Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CENTAGATE v3.010-build13
ISCB-3-RPT-C072-CR-v1
Fuji Xerox DocuCentre-V C2265/C2263 models with Hard Disk, Data Security, Scan, and Fax Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
JISEC-CC-CRP-C0504
name CENTAGATE v3.010-build13 Fuji Xerox DocuCentre-V C2265/C2263 models with Hard Disk, Data Security, Scan, and Fax Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
category Other Devices and Systems Multi-Function Devices
scheme MY JP
not_valid_after 06.06.2022 31.03.2021
not_valid_before 06.06.2017 31.03.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C072-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0504_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-05-08-CTG-ST-3.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0504_est.pdf
manufacturer SecureMetric Technology Sdn Bhd Fuji Xerox Co., Ltd.
manufacturer_web https://www.securemetric.com/ https://www.fujixerox.co.jp/eng/
security_level EAL4+, ALC_FLR.2 EAL2+, ALC_FLR.2
dgst 4149b933ed4230dd 739d1755f2fd3d4a
heuristics/cert_id ISCB-3-RPT-C072-CR-v1 JISEC-CC-CRP-C0504
heuristics/cpe_matches {} cpe:2.3:h:fujixerox:docucentre-v_c2263:-:*:*:*:*:*:*:*
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FRL.2, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 3.010 1.0.13, 2.0.8
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0504
  • certification_date: 01.03.2016
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0504_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Fuji Xerox DocuCentre-V C2265/C2263 models with Hard Disk, Data Security, Scan, and Fax
    • product_type: Multi Function Device
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0504_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0504_est.pdf
    • toe_version: Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
    • vendor: Fuji Xerox Co., Ltd.
  • expiration_date: 01.04.2021
  • supplier: Fuji Xerox Co., Ltd.
  • toe_japan_name: Fuji Xerox DocuCentre-V C2265/C2263 models with Hard Disk, Data Security, Scan, and FaxController ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0504_it5558.html
  • toe_overseas_name: Fuji Xerox DocuCentre-V C2265/C2263 models with Hard Disk, Data Security, Scan, and FaxController ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
heuristics/protection_profiles {} 43ce79b420f23a00
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/report_filename ISCB-5-RPT-C072-CR-v1.pdf c0504_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-3-RPT-C072-CR-v1: 28
  • JP:
    • CRP-C0504-01: 1
    • Certification No. C0504: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 5
    • EAL4 augmented: 1
    • EAL4+: 4
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 7
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 14
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 8
pdf_data/report_keywords/crypto_protocol
  • VPN:
    • VPN: 1
  • IPsec:
    • IPsec: 7
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • OTP Hardware token, where this is out of the evaluation. SMS service to register the device is also out of scope. 18 Potential consumers of the TOE are advised that some functions and services may not have been: 1
    • out of scope: 1
  • OutOfScope:
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: ISCB Department
  • /CreationDate: D:20170720054033+00'00'
  • /Creator: Microsoft Word
  • /Keywords: MyCB_TMP_002
  • /ModDate: D:20170720054033+00'00'
  • /Subject: CENTAGATE v3.0.10-build13
  • /Title: C072 Certification Report
  • pdf_file_size_bytes: 649341
  • pdf_hyperlinks: http://www.cybersecurity.my/mycc, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /CreationDate: D:20160519150829+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /ModDate: D:20160519151247+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Title:
  • pdf_file_size_bytes: 473189
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
pdf_data/st_filename 2017-05-08-CTG-ST-3.0.pdf c0504_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 1
  • EAL:
    • EAL 2: 1
    • EAL2: 2
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 2
    • ALC_FRL.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 3
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
    • FAU_GEN: 2
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_SAA: 1
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAA.2: 6
    • FAU_SAA.2.1: 1
    • FAU_SAA.2.2: 1
    • FAU_SAA.2.3: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 3
