enabled. The communication data will be secured by using a SSL protocol. - User identification and authentication function The TOE identifies and authenticates users who access Web-based user interface functions. - Access control function This function restricts user access according to specified user roles. - RC Gate firmware verification function This function enables the TOE to check that the firmware (applications, shared parts of firmware, platforms, and the operating system) is genuine. - Security management function This function provides TOE management methods for the Administrator only. - Audit logging function This function enables the TOE to record the information related to security relevant events and allows only the administrator to review the audit logging.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Remote Communication Gate A
    • product_type: Appliance for remote service
    • report_link: https://www.ipa.go.jp/en/security/c0283_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0283_est.pdf
    • toe_version: Machine Code (First 4 characters) : D459 Firmware Version : A2.06-C2.04-P2.01-K2.02
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.03.2016
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: Remote Communication Gate A Machine Code (First 4 characters) : D459 Firmware Version : A2.06-C2.04-P2.01-K2.02
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0283_it0306.html
  • toe_overseas_name: Remote Communication Gate A Machine Code (First 4 characters) : D459 Firmware Version : A2.06-C2.04-P2.01-K2.02
pdf_data/report_filename c0283_erpt.pdf 0359a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0359-2007
    • cert_item: VoiceIdent Unit 1.0
    • cert_lab: BSI
    • developer: Deutsche Telekom AG / T-COM
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0283-01: 1
    • Certification No. C0283: 1
  • DE:
    • BSI-DSZ-CC-0359-2007: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0016-2005: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 1
    • EAL 2: 6
    • EAL 2 augmented: 4
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 5
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_CAP.2: 1
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.1: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.1: 1
    • ADV_HLD: 2
    • ADV_HLD.1: 1
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 5
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.1: 1
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_SOF.1: 1
    • AVA_VLA: 3
    • AVA_VLA.1: 1
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAA.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_RIP.2: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_ATD.1: 1
    • FIA_UAU.2: 1
    • FIA_UAU.3: 1
    • FIA_UAU.5: 1
    • FIA_UAU.7: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_MTD.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_RPL.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINSHIP: 1
    • A.CE: 1
    • A.DEVICE: 1
    • A.NETWORK: 1
    • A.TOE_ADMIN: 1
  • T:
    • T.ACCESS: 2
    • T.FAKE_CS: 2
    • T.INTERNET: 2
  • A:
    • A.ADMINISTRATION: 2
    • A.CAPTURE: 2
    • A.ENROLMENT: 2
    • A.ENVIRONMENT: 2
    • A.FALLBACK: 2
    • A.PHYSICAL: 2
  • OSP:
    • OSP.FAR: 1
    • OSP.USERLIMIT: 1
  • T:
    • T.BRUTEFORCE: 1
    • T.MODIFY_ASSETS: 1
    • T.REPRODUCE: 1
    • T.RESIDUAL: 1
    • T.ROLES: 1
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 26
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • BSI:
    • AIS 34: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Unit 1.0, Deutsche Telekom AG / T-COM [8] Evaluation Technical Report, Version 1.2, 06.12.2006 (confidential document) [9] Protection Profile BSI-PP-0016-2005, Version 1.04, 17.08.2005, Protection Profile for: 1
  • OutOfScope:
    • Identification is not addressed within the evaluation. Furthermore the enrolment process is out of scope of the evaluation and it is assumed that all authorized users have been enrolled. VoiceIdent Unit 1: 1
    • identification is not addressed within the evaluation. Furthermore the enrolment process is out of scope and it is assumed that all authorized users have been enrolled. For correct operation the TOE needs: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110426174640+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110426174731+09'00'
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 794086
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20070123132827+01'00'
  • /Creator: Acrobat PDFMaker 7.0.7 für Word
  • /Keywords: Common Criteria, Certification, Zertifizierung
  • /ModDate: D:20070124074711+01'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20070123122805
  • /Title: Certification Report BSI-DSZ-CC-xxxx-200x
  • pdf_file_size_bytes: 328042
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename c0283_est.pdf 0359b.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0359: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0016: 2
