This page was not yet optimized for use on mobile
devices.
Huawei GaussDB(openGauss) Database Management System (DBMS) V500R001C20SPC100+V500R001C20HP1015
CSV information
| Status | active |
|---|---|
| Valid from | 31.08.2022 |
| Valid until | 31.08.2027 |
| Scheme | 🇳🇱 NL |
| Manufacturer | Huawei Technologies Co., Ltd. |
| Category | Databases |
| Security level | ALC_FLR.2, EAL4+ |
| Protection profiles |
Heuristics summary
Certificate ID: NSCIB-CC-0392006-CR
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Vendor
Huawei Technologies Co, HuaweiSecurity level
EAL4, EAL2, EAL4 augmentedClaims
R.LSecurity Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR.3Protection profiles
BSI-CC-PP-0088-V2Certificates
CC-22-0392006Evaluation facilities
SGS, SGS Brightsight, BrightsightStandards
ISO/IEC 15408-1, ISO/IEC 15408-2, ISO/IEC 15408-3, ISO/IEC 18045Certification report
Extracted keywords
Vendor
Huawei, Huawei Technologies CoSecurity level
EAL4, EAL 4, EAL4+, EAL 4 augmentedSecurity Assurance Requirements (SAR)
AGD_PRE, AGD_OPE, ALC_FLR.2Certificates
NSCIB-CC-0392006-CREvaluation facilities
SGS, SGS Brightsight, BrightsightSide-channel analysis
JILFile metadata
| Title | Certification Report |
|---|---|
| Author | Microsoft Office User |
| Creation date | D:20220912145554+02'00' |
| Modification date | D:20220912145554+02'00' |
| Pages | 11 |
| Creator | Microsoft® Word 2019 |
| Producer | Microsoft® Word 2019 |
Frontpage
| Certificate ID | NSCIB-CC-0392006-CR |
|---|---|
| Certified item | Huawei GaussDB(openGauss) Database Management System (DBMS) V500R001C20SPC100+V500R001C20HP1015 |
| Certification lab | SGS Brightsight B.V. |
| Developer | Huawei Technologies Co., Ltd |
Security target
Extracted keywords
Hash functions
SHA256Protocols
SSLVendor
Huawei, Huawei Technologies CoSecurity level
EAL 4, EAL4Claims
O.ACCESS_HISTORY, O.ADMIN_ROLE, O.AUDIT, O.DISCRETIONARY, O.MANAGE, O.MEDIATE, O.RESIDUAL_INFORM, O.TOE_ACCESS, O.AUDIT_GENERATION, O.RESIDUAL_INFORMATION, O.DISCRETIONARY_ACCESS, O.ADMIN_R, O.DISCRETI, O.RESIDUAL, O.TOE_ACCE, T.IA_MASQUERADE, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_USER, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_AC, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.IT_REMOTE, OE.IT_TRUSTED, OE.IT_TRUSTED_SYSTEMSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_SEL.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_UAU, FIA_UID, FIA_USB.1, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UID.1, FIA_UAU.2.2, FIA_UID.2.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_STM.1, FPT_ITT.1, FTA_MCS.1, FTA_TSE.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1.1Protection profiles
BSI-CC-PP-0088-V2Certification process
out of scope, including local and remote clients: GSQL, JDBC, ODBC, Psycopg,Libpq) are also out of scope and thus not included in the TOE, including CM Agent, Om Monitor, and CM Server, ETCD) are also out of scope and thus not included in the TOE, including gs_ctl, gs_dump, gs_restore, gs_upgrade, gs_redis) are also out of scope and thus not included in the TOE, database security. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are, the required environment for installing and running the TOE. Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the, 600 GB, and the space of each non-OS disk is greater than or equal to 600 GB. Switch Switch is also out of scope and thus not included in the TOE. It is used to connect node instances in a cluster. OS Evaluation, V2.0SP5, x86_64 Supported OSs: EulerOS V2.0SP8, ARM Software The Software of Python v2.7 is out of scope and thus not included in the TOE. The Software of Huawei JDK1.8.0 is out of scope and thus not, TOE. Clients Clients (including local and remote clients: GSQL, JDBC, ODBC, Psycopg,Libpq) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Cluster Manager, Cluster Manage Components (including CM Agent, Om Monitor, and CM Server, ETCD) are also out of scope and thus not included in the TOE. They are used to manage and monitor the running status of the TOE, Operation Manager Server (including gs_ctl, gs_dump, gs_restore, gs_upgrade, gs_redis) are also out of scope and thus not included in the TOE. They offer the operation tools and configuration manageFile metadata
| Title | ASE_ST |
|---|---|
| Subject | Security Target |
| Keywords | ST |
| Author | zhujinwei,wangshaoyu |
| Creation date | D:20220607160913+02'00' |
| Modification date | D:20220607160913+02'00' |
| Pages | 80 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-0392006-CRExtracted SARs
ALC_FLR.2References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Databases",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cert-cc-22-0392006.pdf",
"dgst": "acde0feaacc840d9",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-0392006-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"3f6ac99252bbf14e"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Huawei Technologies Co., Ltd.",
"manufacturer_web": "https://www.huawei.com",
"name": "Huawei GaussDB(openGauss) Database Management System (DBMS) V500R001C20SPC100+V500R001C20HP1015",
"not_valid_after": "2027-08-31",
"not_valid_before": "2022-08-31",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "nscib-cert-cc-22-0392006.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-22-0392006": 1
}
},
"cc_claims": {
"R": {
"R.L": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0088-V2": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 1,
"ALC_FLR.3": 2
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 2,
"EAL4 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"SGS": {
"SGS": 1,
"SGS Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 1,
"ISO/IEC 15408-2": 1,
"ISO/IEC 15408-3": 1,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 2,
"Huawei Technologies Co": 1
}
},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "nscib-cc-0392006-cr-final.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-0392006-CR",
"cert_item": "Huawei GaussDB(openGauss) Database Management System (DBMS) V500R001C20SPC100+V500R001C20HP1015",
"cert_lab": " SGS Brightsight B.V.",
"developer": "Huawei Technologies Co., Ltd"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"NSCIB-CC-0392006-CR": 11
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_FLR.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 1,
"EAL4+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
},
"SGS": {
"SGS": 2,
"SGS Brightsight": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 16,
"Huawei Technologies Co": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Microsoft Office User",
"/CreationDate": "D:20220912145554+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20220912145554+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"/Title": "Certification Report",
"pdf_file_size_bytes": 210552,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"http://www.tuv.com/nl",
"mailto:[email protected]",
"https://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 11
},
"st_filename": "huawei-gaussdb-kernel-v500r001c20spc100-security-target-v0.18.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUTHUSER": 2,
"A.CONNECT": 3,
"A.MANAGE": 2,
"A.NO_GENERAL_PURPOSE": 3,
"A.PHYSICAL": 3,
"A.SUPPORT": 4,
"A.TRAINEDUSER": 2
},
"O": {
"O.ACCESS_HISTORY": 1,
"O.ADMIN_R": 1,
"O.ADMIN_ROLE": 9,
"O.AUDIT": 2,
"O.AUDIT_GENERATION": 5,
"O.DISCRETI": 1,
"O.DISCRETIONARY": 2,
"O.DISCRETIONARY_ACCESS": 5,
"O.MANAGE": 12,
"O.MEDIATE": 9,
"O.RESIDUAL": 1,
"O.RESIDUAL_INFORM": 1,
"O.RESIDUAL_INFORMATION": 8,
"O.TOE_ACCE": 1,
"O.TOE_ACCESS": 18
},
"OE": {
"OE.ADMIN": 11,
"OE.INFO_PROTECT": 20,
"OE.IT_REMOTE": 10,
"OE.IT_TRUSTED": 1,
"OE.IT_TRUSTED_SYSTEM": 9,
"OE.NO_GENERAL_PURPOSE": 8,
"OE.PHYSICAL": 8
},
"T": {
"T.ACCESS_TSFDATA": 3,
"T.ACCESS_TSFFUNC": 2,
"T.IA_MASQUERADE": 5,
"T.IA_USER": 2,
"T.RESIDUAL_DATA": 3,
"T.TSF_COMPROMISE": 3,
"T.UNAUTHORIZED_AC": 1,
"T.UNAUTHORIZED_ACCESS": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0088-V2": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_FLR": 2,
"ALC_FLR.2": 3,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL4": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 12,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 10,
"FAU_GEN.2.1": 2,
"FAU_SEL.1": 11,
"FAU_SEL.1.1": 3
},
"FDP": {
"FDP_ACC.1": 19,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 18,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 1,
"FDP_RIP.1": 10,
"FDP_RIP.1.1": 3
},
"FIA": {
"FIA_ATD.1": 17,
"FIA_ATD.1.1": 2,
"FIA_UAU": 1,
"FIA_UAU.2": 9,
"FIA_UAU.2.1": 2,
"FIA_UAU.2.2": 1,
"FIA_UID": 1,
"FIA_UID.1": 3,
"FIA_UID.2": 12,
"FIA_UID.2.1": 2,
"FIA_UID.2.2": 1,
"FIA_USB.1": 5
},
"FMT": {
"FMT_MOF.1": 10,
"FMT_MOF.1.1": 2,
"FMT_MSA.1": 11,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 12,
"FMT_MTD.1.1": 1,
"FMT_REV.1": 15,
"FMT_REV.1.1": 5,
"FMT_REV.1.2": 3,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 3,
"FMT_SMR.1": 21,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 2
},
"FPT": {
"FPT_ITT.1": 1,
"FPT_STM.1": 1,
"FPT_TRC.1": 13,
"FPT_TRC.1.1": 2,
"FPT_TRC.1.2": 2
},
"FTA": {
"FTA_MCS.1": 9,
"FTA_MCS.1.1": 2,
"FTA_MCS.1.2": 2,
"FTA_TSE.1": 8,
"FTA_TSE.1.1": 2
}
},
"certification_process": {
"OutOfScope": {
"600 GB, and the space of each non-OS disk is greater than or equal to 600 GB. Switch Switch is also out of scope and thus not included in the TOE. It is used to connect node instances in a cluster. OS Evaluation": 1,
"Cluster Manage Components (including CM Agent, Om Monitor, and CM Server, ETCD) are also out of scope and thus not included in the TOE. They are used to manage and monitor the running status of the TOE": 1,
"Operation Manager Server (including gs_ctl, gs_dump, gs_restore, gs_upgrade, gs_redis) are also out of scope and thus not included in the TOE. They offer the operation tools and configuration manage": 1,
"TOE. Clients Clients (including local and remote clients: GSQL, JDBC, ODBC, Psycopg,Libpq) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Cluster Manager": 1,
"V2.0SP5, x86_64 Supported OSs: EulerOS V2.0SP8, ARM Software The Software of Python v2.7 is out of scope and thus not included in the TOE. The Software of Huawei JDK1.8.0 is out of scope and thus not": 1,
"database security. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are": 1,
"including CM Agent, Om Monitor, and CM Server, ETCD) are also out of scope and thus not included in the TOE": 1,
"including gs_ctl, gs_dump, gs_restore, gs_upgrade, gs_redis) are also out of scope and thus not included in the TOE": 1,
"including local and remote clients: GSQL, JDBC, ODBC, Psycopg,Libpq) are also out of scope and thus not included in the TOE": 1,
"out of scope": 9,
"the required environment for installing and running the TOE. Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 16,
"Huawei Technologies Co": 104
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "zhujinwei,wangshaoyu",
"/CreationDate": "D:20220607160913+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/Keywords": "ST",
"/ModDate": "D:20220607160913+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "Security Target",
"/Title": "ASE_ST",
"pdf_file_size_bytes": 2037368,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://e.huawei.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 80
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0392006-cr-final.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/huawei-gaussdb-kernel-v500r001c20spc100-security-target-v0.18.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "9d8cd7cb271ef61e6923b3b871661debd0ead6c9232fadbe02d5fcacecbd243f",
"txt_hash": "0fda8d83bf8e8407607b7144160fd90808c589d47ff01291c878eca839c8640b"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "7dc540fdfd064274bdc66343f93ebde4180f2b397cca2a86a960a09fb79d98e4",
"txt_hash": "30e7b81efb63b5cf090bc3b9c91fce3c5451122a3ac5165068e63bfa36ac1dbe"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "4772bf6decfd37281f7ebc4352f8e1999c4333f73a1f37ceb2d431585e04ada0",
"txt_hash": "fb5a044cce8e8eb01d7b54fd847fdac34607fe849715187d886946826f055c66"
}
},
"status": "active"
}