Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00
JISEC-CC-CRP-C0265
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 PKI Card System Control Software, Version A1UD0Y0-0100-G00-20
JISEC-CC-CRP-C0264
name bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00 bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 PKI Card System Control Software, Version A1UD0Y0-0100-G00-20
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0264_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0264_erpt.pdf
state/report/pdf_hash 9ce76564e4cd329067e9d2d29e7a1df2698eda7d0b886da699025c33de25ec06 621f753d76ec35ab2985b58b4b78cd6ee0d9740cddb034c5f6470fa7bc6e50bb
state/report/txt_hash 4b1ea53594c3f02c6cc3fcfcb59106e5a80265bed48db5491db4671033cc0439 7c1f64be019a129cd421a1d1fb01bdc196d173eefb3e40ee2b03ff63d853837b
state/st/pdf_hash 98581f0cf5fb83011a101f34d087d10d244b797b75af3fcef63a691c39a2c09a 24e52ccff8024b1114876ecc5c2235ddc1126fb1a5f6bba9894f3823881122b3
state/st/txt_hash 8a3cedd84553842a11f6337bae2d2129f85b0ab99932123f5153762be6f870f0 4d187e92019c2db0737675bd97c174f893632890e415df5805522657f5fe280d
heuristics/cert_id JISEC-CC-CRP-C0265 JISEC-CC-CRP-C0264
heuristics/scheme_data None
  • cert_id: C0264
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_overseas_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 PKI Card System Control Software A1UD0Y0-0100-G00-20
  • expiration_date: 2015-09
  • claim: EAL3
  • certification_date: 2010-08
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0264_it9282.html
  • toe_japan_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 PKI Card System Control Software A1UD0Y0-0100-G00-20
  • enhanced:
    • product: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 PKI Card System Control Software
    • toe_version: A1UD0Y0-0100-G00-20
    • product_type: Control Software for digital MFP
    • certification_date: 2010-08-31
    • cc_version: 3.1
    • assurance_level: EAL3
    • vendor: Konica Minolta Business Technologies, Inc.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • report_link: https://www.ipa.go.jp/en/security/c0264_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0264_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0264_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”) or through the network and supports the protection from exposure of the highly confidential documents exchanged between MFP and client PC. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the encryption function by the ASIC. Besides, TOE provides the function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards, and the function that controls the access from the public telephone line against the danger using Fax function as a steppingstone to access internal network. TOE security functionality TOE provides the following security functions. - Administrator function - Service mode function - Encryption Print Function - S/MIME Encryption Function - Digital Signature Function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - ASIC Support Function - PKI Support Function - Fax unit control function
pdf_data/report_filename c0265_erpt.pdf c0264_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0265-01: 1
  • Certification No. C0265: 1
  • CRP-C0264-01: 1
  • Certification No. C0264: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 1
  • A.SERVICE: 1
  • A.NETWORK: 1
  • A.SECRET: 1
  • A.SETTING: 1
  • A.ADMIN: 1
  • A.SERVICE: 1
  • A.NETWORK: 1
  • A.SECRET: 1
  • A.IC-CARD: 1
  • A.SETTING: 1
pdf_data/report_keywords/cc_claims/T
  • T.DISCARD-MFP: 2
  • T.BRING-OUT-STORAGE: 2
  • T.ACCESS-PRIVATE-BO: 1
  • T.ACCESS-PUBLIC-BOX: 2
  • T.ACCESS-GROUP-BOX: 2
  • T.ACCESS-SECURE-PRI: 1
  • T.UNEXPECTED-TRANS: 1
  • T.ACCESS-SETTING: 2
  • T.BACKUP-RESTORE: 2
  • T.ACCESS-PRIVATE-BOX: 1
  • T.ACCESS-SECURE-PRINT: 1
  • T.UNEXPECTED-TRANSMISSION: 1
  • T.DISCARD-MFP: 2
  • T.BRING-OUT-STORAGE: 2
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
  • that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Also, it provides the protection function for scan image data: 1
pdf_data/report_keywords/crypto_protocol/TLS/SSL/SSL 7 4
pdf_data/report_metadata//CreationDate D:20101213141346+09'00' D:20101213141131+09'00'
pdf_data/report_metadata//ModDate D:20101213141346+09'00' D:20101213141131+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 235716 239807
pdf_data/report_metadata/pdf_number_of_pages 38 33
