Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Hewlett-Packard Networking A-Series Switches with VPN Firewall Module: 12500, 9500 and 7500
None
TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci, TASKalfa 3050ciG, TASKalfa 3550ciG, TASKalfa 4550ciG, TASKalfa 5550ciG, CS 3050ci, CS 3550ci, CS 4550ci, CS 5550ci, CDC 1930, CDC 1935, CDC 1945, CDC 1950, DCC 2930, DCC 2935, DCC 2945, DCC 2950 Data Security Kit (E) V1.00E
JISEC-CC-CRP-C0293
name Hewlett-Packard Networking A-Series Switches with VPN Firewall Module: 12500, 9500 and 7500 TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci, TASKalfa 3050ciG, TASKalfa 3550ciG, TASKalfa 4550ciG, TASKalfa 5550ciG, CS 3050ci, CS 3550ci, CS 4550ci, CS 5550ci, CDC 1930, CDC 1935, CDC 1945, CDC 1950, DCC 2930, DCC 2935, DCC 2945, DCC 2950 Data Security Kit (E) V1.00E
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme US JP
not_valid_after 07.04.2015 06.06.2016
not_valid_before 20.03.2013 30.05.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10468-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0293_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10468-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0293_est.pdf
manufacturer Hewlett-Packard Company KYOCERA MITA Corporation
manufacturer_web https://www.hp.com https://www.kyoceramita.com/
security_level EAL2+, ALC_FLR.2 EAL3
dgst 285bc0d96dbe7bc3 1926ce91aa4e743e
heuristics/cert_id JISEC-CC-CRP-C0293
heuristics/cert_lab US []
heuristics/cpe_matches {} cpe:2.3:h:kyocera:taskalfa_3550ci:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_5550ci:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_4550ci:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_3050ci:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_305:-:*:*:*:*:*:*:*
heuristics/extracted_sars ADV_FSP.2, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ALC_FLR.2, ATE_COV.1, ALC_CMC.2, AGD_OPE.1, ALC_CMS.2, AVA_VAN.2, ALC_DEL.1, ADV_TDS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 7500, 9500, 12500 1.00
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10468/
  • categories: ['Network Switch']
  • category: Network Switch
  • certification_date: 20.03.2013
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 20.03.2015
  • id: CCEVS-VR-VID10468
  • product: Hewlett-Packard Networking A-Series Switches with VPN Firewall Module: 12500, 9500 and 7500
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10468
  • vendor: Hewlett-Packard Company
  • cert_id: JISEC-CC-CRP-C0293
  • certification_date: 01.05.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0293_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci - TASKalfa 3050ciG, TASKalfa 3550ciG, TASKalfa 4550ciG, TASKalfa 5550ciG - CS 3050ci, CS 3550ci, CS 4550ci, CS 5550ci - CDC 1930, CDC 1935, CDC 1945, CDC 1950 - DCC 2930, DCC 2935, DCC 2945, DCC 2950 This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci, TASKalfa 3050ciG, TASKalfa 3550ciG, TASKalfa 4550ciG, TASKalfa 5550ciG, CS 3050ci, CS 3550ci, CS 4550ci, CS 5550ci, CDC 1930, CDC 1935, CDC 1945, CDC 1950, DCC 2930, DCC 2935, DCC 2945, DCC 2950 Data Security Kit (E)
    • product_type: Data protection function in digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0293_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0293_est.pdf
    • toe_version: V1.00E
    • vendor: KYOCERA MITA Corporation
  • expiration_date: 01.06.2016
  • supplier: KYOCERA MITA Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0293_it0323.html
  • toe_overseas_name: TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci, TASKalfa 3050ciG, TASKalfa 3550ciG, TASKalfa 4550ciG, TASKalfa 5550ciG, CS 3050ci, CS 3550ci, CS 4550ci, CS 5550ci, CDC 1930, CDC 1935, CDC 1945, CDC 1950, DCC 2930, DCC 2935, DCC 2945, DCC 2950 Data Security Kit (E) V1.00E
heuristics/protection_profiles f0acae5742fb48a1 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_fw_tf_br_v1.1.pdf {}
pdf_data/report_filename st_vid10468-vr.pdf c0293_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR- VID10468-2013
    • cert_item: Hewlett-Packard Development Company, L.P., 11445 Compaq Center Drive West, Houston, Texas 77070 Hewlett-Packard Company A-Series Switches/w Security Blades
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0293-01: 1
    • Certification No. C0293: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 9
    • EAL 2 augmented: 2
    • EAL2: 5
    • EAL2 augmented: 1
  • EAL:
    • EAL3: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.CE: 1
    • A.LOCATION: 1
    • A.NETWORK: 2
  • T:
    • T.RESIDUAL: 2
    • T.TEMP: 3
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
    • SSHv2: 4
  • VPN:
    • VPN: 12
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 2
pdf_data/report_metadata
  • /Author: Tammy Compton
  • /CreationDate: D:20130329091639
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130329091639
  • /Producer: Microsoft® Office Word 2007
  • /Title: Validation Report for HP
  • pdf_file_size_bytes: 501589
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110907133354+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110907133437+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 2223227
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 30
pdf_data/st_filename st_vid10468-st.pdf c0293_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 4
    • EAL2: 2
    • EAL2 augmented: 1
  • EAL:
    • EAL3: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 14
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 18
    • ADV_TDS: 1
    • ADV_TDS.1: 17
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 15
    • AGD_PRE: 1
    • AGD_PRE.1: 11
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 9
