Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Rambus PKE4 Core version 4.1
NSCIB-CC-0503107-CR
EPSON LX-10020M/WF-M21000 with FAX 1.00
JISEC-CC-CRP-C0728-01-2021
name Rambus PKE4 Core version 4.1 EPSON LX-10020M/WF-M21000 with FAX 1.00
category ICs, Smart Cards and Smart Card-Related Devices and Systems Multi-Function Devices
scheme NL JP
not_valid_after 11.12.2028 23.08.2026
not_valid_before 11.12.2023 23.08.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0503107-CERT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0728_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0503107-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0728_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-LITE]%20Rambus_PKE4_Core_version_4.1_Security_Target_Lite_RevD.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0728_est.pdf
manufacturer Rambus Inc. SEIKO EPSON CORPORATION
manufacturer_web https://www.rambus.com/ https://www.epson.com/
security_level EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 EAL2, ALC_FLR.2
dgst 505cf4bb7f73e46d 2bd1db704b7abf3f
heuristics/cert_id NSCIB-CC-0503107-CR JISEC-CC-CRP-C0728-01-2021
heuristics/cert_lab []
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 4.1 1.00
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0728
  • certification_date: 01.08.2021
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0728
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000a4z-att/c0728_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral (MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE Security functions The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: EPSON LX-10020M/WF-M21000 with FAX
    • product_type: Multifunction Peripheral
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000a4z-att/c0728_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000a4z-att/c0728_est.pdf
    • toe_version: 1.00
    • vendor: SEIKO EPSON CORPORATION
  • expiration_date:
  • supplier: SEIKO EPSON CORPORATION
  • toe_japan_name: EPSON LX-10020M / WF-M21000 with FAX1.00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0728_it0774.html
  • toe_overseas_name: EPSON LX-10020M / WF-M21000 with FAX1.00
heuristics/protection_profiles {} 43ce79b420f23a00
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/cert_filename NSCIB-CC-0503107-CERT.pdf c0728_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-23-0503107: 1
  • JP:
    • JISEC-CC-CRP-C0728-01-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL7: 1
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.3: 2
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: kruitr
  • /CreationDate: D:20231220083238+01'00'
  • /Creator: Bullzip PDF Printer (11.10.0.2761)
  • /ModDate: D:20231220083308+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-0503107-CERT.doc
  • pdf_file_size_bytes: 266966
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20210921134655+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210921135808+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 139870
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename NSCIB-CC-0503107-CR.pdf c0728_erpt.pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-0503107-CR
    • cert_item: PKE4 Core version 4.1
    • cert_lab: SGS Brightsight B.V.
    • developer: Rambus Inc
  • NL:
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-0503107-CR: 12
  • JP:
    • JISEC-CC-CRP-C0728-01-2021: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 6
    • EAL4 augmented: 3
    • EAL4+: 7
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_DVS.2: 2
  • ATE:
    • ATE_DPT.2: 2
    • ATE_FUN: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 6
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 13
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 2
    • EdDSA:
      • EdDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/crypto_scheme
  • PKE:
    • PKE: 4
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 1
pdf_data/report_keywords/ecc_curve
  • Curve:
    • Curve25519: 1
  • Edwards:
    • Ed25519: 1
    • Ed448: 1
  • NIST:
    • NIST P-192: 2
    • NIST P-224: 2
    • NIST P-256: 2
    • NIST P-384: 2
    • NIST P-521: 2
    • P-192: 2
    • P-224: 2
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Fault Injection: 1
  • SCA:
    • DPA: 1
    • side-channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 2
    • JIL-AM: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_keywords/javacard_api_const
  • curves:
    • SM2: 1
    • X25519: 1
    • X448: 1
pdf_data/report_metadata
  • /CreationDate: D:20210921134823+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210921140358+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 409027
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename [ST-LITE] Rambus_PKE4_Core_version_4.1_Security_Target_Lite_RevD.pdf c0728_est.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 10
    • EAL4 augmented: 2
