Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
V3Pro2004 and AhnLab Policy Center 3.0
KECS-ISIS-0073-2007
TOSHIBA e-STUDIO2555C/3055C/3555C/4555C/5055C/2555CSE/3055CSE/3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0
JISEC-CC-CRP-C0388
name V3Pro2004 and AhnLab Policy Center 3.0 TOSHIBA e-STUDIO2555C/3055C/3555C/4555C/5055C/2555CSE/3055CSE/3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0
category Other Devices and Systems Multi-Function Devices
scheme KR JP
not_valid_after 01.06.2019 01.05.2018
not_valid_before 17.09.2007 26.04.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0388_erpt2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-ST-EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0388_est.pdf
manufacturer AhnLab, Inc. Toshiba TEC Corporation
manufacturer_web https://www.ahnlab.com/ https://www.toshibatec.co.jp/en/
security_level EAL4 EAL3+, ALC_FLR.2
dgst a8f7a4c49c242ddc a7263024c5c36e3f
heuristics/cert_id KECS-ISIS-0073-2007 JISEC-CC-CRP-C0388
heuristics/extracted_sars ATE_IND.2, ALC_DVS.1, ADV_FSP.2, ATE_FUN.1, ADV_SPM.1, ATE_COV.2, AGD_USR.1, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, ALC_TAT.1, AVA_MSU.2, ADV_HLD.2, AVA_VLA.2, ALC_LCD.1, ATE_DPT.1, AVA_SOF.1, ADV_IMP.1 ALC_CMC.3, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ASE_REQ.2, ADV_TDS.2, ALC_CMS.3, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, ADV_FSP.3, ASE_OBJ.2, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_LCD.1
heuristics/extracted_versions 3.0 1.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0388
  • certification_date: 01.04.2013
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0388_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan, filing, and internet fax. In general office environment, it is assumed that MFPs are utilized from the control panel of the TOE or the user terminal connected to LAN or USB with the TOE. TOE Security functions The TOE provides the following security features: - User Authentication function Function that allows the use of the TOE to only users who succeeded in the identification and authentication. - User Access Control function Function to perform the control of permit/ deny for the operation of various functions and user data, based on the privileges granted to the users who are identified and authenticated. - Secure Erase function Function to erase and overwrite the area in the HDD, where the document data has been stored, upon completion of copy function, etc. - Secure Channel function Function to protect communication data using the SSL protocol when the TOE communicates with the various servers or client PC. - Data Encryption function Function to encrypt and decrypt the document data stored in the HDD of the TOE. - Audit Data Generation and Review function Function to generate security audit log when security events occurred to be audited, and to allow only specific administrators to view that log. - TSF Data Protection function Function that allows the change of TOE configuration information only to the TOE administrator. - TSF Self Protection function Function to verify the integrity of the executable code of the security features. If any abnormalities are detected TOE will be unusable.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: TOSHIBA e-STUDIO2555C/3055C/ 3555C/4555C/5055C/2555CSE/3055CSE/ 3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS
    • product_type: Multifunction Peripheral
    • protection_profile: IEEE Std 2600.1-2009
    • report_link: https://www.ipa.go.jp/en/security/c0388_erpt2.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0388_est.pdf
    • toe_version: SYS V1.0
    • vendor: Toshiba Tec Corporation
  • expiration_date: 01.05.2018
  • supplier: Toshiba Tec Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0388_it2432.html
  • toe_overseas_name: TOSHIBA e-STUDIO 2555C/3055C/3555C/ 4555C/5055C/2555CSE/3055CSE/3555CSE/ 4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS SYS V1.0
heuristics/protection_profiles {} 32475ccb695b1644
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf
pdf_data/report_filename ISIS-73-EN.pdf c0388_erpt2.pdf
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-ISIS-0073-2007: 1
  • JP:
    • CRP-C0388-02: 1
    • Certification No. C0388: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 3
  • EAL:
    • EAL3: 4
    • EAL3 augmented: 2
pdf_data/report_keywords/cc_sar
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.AVCONFILICT: 1
    • A.CERT: 1
    • A.GUARD: 1
    • A.INTERNALENTITY: 1
    • A.NO_EVIL: 1
    • A.PHYSICAL: 1
    • A.SAFEITENTITY: 1
    • A.TIMESTAMP: 1
  • O:
    • O.ADMIN_ROLE: 1
    • O.ALARM: 1
    • O.AUDIT: 1
    • O.INA: 1
    • O.MANAGE: 1
    • O.SECURE_UPDATE: 1
    • O.SELF_PROTECTION: 1
    • O.STRENGTHENOS: 1
    • O.TSFDATA_PROTECT: 1
    • O.VIRUS: 1
  • OE:
    • OE.AUDIT_SEARCH: 1
    • OE.AUDIT_STORAGE: 1
    • OE.AVCONFLICT: 1
    • OE.CERT: 1
    • OE.DOM_SEPARATION: 1
    • OE.GUARD: 1
    • OE.INTERNALENTITY: 1
    • OE.NO_BYPASS: 1
    • OE.NO_EVIL: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFO: 1
    • OE.SAFEITENTITY: 1
    • OE.TIMESTAMP: 1
    • OE.TOE_ACCESS: 1
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • D:
    • D.CONF: 1
    • D.DOC: 2
    • D.FUNC: 1
    • D.PROT: 2
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • KISA:
    • KISA: 3
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • If the administrator does not set the V3 security lock with Policy Agent in passive mode, it is out of scope of the evaluation because it is not enterprise environment, the TOE operating environment: 1
    • out of scope: 1
  • ConfidentialDocument:
    • a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. Internet Fax function A function that allows scanned document data to be sent as a TIFF-FX: 1
  • OutOfScope:
    • out of scope: 1
    • that the reliability of the hardware and the cooperating software shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. CRP-C0388-02 12 4.3 Clarification of Scope: 1
pdf_data/report_metadata
  • /Author: KYH
  • /CreationDate: D:20071203103449+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20071203103449+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: ISIS-73-EN.hwp
  • pdf_file_size_bytes: 330437
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
  • /CreationDate: D:20130619094434+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130619094506+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 367918
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
pdf_data/st_filename ISIS-73-ST-EN.pdf c0388_est.pdf
pdf_data/st_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10340-2009: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 6
  • EAL:
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL3: 2
    • EAL3 augmented: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 2
    • ACM_SCP.2: 3
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 2
    • ADV_HLD.2: 2
    • ADV_IMP.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.1: 2
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 3
    • ATE_FUN.1: 2
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.2: 4
    • AVA_SOF.1: 2
    • AVA_VLA.2: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
  • APE:
    • APE_REQ: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_APR.1: 2
    • FAU_ARP.1: 10
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAA.1: 13
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 20
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 12
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 13
    • FAU_SAR.3.1: 2
    • FAU_SSA.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 11
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACF: 4
    • FDP_IFC: 4
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 6
    • FIA_UAU.2: 16
    • FIA_UAU.2.1: 2
    • FIA_UAU.6: 14
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 8
    • FIA_UID.2: 18
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MOF.1: 27
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 32
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 12
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 10
    • FPT_AMT.1.1: 1
    • FPT_ITI.1: 10
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 2
    • FPT_SSL.3: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST.1: 13
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.1: 5
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.3: 15
