Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TOSHIBA e-STUDIO6526AC/6527AC/7527AC with FAX Unit Ver.SYS V5.1
JISEC-CC-CRP-C0812-01-2024
NXP JCOP 4.x on P73N2M0B0.2C2/2C6 Secure Element
NSCIB-CC-156530-CR4
name TOSHIBA e-STUDIO6526AC/6527AC/7527AC with FAX Unit Ver.SYS V5.1 NXP JCOP 4.x on P73N2M0B0.2C2/2C6 Secure Element
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP NL
not_valid_after 24.06.2029 02.12.2027
not_valid_before 24.06.2024 02.12.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0812_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-22-156530-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0812_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-156530-CR4-1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0812_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-156530-STLite_v4.2.pdf
manufacturer Toshiba TEC Corporation NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity
manufacturer_web https://www.toshibatec.co.jp/en/ https://www.nxp.com
security_level {} ALC_FLR.1, EAL5+, AVA_VAN.5, ASE_TSS.2, ALC_DVS.2
dgst 233cafd485b869c5 e035fc31aed0d5e0
heuristics/cert_id JISEC-CC-CRP-C0812-01-2024 NSCIB-CC-156530-CR4
heuristics/cert_lab []
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ALC_FLR.1, AVA_VAN.5, ALC_DVS.2, AGD_OPE.1, ASE_TSS.2
heuristics/extracted_versions 5.1 0.2
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0746
  • certification_date: 01.06.2022
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0746
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000faf-att/c0746_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan and fax. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Data Encryption Trusted Communication Function TSF Data Protection TSF Self Protection Software Update Verification Audit Function Function which separate PSTN Fax and Network
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: TOSHIBA e-STUDIO2515AC/3015AC/3515AC/4515AC/ 5015AC all of the above with FAX Unit and FIPS Hard Disk Kit
    • product_type: Multifunction Product
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • toe_version: SYS V2.0
    • vendor: TOSHIBA TEC CORPORATION
  • expiration_date:
  • supplier: TOSHIBA TEC CORPORATION
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0746_it1798.html
  • toe_overseas_name: TOSHIBA e-STUDIO2515AC / 3015AC / 3515AC / 4515AC / 5015AC all of the above with FAX Unit and FIPS Hard Disk KitSYS V2.0
heuristics/protection_profiles b2cfec7a92fa2940 7f886b64878b68c1
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf
pdf_data/cert_filename c0812_eimg.pdf NSCIB-CC-22-156530-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0812-01-2024: 1
  • NL:
    • CC-22-156530: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.1: 1
    • ALC_FLR.3: 2
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 1
    • NXP Semiconductors: 1
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/os_name
  • JCOP:
    • JCOP 4: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Information-technology Promotion Agency, Japan
  • /CreationDate: D:20241119110038+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 20
  • /Keywords:
  • /ModDate: D:20241119110439+09'00'
  • /Producer: Adobe PDF Library 20.5.172
  • /Subject:
  • /Title: C0812_Certificate_01
  • pdf_file_size_bytes: 355848
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /Author: kruitr
  • /CreationDate: D:20230104120751+01'00'
  • /Creator: Bullzip PDF Printer (11.0.0.2588)
  • /ModDate: D:20230104120849+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-22-156530-Cert.doc
  • pdf_file_size_bytes: 247139
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0812_erpt.pdf NSCIB-CC-156530-CR4-1.0.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-156530-CR4
    • cert_item: NXP JCOP 4.x on P73N2M0B0.2C2/2C6 Secure Element
    • cert_lab: SGS Brightsight B.V.
    • developer: NXP Semiconductors NV
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0812-01-2024: 1
  • FR:
    • ANSSI-CC-2018/52-S03: 1
    • ANSSI-CC-2019/62-S02: 1
  • NL:
    • NSCIB-CC-156530-CR4: 14
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL4: 1
    • EAL5: 1
    • EAL5+: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR.1: 2
  • ASE:
    • ASE_TSS.2: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_DSK_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 9
    • D.USER: 5
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • NXP:
    • NXP: 18
    • NXP Semiconductors: 3
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
  • BrightSight:
    • Brightsight: 5
  • SGS:
    • SGS: 5
    • SGS Brightsight: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • 3DES: 5
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CBC-MAC: 3
      • CMAC: 2
      • HMAC: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 4
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 3
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 6
      • TLS 1.2: 4
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 1
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 1
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 1.0.8: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 1
    • JIL-AM: 2
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 4: 61
    • JCOP4: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • BSI:
    • AIS 20: 3
  • SCP:
    • SCP03: 1
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 2
    • GlobalPlatform 2.2.1: 1
  • JavaCard:
    • Java Card 3.0.4: 3
    • Java Card 3.0.5: 2
pdf_data/report_metadata
  • /CreationDate: D:20250120153037+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20250120153139+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 455310
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
pdf_data/st_filename c0812_est.pdf NSCIB-CC-156530-STLite_v4.2.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-2019/62-S02: 1
    • ANSSI-CC-2018/52-S03: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-V2-2020: 2
    • BSI-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 1
  • EAL:
    • EAL4: 1
    • EAL5: 9
    • EAL5 augmented: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
  • AGD:
    • AGD_OPE.1: 2
  • ALC:
    • ALC_DVS.2: 4
    • ALC_FLR.1: 4
  • ASE:
    • ASE_CCL: 2
    • ASE_ECD: 1
    • ASE_INT: 2
    • ASE_REQ: 2
    • ASE_SPD: 2
    • ASE_TSS: 2
    • ASE_TSS.2: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 14
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 7
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 46
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 4
    • FCS_CKM_EXT.4: 30
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 153
    • FCS_COP.1.1: 7
    • FCS_ITC.1: 1
    • FCS_KDF_EXT: 4
    • FCS_KDF_EXT.1: 17
    • FCS_KDF_EXT.1.1: 3
    • FCS_KYC_EXT: 4
    • FCS_KYC_EXT.1: 19
    • FCS_KYC_EXT.1.1: 4
    • FCS_PCC_EXT.1: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 47
    • FCS_RBG_EXT.1.1: 3
    • FCS_RBG_EXT.1.2: 3
    • FCS_RGB_EXT.1: 1
    • FCS_SMC_EXT: 2
    • FCS_SMC_EXT.1: 16
    • FCS_SMC_EXT.1.1: 2
    • FCS_SNI_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT: 2
    • FCS_TLS_EXT.1: 22
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT: 3
    • FDP_DSK_EXT.1: 10
    • FDP_DSK_EXT.1.1: 2
    • FDP_DSK_EXT.1.2: 2
    • FDP_FXS_EXT: 2
    • FDP_FXS_EXT.1: 8
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_PMG: 4
