Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

SANRISE Universal Storage Platform CHA/DKA Program, TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
JISEC-CC-CRP-C0102
Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
JISEC-CC-CRP-C0200
name SANRISE Universal Storage Platform CHA/DKA Program, TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00 Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
not_valid_before 2007-06-27 2008-12-24
not_valid_after 2013-10-07 2014-04-08
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf
state/report/pdf_hash 2e60ea5270fbc0f11c2112143832445e6142b856f0a0892f3ab31b05cfe3884a 50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c
state/report/txt_hash 9ad5433a32d590aac96300931d64097f1b55f8e70fd739f8c5e99d49e13e407c affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658
state/st/pdf_hash 30bcb2eaa6f18b4fe7c9926057263a785d8c053585dc6ee05d495c733c9af099 22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800
state/st/txt_hash b52cd8c677fe4c51cf6d131f8b55862970d9b7f0953c265a60a45887d1a5b538 06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5
heuristics/cert_id JISEC-CC-CRP-C0102 JISEC-CC-CRP-C0200
heuristics/scheme_data
  • cert_id: C0102
  • supplier: Hitachi, Ltd.
  • toe_overseas_name: TagmaStore Universal Storage Platform CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program 50-04-34-00/00
  • expiration_date: 2013-10
  • claim: EAL2
  • certification_date: 2007-06
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0102_it5068.html
  • toe_japan_name: SANRISE Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
  • enhanced:
    • product: SANRISE Universal Storage Platform CHA/DKA Program TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program
    • toe_version: 50-04-34-00/00
    • product_type: IT Product (Storage Control Software)
    • certification_date: 2007-06-27
    • cc_version: 2.1
    • assurance_level: EAL2
    • vendor: Hitachi, Ltd.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0102_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0102_est.pdf
    • description: PRODUCT DESCRIPTION TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”. TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
  • cert_id: C0200
  • supplier: Hitachi, Ltd.
  • toe_overseas_name: -----
  • expiration_date: 2014-04
  • claim: EAL2
  • certification_date: 2008-12
  • toe_overseas_link: None
  • toe_japan_name: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html
  • enhanced:
    • product: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program
    • toe_version: 60-02-32-00/00(R6-02A-14)
    • product_type: IT Product (Storage Control Software)
    • certification_date: 2008-12-24
    • cc_version: 2.3
    • assurance_level: EAL2
    • vendor: Hitachi, Ltd.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0200_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0200_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.
heuristics/scheme_data/cert_id C0102 C0200
heuristics/scheme_data/certification_date 2007-06 2008-12
heuristics/scheme_data/enhanced/cc_version 2.1 2.3
heuristics/scheme_data/enhanced/certification_date 2007-06-27 2008-12-24
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”. TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes) PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.