pdf_data/st_filename c0265_est.pdf c0264_est.pdf
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 3
  • A.SERVICE: 2
  • A.NETWORK: 4
  • A.SECRET: 2
  • A.SETTING: 3
  • A.ADMIN: 3
  • A.SERVICE: 2
  • A.NETWORK: 3
  • A.SECRET: 2
  • A.IC-CARD: 3
  • A.SETTING: 2
pdf_data/st_keywords/cc_claims/A/A.NETWORK 4 3
pdf_data/st_keywords/cc_claims/A/A.SETTING 3 2
pdf_data/st_keywords/cc_claims/O
  • O.REGISTERED-USER: 14
  • O.PRIVATE-BOX: 5
  • O.PUBLIC-BOX: 8
  • O.GROUP-BOX: 5
  • O.SECURE-PRINT: 8
  • O.CONFIG: 11
  • O.OVERWRITE-ALL: 7
  • O.CRYPT-KEY: 1
  • O.FAX-CONTROL: 7
  • O.TRUSTED-PASS: 7
  • O.CRYPTO-MAIL: 4
  • O.AUTH-CAPABILITY: 7
  • O.CRYPTO-CAPABILITY: 7
  • O.CRYPTO-KEY: 3
  • O.DECRYPT-PRINT: 5
  • O.OVERWRITE-ALL: 4
  • O.CRYPTO-KEY: 5
  • O.MAIL-CRYPTO: 5
  • O.MAIL-SIGN: 4
  • O.CRYPTO-CAPABILITY: 5
  • O.PKI-CAPABILITY: 9
  • O.FAX-CONTROL: 5
pdf_data/st_keywords/cc_claims/O/O.CRYPTO-CAPABILITY 7 5
pdf_data/st_keywords/cc_claims/O/O.CRYPTO-KEY 3 5
pdf_data/st_keywords/cc_claims/O/O.FAX-CONTROL 7 5
pdf_data/st_keywords/cc_claims/O/O.OVERWRITE-ALL 7 4
pdf_data/st_keywords/cc_claims/OE
  • OE.FEED-BACK: 10
  • OE.SERVER: 6
  • OE.SESSION: 10
  • OE.ADMIN: 3
  • OE.SERVICE: 3
  • OE.NETWORK: 3
  • OE.FAX-UNIT: 3
  • OE.SECRET: 3
  • OE.SETTING-SECURITY: 3
  • OE.ADMIN: 3
  • OE.SERVICE: 3
  • OE.NETWORK: 3
  • OE.CARD-USER: 3
  • OE.IC-CARD: 6
  • OE.SECRET: 3
  • OE.SIGN: 3
  • OE.SETTING-SECURITY: 3
  • OE.DRIVER: 3
  • OE.FAX-UNIT: 3
pdf_data/st_keywords/cc_claims/T
  • T.DISCARD-MFP: 3
  • T.BRING-OUT-STORAGE: 2
  • T.ACCESS-PRIVATE-BOX: 3
  • T.ACCESS-PUBLIC-BOX: 2
  • T.ACCESS-GROUP-BOX: 3
  • T.ACCESS-SECURE-PRINT: 2
  • T.UNEXPECTED-TRANSMISSION: 3
  • T.ACCESS-SETTING: 2
  • T.BACKUP-RESTORE: 3
  • T.DISCARD-MFP: 3
  • T.BRING-OUT-STORAGE: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 3
  • EAL 3: 1
  • EAL3: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL3 3 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_COP.1: 9
    • FCS_CKM.4: 4
    • FCS_COP.1.1: 1
    • FCS_COP: 1
    • FCS_CKM: 2
    • FCS_CAP.1: 2
  • FDP:
    • FDP_RIP.1: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_ACC.1: 72
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 55
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ACP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 71
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_UAU.1: 43
    • FIA_UAU.2: 44
    • FIA_ATD.1: 29
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 44
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID.1: 31
    • FIA_UAU.2.1: 4
    • FIA_UID.2: 48
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 7
    • FIA_USB.1: 26
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_SOS: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_MSA.3: 1
  • FMT:
    • FMT_MSA.3: 42
    • FMT_MOF.1: 31
    • FMT_MOF.1.1: 3
    • FMT_SMF.1: 110
    • FMT_SMR.1: 171
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.3.1: 6
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 119
    • FMT_MTD.1.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_MAS.1: 1
    • FMT_MSA: 5
    • FMT_SMS.1: 1
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_COP.1: 12
    • FCS_CKM.4: 4
    • FCS_COP.1.1: 1
    • FCS_COP: 1
    • FCS_CKM: 2
    • FCS_CAP.1: 1
  • FDP:
    • FDP_RIP.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 2
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
  • FIA:
    • FIA_AFL.1: 23
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_UAU.1: 9
    • FIA_UAU.2: 19
    • FIA_SOS.1: 17
    • FIA_SOS.1.1: 3
    • FIA_UAU.2.1: 2
    • FIA_UID.1: 11
    • FIA_UID.2: 18
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 3
    • FIA_EID.1: 1
    • FIA_SSL.3: 1
  • FMT:
    • FMT_MSA.3: 2
    • FMT_MOF.1: 22
    • FMT_MOF.1.1: 4
    • FMT_SMF.1: 46
    • FMT_SMR.1: 60
    • FMT_MTD.1: 33
    • FMT_MTD.1.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
    • FMT_MSA: 1
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CAP.1 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 9 12
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_RIP.1: 1
  • FDP_ITC.1: 4
  • FDP_ITC.2: 2
  • FDP_ACC.1: 72
  • FDP_ACC.1.1: 4
  • FDP_ACF.1: 55
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_IFC.1: 14
  • FDP_IFC.1.1: 1
  • FDP_IFF.1: 6
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_ITC: 1
