Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
GemXpresso Pro E64 PK - Java Card Platform Embedded Software V3 (Core)
BSI-DSZ-CC-0188-2002
Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit
Certificate Number: 2011/72
name GemXpresso Pro E64 PK - Java Card Platform Embedded Software V3 (Core) Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit
category ICs, Smart Cards and Smart Card-Related Devices and Systems Other Devices and Systems
scheme DE AU
not_valid_after 01.09.2019 13.07.2017
not_valid_before 01.07.2002 16.02.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0188a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T024%20CR%20SP1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0188b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/E14_EAL4_ASE_1.0.pdf
manufacturer Gemplus S.A. Microsoft Corporation
manufacturer_web https://www.gemalto.com/ https://www.microsoft.com
security_level EAL5+, AVA_VLA.4, ALC_DVS.2 EAL4+, ALC_FLR.3
dgst bfeb4e82bd0f0478 be0c7f67702ea646
heuristics/cert_id BSI-DSZ-CC-0188-2002 Certificate Number: 2011/72
heuristics/cert_lab BSI []
heuristics/cpe_matches {} cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_9:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_20:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_1:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_27:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_19:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_28:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_2:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_3:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_29:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_7:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_12:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_5:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_24:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_8:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_14:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_17:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_16:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp2:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_21:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_23:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_22:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_6:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup20:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_11:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_10:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_18:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_13:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_15:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp1:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_25:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_4:*:*:*:*:*:*
heuristics/related_cves {} CVE-2019-1084, CVE-2017-8621, CVE-1999-1322, CVE-2021-26857, CVE-2016-0138, CVE-2013-0418, CVE-2018-0940, CVE-2021-26858, CVE-2000-0216, CVE-2018-8151, CVE-2018-8302, CVE-2012-4791, CVE-2014-6319, CVE-2019-0724, CVE-2019-1136, CVE-2019-0817, CVE-2018-8154, CVE-2013-5072, CVE-2018-0924, CVE-2020-0688, CVE-2020-17144
heuristics/extracted_sars ADV_INT.1, AVA_MSU.2, ATE_FUN.1, ASE_INT.1, ADV_LLD.1, ADV_IMP.2, ASE_ENV.1, ADV_RCR.2, ATE_IND.2, AGD_USR.1, ASE_REQ.1, ADV_HLD.3, ADV_FSP.3, ASE_SRE.1, ALC_DVS.2, ATE_DPT.2, AVA_VLA.4, ATE_COV.2, ASE_PPC.1, ALC_LCD.2, ADV_SPM.3, ASE_DES.1, AGD_ADM.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ALC_TAT.2, AVA_CCA.1 ADV_TDS.3, AVA_VAN.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1
heuristics/extracted_versions - 2010, 64
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0193-2002 {}
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0193-2002 {}
pdf_data/report_filename 0188a.pdf EFS-T024 CR SP1.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0188-2002
    • cert_item: GemXpresso Pro E64 PK - Java Card Platform Embedded Software V3 (Core
    • cert_lab: BSI
    • developer: Gemplus S.A
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0188-2002: 15
  • AU:
    • Certificate Number: 2011/72: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 9
    • EAL5 augmented: 2
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 5
  • ITSEC:
    • ITSEC E4 High: 1
  • EAL:
    • EAL4: 9
    • EAL4 augmented: 1
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.3: 1
    • ADV_HLD: 2
    • ADV_HLD.3: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 1
    • ADV_INT: 2
    • ADV_INT.1: 1
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.2: 1
    • ADV_SPM: 2
    • ADV_SPM.3: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 2
    • ALC_TAT.2: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.2: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_CCA.1: 1
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 4
  • ALC:
    • ALC_FLR.3: 9
pdf_data/report_keywords/cc_claims
  • A:
    • A: 2
pdf_data/report_keywords/vendor
  • Gemplus:
    • Gemplus: 5
  • Microsoft:
    • Microsoft: 29
    • Microsoft Corporation: 1
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 7
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2010-3332: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 2.1.1: 8
    • Java Card 2.1.2: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20020702163933
  • /Creator: Microsoft Word - 0188a.doc
  • /ModDate: D:20020703113957+02'00'
