Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C353 PKI Card System Control Software Version:A02E0Y0-0100-GM0-U4
JISEC-CC-CRP-C0231
Starcos 3.2 QES, Version 2.0
BSI-DSZ-CC-0456-2009
name bizhub C353 PKI Card System Control Software Version:A02E0Y0-0100-GM0-U4 Starcos 3.2 QES, Version 2.0
category Other Devices and Systems Products for Digital Signatures
scheme JP DE
not_valid_after 28.08.2014 01.09.2019
not_valid_before 17.08.2009 27.01.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0231_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0456a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0231_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0456b.pdf
manufacturer Konica Minolta Business Technologies, Inc G+D Mobile Security GmbH
manufacturer_web https://www.konicaminolta.com/ https://www.gi-de.com/de/de/mobile-security/
security_level EAL3 AVA_MSU.3, EAL4+, AVA_VLA.4
dgst fd449aad52796b9c 40200c9eac85011e
heuristics/cert_id JISEC-CC-CRP-C0231 BSI-DSZ-CC-0456-2009
heuristics/cert_lab [] BSI
heuristics/extracted_sars AVA_VLA.2, ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3, ADV_IMP.1
heuristics/extracted_versions 0100 3.2, 2.0
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0495-2009
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0322-2005
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0495-2009, BSI-DSZ-CC-0648-2010
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0223-2003
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0231
  • certification_date: 01.08.2009
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0231_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFD” or through the network and supports the protection from exposure of the highly confidential documents exchanged between MFP and client PC. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD or the encryption function by the encryption board. Besides, TOE has a deletion method compliant with various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator function - Service mode function - Encryption Print Function - S/MIME Encryption Function - Digital Signature Function - All area overwrite deletion function - Encryption key generation function - HDD Verification Function - Authentication Failure Frequency Reset function - Encryption Board Support Function - HDD lock Operation Support Function - PKI Support Function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: bizhub C353 PKI Card System Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0231_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0231_est.pdf
    • toe_version: A02E0Y0-0100-GM0-U4
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.08.2014
  • revalidations: [frozendict({'date': '2010-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0231_it9242_01.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C353 PKI Card System Control Software A02E0Y0-0100-GM0-U4
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0231_it9242.html
  • toe_overseas_name: bizhub C353 PKI Card System Control Software A02E0Y0-0100-GM0-U6
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0322-2005
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0322-2005
pdf_data/report_filename c0231_erpt.pdf 0456a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0456-2009
    • cert_item: STARCOS 3.2 QES Version 2.0
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0231-01: 1
    • Certification No. C0231: 1
  • DE:
    • BSI-DSZ-CC-0322-2005: 1
    • BSI-DSZ-CC-0456-2009: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0006-2002: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 1: 1
    • EAL 4: 7
    • EAL 4 augmented: 2
    • EAL 4+: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL4 augmented: 1
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 4
    • ATE_IND: 5
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 6
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 7
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.IC-CARD: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.BRING-OUT-STORAGE: 3
    • T.DISCARD-MFP: 2
  • OE:
    • OE.HI_VAD: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 1
  • GD:
    • Giesecke & Devrient: 10
  • Infineon:
    • Infineon: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
    • TÜViT: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • HPC:
      • HPC: 2
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 3
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
    • RSA2048: 1
pdf_data/report_keywords/hash_function
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD-160: 2
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
    • physical tampering: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS: 1
    • STARCOS 3: 27
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • BSI:
    • AIS 20: 2
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 4
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Moreover, TOE can prevent the unauthorized access to the image: 1
  • ConfidentialDocument:
    • / m1534a13 SLE66CX360PE / m1536a13 both with RSA2048 V1.4, Version 5, 2007- 11-13, TÜViT (confidential document) 8 specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen und: 1
    • IT Security of TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 1.3, 2009-01-08, Configuration List STARCOS 3.2 QES V2: 1
    • Target BSI-DSZ-0456-2009, Version 1.7, 08.01.2009, STARCOS 3.2 QES V2.0, Giesecke & Devrient GmbH (confidential document) [7] Evaluation Technical Report, Version 4, 2009-01-20, STARCOS 3.2 QES 2.0/2.0B, Evaluation Body: 1
    • confidential document) [9] Security Target BSI-DSZ-0456-2009, Version 1.7, 08.01.2009, STARCOS 3.2 QES V2.0, Giesecke &: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20091023095042+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20091023095552+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20091023004917
  • /Title:
  • pdf_file_size_bytes: 518089
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20090216121731+01'00'
  • /Creator: Writer
  • /Keywords: "STARCOS 3.2 QESVersion 2.0, Giesecke & Devrient GmbH, Secure Signature Creation Device (SSCD Type3)"
  • /ModDate: D:20090216144650+01'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification report BSI-DSZ-CC-0456-2009
  • pdf_file_size_bytes: 392086
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename c0231_est.pdf 0456b.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0322-2005: 2
    • BSI-DSZ-CC-0322-2005-MA-04: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0006-2002: 1
    • BSI-PP-0002-2001: 2
    • BSI-PP-0006-2002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 2
  • EAL:
    • EAL 4: 21
    • EAL4: 7
    • EAL4 augmented: 2
    • EAL4+: 4
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VLA.2: 1
  • ACM:
    • ACM_AUT.1: 3
    • ACM_CAP.3: 1
    • ACM_CAP.4: 2
    • ACM_SCP.2: 3
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 5
  • ADV:
    • ADV_FSP.1: 10
    • ADV_FSP.2: 3
    • ADV_HLD.1: 2
    • ADV_HLD.2: 4
    • ADV_IMP.1: 6
    • ADV_LLD.1: 5
    • ADV_RCR.1: 5
    • ADV_SPM.1: 3
  • AGD:
    • AGD_ADM.1: 10
    • AGD_USR.1: 9
  • ALC:
    • ALC_DVS.1: 4
    • ALC_LCD.1: 2
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_FUN.1: 5
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.3: 9
    • AVA_SOF: 1
    • AVA_SOF.1: 3
    • AVA_VLA.4: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CAP.1: 1
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 12
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 24
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_EID: 2
    • FIA_EID.1: 10
    • FIA_EID.1.1: 2
    • FIA_EID.1.2: 2
    • FIA_SOS.1: 19
    • FIA_SOS.1.1: 3
    • FIA_SSL.3: 1
    • FIA_UAU.1: 9
    • FIA_UAU.2: 19
    • FIA_UAU.2.1: 2
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 11
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 18
    • FIA_UID.2.1: 3
  • FMT:
    • FMT_MOF.1: 23
    • FMT_MOF.1.1: 4
    • FMT_MTD.1: 37
    • FMT_MTD.1.1: 4
    • FMT_SMF.1: 49
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 64
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 8
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 14
    • FCS_COP: 12
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC: 25
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 26
    • FDP_ACF.1: 17
    • FDP_ACF.1.4: 1
    • FDP_ETC: 5
    • FDP_ETC.1: 3
    • FDP_ITC: 7
    • FDP_ITC.1: 7
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 2
    • FDP_SDI: 10
    • FDP_SDI.2: 6
    • FDP_UIT: 18
    • FDP_UIT.1: 13
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 3
    • FMT_MSA: 9
    • FMT_MSA.1: 8
    • FMT_MSA.2: 10
    • FMT_MSA.2.1: 3
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 3
    • FMT_SMR: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 6
    • FPT_AMT.1.1: 2
    • FPT_FLS: 1
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 2
    • FPT_PHP: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 2
    • FPT_RVM: 1
    • FPT_RVM.1: 8
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 9
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TRP: 1
    • FPT_TST: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 22
    • FTP_ITC.1: 17
    • FTP_TRP: 12
    • FTP_TRP.1: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.IC-CARD: 3
    • A.NETWORK: 3
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 2
  • O:
    • O.CHECK-HDD: 4
    • O.CRYPTO-CAPABILITY: 5
    • O.CRYPTO-KEY: 5
    • O.DECRYPT-PRINT: 5
    • O.LOCK-HDD-CAPABILITY: 4
    • O.MAIL-CRYPTO: 5
    • O.MAIL-SIGN: 4
    • O.OVERWRITE-ALL: 4
    • O.PKI-CAPABILITY: 10
  • OE:
    • OE.ADMIN: 3
    • OE.CARD-USER: 3
    • OE.DRIVER: 3
    • OE.IC-CARD: 6
    • OE.NETWORK: 3
    • OE.SECRET: 3
    • OE.SERVICE: 3
    • OE.SETTING-SECURITY: 3
    • OE.SIGN: 3
  • T:
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
  • A:
    • A.CGA: 3
    • A.SCA: 3
  • OE:
    • OE.HI_VAD: 8
pdf_data/st_keywords/vendor
  • GD:
    • G&D: 8
    • Giesecke & Devrient: 7
  • Infineon:
    • Infineon: 5
    • Infineon Technologies AG: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 3
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 2
    • RSA2048: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-256: 3
  • RIPEMD:
    • RIPEMD-160: 2
    • RIPEMD160: 1
  • SHA:
    • SHA2:
      • SHA-2: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • physical tampering: 9
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 104
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 5
    • FIPS 186-2: 6
    • FIPS PUB 197: 3
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS 32: 1
    • AIS20: 1
    • AIS31: 1
  • FIPS:
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 9796-1: 1
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS#1: 3
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Also, it provides the protection function for scan image data: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20091022141845+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20091022143205+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 【C0231】英文公開用_ASE_Thames1_PKI-107-090805.doc
  • /_AdHocReviewCycleID: -693642671
  • /_PreviousAdHocReviewCycleID: -688275005
  • pdf_file_size_bytes: 465777
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 59
  • /Author: Giesecke & Devrient
  • /Company: Giesecke & Devrient
  • /CreationDate: D:20090108191229+01'00'
  • /Creator: Acrobat PDFMaker 7.0 für Word
  • /Keywords: Version 1.7/Status 08.01.2009
  • /ModDate: D:20090108191426+01'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Subject: STARCOS 3.2 QES V2.0
  • /Title: Security Target
  • pdf_file_size_bytes: 339649
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 73
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different