This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-n (composant NXP) en configuration Large et Standard (modes dual ou contact) ANSSI-CC-2010/39 |
IAS ECC V2, version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2020/52 |
|
---|---|---|
name | Carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-n (composant NXP) en configuration Large et Standard (modes dual ou contact) | IAS ECC V2, version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 |
not_valid_before | 2010-06-29 | 2020-07-09 |
not_valid_after | 2019-09-01 | 2025-07-09 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-39en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_52en.pdf |
status | archived | active |
manufacturer | Oberthur Technologies / NXP Semiconductors GmbH | Idemia |
manufacturer_web | https://www.oberthur.com/ | https://www.idemia.com |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-39fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_52fr.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_52fr.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': frozenset({'SSCD_TYPE3_V1.05'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': frozenset({'SSCD_TYPE2_V1.04'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}) |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2010, 11, 15), 'maintenance_title': 'Rapport de maintenance ANSSI-CC-2010/39- M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2010-39-M01fr.pdf', 'maintenance_st_link': None}) | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 11, 17), 'maintenance_title': 'Reassessment report : ANSSI-CC-2019/35-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_35-s01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2019_35-s01.pdf'}) |
state/cert/convert_garbage | False | True |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | 6e8c4d3863e5dfbc99c034f1bf813d435d99748e909b4d02a52e4c6b6d8b7e83 |
state/cert/txt_hash | None | c21ba00c1fc189d70fecff6a507ebebecbbc8c85d76dd5779f7822f0c0c801eb |
state/report/pdf_hash | 5baf1a55e4c08e022766f929ae84707cc9a91b12308549ab1630893d573e634c | 6ac666c8bd885fe028248960164e32b3d577336fc156535a58092194f0410f8b |
state/report/txt_hash | 92d81d1900d25c63c446a5f556d76a17c8bc44158af97aa39cfe2a3bc74757e3 | a90b283bdd488d745785e363158d79eef485cddda760c7ee8bf8adc600ef3291 |
state/st/pdf_hash | 6896996fadceb8944917f08cde7051bbbcc5df4b62e4c50feec51706063f342a | 8bc7d9f5d550630e8080908755aa29ee9a03708396a96caa08de6e9abc56b7da |
state/st/txt_hash | d076856ec607307f11dc16a2b5a2cb3d1b5bb6d420599a2a70abcac83aae0c07 | 4b3e97a73ac24d59dd69a94f518a7536b0c0cce0cd2587c883d8ea06d8cde3a0 |
heuristics/cert_id | ANSSI-CC-2010/39 | ANSSI-CC-2020/52 |
heuristics/cert_lab | THALES | CEA |
heuristics/extracted_versions | 1.0.1, 7.0 | 8.2, 1.3 |
heuristics/report_references/directly_referencing | None | ANSSI-CC-2020/26, ANSSI-CC-2019/35, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018 |
heuristics/report_references/indirectly_referencing | None | ANSSI-CC-2019/35, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2020/26, ANSSI-CC-2017/49, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2019/28 |
heuristics/scheme_data |
|
|
heuristics/scheme_data/cert_id | 2010/39 | 2020/51 |
heuristics/scheme_data/description | Le produit certifié est la carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-n (composant NXP) en configuration Large et Standard (modes dual ou contact). L'applet et la plate-forme sont développées par Oberthur Technologies, le composant est développé par NXP. La cible d'évaluation est un logiciel sécurisé s'exécutant sur un microcontrôleur, pouvant être | Le produit évalué est l’application « : IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2, Identification F0 02 02 13 » développée par Idemia et masquée sur le composant NXP P60D145 développé par NXP Semiconductors GmbH. Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v2 et d’un microcontrôleur sécurisés. Il est destiné à être ut |
heuristics/scheme_data/developer | Oberthur Technologies / NXP Semiconductors GmbH | Idemia, NXP Semiconductors GmbH |
heuristics/scheme_data/enhanced |
|
|
heuristics/scheme_data/enhanced/cc_version | Critères Communs version 3.1 | Critères Communs version 3.1r5 |
heuristics/scheme_data/enhanced/cert_id | 2010/39 | 2020/51 |
heuristics/scheme_data/enhanced/certification_date | 29/06/2010 | 09/07/2020 |
heuristics/scheme_data/enhanced/developer | Oberthur Technologies / NXP Semiconductors GmbH | Idemia, NXP Semiconductors GmbH |
heuristics/scheme_data/enhanced/evaluation_facility | CEACI (Thales Security Systems - CNES) | CEA-LETI |
heuristics/scheme_data/enhanced/level | EAL4+ | EAL5+ |
heuristics/scheme_data/enhanced/protection_profile | BSI-PP-0005-2002, BSI-PP-0006-2002 | PP for secure signature creation device (Part 2, 3) |
heuristics/scheme_data/enhanced/report_link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2010-39fr.pdf | https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cc-2020_51fr.pdf |
heuristics/scheme_data/enhanced/sponsor | Oberthur Technologies | Idemia, NXP Semiconductors GmbH |
heuristics/scheme_data/enhanced/target_link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2010-39en.pdf | https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cible-cc-2020_51en.pdf |
heuristics/scheme_data/level | EAL4+ | EAL5+ |
heuristics/scheme_data/product | Carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-n (composant NXP) en configuration Large et Standard (modes dual ou contact) | IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2 |
heuristics/scheme_data/sponsor | Oberthur Technologies | Idemia, NXP Semiconductors GmbH |
heuristics/scheme_data/url | https://cyber.gouv.fr/produits-certifies/carte-id-one-ias-ecc-v101-r1-applet-version-1121-chargee-sur-cosmo-v70-n | https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-version-13-en-configuration-2-sur-la-plateforme-id-one-cosmo-v82-0 |
heuristics/st_references/directly_referencing | None | ANSSI-CC-2020/26 |
heuristics/st_references/indirectly_referencing | None | ANSSI-CC-2020/26 |
pdf_data/cert_filename | None | certificat-2020_52fr.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | ANSSI-CC_2010-39fr.pdf | anssi-cc-2020_52fr.pdf |
pdf_data/report_frontpage/FR/cc_security_level | EAL 4 augmenté ALC_DVS.2, AVA_VAN.5 | EAL 5 augmenté ALC_DVS.2, AVA_VAN.5 |
pdf_data/report_frontpage/FR/cc_version | Critères Communs version 3.1 | Critères Communs version 3.1 révision 5 |
pdf_data/report_frontpage/FR/cert_id | ANSSI-CC-2010/39 | ANSSI-CC-2020/52 |
pdf_data/report_frontpage/FR/cert_item | Carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-n (composant NXP) en configuration Large et Standard (modes dual ou contact | IAS ECC v2, version 1.3 in configuration #3 on ID-One Cosmo v8.2 open platform |
