name |
System Software for e-STUDIO202L/232/282 V1.0 |
Windows Vista Enterprise; Windows Server 2008 Standard Edition; Windows Server 2008 Enterprise Edition; Windows Server 2008 Datacenter Edition |
category |
Other Devices and Systems |
Operating Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
08.05.2014 |
not_valid_before |
29.03.2006 |
31.08.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10291-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10291-st.pdf |
manufacturer |
Toshiba TEC Corporation |
Microsoft Corporation |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.microsoft.com |
security_level |
EAL3 |
EAL4+, ALC_FLR.3 |
dgst |
79cf3cf36c8217af |
0d998638652a39bb |
heuristics/cert_id |
JISEC-CC-CRP-C0043 |
CCEVS-VR-VID-10291-2009 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ADV_RCR.1, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ATE_FUN.1, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
heuristics/extracted_versions |
1.0 |
2008 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0043
- certification_date: 01.03.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0043_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is the system software of the digital multi function device “ e-STUDIO202L/232/282 ” manufactured by TOSHIBA TEC CORPORATION. The system software provides general functions as a digital multifunction device as well as the function of data overwrite and complete deletion on the user document data deleted from the e-STUDIO202L/232/282 HDD. The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
- product: System Software for e-STUDIO202L/232/282
- product_type: IT Product ( data protection function in Multi Function Device )
- report_link: https://www.ipa.go.jp/en/security/c0043_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0043_est.pdf
- toe_version: V1.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date: 01.01.2011
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: System Software for e-STUDIO202L/232/282 V1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0043_it5057.html
- toe_overseas_name: System Software for e-STUDIO 202L/232/282 V1.0
|
- category: Operating System
- certification_date: 31.08.2009
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 31.08.2011
- id: CCEVS-VR-VID10291
- product: Microsoft Windows Vista Enterprise; Windows Server 2008 Standard Edition; Windows Server 2008 Enterprise Edition; Windows Server 2008 Datacenter Edition
- scheme: US
- url: https://www.niap-ccevs.org/product/10291
- vendor: Microsoft Corporation
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0043_erpt.pdf |
st_vid10291-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10291-2009
- cert_item: Microsoft Corporation, Corporate Headquarters, One Microsoft Way, Redmond, WA 98052-6399 Microsoft Windows Vista and Windows Server 2008
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0043-01: 1
- Certification No. C0043: 1
|
- US:
- CCEVS-VR-VID10291-2009: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 5
- EAL 4 augmented: 1
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- AVA:
- AVA_MSU.2: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA.3: 5
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.STOREDATA_ACCESS: 1
- T.TEMPDATA_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
- Broadcom:
- Microsoft:
- Microsoft: 22
- Microsoft Corporation: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20060515142139+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20060515142342+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title:
- pdf_file_size_bytes: 546561
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author: shgilmo
- /Comments:
- /Company:
- /CreationDate: D:20091125111332-05'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Keywords:
- /ModDate: D:20091125111343-05'00'
- /Producer: Adobe PDF Library 9.0
- /SourceModified: D:20091125161307
- /Subject:
- /Title: Validation Report for Vista
- /_NewReviewCycle:
- pdf_file_size_bytes: 209457
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
pdf_data/st_filename |
c0043_est.pdf |
st_vid10291-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 4
- EAL 4: 14
- EAL 4 augmented: 5
- EAL3: 2
- EAL4: 22
- EAL4 augmented: 4
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ACM:
- ACM_AUT.1: 14
- ACM_CAP.4: 24
- ACM_SCP.2: 11
- ADO:
- ADO_DEL.2: 11
- ADO_IGS.1: 10
- ADV:
- ADV_FSP.2: 14
- ADV_HLD.2: 16
- ADV_IMP.1: 11
- ADV_LLD.1: 18
- ADV_RCR.1: 8