    • ALC_CMS: 1
    • ALC_CMS.2: 7
    • ALC_DEL: 1
    • ALC_DEL.1: 6
    • ALC_FLR: 1
    • ALC_FLR.2: 18
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 8
    • ATE_FUN: 1
    • ATE_FUN.1: 12
    • ATE_IND: 1
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 8
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 10
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR: 8
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_STG: 10
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
    • FAU_STG_EXT: 11
    • FAU_STG_EXT.1: 6
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.3: 4
    • FAU_STG_EXT.3.1: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 5
    • FCS_CKM_EXT: 5
    • FCS_CKM_EXT.4: 9
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 49
    • FCS_RBG_EXT: 5
    • FCS_RBG_EXT.1: 5
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSH_EXT: 5
    • FCS_SSH_EXT.1: 7
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_SSH_EXT.1.8: 1
    • FCS_SSH_EXT.1.9: 1
    • FCS_TLS_EXT.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_IFC: 4
    • FDP_IFC.1: 6
    • FDP_IFC.1.1: 1
    • FDP_IFF: 4
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_RIP: 5
    • FDP_RIP.1: 3
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 4
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 5
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT: 5
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 17
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 5
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 5
    • FIA_UAU_EXT.5: 4
    • FIA_UAU_EXT.5.1: 1
    • FIA_UAU_EXT.5.2: 1
    • FIA_UIA_EXT: 5
    • FIA_UIA_EXT.1: 9
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID: 5
    • FIA_UID.1: 2
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 6
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 6
    • FMT_MSA.1: 2
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 4
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF: 4
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR: 5
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 21
    • FPT_PTD: 1
    • FPT_PTD.1: 20
    • FPT_RPL: 4
    • FPT_RPL.1: 5
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM: 5
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 5
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 5
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FRU:
    • FRU_RSA: 4
    • FRU_RSA.1: 5
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL: 6
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL_EXT: 6
    • FTA_SSL_EXT.1: 5
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 4
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 25
    • FTP_TRP.1: 26
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.DIRECT: 3
    • A.GENPUR: 2
    • A.LOWEXP: 3
    • A.NOEVIL: 2
    • A.NOREMO: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSEC: 2
    • A.PHYSICAL: 2
    • A.PUBLIC: 3
    • A.REMACC: 2
    • A.SINGEN: 3
    • A.TRUSTED_ADMIN: 3
  • O:
    • O.ACCOUN: 9
    • O.AUDREC: 8
    • O.DISPLAY_BANNER: 5
    • O.ENCRYP: 6
    • O.IDAUTH: 9
    • O.LIMEXT: 8
    • O.MEDIAT: 9
    • O.PROTECTED_COMMUNICATIONS: 3
    • O.RESIDUAL_INFORMATION_CLEARING: 5
    • O.RESOURCE_AVAILABILITY: 3
    • O.SECFUN: 16
    • O.SECSTA: 9
    • O.SELPRO: 10
    • O.SESSION_LOCK: 5
    • O.SINUSE: 8
    • O.SYSTEM_MONITORING: 3
    • O.TOE_ADMINISTRATION: 5
    • O.TSF_SELF_TEST: 3
    • O.VERIFIABLE_UPDATES: 5
  • OE:
    • OE.ADMTRA: 2
    • OE.DIRECT: 2
    • OE.GENPUR: 2
    • OE.GUIDAN: 2
    • OE.LOWEXP: 2
    • OE.NOEVIL: 2
    • OE.NOREMO: 2
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.PHYSEC: 2
    • OE.PHYSICAL: 2
    • OE.PUBLIC: 2
    • OE.REMACC: 2
    • OE.SINGEN: 2
    • OE.TRUSTED_ADMIN: 2
  • T:
    • T.ADMIN_ERROR: 3
    • T.ASPOOF: 6
    • T.AUDACC: 4
    • T.AUDFUL: 8
    • T.MEDIAT: 5
    • T.NOAUTH: 12
    • T.OLDINF: 5
    • T.PROCOM: 5
    • T.REPEAT: 4
    • T.REPLAY: 8
    • T.RESOURCE_EXHAUSTION: 2
    • T.SELPRO: 6
    • T.TSF_FAILURE: 3
    • T.TUSAGE: 5
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_UPDATE: 3
    • T.UNDETECTED_ACTIONS: 2
    • T.USER_DATA_REUSE: 3
  • A:
    • A.CE: 4
    • A.LOCATION: 5
    • A.NETWORK: 5
  • O:
    • O.ENCRYPT: 5
    • O.REMAIN: 6
  • OE:
    • OE.CE: 3
    • OE.LOCATION: 3
    • OE.NETWORK: 3
  • T:
    • T.RESIDUAL: 4
    • T.TEMP: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
      • AES-: 1
      • AES-128: 2
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 5
    • DSA:
      • DSA: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-256: 4
      • SHA-384: 2
      • SHA-512: 2
      • SHA512: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 2
    • IKEv1: 7
  • IPsec:
    • IPsec: 6
  • SSH:
    • SSH: 28
    • SSHv2: 15
  • TLS:
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 24
pdf_data/st_keywords/randomness
  • RNG:
    • RBG: 3
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 3
    • FIPS 186-2: 1
    • FIPS PUB 186-2: 4
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-38A: 2
  • RFC:
    • RFC 3602: 1
    • RFC 4109: 1
    • RFC 4252: 1
    • RFC 4253: 1
    • RFC 4303: 1
    • RFC 4304: 1
  • FIPS:
    • FIPS PUB 197: 1
pdf_data/st_metadata
  • /Author: KYOCERA MITA Corporation
  • /CreationDate: D:20110706140637+09'00'
  • /Creator: CubePDF
  • /Keywords: Security Target
  • /ModDate: D:20110706140655+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title: TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci Data Security Kit (E) Overseas Version Security Target
  • pdf_file_size_bytes: 347745
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different