Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Log Radar v3.2.15 with modules Console, Collector and Archiver
ISCB-5-RPT-C010-CR-v1a
IMELO-Secure, Version 1.1
BSI-DSZ-CC-1013-V2-2022
name Log Radar v3.2.15 with modules Console, Collector and Archiver IMELO-Secure, Version 1.1
category Detection Devices and Systems Other Devices and Systems
scheme MY DE
status archived active
not_valid_after 01.09.2019 14.04.2027
not_valid_before 13.02.2013 14.12.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C010-CR-v1a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LogRadar_ST-Document_v1-0R.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2b_pdf.pdf
manufacturer TecForte Sdn Bhd SSI Schäfer Plastics GmbH
manufacturer_web https://www.tecforte.com https://ssi-plastic.com
security_level EAL2 ASE_OBJ.2, EAL1+, ASE_REQ.2, ASE_SPD.1
dgst 5e01e4eeaa77cb17 3da0a90c7bb5a9cd
heuristics/cert_id ISCB-5-RPT-C010-CR-v1a BSI-DSZ-CC-1013-V2-2022
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ALC_CMC.1, AVA_VAN.1, ASE_OBJ.2, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ALC_DEL.1, ASE_TSS.1, ASE_REQ.2, ADV_FSP.1
heuristics/extracted_versions 3.2.15 1.1
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1013-2017
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1013-2017
heuristics/scheme_data
  • cert_no: 2013-002-C010
  • certification_date: 13.02.2013
  • developer: TecForte Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Detection Devices and Systems
    • cert_id: C010
    • certification_date: 13.02.2013
    • developer: Leong Wei Khuan Level 27, Quill 7,Jalan Stesen Sentral 5,Kuala Lumpur Sentral,50470 Kuala Lumpur,MALAYSIA. URL: http://www.tecforte.comEmail: [email protected]: +603 2776 6936Fax: +603 2776 6999
    • expiration_date: 13.02.2018
    • mutual_recognition: CCRA
    • product: Log Radar v3.2.15 with modules Console, Collector and Archiver
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/ISCB-5-RPT-C010-CR-v1a.pdf
    • scope: The Target of Evaluation (TOE) is Log Radar v3.2.15 with modules Console, Collector and Archiver; commonly referred as LogRadar. LogRadar is an automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications. Its key aims are to collect, normalise process and manage such information (logs) from a real time context. The modules included in the scope of the security evaluation and certification are: Console - acts as the interfacing point between user and TOE, Collector - its core function is to collect streams of data as and when they occur and process these device specific logs into a common and normalised form, and Archiver - functions as a backup daemon. In the context of the evaluation, the TOE is expected to provide the following major security features: Identification and authentication – the TOE provides user identification and authentication independent from the operating system on which it operates on. Security audit – the TOE records each individual user session and tracks each action within the session. Granular access control – the TOE allows users access permission within the application to be dynamically and granularly assigned via users and group memberships. Password management – the TOE provides a full password management function including the management of password policy rules as well as password expiry settings. Sessions management – the TOE maintain session management and restricts a single login for only a single valid session. Socket layer – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Import and export of configuration data – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Automated archive – the TOE provides a mechanism where the auto archival of aggregated reports, rawlogs and syslogs will be automatically hashed with MD-5 checksum, archived with AES encryption and stored at predetermined times. Real time syslog collection – the TOE provides the ability for authorised users to dynamically configure the TOE to listen to syslog streams from network devices, servers and/or any other supported applications.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/LogRadar_ST-Document_v1-0R.pdf
    • type: Automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications.
  • expiration_date: 13.02.2018
  • level: EAL2
  • product: Log Radar v3.2.15 with modules Console, Collector and Archiver
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/80
  • category: Other products
  • cert_id: BSI-DSZ-CC-1013-V2-2022
  • certification_date: 14.12.2022
  • enhanced:
    • applicant: SSI Schäfer Plastics GmbH Kalkofen 6 58638 Iserlohn
    • assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2c_pdf.pdf?__blob=publicationFile&v=3
    • certification_date: 14.12.2022
    • description: The TOE is referred to as IMELO-Secure 1.0. It is a waste bin identification system developed by Institut für Entsorgung und Umwelttechnik GmbH. The TOE is evaluated and certified conform to the PP „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste bin identification systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1013-V2-2022', 'description': 'Environment.'}), frozendict({'id': 'BSI-DSZ-CC.1013-2017', 'description': 'Security Target'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 13.12.2027
    • product: IMELO-Secure, Version 1.1
    • protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2b_pdf.pdf?__blob=publicationFile&v=3
  • product: IMELO-Secure, Version 1.1
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/1013_1013V2.html
  • vendor: SSI Schäfer Plastics GmbH
heuristics/protection_profiles {} f1e8c937d15e713a
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf
pdf_data/cert_filename 1013V2c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1013-V2-2022: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0010-2004: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
pdf_data/cert_keywords/cc_sar
  • ASE:
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem"
