Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
JISEC-CC-CRP-C0200
SANRISE Universal Storage Platform CHA/DKA Program, TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
JISEC-CC-CRP-C0102
name Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14) SANRISE Universal Storage Platform CHA/DKA Program, TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
not_valid_before 2008-12-24 2007-06-27
not_valid_after 2014-04-08 2013-10-07
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_erpt.pdf
state/report/pdf_hash 50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c 2e60ea5270fbc0f11c2112143832445e6142b856f0a0892f3ab31b05cfe3884a
state/report/txt_hash affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658 9ad5433a32d590aac96300931d64097f1b55f8e70fd739f8c5e99d49e13e407c
state/st/pdf_hash 22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800 30bcb2eaa6f18b4fe7c9926057263a785d8c053585dc6ee05d495c733c9af099
state/st/txt_hash 06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5 b52cd8c677fe4c51cf6d131f8b55862970d9b7f0953c265a60a45887d1a5b538
heuristics/cert_id JISEC-CC-CRP-C0200 JISEC-CC-CRP-C0102
heuristics/scheme_data
  • cert_id: C0200
  • supplier: Hitachi, Ltd.
  • toe_overseas_name: -----
  • expiration_date: 2014-04
  • claim: EAL2
  • certification_date: 2008-12
  • toe_overseas_link: None
  • toe_japan_name: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html
  • enhanced:
    • product: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program
    • toe_version: 60-02-32-00/00(R6-02A-14)
    • product_type: IT Product (Storage Control Software)
    • certification_date: 2008-12-24
    • cc_version: 2.3
    • assurance_level: EAL2
    • vendor: Hitachi, Ltd.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0200_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0200_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.
  • cert_id: C0102
  • supplier: Hitachi, Ltd.
  • toe_overseas_name: TagmaStore Universal Storage Platform CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program 50-04-34-00/00
  • expiration_date: 2013-10
  • claim: EAL2
  • certification_date: 2007-06
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0102_it5068.html
  • toe_japan_name: SANRISE Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
  • enhanced:
    • product: SANRISE Universal Storage Platform CHA/DKA Program TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program
    • toe_version: 50-04-34-00/00
    • product_type: IT Product (Storage Control Software)
    • certification_date: 2007-06-27
    • cc_version: 2.1
    • assurance_level: EAL2
    • vendor: Hitachi, Ltd.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0102_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0102_est.pdf
    • description: PRODUCT DESCRIPTION TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”. TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
heuristics/scheme_data/cert_id C0200 C0102
heuristics/scheme_data/certification_date 2008-12 2007-06
heuristics/scheme_data/enhanced/cc_version 2.3 2.1
heuristics/scheme_data/enhanced/certification_date 2008-12-24 2007-06-27
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings. PRODUCT DESCRIPTION TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”. TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
heuristics/scheme_data/enhanced/evaluation_facility Electronic Commerce Security Technology Laboratory Inc. Evaluation Center Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
heuristics/scheme_data/enhanced/product Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program SANRISE Universal Storage Platform CHA/DKA Program TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0200_erpt.pdf https://www.ipa.go.jp/en/security/c0102_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0200_est.pdf https://www.ipa.go.jp/en/security/c0102_est.pdf
