Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Xerox WorkCentre 5632/5638/5645/5655/5665/5675/5687 Multifunction Systems
383-4-124
KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
KECS-ISIS-0468-2013
name Xerox WorkCentre 5632/5638/5645/5655/5665/5675/5687 Multifunction Systems KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA KR
not_valid_after 15.05.2017 01.06.2019
not_valid_before 26.11.2010 08.11.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/xerox-work-5632-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-13-37%20KOMSCO%20JK21%20V1.0%20on%20S3CT9KAKCKW(eng).pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/xerox-work-5632-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK21-TR-0001]%20Security%20Target-Lite-e-v1.1.pdf
manufacturer Xerox Corporation KOMSCO
manufacturer_web https://www.xerox.com https://www.komsco.com
security_level EAL3+, ALC_FLR.3 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 6152e53b60c0eaec fd0beec036b21950
heuristics/cert_id 383-4-124 KECS-ISIS-0468-2013
heuristics/cert_lab CANADA []
heuristics/cpe_matches cpe:2.3:h:xerox:workcentre:5645:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre:5675:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre:5665:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre:5655:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2009-1656 {}
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 5655, 5632, 5675, 5687, 5638, 5665, 5645 1.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009
heuristics/scheme_data
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, ANSSI-CC-2012/72
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, ANSSI-CC-2012/72
maintenance_updates
pdf_data/report_filename xerox-work-5632-cert-eng.pdf KECS-CR-13-37 KOMSCO JK21 V1.0 on S3CT9KAKCKW(eng).pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-124-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-124-CR: 1
  • DE:
    • BSI-DSZ-CC-0719: 3
    • BSI-DSZ-CC-0719-2011: 1
  • FR:
    • ANSSI-CC-2012/70: 4
  • KR:
    • KECS-ISIS-0468-2013: 1
  • NL:
    • CC-2011-002: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 5
    • EAL 3 augmented: 2
    • EAL 3+: 1
    • EAL3+: 1
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 3
    • EAL6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 2
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 3
    • ADV_TDS.4: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.3: 3
    • ATE_FUN.1: 2
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 8
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 1
  • Samsung:
    • Samsung: 8
pdf_data/report_keywords/eval_facility
  • KISA:
    • KISA: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 1
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 186-2: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
  • BSI:
    • AIS 34: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
  • SCP:
    • SCP02: 1
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/report_metadata
  • /Author: rareade
  • /CreationDate: D:20101129163935Z
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20101216093415-05'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Microsoft Word - 383-4-124 CR v0.1e.doc
  • pdf_file_size_bytes: 194708
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Author: 이은경
  • /CreationDate: D:20131107180619+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131107180619+09'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 평가단위보고서(ADV_ARC.1)
  • pdf_file_size_bytes: 571329
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename xerox-work-5632-sec-eng.pdf [JK21-TR-0001] Security Target-Lite-e-v1.1.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0719-: 1
    • BSI-DSZ-CC-0719-2011: 3
  • FR:
    • ANSSI-CC-2012/70: 3
    • ANSSI-CC-2012/72: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 6
  • EAL:
    • EAL 5+: 1
    • EAL3: 1
    • EAL4: 3
    • EAL4+: 1
    • EAL5: 11
    • EAL5 augmented: 1
    • EAL5+: 13
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 5
    • ADV_FSP.2: 4
    • ADV_FSP.3: 2
    • ADV_TDS.1: 5
    • ADV_TDS.2: 3
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.3: 2
    • ALC_CMS.1: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 4
    • ALC_FLR.3: 11
    • ALC_LCD.1: 4
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 6
    • ASE_OBJ.2: 4
    • ASE_REQ.1: 2
    • ASE_REQ.2: 1
    • ASE_SPD.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 3
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 6
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC.1: 15
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 19
    • ADV_IMP.1: 13
    • ADV_INT.2: 11
    • ADV_TDS.1: 2
    • ADV_TDS.3: 5
    • ADV_TDS.4: 19
  • AGD:
    • AGD_OPE.1: 17
    • AGD_PRE.1: 10
  • ALC:
    • ALC_CMC.4: 17
    • ALC_CMS.1: 1
    • ALC_CMS.5: 10
    • ALC_DEL.1: 7
    • ALC_DVS.1: 1
    • ALC_DVS.2: 20
    • ALC_LCD.1: 9
    • ALC_TAT.1: 2
    • ALC_TAT.2: 13
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 14
    • ASE_INT.1: 16
    • ASE_OBJ.2: 13
    • ASE_REQ.1: 2
    • ASE_REQ.2: 15
    • ASE_SPD.1: 10
    • ASE_TSS.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 7
    • ATE_DPT.1: 2
    • ATE_DPT.3: 10
    • ATE_FUN.1: 13
