This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Standard et Basic sur composants Atmel ANSSI-CC-2010/26 |
IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2020/50 |
|
---|---|---|
name | Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Standard et Basic sur composants Atmel | IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 |
not_valid_before | 2010-05-20 | 2020-07-09 |
not_valid_after | 2019-09-01 | 2025-07-09 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-26en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_50en.pdf |
status | archived | active |
manufacturer | Oberthur Technologies / ATMEL Secure Microcontroller Solutions | Idemia |
manufacturer_web | https://www.oberthur.com/ | https://www.idemia.com |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-26fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_50fr.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_50fr.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}) | |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 7, 18), 'maintenance_title': 'Rapport de maintenance ANSSI-CC-2010/26-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2010-26-M01fr.pdf', 'maintenance_st_link': None}) | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 11, 17), 'maintenance_title': 'Reassessment report : ANSSI-CC-2019/33-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_33-s01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2019_33-s01.pdf'}) |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | cb60c2e9aea8759d145398365b3da7d2223c6f122895781e6811957ea2a73ac5 |
state/cert/txt_hash | None | c44103ecddb010487fa9510fdda5ed2cbd952c022d87ae38422376fcc9a20698 |
state/report/pdf_hash | 9ac239291263124dbf8c29f074be4b53f95dffc28effe79edec0ca9ae670fd35 | 310c778f77407662661dc58dd846709ec4aed8dffec6092bd1fc8a4c6779a10d |
state/report/txt_hash | 71f471588cf2df2fd3e8599f7c111c55c0ec320e4ccebc7f225218127c28c14c | 44646fbf756907f1f2228a737bdd6dd4d5e82b5bb8493878bae9e6a0d5b50fef |
state/st/pdf_hash | 26ca91cab157b1b501322d05e7ffe3eddd4483440b1bec3ae887434f84ff23f1 | 461267908ae9a30464af51c030edb4cc3c44ef6caa4c23ba67c1ce71fc692084 |
state/st/txt_hash | ebd882112948ec120c04c1e6f13708caf0118c3e3087b5b4182a43db51471544 | ea2968b94068c6ee936ba1da547b8e425e3401e76327575d78e2bee8f54bc60a |
heuristics/cert_id | ANSSI-CC-2010/26 | ANSSI-CC-2020/50 |
heuristics/cert_lab | THALES | CEA |
heuristics/extracted_versions | 1.01.1, 7.0 | 8.2, 1.3 |
heuristics/report_references/directly_referencing | ANSSI-CC-2009/46, ANSSI-CC-2009/36 | ANSSI-CC-2020/26, ANSSI-CC-2019/33, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2009/46, ANSSI-CC-2009/11, ANSSI-CC-2009/36 | ANSSI-CC-2019/33, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2020/26, ANSSI-CC-2017/49, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2019/28 |
heuristics/scheme_data |
|
|
heuristics/scheme_data/cert_id | 2010/26 | 2020/53 |
heuristics/scheme_data/description | Le produit certifié est l'applet, d'Oberthur Technologies, ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur la plateforme, d'Oberthur Technologies, Cosmo v7.0-a Standard et Basic sur composants Atmel Secure Microcontroller Solutions. La TOE (Target Of Evaluation - cible d'évaluation) est une carte à puce destinée à être utilisée dans le cadre de projets me | Le produit évalué est l’application « : IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2, Identification F0 02 02 13 » développée par Idemia et masquée sur le composant NXP P60D145 développé par NXP Semiconductors GmbH. Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v2 et d’un microcontrôleur sécurisés. Il est destiné à être ut |
heuristics/scheme_data/developer | Oberthur Technologies et Atmel Secure Microcontroller Solutions | Idemia, NXP Semiconductors GmbH |
heuristics/scheme_data/enhanced |
|
|
heuristics/scheme_data/enhanced/cc_version | Critères Communs version 3.1 | Critères Communs version 3.1r5 |
heuristics/scheme_data/enhanced/cert_id | 2010/26 | 2020/53 |
heuristics/scheme_data/enhanced/certification_date | 20/05/2010 | 09/07/2020 |
heuristics/scheme_data/enhanced/developer | Oberthur Technologies et Atmel Secure Microcontroller Solutions | Idemia, NXP Semiconductors GmbH |
heuristics/scheme_data/enhanced/evaluation_facility | CEACI (Thales Security Systems - CNES) | CEA-LETI |
heuristics/scheme_data/enhanced/level | EAL4+ | EAL5+ |
heuristics/scheme_data/enhanced/protection_profile | BSI-PP-0005-2002, BSI-PP-0006-2002 | PP for secure signature creation device (Part 2, 3, 4) |
heuristics/scheme_data/enhanced/report_link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2010-26fr.pdf | https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cc-2020_53fr.pdf |
heuristics/scheme_data/enhanced/sponsor | Oberthur Technologies | Idemia, NXP Semiconductors GmbH |
heuristics/scheme_data/enhanced/target_link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2010-26en.pdf | https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cible-cc-2020_53en.pdf |
heuristics/scheme_data/level | EAL4+ | EAL5+ |
heuristics/scheme_data/product | Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Standard et Basic sur composants Atmel | IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 |
heuristics/scheme_data/sponsor | Oberthur Technologies | Idemia, NXP Semiconductors GmbH |
heuristics/scheme_data/url | https://cyber.gouv.fr/produits-certifies/applet-id-one-classic-v1011-en-configuration-cns-classic-ou-cie-masquee-sur-0 | https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-version-13-en-configuration-4-sur-la-plateforme-id-one-cosmo-v82-0 |
heuristics/st_references/directly_referencing | ANSSI-CC-2009/46 | ANSSI-CC-2020/26 |
heuristics/st_references/indirectly_referencing | ANSSI-CC-2009/46, BSI-DSZ-CC-0421-2008, ANSSI-CC-2009/11 | ANSSI-CC-2020/26 |
pdf_data/cert_filename | None | certificat-2020_50fr.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | ANSSI-CC_2010-26fr.pdf | anssi-cc-2020_50fr.pdf |
pdf_data/report_frontpage/FR/cc_security_level | EAL 4 augmenté ALC_DVS.2, AVA_VAN.5 | EAL 5 augmenté ALC_DVS.2, AVA_VAN.5 |
pdf_data/report_frontpage/FR/cc_version | Critères Communs version 3.1 | Critères Communs version 3.1 révision 5 |
pdf_data/report_frontpage/FR/cert_id | ANSSI-CC-2010/26 | ANSSI-CC-2020/50 |
pdf_data/report_frontpage/FR/cert_item | Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE masquée sur Cosmo v7.0-a Standard et Basic sur composants Atmel | IAS ECC v2, version 1.3 in configuration #1 on ID-One Cosmo v8.2 open platform |