heuristics/scheme_data/enhanced/evaluation_facility Electronic Commerce Security Technology Laboratory Inc. Evaluation Center Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
heuristics/scheme_data/enhanced/product SANRISE Universal Storage Platform CHA/DKA Program TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0102_erpt.pdf https://www.ipa.go.jp/en/security/c0200_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0102_est.pdf https://www.ipa.go.jp/en/security/c0200_est.pdf
heuristics/scheme_data/enhanced/toe_version 50-04-34-00/00 60-02-32-00/00(R6-02A-14)
heuristics/scheme_data/expiration_date 2013-10 2014-04
heuristics/scheme_data/toe_japan_name SANRISE Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00 Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0102_it5068.html None
heuristics/scheme_data/toe_overseas_name TagmaStore Universal Storage Platform CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program 50-04-34-00/00 -----
pdf_data/report_filename c0102_erpt.pdf c0200_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0102-01: 1
  • Certification No. C0102: 1
  • CRP-C0200-01: 1
  • Certification No. C0200: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.ILLEGAL_XCNTL: 1
    • T.TSF_COMP: 1
    • T.LP_LEAK: 1
    • T.CHG_CONFIG: 1
  • A:
    • A.NOEVIL: 1
    • A.NOEVIL_MNT: 1
    • A.PHYSICAL_SEC: 1
    • A.ILLEGAL_SOFT: 1
    • A.CONNECT_STORAGE: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/standard_id/CC
  • CCIMB-99-032: 2
  • CCIMB-99-033: 2
  • CCIMB-99-031: 1
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408:1999: 1
  • ISO/IEC 15408:2005: 1
  • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 1
pdf_data/report_metadata//CreationDate D:20070918163642+09'00' D:20090401163719+09'00'
pdf_data/report_metadata//ModDate D:20070918163642+09'00' D:20090401163719+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 104544 147813
pdf_data/report_metadata/pdf_number_of_pages 20 24
pdf_data/st_filename c0102_est.pdf c0200_est.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 512: 1
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.ADM_AUTH: 9
    • O.ADM_ROLE: 5
    • O.SEC_COMM: 8
    • O.HOST_AUTH: 5
    • O.HOST_ACCESS: 8
    • O.AUD_GEN: 6
  • T:
    • T.ILLEGAL_XCNTL: 3
    • T.TSF_COMP: 3
    • T.LP_LEAK: 3
    • T.CHG_CONFIG: 3
  • A:
    • A.NOEVIL: 3
    • A.NOEVIL_MNT: 3
    • A.PHYSICAL_SEC: 3
    • A.ILLEGAL_SOFT: 3
    • A.CONNECT_STORAGE: 3
  • OE:
    • OE.NOEVIL: 2
    • OE.NOEVIL-MNT: 1
    • OE.PHYSICAL_SEC: 3
    • OE.ILLEGAL_SOFT: 2
    • OE.CONNECT_STORAGE: 3
    • OE.NOEVIL_MNT: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_SPM.1: 4
  • ADV_FSP.1: 2
  • ADV_HLD.1: 3
  • ADV_RCR.1: 2
  • ADV_FSP.1: 2
  • ADV_HLD.1: 2
  • ADV_RCR.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_HLD.1 3 2
pdf_data/st_keywords/cc_sar/ADV/ADV_RCR.1 2 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_UID.1: 4
    • FIA_UID.2: 13
  • FMT:
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1: 13
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1: 13
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SAE.1: 10
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
  • FPT:
    • FPT_RVM.1: 13
    • FPT_RVM.1.1: 1
    • FPT_STM.1: 14
    • FPT_STM.1.1: 1
    • FPT_SEP.1: 12
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FAU:
    • FAU_GEN.1: 21
    • FAU_GEN.2: 11
    • FAU_SAR.1: 12
    • FAU_STG.1: 13
    • FAU_STG.3: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_COP.1: 17
    • FCS_CKM.1: 20
    • FCS_CKM.2: 16
    • FCS_CKM.4: 18
    • FCS_COP.1.1: 1
    • FCS_CKM.1.1: 1
    • FCS_CKM.2.1: 1
    • FCS_CKM.4.1: 1
  • FDP:
    • FDP_ACC.1: 19
    • FDP_IFC.1: 2
    • FDP_ACF.1: 16
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_ATD: 27
    • FIA_ATD.1: 6
    • FIA_USB: 27
    • FIA_USB.1: 6
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 21
    • FIA_SOS: 29
    • FIA_SOS.1: 2
    • FIA_UAU.2: 17
    • FIA_UID.1: 8
    • FIA_UAU.7: 13
    • FIA_UAU.7.1: 1
    • FIA_UID.2: 22
    • FIA_MSA.1.1: 1