heuristics/scheme_data/enhanced/toe_version 60-02-32-00/00(R6-02A-14) 50-04-34-00/00
heuristics/scheme_data/expiration_date 2014-04 2013-10
heuristics/scheme_data/toe_japan_name Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14) SANRISE Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
heuristics/scheme_data/toe_overseas_link None https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0102_it5068.html
heuristics/scheme_data/toe_overseas_name ----- TagmaStore Universal Storage Platform CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program 50-04-34-00/00
pdf_data/report_filename c0200_erpt.pdf c0102_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0200-01: 1
  • Certification No. C0200: 1
  • CRP-C0102-01: 1
  • Certification No. C0102: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.ILLEGAL_XCNTL: 1
    • T.TSF_COMP: 1
    • T.LP_LEAK: 1
    • T.CHG_CONFIG: 1
  • A:
    • A.NOEVIL: 1
    • A.NOEVIL_MNT: 1
    • A.PHYSICAL_SEC: 1
    • A.ILLEGAL_SOFT: 1
    • A.CONNECT_STORAGE: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
  • CCIMB-99-032: 2
  • CCIMB-99-033: 2
  • CCIMB-99-031: 1
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408:2005: 1
  • ISO/IEC 18045:2005: 2
  • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 1
pdf_data/report_metadata//CreationDate D:20090401163719+09'00' D:20070918163642+09'00'
pdf_data/report_metadata//ModDate D:20090401163719+09'00' D:20070918163642+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 147813 104544
pdf_data/report_metadata/pdf_number_of_pages 24 20
pdf_data/st_filename c0200_est.pdf c0102_est.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 512: 1
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.ADM_AUTH: 9
    • O.ADM_ROLE: 5
    • O.SEC_COMM: 8
    • O.HOST_AUTH: 5
    • O.HOST_ACCESS: 8
    • O.AUD_GEN: 6
  • T:
    • T.ILLEGAL_XCNTL: 3
    • T.TSF_COMP: 3
    • T.LP_LEAK: 3
    • T.CHG_CONFIG: 3
  • A:
    • A.NOEVIL: 3
    • A.NOEVIL_MNT: 3
    • A.PHYSICAL_SEC: 3
    • A.ILLEGAL_SOFT: 3
    • A.CONNECT_STORAGE: 3
  • OE:
    • OE.NOEVIL: 2
    • OE.NOEVIL-MNT: 1
    • OE.PHYSICAL_SEC: 3
    • OE.ILLEGAL_SOFT: 2
    • OE.CONNECT_STORAGE: 3
    • OE.NOEVIL_MNT: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.1: 2
  • ADV_HLD.1: 2
  • ADV_RCR.1: 1
  • ADV_SPM.1: 4
  • ADV_FSP.1: 2
  • ADV_HLD.1: 3
  • ADV_RCR.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_HLD.1 2 3
pdf_data/st_keywords/cc_sar/ADV/ADV_RCR.1 1 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 21
    • FAU_GEN.2: 11
    • FAU_SAR.1: 12
    • FAU_STG.1: 13
    • FAU_STG.3: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_COP.1: 17
    • FCS_CKM.1: 20
    • FCS_CKM.2: 16
    • FCS_CKM.4: 18
    • FCS_COP.1.1: 1
    • FCS_CKM.1.1: 1
    • FCS_CKM.2.1: 1
    • FCS_CKM.4.1: 1
  • FDP:
    • FDP_ACC.1: 19
    • FDP_IFC.1: 2
    • FDP_ACF.1: 16
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_ATD: 27
    • FIA_ATD.1: 6
    • FIA_USB: 27
    • FIA_USB.1: 6
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 21
    • FIA_SOS: 29
    • FIA_SOS.1: 2
    • FIA_UAU.2: 17
    • FIA_UID.1: 8
    • FIA_UAU.7: 13
    • FIA_UAU.7.1: 1
    • FIA_UID.2: 22
    • FIA_MSA.1.1: 1
    • FIA_MSA.3.1: 1
    • FIA_MSA.3.2: 1
    • FIA_UAU.5: 19
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MSA.1: 16
    • FMT_SMF.1: 18
    • FMT_SMR.1: 20
    • FMT_MSA.3: 16
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MOF.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.2: 9
    • FMT_MOF.1.1: 1
  • FPT:
    • FPT_STM.1: 17
    • FPT_RVM.1: 32
    • FPT_SEP.1: 32
    • FPT_STM.1.1: 1
    • FPT_RVM.1.1: 1
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_UID.1: 4
    • FIA_UID.2: 13
  • FMT:
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1: 13
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1: 13
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SAE.1: 10
