This page was not yet optimized for use on mobile
devices.
ePass V3 TD sur composants P5CD081V1A, en configuration EAC et AA
CSV information
| Status | archived |
|---|---|
| Valid from | 20.02.2014 |
| Valid until | 01.09.2019 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Oberthur Technologies / NXP Semiconductors GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_DVS.2, EAL5+, AVA_VAN.5 |
| Protection profiles |
Heuristics summary
Certificate ID: ANSSI-CC-2014/02
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
ECCVendor
NXP Semiconductors, NXP, Oberthur TechnologiesSecurity level
EAL 5, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0056-2009, BSI-PP-0035-2007Certificates
BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0857-2013, ANSSI-CC-2014/02Evaluation facilities
Serma TechnologiesStandards
ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Creation date | D:20140224145027+01'00' |
|---|---|
| Modification date | D:20140225101839+01'00' |
| Pages | 15 |
| Creator | PDFCreator Version 1.2.1 |
| Producer | GPL Ghostscript 9.02 |
Frontpage
| Certificate ID | ANSSI-CC-2014/02 |
|---|---|
| Certified item | ePass V3 TD sur composants P5CD081V1A, en configuration EAC et AA |
| Certification lab | Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France |
| Developer | Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France NXP Semiconductors Germany GmbH Box 54 02 40, D-22502 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France |
References
Outgoing- BSI-DSZ-CC-0555-2009 - archived - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
- BSI-DSZ-CC-0857-2013 - archived - NXP Secure Smart Card Controllers P5CD016/021/041/051 and P5Cx081 V1A/ V1A(s)
Security target
Extracted keywords
Symmetric Algorithms
AES, AES128, AES192, AES256, DES, 3DES, Triple-DESAsymmetric Algorithms
ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA1, SHA-224, SHA-384, SHA-512, SHA-256Schemes
MACIC data groups
EF.DG1, EF.DG16, EF.DG13, EF.DG15, EF.DG3, EF.DG4, EF.DG14, EF.DG2, EF.DG5, EF.COM, EF.SODVendor
NXP Semiconductors, NXP, Oberthur TechnologiesSecurity level
EAL5, EAL5 augmentedClaims
OE.MRTD_, OE.BAC-PPSecurity Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_RND.1.1, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_CKM, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_DAU, FDP_DAU.1, FDP_ITC, FDP_ITC.1, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FMT_LIM, FMT_LIM.1, FMT_LIM.1.1, FMT_LIM.2, FMT_LIM.2.1, FMT_MOF, FMT_MTD, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FMT_MOF.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3, FPT_PHP.3.1, FPT_FLSProtection profiles
BSI-CC-PP-056, BSI-PP-0035, BSI-PP-0056Certificates
BSI-DSZ-CC-0555-2009, ANSSi-CC-PP-2009/02Evaluation facilities
Serma TechnologiesSide-channel analysis
physical probing, DPA, physical tampering, Physical tampering, Malfunction, malfunction, DFA, fault injection, reverse engineeringCertification process
out of scope, Access Control • Standard and biometric PIN management (therefore PIN associated commands are out of scope) • BAP and EAP applications 15 FQR 110 6668 Ed1 2.7 TOE life cycle The Smart card life-cycleStandards
FIPS 180-2, FIPS 46-3, FIPS 197, NIST SP 800-90, PKCS#1, AIS 31, RFC 3447, ISO/IEC 15946-1, ISO/IEC 15946-2, ISO/IEC 9796-2, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003Technical reports
BSI 2006File metadata
| Creation date | D:20130710164344+02'00' |
|---|---|
| Modification date | D:20140225101902+01'00' |
| Pages | 52 |
| Creator | PDFCreator Version 0.9.5 |
| Producer | GPL Ghostscript 8.61 |
References
Outgoing- BSI-DSZ-CC-0555-2009 - archived - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2014/02Extracted SARs
ALC_DVS.2, ASE_TSS.2, AVA_VAN.5Similar certificates
Showing 5 out of 15.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "8aa2bbfea5dda988",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2014/02",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"a33327d40f253f46"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0857-2013",
"BSI-DSZ-CC-0555-2009"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0857-2013",
"BSI-DSZ-CC-0555-2009"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0555-2009"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0555-2009"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Oberthur Technologies / NXP Semiconductors GmbH",
"manufacturer_web": "https://www.oberthur.com/",
"name": "ePass V3 TD sur composants P5CD081V1A, en configuration EAC et AA",
"not_valid_after": "2019-09-01",
"not_valid_before": "2014-02-20",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC_2014-02fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2014/02",
"cert_item": "ePass V3 TD sur composants P5CD081V1A, en configuration EAC et AA",
"cert_item_version": "SAAAAR ROM 079161, SAAAAR Codop 079223",
"cert_lab": "Serma Technologies 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
"developer": "Oberthur Technologies 420 rue d\u0027Estienne d\u0027Orves CS 40008 92705 Colombes, France NXP Semiconductors Germany GmbH Box 54 02 40, D-22502 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d\u0027Estienne d\u0027Orves CS 40008 92705 Colombes, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Machine Readable Travel Document with \u201eICAO Application\u201d, Extended Access Control, Version 1.10, BSI-CC-PP-0056-2009"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0555-2009": 1,
