This page was not yet optimized for use on mobile
devices.
KYOCERA TASKalfa MZ7001ci, TASKalfa MZ6001ci, TASKalfa MZ5001ci, TASKalfa MZ4001ci, TASKalfa M30150ci, TASKalfa M30140ci (KYOCERA), 7009ci, 6009ci, 5009ci, 4009ci (TA Triumph-Adler/UTAX), with Hard Disk and FAX System
CSV information
| Status | active |
|---|---|
| Valid from | 26.02.2026 |
| Valid until | 26.02.2031 |
| Scheme | 🇸🇪 SE |
| Manufacturer | KYOCERA Document Solutions Inc. |
| Category | Multi-Function Devices |
| Security level | ALC_FLR.2, EAL2 |
Heuristics summary
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
certification report file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Security target
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-512Asymmetric Algorithms
ECDSA, DH, Diffie-Hellman, DSAHash functions
SHA-256, SHA-512, SHA-224, SHA-384, SHA-2Schemes
MACProtocols
SSH, TLS, IKEv1, IKEv2, IKE, IPsecRandomness
DRBG, RNG, RBGElliptic Curves
P-384, P-256, P-521Block cipher modes
CBC, GCM, XTSVendor
MicrosoftClaims
D.USER, D.TSF, O.ACCESS_CONTROL, O.USER_AUTHORIZATION, O.ADMIN_ROLES, O.UPDATE_VERIFICATION, O.TSF_SELF_TEST, O.COMMS_PROTECTION, O.AUDIT, O.STORAGE_ENCRYPTION, O.KEY_MATERIAL, O.FAX_NET_SEPARATION, O.ACCESS_, O.PURGE_DATA, O.STORAGE_EXCRYPTION, T.UNAUTHORIZED_ACCESS, T.TSF_COMPROMISE, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.NET_COMPROMISE, A.PHYSICAL, A.NETWORK, A.TRUSTED_ADMIN, A.TRAINED_USERS, OE.PHYSICAL_PROTECTION, OE.NETWORK_PROTECTION, OE.ADMIN_TRUST, OE.USER_TRAINING, OE.ADMIN_TRAININGSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_STG_EXT.1, FAU_GEN, FAU_GEN.1, FAU_STG_EXT.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FCS_CKM_EXT, FCS_KDF_EXT, FCS_KYC_EXT, FCS_RBG_EXT, FCS_CKM.1, FCS_TLS_EXT.1, FCS_CKM.4, FCS_COP.1, FCS_CKM_EXT.4, FCS_CKM_EXT.4.1, FCS_RBG_EXT.1, FCS_KDF_EXT.1, FCS_KDF_EXT.1.1, FCS_KYC_EXT.1, FCS_SMC_EXT.1, FCS_KYC_EXT.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_SSH_EXT.1, FCS_SNI_EXT.1.1, FCS_PCC_EXT.1, FDP_DSK_EXT, FDP_FXS_EXT, FDP_DSK_EXT.1.2, FDP_DSK_EXT.1, FDP_DSK_EXT.1.1, FDP_FXS_EXT.1, FDP_FXS_EXT.1.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_IFC.1, FIA_PMG_EXT, FIA_PSK_EXT, FIA_PSK_EXT.1, FIA_PMG_EXT.1, FIA_PMG_EXT.1.1, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_PSK_EXT.1.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_KYP_EXT, FPT_SKP_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_KYP_EXT.1, FPT_KYP_EXT.1.1, FPT_SKP_EXT.1, FPT_SKP_EXT.1.1, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM.1, FPT_STM.1.1, FPT_TUD_EXP.1, FTA_SSL.3, FTA_SSL.3.1, FTP_TRP.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Side-channel analysis
malfunctionStandards
FIPS 140-2, FIPS PUB 186-4, FIPS PUB 197, FIPS PUB 198-1, FIPS PUB 180-3, FIPS 140, FIPS PUB 180-4, NIST SP 800-108, NIST SP 800-132, NIST SP 800-90A, NIST SP 800-38A, NIST SP 800-38B, NIST SP 800-38C, NIST SP 800-38D, RFC 4301, RFC 4303, RFC 3602, RFC 4106, RFC 4109, RFC 4304, RFC 4868, RFC 5282, RFC2409, ISO/IEC 18033-3, ISO/IEC 10116, ISO/IEC 19772, ISO/IEC 10118-, ISO/IEC 10118, ISO/IEC 18031:2011File metadata
| Title | Security Target |
|---|---|
| Subject | ISO15408認証対応資料 |
| Author | KDC |
| Creation date | D:20260218171923+09'00' |
| Modification date | D:20260312110842+01'00' |
| Pages | 108 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
No heuristics are available for this certificate.
