This page was not yet optimized for use on mobile
devices.
NetMaster R21B00 - Build 1028
CSV information
| Status | active |
|---|---|
| Valid from | 28.10.2022 |
| Valid until | 28.10.2027 |
| Scheme | 🇪🇸 ES |
| Manufacturer | Ceragon Networks Ltd |
| Category | Network and Network-Related Devices and Systems |
| Security level | EAL2 |
Heuristics summary
Certificate ID: 2021-46-INF-3919
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 4, EAL 2, EAL2Claims
O.ESecurity Assurance Requirements (SAR)
ALC_FLRCertification report
Extracted keywords
Security level
EAL2, EAL 1, EAL 4, EAL 2, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_TDS.1, ADV_ARC.1, AGD_OPE.1, AGD_PRE, AGD_OPE, ALC_CMC.2, ALC_DEL.1, ALC_FLR, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_STG.1, FAU_SAR.1, FDP_ACC.1, FDP_ACF.1, FIA_AFL.1, FIA_UAU.2, FMT_SMF.1, FMT_MSA.1, FTA_SSL.3, FTP_ITCCertificates
2021-46-INF-3919- v1File metadata
| Pages | 12 |
|---|
Security target
Extracted keywords
Protocols
SSH, TLSTLS cipher suites
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384Security level
EAL2Claims
O.S, T.NETWORK_EAVESDROP, A.TRUSTED_ADMINS, A.SECURE_LOCATION, A.SECURE_DB, A.TIMECONFIG, A.TRUSTED_PLATFORM, A.TRUSTED_NES, OT.MANAGEMEN, OT.AUDIT, OT.COMM, OT.MANAGEMENT, OE.TRUSTED_AD, OE.SECURE_LOCA, OE.SECURE_DB, OE.TRUSTED_PLA, OE.TRUSTED_NES, OE.TIMECONFIG, OE.SECURE_LOCATION, OE.TRUSTED_PLATFORM, OE.TRUSTED_ADMINSSecurity Assurance Requirements (SAR)
ADV_TDS, ADV_ARC, ADV_FSP, ADV_FSP.1, ADV_FSP.2, ADV_TDS.1, ADV_ARC.1, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_CMC.2, ALC_CMS.2, ALC_CMS.1, ALC_DEL.1, ATE_FUN, ATE_COV, ATE_IND, ATE_IND.2, ATE_COV.1, ATE_FUN.1, AVA_VAN, AVA_VAN.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_TSS, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_CCL.1, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_STG, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_GEN.1, FAU_GEN.2, FAU_STG.1, FAU_SAR.1, FCS_COP, FDP_ACC, FDP_ACF, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FIA_AFL, FIA_UAU, FIA_UID, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.2.1, FIA_UID.2.1, FIA_AFL.1, FIA_UAU.2, FIA_UID.2, FIA_UID.1, FIA_UAU.1, FMT_MSA, FMT_SMF, FMT_SMR, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.3, FPT_STM.1, FTA_SSL, FTA_SSL.3.1, FTA_SSL.4.1, FTA_SSL.3, FTA_SSL.4, FTP_ITC, FTP_ITC.1File metadata
| Pages | 53 |
|---|
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
2021-46-INF-3919Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Scheme data
| Product | NetMaster R21B00 - Build 1028 | |
|---|---|---|
| Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/967-netmaster-r21b00-build-1028 | |
| Category | Network Access Control Devices | |
| Manufacturer | CERAGON NETWORKS LTD. | |
| Certification Date | 28.10.2022 | |
| Enhanced | ||
| Description | The Target Of Evaluation (TOE) is a Network Management System developed by Ceragon Networks Ltd, and will hereafter be referred to as the TOE throughout this document. The TOE is a Network Management System offering centralized operation and maintenance capability for a range of network elements. The TOE provides the following functionality: Security Audits. User Data Protection. Identification and Authentication. Security Management. TOE Access. Trusted path/channels. | |
| Category | Network Access Control Devices | |
| Manufacturer | CERAGON NETWORKS LTD. | |
| Type | Product | |
| Evaluation Facility | jtsec Beyond IT Security, S.L. | |
| Status | Certified | |
| Certification Date | 28.10.2022 | |
| Cc Version | Common Criteria 3.1 release 5 | |
| Level | EAL2 | |
| Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1688 | |
| Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1689 | |
| Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1690 | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-46_Certificado.pdf",
"dgst": "77aa72a2423c0387",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "2021-46-INF-3919",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1028"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Network Access Control Devices",
"certification_date": "2022-10-28",
"enhanced": {
"category": "Network Access Control Devices",
"cc_version": "Common Criteria 3.1 release 5",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1689",
"certification_date": "2022-10-28",
"description": "The Target Of Evaluation (TOE) is a Network Management System developed by Ceragon Networks Ltd, and will hereafter be referred to as the TOE throughout this document. The TOE is a Network Management System offering centralized operation and maintenance capability for a range of network elements. The TOE provides the following functionality: Security Audits. User Data Protection. Identification and Authentication. Security Management. TOE Access. Trusted path/channels.",