pdf_data/report_frontpage/FR/cert_item_version | Version applet 1121 | Identification de l’applet : F0 02 02 13 Identification du matériel de la plateforme : 09 11 21 Identification du patch : 09 42 22 |
pdf_data/report_frontpage/FR/cert_lab | THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected] | CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France |
pdf_data/report_frontpage/FR/developer | Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France NXP Semiconductors GmbH Stresemannallee 101 D-22502 Hamburg, Germany Commanditaire Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France | Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France NXP Semiconductors GmbH Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France |
pdf_data/report_frontpage/FR/match_rules | Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables | Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
pdf_data/report_frontpage/FR/ref_protection_profiles | BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05 | Protection profiles for secure signature creation device Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 |
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 3 | 30 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE | 2 | 3 |
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE | 2 | 5 |
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 2 | 3 |
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN | 1 | 2 |
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 3 | 5 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 1 | 3 |
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/CC |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vendor/NXP/NXP | 27 | 6 |
pdf_data/report_keywords/vendor/NXP/NXP Semiconductors | 1 | 3 |
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//CreationDate | D:20101105153916+01'00' | D:20200713153419+02'00' |
pdf_data/report_metadata//ModDate | D:20101105153916+01'00' | D:20200713153419+02'00' |
pdf_data/report_metadata//Producer | Acrobat Distiller 8.0.0 (Windows) | Acrobat Distiller 11.0 (Windows) |
pdf_data/report_metadata/pdf_file_size_bytes | 239326 | 151145 |
pdf_data/report_metadata/pdf_number_of_pages | 19 | 18 |
pdf_data/st_filename | ANSSI-CC-cible_2010-39en.pdf | anssi-cible-cc-2020_52en.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 30 | 34 |
pdf_data/st_keywords/asymmetric_crypto/FF |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH | 3 | 5 |
pdf_data/st_keywords/cc_cert_id/FR |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_claims/A |
|
|
pdf_data/st_keywords/cc_claims/A/A.CGA | 2 | 4 |
pdf_data/st_keywords/cc_claims/A/A.SCA | 2 | 3 |
pdf_data/st_keywords/cc_claims/OE |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.3 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE | 8 | 11 |
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 8 | 7 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL4 | 4 | 1 |
pdf_data/st_keywords/cc_security_level/EAL/EAL4 augmented | 3 | 1 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_ARP.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 1 | 41 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 1 | 60 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 1 | 104 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 17 | 38 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 3 | 4 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 2 | 19 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 | 1 | 3 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 | 1 | 3 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC | 2 | 70 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 8 | 38 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF | 1 | 49 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 28 | 36 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ETC | 1 | 5 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ETC.1 | 6 | 2 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC | 1 | 21 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 9 | 42 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP | 1 | 11 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI | 1 | 15 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 4 | 6 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT | 1 | 7 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 | 3 | 1 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL | 2 | 22 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 | 1 | 17 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA | 1 | 30 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 6 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD | 3 | 40 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 | 5 | 6 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 1 | 43 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS | 1 | 5 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC | 8 | 18 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 15 | 8 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 3 | 2 |
pdf_data/st_keywords/cipher_mode/CBC/CBC | 2 | 10 |
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC | 4 | 8 |
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 | 6 | 8 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 | 4 | 5 |
pdf_data/st_keywords/randomness | |
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering | 4 | 5 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS #1 | 6 | 1 |
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 | 4 | 3 |
pdf_data/st_keywords/standard_id/SCP/SCP03 | 2 | 7 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 3 | 17 |
pdf_data/st_keywords/symmetric_crypto/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 9 | 10 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vendor/Oberthur |
|
|
pdf_data/st_keywords/vendor/Oberthur/Oberthur Technologies | 5 | 1 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | FERAUD | IDEMIA |
pdf_data/st_metadata//CreationDate | D:20101006115204+02'00' | D:20200421131949+05'30' |
pdf_data/st_metadata//Creator | PDFCreator Version 0.8.1 | Microsoft® Word 2016 |
pdf_data/st_metadata//ModDate | D:20100614114609+02'00' | D:20200421211616+05'30' |
pdf_data/st_metadata//Producer | AFPL Ghostscript 8.50 | Microsoft® Word 2016 |
pdf_data/st_metadata/pdf_file_size_bytes | 814040 | 2773671 |
pdf_data/st_metadata/pdf_hyperlinks | ftp://ftp.itc.1/SVD, ftp://ftp.itc.1/SCD | |
pdf_data/st_metadata/pdf_is_encrypted | True | False |
pdf_data/st_metadata/pdf_number_of_pages | 104 | 93 |
dgst | b0241c527366f7df | 06eb3203be77366c |