Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SafeGuard Enterprise – Device Encryption, Version 5.60 for Microsoft Windows XP Professional and Microsoft Windows 7
BSI-DSZ-CC-0553-2012
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software Version: A1UD0Y0-0100-GM0-04
JISEC-CC-CRP-C0314
name SafeGuard Enterprise – Device Encryption, Version 5.60 for Microsoft Windows XP Professional and Microsoft Windows 7 bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software Version: A1UD0Y0-0100-GM0-04
category Access Control Devices and Systems Other Devices and Systems
scheme DE JP
not_valid_after 01.09.2019 01.09.2016
not_valid_before 18.06.2012 31.08.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0553a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0314_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0553b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0314_est.pdf
manufacturer Utimaco Safeware AG Konica Minolta Business Technologies, Inc
manufacturer_web https://utimaco-safeware-ag.software.informer.com/ https://www.konicaminolta.com/
security_level EAL4 EAL3
dgst 953b02691c7f135b 0d9377a538b9186d
heuristics/cert_id BSI-DSZ-CC-0553-2012 JISEC-CC-CRP-C0314
heuristics/cert_lab BSI []
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.2, AVA_MSU.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, ADV_IMP.1 ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 5.60 283, 423, 7828, 0100, 363, 04, 223
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0314
  • certification_date: 01.08.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0314_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0314_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0314_est.pdf
    • toe_version: A1UD0Y0-0100-GM0-04
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.09.2016
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Zentai Seigyo Software A1UD0Y0-0100-GM0-04
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0314_it1347.html
  • toe_overseas_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software A1UD0Y0-0100-GM0-04
pdf_data/report_filename 0553a_pdf.pdf c0314_erpt.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0553-2012
    • cert_item: SafeGuard Enterprise – Device Encryption, Version 5.60 for Microsoft Windows XP Professional and Microsoft Windows 7
    • cert_lab: BSI
    • developer: Utimaco Safeware AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0553-2012: 16
  • JP:
    • CRP-C0314-01: 1
    • Certification No. C0314: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 5
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL3: 4
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-B: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-B: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-P: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BRING-OUT-STORA: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRA: 1
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 16
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
      • AES-256: 1
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 2
  • ISO:
    • ISO/IEC 15408:2005: 2
  • PKCS:
    • PKCS #12: 1
    • PKCS#12: 1
  • RFC:
    • RFC 3394: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Enterprise - Device Encryption, version 5.60, Utimaco Safeware AG, file name: SGN_EAL4_ST.pdf (confidential document) [7] Evaluation Technical Report, Version 1.4, 02.05.2012, SRC Security Research & Consulting GmbH: 1
    • document) [8] Configuration list for the TOE (confidential documents) Configuration List for Evaluation Documentation, SafeGuard Enterprise - Device Encryption Version: 1
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is a medium to: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20120710091602+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung"
  • /ModDate: D:20120712101107+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Device Encryption
  • /Title: Certification Report BSI-DSZ-CC-0553-2012
  • pdf_file_size_bytes: 922618
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 32
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20111005175043+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20111013102302+09'00'
  • /Producer: Acrobat Distiller 8.2.0 (Windows)
  • /SourceModified: D:20111005085003
  • /Title: CRP-e
  • pdf_file_size_bytes: 637447
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 40
pdf_data/st_filename 0553b_pdf.pdf c0314_est.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0553: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 3
  • EAL:
    • EAL3: 3
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 3
    • ACM_CAP.3: 1
    • ACM_CAP.4: 5
    • ACM_SCP.2: 3
  • ADO:
    • ADO_DEL.2: 3
    • ADO_IGS.1: 5
  • ADV:
    • ADV_FSP.1: 7
    • ADV_FSP.2: 9
    • ADV_HLD.1: 1
    • ADV_HLD.2: 6
    • ADV_IMP.1: 6
    • ADV_LLD.1: 5
    • ADV_RCR.1: 10
    • ADV_SPM.1: 5
  • AGD:
    • AGD_ADM.1: 10
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 4
    • ALC_LCD.1: 3
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN.1: 9
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.2: 3
    • AVA_SOF.1: 4
    • AVA_VLA.2: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 24
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 39
    • FCS_COP.1.1: 5
    • FCS_RND: 6
    • FCS_RND.1: 13
    • FCS_RND.1.1: 2
    • FCS_RND.1.2: 2
  • FDP:
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC: 2
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
  • FIA:
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 24
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITC.1: 9
    • FPT_ITC.1.1: 1
    • FPT_TST.1: 6
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 72
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 55
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 71
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 29
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 44
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 43
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 44
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 48
    • FIA_UID.2.1: 7
    • FIA_USB.1: 26
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 31
    • FMT_MOF.1.1: 3
    • FMT_MSA: 5
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 42
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 119
    • FMT_MTD.1.1: 13
    • FMT_SMF.1: 112
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 171
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 5
    • A.NETWORK: 6
    • A.SECRET: 3
    • A.SERVICE: 4
    • A.SETTING: 5
  • O:
    • O.AUTH: 2
    • O.AUTH-CAPABILITY: 5
    • O.CONFIG: 12
    • O.CRYPT: 4
    • O.CRYPTO: 4
    • O.CRYPTO-CAPABILITY: 5
    • O.CRYPTO-KEY: 2
    • O.CRYPTO-MAIL: 2
    • O.FAX: 2
    • O.FAX-CONTROL: 6
    • O.GROUP: 3
    • O.GROUP-BOX: 3
    • O.OVERWRITE: 3
    • O.OVERWRITE-ALL: 5
    • O.PRIVATE: 3
    • O.PRIVATE-BOX: 3
    • O.PUBLIC: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED: 3
    • O.REGISTERED-USER: 12
    • O.SECURE: 4
    • O.SECURE-PRINT: 6
    • O.TRUSTED: 3
    • O.TRUSTED-PASS: 5
  • OE:
    • OE.ADMIN: 3
    • OE.FAX: 2
    • OE.FAX-UNIT: 2
    • OE.FEED: 2
    • OE.FEED-BACK: 9
    • OE.NETWORK: 4
    • OE.S: 1
    • OE.SECRET: 3
    • OE.SERVER: 5
    • OE.SERVICE: 3
    • OE.SESSION: 10
    • OE.SETTING: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS: 19
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.BACKUP: 3
    • T.BACKUP-RESTORE: 1
    • T.BRING: 3
    • T.D: 1
    • T.DISCARD: 2
    • T.DISCARD-MFP: 1
    • T.UNEXPECTED: 2
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 9
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-128: 3
      • AES-256: 5
    • Rijndael:
      • Rijndael: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TripleDES: 1
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 6
    • TLS:
      • TLS: 2
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 02: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 4
    • AIS31: 6
  • FIPS:
    • FIPS 180-3: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS #12: 4
    • PKCS #5: 1
  • RFC:
    • RFC 3394: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186: 2
    • FIPS 186-2: 4
    • FIPS PUB 197: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20111004150943+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20111004150947+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1144816
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 111
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different