  • FDP_ACP.1: 1
  • FDP_UAU.7: 1
  • FDP_RIP.1: 1
  • FDP_ITC.1: 3
  • FDP_ITC.2: 2
  • FDP_IFC.1: 8
  • FDP_IFC.1.1: 1
  • FDP_IFF.1: 6
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_ITC: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 14 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 4 3
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 71
  • FIA_AFL.1.1: 9
  • FIA_AFL.1.2: 9
  • FIA_UAU.1: 43
  • FIA_UAU.2: 44
  • FIA_ATD.1: 29
  • FIA_ATD.1.1: 1
  • FIA_SOS.1: 44
  • FIA_SOS.1.1: 5
  • FIA_SOS.2: 9
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UID.1: 31
  • FIA_UAU.2.1: 4
  • FIA_UID.2: 48
  • FIA_UAU.6: 11
  • FIA_UAU.6.1: 1
  • FIA_UAU.7: 19
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 7
  • FIA_USB.1: 26
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_SOS: 1
  • FIA_SSL.3: 1
  • FIA_UAU: 2
  • FIA_MSA.3: 1
  • FIA_AFL.1: 23
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.1: 9
  • FIA_UAU.2: 19
  • FIA_SOS.1: 17
  • FIA_SOS.1.1: 3
  • FIA_UAU.2.1: 2
  • FIA_UID.1: 11
  • FIA_UID.2: 18
  • FIA_UAU.6: 7
  • FIA_UAU.6.1: 1
  • FIA_UAU.7: 9
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 3
  • FIA_EID.1: 1
  • FIA_SSL.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 71 23
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 9 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 9 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 44 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1.1 5 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 43 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 44 19
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2.1 4 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 11 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 19 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 31 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 48 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2.1 7 3
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.3: 42
  • FMT_MOF.1: 31
  • FMT_MOF.1.1: 3
  • FMT_SMF.1: 110
  • FMT_SMR.1: 171
  • FMT_MSA.1: 34
  • FMT_MSA.1.1: 3
  • FMT_MSA.3.1: 6
  • FMT_MSA.3.2: 7
  • FMT_MTD.1: 119
  • FMT_MTD.1.1: 13
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 6
  • FMT_SMR.1.2: 6
  • FMT_MAS.1: 1
  • FMT_MSA: 5
  • FMT_SMS.1: 1
  • FMT_SOS.1: 1
  • FMT_MSA.3: 2
  • FMT_MOF.1: 22
  • FMT_MOF.1.1: 4
  • FMT_SMF.1: 46
  • FMT_SMR.1: 60
  • FMT_MTD.1: 33
  • FMT_MTD.1.1: 4
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_MSA: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 31 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1.1 3 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 5 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 42 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 119 33
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 13 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 110 46
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 171 60
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 6 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 6 2
pdf_data/st_keywords/cc_sfr/FTA/FTA_SSL.3 6 4
pdf_data/st_keywords/certification_process/ConfidentialDocument
  • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
  • that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Also, it provides the protection function for scan image data: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 186-2: 6
    • FIPS PUB 197: 3
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186-2: 6
    • FIPS PUB 197: 3
    • FIPS 180-2: 4
    • FIPS186-2: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 186-2: 6
  • FIPS PUB 197: 3
  • FIPS 186-2: 6
  • FIPS PUB 197: 3
  • FIPS 180-2: 4
  • FIPS186-2: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • 3DES: 1
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 4 3
pdf_data/st_metadata//CreationDate D:20101202154851+09'00' D:20101202160119+09'00'
pdf_data/st_metadata//ModDate D:20101202155121+09'00' D:20101202160245+09'00'
pdf_data/st_metadata//Title Microsoft Word - C0265_ASE.doc Microsoft Word - C0264_ASE.doc
pdf_data/st_metadata//_AdHocReviewCycleID -379351262 -693642671
pdf_data/st_metadata//_PreviousAdHocReviewCycleID 467482879 -688275005
pdf_data/st_metadata/pdf_file_size_bytes 772548 426722
pdf_data/st_metadata/pdf_number_of_pages 111 57
dgst e1cef4b86461e7ab 91b5f87a0b08867c