This page was not yet optimized for use on mobile
devices.
Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
CSV information
| Status | archived |
|---|---|
| Valid from | 24.12.2008 |
| Valid until | 08.04.2014 |
| Scheme | 🇯🇵 JP |
| Manufacturer | Hitachi, Ltd. |
| Category | Access Control Devices and Systems |
| Security level | EAL2 |
Heuristics summary
Certificate ID: JISEC-CC-CRP-C0200
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Protocols
SSLVendor
CiscoSecurity level
EAL2Claims
T.ILLEGAL_XCNTL, T.TSF_COMP, T.LP_LEAK, T.CHG_CONFIG, A.NOEVIL, A.NOEVIL_MNT, A.PHYSICAL_SEC, A.ILLEGAL_SOFT, A.CONNECT_STORAGECertificates
CRP-C0200-01, Certification No. C0200Standards
ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
| Title | untitled |
|---|---|
| Creation date | D:20090401163719+09'00' |
| Modification date | D:20090401163719+09'00' |
| Pages | 24 |
| Producer | Acrobat Distiller 6.0 (Windows) |
Security target
Extracted keywords
Symmetric Algorithms
AES, 3DESAsymmetric Algorithms
RSA 512, DH, DSAHash functions
SHA-1Protocols
SSLv3.0, SSL, TLSv1.0, TLSVendor
Microsoft, Microsoft CorporationSecurity level
EAL 2, EAL2Claims
O.ADM_AUTH, O.ADM_ROLE, O.SEC_COMM, O.HOST_AUTH, O.HOST_ACCESS, O.AUD_GEN, T.ILLEGAL_XCNTL, T.TSF_COMP, T.LP_LEAK, T.CHG_CONFIG, A.NOEVIL, A.NOEVIL_MNT, A.PHYSICAL_SEC, A.ILLEGAL_SOFT, A.CONNECT_STORAGE, OE.NOEVIL, OE.NOEVIL-MNT, OE.PHYSICAL_SEC, OE.ILLEGAL_SOFT, OE.CONNECT_STORAGE, OE.NOEVIL_MNTSecurity Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FDP_ACC.1, FDP_IFC.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_ATD, FIA_ATD.1, FIA_USB, FIA_USB.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_SOS, FIA_SOS.1, FIA_UAU.2, FIA_UID.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2, FIA_MSA.1.1, FIA_MSA.3.1, FIA_MSA.3.2, FIA_UAU.5, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_MOF.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.2, FMT_MOF.1.1, FPT_STM.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2Standards
FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-2, PKCS#1, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003File metadata
| Title | USP_V ST |
|---|---|
| Subject | CC EAL2 Security Target |
| Author | 八木 |
| Creation date | D:20090330094022+09'00' |
| Modification date | D:20090330094033+09'00' |
| Pages | 93 |
| Creator | Word 用 Acrobat PDFMaker 7.0.7 |
| Producer | Acrobat Distiller 7.0.5 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
JISEC-CC-CRP-C0200Extracted SARs
ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1Similar certificates
Scheme data
| Cert Id | JISEC-CC-CRP-C0200 | |
|---|---|---|
| Supplier | Hitachi, Ltd. | |
| Toe Overseas Name | ----- | |
| Expiration Date | 01.04.2014 | |
| Claim | EAL2 | |
| Certification Date | 01.12.2008 | |
| Toe Overseas Link | None | |
| Toe Japan Name | Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14) | |
| Toe Japan Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html | |
| Enhanced | ||
| Product | Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program | |
| Toe Version | 60-02-32-00/00(R6-02A-14) | |
| Product Type | IT Product (Storage Control Software) | |
| Cc Version | 2.3 | |
| Assurance Level | EAL2 | |
| Vendor | Hitachi, Ltd. | |
| Evaluation Facility | Electronic Commerce Security Technology Laboratory Inc. Evaluation Center | |
| Report Link | https://www.ipa.go.jp/en/security/c0200_erpt.pdf | |
| Target Link | https://www.ipa.go.jp/en/security/c0200_est.pdf | |
| Description | PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings. | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Access Control Devices and Systems",
"cert_link": null,
"dgst": "96e36510c2c8ba64",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0200",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"02",
"14",
"00",
"60",
"32"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0200",
"certification_date": "2008-12-01",
"claim": "EAL2",
"enhanced": {
"assurance_level": "EAL2",
"cc_version": "2.3",
"description": "PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: \u201cHitachi Universal Storage Platform V\u201d, \u201cHitachi Universal Storage Platform H24000\u201d, \u201cHitachi Universal Storage Platform VM\u201d, and \u201cHitachi Universal Storage Platform H20000\u201d. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.",
"evaluation_facility": "Electronic Commerce Security Technology Laboratory Inc. Evaluation Center",
"product": "Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program",
"product_type": "IT Product (Storage Control Software)",
"report_link": "https://www.ipa.go.jp/en/security/c0200_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0200_est.pdf",
"toe_version": "60-02-32-00/00(R6-02A-14)",
"vendor": "Hitachi, Ltd."
