Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
AR-FR12M Version M.20
JISEC-CC-CRP-C0022-01
IDentity Applet v3.4-p1/QSCD on NXP JCOP 4 P71
OCSI/CERT/CCL/07/2021/RC
name AR-FR12M Version M.20 IDentity Applet v3.4-p1/QSCD on NXP JCOP 4 P71
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP IT
status archived active
not_valid_after 07.10.2013 11.10.2026
not_valid_before 11.03.2005 11.10.2021
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_idapplet34p1_qscd_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_idapplet34p1_qscd_v1.05.pdf
manufacturer Sharp Corporation ID&Trust Ltd.
manufacturer_web https://sharp-world.com/ https://www.idandtrust.com/
security_level ADV_SPM.1, EAL3+ AVA_VAN.5, EAL4+
dgst 8a35a1a0f9dabc51 79ad3198683a51cf
heuristics/cert_id JISEC-CC-CRP-C0022-01 OCSI/CERT/CCL/07/2021/RC
heuristics/extracted_sars AVA_MSU.1, AGD_ADM.1, ATE_COV.2, ADV_FSP.1, AVA_VLA.1, ATE_DPT.1, ALC_DVS.1, AGD_USR.1, ATE_IND.2, AVA_SOF.1, ADV_SPM.1, ADV_RCR.1, ATE_FUN.1, AVA_MCU.1, ADV_HLD.2 ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, ADV_COMP.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, ALC_COMP.1, ATE_COMP.1, ASE_OBJ.2, ASE_SPD.1, ATE_COV.2, ADV_TDS.3, ADV_SPM.1, ASE_COMP.1, ASE_INT.1, ALC_DEL.1, ASE_TSS.2, ATE_DPT.1, ALC_DVS.1, ALC_TAT.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1, AVA_COMP.1, ALC_CMS.4
heuristics/extracted_versions 20 3.4
heuristics/report_references/directly_referenced_by {} OCSI/CERT/CCL/10/2022/RC
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1136-2021, OCSI/CERT/SYS/07/2016/RC
heuristics/report_references/indirectly_referenced_by {} OCSI/CERT/CCL/10/2022/RC
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1136-2021, OCSI/CERT/SYS/07/2016/RC
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0022
  • certification_date: 01.03.2005
  • claim: EAL3+ ADV_SPM.1
  • enhanced:
    • assurance_level: EAL3 + ADV_SPM.1
    • cert_link: https://www.ipa.go.jp/en/security/c0022_eimg.pdf
    • description: PRODUCT DESCRIPTION TOE is a firmware that aims to prevent disclosure of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the confidentiality of real image data that are stored temporarily in MSD and counter fraudulent readout of them.
    • evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology security center (JEITA ITSC)
    • product: AR-FR12M
    • product_type: product (Data protection function inside digital MFD)
    • report_link: https://www.ipa.go.jp/en/security/c0022_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0022_est.pdf
    • toe_version: VERSION M.20
    • vendor: Sharp Corporation
  • expiration_date: 01.10.2013
  • supplier: Sharp Corporation
  • toe_japan_name: AR-FR12M VERSION M.20
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0022_it4028.html
  • toe_overseas_name: AR-FR12M VERSION M.20
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1136-2021
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1136-2021
heuristics/protection_profiles {} 1f7ea2e05de5b88b, d918b28fd7bb5d79
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf
pdf_data/report_filename c0022_erpt.pdf cr_idapplet34p1_qscd_v1.0_en.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0022-01: 1
    • Certification No. C0022: 1
  • DE:
    • BSI-DSZ-CC-1136-2021: 1
  • IT:
    • OCSI/CERT/CCL/07/2021/RC: 32
    • OCSI/CERT/SYS/07/2016/RC: 1
  • NL:
    • NSCIB-CC-180212-CR3: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 2
    • EAL3 augmented: 1
  • EAL:
    • EAL2: 4
    • EAL4: 11
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL6: 2
    • EAL6 augmented: 2
    • EAL6+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_SPM: 1
    • ADV_SPM.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_COMP.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_COMP.1: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 2
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_COMP.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COMP: 1
    • ATE_COMP.1: 1
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_COMP: 1
