Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
iSAS, Release 1.0
BSI-DSZ-CC-0619-V2-2022
Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
BSI-DSZ-CC-0284-2005
name iSAS, Release 1.0 Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
category Network and Network-Related Devices and Systems Operating Systems
status active archived
not_valid_after 02.03.2027 01.09.2019
not_valid_before 02.03.2022 09.11.2005
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2a_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284b.pdf
manufacturer Frequentis AG Microsoft Corporation
manufacturer_web https://www.frequentis.com https://www.microsoft.com
security_level EAL4+, ADV_INT.3, ASE_TSS.2, AVA_VAN.5 EAL4+, ALC_FLR.3
dgst 56159ceb71850ff4 bbe326d5bfbd5036
heuristics/cert_id BSI-DSZ-CC-0619-V2-2022 BSI-DSZ-CC-0284-2005
heuristics/extracted_sars ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ADV_INT.3, ASE_TSS.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1 AVA_MSU.2, ALC_FLR.3, ATE_FUN.1, ADV_RCR.1, ASE_INT.1, ADV_LLD.1, ASE_ENV.1, ATE_IND.2, AVA_VLA.2, ATE_DPT.1, AGD_USR.1, ASE_REQ.1, ASE_SRE.1, ADV_IMP.1, ALC_LCD.1, ADV_HLD.2, ATE_COV.2, ASE_PPC.1, ASE_DES.1, ALC_DVS.1, ALC_TAT.1, ADV_FSP.2, ADV_IGS.1, AGD_ADM.1, ADV_FUN.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ADV_SPM.1
heuristics/extracted_versions 1.0 6.5.7226.0
maintenance_updates
pdf_data/cert_filename 0619V2a_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0619-V2-2022: 13
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
    • EAL4+: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_INT.3: 5
  • ALC:
    • ALC_FLR: 3
  • ASE:
    • ASE_TSS.2: 5
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • A:
    • A.VCS: 1
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • DeutscheTelekom:
    • Deutsche Telekom Security: 3
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/cert_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • BSI:
    • AIS 14: 1
    • AIS 19: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
  • ConfidentialDocument:
    • BSI-DSZ-CC-0619-V2, Deutsche Telekom Security GmbH (confidential document) [8] Security Target BSI-DSZ-CC-0619-V2-2022, Version 2.1, 02 February 2022, Secure Audio Switch: 1
    • Version 2.2, 19 January 2021, Secure Audio Switch Security Target, EWSE23EN90001 , FREQUENTIS AG (confidential document) [7] Evaluation Technical Report, Version 1.20, 03 February 2022, Summary of Evaluation Technical: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • list for the TOE, Version 1.3, 08 October 2021, Secure Audio Switch Configuration List (confidential document) [10] Guidance documentation for the TOE, V1.4, 26 July 2021, Secure Audio Switch Operational User: 1
pdf_data/cert_metadata
pdf_data/report_filename 0619V2a_pdf.pdf 0284a.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0619-V2-2022
    • cert_item: iSAS Release 1.0
    • cert_lab: BSI
    • developer: Frequentis AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
    • cert_id: BSI-DSZ-CC-0284-2005
    • cert_item: Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
    • cert_lab: BSI
    • developer: Microsoft Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0619-V2-2022: 13
  • DE:
    • BSI-DSZ-CC-0284-2005: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
    • EAL4+: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_INT.3: 5
  • ALC:
    • ALC_FLR: 3
  • ASE:
    • ASE_TSS.2: 5
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.1: 1
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 2
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.VCS: 1
  • A:
    • A.ACCESS_CONTROL: 2
    • A.COM_PROT: 2
    • A.CORRECT_HW: 2
    • A.INSTALL: 2
    • A.MANAGE: 2
    • A.NO_EVIL_ADM: 2
    • A.PHYS_PROTECT: 2
  • T:
    • T.AUTH_DAC: 1
    • T.DL_MISUSE: 1
    • T.OVERFLOW: 1
    • T.SPAM: 1
    • T.UNAUTHUSE: 1
    • T.UNAUTH_DAC: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 17
    • Microsoft Corporation: 6
pdf_data/report_keywords/eval_facility
  • DeutscheTelekom:
    • Deutsche Telekom Security: 3
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
  • BSI:
    • BSI 7125: 2
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 14: 1
    • AIS 19: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • BSI:
    • AIS 32: 1
    • AIS 33: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • BSI-DSZ-CC-0619-V2, Deutsche Telekom Security GmbH (confidential document) [8] Security Target BSI-DSZ-CC-0619-V2-2022, Version 2.1, 02 February 2022, Secure Audio Switch: 1
    • Version 2.2, 19 January 2021, Secure Audio Switch Security Target, EWSE23EN90001 , FREQUENTIS AG (confidential document) [7] Evaluation Technical Report, Version 1.20, 03 February 2022, Summary of Evaluation Technical: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • list for the TOE, Version 1.3, 08 October 2021, Secure Audio Switch Configuration List (confidential document) [10] Guidance documentation for the TOE, V1.4, 26 July 2021, Secure Audio Switch Operational User: 1
  • ConfidentialDocument:
    • Technical Report, BSI-DSZ-CC-0284-2005, Version 1, Datum 2005-09-16, TÜV Informationstechnik GmbH (confidential document) [7] Exchange Server 2003 Administration Guide and Exchange Server 2003 product help (part of the: 1
  • OutOfScope:
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation, too. B-11 BSI-DSZ-CC-0284-2005 Certification Report 5 Architectural Information: 1
