Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BMC Atrium® Discovery and Dependency Mapping 10.0
383-4-259
bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software
JISEC-CC-CRP-C0205
name BMC Atrium® Discovery and Dependency Mapping 10.0 bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software
scheme CA JP
not_valid_after 10.02.2020 08.04.2014
not_valid_before 10.02.2015 13.03.2009
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-259CT%20v1.0e.docx
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-259%20CR%20v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-259%20ST%20v12.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_st.pdf
manufacturer BMC Software, Inc. Konica Minolta Business Technologies, Inc
manufacturer_web https://www.bmc.com/ https://www.konicaminolta.com/
security_level EAL2+, ALC_FLR.2 EAL3
dgst 86e19de07e49d48a 2269d5f12e90117d
heuristics/cert_id 383-4-259 JISEC-CC-CRP-C0205
heuristics/cert_lab CANADA []
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, AVA_VLA.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 10.0 7522, 601, 6022, 751
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0205
  • certification_date: 01.03.2009
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0205_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software English: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0205_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0205_st.pdf
    • toe_version: A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.04.2014
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0205_it8216.html
  • toe_overseas_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
pdf_data/cert_filename 383-4-259CT v1.0e.docx
pdf_data/report_filename 383-4-259 CR v1.1.pdf c0205_erpt.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-259-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-259-CR: 1
  • JP:
    • CRP-C0205-01: 1
    • Certification No. C0205: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 2+: 3
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-B: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-NET-SET: 1
    • T.ACCESS-PRIVATE: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTOR: 1
    • T.BACKUP-RESTORE: 1
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STOR: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTEC-TRANSMISSION: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
pdf_data/report_metadata
  • /Author: White, Debra E.
  • /CR date: 10 February 2015
  • /CR version: 1.1
  • /Certificate date: 10 February 2015
  • /Company: CSEC-CSTC
  • /Conformance Claim: Conformance Claim (EAL number augmented?)
  • /CreationDate: D:20160420101751-04'00'
  • /Creator: Acrobat PDFMaker 11 for Word
  • /Developer name: BMC Software, Inc.
  • /Document number: 383-4-259-CR
  • /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation for BMC Software, Inc. BMC Atrium® Discovery and Dependency Mapping 10.0 Document No. 1815-000-D002-B, Version 1.2, 10 February 2015
  • /Evaluation completion date: 10 February 2015
  • /ModDate: D:20160420101756-04'00'
  • /Producer: Adobe PDF Library 11.0
  • /ST Title: BMC Atrium Discovery and Dependency Mapping 10 Security Target version 0.12, 10 February 2015
  • /SourceModified: D:20160420140405
  • /TOE name and version: BMC Atrium® Discovery and Dependency Mapping 10.0
  • /TOE short name: BMC Atrium® Discovery
  • /Title: 383-4-XXX CR vxe
  • /_DocHome: -1616610741
  • pdf_file_size_bytes: 167573
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /CreationDate: D:20090409174039+09'00'
  • /ModDate: D:20090409174039+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 406178
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename 383-4-259 ST v12.pdf c0205_st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2+: 2
  • EAL:
    • EAL3: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VLA.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 2
    • FAU_STG.2: 7
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.3: 7
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_CKM.1: 34
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 20
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 41
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 4
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SAE.1: 7
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_ITC.1: 9
    • FPT_ITC.1.1: 1
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 4
    • FPT_TRP.1: 1
  • FTP:
    • FTP_TRP.1: 9
