Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 )
ANSSI-CC-2023/36
PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0
BSI-DSZ-CC-1185-2023
name eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0
category ICs, Smart Cards and Smart Card-Related Devices and Systems Operating Systems
scheme FR DE
not_valid_after 22.09.2028 17.09.2028
not_valid_before 22.09.2023 18.09.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_36fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_36fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_36en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185b_pdf.pdf
manufacturer THALES DIS FRANCE SA SYSGO GmbH
manufacturer_web https://www.thalesgroup.com/en/europe/france https://www.SYSGO.com
security_level AVA_VAN.5, ALC_DVS.2, EAL5+ ALC_DVS.2, ALC_CMC.5, EAL5, ALC_FLR.3, AVA_VAN.5, ADV_IMP.2
dgst a774412def438291 34fd0553bb4a99ab
heuristics/cert_id ANSSI-CC-2023/36 BSI-DSZ-CC-1185-2023
heuristics/cert_lab [] BSI
heuristics/extracted_sars AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ALC_DVS.2, ADV_IMP.1, ADV_TDS.3, ASE_TSS.2, AGD_OPE.1, ALC_FLR.2, ATE_DPT.1, AVA_VAN.5 ALC_CMC.5, ALC_CMS.5, AGD_PRE.1, ADV_ARC.1, ALC_FLR.3, ADV_FSP.4, ALC_TAT.1, AGD_OPE.1, ATE_DPT.1, ADV_TDS.3, ALC_LCD.1, ALC_DVS.2, ADV_INT.2, ADV_IMP.2, AVA_VAN.5
heuristics/extracted_versions 5.1, 3.1, 3.1.0.0 5.1.3, 3.1.0
heuristics/report_references/directly_referencing ANSSI-CC-2023/01, ANSSI-CC-2023/31 BSI-DSZ-CC-1146-2022
heuristics/report_references/indirectly_referencing ANSSI-CC-2023/01, ANSSI-CC-2023/31 BSI-DSZ-CC-1146-2022
heuristics/scheme_data
  • cert_id: ANSSI-CC-2023/36
  • description: Le produit évalué est « eTravel 3.1 EAC on SAC on MultiApp V5.1, Version 3.1.0.0 » développé par THALES DIS FRANCE SAS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur not
  • developer: THALES DIS FRANCE SAS / THALES DIS DESIGN SERVICES
  • enhanced:
  • expiration_date: 21.09.2028
  • level: EAL5+
  • product: eTravel 3.1 EAC on SAC on MultiApp V5.1 (Version 3.1.0.0)
  • sponsor: THALES DIS FRANCE SAS
  • url: https://cyber.gouv.fr/produits-certifies/etravel-31-eac-sac-multiapp-v51-version-3100-0
heuristics/st_references/directly_referencing ANSSI-CC-2023/01 {}
heuristics/st_references/indirectly_referencing ANSSI-CC-2023/01 {}
maintenance_updates
protection_profiles
pdf_data/cert_filename Certificat-CC-2023_36fr.pdf 1185c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/36: 2
  • DE:
    • BSI-DSZ-CC-1185-2023: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 5: 2
    • EAL 5 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ADV:
    • ADV_IMP.2: 1
  • ALC:
    • ALC_CMC.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 1
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_keywords/crypto_protocol
  • PACE:
    • PACE: 2
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20230929175248+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20230929175422+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 153767
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel"
  • /Subject: Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel
  • /Title: Certificate BSI-DSZ-CC-1185-2023
  • pdf_file_size_bytes: 337655
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ANSSI-CC-2023_36fr.pdf 1185a_pdf.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
  • FR:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, AVA_VAN.5 valid until: 17 September 2028
    • cc_version: Product specific Security Target Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-1185-2023
    • cert_item: PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0
    • cert_lab: BSI
    • developer: SYSGO GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/01: 1
    • ANSSI-CC-2023/31: 1
    • ANSSI-CC-2023/36: 2
  • DE:
    • BSI-DSZ-CC-1146-2022: 2
    • BSI-DSZ-CC-1185-2023: 15
  • NL:
    • CC-1146-2022: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 4
    • EAL 5: 7
    • EAL 5 augmented: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_FSP.5: 1
    • ADV_IMP.2: 5
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMC.5: 5
    • ALC_CMS.5: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 3
    • ALC_FLR.3: 5
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_DPT.3: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.EXCLUSIVE_RESOURCES: 1
    • OE.HARDWARE: 1
    • OE.PHYSICAL: 1
    • OE.PRIVILEGED_EXECUTABLES: 1
    • OE.TRUSTWORTHY_PERSONNEL: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 11
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
  • atsec:
    • atsec: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 6
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • AMD:
    • PSP: 8
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ICAO:
    • ICAO: 1
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 4, 2023-08-30, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE (Master Document List), 2023-07-27, 20069-0000- MDL.xlsx, Sysgo: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • confidential document) [9] Guidance documentation for the TOE, see table 2 in chapter 2 7 specifically • AIS 32, Version: 1
pdf_data/report_metadata
pdf_data/st_filename ANSSI-cible-2023_36en.pdf 1185b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/01: 1
  • NL:
    • CC-1: 6
    • CC-2: 6
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-2014: 2
    • BSI-PP-0055-2009: 1
    • BSI-PP-0056-V2-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL5: 5