},
"expiration_date": "2014-04-01",
"supplier": "Hitachi, Ltd.",
"toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html",
"toe_japan_name": "Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)",
"toe_overseas_link": null,
"toe_overseas_name": "-----"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Hitachi, Ltd.",
"manufacturer_web": "https://www.hitachi.com/",
"name": "Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)",
"not_valid_after": "2014-04-08",
"not_valid_before": "2008-12-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0200_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0200-01": 1,
"Certification No. C0200": 1
}
},
"cc_claims": {
"A": {
"A.CONNECT_STORAGE": 1,
"A.ILLEGAL_SOFT": 1,
"A.NOEVIL": 1,
"A.NOEVIL_MNT": 1,
"A.PHYSICAL_SEC": 1
},
"T": {
"T.CHG_CONFIG": 1,
"T.ILLEGAL_XCNTL": 1,
"T.LP_LEAK": 1,
"T.TSF_COMP": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2005-08-001": 2,
"CCMB-2005-08-002": 2,
"CCMB-2005-08-003": 2,
"CCMB-2005-08-004": 2
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20090401163719+09\u002700\u0027",
"/ModDate": "D:20090401163719+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "untitled",
"pdf_file_size_bytes": 147813,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
},
"st_filename": "c0200_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 2
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 512": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECT_STORAGE": 3,
"A.ILLEGAL_SOFT": 3,
"A.NOEVIL": 3,
"A.NOEVIL_MNT": 3,
"A.PHYSICAL_SEC": 3
},
"O": {
"O.ADM_AUTH": 9,
"O.ADM_ROLE": 5,
"O.AUD_GEN": 6,
"O.HOST_ACCESS": 8,
"O.HOST_AUTH": 5,
"O.SEC_COMM": 8
},
"OE": {
"OE.CONNECT_STORAGE": 3,
"OE.ILLEGAL_SOFT": 2,
"OE.NOEVIL": 2,
"OE.NOEVIL-MNT": 1,
"OE.NOEVIL_MNT": 1,
"OE.PHYSICAL_SEC": 3
},
"T": {
"T.CHG_CONFIG": 3,
"T.ILLEGAL_XCNTL": 3,
"T.LP_LEAK": 3,
"T.TSF_COMP": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.2": 2
},
"ADO": {
"ADO_DEL.1": 2,
"ADO_IGS.1": 3
},
"ADV": {
"ADV_FSP.1": 2,
"ADV_HLD.1": 2,
"ADV_RCR.1": 1
},
"AGD": {
"AGD_ADM.1": 3,
"AGD_USR.1": 3
},
"ATE": {
"ATE_COV.1": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_SOF.1": 2,
"AVA_VLA.1": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 21,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 11,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 12,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 13,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 12,
"FAU_STG.3.1": 1
},
"FCS": {
"FCS_CKM.1": 20,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 16,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 18,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 17,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 19,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 16,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6
},
"FIA": {
"FIA_AFL.1": 13,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 27,
"FIA_ATD.1": 6,
"FIA_MSA.1.1": 1,
"FIA_MSA.3.1": 1,
"FIA_MSA.3.2": 1,
"FIA_SOS": 29,
"FIA_SOS.1": 2,
"FIA_UAU.1": 21,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.2": 17,
"FIA_UAU.5": 19,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.7": 13,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 8,
"FIA_UID.2": 22,
"FIA_USB": 27,
"FIA_USB.1": 6
},
"FMT": {
"FMT_MOF.1": 13,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 16,
"FMT_MSA.2": 9,
"FMT_MSA.3": 16,
"FMT_MTD.1": 12,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 18,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 20,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_RVM.1": 32,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 32,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 17,
"FPT_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 16,
"SSLv3.0": 3
},
"TLS": {
"TLS": 3,
"TLSv1.0": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2005-08-001": 4,
"CCMB-2005-08-002": 3,
"CCMB-2005-08-003": 2
},
"FIPS": {
"FIPS PUB 180-2": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1
},
"PKCS": {
"PKCS#1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"3DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "\u516b\u6728",
"/Company": "Hitachi",
"/CreationDate": "D:20090330094022+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 7.0.7",
"/ModDate": "D:20090330094033+09\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/Subject": "CC EAL2 Security Target",
"/Title": "USP_V ST",
"pdf_file_size_bytes": 516948,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 93
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c",
"txt_hash": "affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800",
"txt_hash": "06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5"
}
},
"status": "archived"
}