KSignAccess V5.0

CSV information

Status active
Valid from 07.03.2025
Valid until 07.03.2030
Scheme 🇰🇷 KR
Manufacturer KSign Co., LTD.
Category Access Control Devices and Systems
Security level
Protection profiles

Heuristics summary

Certificate ID: KECS-CISS-1342-2025

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Security level
EAL1+
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_PRE.1, AGD_OPE.1, ALC_CMC.1, ALC_CMS.1, ATE_FUN.1, ATE_IND.1, AVA_VAN.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1
Protection profiles
KECS-PP-1230-2023
Certificates
KECS-CISS-1342-2025

Standards
CCMB-2022-11-001, CCMB-2022-11-005, CCMB-2024-07-002, CCMB-2022-11-006

File metadata

Author Administrator
Creation date D:20250307143948+09'00'
Modification date D:20250307143948+09'00'
Pages 24
Creator Microsoft® Word LTSC
Producer Microsoft® Word LTSC

Security target

Extracted keywords

Symmetric Algorithms
SEED, HMAC
Asymmetric Algorithms
RSA-PSS, RSAPSS
Hash functions
SHA256, PBKDF2
Protocols
SSH, SSL, TLS
Randomness
DRBG, RBG
Block cipher modes
CBC

Trusted Execution Environments
PSP

Security level
EAL1+, EAL 1+, EAL1
Claims
T.SESSION_HIJACK, T.RETRY_AUTH_ATTEMPT, T.IMPERSONATION, T.REPLAY, T.WEAK_PASSWORD, T.STORED_DATA_LEAKAGE, T.TRANSMISSION_DATA_DAMAGE, T.WEAK_CRYPTO_PROTOCOLS, T.TSF_COMPROMISE, T.S, T.R, T.I, T.T, T.TSF, A.PHYSICAL_CONTROL, A.TRUSTED_ADMIN, A.LOG_BACKUP, A.OPERATION_SYSTEM_REINFORCEMENT, A.SECURE_DEVELOPMENT, A.SECURE_DBMS, A.TRUSTED_TIMESTAMP, A.SECURED_ADMIN_ACCESS, A.MANUAL_RECOVERY, OE.PHYSICAL_CONTROL, OE.TRUSTED_ADMIN, OE.LOG_BACKUP, OE.OPERATION_SYSTEM_REINFORCEMENT, OE.SECURE_DEVELOPMENT, OE.SECURE_DBMS, OE.TRUSTED_TIMESTAMP, OE.SECURED_ADMIN_ACCESS, OE.MANUAL_RECOVERY
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_FUN.1, ATE_IND.1, ATE_COV.1, AVA_VAN.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_ARP.1, FAU_GEN.1, FAU_SAA.1, FAU_SAR.1, FAU_SAR.3, FAU_STG.4, FAU_STG.5, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_STG.2, FAU_STG.4.1, FAU_STG.5.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.5, FCS_CKM.6, FCS_COP.1, FCS_RBG.1, FCS_RBG.3, FCS_RBG.4, FCS_RBG.5, FCS_RNG.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.5.1, FCS_CKM.6.1, FCS_CKM.6.2, FCS_COP.1.1, FCS_RBG.2, FCS_RBG.1.1, FCS_RBG.1.3, FCS_RBG.3.1, FCS_RBG.4.1, FCS_RBG.5.1, FDP_ITC.1, FDP_ITC.2, FIA_IMA.1, FIA_SOS.3, FIA_IMA.1.1, FIA_SOS.2, FIA_SOS.3.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.4, FIA_UAU.7, FIA_UID.2, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UID.1, FIA_UAU.2.1, FIA_UAU.4.1, FIA_UAU.7.1, FIA_UID.2.1, FMT_PWD.1, FMT_SMF.1, FMT_SMR.1, FMT_PWD.1.1, FMT_PWD.1.2, FMT_PWD.1.3, FMT_MOF.1, FMT_MTD.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_PST.1, FPT_PST.1.1, FPT_FLS.1, FPT_ITT.1, FPT_TST.1, FPT_STM.1, FPT_FLS.1.1, FPT_ITT.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_MCS.2, FTA_SSL.3, FTA_TSE.1, FTA_MCS.1, FTA_MCS.2.1, FTA_MCS.2.2, FTA_SSL.3.1, FTA_TSE.1.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3