  • /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem
  • /Title: Zertifikat BSI-DSZ-CC-1013-V2-2022
  • pdf_file_size_bytes: 457534
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ISCB-5-RPT-C010-CR-v1a.pdf 1013V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-1013-V2-2022
    • cert_item: IMELO-Secure, Version 1.1
    • cert_lab: BSI
    • developer: SSI Schäfer Plastics GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C010-CR-v1a: 31
  • DE:
    • BSI-DSZ-CC-1013-: 1
    • BSI-DSZ-CC-1013-2017: 2
    • BSI-DSZ-CC-1013-V2-2022: 11
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0010-2004: 1
    • BSI-PP-0010-2004: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 12
  • EAL:
    • EAL 1: 5
    • EAL 2: 1
    • EAL 4: 1
    • EAL1+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DEL.1: 1
    • ALC_FLR: 1
  • ASE:
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 4
    • ASE_SPD.1: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA-1: 1
  • SHA:
    • SHA2:
      • SHA-256: 5
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 4
  • VPN:
    • VPN: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • BSI:
    • AIS 32: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_metadata
  • /Author: Norhazimah Abdul Malek
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20130218150743+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: TecForte Sdn Bhd
  • /Document Type: REPORT
  • /Identifier: ISCB-5-RPT-C010-CR-v1a
  • /Index: ISCB_TMP_011
  • /Keywords: Log Radar v3.2.15
  • /ModDate: D:20130218150748+08'00'
  • /Phase: External
  • /Producer: Adobe PDF Library 10.0
  • /Released: 13 February 2013
  • /ST: LogRadar Security Target
  • /ST Version: v1.0R
  • /SourceModified: D:20130218070717
  • /Sponsor: TecForte Sdn Bhd
  • /Subject: Log Radar v3.2.15 with modules Console, Collector and Archiver
  • /TOE: Log Radar
  • /TOE Name: LogRadar
  • /TOE Version: v3.2.15
  • /Title: C010 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 476755
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
pdf_data/st_filename LogRadar_ST-Document_v1-0R.pdf 1013V2b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0010-: 1
    • BSI-PP-0010-2004: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 4
  • EAL:
    • EAL 1: 1
    • EAL1: 1
    • EAL1 augmented: 1
    • EAL1+: 8
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMS: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 2
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_GEN.3: 15
    • FAU_GEN.3.1: 1
    • FAU_GEN.3.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_COP.1: 23
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 14
    • FDP_ACC.2: 8
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 10
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 9
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 1
    • FDP_IFF: 2
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 8
    • FIA_UAU: 1
    • FIA_UAU.1: 5
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 2
    • FMT_MSA: 3
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_REV: 2
    • FMT_REV.1: 6
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SAE: 1
    • FMT_SAE.1: 6
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
    • FMT_SMT: 1
  • FPT:
    • FPT_ETC: 4
    • FPT_ETC.2: 8
    • FPT_ETC.2.1: 1
    • FPT_ETC.2.2: 1
    • FPT_ETC.2.3: 1
    • FPT_ETC.2.4: 2
    • FPT_FMT: 1
    • FPT_ITC: 2
    • FPT_ITC.2: 8
    • FPT_ITC.2.1: 1
    • FPT_ITC.2.2: 1
    • FPT_ITC.2.3: 1
    • FPT_ITC.2.4: 1
    • FPT_ITC.2.5: 2
    • FPT_STM.1: 7
    • FPT_TDC: 1
  • FRU:
    • FRU_RSA: 1
    • FRU_RSA.1: 8
    • FRU_RSA.1.1: 1
    • FRU_SRA.1: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_TRP: 1
    • FTP_TRP.1: 10
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_DAU: 6
    • FDP_DAU.1: 6
    • FDP_DAU.1.1: 5
    • FDP_DAU.1.2: 5
    • FDP_ITT: 5
    • FDP_ITT.1: 1
    • FDP_ITT.5: 16
    • FDP_ITT.5.1: 6
    • FDP_SDI: 3
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 5
  • FPT:
    • FPT_FLS.1: 2
  • FRU:
    • FRU_FLT.1: 6
    • FRU_FLT.1.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.DIRECT: 2
    • A.INTEGR: 3
    • A.LOCATE: 3
    • A.MANAGE: 2
    • A.NOEVIL: 3
    • A.NOTRST: 2
    • A.PROTCT: 2
    • A.REM_OPER: 1
    • A.TIME: 6
  • O:
    • O.ACCESS: 19
    • O.AUDITS: 7
    • O.EADMIN: 12
    • O.EXPORT: 10
    • O.IDAUTH: 29
    • O.INTEGR: 6
    • O.PROTCT: 9
    • O.SECRMT: 2
    • O.TMSTMP: 2
  • OE:
    • OE.INSTAL: 4
    • OE.INSTALL: 1
    • OE.INTEGR: 5
    • OE.OFLOWS: 5
    • OE.PERSON: 7
    • OE.PHYCAL: 7
    • OE.TMSTMP: 6
  • T:
    • T.COMINT: 3
    • T.DLOSS: 5
    • T.IMPCON: 3
    • T.INFLUX: 3
    • T.INSECUSE: 3
    • T.INTEGR: 3
    • T.LOSSOF: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.UNATHDVCE: 2
  • OE:
    • OE.ID: 1
  • R:
    • R.ID: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 11
  • SHA:
    • SHA1:
      • SHA-1: 11
      • SHA1: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 4
  • VPN:
    • VPN: 1
  • VPN:
    • VPN: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1321: 2
    • RFC 3268: 2
  • CC:
    • CCMB-20012-09-001: 1
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 3
    • CCMB-2012-09-003: 3
    • CCMB-2012-09-004: 1
pdf_data/st_metadata
  • /Author: WKhuan
  • /Company:
  • /CreationDate: D:20130115175724+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /ModDate: D:20130115175735+08'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20130115013704
  • pdf_file_size_bytes: 614209
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
  • /Author: Hartmut Möllmann;[email protected];Matthias Spielmann;Ulrich Schurkus
  • /Keywords: CC-Dokumentation
  • /Subject: Sicherheitsvorgaben
  • /Title: Sicherheitsvorgabe für das Behälter Identifikationssystem „IMELO-Secure“ Version 1.0
  • pdf_file_size_bytes: 747264
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different