Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Thales Operator Terminal Adapter (OTA)
SERTIT-012
bizhub C450 / bizhub C351 / ineo+ 450 / ineo+ 350 Control Software 4037-0100-GM0-05-000
JISEC-CC-CRP-C0064
name Thales Operator Terminal Adapter (OTA) bizhub C450 / bizhub C351 / ineo+ 450 / ineo+ 350 Control Software 4037-0100-GM0-05-000
category Other Devices and Systems Multi-Function Devices
scheme NO JP
not_valid_after 01.09.2019 28.12.2010
not_valid_before 24.03.2010 22.11.2006
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20100324_SERTIT-012%20_CR_v1_0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0064_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OTA_Security_Target_ed6_2_2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0064_est.pdf
manufacturer Thales Norway AS Konica Minolta Business Technologies, Inc
manufacturer_web https://www.thales.no/ https://www.konicaminolta.com/
security_level EAL5+, ALC_FLR.3 EAL3
dgst 85d4d4eb7fb5338e 587aacd57d157b8b
heuristics/cert_id SERTIT-012 JISEC-CC-CRP-C0064
heuristics/extracted_sars ALC_LCD.2, AGD_USR.1, AVA_SOF.1, ATE_COV.2, AVA_MSU.2, ATE_DPT.2, AGD_ADM.1, ALC_FLR.3, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, AVA_VLA.3, ADV_HLD.3, ALC_DVS.1, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1
heuristics/extracted_versions - 000, 350, 0100, 4037, 05, 450
heuristics/report_references/directly_referencing SERTIT-006, SERTIT-003 {}
heuristics/report_references/indirectly_referencing SERTIT-006, SERTIT-003 {}
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 24.03.2010
  • developer: Thales Norway AS
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-012
    • certification_date: 24.03.2010
    • description: Thales Operator Terminal Adapter (OTA) is a part of the Voice Communication System (VCS) used in operation sites. The main purpose of the OTA is to provide the capabilities required to handle all voice presented at the Operator Controller Position (OCP) and to perform required red/black separation of voice and data
    • developer: Thales Norway AS
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/134647-1607950011/SERTIT/Sertifikater/2010/12/20100324_SERTIT-012_Certificate.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/134644-1609931839/SERTIT/Sertifikater/2010/12/OTA_Security_Target_ed6_2_2.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134665-1607950035/SERTIT/Sertifikater/2010/12/20100324_SERTIT-012%20_CR_v1_0.pdf'})], 'maintenance': [frozendict({'href': 'https://sertit.no/getfile.php/134641-1609875883/SERTIT/Sertifikater/2010/12/20100929_Sertit%20012%20_Maintenance%20_Report_v_1_0%20_sign.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/134635-1607949992/SERTIT/Sertifikater/2010/12/20111107_Sertit%20012_Maintenance_Report_v_2_0_sig.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/134638-1607949997/SERTIT/Sertifikater/2010/12/20131120_SERTIT-012_Maintenance_Report_v_3_0.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/134656-1607950025/SERTIT/Sertifikater/2010/12/20140429_Sertit_012_Maintenance_Report_v_4.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/134659-1607950028/SERTIT/Sertifikater/2010/12/20150701_Sertit_012_Maintenance_Report_v_5_0.pdf'})]})
    • evaluation_facility: Secode Norge AS
    • level: EAL 5, ALC_FLR.3
    • product: Trusted Kernel version 3AQ 24860 AAAA 6.2.1; Firewall definitions file 3AQ 24862 EAAA 6.2.2; Hardware version 3AQ 21564 AAAA ICS5A, -ICS7, -ICS7A and -ICS7B
    • sponsor: Thales Norway AS
  • product: Thales Operator Terminal Adapter (OTA)
  • url: https://sertit.no/certified-products/product-archive/thales-operator-terminal-adapter-ota-1
  • cert_id: JISEC-CC-CRP-C0064
  • certification_date: 01.11.2006
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cert_link: https://www.ipa.go.jp/en/security/c0064_eimg.pdf
    • description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C450, bizhub C351, ineo+ 450, ineo+ 350) (Hereinafter referred to as "MFP"). This software is on the flash memory on the MFP controller carried in MFP, and this controls the whole operation of MFP such as the operation control processing and the image data management received from the panel of MFP body or the network. This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover, this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data written to the HDD.