    • FIA_PMG_EXT: 4
    • FIA_PMG_EXT.1: 3
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 17
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_KYP_EXT: 2
    • FPT_KYP_EXT.1: 6
    • FPT_KYP_EXT.1.1: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 9
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC_EXT.1: 1
    • FTP_TRP.1: 24
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_ARP.1: 22
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_SAA.1: 3
    • FAU_SAS: 4
    • FAU_SAS.1: 8
    • FAU_SAS.1.1: 3
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.1: 1
    • FCO_NRO.2: 7
    • FCO_NRO.2.1: 2
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 2
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 9
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 8
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 15
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 16
    • FCS_COP.1.1: 14
    • FCS_RNG: 3
    • FCS_RNG.1: 9
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 60
    • FDP_ACC.1.1: 2
    • FDP_ACC.2: 16
    • FDP_ACC.2.1: 4
    • FDP_ACC.2.2: 3
    • FDP_ACF: 1
    • FDP_ACF.1: 36
    • FDP_ACF.1.1: 5
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 7
    • FDP_ACF.2: 2
    • FDP_IFC: 2
    • FDP_IFC.1: 50
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 32
    • FDP_IFC.2.1: 4
    • FDP_IFC.2.2: 4
    • FDP_IFF: 2
    • FDP_IFF.1: 49
    • FDP_IFF.1.1: 5
    • FDP_IFF.1.2: 6
    • FDP_IFF.1.3: 6
    • FDP_IFF.1.4: 6
    • FDP_IFF.1.5: 6
    • FDP_ITC: 1
    • FDP_ITC.1: 8
    • FDP_ITC.2: 18
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_RIP.1: 68
    • FDP_RIP.1.1: 9
    • FDP_ROL.1: 13
    • FDP_ROL.1.1: 2
    • FDP_ROL.1.2: 3
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 23
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 11
    • FIA_UAU.4.1: 2
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 64
    • FIA_UID.1.1: 5
    • FIA_UID.1.2: 5
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 7
    • FMT_MSA.1: 83
    • FMT_MSA.1.1: 9
    • FMT_MSA.2: 3
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 83
    • FMT_MSA.3.1: 11
    • FMT_MSA.3.2: 10
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 6
    • FMT_MTD.3.1: 1
    • FMT_REV: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 82
    • FMT_SMF.1.1: 8
    • FMT_SMR: 2
    • FMT_SMR.1: 100
    • FMT_SMR.1.1: 7
    • FMT_SMR.1.2: 7
  • FPR:
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 49
    • FPT_FLS.1.1: 7
    • FPT_RCV.2: 1
    • FPT_RCV.3: 3
    • FPT_RCV.3.1: 2
    • FPT_RCV.3.2: 2
    • FPT_RCV.3.3: 2
    • FPT_RCV.3.4: 1
    • FPT_TDC.1: 6
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 16
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 9
    • D.USER: 33
  • O:
    • O.ACCESS: 1
    • O.ACCESS_CONTROL: 6
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 5
    • O.COMMS_PROTECTION: 11
    • O.FAX_NET_SEPARATION: 1
    • O.KEY_MATERIAL: 1
    • O.PURGE_DATA: 2
    • O.STORAGE_ENCRYPTION: 8
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.APPS-PROVIDER: 6
    • A.CAP_FILE: 4
    • A.DELETION: 1
    • A.PROCESS-SEC-IC: 5
    • A.USE_DIAG: 6
    • A.USE_KEYS: 6
    • A.VERIFICATION: 3
    • A.VERIFICATION-AU: 1
    • A.VERIFICATION-AUT: 1
    • A.VERIFICATION-AUTHORITY: 4
  • D:
    • D.API_DATA: 3
    • D.APP_: 2
    • D.APP_CODE: 6
    • D.APP_C_: 1
    • D.APP_C_DATA: 5
    • D.APP_I_DATA: 7
    • D.APP_KEYS: 9
    • D.APSD_KEYS: 4
    • D.ATTACK_COUNTER: 7
    • D.CARD_: 1
