name |
Voltage SecureMail Suite 2.0 |
Fuji Xerox DocuCentre-III 3007/2007 Series Controller Software for Asia Pacific Controller ROM Ver. 1.120.2 |
category |
Other Devices and Systems |
Multi-Function Devices |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
07.09.2012 |
17.01.2013 |
not_valid_before |
29.05.2007 |
13.03.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10129-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0206_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10129-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0206_est.pdf |
manufacturer |
Voltage Security |
Fuji Xerox Co., Ltd. |
manufacturer_web |
https://www.voltage.com/ |
https://www.fujixerox.co.jp/eng/ |
security_level |
EAL2 |
EAL3 |
dgst |
71199d48be16022d |
cd17297b71b031cb |
heuristics/cert_id |
CCEVS-VR-0029-2007 |
JISEC-CC-CRP-C0206 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1, ADV_SPM.1 |
ASE_INT.1, AVA_VAN.2, ASE_REQ.1, ALC_CMC.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ALC_DVS.1, ALC_CMS.1, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
2.0 |
1.120.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Secure Messaging
- certification_date: 29.05.2007
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date:
- id: CCEVS-VR-VID10129
- product: Voltage SecureMail Suite 2.0
- scheme: US
- url: https://www.niap-ccevs.org/product/10129
- vendor: Voltage Security
|
- cert_id: JISEC-CC-CRP-C0206
- certification_date: 01.03.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0206_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions TOE provides the following security functions. - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Fuji Xerox DocuCentre-III 3007/2007 Series Controller Software for Asia Pacific
- product_type: Control Software for Multi Function Peripheral
- report_link: https://www.ipa.go.jp/en/security/c0206_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0206_est.pdf
- toe_version: Controller ROM Ver. 1.120.2
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.03.2013
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0206_it8232.html
- toe_overseas_name: Fuji Xerox DocuCentre-III 3007/2007 Series Controller Software for Asia Pacific Controller ROM Ver. 1.120.2
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10129-vr.pdf |
c0206_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-07-0029
- cert_item: ® TM Voltage Security, Inc. Palo Alto, CA Voltage SecureMail Suite 2.0
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0206-01: 1
- Certification No. C0206: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL2: 1
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.4: 1
- FCS_COP: 5
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.AUDIT_BACKUP: 1
- A.EXTSRVPROT: 1
- A.LOCATE: 1
- A.LOWEXP: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- A.SECURE_COMMS: 1
- A.USERDOCS: 1
|
- A:
- T:
- T.COMM_TAP: 1
- T.CONFDATA: 1
- T.CONSUME: 1
- T.DATA_SEC: 1
- T.RECOVER: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- FIPS:
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20070606103547-07'00'
- /Creator: Acrobat PDFMaker 7.0.7 for Word
- /ModDate: D:20070606145721-04'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070606173502
- /Title: D
- /_AdHocReviewCycleID: 301627650
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Rose Ignacio
- /_EmailSubject: Voltage VID 10129 Validation Report
- pdf_file_size_bytes: 223595
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /CreationDate: D:20090414172421+09'00'
- /ModDate: D:20090414172421+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 136823
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
st_vid10129-st.pdf |
c0206_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 10
- ADO_IGS: 1
- ADO_IGS.1: 9
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 15
- ADV_RCR.1: 8
- ADV_SPM.1: 4
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 15
- AGD_USR: 1
- AGD_USR.1: 13
- ATE:
- ATE_COV.1: 8
- ATE_FUN.1: 13
- ATE_IND.2: 11
- AVA:
- AVA_SOF.1: 11
- AVA_VLA.1: 12
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.3: 1
- ADV_TDS.1: 3
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.1: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 2
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_FUN.1: 3
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN_EXP: 30
- FAU_GEN_EXP.1: 4
- FAU_GEN_EXP.2: 9
- FAU_GEN_EXP.2.1: 1
- FAU_SAR_EXP: 26
- FAU_SAR_EXP.1: 6
- FAU_SAR_EXP.3: 9
- FAU_SAR_EXP.3.1: 1
- FCO:
- FCO_NRO_EXP.1: 9
- FCO_NRO_EXP.1.1: 1
- FCO_NRO_EXP.1.2: 1
- FCO_NRO_EXP.1.3: 1
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 17
- FCS_CKM.4: 19
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 33
- FCS_CKM_EXP.1: 4
- FCS_COP: 17
- FCS_COP.1: 25
- FCS_COP_EXP.1: 10
- FCS_COP_EXP.1.1: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_SAR_EXP: 1
- FIA:
- FIA_UAU_EXP: 53
- FIA_UAU_EXP.2: 5
- FIA_UID: 5
- FIA_UID_EXP: 68
- FIA_UID_EXP.2: 5
- FMT:
- FMT_MSA: 1
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 37
- FMT_MSA.2.1: 1
- FMT_MTD_EXP: 19
- FMT_MTD_EXP.1: 5
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.2: 1
- FMT_SMR_EXP: 21
- FMT_SMR_EXP.1: 9
- FPT:
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_RVM.1: 1
- FPT_RVM_EXP: 17
- FPT_RVM_EXP.1: 2
- FPT_SEP.1: 1
- FPT_SEP_EXP: 17
- FPT_SEP_EXP.1: 4
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FTP:
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 17
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UIA.2: 1
- FIA_UID: 1
- FIA_UID.1: 7
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 4
- A.AUDIT: 2
- A.AUDIT_BACKUP: 2
- A.EXTSRVPROT: 4
- A.LOCATE: 2
- A.LOWEXP: 2
- A.NO_EVIL: 2
- A.PHYSICAL: 4
- A.SECURE_COMMS: 2
- A.USERDOCS: 4
- O:
- O.ACCESS: 8
- O.ACCOUN: 4
- O.ALGS: 6
- O.AUDREC: 4
- O.DESTROY: 6
- O.GUIDAN: 6
- O.IDENTITY: 6
- O.KEYGEN: 4
- O.MANAGE: 8
- O.MEDIAT: 4
- O.PART_SEL_PRO: 6
- O.PROOF: 4
- O.SECUREKEYS: 6
- O.SECURE_COM: 5
- OE:
- OE.ACCOUN: 5
- OE.ADMTRA: 9
- OE.DOMAIN_SEP: 5
- OE.GENPUR: 5
- OE.MANAGE: 9
- OE.MEDIAT: 5
- OE.NOEVIL: 8
- OE.NO_BYPASS: 5
- OE.PHYSEC: 10
- OE.TIME: 6
- T:
- T.AUDACC: 4
- T.BYPASS: 2
- T.COMPROMISE: 2
- T.MISUSE: 4
- T.NOAUTH: 4
- T.SPOOF: 2
- T.USAGE: 4
|
- A:
- O:
- O.AUDITS: 8
- O.CIPHER: 5
- O.COMM_SEC: 7
- O.FAX_SEC: 4
- O.MANAGE: 9
- O.RESIDUAL: 5
- O.RESTRICT: 6
- O.USER: 7
- OE:
- OE.ADMIN: 3
- OE.AUTH: 4
- OE.COMMS_SEC: 3
- OE.COMM_SEC: 1
- OE.FUNCTION: 5
- T:
- T.COMM_TAP: 4
- T.CONFDATA: 3
- T.CONSUME: 4
- T.DATA_SEC: 3
- T.RECOVER: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 12
- FIPS 180-2: 1
- FIPS 186-2: 9
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- PKCS:
- X509:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: kurata-masami
- /CreationDate: D:20090401172819+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20090403174555+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: Microsoft Word - 英訳_IT認証8232_Security Target.doc
- pdf_file_size_bytes: 425421
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |