Argus Command Center Web Portal Stable Version 2.1

CSV information

Status active
Valid from 23.06.2021
Valid until 23.06.2026
Scheme 🇲🇾 MY
Manufacturer Certis CISCO Security Pte Ltd (Certis)
Category Other Devices and Systems
Security level EAL2

Heuristics summary

Certificate ID: ISCB-3-RPT-C115-CR-v1

Certificate

Extracted keywords

File metadata

Creation date D:20210630131348Z
Modification date D:20210630215915+08'00'
Pages 1
Creator Word
Producer macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext

Certification report

Extracted keywords

Protocols
TLSv1.2, TLS 1.2

Vendor
Cisco

Security level
EAL2, EAL 2
Claims
A.TRUSTED_ADMIN, A.TRUSTED_DEV, A.TIMESTAMP, A.CLOUD, A.MALWARE, A.DDOS, A.CONNECTIVITY, A.THIRDPARTY
Security Assurance Requirements (SAR)
ALC_DEL.1, ALC_CMS.2
Security Functional Requirements (SFR)
FDP_ACC.1, FDP_ACF.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.1, FIA_ATD.1, FIA_SOS.2, FIA_UID.1, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FTP_ITC.1, FTP_TRP.1
Certificates
ISCB-3-RPT-C115-CR-v1

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Creation date D:20210629084408Z00'00'
Modification date D:20210629084408Z00'00'
Pages 36
Creator Word
Producer macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext

Security target

Extracted keywords

Protocols
TLS 1.2, TLSv1.2

Vendor
Samsung, Cisco

Security level
EAL2, EAL 2
Claims
O.SEC_ACCESS, O.SEC_AUTHENTICATE, O.SEC_COMMUNICATION, O.SEC_PASSWORD_GENERATION, O.SEC_PASSWORD_GENER, T.BROKEN_AUTH, T.UNAUTHORIZED_ACCESS, T.INTERCEPTION, T.WEAK_PASSWORD_GENE, T.WEAK_PASSWORD_GENERATION, T.UNAUTHORIZED_AC, T.WEAK_PASSWORD_, A.TRUSTED_ADMIN, A.TRUSTED_DEV, A.TIMESTAMP, A.CLOUD, A.MALWARE, A.DDOS, A.CONNECTIVITY, A.THIRDPARTY, OE.ADMINISTRATOR, OE.DEVELOPER, OE.SYN_TIMESTAMP, OE.SAFE_CLOUD, OE.ANTI_MALWARE, OE.ANTI_DDOS, OE.SAFE_CONNECTIVITY, OE.THIRDPARTY
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_ECD.1, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.1, ASE_ECD
Security Functional Requirements (SFR)
FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_AFL.1, FIA_UAU.1, FIA_ATD.1, FIA_SOS.1, FIA_SOS.2, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.3, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Side-channel analysis
SPA
Certification process
out of scope, AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope, infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s, inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the, environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and, together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting

File metadata

Title 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14
Author CLAIREHYC
Creation date D:20210701124256+08'00'
Modification date D:20210701124256+08'00'
Pages 46
Creator PDFCreator Free 4.2.0
Producer GPL Ghostscript 9.52

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ISCB-3-RPT-C115-CR-v1

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf",
  "dgst": "c86ad5ef88d4cf8b",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-3-RPT-C115-CR-v1",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL2",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Certis CISCO Security Pte Ltd (Certis)",
  "manufacturer_web": "https://www.certisgroup.com/",
  "name": "Argus Command Center Web Portal Stable Version 2.1",
  "not_valid_after": "2026-06-23",
  "not_valid_before": "2021-06-23",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "ISCB-5-CERT-C115-CERTIFICATE-v1.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20210630131348Z",
      "/Creator": "Word",
      "/ModDate": "D:20210630215915+08\u002700\u0027",
      "/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
      "pdf_file_size_bytes": 205722,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "ISCB-5-RPT-C115-CR-v1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-3-RPT-C115-CR-v1": 35
        }
      },
      "cc_claims": {
        "A": {
          "A.CLOUD": 1,
          "A.CONNECTIVITY": 1,
          "A.DDOS": 1,
          "A.MALWARE": 1,
          "A.THIRDPARTY": 1,
          "A.TIMESTAMP": 1,
          "A.TRUSTED_ADMIN": 1,
          "A.TRUSTED_DEV": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3,
          "EAL2": 6
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC.1": 14,
          "FDP_ACF.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 2,
          "FIA_ATD.1": 5,
          "FIA_SOS.1": 3,
          "FIA_SOS.2": 2,
          "FIA_UAU.1": 2,
          "FIA_UID.1": 7
        },
        "FMT": {
          "FMT_MSA.1": 7,
          "FMT_SMF.1": 3,
          "FMT_SMR.1": 3
        },
        "FTP": {
          "FTP_ITC.1": 17,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS 1.2": 1,
            "TLSv1.2": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 5
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20210629084408Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20210629084408Z00\u002700\u0027",
      "/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
      "pdf_file_size_bytes": 800031,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    },
    "st_filename": "2019 Certis Cisco \u2013 Argus CC EAL2 \u2013 Security Target [ASE]-v1.14 2.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CLOUD": 3,
          "A.CONNECTIVITY": 4,
          "A.DDOS": 3,
          "A.MALWARE": 4,
          "A.THIRDPARTY": 3,
          "A.TIMESTAMP": 4,
          "A.TRUSTED_ADMIN": 4,
          "A.TRUSTED_DEV": 3
        },
        "O": {
          "O.SEC_ACCESS": 5,
          "O.SEC_AUTHENTICATE": 5,
          "O.SEC_COMMUNICATION": 5,
          "O.SEC_PASSWORD_GENER": 1,
          "O.SEC_PASSWORD_GENERATION": 3
        },
        "OE": {
          "OE.ADMINISTRATOR": 3,
          "OE.ANTI_DDOS": 3,
          "OE.ANTI_MALWARE": 3,
          "OE.DEVELOPER": 3,
          "OE.SAFE_CLOUD": 3,
          "OE.SAFE_CONNECTIVITY": 3,
          "OE.SYN_TIMESTAMP": 3,
          "OE.THIRDPARTY": 3
        },
        "T": {
          "T.BROKEN_AUTH": 4,
          "T.INTERCEPTION": 4,
          "T.UNAUTHORIZED_AC": 1,
          "T.UNAUTHORIZED_ACCESS": 2,
          "T.WEAK_PASSWORD_": 1,
          "T.WEAK_PASSWORD_GENE": 1,
          "T.WEAK_PASSWORD_GENERATION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 4,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 4
        },
        "ASE": {
          "ASE_CCL.1": 3,
          "ASE_ECD": 1,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 3,
          "ASE_REQ.2": 5,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 11
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC.1": 8,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 6,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1
        },
        "FIA": {
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_SOS.2": 5,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU.1": 6,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 8,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 7,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 9,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FTP": {
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 5,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope": 1,
          "environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and": 1,
          "infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: \u2022 Amazon Web Service (AWS) host, \u2022 database host(s); \u2022 mobile device(s": 1,
          "inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the": 1,
          "out of scope": 5,
          "together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS 1.2": 3,
            "TLSv1.2": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "SPA": 1
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 7
        },
        "Samsung": {
          "Samsung": 4
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "CLAIREHYC",
      "/CreationDate": "D:20210701124256+08\u002700\u0027",
      "/Creator": "PDFCreator Free 4.2.0",
      "/Keywords": "",
      "/ModDate": "D:20210701124256+08\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.52",
      "/Subject": "",
      "/Title": "2019 Certis Cisco \u2013 Argus CC EAL2 \u2013 Security Target [ASE]-v1.14",
      "pdf_file_size_bytes": 1022047,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 46
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20\u2013%20Argus%20CC%20EAL2%20\u2013%20Security%20Target%20[ASE]-v1.14%202.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "fc2cb9a4772830d7b14e816f2d46aad5bfaa7d2c4a64620dd195a9cb9fe3a082",
      "txt_hash": "626edb526c4ad2df4ba576de449da8218114b250c3e28f12e09aae9d4649c96a"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "309e06af0ee8d7ff15c1dcbb4eeb853798b2c4d23b5729d60f3265acb043dd0f",
      "txt_hash": "4dcabd774290a4d5e25c8d685282a5b5a8e46022ce51a80df50dd8497ee02bb2"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5512b8f95c223c4349bc9bc2f611f6a336afd1e13cea51e52211959d9d7b9b0b",
      "txt_hash": "f3160f8243c7f7ab6f114fe75a8018343bfea0305efd10cdfbe0d5af2de4ce0b"
    }
  },
  "status": "active"
}