"evaluation_facility": "jtsec Beyond IT Security, S.L.",
"level": "EAL2",
"manufacturer": "CERAGON NETWORKS LTD.",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1690",
"status": "Certified",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1688",
"type": "Product"
},
"manufacturer": "CERAGON NETWORKS LTD.",
"product": "NetMaster R21B00 - Build 1028",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/967-netmaster-r21b00-build-1028"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Ceragon Networks Ltd",
"manufacturer_web": "https://www.ceragon.com/",
"name": "NetMaster R21B00 - Build 1028",
"not_valid_after": "2027-10-28",
"not_valid_before": "2022-10-28",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "2021-46_Certificado.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.E": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "2021-46 INF-3919.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2021-46-INF-3919- v1": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_SPD.1": 1
},
"ATE": {
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 8
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_SAR.1": 1,
"FAU_STG.1": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_UAU.2": 1
},
"FMT": {
"FMT_MSA.1": 1,
"FMT_SMF.1": 1
},
"FTA": {
"FTA_SSL.3": 1
},
"FTP": {
"FTP_ITC": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 389571,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "2021-46 ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.SECURE_DB": 2,
"A.SECURE_LOCATION": 2,
"A.TIMECONFIG": 4,
"A.TRUSTED_ADMINS": 2,
"A.TRUSTED_NES": 2,
"A.TRUSTED_PLATFORM": 2
},
"O": {
"O.S": 1
},
"OE": {
"OE.SECURE_DB": 3,
"OE.SECURE_LOCA": 1,
"OE.SECURE_LOCATION": 4,
"OE.TIMECONFIG": 4,
"OE.TRUSTED_AD": 1,
"OE.TRUSTED_ADMINS": 2,
"OE.TRUSTED_NES": 4,
"OE.TRUSTED_PLA": 1,
"OE.TRUSTED_PLATFORM": 3
},
"OT": {
"OT.AUDIT": 3,
"OT.COMM": 4,
"OT.MANAGEMEN": 1,
"OT.MANAGEMENT": 4
},
"T": {
"T.NETWORK_EAVESDROP": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 3,
"ADV_FSP": 1,
"ADV_FSP.1": 5,
"ADV_FSP.2": 9,
"ADV_TDS": 1,
"ADV_TDS.1": 6
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 5,
"AGD_PRE": 2,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.2": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 2,
"ALC_DEL": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 5,
"ASE_INT": 1,
"ASE_INT.1": 2,
"ASE_OBJ": 1,
"ASE_OBJ.2": 1,
"ASE_REQ": 1,
"ASE_REQ.1": 4,
"ASE_REQ.2": 3,
"ASE_SPD": 1,
"ASE_SPD.1": 2,
"ASE_TSS": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 4,
"ATE_FUN": 1,
"ATE_FUN.1": 5,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4,
"FAU_GEN.1": 8,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 1,
"FAU_SAR": 2,
"FAU_SAR.1": 4,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG": 2,
"FAU_STG.1": 4,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCS": {
"FCS_COP": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 10,
"FDP_ACC.1.1": 1,
"FDP_ACF": 2,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 1
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 3,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 1,
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 5,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA": 4,
"FMT_MSA.1": 5,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 6,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 2,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 6,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 4
},
"FTA": {
"FTA_SSL": 4,
"FTA_SSL.3": 4,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 4,
"FTA_SSL.4.1": 1
},
"FTP": {
"FTP_ITC": 12,
"FTP_ITC.1": 6
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 4
},
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 971903,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 53
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-46%20INF-3919.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-46%20ST.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "71f08ffcca605d7ef3f91fa0d3c7ed48ed0a8803230148bb62ab5ae8d4b1ec8f",
"txt_hash": "fc30c80c7ed94953d33583d3fd0b10a820f8cde8bc9af85193fb302a8223f461"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "33e85c441a06ea921ac6a7795f8438c010e059cf7b1d4bc19e61d953fe9b9e41",
"txt_hash": "1fe622f30ede83d1bc1c459bfa207c47315f328a15db75eca3730eb13bd6c838"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "9aa089220733a34707dccf01a78d87501bb960aecf71c68d72e3fceadf7b36a8",
"txt_hash": "329b2519f0cf14af7473aaa2ad38733412b67c8e75fb72006658a95da7db43db"
}
},
"status": "active"
}