name |
CypherNET Multi-Protocol Encryptor |
Hitachi Storage Command Suite Common Component Version: 6.0.0-01 |
category |
Network and Network-Related Devices and Systems |
Access Control Devices and Systems |
scheme |
AU |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
08.04.2014 |
not_valid_before |
06.06.2008 |
24.12.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Senetas_CypherNet_CR_1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0199_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Senetas_CypherNet_ST_1.18.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0199_est.pdf |
manufacturer |
Senetas Corporation Ltd, Distributed by Thales SA (SafeNet) |
Hitachi, Ltd. |
manufacturer_web |
https://www.senetas.com/ |
https://www.hitachi.com/ |
security_level |
EAL4 |
EAL2+, ALC_FLR.1 |
dgst |
f5dc68d06d0b7de8 |
a8a4d61467d0612f |
heuristics/cert_id |
Certificate Number: 2008/46 |
JISEC-CC-CRP-C0199 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_LLD.1, AGD_ADM.1, ATE_DPT.1, ADV_SPM.1, ALC_DVS.1, AVA_MSU.2, ADV_RCR.1, ADV_HLD.2, AVA_VLA.2, ATE_COV.2, ALC_TAT.1, ATE_IND.2, ATE_FUN.1, AGD_USR.1, ADV_FSP.2, ALC_LCD.1, ADV_IMP.1, AVA_SOF.1 |
AGD_ADM.1, AVA_VLA.1, ATE_COV.1, ADV_RCR.1, ADV_FSP.1, ADV_HLD.1, ATE_IND.2, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_SOF.1 |
heuristics/extracted_versions |
- |
6.0.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0199
- certification_date: 01.12.2008
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides some kinds of storage management software that manage a plural of storage devices that are connected through SAN with common functions. Storage management software is such as Hitachi Device Manager Software, Hitachi Replication Manager Software and Hitachi Tiered Storage Manager Software. Hitachi Storage Command Suite is the general term for these software and TOE. TOE is provided customers as built-in module included in each software package. TOE security functions TOE has the following security functions. - Identification/authentication (Authentication function of external authentication server can be used as substitute.) - Privilege information management (Privilege information is attached to each user's information and it decides each user's role for storage management software.) - Warning banner
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Hitachi Storage Command Suite Common Component
- product_type: IT Product (Foundational Module Software)
- report_link: https://www.ipa.go.jp/en/security/c0199_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0199_est.pdf
- toe_version: 6.0.0-01
- vendor: Hitachi, Ltd.
- expiration_date: 01.04.2014
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0199_it8223.html
- toe_japan_name: Hitachi Storage Command Suite Common Component 6.0.0-01
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
Senetas_CypherNet_CR_1.0.pdf |
c0199_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- AU:
- Certificate Number: 2008/46: 1
|
- JP:
- CRP-C0199-01: 1
- Certification No. C0199: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 1
- A.SECURE_CHANNEL: 1
- A.TOKEN: 1
- T:
- T.ILLEGAL_ACCESS: 1
- T.UNAUTHORISED_: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- X509:
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- out of scope: 1
- was identified it required significant time and effort to exploit and was therefore considered out of scope for an EAL 4 evaluation. 48 The evaluators focused their efforts on the 1G Ethernet Encryptors: 1
|
|
pdf_data/report_metadata |
- /AISEF: CSC Australia
- /Author: AISEP Certification Authority
- /Category: Report
- /Cert_Level: EAL 4
- /Company: Australasian Information Security Evaluation Program
- /CreationDate: D:20080611100719+10'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Developer: Senetas
- /IssueDate: 6 June 2008
- /ModDate: D:20080611101433+10'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Product: Cyphernet Multifunction Encryptor - Product
- /SourceModified: D:20080606065101
- /Subject: Certificate Number: 2008/46
- /Title: Certification Report
- /docVersion: 1.0
- pdf_file_size_bytes: 158443
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /CreationDate: D:20090622183039+09'00'
- /ModDate: D:20090622183039+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 89546
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
Senetas_CypherNet_ST_1.18.pdf |
c0199_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 6
