This page was not yet optimized for use on mobile
devices.
PikeOS Separation Kernel, Version 5.1.3
CSV information
| Status | active |
|---|---|
| Valid from | 20.09.2022 |
| Valid until | 19.09.2027 |
| Scheme | 🇩🇪 DE |
| Manufacturer | SYSGO GmbH |
| Category | Operating Systems |
| Security level | EAL5+, ALC_DVS.2, AVA_VAN.5, ADV_IMP.2, ALC_FLR.3, ALC_CMC.5 |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1146-2022
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 5, EAL 4, EAL 2, EAL 5 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, ALC_FLR, AVA_VAN.5Certificates
BSI-DSZ-CC-1146-2022Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Trusted Execution Environments
PSPVendor
NXPSecurity level
EAL 5, EAL 4, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 5 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, ALC_FLR, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3, ATE_IND, AVA_VAN.5Certificates
BSI-DSZ-CC-1146-2022Evaluation facilities
atsecCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report, Version 7, 2022-09-08, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 2022-09-06, 18064-0000-MDL.xlsx (confidential document) [9Standards
AIS 34, AIS 32, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-1146-2022 |
|---|---|
| Subject | Certification Report, Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 5.1.3 |
| Keywords | "Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, Certification Report" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20220920112048+02'00' |
| Modification date | D:20220920113713+02'00' |
| Pages | 29 |
| Creator | Writer |
| Producer | LibreOffice 7.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1146-2022 |
|---|---|
| Certified item | PikeOS Separation Kernel Version 5.1.3 |
| Certification lab | BSI |
| Developer | SYSGO GmbH |
References
Incoming- BSI-DSZ-CC-1185-2023 - active - PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0
Security target
Extracted keywords
Hash functions
SHA256Trusted Execution Environments
PSPSecurity level
EAL 5, EAL 5+, EAL5, EAL 5 augmentedClaims
T.DISCLOSURE, T.MODIFICATION, T.DEPLETION, T.EXECUTION, A.PRIVILEGED_EXECUTABLES, A.HARDWARE, A.EXCLUSIVE_RESOURCES, A.PHYSICAL, A.TRUSTWORTHY_PERSONNEL, OT.CONFIDENTIALITY, OT.INTEGRITY, OT.RESOURCE_AVAILABILITY, OT.API_PROTECTION, OE.PRIVILEGED_EXECUTABLES, OE.HARDWARE, OE.EXCLUSIVE_RESOURCES, OE.PHYSICAL, OE.TRUSTWORTHY_PERSONNELSecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_DVS.2, ALC_CMC.5, ALC_TAT.1, ALC_LCD.1, ATE_DPT.1, AVA_VAN.5Security Functional Requirements (SFR)
FDP_ACF, FDP_ACF.1, FDP_ACC, FDP_ACC.2, FDP_IFC.2, FDP_IFF.1, FIA_UID.2, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MTD, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FRU_RSA, FRU_RSA.2File metadata
| Title | Security Target PikeOS Separation Kernel v5.1.3 |
|---|---|
| Keywords | operating system, separation kernel, MILS, multiple independent levels of security, virtualization, hypervisor, embedded, BSI-VS-AP-0015-2019, qualification renforcé |
| Author | Guillaume Fumaroli |
| Creation date | D:20220907162051Z |
| Modification date | D:20220907162051Z |
| Pages | 63 |
| Creator | disclosed |
| Producer | disclosed |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1146-2022Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_INT.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ATE_DPT.1, AVA_VAN.5Scheme data
| Cert Id | BSI-DSZ-CC-1146-2022 | |
|---|---|---|
| Product | PikeOS Separation Kernel, Version 5.1.3 | |
| Vendor | SYSGO GmbH | |
| Certification Date | 20.09.2022 | |
| Category | Operating systems | |
| Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1146.html | |
| Enhanced | ||
| Product | PikeOS Separation Kernel, Version 5.1.3 | |
| Applicant | SYSGO GmbH Am Pfaffenstein 8 55270 Klein-Winternheim | |
| Evaluation Facility | atsec information security GmbH | |
| Assurance Level | EAL5,AVA_VAN.5,ALC_FLR.3,ALC_DVS.2,ALC_CMC.5,ADV_IMP.2 | |
| Certification Date | 20.09.2022 | |
| Expiration Date | 19.09.2027 | |
| Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1146a_pdf.pdf?__blob=publicationFile&v=1 | |
| Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1146b_pdf.pdf?__blob=publicationFile&v=3 | |
| Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1146c_pdf.pdf?__blob=publicationFile&v=1 | |
| Description | The TOE is the PikeOS Separation Kernel version 5.1.3 running on the microprocessor Family (x86 64-bit, ARMv8, or PowerPC) hosting different applications. The TOE is referenced as PikeOS 5.1.3 base product build S6510 for Linux and Windows development host with PikeOS 5.1.3 Certification Kit build S6510. | |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1146c_pdf.pdf",
"dgst": "2704a53db5b77866",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1146-2022",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.1.3"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1185-2023"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1185-2023"
]
},
"indirectly_referencing": null
},
"scheme_data": {
"category": "Operating systems",
"cert_id": "BSI-DSZ-CC-1146-2022",
"certification_date": "2022-09-20",
"enhanced": {
"applicant": "SYSGO GmbH Am Pfaffenstein 8 55270 Klein-Winternheim",
"assurance_level": "EAL5,AVA_VAN.5,ALC_FLR.3,ALC_DVS.2,ALC_CMC.5,ADV_IMP.2",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1146c_pdf.pdf?__blob=publicationFile\u0026v=1",
"certification_date": "2022-09-20",
"description": "The TOE is the PikeOS Separation Kernel version 5.1.3 running on the microprocessor Family (x86 64-bit, ARMv8, or PowerPC) hosting different applications. The TOE is referenced as PikeOS 5.1.3 base product build S6510 for Linux and Windows development host with PikeOS 5.1.3 Certification Kit build S6510.",