    • FIA_MSA.3.1: 1
    • FIA_MSA.3.2: 1
    • FIA_UAU.5: 19
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MSA.1: 16
    • FMT_SMF.1: 18
    • FMT_SMR.1: 20
    • FMT_MSA.3: 16
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MOF.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.2: 9
    • FMT_MOF.1.1: 1
  • FPT:
    • FPT_STM.1: 17
    • FPT_RVM.1: 32
    • FPT_SEP.1: 32
    • FPT_STM.1.1: 1
    • FPT_RVM.1.1: 1
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 15
  • FDP_ACC.1.1: 1
  • FDP_ACF.1: 8
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 4
  • FDP_ACC.1: 19
  • FDP_IFC.1: 2
  • FDP_ACF.1: 16
  • FDP_ITC.1: 6
  • FDP_ITC.2: 6
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 15 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 8 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 4 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.1: 4
  • FIA_UID.2: 13
  • FIA_ATD: 27
  • FIA_ATD.1: 6
  • FIA_USB: 27
  • FIA_USB.1: 6
  • FIA_AFL.1: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU.1: 21
  • FIA_SOS: 29
  • FIA_SOS.1: 2
  • FIA_UAU.2: 17
  • FIA_UID.1: 8
  • FIA_UAU.7: 13
  • FIA_UAU.7.1: 1
  • FIA_UID.2: 22
  • FIA_MSA.1.1: 1
  • FIA_MSA.3.1: 1
  • FIA_MSA.3.2: 1
  • FIA_UAU.5: 19
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 4 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 13 22
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.3: 11
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1: 13
  • FMT_SMR.1: 14
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1: 13
  • FMT_MSA.2: 11
  • FMT_MSA.2.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SAE.1: 10
  • FMT_SAE.1.1: 1
  • FMT_SAE.1.2: 1
  • FMT_MSA.1: 16
  • FMT_SMF.1: 18
  • FMT_SMR.1: 20
  • FMT_MSA.3: 16
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MOF.1: 13
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.2: 9
  • FMT_MOF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 13 16
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 11 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 16
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 13 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 14 20
pdf_data/st_keywords/cc_sfr/FPT/FPT_RVM.1 13 32
pdf_data/st_keywords/cc_sfr/FPT/FPT_SEP.1 12 32
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 14 17
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSLv3.0: 3
      • SSL: 16
    • TLS:
      • TLSv1.0: 3
      • TLS: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
    • FIPS PUB 180-2: 1
  • PKCS:
    • PKCS#1: 1
  • CC:
    • CCMB-2005-08-001: 4
    • CCMB-2005-08-002: 3
    • CCMB-2005-08-003: 2
pdf_data/st_keywords/standard_id/CC
  • CCIMB-99-031: 1
  • CCIMB-99-032: 1
  • CCIMB-99-033: 1
  • CCMB-2005-08-001: 4
  • CCMB-2005-08-002: 3
  • CCMB-2005-08-003: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 231671
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
  • /CreationDate: D:20070918131359+09'00'
  • /Author: hiwa.sysdeptdm
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20070918131359+09'00'
  • /Title: Microsoft Word - User Data Protection Security Target_Eng.doc
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 516948
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
  • /CreationDate: D:20090330094022+09'00'
  • /Subject: CC EAL2 Security Target
  • /Author: 八木
  • /Creator: Word 用 Acrobat PDFMaker 7.0.7
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20090330094033+09'00'
  • /Company: Hitachi
  • /Title: USP_V ST
  • pdf_hyperlinks:
pdf_data/st_metadata//Author hiwa.sysdeptdm 八木
pdf_data/st_metadata//CreationDate D:20070918131359+09'00' D:20090330094022+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2 Word 用 Acrobat PDFMaker 7.0.7
pdf_data/st_metadata//ModDate D:20070918131359+09'00' D:20090330094033+09'00'
pdf_data/st_metadata//Title Microsoft Word - User Data Protection Security Target_Eng.doc USP_V ST
pdf_data/st_metadata/pdf_file_size_bytes 231671 516948
pdf_data/st_metadata/pdf_number_of_pages 57 93
dgst 5647d3c66dfdd6f9 96e36510c2c8ba64