Extracted SARs
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_FLR.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1, ATE_IND.1, AVA_VAN.1Similar certificates
Showing 5 out of 33.
References
No references are available for this certificate as its ID was not successfully extracted.
Updates Feed
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Multi-Function Devices",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20certifikat%20TASKalfa6%20MZ4001ci%20HDD%202600PP%20(CSEC2024021).pdf",
"dgst": "ff19af54fd5f4fee",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": null,
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "KYOCERA Document Solutions Inc.",
"manufacturer_web": "https://www.kyoceradocumentsolutions.com/",
"name": "KYOCERA TASKalfa MZ7001ci, TASKalfa MZ6001ci, TASKalfa MZ5001ci, TASKalfa MZ4001ci, TASKalfa M30150ci, TASKalfa M30140ci (KYOCERA), 7009ci, 6009ci, 5009ci, 4009ci (TA Triumph-Adler/UTAX), with Hard Disk and FAX System",
"not_valid_after": "2031-02-26",
"not_valid_before": "2026-02-26",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": null,
"report_frontpage": null,
"report_keywords": null,
"report_metadata": null,
"st_filename": "ST_HCD-PP_TASKalfaMZ4001ci_rev.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"DH": 10,
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NETWORK": 2,
"A.PHYSICAL": 2,
"A.TRAINED_USERS": 2,
"A.TRUSTED_ADMIN": 2
},
"D": {
"D.TSF": 8,
"D.USER": 6
},
"O": {
"O.ACCESS_": 1,
"O.ACCESS_CONTROL": 10,
"O.ADMIN_ROLES": 8,
"O.AUDIT": 7,
"O.COMMS_PROTECTION": 14,
"O.FAX_NET_SEPARATION": 3,
"O.KEY_MATERIAL": 3,
"O.PURGE_DATA": 2,
"O.STORAGE_ENCRYPTION": 6,
"O.STORAGE_EXCRYPTION": 3,
"O.TSF_SELF_TEST": 3,
"O.UPDATE_VERIFICATION": 3,
"O.USER_AUTHORIZATION": 10
},
"OE": {
"OE.ADMIN_TRAINING": 2,
"OE.ADMIN_TRUST": 2,
"OE.NETWORK_PROTECTION": 2,
"OE.PHYSICAL_PROTECTION": 2,
"OE.USER_TRAINING": 2
},
"T": {
"T.NET_COMPROMISE": 2,
"T.TSF_COMPROMISE": 2,
"T.TSF_FAILURE": 2,
"T.UNAUTHORIZED_ACCESS": 2,
"T.UNAUTHORIZED_UPDATE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1,
"ALC_FLR": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 14,
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 1,
"FAU_STG_EXT": 3,
"FAU_STG_EXT.1": 6,
"FAU_STG_EXT.1.1": 2
},
"FCS": {
"FCS_CKM.1": 42,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 2,
"FCS_CKM.4": 10,
"FCS_CKM.4.1": 1,
"FCS_CKM_EXT": 3,
"FCS_CKM_EXT.4": 27,
"FCS_CKM_EXT.4.1": 2,
"FCS_COP.1": 108,
"FCS_COP.1.1": 6,
"FCS_KDF_EXT": 3,
"FCS_KDF_EXT.1": 15,
"FCS_KDF_EXT.1.1": 3,
"FCS_KYC_EXT": 4,
"FCS_KYC_EXT.1": 8,
"FCS_KYC_EXT.1.1": 1,
"FCS_PCC_EXT.1": 1,
"FCS_RBG_EXT": 2,
"FCS_RBG_EXT.1": 33,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 2,
"FCS_SMC_EXT.1": 7,
"FCS_SNI_EXT.1.1": 1,
"FCS_SSH_EXT.1": 6,
"FCS_TLS_EXT.1": 7
},
"FDP": {
"FDP_ACC.1": 10,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 8,
"FDP_DSK_EXT": 2,
"FDP_DSK_EXT.1": 9,
"FDP_DSK_EXT.1.1": 1,
"FDP_DSK_EXT.1.2": 2,
"FDP_FXS_EXT": 2,
"FDP_FXS_EXT.1": 8,
"FDP_FXS_EXT.1.1": 1,
"FDP_IFC.1": 1,
"FDP_ITC.1": 5,
"FDP_ITC.2": 5
},
"FIA": {
"FIA_AFL.1": 4,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_PMG_EXT": 2,
"FIA_PMG_EXT.1": 7,
"FIA_PMG_EXT.1.1": 2,
"FIA_PSK_EXT": 2,
"FIA_PSK_EXT.1": 11,
"FIA_PSK_EXT.1.1": 3,
"FIA_PSK_EXT.1.2": 2,