    • AVA_COMP.1: 1
    • AVA_VAN.5: 8
pdf_data/report_keywords/cc_sfr
  • FIA:
    • FIA_API.1: 1
  • FPT:
    • FPT_EMS.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.OPERATOR: 1
  • T:
    • T.RECOVER: 1
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 20
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • CCLab:
    • CCLab Software Laboratory: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
    • Rijndael:
      • Rijndael: 2
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX3: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL-COMP: 7
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-03117: 2
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 4: 15
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ICAO:
    • ICAO: 3
  • ISO:
    • ISO/IEC 15408: 6
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20050518144032+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /Manager: IPA
  • /ModDate: D:20050518144205+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /SourceModified: D:20050518054022
  • /Title: CRP-C0022-01_e
  • pdf_file_size_bytes: 213209
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
  • /Author: OCSI
  • /CreationDate: D:20211011115757+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20211011115757+00'00'
  • /Title: Certification Report "IDentity Applet v3.4-p1/QSCD on NXP JCOP 4 P71"
  • pdf_file_size_bytes: 560124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 32
pdf_data/st_filename c0022_est.pdf st_idapplet34p1_qscd_v1.05.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1136-2021: 1
  • NL:
    • NSCIB-CC-180212-CR3: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 3
    • BSI-CC-PP-0056-: 1
    • BSI-CC-PP-0056-V2-: 1
    • BSI-CC-PP-0068-: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-CC-PP-0087: 2
    • BSI-CC-PP-0099-2017: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 2
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL 6: 2
    • EAL 6+: 1
    • EAL4: 11
    • EAL4 augmented: 6
    • EAL4+: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 4
    • ACM_SCP.1: 4
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 12
    • ADV_HLD.1: 3
    • ADV_HLD.2: 1
    • ADV_RCR.1: 4
    • ADV_SPM.1: 12
  • AGD:
    • AGD_ADM.1: 7
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 4
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 4
    • ATE_IND.2: 3
  • AVA:
    • AVA_MCU.1: 1
    • AVA_MSU.1: 2
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.4: 3
    • ADV_IMP.1: 3
    • ADV_SPM.1: 1
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 4
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 6
    • FCS_COP.1: 15
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 5
    • FDP_IFC.1: 1
    • FDP_RIP.1: 13
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_SOS.1: 16
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 20
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 15
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 16
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.2: 17
    • FMT_MSA.2.1: 1
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 1
    • FMT_RVM.1: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 17
    • FPT_RVM.1.1: 1
  • FAU:
    • FAU_ARP.1: 2
    • FAU_GEN: 1
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO.2: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 14
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 17
    • FCS_COP.1.1: 1
    • FCS_RNG.1: 4
  • FDP:
    • FDP_ACC: 36
    • FDP_ACC.1: 19
    • FDP_ACC.2: 4
    • FDP_ACF: 30
    • FDP_ACF.1: 24
    • FDP_DAU: 11
    • FDP_DAU.1: 1
    • FDP_DAU.2: 2
    • FDP_IFC.1: 10
    • FDP_IFC.2: 2
    • FDP_IFF.1: 4
    • FDP_ITC.1: 4
    • FDP_ITC.2: 5
    • FDP_RIP: 1
    • FDP_RIP.1: 17
    • FDP_RIP.1.1: 1
    • FDP_ROL.1: 2
    • FDP_SDI: 21
    • FDP_SDI.1: 2
    • FDP_SDI.2: 9
    • FDP_UIT.1: 1
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 7
    • FIA_API.1: 11
    • FIA_API.1.1: 2
    • FIA_ATD.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 1
    • FIA_UAU.4: 1
    • FIA_UID: 1
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 2
  • FMT:
    • FMT_MOF: 3
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 26
    • FMT_MSA.1: 15
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 27
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 8
    • FMT_MSA.4.1: 1
    • FMT_MTD: 20
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 32
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 6
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 2
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP: 2
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 14
    • FPT_PHP.3.1: 1
    • FPT_RCV.3: 1
    • FPT_TDC.1: 1
    • FPT_TST: 3
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 10
    • FTP_ITC.1: 7
pdf_data/st_keywords/cc_claims
  • A:
    • A.OPERATOR: 5
  • O:
    • O.REMOVE: 6
    • O.RESIDUAL: 8
  • OE:
    • OE.ERASEALL: 3
    • OE.OPERATE: 3
  • T:
    • T.RECOVER: 5
  • A:
    • A.CGA: 4
    • A.SCA: 4
  • OE:
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
    • OE.HID_VAD: 6
    • OE.KEY-CHANGE: 1
    • OE.PROCESS_SEC_IC: 1
    • OE.SECURITY-: 1
    • OE.USE_DIAG: 1
    • OE.USE_KEYS: 1
    • OE.VERIFICATION: 1
    • OE.VERIFICATION-: 1
  • OT:
    • OT.ALARM: 1
    • OT.APPLI-AUTH: 1
    • OT.ATTACK-COUNTER: 1
    • OT.CARD-CONFIGURATION: 1
    • OT.CARD-MANAGEMENT: 1
    • OT.CIPHER: 1
    • OT.COMM_AUTH: 1
    • OT.COMM_CONFIDENTIALITY: 1
    • OT.COMM_INTEGRITY: 1
    • OT.DOMAIN-RIGHTS: 1
    • OT.FIREWALL: 1
    • OT.GLOBAL_ARRAYS_CONFID: 1
    • OT.GLOBAL_ARRAYS_INTEG: 1
    • OT.IDENTIFICATION: 1
    • OT.KEY-MNGT: 1
    • OT.NATIVE: 1
    • OT.OBJ-DELETION: 1
    • OT.OPERATE: 1
    • OT.PIN-MNGT: 1
    • OT.REALLOCATION: 1
    • OT.RESOURCES: 1
    • OT.RESTRICTED-MODE: 1
    • OT.RND: 1
    • OT.RNG: 1
    • OT.SCP: 3
    • OT.SEC_BOX_FW: 1
    • OT.SENSITIVE_RESULTS_INTEG: 1
    • OT.SID_MODULE: 1
    • OT.TRANSACTION: 1
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 3
    • NXP Semiconductors: 1
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
    • Rijndael:
      • Rijndael: 4
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 5
  • RSA:
    • RSA-CRT: 2
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 8
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 3
pdf_data/st_keywords/cipher_mode
  • CCM:
    • CCM: 4
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX3: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 5
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 2
    • timing attacks: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 3
    • BSI TR-03110-1: 1
    • BSI TR-03110-2: 1
    • BSI TR-03110-3: 1
    • BSI TR-03110-4: 1
    • BSI TR-03117: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 10
    • JCOP4: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
  • BSI:
    • AIS20: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • ICAO:
    • ICAO: 9
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 18013: 2
    • ISO/IEC 7816-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • • OT.CARD-CONFIGURATION • OT.ATTACK-COUNTER • OT.RESTRICTED-MODE cannot be mapped because these are out of scope. 103 The objectives for the operational environment can be mapped as follows: Security Objectives: 1
pdf_data/st_metadata
  • /Author: SHARP Corporation
  • /Company: SHARP Corporation
  • /CreationDate: D:20050518145955+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /ModDate: D:20050518150808+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Subject: C0022
  • /Title: ST
  • pdf_file_size_bytes: 664695
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /Author: David Lovasz
  • /CreationDate: D:20210707095150+02'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20210707095150+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: IDentity Applet V3.4 /QSCD - Security Target
  • pdf_file_size_bytes: 2377998
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different