- EAL2 augmented: 4
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 9
- ACM_CAP.4: 18
- ACM_SCP.2: 6
- ADO:
- ADO_DEL.2: 8
- ADO_IGS.1: 5
- ADV:
- ADV_FSP.2: 9
- ADV_HLD.2: 13
- ADV_IMP.1: 6
- ADV_LLD.1: 14
- ADV_RCR.1: 5
- ADV_SPM.1: 17
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 11
- AGD_USR.1: 10
- ALC:
- ALC_DVS.1: 6
- ALC_LCD.1: 7
- ALC_TAT.1: 8
- ATE:
- ATE_COV.2: 6
- ATE_DPT.1: 5
- ATE_FUN.1: 10
- ATE_IND.2: 6
- AVA:
- AVA_MSU.2: 10
- AVA_SOF.1: 6
- AVA_VLA.2: 7
|
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 5
- FAU_GEN.1.1: 9
- FAU_GEN.1.2: 7
- FAU_SAR.1: 4
- FAU_SAR.1.1: 8
- FAU_SAR.1.2: 6
- FCS:
- FCS_CKM.1: 25
- FCS_CKM.1.1: 24
- FCS_CKM.2: 6
- FCS_CKM.2.1: 8
- FCS_CKM.4: 23
- FCS_CKM.4.1: 12
- FCS_COP.1: 23
- FCS_COP.1.1: 57
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 9
- FDP_ACC.1.1: 8
- FDP_ACF.1: 5
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 8
- FDP_DAU.1: 5
- FDP_DAU.1.1: 9
- FDP_DAU.1.2: 7
- FDP_IFC.1: 11
- FDP_IFC.1.1: 8
- FDP_IFF.1: 6
- FDP_IFF.1.1: 6
- FDP_IFF.1.2: 8
- FDP_IFF.1.3: 6
- FDP_IFF.1.4: 8
- FDP_IFF.1.5: 6
- FDP_IFF.1.6: 8
- FDP_UCT.1: 4
- FDP_UCT.1.1: 8
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 6
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 10
- FIA_UID.1: 3
- FIA_UID.2: 7
- FIA_UID.2.1: 5
- FMT:
- FMT_MSA.1: 16
- FMT_MSA.1.1: 16
- FMT_MSA.2: 30
- FMT_MSA.2.1: 23
- FMT_MSA.3: 8
- FMT_MSA.3.1: 16
- FMT_MSA.3.2: 16
- FMT_MTD.1: 5
- FMT_MTD.1.1: 10
- FMT_SMR.1: 18
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 7
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 8
- FPT_FLS.1: 4
- FPT_FLS.1.1: 5
- FPT_ITT.1: 4
- FPT_ITT.1.1: 8
- FPT_PHP.3: 5
- FPT_PHP.3.1: 16
- FPT_STM.1: 6
- FPT_STM.1.1: 9
- FPT_TST.1: 5
- FPT_TST.1.1: 8
- FPT_TST.1.2: 6
- FPT_TST.1.3: 8
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 8
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 6
- FTP_ITC.1.1: 8
- FTP_ITC.1.2: 6
- FTP_ITC.1.3: 7
|
- FAU:
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 11
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_SOS: 7
- FIA_SOS.1: 10
- FIA_SOS.1.1: 2
- FIA_TAB: 5
- FIA_TAB.1: 5
- FIA_UAU: 5
- FIA_UAU.1: 16
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 1
- FIA_UID.1: 16
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC.1: 5
- FPT_ITC.1.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 15
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 3
- FTA_TAB.1.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.AUDIT: 3
- A.CYPHERMANAGER: 3
- A.INSTALL: 3
- A.LOCATE: 3
- A.PRIVATEKEY: 3
- O:
- O.ADMIN: 11
- O.AUDIT: 9
- O.AUDITLOG: 9
- O.AUTHDATA: 5
- O.CERTGEN: 11
- O.CONNECT: 2
- O.ENCRYPT: 9
- O.FAILSAFE: 6
- O.IDENT: 9
- O.INFOFLOW: 10
- O.INSTALL: 7
- O.KEYMAN: 10
- O.PERSONNEL: 7
- O.PHYSICAL: 4
- O.REMOTEMGT: 9
- O.ROLEMGT: 5
- O.ROLES: 6
- O.TAMPER: 8
- T:
- T.ABUSE: 3
- T.ATTACK: 3
- T.CAPTURE: 3
- T.CONNECT: 3
- T.IMPERSON: 3
- T.LINK: 3
- T.MAL: 3
- T.OBSERVE: 3
- T.PHYSICAL: 3
- T.PRIVILEGE: 3
|
- A:
- A.ADMINISTRATORS: 3
- A.ADMINISTROTORS: 1
- A.CLIENTS: 4
- A.NETWORKS: 3
- A.PASSWORD: 3
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.TOKEN: 4
- O:
- O.BANNER: 6
- O.MGMT: 7
- O.PASSWORD: 7
- OE:
- OE.AUTH: 6
- OE.BANNER: 7
- OE.PASSWORD: 6
- OE.SECURE_CHANNE: 1
- OE.SECURE_CHANNEL: 6
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 3
- FIPS PUB 140-2: 5
- FIPS PUB 180-1: 3
- FIPS PUB 186-2: 3
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- FIPS PUB 81: 2
- PKCS:
- PKCS #1: 2
- PKCS 12: 1
- PKCS#1: 2
- RFC:
- RFC 1661: 1
- RFC 1968: 1
- RFC 1969: 1
- RFC 2246: 1
- RFC 2401: 1
- RFC 2402: 1
- RFC 2403: 1
- RFC 2404: 1
- RFC 2405: 1
- RFC 2406: 1
- RFC 2408: 1
- RFC 2409: 1
- RFC 2412: 1
- RFC 2459: 1
- RFC 2574: 1
- RFC2574: 2
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Peter Sim
- /Company:
- /CreationDate: D:20080313112226+11'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Date: 28-Mar-07
- /ModDate: D:20080313113304+11'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20080313002134
- /Title: CypherNET
- /Version: 1.17
- pdf_file_size_bytes: 1578004
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
- /Author: k-fujii
- /Company: 株式会社日立製作所
- /CreationDate: D:20090608174647+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20090608174751+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20090608084535
- /Title: HiCommand Suite Common Component
- pdf_file_size_bytes: 559113
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |