This page was not yet optimized for use on mobile
devices.
NEC Groups Information Leakage Prevention System Version: 1.0
CSV information
| Status | archived |
|---|---|
| Valid from | 26.12.2007 |
| Valid until | 07.10.2013 |
| Scheme | 🇯🇵 JP |
| Manufacturer | NEC Corporation |
| Category | Other Devices and Systems |
| Security level | ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, EAL1+ |
Heuristics summary
Certificate ID: JISEC-CC-CRP-C0134
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Vendor
MicrosoftSecurity level
EAL1, EAL1 augmentedClaims
T.INJUSTICE_LOGON, T.UNAUTHORIZED_ACCESS, T.INJUSTICE_CONNECT, A.MANAGE_SAFE_PLACE, A.FACILITIES_IN_SECURE_ROOM, A.UNJUST_SOFTWARE, A.PASSWORD_MANAGEMENT, A.NETWORK, A.OPERATOR_MANAGEMENT, A.LOG_BACKUP, A.PC_STARTUP_SETSecurity Assurance Requirements (SAR)
ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Certificates
CRP-C0134-01, Certification No. C0134Standards
CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004File metadata
| Title | untitled |
|---|---|
| Creation date | D:20080227110226+09'00' |
| Modification date | D:20080227110226+09'00' |
| Pages | 20 |
| Producer | Acrobat Distiller 6.0 (Windows) |
Security target
Extracted keywords
Symmetric Algorithms
AES, 3DESSchemes
MACProtocols
SSLVendor
MicrosoftSecurity level
EAL1Claims
O.RE_AUTH, O.ACCESS_CONTROL, O.AUDIT, O.ACCESS_CONTROL_MEDIA, O.CRYPTOGRAPHY, O.LOG_COLLECT, O.ACCESS, O.CRYPTO, O.ACCESS_CONTROL_, T.INJUSTICE_LOGON, T.UNAUTHORISED_ACCESS, T.INJUSTICE_CONNECT, A.MANAGE_SAFE_PLACE, A.FACILITIES_IN_SECURE_ROOM, A.UNJUST_SOFTWARE, A.PASSWORD_MANAGEMENT, A.NETWORK, A.OPERATOR_MANAGEMENT, A.LOG_BACKUP, A.PC_STARTUP_SET, OE.SECURITY_PARAMETER, OE.MANAGE_PC_PLACE, OE.FACILITIES_IN_SECURE_ROOM, OE.UNJUST_SOFTWARE, OE.PASSWORD_MANAGEMENT, OE.NETWORK, OE.OPERATOR_MANAGEMENT, OE.LOG_BACKUP, OE.LOG_COLLECT, OE.USERDATA_CRYPTOGRAPHY, OE.PC_STARTUP_SET, OE.LOG_, OE.SECURITY_, OE.PC_STARTUPSecurity Assurance Requirements (SAR)
ADV_FSP, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.3.1, FAU_STG.4, FAU_STG.4.1, FAU_STG, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_ETC.2, FDP_IFC.1, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FIA_AFL.1, FIA_UAU.2, FIA_UAU.6, FIA_UID.2, FIA_UID.1, FIA_AFL, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MTD.1, FMT_MSA.2, FMT_MSA.3, FMT_MSA, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_TDC.1, FPT_ITT.1, FPT_ITT.1.1, FPT_STM.1.1, FTP_ITC.1, FTP_TRP, FTP_TRP.1Standards
FIPS PUB 197, FIPS PUB 46-3, CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004File metadata
| Creation date | D:20080226213013+09'00' |
|---|---|
| Modification date | D:20080226213216+09'00' |
| Pages | 87 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 8.1.0 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
JISEC-CC-CRP-C0134Extracted SARs
ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Scheme data
| Cert Id | JISEC-CC-CRP-C0134 | |
|---|---|---|
| Supplier | NEC Corporation | |
| Toe Overseas Name | ----- | |
| Expiration Date | 01.10.2013 | |
| Claim | EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1 | |
| Certification Date | 01.12.2007 | |
| Toe Overseas Link | None | |
| Toe Japan Name | NEC Group Information Leakage Prevention System 1.0 | |
| Toe Japan Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0134_it7148.html | |
| Enhanced | ||
| Product | NEC Group Information Leakage Prevention System | |
| Toe Version | 1.0 | |
| Product Type | Information Leakage Prevention System | |
| Cc Version | 3.1 | |
| Assurance Level | EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1 | |
| Vendor | NEC Corporation | |
| Evaluation Facility | Electronic Commerce Security Technology Laboratory Inc. | |
| Report Link | https://www.ipa.go.jp/en/security/c0134_erpt.pdf | |
| Target Link | https://www.ipa.go.jp/en/security/c0134_est.pdf | |