    • EAL5 augmented: 1
    • EAL5+: 1
    • EAL6: 1
  • EAL:
    • EAL 5: 5
    • EAL 5 augmented: 2
    • EAL 5+: 1
    • EAL5: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 4
    • ALC_FLR.2: 1
  • ASE:
    • ASE_ECD: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 4
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.5: 4
    • ALC_DVS.2: 5
    • ALC_FLR.3: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 49
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 8
    • FCS_CKM.4: 60
    • FCS_CKM.4.1: 1
    • FCS_COP: 83
    • FCS_COP.1: 11
    • FCS_COP.1.1: 7
    • FCS_RND: 7
    • FCS_RND.1: 13
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF: 18
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
    • FDP_ITC.1: 21
    • FDP_ITC.2: 21
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_UCT: 5
    • FDP_UCT.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT: 5
    • FDP_UIT.1: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 18
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 14
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_ATD: 4
    • FIA_ATD.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 63
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 2
    • FIA_UID: 23
    • FIA_UID.1: 7
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 19
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 17
    • FMT_LIM.2.1: 3
    • FMT_MSA: 9
    • FMT_MSA.1: 3
    • FMT_MSA.3: 6
    • FMT_MTD: 52
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_SMF: 7
    • FMT_SMF.1: 48
    • FMT_SMF.1.1: 1
    • FMT_SMR: 35
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 6
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 11
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 9
  • FDP:
    • FDP_ACC: 32
    • FDP_ACC.2: 12
    • FDP_ACF: 34
    • FDP_ACF.1: 27
    • FDP_IFC.2: 8
    • FDP_IFF.1: 11
  • FIA:
    • FIA_UID.2: 6
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 2
    • FMT_MTD: 12
    • FMT_MTD.1: 3
    • FMT_SMF.1: 5
    • FMT_SMR.1: 7
  • FRU:
    • FRU_RSA: 10
    • FRU_RSA.2: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
  • D:
    • D.ACODE_: 1
    • D.JCS_CODE: 4
    • D.JCS_DATA: 4
    • D.OS-: 1
    • D.OS-UPDATE-CODE-ID: 3
    • D.OS-UPDATE_ADDITIONALCODE: 5
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
  • O:
    • O.CONFID-: 1
    • O.CONFID-OS-: 1
    • O.CONFID-OS-UPDATE: 3
    • O.RND: 1
    • O.SECURE_AC_ACTIVATION: 5
    • O.SECURE_LOAD_ACODE: 9
    • O.TOE_IDENTIFICATION: 7
  • OE:
    • OE.BAC-PP: 1
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.OS-UPDATE-EVIDENCE: 4
    • OE.SECURE_ACODE_MANAGEMENT: 4
  • OSP:
    • OSP: 2
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ATOMIC_ACTIVATION: 3
    • OSP.TOE_IDENTIFICATION: 3
  • T:
    • T.CONFID-OS-UPDATE_LOAD: 3
    • T.FAKE-SGNVER-KEY: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.UNAUTHORISED-TOE-CODE-UPDATE: 1
    • T.UNAUTHORIZED_TOE_CODE_UPDATE: 2
    • T.WRONG-UPDATE-STATE: 3
  • A:
    • A.EXCLUSIVE_RESOURCES: 4
    • A.HARDWARE: 4
    • A.PHYSICAL: 4
    • A.PRIVILEGED_EXECUTABLES: 5
    • A.TRUSTWORTHY_PERSONNEL: 4
  • OE:
    • OE.EXCLUSIVE_RESOURCES: 3
    • OE.HARDWARE: 2
    • OE.PHYSICAL: 2
    • OE.PRIVILEGED_EXECUTABLES: 3
    • OE.TRUSTWORTHY_PERSONNEL: 3
  • OT:
    • OT.API_PROTECTION: 4
    • OT.CONFIDENTIALITY: 6
    • OT.INTEGRITY: 4
    • OT.RESOURCE_AVAILABILITY: 6
  • T:
    • T.DEPLETION: 4
    • T.DISCLOSURE: 4
    • T.EXECUTION: 4
    • T.MODIFICATION: 4
pdf_data/st_keywords/vendor
  • Thales:
    • Thales: 34
  • NXP:
    • NXP: 71
pdf_data/st_keywords/eval_facility
  • CESTI:
    • CESTI: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • TDES: 7
      • Triple-DES: 5
  • constructions:
    • MAC:
      • CMAC: 3
      • KMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 10
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 8
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 116
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 5
    • Physical Tampering: 3
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 7
  • SCA:
    • DPA: 2
    • Leak-Inherent: 1
    • Physical Probing: 1
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
  • AMD:
    • PSP: 27
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 3
    • EF.DG1: 11
    • EF.DG14: 5
    • EF.DG15: 2
    • EF.DG16: 9
    • EF.DG2: 5
    • EF.DG3: 10
    • EF.DG4: 10
    • EF.DG5: 3
    • EF.SOD: 4
pdf_data/st_keywords/standard_id
  • BSI:
    • BSI-AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 186-3: 1
    • FIPS 197: 1
  • ICAO:
    • ICAO: 12
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-4: 1
  • NIST:
    • SP 800-67: 1
    • SP 800-90: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 5
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 2
pdf_data/st_metadata
  • /Author: Guillaume Fumaroli
  • /Keywords: operating system, separation kernel, MILS, multiple independent levels of security, virtualization, hypervisor, embedded, BSI-VS-AP-0015-2019, qualification renforcé
  • /Subject:
  • /Title: Security Target for the PikeOS Separation Kernel v5.1.3 for the NXP LS1023A/LS1043A Processor
  • pdf_file_size_bytes: 897440
  • pdf_hyperlinks: https://www.sysgo.com, mailto:[email protected], mailto:[email protected], mailto:[email protected]
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 59
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different