This page was not yet optimized for use on mobile
devices.
Huawei 3900 Series LTE eNodeB Core Software V100R015C10SPC270
CSV information
| Status | active |
|---|---|
| Valid from | 04.11.2021 |
| Valid until | 04.11.2026 |
| Scheme | 🇪🇸 ES |
| Manufacturer | Huawei Technologies Co. Ltd. |
| Category | Other Devices and Systems |
| Security level | EAL4+, ALC_FLR.1 |
Heuristics summary
Certificate ID: 2019-34-INF-3639
Certificate
Extracted keywords
Vendor
Huawei, Huawei Technologies CoSecurity level
EAL4Claims
O.E, T.I, A.USecurity Assurance Requirements (SAR)
ALC_FLR.1Evaluation facilities
DEKRA Testing and CertificationFile metadata
| Pages | 2 |
|---|
Certification report
Extracted keywords
Vendor
Huawei, Huawei Technologies CoSecurity level
EAL4+, EAL4, EAL 1, EAL 4, EAL 2, EAL2, ITSEC EvaluationClaims
A.USecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, AGD_OPE.1, ALC_FLR.1, ALC_CMC.4, ALC_DEL.1, ALC_TAT.1, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.3, ASE_CCL.1, ASE_INT.1, ASE_REQ.2Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FCS_COP, FCS_CKM, FDP_ACC, FDP_ACF, FIA_AFL.1, FIA_UAU, FIA_UAU.5, FIA_UID, FIA_SOS.1, FMT_MSA.1, FMT_SMF.1, FTA_TSE, FTP_ITC.1Certificates
2019-34-INF-3639- v1Evaluation facilities
DEKRA Testing and CertificationFile metadata
| Pages | 12 |
|---|
Security target
security target file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Symmetric Algorithms
AES, AES-, HMAC-SHA-256Hash functions
SHA-256Schemes
MAC, Key Exchange, Key AgreementProtocols
SSL, TLS, TLS1.2, IKE, IKEv2, IPsecTrusted Execution Environments
T6Vendor
Huawei Technologies Co, HuaweiSecurity level
EAL4, EAL 4Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.3, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FCS_COP, FCS_CKM, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM.2, FCS_COP.1, FDP_ACC, FDP_ACF, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU, FIA_UAU.5, FIA_UID, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UID.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_TSE, FTA_TSE.1.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Standards
RFC 7296Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
2019-34-INF-3639Extracted SARs
ADV_ARC.1, ADV_IMP.1, AGD_OPE.1, ALC_CMC.4, ALC_DEL.1, ALC_FLR.1, ALC_TAT.1, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ATE_COV.2, ATE_FUN.1, AVA_VAN.3Scheme data
| Product | Huawei 3900 Series LTE eNodeB Core Software V100R015C10SPC270 | |
|---|---|---|
| Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/492-huawei-3900-series-lte-enodeb-core-software-v100r015c10spc270 | |
| Category | Others | |
| Manufacturer | Huawei Technologies Co., Ltd. | |
| Certification Date | 04.11.2021 | |
| Enhanced | ||
| Description | The TOE is the core part of the software that is deployed into a LTE eNodeB base station, which is the wireless access node in LTE/SAE system. It provides the communication with the EPC/Backhaul network (through S1 and X2 interfaces), the management interfaces and other security related functionality. The TOE is the core part of the software that is deployed into a Huawei 3900 series LTE eNodeB base station and the major security features implemented and included in the evaluation scope are: Management network. Identification and Authentication. Access control. Communications security. Telecom network: S1 and X2 backhaul interface protection. Resource management: session establishment mechanisms and VLAN separation. Security function management: command groups, trusted channels, users, etc. Digital signature: for the verification of software packages when loaded. Auditing of security events. | |
| Category | Others | |
| Manufacturer | Huawei Technologies Co., Ltd. | |
| Type | Product | |
| Evaluation Facility | DEKRA Testing and Certification S.A.U. | |
| Status | Certified | |
| Certification Date | 04.11.2021 | |
| Cc Version | Common Criteria 3.1 release 5 | |
| Level | EAL4 + ALC_FLR.1 | |
| Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1294 | |
| Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1292 | |
| Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1293 | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-34%20CCRA.pdf",
"dgst": "db9d4b17cfd52950",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "2019-34-INF-3639",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3900"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Others",
"certification_date": "2021-11-04",
"enhanced": {
"category": "Others",
"cc_version": "Common Criteria 3.1 release 5",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1292",
"certification_date": "2021-11-04",
"description": "The TOE is the core part of the software that is deployed into a LTE eNodeB base station, which is the wireless access node in LTE/SAE system. It provides the communication with the EPC/Backhaul network (through S1 and X2 interfaces), the management interfaces and other security related functionality. The TOE is the core part of the software that is deployed into a Huawei 3900 series LTE eNodeB base station and the major security features implemented and included in the evaluation scope are: Management network. Identification and Authentication. Access control. Communications security. Telecom network: S1 and X2 backhaul interface protection. Resource management: session establishment mechanisms and VLAN separation. Security function management: command groups, trusted channels, users, etc. Digital signature: for the verification of software packages when loaded. Auditing of security events.",
"evaluation_facility": "DEKRA Testing and Certification S.A.U.",
"level": "EAL4 + ALC_FLR.1",
"manufacturer": "Huawei Technologies Co., Ltd.",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1293",
"status": "Certified",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1294",
"type": "Product"
},
"manufacturer": "Huawei Technologies Co., Ltd.",
"product": "Huawei 3900 Series LTE eNodeB Core Software V100R015C10SPC270",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/492-huawei-3900-series-lte-enodeb-core-software-v100r015c10spc270"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Huawei Technologies Co. Ltd.",
"manufacturer_web": "https://www.huawei.com",
"name": "Huawei 3900 Series LTE eNodeB Core Software V100R015C10SPC270",
"not_valid_after": "2026-11-04",
"not_valid_before": "2021-11-04",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "2019-34 CCRA.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.U": 1
},
"O": {
"O.E": 1
},
"T": {
"T.I": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DEKRA": {
"DEKRA Testing and Certification": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 2,
"Huawei Technologies Co": 2
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 962930,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "2019-34 INF-3639.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2019-34-INF-3639- v1": 1
}
},
"cc_claims": {
"A": {
"A.U": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_IMP.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 3,
"ALC_FLR.1": 9,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 1,
"EAL4": 7,
"EAL4+": 1
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_SAR.1": 1,
"FAU_STG.1": 1
},
"FCS": {
"FCS_CKM": 2,
"FCS_COP": 3
},
"FDP": {
"FDP_ACC": 3,
"FDP_ACF": 3
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_SOS.1": 1,
"FIA_UAU": 2,
"FIA_UAU.5": 1,
"FIA_UID": 1
},
"FMT": {
"FMT_MSA.1": 1,
"FMT_SMF.1": 1
},
"FTA": {
"FTA_TSE": 2
},
"FTP": {
"FTP_ITC.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DEKRA": {
"DEKRA Testing and Certification": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 14,
"Huawei Technologies Co": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 802625,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"http://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "2019-34 ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 2,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL4": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1,
"FAU_STG.1": 7,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 5,
"FAU_STG.3.1": 1
},
"FCS": {
"FCS_CKM": 15,
"FCS_CKM.1": 3,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 2,
"FCS_CKM.4": 9,
"FCS_COP": 21,
"FCS_COP.1": 2,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC": 20,
"FDP_ACC.1": 4,
"FDP_ACC.1.1": 3,
"FDP_ACF": 19,
"FDP_ACF.1": 3,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 3,
"FDP_ACF.1.4": 3,
"FDP_IFC.1": 1,
"FDP_ITC.1": 3,
"FDP_ITC.2": 3
},
"FIA": {
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 2,
"FIA_UAU": 13,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 6,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID": 16,
"FIA_UID.1": 2,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA.1": 7,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 12,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 8,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 1
},
"FTA": {
"FTA_TSE": 12,
"FTA_TSE.1.1": 2
},
"FTP": {
"FTP_ITC.1": 6,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 4,
"IKEv2": 1
},
"IPsec": {
"IPsec": 8
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 22,
"TLS1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 7296": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1,
"AES-": 1
}
},
"constructions": {
"MAC": {
"HMAC-SHA-256": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"other": {
"T6": 4
}
},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 13,
"Huawei Technologies Co": 1
}
},
"vulnerability": {}
},
"st_metadata": null
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-34%20INF-3639.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-34%20ST.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "bcf694dfaf203efb8084e0add58002818deffb91bea0bb64dcb8ce30157f0fc6",
"txt_hash": "3a010e8fa844774a40022fd71c80eef459488c328a9eab98996a29ce9876509b"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "c6b88b159ef266a367a60fac56f8291f5e6bd1e0ff1d4c985148ff1f009ba86a",
"txt_hash": "0e08d6deeaed5b5560b0279460de057c3c475b6cf60e0c708112192b519e31d8"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "2f0b36361f5ff55ce8aabce74d61d6b224f6e9fc075c692c87462ec4ae333311",
"txt_hash": "06a1c565b3264b2586555cedbc149dd936a7c7e15b8d1131a5d001614ca839b2"
}
},
"status": "active"
}