Samsung Electronics Co., Ltd. Samsung Knox File Encryption 1.7.0 – Spring

CSV information

Status active
Valid from 19.06.2025
Valid until 19.06.2027
Scheme 🇺🇸 US
Manufacturer Samsung Electronics Co., Ltd.
Category Other Devices and Systems
Security level
Protection profiles

Heuristics summary

Certificate ID: CCEVS-VR-VID-11594-2025

Certificate

Extracted keywords

Vendor
Samsung

Certificates
CCEVS-VR-VID11594-2025
Evaluation facilities
Gossamer Security

File metadata

Title VID11594-FINAL CERT
Pages 1
Producer WeasyPrint 62.3

Certification report

Extracted keywords

Symmetric Algorithms
AES
Randomness
DRBG
Libraries
BoringSSL

Trusted Execution Environments
TrustZone, SE
Vendor
Samsung, Qualcomm

Certificates
CCEVS-VR-VID11594-2025
Evaluation facilities
Gossamer Security

File metadata

Author comptont
Creation date D:20250627101107-04'00'
Modification date D:20250627101107-04'00'
Pages 17
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Frontpage

Certificate ID CCEVS-VR-VID11594-2025
Certified item Samsung Electronics Co., Ltd. Samsung Knox File Encryption 1.7.0 - Spring
Certification lab US NIAP

Security target

Extracted keywords

Symmetric Algorithms
AES, AES-256, HMAC, HMAC-SHA-256
Asymmetric Algorithms
ECC
Hash functions
SHA-256, PBKDF, PBKDF2
Randomness
DRBG, RBG
Block cipher modes
CBC, GCM

Trusted Execution Environments
TrustZone, SE, TEE
Vendor
Samsung, Qualcomm

Claims
A.SHUTDOWN, OE.AUTHORIZATION_FACTOR_STRENGTH, OE.PLATFORM, OE.POWER_SAVE, OE.PROPER_USER, OE.PROPER_ADMIN, OE.STRONG_ENVIRONMENT_
Security Assurance Requirements (SAR)
ADV_FSP, ADV_FSP.1, AGD_OPE, AGD_OPE.1, AGD_PRE, AGD_PRE.1, ALC_TSU_EXT, ALC_TSU_EXT.1, ALC_CMC, ALC_CMC.1, ALC_CMS, ALC_CMS.1, ATE_IND, ATE_IND.1, AVA_VAN, AVA_VAN.1
Security Functional Requirements (SFR)
FCS_COP, FCS_CKM.1, FCS_CKM_EXT, FCS_KDF_EXT.1, FCS_KYC_EXT, FCS_RBG_EXT, FCS_STO_EXT.1, FCS_VAL_EXT, FCS_COP.1, FCS_KDF_EXT, FCS_CKM, FCS_RBG_EXT.1, FCS_CKM_EXT.1, FCS_RGB_EXT.1, FCS_CKM_EXT.1.1, FCS_CKM_EXT.2.1, FCS_CKM_EXT.2.2, FCS_CKM_EXT.3.1, FCS_CKM_EXT.6, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_CKM_EXT.6.1, FCS_CKM_EXT.6.2, FCS_CKM_EXT.6.3, FCS_CKM_EXT.6.4, FCS_CKM_EXT.6.5, FCS_COP.1.1, FCS_KDF_EXT.1.1, FCS_KYC_EXT.1.1, FCS_RBG_EXT.1.1, FCS_STO_EXT.1.1, FCS_VAL_EXT.1, FCS_VAL_EXT.1.1, FCS_VAL_EXT.1.2, FCS_CKM_EXT.4, FCS_CKM_EXT.2, FCS_CKM_EXT.3, FCS_KYC_EXT.1, FDP_ACC.1, FDP_DAR_EXT, FDP_DEC_EXT, FDP_NET_EXT, FDP_PRT_EXT, FDP_DAR_EXT.1.1, FDP_DEC_EXT.1.1, FDP_DEC_EXT.1.2, FDP_NET_EXT.1.1, FDP_PRT_EXT.1.1, FDP_PRT_EXT.1.2, FDP_PRT_EXT.2.1, FDP_PRT_EXT.3.1, FDP_DAR_EXT.1, FDP_DEC_EXT.1, FDP_NET_EXT.1, FDP_PRT_EXT.2, FDP_PRT_EXT.3, FIA_AUT_EXT, FIA_AUT_EXT.1.1, FIA_AUT_EXT.1, FMT_CFG_EXT, FMT_MEC_EXT, FMT_SMF, FMT_SMF.1, FMT_CFG_EXT.1.1, FMT_CFG_EXT.1.2, FMT_MEC_EXT.1.1, FMT_SMF.1.1, FMT_CFG_EXT.1, FMT_MEC_EXT.1, FPR_ANO_EXT, FPR_ANO_EXT.1.1, FPR_ANO_EXT.1, FPT_AEX_EXT, FPT_API_EXT, FPT_IDV_EXT, FPT_KYP_EXT, FPT_LIB_EXT, FPT_TUD_EXT, FPT_AEX_EXT.1.1, FPT_AEX_EXT.1.2, FPT_AEX_EXT.1.3, FPT_AEX_EXT.1.4, FPT_AEX_EXT.1.5, FPT_API_EXT.1.1, FPT_IDV_EXT.1.1, FPT_KYP_EXT.1.1, FPT_LIB_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT.1.4, FPT_TUD_EXT.1.5, FPT_AEX_EXT.1, FPT_API_EXT.1, FPT_TUD_EXT.1, FPT_KYP_EXT.1, FPT_LIB_EXT.1, FTP_DIT_EXT, FTP_DIT_EXT.1.1, FTP_DIT_EXT.1