  • /Producer: Acrobat PDFWriter 4.0 für Windows NT
  • /Title: BSI-DSZ-CC-0188-2002
  • pdf_file_size_bytes: 170704
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
pdf_data/st_filename 0188b.pdf E14_EAL4_ASE_1.0.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0188-2002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 3
    • EAL5 augmented: 3
  • ITSEC:
    • ITSEC E4 High: 4
  • EAL:
    • EAL4: 11
    • EAL4 augmented: 4
    • EAL4+: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.3: 1
    • ACM_XXX: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.3: 1
    • ADV_HLD.3: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.2: 1
    • ADV_SPM.3: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.2: 3
    • ALC_LCD.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA.1: 1
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.4: 3
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 8
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT: 2
    • ASE_INT.1: 2
    • ASE_OBJ: 2
    • ASE_OBJ.2: 2
    • ASE_REQ: 2
    • ASE_REQ.2: 2
    • ASE_SPD: 2
    • ASE_SPD.1: 2
    • ASE_TSS: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 4
    • FAU_ARP.1.1: 1
    • FAU_SAA: 3
    • FAU_SAA.1: 10
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.3: 3
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 4
    • FCS_CKM.4.1: 1
    • FCS_COP: 3
    • FCS_COP.1: 10
    • FCS_RND: 3
    • FCS_RND.1: 2
  • FDP:
    • FDP_ACC.2: 17
    • FDP_ACF.1: 29
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ITC.1: 4
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 4
    • FDP_RIP.1.1: 1
    • FDP_ROL.1: 8
    • FDP_SDI.2: 12
    • FDP_UCT.1: 4
    • FDP_UCT.1.1: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 10
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 4
    • FIA_UID.1: 4
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 5
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 4
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD.2: 4
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 8
    • FPT_RCV.4: 4
    • FPT_RCV.4.1: 1
    • FPT_RVM.1: 4
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 4
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TDC.1: 4
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 7
    • FDP_ACF: 24
    • FDP_ACF.1: 5
    • FDP_IFC: 39
    • FDP_IFC.1: 12
    • FDP_IFF: 70
    • FDP_IFF.1: 10
  • FIA:
    • FIA_ATD.1: 3
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 62
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
pdf_data/st_keywords/cc_claims
  • A:
    • A.CERTIFIED_CHIP: 1
    • A.CONVERTER: 1
    • A.KEYS_MGT: 1
    • A.PINS_MGT: 1
    • A.USE_SYS: 1
    • A.VERIFIER: 1
  • D:
    • D.APDU_BUFFER: 1
    • D.APPLET: 24
    • D.BUFFERS: 5
    • D.CRYPTO_BUFFER: 1
    • D.GLOBAL_PIN: 49
    • D.JAVA_OBJECT: 13
    • D.KEY: 31
    • D.PIN: 35
    • D.SECURE_CHANNEL: 12
    • D.TRANSACTION_BUFFER: 1
    • D.TSF_KEY: 6
    • D.USER_KEY: 3
  • OE:
    • OE.CERTIFIED_CHIP: 1
    • OE.CONFIDENTIALITY: 1
    • OE.DEV_TOOLS: 1
    • OE.USE_APPLICATION: 1
    • OE.USE_SYS: 1
  • OT:
    • OT.ACCESS_CONTROL: 1
    • OT.DETECTIVE: 1
    • OT.ID_AUT: 1
    • OT.INFO_PROTECTION: 1
    • OT.INTEGRITY_DETECTI: 1
    • OT.LOAD: 1
    • OT.ROLLBACK: 1
  • T:
    • T.APP_DISC: 1
    • T.APP_READ: 1
    • T.CMD: 1
    • T.IMPERSONATE: 1
    • T.LOAD_APP: 1
    • T.LOAD_JCP: 1
    • T.LOAD_MAN: 1
    • T.MOD_SHARE: 1
  • A:
    • A.BLOCKLIST: 2
    • A.COM_PROT: 2
    • A.INSTALL: 2
    • A.NO_EVIL_ADM: 1
    • A.NO_EVIL_ADMIN: 1
    • A.PHYS_PROTECT: 2
    • A.PLATFORM: 2
  • O:
    • O.CONBLK: 6
    • O.DAC: 14
    • O.MAIL_FLOW: 5
    • O.REDUCE_SPAM: 6
    • O.RESTDIST: 7
    • O.WIPE: 5
  • OE:
    • OE.BLOCKLIST: 2
    • OE.COM_PROT: 2
    • OE.INSTALL: 3
    • OE.PHYSICAL: 2
    • OE.PLATFORM: 18
  • OSP:
    • OSP.MAIL_FLOW: 3
    • OSP.WIPE: 3
  • T:
    • T.AUTH_DAC: 5
    • T.DL_MISUSE: 4
    • T.SPAM: 7
    • T.UNAUTHUSE: 2
    • T.UNAUTH_DAC: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 3
  • Microsoft:
    • Microsoft: 10
pdf_data/st_keywords/eval_facility
  • TUV:
    • TUV Informationstechnik: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3-DES: 1
      • Triple-DES: 1
    • DES:
      • DEA: 2
      • DES: 20
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 16
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 2
    • physical tampering: 3
  • SCA:
    • DPA: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 46-3: 2
  • ISO:
    • ISO/IEC 9796-1: 2
  • RFC:
    • RFC 2821: 9
    • RFC 2822: 6
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.1.1: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The: 1
pdf_data/st_metadata
  • /Author: cteri
  • /CreationDate: D:20020704103839
  • /Creator: ASE1A10060_EAL5+_A00P.doc - Microsoft Word
  • /ModDate: D:20020715132719+02'00'
  • /Producer: Acrobat PDFWriter 4.05 for Windows NT
  • /Title: ASE1A10060_EAL5+_A00P.PDF
  • pdf_file_size_bytes: 230350
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 61
  • /Author: Aaron Doggett (stratsec)
  • /CreationDate: D:20101223114445+11'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20101223114445+11'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: EAL4 Security Target
  • /Title: Exchange 2010
  • pdf_file_size_bytes: 861830
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 66
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different