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
  • FPT:
    • FPT_RVM.1: 13
    • FPT_RVM.1.1: 1
    • FPT_STM.1: 14
    • FPT_STM.1.1: 1
    • FPT_SEP.1: 12
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 19
  • FDP_IFC.1: 2
  • FDP_ACF.1: 16
  • FDP_ITC.1: 6
  • FDP_ITC.2: 6
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ACC.1: 15
  • FDP_ACC.1.1: 1
  • FDP_ACF.1: 8
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 19 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 16 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 2 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_ATD: 27
  • FIA_ATD.1: 6
  • FIA_USB: 27
  • FIA_USB.1: 6
  • FIA_AFL.1: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU.1: 21
  • FIA_SOS: 29
  • FIA_SOS.1: 2
  • FIA_UAU.2: 17
  • FIA_UID.1: 8
  • FIA_UAU.7: 13
  • FIA_UAU.7.1: 1
  • FIA_UID.2: 22
  • FIA_MSA.1.1: 1
  • FIA_MSA.3.1: 1
  • FIA_MSA.3.2: 1
  • FIA_UAU.5: 19
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UID.1: 4
  • FIA_UID.2: 13
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 8 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 22 13
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 16
  • FMT_SMF.1: 18
  • FMT_SMR.1: 20
  • FMT_MSA.3: 16
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MOF.1: 13
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.2: 9
  • FMT_MOF.1.1: 1
  • FMT_MSA.3: 11
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1: 13
  • FMT_SMR.1: 14
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1: 13
  • FMT_MSA.2: 11
  • FMT_MSA.2.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SAE.1: 10
  • FMT_SAE.1.1: 1
  • FMT_SAE.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 16 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 9 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 16 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 18 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 20 14
pdf_data/st_keywords/cc_sfr/FPT/FPT_RVM.1 32 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_SEP.1 32 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 17 14
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSLv3.0: 3
      • SSL: 16
    • TLS:
      • TLSv1.0: 3
      • TLS: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
    • FIPS PUB 180-2: 1
  • PKCS:
    • PKCS#1: 1
  • CC:
    • CCMB-2005-08-001: 4
    • CCMB-2005-08-002: 3
    • CCMB-2005-08-003: 2
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2005-08-001: 4
  • CCMB-2005-08-002: 3
  • CCMB-2005-08-003: 2
  • CCIMB-99-031: 1
  • CCIMB-99-032: 1
  • CCIMB-99-033: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 516948
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
  • /CreationDate: D:20090330094022+09'00'
  • /Subject: CC EAL2 Security Target
  • /Author: 八木
  • /Creator: Word 用 Acrobat PDFMaker 7.0.7
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20090330094033+09'00'
  • /Company: Hitachi
  • /Title: USP_V ST
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 231671
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
  • /CreationDate: D:20070918131359+09'00'
  • /Author: hiwa.sysdeptdm
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20070918131359+09'00'
  • /Title: Microsoft Word - User Data Protection Security Target_Eng.doc
  • pdf_hyperlinks:
pdf_data/st_metadata//Author 八木 hiwa.sysdeptdm
pdf_data/st_metadata//CreationDate D:20090330094022+09'00' D:20070918131359+09'00'
pdf_data/st_metadata//Creator Word 用 Acrobat PDFMaker 7.0.7 PScript5.dll Version 5.2
pdf_data/st_metadata//ModDate D:20090330094033+09'00' D:20070918131359+09'00'
pdf_data/st_metadata//Title USP_V ST Microsoft Word - User Data Protection Security Target_Eng.doc
pdf_data/st_metadata/pdf_file_size_bytes 516948 231671
pdf_data/st_metadata/pdf_number_of_pages 93 57
dgst 96e36510c2c8ba64 5647d3c66dfdd6f9