    • D.CARD_MNGT_: 1
    • D.CARD_MNGT_DATA: 1
    • D.CONFIG_ITEM: 7
    • D.CRYPTO: 4
    • D.ISD_KEYS: 4
    • D.JCS_: 1
    • D.JCS_CODE: 7
    • D.JCS_DATA: 8
    • D.PIN: 9
    • D.SEC_DATA: 6
    • D.TOE_IDENTIFICATION: 2
    • D.TOE_IDENTIFIER: 3
    • D.UPDATE_IMAGE: 26
    • D.VASD_KEYS: 3
  • O:
    • O.APPLET: 15
    • O.APPLET_: 2
    • O.APPLET_CURRENT: 6
    • O.APPLET_LOADED: 5
    • O.APPLET_MIGRATION_DATASTORE: 6
    • O.APPLET_MIGRATION_PLAN: 2
    • O.CODE_CAP_: 2
    • O.CODE_CAP_FILE: 10
    • O.CODE_PKG: 1
    • O.DELETION: 4
    • O.EXT-MEM: 1
    • O.INSTALL: 3
    • O.JAVAOBJECT: 58
    • O.LOAD: 4
    • O.REMOTE: 1
  • OE:
    • OE.APPS-PROVIDER: 5
    • OE.CAP_FILE: 7
    • OE.CARD-: 2
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 20
    • OE.CONFID-UPDATE-: 2
    • OE.CONFID-UPDATE-IMAGE: 3
    • OE.KEY-: 1
    • OE.KEY-CHANGE: 5
    • OE.PROCESS_SEC_: 2
    • OE.PROCESS_SEC_IC: 3
    • OE.SCP: 12
    • OE.SECURITY-DOMA: 2
    • OE.SECURITY-DOMAINS: 3
    • OE.USE_DIAG: 6
    • OE.USE_KEYS: 6
    • OE.VERIFICATION: 28
    • OE.VERIFICATION-A: 2
    • OE.VERIFICATION-AUTHORITY: 3
  • OP:
    • OP.ARRAY_AASTORE: 2
    • OP.ARRAY_ACCESS: 4
    • OP.ARRAY_LENGTH: 2
    • OP.ARRAY_T_ALOAD: 1
    • OP.ARRAY_T_ASTORE: 1
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_CAP_: 2
    • OP.DELETE_CAP_FILE: 2
    • OP.DELETE_CAP_FILE_APPLET: 2
    • OP.EXPORT_: 1
    • OP.EXPORT_APPLET_DATA: 5
    • OP.IMPORT_: 1
    • OP.IMPORT_APPLET_DATA: 6
    • OP.INSTANCE_FIELD: 3
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.MODIFY_: 1
    • OP.PUT: 6
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.READ_CONFIG_: 1
    • OP.THROW: 5
    • OP.TRIGGER_: 1
    • OP.TRIGGER_UPDATE: 3
    • OP.TYPE_ACCESS: 5
    • OP.USE_CONFIG_: 1
  • OSP:
    • OSP.KEY-CHANGE: 5
    • OSP.PROCESS-TOE: 5
    • OSP.SECURITY-DOM: 2
    • OSP.SECURITY-DOMAINS: 3
    • OSP.VERIFICATION: 3
  • OT:
    • OT.ALARM: 14
    • OT.APPLI-AUTH: 12
    • OT.ARRAY_VIEWS_: 1
    • OT.ARRAY_VIEWS_CONFID: 1
    • OT.ARRAY_VIEWS_INTEG: 1
    • OT.ARRAY_VIEW_: 1
    • OT.ATTACK-COUNT: 1
    • OT.ATTACK-COUNTE: 1
    • OT.ATTACK-COUNTER: 4
    • OT.AUTH-LOAD-: 1
    • OT.AUTH-LOAD-UPD: 2
    • OT.AUTH-LOAD-UPDATE-IMAGE: 2
    • OT.CARD-: 4
    • OT.CARD-CONFIGUR: 2
    • OT.CARD-CONFIGURATION: 4
    • OT.CARD-MANAGEM: 16
    • OT.CARD-MANAGEMENT: 16
    • OT.CIPHER: 6
    • OT.COMM_: 5
    • OT.COMM_AUTH: 8
    • OT.COMM_CONFIDENTIALITY: 4
    • OT.COMM_INTEGRITY: 3
    • OT.CONFID-UPDATE-: 2
    • OT.CONFID-UPDATE-IMAGE: 4
    • OT.DATASTORE_: 2
    • OT.DATASTORE_ACCESS: 4
    • OT.DOMAIN-RIGHTS: 8
    • OT.FIREWALL: 10
    • OT.GLOBAL_: 6
    • OT.GLOBAL_ARRAYS_CONFID: 3
    • OT.GLOBAL_ARRAYS_INTEG: 2
    • OT.IDENTIFICATION: 7
    • OT.KEY-MNGT: 6
    • OT.NATIVE: 10
    • OT.OBJ-DELETION: 4
    • OT.OPERATE: 24
    • OT.PIN-MNGT: 4
    • OT.REALLOCATION: 6
    • OT.RESOURCES: 5
    • OT.RESTRICTED-MO: 3
    • OT.RESTRICTED-MODE: 4
    • OT.RNG: 6
    • OT.SCP: 42
    • OT.SECURE_AC_: 2
    • OT.SECURE_AC_ACTIVATION: 4
    • OT.SECURE_LOAD_: 4
    • OT.SECURE_LOAD_ACODE: 6
    • OT.SID: 14
    • OT.TOE_: 2
    • OT.TOE_IDENTIFICATION: 3
    • OT.TRANSACTION: 6
  • R:
    • R.JAVA: 10
  • SA:
    • SA.ALARM: 2
    • SA.APPLET-MIGR: 1
    • SA.CARD-MANAGEM: 1
    • SA.CIPHER: 2
    • SA.CONFID-APPLI-D: 1
    • SA.CONFID-APPLI-DATA: 1
    • SA.CONFID-JCS-CO: 1
    • SA.CONFID-JCS-CODE: 1
    • SA.CONFID-JCS-DAT: 1
    • SA.CONFID-JCS-DATA: 1
    • SA.CONFID-UPDATE: 1
    • SA.CONFID-UPDATE-IMAGE: 1