"evaluation_facility": "atsec information security GmbH",
"expiration_date": "2027-09-19",
"product": "PikeOS Separation Kernel, Version 5.1.3",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1146a_pdf.pdf?__blob=publicationFile\u0026v=1",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1146b_pdf.pdf?__blob=publicationFile\u0026v=3"
},
"product": "PikeOS Separation Kernel, Version 5.1.3",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1146.html",
"vendor": "SYSGO GmbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SYSGO GmbH",
"manufacturer_web": "https://www.SYSGO.com",
"name": "PikeOS Separation Kernel, Version 5.1.3",
"not_valid_after": "2027-09-19",
"not_valid_before": "2022-09-20",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "1146c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1146-2022": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_IMP.2": 1
},
"ALC": {
"ALC_CMC.5": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 5": 2,
"EAL 5 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "1146a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, AVA_VAN.5",
"cc_version": "Product specific Security Target Common Criteria Part 2 conformant",
"cert_id": "BSI-DSZ-CC-1146-2022",
"cert_item": "PikeOS Separation Kernel Version 5.1.3",
"cert_lab": "BSI",
"developer": "SYSGO GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1146-2022": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.5": 1,
"ADV_IMP.2": 5,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"ALC": {
"ALC_CMC.5": 5,
"ALC_CMS.5": 1,
"ALC_DVS.2": 5,
"ALC_FLR": 3,
"ALC_FLR.3": 5,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_DPT.3": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 4,
"EAL 5": 7,
"EAL 5 augmented": 3,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Report, Version 7, 2022-09-08, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 2022-09-06, 18064-0000-MDL.xlsx (confidential document) [9": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 34": 2
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {
"AMD": {
"PSP": 5
}
},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20220920112048+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, Certification Report\"",
"/ModDate": "D:20220920113713+02\u002700\u0027",
"/Producer": "LibreOffice 7.2",
"/Subject": "Certification Report, Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 5.1.3",
"/Title": "Certification Report BSI-DSZ-CC-1146-2022",
"pdf_file_size_bytes": 533185,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/AIS",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "1146b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.EXCLUSIVE_RESOURCES": 4,
"A.HARDWARE": 4,
"A.PHYSICAL": 4,
"A.PRIVILEGED_EXECUTABLES": 5,
"A.TRUSTWORTHY_PERSONNEL": 4
},
"OE": {
"OE.EXCLUSIVE_RESOURCES": 3,
"OE.HARDWARE": 2,
"OE.PHYSICAL": 2,
"OE.PRIVILEGED_EXECUTABLES": 3,
"OE.TRUSTWORTHY_PERSONNEL": 3
},
"OT": {
"OT.API_PROTECTION": 4,
"OT.CONFIDENTIALITY": 6,
"OT.INTEGRITY": 4,
"OT.RESOURCE_AVAILABILITY": 6
},
"T": {
"T.DEPLETION": 4,
"T.DISCLOSURE": 4,
"T.EXECUTION": 4,
"T.MODIFICATION": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 4,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.5": 4,
"ALC_DVS.2": 5,
"ALC_FLR.3": 4,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_DPT.1": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 5,
"EAL 5 augmented": 2,
"EAL 5+": 1,
"EAL5": 3
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 32,
"FDP_ACC.2": 12,
"FDP_ACF": 34,
"FDP_ACF.1": 27,
"FDP_IFC.2": 8,
"FDP_IFF.1": 11
},
"FIA": {
"FIA_UID.2": 6
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 2,
"FMT_MTD": 12,
"FMT_MTD.1": 3,
"FMT_SMF.1": 5,
"FMT_SMR.1": 7
},
"FRU": {
"FRU_RSA": 10,
"FRU_RSA.2": 5
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"AMD": {
"PSP": 37
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Guillaume Fumaroli",
"/CreationDate": "D:20220907162051Z",
"/Creator": "disclosed",
"/Keywords": "operating system, separation kernel, MILS, multiple independent levels of security, virtualization, hypervisor, embedded, BSI-VS-AP-0015-2019, qualification renforc\u00e9",
"/ModDate": "D:20220907162051Z",
"/PTEX.Fullbanner": "This is pdfTeX, Version 3.1415926-2.4-1.40.13 (TeX Live 2012/Debian) kpathsea version 6.1.0",
"/Producer": "disclosed",
"/Subject": "",
"/Title": "Security Target PikeOS Separation Kernel v5.1.3",
"/Trapped": "/False",
"pdf_file_size_bytes": 1057120,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"mailto:[email protected]",
"mailto:[email protected]",
"https://www.sysgo.com"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 63
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1146a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"AVA_VAN.5",
"EAL5+",
"ALC_DVS.2",
"ALC_CMC.5",
"ADV_IMP.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1146b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "e6fc6f20680d65cc477e2365ac862c490d188561768abc939bf1db758df08c81",
"txt_hash": "51b006b3cd7bce0c1c6f823d721173069355634750b1a812332f9b2c30f6b265"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "0a6e75533d6e700465ddeb6507e333295a8ee46ccfe28d2aacc9b3fc3b5a5ffa",
"txt_hash": "37912c1d29c38a6779ecd0ee629f891ef20ff322b3eabb6477294e33bfe54abd"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "f5febeebd96a6fb4775fdd9cf8445373cde0c9d70a5f19abe113a233a7fa92ae",
"txt_hash": "e4f75aecd1f235d0fd429777170837adef542f868a7f2582919e873112c5e853"
}
},
"status": "active"
}