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: bizhub C450 / bizhub C351 / ineo+ 450 / ineo+ 350 Control Software
    • product_type: IT Product (data protection function in digital MFD)
    • report_link: https://www.ipa.go.jp/en/security/c0064_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0064_est.pdf
    • toe_version: 4037-0100-GM0-05-000
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.01.2011
  • revalidations: [frozendict({'date': '2007-03', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0064_it5053_01.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C450 / bizhub C351 / ineo+ 450 / ineo+ 350 Control Software 4037-0100-GM0-05-000
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0064_it5053.html
  • toe_overseas_name: bizhub C450 / bizhub C351 / ineo+ 450 / ineo+ 350 Control Software 4037-0100-GM0-08-000
maintenance_updates



pdf_data/report_filename 20100324_SERTIT-012 _CR_v1_0.pdf c0064_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-003: 4
    • SERTIT-006: 1
    • SERTIT-012: 22
  • JP:
    • CRP-C0064-01: 1
    • Certification No. C0064: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 28
    • EAL 5 augmented: 24
    • EAL1: 1
    • EAL5: 3
    • EAL7: 1
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.3: 1
    • ADV_HLD.3: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.2: 1
    • ADV_SPM.3: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.3: 26
    • ALC_LCD.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA.1: 1
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.3: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 3
    • FAU_GEN.1: 1
    • FAU_SAA.1: 1
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
  • FDP:
    • FDP_IFC.2: 2
    • FDP_IFF.1: 2
    • FDP_IFF.6: 2
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 1
    • FPT_PHP.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 1
  • FTP:
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVER: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 1
pdf_data/report_keywords/vendor
  • Thales:
    • Thales: 18
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • CC:
    • CCIMB-99-031: 2
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • FIPS:
    • FIPS 180-1: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • the panel of MFP body or the network. This TOE offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user’s intention: 1
pdf_data/report_metadata
  • /Author: Arne Høye Rage
  • /CR issue: 1.0
  • /CRNumber: 012
  • /Company: SERTIT
  • /CreationDate: D:20100506105921+02'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Day Month Year: 24 March 2010
  • /Developers name: Thales Norway AS
  • /EAL: EAL 5 augmented with ALC_FLR.3
  • /ETR date final: 11.12.2010
  • /Keywords: ugradert
  • /ModDate: D:20100506110002+02'00'
  • /Name of EVIT: Secode Norge AS
  • /PP name: N/A
  • /Prod name and version platform: Thales Operator Terminal Adapter, Trusted Kernel version 3AQ 24860 AAAA 6.2.1, Firewall definitions file 3AQ 24862 EAAA 6.2.2, Hardware version 3AQ 21564 AAAA ICS5A, -ICS7, -ICS7A and -ICS7B.