pdf_data/report_frontpage/FR/cert_item_version | Version 1.01.1 | Identification de l’applet : F0 02 02 13 Identification du matériel de la plateforme : 09 11 21 Identification du patch : 09 42 22 |
pdf_data/report_frontpage/FR/cert_lab | THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected] | CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France |
pdf_data/report_frontpage/FR/developer | Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France Atmel Secure Microcontroller Solutions1 Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni Commanditaire Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France | Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France NXP Semiconductors GmbH Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France |
pdf_data/report_frontpage/FR/ref_protection_profiles | BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05 | Protection profiles for secure signature creation device : Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013 |
pdf_data/report_keywords/asymmetric_crypto | |
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE | 1 | 3 |
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE | 1 | 5 |
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 2 | 3 |
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN | 1 | 2 |
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 4 | 5 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 1 | 3 |
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/standard_id/CC |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 1 |
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//CreationDate | D:20100525132900+02'00' | D:20200713152056+02'00' |
pdf_data/report_metadata//ModDate | D:20100525132900+02'00' | D:20200713152056+02'00' |
pdf_data/report_metadata//Producer | Acrobat Distiller 8.0.0 (Windows) | Acrobat Distiller 11.0 (Windows) |
pdf_data/report_metadata/pdf_file_size_bytes | 195087 | 144915 |
pdf_data/report_metadata/pdf_number_of_pages | 19 | 18 |
pdf_data/st_filename | ANSSI-CC-cible_2010-26en.pdf | anssi-cible-cc-2020_50en.pdf |
pdf_data/st_keywords/asymmetric_crypto | |
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_cert_id/FR |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_claims/A |
|
|
pdf_data/st_keywords/cc_claims/A/A.CGA | 6 | 4 |
pdf_data/st_keywords/cc_claims/A/A.SCA | 5 | 3 |
pdf_data/st_keywords/cc_claims/OE |
|
|
pdf_data/st_keywords/cc_claims/OE/OE.VERIFICATION | 1 | 4 |
pdf_data/st_keywords/cc_claims/OSP |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 6 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.3 | 10 | 2 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 | 6 | 2 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 8 | 7 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 11 | 8 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL4 | 10 | 1 |
pdf_data/st_keywords/cc_security_level/EAL/EAL4 augmented | 3 | 1 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 1 | 6 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 1 | 2 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 43 | 34 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 10 | 41 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 1 | 8 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 23 | 60 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 69 | 104 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 7 | 38 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC | 99 | 70 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 37 | 40 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF | 85 | 49 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 47 | 36 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ETC | 8 | 5 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 14 | 22 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC | 54 | 21 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 21 | 42 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 9 | 35 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 | 11 | 10 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 | 1 | 3 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI | 19 | 15 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 4 | 6 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT | 9 | 7 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT | 19 | 5 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 | 4 | 2 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL | 13 | 22 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 | 11 | 3 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 | 14 | 16 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 | 15 | 17 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 | 10 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA | 47 | 30 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 13 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 34 | 30 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 | 9 | 6 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 30 | 44 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 28 | 42 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 | 1 | 9 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 8 | 10 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 | 8 | 5 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 10 | 7 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 | 9 | 13 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC | 36 | 31 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 14 | 16 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 6 | 4 |
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC | 3 | 10 |
pdf_data/st_keywords/crypto_scheme/MAC/MAC | 10 | 8 |
pdf_data/st_keywords/hash_function | |
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/randomness | |
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering | 4 | 5 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 | 2 | 3 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 1 | 10 |
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vendor/Oberthur/Oberthur Technologies | 162 | 1 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//CreationDate | D:20100525132820+02'00' | D:20200421132115+05'30' |
pdf_data/st_metadata//Keywords | Quality | |
pdf_data/st_metadata//ModDate | D:20100525132820+02'00' | D:20200421211611+05'30' |
pdf_data/st_metadata//Producer | AFPL Ghostscript 8.50 | Microsoft® Word 2016 |
pdf_data/st_metadata/pdf_file_size_bytes | 954799 | 2888609 |
pdf_data/st_metadata/pdf_hyperlinks | ftp://ftp.itc.1/SVD, ftp://ftp.itc.1/SCD | |
pdf_data/st_metadata/pdf_number_of_pages | 80 | 93 |
dgst | 1f6c7d374ff17ce4 | 827c72610e519994 |