Side-channel analysis
malfunction

Standards
NIST SP 800-90, PKCS#5, ISO/IEC 18033-2, ISO/IEC 18031, ISO/IEC 10118-3, ISO/IEC 14888-2, CCMB-2022-11-001, CCMB-2022-11-005, CCMB-2024-07-002, CCMB-2022-11-002, CCMB-2022-11-003, CCMB-2022-11-004

File metadata

Author lake
Creation date D:20250307182342+09'00'
Modification date D:20250307182342+09'00'
Pages 123
Creator Hancom PDF 1.3.0.545
Producer Hancom PDF 1.3.0.545

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

KECS-CISS-1342-2025

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.1, AVA_VAN.1

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "7fd9f6bf3c95296f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "KECS-CISS-1342-2025",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL1+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "c8a7b648d31ea8cb"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "KSign Co., LTD.",
  "manufacturer_web": null,
  "name": "KSignAccess V5.0",
  "not_valid_after": "2030-03-07",
  "not_valid_before": "2025-03-07",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "[KECS-CR-25-05] Certification Report(KSignAccess V5.0).pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "KR": {
          "KECS-CISS-1342-2025": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "KECS": {
          "KECS-PP-1230-2023": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 3
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.1": 2,
          "ALC_CMS.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 3,
          "ASE_OBJ.1": 2,
          "ASE_REQ.1": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_FUN.1": 3,
          "ATE_IND.1": 4
        },
        "AVA": {
          "AVA_VAN.1": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2022-11-001": 2,
          "CCMB-2022-11-005": 2,
          "CCMB-2022-11-006": 1,
          "CCMB-2024-07-002": 3
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Administrator",
      "/CreationDate": "D:20250307143948+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word LTSC",
      "/ModDate": "D:20250307143948+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word LTSC",
      "pdf_file_size_bytes": 672489,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    },
    "st_filename": "KSignAccess V5.0 Security Target V1.4.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA-PSS": 2,
          "RSAPSS": 2
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.LOG_BACKUP": 3,
          "A.MANUAL_RECOVERY": 1,
          "A.OPERATION_SYSTEM_REINFORCEMENT": 3,
          "A.PHYSICAL_CONTROL": 3,
          "A.SECURED_ADMIN_ACCESS": 3,
          "A.SECURE_DBMS": 3,
          "A.SECURE_DEVELOPMENT": 3,
          "A.TRUSTED_ADMIN": 4,
          "A.TRUSTED_TIMESTAMP": 3
        },
        "OE": {
          "OE.LOG_BACKUP": 4,
          "OE.MANUAL_RECOVERY": 2,
          "OE.OPERATION_SYSTEM_REINFORCEMENT": 3,
          "OE.PHYSICAL_CONTROL": 4,
          "OE.SECURED_ADMIN_ACCESS": 3,
          "OE.SECURE_DBMS": 3,
          "OE.SECURE_DEVELOPMENT": 4,
          "OE.TRUSTED_ADMIN": 3,
          "OE.TRUSTED_TIMESTAMP": 3
        },
        "T": {
          "T.I": 1,
          "T.IMPERSONATION": 1,
          "T.R": 2,
          "T.REPLAY": 1,
          "T.RETRY_AUTH_ATTEMPT": 1,
          "T.S": 2,
          "T.SESSION_HIJACK": 1,
          "T.STORED_DATA_LEAKAGE": 1,
          "T.T": 2,
          "T.TRANSMISSION_DATA_DAMAGE": 1,
          "T.TSF": 12,
          "T.TSF_COMPROMISE": 1,
          "T.WEAK_CRYPTO_PROTOCOLS": 1,
          "T.WEAK_PASSWORD": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 14
        },
        "AGD": {
          "AGD_OPE.1": 13,
          "AGD_PRE.1": 7
        },
        "ALC": {
          "ALC_CMC.1": 5,
          "ALC_CMS.1": 7
        },
        "ASE": {
          "ASE_CCL.1": 15,
          "ASE_ECD.1": 13,
          "ASE_INT.1": 16,
          "ASE_OBJ.1": 9,
          "ASE_REQ.1": 19,
          "ASE_SPD.1": 10,
          "ASE_TSS.1": 6
        },
        "ATE": {
          "ATE_COV.1": 3,
          "ATE_FUN.1": 16,
          "ATE_IND.1": 6
        },
        "AVA": {
          "AVA_VAN.1": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1+": 1,
          "EAL1": 8,
          "EAL1+": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 7,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 3,
          "FAU_GEN.1": 11,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAA.1": 7,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR.1": 10,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.3": 7,