"BSI-DSZ-CC-0857-2013": 1
},
"FR": {
"ANSSI-CC-2014/02": 16
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-2009": 2,
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL4": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ICAO": {
"ICAO": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 1,
"NXP Semiconductors": 3
},
"Oberthur": {
"Oberthur Technologies": 15
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20140224145027+01\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.1",
"/Keywords": "",
"/ModDate": "D:20140225101839+01\u002700\u0027",
"/Producer": "GPL Ghostscript 9.02",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 130261,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "ANSSI-CC-cible_2014-02en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 9
},
"ECDSA": {
"ECDSA": 5
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0555-2009": 1
},
"FR": {
"ANSSi-CC-PP-2009/02": 1
}
},
"cc_claims": {
"OE": {
"OE.BAC-PP": 2,
"OE.MRTD_": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-056": 1,
"BSI-PP-0035": 1,
"BSI-PP-0056": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 4
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL5": 5,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 2,
"FAU_SAS.1": 5,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 3,
"FCS_CKM.1": 4,
"FCS_CKM.1.1": 1,
"FCS_CKM.4": 3,
"FCS_CKM.4.1": 1,
"FCS_COP": 18,
"FCS_COP.1": 5,
"FCS_RND": 2,
"FCS_RND.1": 5,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC.1": 3,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 3,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU": 3,
"FDP_DAU.1": 2,
"FDP_ITC": 3,
"FDP_ITC.1": 3,
"FDP_UCT.1": 3,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 3,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_API": 2,
"FIA_API.1": 5,
"FIA_API.1.1": 2,
"FIA_UAU.1": 3,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 3,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 3,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 3,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 3,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 2,
"FMT_LIM.1": 8,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 8,
"FMT_LIM.2.1": 2,
"FMT_MOF": 8,
"FMT_MOF.1": 2,
"FMT_MTD": 26,
"FMT_MTD.1": 8,
"FMT_MTD.3": 3,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 3,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 3,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 2,
"FPT_EMS.1": 5,
"FPT_EMS.1.1": 2,
"FPT_EMS.1.2": 2,
"FPT_FLS": 1,
"FPT_FLS.1": 2,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 3,
"FPT_PHP.3.1": 1,
"FPT_TST.1": 4,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"Access Control \u2022 Standard and biometric PIN management (therefore PIN associated commands are out of scope) \u2022 BAP and EAP applications 15 FQR 110 6668 Ed1 2.7 TOE life cycle The Smart card life-cycle": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2,
"SHA1": 1
},
"SHA2": {
"SHA-224": 4,
"SHA-256": 2,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 7,
"EF.DG1": 9,
"EF.DG13": 1,
"EF.DG14": 3,
"EF.DG15": 3,
"EF.DG16": 10,
"EF.DG2": 1,
"EF.DG3": 11,
"EF.DG4": 10,
"EF.DG5": 1,
"EF.SOD": 6
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"DFA": 3,
"Malfunction": 2,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 3,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"physical probing": 3
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 31": 1
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
},
"FIPS": {
"FIPS 180-2": 1,
"FIPS 197": 1,
"FIPS 46-3": 1
},
"ICAO": {
"ICAO": 10
},
"ISO": {
"ISO/IEC 15946-1": 1,
"ISO/IEC 15946-2": 1,
"ISO/IEC 9796-2": 1
},
"NIST": {
"NIST SP 800-90": 1
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 3447": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 10,
"AES128": 1,
"AES192": 1,
"AES256": 1
}
},
"DES": {
"3DES": {
"3DES": 5,
"Triple-DES": 5
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 2006": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 3,
"NXP Semiconductors": 1
},
"Oberthur": {
"Oberthur Technologies": 8
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20130710164344+02\u002700\u0027",
"/Creator": "PDFCreator Version 0.9.5",
"/Keywords": "",
"/ModDate": "D:20140225101902+01\u002700\u0027",
"/Producer": "GPL Ghostscript 8.61",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 667253,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 52
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-02fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL5+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-02en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f04f6bee342327598e9ae1f70f428c088b1f8e5c34c13322cdb5055c3d2b4300",
"txt_hash": "222175dc97b87ddacd8be939c3ef09a4a4ddf04a8e2af67dad2904e3e6aa4a99"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "92c5e7f1d003f1e88ebaa5dca8fe92712c5d7815d7f81c755d1352cbd46ea369",
"txt_hash": "fb7e4b49edd15a00e503ca95eae61a229c030d2d8b2b247c1a2553fb82d2e383"
}
},
"status": "archived"
}