| Description | PRODUCT DESCRIPTION This TOE is an information leakage prevention system that is deployed throughout the NEC group companies. The TOE is designed to restrict the user's PC operations relevant to taking the information out of a PC. This is implemented by defining the PC control policy in accordance with the privilege assigned to each user by the TOE Administrator and enforcing that policy to each user PC. The main security features of the TOE include identification and authentication, access control, cryptography and auditing. [Identification and Authentication] - A function to identify and authenticate a user [Access Control] - A function to control the input/output PC operations from or to its I/O port or a printer - A function to control the execution of a user program - A function to control the output of a file to the authorized external media - A function to control the output of a file to the authorized USB device - A function to control the creation and modification of the client control information [Cryptography] - A function to encrypt and decrypt a file - A function to create an encryption/decryption key - A function to encrypt/decrypt a file when inputting or outputting it from or to the authorized externa media or the authorized USB device [Auditing] - A function to create logs and transfer them to a log server - A function to view and search logs recorded in a log server | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "85e3322e0f4f0162",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0134",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL1+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0134",
"certification_date": "2007-12-01",
"claim": "EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
"enhanced": {
"assurance_level": "EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
"cc_version": "3.1",
"description": "PRODUCT DESCRIPTION This TOE is an information leakage prevention system that is deployed throughout the NEC group companies. The TOE is designed to restrict the user\u0027s PC operations relevant to taking the information out of a PC. This is implemented by defining the PC control policy in accordance with the privilege assigned to each user by the TOE Administrator and enforcing that policy to each user PC. The main security features of the TOE include identification and authentication, access control, cryptography and auditing. [Identification and Authentication] - A function to identify and authenticate a user [Access Control] - A function to control the input/output PC operations from or to its I/O port or a printer - A function to control the execution of a user program - A function to control the output of a file to the authorized external media - A function to control the output of a file to the authorized USB device - A function to control the creation and modification of the client control information [Cryptography] - A function to encrypt and decrypt a file - A function to create an encryption/decryption key - A function to encrypt/decrypt a file when inputting or outputting it from or to the authorized externa media or the authorized USB device [Auditing] - A function to create logs and transfer them to a log server - A function to view and search logs recorded in a log server",
"evaluation_facility": "Electronic Commerce Security Technology Laboratory Inc.",
"product": "NEC Group Information Leakage Prevention System",
"product_type": "Information Leakage Prevention System",
"report_link": "https://www.ipa.go.jp/en/security/c0134_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0134_est.pdf",
"toe_version": "1.0",
"vendor": "NEC Corporation"
},
"expiration_date": "2013-10-01",
"supplier": "NEC Corporation",
"toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0134_it7148.html",
"toe_japan_name": "NEC Group Information Leakage Prevention System 1.0",
"toe_overseas_link": null,
"toe_overseas_name": "-----"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NEC Corporation",
"manufacturer_web": "https://www.nec.com/",
"name": "NEC Groups Information Leakage Prevention System Version: 1.0",
"not_valid_after": "2013-10-07",
"not_valid_before": "2007-12-26",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "20080306_c0134_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0134-01": 1,
"Certification No. C0134": 1
}
},
"cc_claims": {
"A": {
"A.FACILITIES_IN_SECURE_ROOM": 1,
"A.LOG_BACKUP": 1,
"A.MANAGE_SAFE_PLACE": 1,
"A.NETWORK": 1,
"A.OPERATOR_MANAGEMENT": 1,
"A.PASSWORD_MANAGEMENT": 1,
"A.PC_STARTUP_SET": 1,
"A.UNJUST_SOFTWARE": 1
},
"T": {
"T.INJUSTICE_CONNECT": 1,
"T.INJUSTICE_LOGON": 1,
"T.UNAUTHORIZED_ACCESS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ASE": {