          "FAU_SAR.3.1": 1,
          "FAU_STG.2": 3,
          "FAU_STG.4": 9,
          "FAU_STG.4.1": 1,
          "FAU_STG.5": 8,
          "FAU_STG.5.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 18,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 14,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.5": 17,
          "FCS_CKM.5.1": 1,
          "FCS_CKM.6": 16,
          "FCS_CKM.6.1": 2,
          "FCS_CKM.6.2": 1,
          "FCS_COP.1": 15,
          "FCS_COP.1.1": 1,
          "FCS_RBG.1": 16,
          "FCS_RBG.1.1": 1,
          "FCS_RBG.1.3": 1,
          "FCS_RBG.2": 4,
          "FCS_RBG.3": 14,
          "FCS_RBG.3.1": 1,
          "FCS_RBG.4": 12,
          "FCS_RBG.4.1": 1,
          "FCS_RBG.5": 12,
          "FCS_RBG.5.1": 1,
          "FCS_RNG.1": 2
        },
        "FDP": {
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 6
        },
        "FIA": {
          "FIA_AFL.1": 17,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_IMA.1": 12,
          "FIA_IMA.1.1": 2,
          "FIA_SOS.1": 7,
          "FIA_SOS.1.1": 1,
          "FIA_SOS.2": 10,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_SOS.3": 12,
          "FIA_SOS.3.1": 2,
          "FIA_UAU.1": 9,
          "FIA_UAU.2": 13,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.4": 9,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.7": 11,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 8,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 9,
          "FMT_MOF.1.1": 1,
          "FMT_MTD.1": 15,
          "FMT_MTD.1.1": 1,
          "FMT_PWD.1": 15,
          "FMT_PWD.1.1": 2,
          "FMT_PWD.1.2": 2,
          "FMT_PWD.1.3": 2,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 18,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 12,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 5,
          "FPT_ITT.1.1": 1,
          "FPT_PST.1": 10,
          "FPT_PST.1.1": 2,
          "FPT_STM.1": 3,
          "FPT_TST.1": 7,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_MCS.1": 1,
          "FTA_MCS.2": 6,
          "FTA_MCS.2.1": 1,
          "FTA_MCS.2.2": 1,
          "FTA_SSL.3": 5,
          "FTA_SSL.3.1": 1,
          "FTA_TSE.1": 7,
          "FTA_TSE.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 6
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "PBKDF": {
          "PBKDF2": 3
        },
        "SHA": {
          "SHA2": {
            "SHA256": 15
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 2
        },
        "RNG": {
          "RBG": 14
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2022-11-001": 2,
          "CCMB-2022-11-002": 1,
          "CCMB-2022-11-003": 1,
          "CCMB-2022-11-004": 1,
          "CCMB-2022-11-005": 2,
          "CCMB-2024-07-002": 2
        },
        "ISO": {
          "ISO/IEC 10118-3": 3,
          "ISO/IEC 14888-2": 2,
          "ISO/IEC 18031": 14,
          "ISO/IEC 18033-2": 5
        },
        "NIST": {
          "NIST SP 800-90": 1
        },
        "PKCS": {
          "PKCS#5": 1
        }
      },
      "symmetric_crypto": {
        "constructions": {
          "MAC": {
            "HMAC": 9
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "AMD": {
          "PSP": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "lake",
      "/CreationDate": "D:20250307182342+09\u002700\u0027",
      "/Creator": "Hancom PDF 1.3.0.545",
      "/ModDate": "D:20250307182342+09\u002700\u0027",
      "/PDFVersion": "1.4",
      "/Producer": "Hancom PDF 1.3.0.545",
      "pdf_file_size_bytes": 1710794,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 123
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/KECS-PP-1230-2023_PP_EN.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[KECS-CR-25-05]%20Certification%20Report(KSignAccess%20V5.0).pdf",
  "scheme": "KR",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KSignAccess%20V5.0%20Security%20Target%20V1.4.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3494289c7b41a932efe1d203b3bd3e2d02c0de2e6a5bc6a40397c776d8187406",
      "txt_hash": "9ada4c6f3de02808d9e1a48127a6e0dae9be80d560c596756d5861792bef1abf"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "14d436cc04dea8be24a2f5bd6b62adbd9f40b25a43e7396ba6d6ffa3d42f2a33",
      "txt_hash": "20c68756aa9d992e8ba19c393ef9e61eed23af3a006eeb20c9ca705f92d67442"
    }
  },
  "status": "active"
}