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The relevant Guidance Documentation is delivered together with the software on: 1
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
    • of Exchange 2003 the components IMAP4, POP3, and X.400 protocol are disabled and therefore out of scope of the evaluation. The TOE runs on the platform Windows Server 2003 operating system (exact: 1
    • out of scope: 4
pdf_data/report_metadata
  • /Author: Federal Office for Information Security (BSI)
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20051220074356+01'00'
  • /Creator: Acrobat PDFMaker 7.0.5 für Word
  • /ModDate: D:20051220075600+01'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20051220064348
  • /Subject: BSI-DSZ-CC-0284-2005
  • /Title: Certification Report
  • pdf_file_size_bytes: 399534
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
pdf_data/st_filename 0619V2b_pdf.pdf 0284b.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL 4+: 1
    • EAL4: 8
    • EAL4 augmented: 1
  • EAL:
    • EAL4: 10
    • EAL4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_INT.3: 5
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.3: 3
    • ACM_SCP.1: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 9
    • ADV_FSP.2: 2
    • ADV_FUN.1: 1
    • ADV_HLD.1: 2
    • ADV_HLD.2: 3
    • ADV_IGS.1: 1
    • ADV_IMP.1: 3
    • ADV_LLD.1: 4
    • ADV_RCR.1: 5
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS.1: 3
    • ALC_FLR.3: 9
    • ALC_LCD.1: 2
    • ALC_TAT.1: 3
  • ASE:
    • ASE_REQ.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.2: 2
    • AVA_SOF.1: 2
    • AVA_VLA.2: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 11
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 1
    • FAU_SAA.1: 11
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FDP:
    • FDP_ETC.1: 12
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 33
    • FDP_IFC.1: 5
    • FDP_IFF: 69
    • FDP_IFF.1: 30
    • FDP_IFF.5: 4
    • FDP_IFF.5.1: 1
    • FDP_ITC: 20
    • FDP_ITC.1: 10
  • FMT:
    • FMT_MSA: 38
    • FMT_MSA.1: 5
    • FMT_MSA.3: 8
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 4
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
  • FDP:
    • FDP_ACC.1: 42
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 40
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC.1: 25
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 20
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_ACC.1: 1
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 52
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FRU:
    • FRU_RSA.1: 18
    • FRU_RSA.1.1: 2
  • FTP:
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.VCS: 5
  • OE:
    • OE.TEMPEST_: 1
    • OE.VCS: 5
  • A:
    • A.ACCESS_CONTROL: 3
    • A.COM_PROT: 3
    • A.CORRECT_HW: 3
    • A.INSTALL: 4
    • A.MANAGE: 4
    • A.NO_EVIL_ADM: 2
    • A.NO_EVIL_ADMIN: 1
    • A.PHYS_PROTECT: 4
  • O:
    • O.CONBLK: 13
    • O.DAC: 16
    • O.FILTER_EMAIL: 10
    • O.QUOTA: 12
    • O.RESTDIST: 11
  • OE:
    • OE.COM_PROT: 5
    • OE.DAC: 12
    • OE.INSTALL: 3
    • OE.PHYSICAL: 3
    • OE.PLATFORM_: 1
    • OE.PLATFORM_SUPPORT: 4
  • T:
    • T.AUTH_DAC: 4
    • T.DL_MISUSE: 4
    • T.OVERFLOW: 4
    • T.SPAM: 9
    • T.UNAUTHUSE: 3
    • T.UNAUTH_DAC: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 2
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜViT: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC4: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 4
      • SSL 3.0: 1
    • TLS:
      • TLS: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 5
    • malfunction: 7
    • physical tampering: 2
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • RFC:
    • RFC1725: 1
    • RFC1730: 1
    • RFC821: 11
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • touch entry device). Protection of TSF The TOE provides a Fail Secure security function. 1.4.2.3 Out of Scope The following firmware and hardware features are outside the scope of the defined TSF and are: 1
    • 12 1.4.2.3 Out of Scope: 2
    • Microphone_Inputs/Earpiece_Outputs are connected to the BLACK or RED VCS. The touch entry device is out of scope of the TOE. Therefore, this setup requires that the MOD iSAS-P is mounted visible, and the operator: 1
    • Out of Scope: 2
    • out of scope: 1
  • OutOfScope:
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
    • out of scope: 2
    • the TOE is Exchange in its default configuration, IMAP4, POP3, and X.400 protocols are disabled and out of scope in the evaluation. Security Target Page 9/64 1. Admin component, which includes the following: 1
pdf_data/st_metadata
  • /Author: Frequentis
  • /CreationDate: D:20220202143605+01'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: Secure audio switch, Trusted audio switch, Red/Black separation, Audio interface
  • /ModDate: D:20220202143605+01'00'
  • /Producer: Microsoft® Word 2019
  • /Subject: Security Target Lite
  • /Title: iSAS
  • pdf_file_size_bytes: 898592
  • pdf_hyperlinks: http://www.frequentis.com/
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 81
  • /Author: slabihou
  • /CreationDate: D:20050713145508+02'00'
  • /Creator: pdfFactory Pro www.pdffactory.com
  • /Producer: pdfFactory Pro 2.41 (Windows 2000 Professional German)
  • /Title: MS_EX_ST_1.9.doc
  • pdf_file_size_bytes: 285736
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different