    • BSI-PP-0016: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 7
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL1: 1
    • EAL2: 20
    • EAL2 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_CAP.2: 14
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP.1: 19
    • ADV_HLD: 2
    • ADV_HLD.1: 15
    • ADV_RCR.1: 8
    • ADV_SPM: 1
    • ADV_SPM.1: 32
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 15
    • AGD_AGD.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 13
  • ATE:
    • ATE_COV.1: 6
    • ATE_FUN: 2
    • ATE_FUN.1: 13
    • ATE_IND: 2
    • ATE_IND.2: 9
  • AVA:
    • AVA_SOF: 2
    • AVA_SOF.1: 9
    • AVA_VLA: 2
    • AVA_VLA.1: 11
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.3: 5
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 16
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
  • FAU:
    • FAU_ARP: 2
    • FAU_ARP.1: 10
    • FAU_GEN: 2
    • FAU_GEN.1: 12
    • FAU_GEN.2: 9
    • FAU_SAA: 2
    • FAU_SAA.1: 10
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ICF.1: 2
    • FDP_IFC.1: 2
    • FDP_RIP: 2
    • FDP_RIP.1: 1
    • FDP_RIP.2: 8
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 11
    • FIA_ATD: 2
    • FIA_ATD.1: 10
    • FIA_UAU: 5
    • FIA_UAU.1: 3
    • FIA_UAU.2: 8
    • FIA_UAU.3: 12
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 7
    • FIA_UID: 2
    • FIA_UID.1: 8
    • FIA_UID.2: 8
  • FMT:
    • FMT_MOF: 13
    • FMT_MOF.1: 6
    • FMT_MSA: 2
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 3
    • FMT_MTD.1: 11
    • FMT_MTD.3: 9
    • FMT_SMF: 2
    • FMT_SMF.1: 17
    • FMT_SMR: 2
    • FMT_SMR.1: 17
  • FPT:
    • FPT_RPL: 2
    • FPT_RPL.1: 13
    • FPT_STM.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINSHIP: 3
    • A.CE: 3
    • A.DEVICE: 3
    • A.NETWORK: 3
    • A.TOE_ADMIN: 3
  • O:
    • O.ACCESS: 9
    • O.AUDIT_LOGGED: 6
    • O.COM_ATR_DEVICE: 10
    • O.COM_CS: 8
    • O.COM_OPERATOR: 7
    • O.GENUINE: 7
  • OE:
    • OE.ADMIN: 3
    • OE.CE: 3
    • OE.DEVICE: 3
    • OE.NETWORK: 4
    • OE.SUPER: 4
  • T:
    • T.ACCESS: 2
    • T.FAKE_CS: 2
    • T.INTERNET: 2
  • A:
    • A.ADMINISTRATION: 4
    • A.CAPTURE: 3
    • A.ENROLMENT: 4
    • A.ENVIRONMENT: 4
    • A.FALLBACK: 4
    • A.PHYSICAL: 5
  • O:
    • O.AUDIT_REACTION: 17
    • O.AUTHADMIN: 7
    • O.BIO_VERIFCATION: 1
    • O.BIO_VERIFICATION: 10
    • O.NO_REPRODUCE: 4
    • O.RESIDUAL: 8
    • O.RESIDUAL_CAPTURE: 8
    • O.ROLES_AND_ACCESS: 7
  • OE:
    • OE.ADMINISTRATION: 7
    • OE.CAPTURE: 3
    • OE.ENROLMENT: 7
    • OE.ENVIRONMENT: 6
    • OE.FALLBACK: 4
    • OE.PHYSICAL: 7
  • OSP:
    • OSP.FAR: 7
    • OSP.USERLIMIT: 4
  • R:
    • R.ADMINISTRATION: 2
    • R.CAPTURE: 2
    • R.ENROLMENT: 3
    • R.ENVIRONMENT: 4
    • R.FALLBACK: 3
    • R.NO_REPRODUCE: 2
    • R.PHYSICAL: 3
    • R.RESIDUAL_CAPTURE: 2
  • T:
    • T.BRUTEFORCE: 5
    • T.MODIFY_ASSETS: 6
    • T.REPRODUCE: 5
    • T.RESIDUAL: 9
    • T.ROLES: 7
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 7
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • CC:
    • CCIMB-2005-08-004: 1
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Biometric Identification is not addressed within this ST. Furthermore the enrolment process is out of scope of this ST and it is assumed that all authorized users have been enrolled. Last but not least a: 1
    • higher error rates of those systems are only two of them. The biometric identification process is out of scope of this ST. Please see [BEM] or [BPT] for further explanations. 3.2 Wording in context of Common: 1
    • out of scope: 3
    • service and needs to have provided a voice sample at that time. However, this enrolment process is out of scope of this ST in accordance with the Protection Profile [PP-BSI-BV]. The following can be seen from: 1
pdf_data/st_metadata
  • /Author: team RC Gate
  • /Company: 株式会社リコー
  • /CreationDate: D:20110425171517+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /ModDate: D:20110425171632+09'00'
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /Title: Security Target for RC Gate
  • pdf_file_size_bytes: 499016
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 51
  • /Author: Heiko-Armin Schönebeck
  • /CreationDate: D:20061229120000+01'00'
  • /Creator: PDFCreator Version 0.9.3
  • /Keywords: T-Com VoiceIdent Sprecherverifizierung BSI Zertifizierung Common Criteria
  • /ModDate: D:20061229120000<FEFF0054002D0043006F006D00200056006F006900630065004900640065006E0074002000530070007200650063006800650072007600650072006900660069007A0069006500720075006E006700200042005300490020005A006500720074006900660069007A0069006500720075006E006700200043006F006D006D006F006E002000430072006900740065007200690061>
  • /Producer: GPL Ghostscript 8.54
  • /Subject: T-Com VoiceIdent
  • /Title: ST_VoiceIdent_1_7_for_publication
  • pdf_file_size_bytes: 624574
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 89
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different