    • SA.CONFIG-APPLET: 1
    • SA.DELETION: 1
    • SA.EXE-APPLI-CODE: 3
    • SA.EXE-JCS-CODE: 3
    • SA.FIREWALL: 2
    • SA.INSTALL: 2
    • SA.INTEG-APPLI-CO: 1
    • SA.INTEG-APPLI-CODE: 2
    • SA.INTEG-APPLI-DA: 1
    • SA.INTEG-APPLI-DATA: 2
    • SA.INTEG-JCS-CODE: 2
    • SA.INTEG-JCS-DATA: 2
    • SA.INTEG-UPDATE-I: 1
    • SA.INTEG-UPDATE-IMAGE: 1
    • SA.KEY-MNGT: 2
    • SA.NATIVE: 4
    • SA.OBJ-DELETION: 3
    • SA.OPERATE: 2
    • SA.OSU: 1
    • SA.PIN-MNGT: 2
    • SA.RESOURCES: 3
    • SA.RM: 1
    • SA.SCP: 5
    • SA.SID: 3
    • SA.TRANSACTION: 2
    • SA.VERIFICATION: 3
  • T:
    • T.AM_DATASTORE_: 2
    • T.AM_DATASTORE_ACCESS: 3
    • T.ATTACK-COUNTER: 5
    • T.COM_EXPLOIT: 5
    • T.CONFID-APPLI-DA: 2
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID-UPDATE-I: 2
    • T.CONFID-UPDATE-IMAGE: 3
    • T.CONFIG: 5
    • T.DELETION: 2
    • T.EXE-CODE: 6
    • T.EXE-CODE-REMOTE: 1
    • T.INSTALL: 2
    • T.INTEG-APPLI-COD: 2
    • T.INTEG-APPLI-CODE: 4
    • T.INTEG-APPLI-DATA: 10
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-UPDATE-IM: 2
    • T.INTEG-UPDATE-IMAGE: 3
    • T.INTERRUPT-OSU: 5
    • T.LIFE_CYCLE: 5
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.RND: 5
    • T.SID: 6
    • T.UNAUTH-LOAD-UP: 2
    • T.UNAUTH-LOAD-UPDATE-IMAGE: 3
    • T.UNAUTHORIZED_: 2
    • T.UNAUTHORIZED_CARD_MNGT: 3
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 420
    • NXP Semiconductors: 24
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 35
      • AES-: 1
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • HMAC: 22
      • HMAC-SHA-256: 5
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • 3DES:
      • 3DES: 3
      • TDES: 1
      • Triple-DES: 1
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 3
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • RSA:
    • RSA 1024: 1
    • RSA-CRT: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 9
      • SHA-384: 2
      • SHA-512: 10
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 2
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 45
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
      • TLS1.2: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 24
    • PRNG: 6
  • RNG:
    • RBG: 3
    • RNG: 4
  • RNG:
    • RND: 5
    • RNG: 19
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 13
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 40
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 2
    • Fault Injection: 2
    • Physical Tampering: 2
    • fault injection: 1
    • malfunction: 2
    • physical tampering: 2
  • SCA:
    • DPA: 3
    • physical probing: 1
    • side channel: 4
  • other:
    • JIL: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 149
    • JCOP4: 187
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-3: 2
    • FIPS PUB 186-4: 2
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 2
  • ISO:
    • ISO/IEC 10116: 16
    • ISO/IEC 10118: 4
    • ISO/IEC 18031:2011: 4
    • ISO/IEC 18033-3: 7
  • NIST:
    • NIST SP 800-108: 1
    • NIST SP 800-132: 1
    • NIST SP 800-38A: 2
    • NIST SP 800-56B: 1
    • NIST SP 800-90A: 9
    • NIST SP 800-90B: 1
  • RFC:
    • RFC 2246: 1
    • RFC 2818: 3
    • RFC 4346: 1
    • RFC 5246: 3
    • RFC2818: 1
  • BSI:
    • AIS 20: 2
    • AIS20: 1
    • AIS31: 1
  • FIPS:
    • FIPS 197: 1
  • PKCS:
    • PKCS1: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.2.1: 1
  • JavaCard:
    • Java Card 3.0.4: 1
pdf_data/st_keywords/javacard_api_const
  • ALG:
    • AES:
      • ALG_AES_BLOCK_128_CBC_NOPAD: 1
      • ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD: 2
      • ALG_AES_BLOCK_128_ECB_NOPAD: 1
      • ALG_AES_CBC_ISO9797_M1: 1
      • ALG_AES_CBC_ISO9797_M2: 1
      • ALG_AES_CBC_ISO9797_M2_STANDARD: 2
      • ALG_AES_CMAC16: 1
      • ALG_AES_CMAC16_STANDARD: 1
      • ALG_AES_ECB_ISO9797_M1: 1
      • ALG_AES_ECB_ISO9797_M2: 1
      • ALG_AES_MAC_128_NOPAD: 1
    • DES:
      • ALG_DES_CBC_ISO9797_M1: 1
      • ALG_DES_CBC_ISO9797_M2: 1
      • ALG_DES_CBC_NOPAD: 1
      • ALG_DES_CMAC8: 1
      • ALG_DES_ECB_ISO9797_M1: 1
      • ALG_DES_ECB_ISO9797_M2: 2
      • ALG_DES_ECB_NOPAD: 1
      • ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
      • ALG_DES_MAC4_ISO9797_M2: 1
      • ALG_DES_MAC8_ISO9797_1_M1_ALG3: 1
      • ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
      • ALG_DES_MAC8_ISO9797_M2: 1
      • ALG_DES_MAC8_NOPAD: 1
    • EC:
      • ALG_EC_SVDP_DH: 1
      • ALG_EC_SVDP_DHC: 1
      • ALG_EC_SVDP_DHC_KDF: 1
      • ALG_EC_SVDP_DHC_PLAIN: 1
      • ALG_EC_SVDP_DH_KDF: 1
      • ALG_EC_SVDP_DH_PLAIN: 1
      • ALG_EC_SVDP_DH_PLAIN_XY: 2
    • ECDSA:
      • ALG_ECDSA_SHA_224: 1
      • ALG_ECDSA_SHA_256: 2
      • ALG_ECDSA_SHA_384: 1
      • ALG_ECDSA_SHA_512: 1
    • HMAC:
      • ALG_HMAC_SHA_256: 1
      • ALG_HMAC_SHA_384: 1
      • ALG_HMAC_SHA_512: 1
    • RSA:
      • ALG_RSA_NOPAD: 1
      • ALG_RSA_PKCS1_OAEP: 1
      • ALG_RSA_SHA_224_PKCS1: 1
      • ALG_RSA_SHA_224_PKCS1_PSS: 1
      • ALG_RSA_SHA_256_PKCS1: 1
      • ALG_RSA_SHA_256_PKCS1_PSS: 1
      • ALG_RSA_SHA_384_PKCS1: 1
      • ALG_RSA_SHA_384_PKCS1_PSS: 1
      • ALG_RSA_SHA_512_PKCS1: 1
      • ALG_RSA_SHA_512_PKCS1_PSS: 1
      • ALG_RSA_SHA_PKCS1: 1
    • SHA:
      • ALG_SHA_224: 1
      • ALG_SHA_256: 3
      • ALG_SHA_384: 3
      • ALG_SHA_512: 3
  • misc:
    • CIPHER_AES_CMAC16: 1
    • LENGTH_AES_128: 4
    • LENGTH_AES_192: 4
    • LENGTH_AES_256: 4
    • LENGTH_DES3_2KEY: 4
    • LENGTH_DES3_3KEY: 4
    • LENGTH_EC_FP_224: 2
    • LENGTH_EC_FP_256: 3
    • LENGTH_EC_FP_384: 2
    • LENGTH_EC_FP_521: 2
    • LENGTH_RSA_1024: 1
    • LENGTH_SHA: 1
    • LENGTH_SHA_224: 1
    • LENGTH_SHA_256: 2
    • LENGTH_SHA_384: 2
    • LENGTH_SHA_512: 2
    • PAD_PKCS1_OAEP: 1
    • SIG_CIPHER_AES_MAC128: 2
    • SIG_CIPHER_DES_CMAC8: 1
    • SIG_CIPHER_ECDSA: 1
    • SIG_CIPHER_RSA: 1
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 1
  • javacard:
    • javacard.framework: 3
    • javacard.framework.applet: 1
    • javacard.security: 3
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_metadata
  • /Author: TOSHIBA TEC
  • /CreationDate: D:20250115104716+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /Keywords: HCD-PP
  • /ModDate: D:20250115104716+09'00'
  • /Producer: iText® Core 8.0.3 (AGPL version) ©2000-2024 Apryse Group NV
  • /Subject: セキュリティーターゲット
  • /Title: Security Target for e-STUDIO7527AC Series
  • pdf_file_size_bytes: 1386301
  • pdf_hyperlinks: https://www.rambus.com/intel-ivy-bridge-random-number-generator/
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 87
  • /Author: NXP B.V.
  • /CreationDate: D:20220928121444+02'00'
  • /Creator: DITA Open Toolkit 3.3.1
  • /Keywords: ASE, JCOP, Common Criteria, EAL5 augmented
  • /Producer: Apache FOP Version 2.3
  • /Subject: NXP JCOP4.x on P73N2M0B0.2C2/2C6 Secure Element
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1048248
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 165
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different