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 58
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 42
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ACP.1: 1
    • FDP_IFC.1: 6
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 62
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 8
    • FIA_ATD.1: 25
    • FIA_ATD.1.1: 1
    • FIA_EID: 2
    • FIA_EID.1: 16
    • FIA_EID.1.1: 3
    • FIA_EID.1.2: 1
    • FIA_NEW.1.2: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 48
    • FIA_SOS.1.1: 6
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU.1: 23
    • FIA_UAU.2: 63
    • FIA_UAU.2.1: 6
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 50
    • FIA_UID.2.1: 7
    • FIA_USB.1: 22
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 33
    • FMT_MOF.1.1: 4
    • FMT_MSA: 3
    • FMT_MSA.1: 32
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 5
    • FMT_MSA.3.2: 5
    • FMT_MTD.1: 105
    • FMT_MTD.1.1: 12
    • FMT_SMF.1: 109
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 167
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SMS.1: 1
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.LOCATE: 3
    • A.LOCKED_DOWN: 1
    • A.LOCK_DOWN: 3
    • A.NOEVIL: 4
    • A.PHYSICAL_PROTECT: 3
    • A.TIME: 4
  • O:
    • O.ACCOUNTABLE: 7
    • O.AUTHORIZATION: 5
    • O.DISCOVERY: 8
    • O.DISCRETIONARY_: 1
    • O.DISCRETIONARY_ACCESS: 4
    • O.EAVESDROPPING: 7
    • O.MANAGE: 8
  • OE:
    • OE.ADMIN: 4
    • OE.LOCATE: 4
    • OE.LOCKED_DOWN: 1
    • OE.LOCK_DOWN: 3
    • OE.NOEVIL: 4
    • OE.PHYSICAL: 4
    • OE.TIME: 6
  • T:
    • T.ACCOUNT: 4
    • T.EAVESDROPPING: 3
    • T.EXCEED_PRIV: 6
    • T.MANAGE: 3
    • T.UNAUTH_ACCESS: 8
    • T.UNKNOWN: 3
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 4
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.AUTH-CAPABILITY: 10
    • O.CHECK-CF: 4
    • O.CHECK-HDD: 7
    • O.CONFIG: 11
    • O.CRYPT-KEY: 5
    • O.CRYPTO-CAPABILITY: 4
    • O.CRYPTO-MAIL: 4
    • O.GROUP-BOX: 5
    • O.LOCK-CF-CAPABILITY: 4
    • O.LOCK-HDD-CAPABILITY: 7
    • O.OVERWRITE-ALL: 7
    • O.PRIVATE-BOX: 5
    • O.PUBLIC-BOX: 8
    • O.REGISTERED-USER: 14
    • O.SECURE-PRINT: 8
    • O.TRUSTED-PASS: 7
  • OE:
    • OE.ADMIN: 2
    • OE.CRYPT: 3
    • OE.CRYPTO: 1
    • OE.FEED-BACK: 10
    • OE.LOCK-CF: 3
    • OE.LOCK-HDD: 3
    • OE.NETWORK: 2
    • OE.SECRET: 2
    • OE.SERVER: 5
    • OE.SERVICE: 2
    • OE.SESSION: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS-GROUP-BOX: 3
    • T.ACCESS-PRIVATE-BOX: 3
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
    • T.UNEXPECTED-TRANSMISSION: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 20
  • constructions:
    • MAC:
      • HMAC: 8
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
      • DHE: 1
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 1
  • SHA:
    • SHA2:
      • SHA-256: 5
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 27
    • SSHv2: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 28
      • TLS v1.0: 6
      • TLSv1.0: 4
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 5
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 17
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 140-2: 6
    • FIPS 180-3: 3
    • FIPS 186-2: 2
    • FIPS 197: 2
    • FIPS 198-1: 2
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
    • FIPS140-2: 2
    • FIPS180-3: 3
    • FIPS186-2: 2
    • FIPS197: 2
    • FIPS198-1: 2
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 4253: 3
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 186: 1
    • FIPS 186-1: 1
    • FIPS 186-2: 4
    • FIPS PUB 197: 3
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • INC., All Rights Reserved. 7 / 110 TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
pdf_data/st_metadata
  • /Author: tmacarthur
  • /CreationDate: D:20160419134043-04'00'
  • /Creator: PDFCreator Version 1.1.0
  • /Keywords:
  • /ModDate: D:20160419134043-04'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: BMC_ADDM_ST13a
  • pdf_file_size_bytes: 455164
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
  • /Author: m-izumi
  • /CreationDate: D:20090410164324+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20090410164324+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /Title: Microsoft Word - C0205_ST_en.doc
  • pdf_file_size_bytes: 683223
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 110
state/cert/convert_garbage True False
state/cert/download_ok True False
state/cert/pdf_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different