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.4: 2
    • AVA_VAN.5: 20
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 13
    • FAU_SAR.1: 9
    • FAU_SAR.2: 7
    • FAU_STG.1: 9
    • FAU_STG.3: 1
    • FAU_STG.4: 7
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.4: 11
    • FCS_COP.1: 26
    • FCS_COP.1.1: 6
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 40
    • FDP_IFC.1.1: 4
    • FDP_IFF: 1
    • FDP_IFF.1: 35
    • FDP_IFF.1.1: 4
    • FDP_IFF.1.2: 4
    • FDP_IFF.1.3: 4
    • FDP_IFF.1.4: 4
    • FDP_IFF.1.5: 4
    • FDP_ITC.1: 10
    • FDP_ITC.2: 9
    • FDP_RIP.1: 19
    • FDP_RIP.1.1: 3
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
    • FDP_UIT: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 15
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_UAU.1: 8
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 3
    • FTP_STM.1: 1
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 7
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS.1: 3
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 12
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 2
    • FCS_COP: 6
    • FCS_COP.1: 44
    • FCS_COP.1.1: 7
    • FCS_RNG: 2
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.2: 15
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 22
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 9
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_ITT.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 2
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 22
    • FIA_UAU.1.1: 7
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 7
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 16
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 7
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 5
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 8
    • FPT_RCV.2: 1
    • FPT_RCV.3: 6
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.EXTERNAL_SVC: 4
    • A.EXT_RFC_COMPLIANT: 5
    • A.INSTALL: 3
    • A.MANAGE: 3
    • A.NETWORK: 2
    • A.NEWORK: 1
    • A.NO_EVIL_ADM: 5
    • A.SAME_CONTROL: 4
    • A.SAME_COTNROL: 1
  • O:
    • O.AUDITS: 6
    • O.CONTROL_: 1
    • O.CONTROL_ACC: 1
    • O.CONTROL_ACCES: 1
    • O.CONTROL_ACCESS: 3
    • O.FAXLINE: 7
    • O.MANAGE: 5
    • O.PROTECT_CO: 1
    • O.PROTECT_COM: 5
    • O.PROTECT_DAT: 5
    • O.RECOVER: 5
  • OE:
    • OE.ACCESS: 2
    • OE.ADMIN: 8
    • OE.EXTERNAL_SV: 1
    • OE.EXTERNAL_SVC: 1
    • OE.INSTALL: 4
    • OE.NETWORK: 3
    • OE.PROTECT_CO: 2
    • OE.PROTECT_COM: 2
  • T:
    • T.COMM_SEC: 5
    • T.INFAX: 3
    • T.OUTFAX: 4
    • T.RECOVER: 6
    • T.USER: 5
  • A:
    • A.TOE: 3
    • A.TSF: 3
  • D:
    • D.APP_CODE: 1
    • D.APP_DATA: 1
    • D.CRYPTO: 1
    • D.PIN: 1
    • D.SEC_DATA: 1
    • D.TS_CODE: 1
    • D.TS_DATA: 1
  • O:
    • O.IC: 23
    • O.RND: 1
  • OE:
    • OE.TSF: 6
  • OP:
    • OP.ARRAY_ACCESS: 5
    • OP.CREATE: 3
    • OP.DELETE: 10
    • OP.INSTALL: 10
    • OP.INSTANCE_FIELD: 5
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 5
    • OP.JAVA: 3
    • OP.LOAD: 10
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 7
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Samsung:
    • Samsung: 7
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • 3DES: 3
      • TDES: 4
    • DES:
      • DES: 3
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 14
    • DES:
      • DES: 2
  • miscellaneous:
    • ARIA:
      • ARIA: 7
    • SEED:
      • SEED: 6
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
  • ECC:
    • ECC:
      • ECC: 14
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • RSA:
    • RSA 1024: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 10
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 85
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 1
  • TRNG:
    • TRNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 10
    • Physical tampering: 2
    • malfunction: 9
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 3
    • timing attack: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 186-2: 2
  • RFC:
    • RFC2104: 1
  • X509:
    • X.509: 5
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 197: 2
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS#2: 2
  • SCP:
    • SCP 02: 1
    • SCP02: 19
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the application although it is possible to load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE The TOE is the JavaCard Platform that supports the analysis: 1
pdf_data/st_metadata
  • /Author: Ashley Fox
  • /CreationDate: D:20101125082009Z
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20101216093300-05'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: Xerox WorkCentre 56xx Multifunction System ST
  • pdf_file_size_bytes: 757200
  • pdf_hyperlinks: http://www.xerox.com/security
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 77
  • /Author: HoGeun Song
  • /CreationDate: D:20131111082538+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131111082538+09'00'
  • /Producer: Microsoft® Word 2010
  • /Title: KOMSCO Document Template
  • pdf_file_size_bytes: 1422360
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 108
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different