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FTA:
    • FTA_TAH: 3
    • FTA_TAH.1: 5
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_COP: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 100
    • FDP_ACC.1.1: 8
    • FDP_ACF.1: 92
    • FDP_ACF.1.1: 8
    • FDP_ACF.1.2: 8
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 8
    • FDP_IFC: 1
    • FDP_IFC.1: 8
    • FDP_IFF: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 19
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 16
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 22
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 99
    • FMT_MSA.1.1: 8
    • FMT_MSA.3: 90
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 8
    • FMT_MTD.1: 23
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 38
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 45
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 16
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.COMPENT_ADMIN: 1
    • A.COMPENT_ADMINSTRATORS: 1
    • A.FIREWALL: 2
    • A.MAIL_SERVER: 2
    • A.MALICIOUS_CODE: 1
    • A.NO_EVIL: 2
    • A.OPERATING_SYSTEM: 1
    • A.PORT_PROTECT: 2
    • A.TIME_STAMP: 2
  • D:
    • D: 1
  • O:
    • O.ALERT: 6
    • O.AUDIT: 7
    • O.AUTH_MECH: 8
    • O.MOBILE_SENSITVE: 2
    • O.MOBILE_SENSITVE_: 1
    • O.MOBILE_SENSITVE_PROTECTION: 5
    • O.TRAFFIC_PROTECTION: 23
    • O.USER_ACC: 1
    • O.USER_ACC_CONTROL: 19
  • OE:
    • OE.COMPENT_: 1
    • OE.COMPENT_ADMINSTRATORS: 1
    • OE.FIREWALL: 2
    • OE.MAIL_SERVER: 2
    • OE.MALICIOUS_CODE_N: 1
    • OE.MALICIOUS_CODE_NOT_SIGN: 1
    • OE.NO_EVIL: 2
    • OE.OPERATING_SYSTEM: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.PORT_PROTECT: 2
    • OE.TIME_STAMP: 2
  • T:
    • T.CUMMUNICATION: 1
    • T.CUMMUNICATION_ATTACK: 1
    • T.DATA_ACCESS: 2
    • T.MOBILE: 1
    • T.MOBILE_ATTACK: 1
    • T.USER_ACC_CONTROL: 1
    • T.WEB_ATTACK: 2
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 13
    • D.DOC: 60
    • D.FUNC: 53
    • D.PROT: 4
  • O:
    • O.AUDIT: 8
    • O.AUDIT_ACCESS: 10
    • O.AUDIT_STORAGE: 10
    • O.CIPHER: 8
    • O.CONF: 16
    • O.DOC: 16
    • O.FUNC: 8
    • O.INTERFACE: 8
    • O.PROT: 8
    • O.SOFTWARE: 8
    • O.USER: 14
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_STORAGE: 2
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 9
    • SHA2:
      • SHA256: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • PKCS:
    • PKCS#11: 2
    • PKCS#12: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
  • X509:
    • X.509: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Out of Scope: 1
    • issuer certificate validity, certificate status, and the certificate owner Mobile audio pass (Out of Scope) TOE will generate challenge and PKI certificate will be used to sign the challenge. The signature: 1
    • out of scope: 5
    • procedure. Table 21: Authentication Components Authentication Method of authentication PKI token (out of scope) The user prompted to select the valid certificate from the list, and then TOE will verify the: 1
    • serial number / fingerprint that stored in the DB. Hardware CR OTP (out of scope) User needs to have CR OTP token to use this feature. User will request for a challenge from the: 1
    • then be sent back to the TOE by the mobile application and verified for its validity. FIDO (out of scope) User need to plugged in the token then click on the button of the token to submit the validation: 1
    • token. This is out of the scope of the evaluation. Also, using SMS to register the device is also out of scope of evaluation. SecureMetric Technology Sdn Bhd 2016 Page 17 of 76 For QR code registration: 1
    • which will then be used by the user to generate the OTP. Hardware OTP (out of scope) User needs to have OTP token to use this feature. User will generate an OTP from the OTP token and: 1
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
pdf_data/st_metadata
  • /Author: Rajiv;Biau
  • /CreationDate: D:20170523024954+00'00'
  • /Creator: Microsoft Word
  • /Keywords: ST
  • /ModDate: D:20170720134505+08'00'
  • /Title: Centagat Security Target
  • pdf_file_size_bytes: 1592329
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 76
  • /Author:
  • /CreationDate: D:20160519113148+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20160519113148+09'00'
  • /Producer: Acrobat Distiller 10.1.16 (Windows)
  • /Title:
  • pdf_file_size_bytes: 828521
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 136
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different