"FIA_PSK_EXT.1.3": 1,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 4,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 13,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 4,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 4,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 5,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 13,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_KYP_EXT": 2,
"FPT_KYP_EXT.1": 7,
"FPT_KYP_EXT.1.1": 2,
"FPT_SKP_EXT": 2,
"FPT_SKP_EXT.1": 7,
"FPT_SKP_EXT.1.1": 2,
"FPT_STM.1": 7,
"FPT_STM.1.1": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 7,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXP.1": 3,
"FPT_TUD_EXT": 2,
"FPT_TUD_EXT.1": 4,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 3
},
"FTA": {
"FTA_SSL.3": 4,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 12,
"FTP_ITC.1.1": 2,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 11,
"FTP_TRP.1.1": 3,
"FTP_TRP.1.2": 2,
"FTP_TRP.1.3": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"GCM": {
"GCM": 4
},
"XTS": {
"XTS": 7
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 4,
"IKEv1": 27,
"IKEv2": 9
},
"IPsec": {
"IPsec": 46
},
"SSH": {
"SSH": 12
},
"TLS": {
"TLS": {
"TLS": 10
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"P-384": 4,
"P-521": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1,
"SHA-224": 2,
"SHA-256": 18,
"SHA-384": 3,
"SHA-512": 7
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"RNG": {
"RBG": 5,
"RNG": 5
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 3
}
},
"standard_id": {
"FIPS": {
"FIPS 140": 1,
"FIPS 140-2": 4,
"FIPS PUB 180-3": 1,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 7,
"FIPS PUB 197": 2,
"FIPS PUB 198-1": 1
},
"ISO": {
"ISO/IEC 10116": 4,
"ISO/IEC 10118": 4,
"ISO/IEC 10118-": 1,
"ISO/IEC 18031:2011": 5,
"ISO/IEC 18033-3": 2,
"ISO/IEC 19772": 4
},
"NIST": {
"NIST SP 800-108": 4,
"NIST SP 800-132": 2,
"NIST SP 800-38A": 3,
"NIST SP 800-38B": 2,
"NIST SP 800-38C": 2,
"NIST SP 800-38D": 2,
"NIST SP 800-90A": 4
},
"RFC": {
"RFC 3602": 10,
"RFC 4106": 6,
"RFC 4109": 3,
"RFC 4301": 2,
"RFC 4303": 2,
"RFC 4304": 4,
"RFC 4868": 7,
"RFC 5282": 3,
"RFC2409": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19
}
},
"constructions": {
"MAC": {
"HMAC": 12,
"HMAC-SHA-256": 5,
"HMAC-SHA-512": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "KDC",
"/CreationDate": "D:20260218171923+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20260312110842+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Subject": "ISO15408\u8a8d\u8a3c\u5bfe\u5fdc\u8cc7\u6599",
"/Title": "Security Target",
"pdf_file_size_bytes": 1208073,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"file:///D:/ISO15408/\u00e6\u2039\u2019\u00e6\u017e\u0153\u00e7\u203a\u00a9/HCD-PP/01.ST/ST_HCD-PP_TASKalfa7054ci_030.docx%23_Toc41663223",
"file:///D:/ISO15408/\u00e6\u2039\u2019\u00e6\u017e\u0153\u00e7\u203a\u00a9/HCD-PP/01.ST/ST_HCD-PP_TASKalfa7054ci_030.docx%23_Toc41663222",
"file:///D:/ISO15408/\u00e6\u2039\u2019\u00e6\u017e\u0153\u00e7\u203a\u00a9/HCD-PP/01.ST/ST_HCD-PP_TASKalfa7054ci_030.docx%23_Toc41663224"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 108
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Kyocera%20TASKalfa%20MZ4001ci%20HDD_1-0_24FMV6693-42.pdf",
"scheme": "SE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_HCD-PP_TASKalfaMZ4001ci_rev.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "24dd733693e23e907ed872d0068d02bf834383c68d3ff57d2c85dd6421e14cf7",
"txt_hash": "5cea4c86fbad71f8ff837b64da20c771165b03a28af63d956ee896e91d77cf70"
}
},
"status": "active"
}