Standards
FIPS 197, FIPS 198-1, NIST SP 800-132, NIST SP 800-38A, NIST SP 800-38D, SP 800-38D, SP 800-38A, SP 800-90A

File metadata

Title Samsung Electronics Co., Ltd. Samsung Knox File Encryption v1.4 (ASPP13/PPMFE10) Security Target
Author Ranjit Mallela
Creation date D:20250627101355-04'00'
Modification date D:20250627101355-04'00'
Pages 39
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-11594-2025

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND.1, AVA_VAN.1

References

No references are available for this certificate.

Updates Feed

  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11594-ci.pdf",
  "dgst": "a2b7a86761bbba9c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-11594-2025",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL1",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TSU_EXT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.7.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "90c116e62a19bc4d",
        "aac242206b8a0606"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Samsung Electronics Co., Ltd.",
  "manufacturer_web": "https://www.samsung.com",
  "name": "Samsung Electronics Co., Ltd. Samsung Knox File Encryption 1.7.0 \u2013 Spring",
  "not_valid_after": "2027-06-19",
  "not_valid_before": "2025-06-19",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "st_vid11594-ci.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID11594-2025": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Gossamer": {
          "Gossamer Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 3
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Producer": "WeasyPrint 62.3",
      "/Title": "VID11594-FINAL CERT",
      "pdf_file_size_bytes": 134676,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "st_vid11594-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID11594-2025",
        "cert_item": "Samsung Electronics Co., Ltd. Samsung Knox File Encryption 1.7.0 - Spring",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID11594-2025": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Gossamer": {
          "Gossamer Security": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "ARM": {
          "TrustZone": 1
        },
        "IBM": {
          "SE": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Qualcomm": {
          "Qualcomm": 8
        },
        "Samsung": {
          "Samsung": 46
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "comptont",
      "/CreationDate": "D:20250627101107-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/ModDate": "D:20250627101107-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "pdf_file_size_bytes": 290377,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.kb.cert.org/vuls/",
          "https://web.nvd.nist.gov/view/vuln/search"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "st_vid11594-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.SHUTDOWN": 1
        },
        "OE": {
          "OE.AUTHORIZATION_FACTOR_STRENGTH": 1,
          "OE.PLATFORM": 1,
          "OE.POWER_SAVE": 1,
          "OE.PROPER_ADMIN": 1,
          "OE.PROPER_USER": 1,
          "OE.STRONG_ENVIRONMENT_": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.1": 8
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 9,
          "AGD_PRE": 1,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 3,
          "ALC_CMS": 1,
          "ALC_CMS.1": 4,
          "ALC_TSU_EXT": 3,
          "ALC_TSU_EXT.1": 8
        },
        "ATE": {
          "ATE_IND": 1,
          "ATE_IND.1": 4
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.1": 5
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 7,
          "FCS_CKM_EXT": 18,
          "FCS_CKM_EXT.1": 4,
          "FCS_CKM_EXT.1.1": 2,
          "FCS_CKM_EXT.2": 1,
          "FCS_CKM_EXT.2.1": 2,
          "FCS_CKM_EXT.2.2": 1,
          "FCS_CKM_EXT.3": 1,
          "FCS_CKM_EXT.3.1": 1,
          "FCS_CKM_EXT.4": 3,
          "FCS_CKM_EXT.4.1": 2,
          "FCS_CKM_EXT.4.2": 1,
          "FCS_CKM_EXT.6": 3,
          "FCS_CKM_EXT.6.1": 2,
          "FCS_CKM_EXT.6.2": 1,
          "FCS_CKM_EXT.6.3": 2,
          "FCS_CKM_EXT.6.4": 1,
          "FCS_CKM_EXT.6.5": 1,
          "FCS_COP": 9,
          "FCS_COP.1": 11,
          "FCS_COP.1.1": 1,
          "FCS_KDF_EXT": 2,
          "FCS_KDF_EXT.1": 3,
          "FCS_KDF_EXT.1.1": 1,
          "FCS_KYC_EXT": 3,
          "FCS_KYC_EXT.1": 1,
          "FCS_KYC_EXT.1.1": 1,
          "FCS_RBG_EXT": 3,
          "FCS_RBG_EXT.1": 9,
          "FCS_RBG_EXT.1.1": 1,
          "FCS_RGB_EXT.1": 1,
          "FCS_STO_EXT.1": 8,
          "FCS_STO_EXT.1.1": 2,
          "FCS_VAL_EXT": 2,
          "FCS_VAL_EXT.1": 2,
          "FCS_VAL_EXT.1.1": 1,
          "FCS_VAL_EXT.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 3,
          "FDP_DAR_EXT": 3,
          "FDP_DAR_EXT.1": 1,
          "FDP_DAR_EXT.1.1": 1,
          "FDP_DEC_EXT": 3,
          "FDP_DEC_EXT.1": 1,
          "FDP_DEC_EXT.1.1": 1,
          "FDP_DEC_EXT.1.2": 1,
          "FDP_NET_EXT": 3,
          "FDP_NET_EXT.1": 1,
          "FDP_NET_EXT.1.1": 1,
          "FDP_PRT_EXT": 10,
          "FDP_PRT_EXT.1.1": 2,
          "FDP_PRT_EXT.1.2": 1,
          "FDP_PRT_EXT.2": 1,
          "FDP_PRT_EXT.2.1": 1,
          "FDP_PRT_EXT.3": 1,
          "FDP_PRT_EXT.3.1": 1
        },
        "FIA": {
          "FIA_AUT_EXT": 3,
          "FIA_AUT_EXT.1": 1,
          "FIA_AUT_EXT.1.1": 2
        },
        "FMT": {
          "FMT_CFG_EXT": 3,
          "FMT_CFG_EXT.1": 1,
          "FMT_CFG_EXT.1.1": 1,
          "FMT_CFG_EXT.1.2": 1,
          "FMT_MEC_EXT": 3,
          "FMT_MEC_EXT.1": 1,
          "FMT_MEC_EXT.1.1": 1,
          "FMT_SMF": 2,
          "FMT_SMF.1": 4,
          "FMT_SMF.1.1": 2
        },
        "FPR": {
          "FPR_ANO_EXT": 3,
          "FPR_ANO_EXT.1": 1,
          "FPR_ANO_EXT.1.1": 1
        },
        "FPT": {
          "FPT_AEX_EXT": 3,
          "FPT_AEX_EXT.1": 1,
          "FPT_AEX_EXT.1.1": 1,
          "FPT_AEX_EXT.1.2": 1,
          "FPT_AEX_EXT.1.3": 1,
          "FPT_AEX_EXT.1.4": 1,
          "FPT_AEX_EXT.1.5": 1,
          "FPT_API_EXT": 3,
          "FPT_API_EXT.1": 1,
          "FPT_API_EXT.1.1": 1,
          "FPT_IDV_EXT": 4,
          "FPT_IDV_EXT.1.1": 1,
          "FPT_KYP_EXT": 3,
          "FPT_KYP_EXT.1": 1,
          "FPT_KYP_EXT.1.1": 1,
          "FPT_LIB_EXT": 3,
          "FPT_LIB_EXT.1": 1,
          "FPT_LIB_EXT.1.1": 1,
          "FPT_TUD_EXT": 3,
          "FPT_TUD_EXT.1": 1,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1,
          "FPT_TUD_EXT.1.4": 1,
          "FPT_TUD_EXT.1.5": 1
        },
        "FTP": {
          "FTP_DIT_EXT": 3,
          "FTP_DIT_EXT.1": 1,
          "FTP_DIT_EXT.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "PBKDF": {
          "PBKDF": 2,
          "PBKDF2": 7
        },
        "SHA": {
          "SHA2": {
            "SHA-256": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 7
        },
        "RNG": {
          "RBG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 197": 2,
          "FIPS 198-1": 1
        },
        "NIST": {
          "NIST SP 800-132": 5,
          "NIST SP 800-38A": 1,
          "NIST SP 800-38D": 1,
          "SP 800-38A": 1,
          "SP 800-38D": 2,
          "SP 800-90A": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11,
            "AES-256": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1,
            "HMAC-SHA-256": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "ARM": {
          "TrustZone": 8
        },
        "IBM": {
          "SE": 2
        },
        "other": {
          "TEE": 11
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Qualcomm": {
          "Qualcomm": 15
        },
        "Samsung": {
          "Samsung": 107
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Ranjit Mallela",
      "/CreationDate": "D:20250627101355-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/ModDate": "D:20250627101355-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Title": "Samsung Electronics Co., Ltd. Samsung Knox File Encryption v1.4 (ASPP13/PPMFE10) Security Target",
      "pdf_file_size_bytes": 606756,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://security.samsungmobile.com/securityReporting.smsb",
          "http://www.gossamersec.com/",
          "http://security.samsungmobile.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 39
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_FE_V1.0.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_V1.4.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11594-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11594-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9a25753ab832dd491e60a514d70233cfb137a330844286ec871d071eadf66346",
      "txt_hash": "3325dcdc705d61cc0cdd8dcc903d044230f28c301b6e186559956140cd6359a9"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "287e37c7969be3e03c8c723d58f41acd82d162a4746656abe3a0fa37a3a56939",
      "txt_hash": "62c50e198f4f9247dcd493acafcd94f0bac9975689c2ee0f243d43e4115cac3d"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "91218a4a75ae17d482630f4ff5e0be76aa8849ff54189d9e66d2df5907b36dbd",
      "txt_hash": "9036a043fe20c361587b3ea1accc08358d8f3002e3fb4aeae7c49a529dc8993d"
    }
  },
  "status": "active"
}