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 14
    • FTA_SSL.4.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 37
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 29
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 22
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 26
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 2
    • FPT_FDI_EXP.1: 14
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.AVCONFLICT: 3
    • A.CERT: 3
    • A.GUARD: 3
    • A.INTERNALENTITY: 3
    • A.NO_EVIL: 3
    • A.PHISICAL: 2
    • A.SAFEITENTITY: 3
    • A.TIMESTAMP: 3
  • O:
    • O.ADMIN_ROLE: 5
    • O.ALARM: 6
    • O.AUDIT: 10
    • O.AUIDT: 2
    • O.INA: 16
    • O.MANAGE: 14
    • O.SECURE_UPDATE: 6
    • O.SELF_PROTECTION: 5
    • O.STRENGTHENOS: 5
    • O.TSFDATA_PROTECT: 8
    • O.VIRUS: 10
  • OE:
    • OE.AUDIT_SEARCH: 5
    • OE.AUDIT_STORAGE: 7
    • OE.AVCONFLICT: 3
    • OE.CERT: 3
    • OE.DOM_SEPARATION: 5
    • OE.GAURD: 1
    • OE.GUARD: 2
    • OE.INTERNALENTITY: 3
    • OE.NO_BYPASS: 5
    • OE.NO_EVIL: 3
    • OE.PHISICAL: 2
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFO: 2
    • OE.SAFEITENTITY: 4
    • OE.TIMESTAMP: 7
    • OE.TOE_ACCESS: 13
  • T:
    • T.AUDIT_COMPROMISE: 8
    • T.DOWN_INTERFERENCE: 3
    • T.MASQUERADE: 5
    • T.RESIDUAL_DATA: 3
    • T.TRANS_DESTORY: 3
    • T.TSF_COMPROMISE: 9
    • T.UNATTEND_SESS: 5
    • T.UNIDENTIFIED_ACTIONS: 5
    • T.VIRUS: 4
  • A:
    • A: 2
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 7
    • D.DOC: 48
    • D.FUNC: 12
    • D.PROT: 6
  • O:
    • O.AUDIT: 7
    • O.AUDIT_ACCESS: 5
    • O.AUDIT_ACCESS_AUTHORIZED: 1
    • O.AUDIT_STORAGE: 6
    • O.AUDIT_STORAGE_PROTECTED: 1
    • O.CONF: 14
    • O.CRYPTOGRAPHY: 7
    • O.DOC: 23
    • O.FUNC: 7
    • O.INTERFACE: 7
    • O.PROT: 7
    • O.SOFTWARE: 5
    • O.USER: 11
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 1
    • OE.AUDIT_STRAGE: 1
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 21
  • Microsoft:
    • Microsoft: 4
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • miscellaneous:
    • SEED:
      • SEED: 1
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 15
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • malfunction: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 98 APC uses SMS for notification on the situation that authorized administrator is set. This is out of scope because additional contract with a mobile service provider is necessary for this function. APC: 1
    • 99 APC creates reports with pre-defined formats and audit records. This function is out of scope since it is independent with generating and storing audit records. AhnLab, Korea 24/109 APC: 1
    • files for support of V3+ Neo. Since the operating system of the TOE is Windows XP, This is out of scope. 91 The following functions are out of scope for policy server. Hierarchical Domain Management : 1
    • out of scope: 6
    • system in case that the system has been registered on the APC. 101 The following functions are out of scope for policy agent. User Information Input 102 An additional feature for the Policy Agent user: 1
    • updates itself by the policy server’s command. 2.2.3 Out of Coverage 88 The following functions are out of scope of V3 Run as a Update Server 89 Without APC, V3 runs as an update server for the other V3s. V3 +: 1
  • ConfidentialDocument:
    • e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5: 1
pdf_data/st_metadata
  • /Author: KYH
  • /CreationDate: D:20071203103747+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20071203103747+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: Microsoft Word - ISIS-73-ST_EN.doc
  • pdf_file_size_bytes: 796288
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 109
  • /Author: TOSHIBA TEC CORPORATION
  • /CreationDate: D:20130417131602+09'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: IEEE 2600.1™-2009 EAL3+ALC_FLR.2
  • /ModDate: D:20130417135319+09'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Security Target
  • /Title: SecurityTarget
  • pdf_file_size_bytes: 1417924
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 65
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different