- ADV_SPM.1: 13
- AGD:
- AGD_ADM.1: 15
- AGD_USR.1: 13
- ALC:
- ALC_DVS.1: 11
- ALC_FLR.3: 25
- ALC_LCD.1: 12
- ALC_TAT.1: 13
- ATE:
- ATE_COV.2: 11
- ATE_DPT.1: 9
- ATE_FUN.1: 14
- ATE_IND.2: 12
- AVA:
- AVA_MSU.2: 18
- AVA_SOF.1: 11
- AVA_VLA.3: 25
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_RIP.2: 8
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 14
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_SAR.3: 13
- FAU_SAR.3.1: 2
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 10
- FAU_STG.3.1: 1
- FAU_STG.4: 14
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 39
- FCS_COP.1.1: 14
- FDP:
- FDP_ACC.1: 17
- FDP_ACC.2: 39
- FDP_ACC.2.1: 4
- FDP_ACC.2.2: 4
- FDP_ACF.1: 45
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 4
- FDP_ACF.2: 2
- FDP_IFC.1: 31
- FDP_IFC.1.1: 2
- FDP_IFF.1: 20
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_IFF.1.6: 2
- FDP_ITC: 1
- FDP_ITC.1: 3
- FDP_ITT.1: 9
- FDP_ITT.1.1: 1
- FDP_MSA.1: 1
- FDP_MSA.3: 1
- FDP_RIP.2: 11
- FDP_RIP.2.1: 1
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 16
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 18
- FIA_USB.1: 4
- FMT:
- FMT_MOF.1: 39
- FMT_MOF.1.1: 4
- FMT_MSA: 2
- FMT_MSA.1: 73
- FMT_MSA.1.1: 7
- FMT_MSA.2: 8
- FMT_MSA.3: 59
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 6
- FMT_MTD.1: 141
- FMT_MTD.1.1: 15
- FMT_MTD.1.2: 1
- FMT_MTD.2: 11
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_REV: 1
- FMT_REV.1: 19
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SAE.1: 11
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 46
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.3: 8
- FMT_SMR.3.1: 1
- FPT:
- FPT_AMT.1: 7
- FPT_ITT.1: 6
- FPT_ITT.3: 3
- FPT_RPL: 1
- FPT_RPL.1: 3
- FPT_RVM.1: 10
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 5
- FPT_SEP.2: 11
- FPT_SEP.2.1: 1
- FPT_SEP.2.2: 1
- FPT_SEP.2.3: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FPT_TRC.1: 4
- FRU:
- FRU_RSA.1: 9
- FRU_RSA.1.1: 1
- FTA:
- FTA_LSA.1: 1
- FTA_MCS.1: 2
- FTA_MSC.1: 1
- FTA_SSL.1: 8
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 12
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
- FTA_TRP.1: 1
- FTA_TSE.1: 10
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.STOREDATA_OVERWRITE: 4
- O.TEMPDATA_OVERWRITE: 6
- OE:
- OE.HDD_ERASE: 3
- OE.OVERWRITE_COMPLETE: 3
- T:
- T.STOREDATA_ACCESS: 3
- T.TEMPDATA_ACCESS: 4
|
- A:
- A.CONNECT: 3
- A.COOP: 5
- A.LOCATE: 3
- A.MANAGE: 2
- A.NO_EVIL_ADM: 3
- A.PEER: 3
- A.PROTECT: 2
- O:
- O.ASSURANCE: 4
- O.AUDITING: 7
- O.AUDIT_: 1
- O.AUDIT_PROTECTION: 4
- O.AUTHORIZATION: 7
- O.CREDEN: 4
- O.DISCRETIONARY_ACCESS: 3
- O.DISK_PROTECTION: 8
- O.ENCRYPTED_DATA: 8
- O.ENFORCEMENT: 8
- O.INSTALL: 4
- O.IPSEC: 10
- O.LEGAL_WARNING: 4
- O.LIMIT_AUTHORIZATION: 8
- O.MANAGE: 6
- O.MEDIATE: 8
- O.PHYSICAL: 5
- O.PROTECT: 9
- O.RESIDUAL_INFORMATION: 7
- O.SOFTWARE_PROTECT: 4
- O.TRUSTED_PATH: 8
- T:
- T.ADDRESS_MASQUERADE: 4
- T.ADMIN_ERROR: 4
- T.AUDIT_COMPROMISE: 5
- T.AUDIT_CORRUPT: 4
- T.CONFIG_CORRUPT: 3
- T.DISK_ACCESS: 4
- T.EAVESDROP: 4
- T.MALICIOUS_CODE_EXEC: 4
- T.MASQUERADE: 3
- T.OBJECTS_NOT_CLEAN: 4
- T.POOR_DESIGN: 3
- T.POOR_IMPLEMENTATION: 4
- T.REPLAY: 4
- T.SPOOF: 4
- T.SYSACC: 4
- T.TCPIP_ATTACK: 3
- T.UNATTENDED_SESSION: 5
- T.UNAUTH_ACCESS: 7
- T.UNAUTH_MODIFICATION: 4
- T.UNDETECTED_ACTIONS: 4
- T.UNIDENTIFIED_ACTIONS: 8
- T.USER_CORRUPT: 7
- T.USER_CURRUPT: 1
|
pdf_data/st_keywords/vendor |
|
- Broadcom:
- Microsoft:
- Microsoft: 49
- Microsoft Corporation: 175
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 3
- SHA-384: 4
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 2
- KEX:
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 14
- P-384: 18
- P-521: 20
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 6
- FIPS 140-213: 1
- FIPS 180-3: 1
- FIPS 182-2: 1
- FIPS 186-2: 7
- FIPS 197: 2
- FIPS 46-3: 2
- NIST:
- NIST SP 800-90: 2
- SP 800-90: 1
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20060512044538Z
- /ModDate: D:20060731114807+09'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: 2006/7/31 update
- pdf_file_size_bytes: 741778
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Arnold, James L. Jr.
- /Comments:
- /Company:
- /CreationDate: D:20091125111610-05'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Keywords:
- /ModDate: D:20091125111709-05'00'
- /Producer: Adobe PDF Library 9.0
- /SourceModified: D:20091123180905
- /Subject:
- /Title:
- pdf_file_size_bytes: 1305991
- pdf_hyperlinks:
|