"ASE_OBJ.2": 3,
"ASE_REQ.2": 3,
"ASE_SPD.1": 3
}
},
"cc_security_level": {
"EAL": {
"EAL1": 4,
"EAL1 augmented": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2006-09-002": 2,
"CCMB-2006-09-003": 2,
"CCMB-2006-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 19
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20080227110226+09\u002700\u0027",
"/ModDate": "D:20080227110226+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "untitled",
"pdf_file_size_bytes": 156801,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
},
"st_filename": "20080306_c0134_st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.FACILITIES_IN_SECURE_ROOM": 4,
"A.LOG_BACKUP": 5,
"A.MANAGE_SAFE_PLACE": 3,
"A.NETWORK": 5,
"A.OPERATOR_MANAGEMENT": 4,
"A.PASSWORD_MANAGEMENT": 4,
"A.PC_STARTUP_SET": 4,
"A.UNJUST_SOFTWARE": 5
},
"O": {
"O.ACCESS": 1,
"O.ACCESS_CONTROL": 8,
"O.ACCESS_CONTROL_": 1,
"O.ACCESS_CONTROL_MEDIA": 5,
"O.AUDIT": 6,
"O.CRYPTO": 1,
"O.CRYPTOGRAPHY": 9,
"O.LOG_COLLECT": 7,
"O.RE_AUTH": 8
},
"OE": {
"OE.FACILITIES_IN_SECURE_ROOM": 4,
"OE.LOG_": 1,
"OE.LOG_BACKUP": 4,
"OE.LOG_COLLECT": 4,
"OE.MANAGE_PC_PLACE": 5,
"OE.NETWORK": 5,
"OE.OPERATOR_MANAGEMENT": 5,
"OE.PASSWORD_MANAGEMENT": 5,
"OE.PC_STARTUP": 1,
"OE.PC_STARTUP_SET": 3,
"OE.SECURITY_": 1,
"OE.SECURITY_PARAMETER": 4,
"OE.UNJUST_SOFTWARE": 5,
"OE.USERDATA_CRYPTOGRAPHY": 4
},
"T": {
"T.INJUSTICE_CONNECT": 5,
"T.INJUSTICE_LOGON": 5,
"T.UNAUTHORISED_ACCESS": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_OBJ.2": 3,
"ASE_REQ": 1,
"ASE_REQ.2": 5,
"ASE_SPD": 1,
"ASE_SPD.1": 5,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL1": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 13,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 7,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 11,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 7,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 7,
"FAU_SAR.3.1": 1,
"FAU_STG": 1,
"FAU_STG.1": 11,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 8,
"FAU_STG.3.1": 1,
"FAU_STG.4": 6,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 15,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 3,
"FCS_CKM.4": 12,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 14,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 32,
"FDP_ACC.1": 19,
"FDP_ACF": 25,
"FDP_ACF.1": 18,
"FDP_ETC.2": 7,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 10,
"FDP_ITC.1": 3,
"FDP_ITC.2": 12,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 13,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 5,
"FIA_UAU.2": 9,
"FIA_UAU.6": 8,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 9,
"FIA_UID.1": 5,
"FIA_UID.2": 9,
"FIA_UID.2.1": 1,
"FIA_USB.1": 11,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 49,
"FMT_MSA.1": 9,
"FMT_MSA.2": 10,
"FMT_MSA.3": 12,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 21,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 27,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT.1": 7,
"FPT_ITT.1.1": 1,
"FPT_STM.1": 9,
"FPT_STM.1.1": 1,
"FPT_TDC.1": 4
},
"FTP": {
"FTP_ITC.1": 3,
"FTP_TRP": 1,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2006-09-002": 2,
"CCMB-2006-09-003": 2,
"CCMB-2006-09-004": 2
},
"FIPS": {
"FIPS PUB 197": 8,
"FIPS PUB 46-3": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"3DES": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 12
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20080226213013+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20080226213216+09\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 618504,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 87
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0134_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"ASE_OBJ.2",
"EAL1+",
"ASE_REQ.2",
"ASE_SPD.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0134_st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d1e3a10c80fd0d511e4ccaabdf41797e0b4b59967231dcb639175a947240c21a",
"txt_hash": "a495930d6d1a93de2ccfa482258fab0bc2ee92526c4bc29c70e7bfdd3c64107d"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3171b3ee9657cf2797b708ca305a8757658818d6ef10c63db1a869d27215cac8",
"txt_hash": "ec64c8e21b07fd0334bb4bb92d1a3399ef130fb93447d0935c53e6fc3c221e47"
}
},
"status": "archived"
}