  • /Producer: Adobe PDF Library 9.0
  • /Product name: Thales OTA
  • /Product version: See inside report
  • /SourceModified: D:20100506085912
  • /Sponsor name: Thales Norway AS
  • /Subject:
  • /Title: SERTIT-012
  • pdf_file_size_bytes: 966116
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /CreationDate: D:20070404191553+09'00'
  • /ModDate: D:20070404191553+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 741152
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
pdf_data/st_filename OTA_Security_Target_ed6_2_2.pdf c0064_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 6
    • EAL5 augmented: 2
  • EAL:
    • EAL3: 6
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 2
    • ACM_SCP.3: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.3: 2
    • ADV_HLD.3: 2
    • ADV_IMP.2: 2
    • ADV_INT.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.2: 2
    • ADV_SPM.1: 5
    • ADV_SPM.3: 3
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
    • ALC_FLR.3: 7
    • ALC_LCD.2: 2
    • ALC_TAT.2: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_CCA.1: 3
    • AVA_MSU.2: 2
    • AVA_SOF.1: 2
    • AVA_VLA.3: 2
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 25
    • FAU_ARP.1.1: 3
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAA.1: 11
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 9
    • FDP_IFC.2: 17
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_IFF.6: 9
    • FDP_IFF.6.1: 1
  • FIA:
    • FIA_UAU.1: 5
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 13
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 10
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 10
    • FPT_AMT.1.1: 1
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_SEP.1: 7
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_COP: 2
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 6
    • FDP_ACC.1: 43
    • FDP_ACC.1.1: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 46
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 4
    • FDP_ITC.1: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 76
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 8
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 12
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 57
    • FIA_SOS.1.1: 6
    • FIA_SOS.2: 10
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU: 10
    • FIA_UAU.1: 15
    • FIA_UAU.2: 82
    • FIA_UAU.2.1: 6
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 16
    • FIA_UAU.7.1: 2
    • FIA_UID: 14
    • FIA_UID.1: 18
    • FIA_UID.2: 52
    • FIA_UID.2.1: 6
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MOF.1: 83
    • FMT_MOF.1.1: 2
    • FMT_MSA: 10
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 2
    • FMT_MSA.3: 23
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 146
    • FMT_MTD.1.1: 11
    • FMT_SMF: 28
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 80
    • FMT_SMR.1.1: 5
    • FMT_SMR.1.2: 5
  • FPT:
    • FPT_RVM.1: 18
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUDIT: 2
    • A.CLEARANCE: 3
    • A.MAN: 2
    • A.OTA: 4
    • A.PHYSICAL: 3
    • A.SELF: 3
    • A.TRAINING: 2
    • A.USAGE: 3
    • A.VCS: 3
  • O:
    • O.ALARM: 18
    • O.CROSS-: 1
    • O.CROSS-TALK: 10
    • O.FILTER: 7
    • O.SEC: 22
    • O.SELF: 8
    • O.TX: 8
  • OE:
    • OE.AUDIT: 5
    • OE.MAN: 13
    • OE.RECORDING: 5
    • OE.SELF: 7
  • T:
    • T.ACOUSTIC: 3
    • T.CONN: 3
    • T.MISUSE: 2
    • T.SEC: 3
    • T.TAMPERING: 3
    • T.TEMPEST: 3
    • T.UNAUTHORISED: 2
    • T.WRONG: 3
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SERVER: 1
    • A.SETTING: 1
  • O:
    • O.CHECK-HDD: 2
    • O.CONFIG: 9
    • O.CRYPT-KEY: 3
    • O.OVERWRITE-ALL: 2
    • O.PRIVATE-BOX: 3
    • O.PUBLIC-BOX: 5
    • O.REGISTERED-USER: 9
    • O.SECURE-PRINT: 3
  • OE:
    • OE.CRYPT: 4
    • OE.FEED-BACK: 9
    • OE.LOCK-HDD: 1
  • T:
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 1
    • T.DISCARD-MFP: 1
pdf_data/st_keywords/vendor
  • Thales:
    • Thales: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
    • physical tampering: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS PUB 197: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
pdf_data/st_metadata
  • /Author: THALES COMMUNICATIONS AS
  • /Comments:
  • /Company:
  • /CreationDate: D:20100506140650+02'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Keywords: scdok
  • /ModDate: D:20100506140705+02'00'
  • /Producer: Adobe PDF Library 9.0
  • /SourceModified: D:20100506120256
  • /Subject: Dokumentmal
  • /Title: Opertator Terminal Adapter, Security Target
  • pdf_file_size_bytes: 857202
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
  • /CreationDate: D:20070404145853+09'00'
  • /Creator: クセロPDF v1.14 Rev0495
  • /ModDate: D:20070404145853+09'00'
  • /Producer: Xelo PDF Library
  • pdf_file_size_bytes: 2179948
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 113
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different