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 3
    • ADV_FSP: 1
    • ADV_FSP.4: 2
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 2
    • AGD_PRE: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.1: 2
    • ATE_DPT.2: 7
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 11
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 34
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.4: 28
    • FCS_CKM.4.1: 1
    • FCS_COP: 37
    • FCS_COP.1: 16
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 15
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 30
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 6
    • FDP_ITT.1: 10
    • FDP_ITT.1.1: 1
  • FMT:
    • FMT_MSA.3: 2
  • FPT:
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 10
    • FPT_ITT.1.1: 1
  • FRU:
    • FRU_FLT.2: 11
    • FRU_FLT.2.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 24
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 24
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 12
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.RNG: 5
  • D:
    • D.J: 1
  • O:
    • O.ECC: 8
    • O.RSA: 7
  • OE:
    • OE.RNG: 4
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 11
    • D.DOC: 42
    • D.FUNC: 26
    • D.PROT: 8
  • O:
    • O.AUDIT: 5
    • O.AUDIT_ACCESS: 4
    • O.AUDIT_STORAGE: 4
    • O.CONF: 10
    • O.DOC: 10
    • O.FUNC: 5
    • O.INTERFACE: 5
    • O.PROT: 5
    • O.SOFTWARE: 5
    • O.USER: 11
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_STORAGE: 2
    • OE.INTERFACE: 3
    • OE.PHISICAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 7
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 38
    • ECDH:
      • ECDH: 11
    • ECDSA:
      • ECDSA: 8
    • EdDSA:
      • EdDSA: 9
  • FF:
    • DH:
      • Diffie-Hellman: 6
    • DSA:
      • DSA: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • KEX:
    • Key exchange: 1
  • PKE:
    • PKE: 36
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 1
  • IPsec:
    • IPsec: 18
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 7
  • RNG:
    • RNG: 9
  • TRNG:
    • TRNG: 5
pdf_data/st_keywords/ecc_curve
  • Curve:
    • Curve25519: 1
  • Edwards:
    • Ed25519: 3
    • Ed448: 5
  • NIST:
    • NIST P-192: 6
    • NIST P-224: 5
    • NIST P-256: 6
    • NIST P-384: 6
    • NIST P-521: 6
    • P-192: 6
    • P-224: 5
    • P-256: 6
    • P-384: 6
    • P-521: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Fault Injection: 1
    • fault injection: 1
    • malfunction: 1
  • SCA:
    • DPA: 3
    • SPA: 1
    • side channel: 1
    • side-channel: 6
    • template attacks: 1
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
  • CC:
    • CCMB-2017-04-0004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 186-4: 6
    • FIPS PUB 140-2: 1
  • NIST:
    • NIST SP 800-186: 4
  • PKCS:
    • PKCS#1: 4
  • RFC:
    • RFC 5639: 5
    • RFC 7748: 4
    • RFC 8032: 5
pdf_data/st_keywords/javacard_api_const
  • curves:
    • SM2: 16
    • X25519: 1
    • X448: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 240 in [PP] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE 241 in [PP] This refinement refers to downloading of embedded software. This refinement: 1
    • This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP] This refinement is applicable without any adjustments. Guidance documents: 1
    • contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP] The ST redefines this refinement as follows. The Functional Specification: 1
    • in [PP] This refinement is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP] This refinement is out of scope: 1
    • mechanisms. 218 in [PP] This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP] This refinement is applicable without any adjustments. It must be: 1
    • must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP] This refinement relates to physical testing. This refinement is out of: 1
    • out of scope: 12
    • out of scope for the TOE. AVA_VAN 245 in [PP] The ST redefines this refinement as follows. The vulnerability: 1
    • related to the development and production of the TOE. ALC_CMS 199 in [PP] This refinement is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery: 1
    • to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP] This refinement refers to features that do not provide functionality but: 1
    • transitions of power save modes if provided by the TOE. 210 in [PP] This refinement in [PP] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP] This: 1
pdf_data/st_metadata
  • /Author: 0086205
  • /CreationDate: D:20210910135011+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210910135011+09'00'
  • /Producer: Acrobat Distiller 15.0 (Windows)
  • /Title: Microsoft Word - 英文Security Target_(認証番号C0728).docx
  • pdf_file_size_bytes: 847436
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 72
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different