This page was not yet optimized for use on mobile
devices.
Samsung MFP Security Kit Type_E V1.0
CSV information
| Status | archived |
|---|---|
| Valid from | 09.11.2010 |
| Valid until | 06.05.2013 |
| Scheme | 🇰🇷 KR |
| Manufacturer | Samsung Electronics Co., Ltd. |
| Category | Multi-Function Devices |
| Security level | ALC_FLR.2, EAL3+ |
Heuristics summary
Certificate ID: KECS-CISS-0278-2010
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AESSchemes
MACProtocols
SSLVendor
SamsungSecurity level
EAL3+Claims
A.ACCESS, A.USER, A.ADMIN, A.TIME_STAMP, A.OS, A.NETWORK, A.SSL, A.DBMS, A.AUTH_SERVER, A.EXT_SERVER, A.SSL_CERT, A.KEY_GENERATIONSecurity Assurance Requirements (SAR)
ALC_FLR.2, ATE_COV, ATE_DPTCertificates
KECS-CISS-0278-2010Evaluation facilities
KSELFile metadata
| Title | KECS-CISS-0278-2010 인증결과보고서(Samsung MFP Security Kit Type_E V1.0)-EN-수정.hwp |
|---|---|
| Author | CC |
| Creation date | D:20110701084907+09'00' |
| Modification date | D:20110701084907+09'00' |
| Pages | 28 |
| Creator | Haansoft Hangul 2007 7, 5, 12, 614 |
| Producer | Haansoft PDF 1.3.0.410 |
Security target
Extracted keywords
Symmetric Algorithms
AESHash functions
SHA256Schemes
MACProtocols
SSLTrusted Execution Environments
SEVendor
SamsungSecurity level
EAL3, EAL3+, EAL 3, EAL3 augmentedClaims
D.DOC, D.FUNC, D.PROT, D.CONF, D.FUN, O.DOC, O.FUNC, O.PROT, O.CONF, O.USER, O.INTERFACE, O.SOFTWARE, O.AUDIT, O.AUDIT_STORAGE, O.AUDIT_ACCESS, O.DATA, O.INFO, O.FAX, O.FAX_DATA, O.AUDIT_STORAG, T.DOC, T.FUNC, T.FAX, T.DATA, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMIN, A.TIME_STAMP, A.OS, A.NETWORK, A.SSL, A.DBMS, A.AUTH_SERVER, A.EXT_SERVER, A.SSL_CERT, A.KEY_GENERATION, A.KEY_GENERA, A.KEY_GENERATIO, OE.AUDIT_STORAGE, OE.AUDIT_ACCESS, OE.INTERFACE, OE.PHYSICAL, OE.USER, OE.ADMIN, OE.AUDIT, OE.TIME_STAMP, OE.NETWORK, OE.SSL, OE.OS, OE.DBMS, OE.AUTH_SERVER, OE.EXT_SERVER, OE.SSL_CERT, OE.KEY_GENERATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SEL.1, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FIA_USB.1, FIA_UID.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_GEN.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TST.1, FPT_STM.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3, FTA_SSL.3.1, FTP_TST.1Side-channel analysis
malfunctionCertification process
for accessing the box. - Store print & Confidential print Confidential print is used for printing confidential documents. U.USER needs to enter a password to print it. Store print also only allows the U.USER who storedStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
| Creation date | D:20110630001511+09'00' |
|---|---|
| Modification date | D:20110630001511+09'00' |
| Pages | 93 |
| Creator | ezPDF Builder 2006 |
| Producer | ezPDF Builder 2006 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
KECS-CISS-0278-2010Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Multi-Function Devices",
"cert_link": null,
"dgst": "e0a83da92fb0cad8",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "KECS-CISS-0278-2010",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Samsung Electronics Co., Ltd.",
"manufacturer_web": "https://www.samsung.com",
"name": "Samsung MFP Security Kit Type_E V1.0",
"not_valid_after": "2013-05-06",
"not_valid_before": "2010-11-09",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "CISS-278-EN-NEW.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"KR": {
"KECS-CISS-0278-2010": 1
}
},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.ADMIN": 2,
"A.AUTH_SERVER": 1,
"A.DBMS": 1,
"A.EXT_SERVER": 1,
"A.KEY_GENERATION": 1,
"A.NETWORK": 1,
"A.OS": 1,
"A.SSL": 1,
"A.SSL_CERT": 1,
"A.TIME_STAMP": 1,
"A.USER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3+": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 6
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"KSEL": {
"KSEL": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 11
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "CC",
"/CreationDate": "D:20110701084907+09\u002700\u0027",
"/Creator": "Haansoft Hangul 2007 7, 5, 12, 614",
"/ModDate": "D:20110701084907+09\u002700\u0027",
"/PDFVersion": "1.4",
"/Producer": "Haansoft PDF 1.3.0.410",
"/Title": "KECS-CISS-0278-2010 \uc778\uc99d\uacb0\uacfc\ubcf4\uace0\uc11c(Samsung MFP Security Kit Type_E V1.0)-EN-\uc218\uc815.hwp",
"pdf_file_size_bytes": 385501,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
},
"st_filename": "CISS-278-ST-EN-NEW.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.ADMIN": 6,
"A.AUTH_SERVER": 3,
"A.DBMS": 3,
"A.EXT_SERVER": 3,
"A.KEY_GENERA": 1,
"A.KEY_GENERATIO": 1,
"A.KEY_GENERATION": 1,
"A.NETWORK": 3,
"A.OS": 3,
"A.SSL": 3,
"A.SSL_CERT": 3,
"A.TIME_STAMP": 3,
"A.USER": 3
},
"D": {
"D.CONF": 5,
"D.DOC": 16,
"D.FUN": 1,
"D.FUNC": 7,
"D.PROT": 3
},
"O": {
"O.AUDIT": 5,
"O.AUDIT_ACCESS": 5,
"O.AUDIT_STORAG": 1,
"O.AUDIT_STORAGE": 4,
"O.CONF": 10,
"O.DATA": 12,
"O.DOC": 11,
"O.FAX": 1,
"O.FAX_DATA": 2,
"O.FUNC": 5,
"O.INFO": 5,
"O.INTERFACE": 5,
"O.PROT": 5,
"O.SOFTWARE": 5,
"O.USER": 11
},
"OE": {
"OE.ADMIN": 6,
"OE.AUDIT": 3,
"OE.AUDIT_ACCESS": 3,
"OE.AUDIT_STORAGE": 3,
"OE.AUTH_SERVER": 3,
"OE.DBMS": 3,
"OE.EXT_SERVER": 3,
"OE.INTERFACE": 3,
"OE.KEY_GENERATION": 5,
"OE.NETWORK": 3,
"OE.OS": 3,
"OE.PHYSICAL": 3,
"OE.SSL": 3,
"OE.SSL_CERT": 3,
"OE.TIME_STAMP": 5,
"OE.USER": 12
},
"T": {
"T.CONF": 6,
"T.DATA": 2,
"T.DOC": 6,
"T.FAX": 2,
"T.FUNC": 3,
"T.PROT": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 13,
"ADV_FSP.1": 3,
"ADV_FSP.2": 3,
"ADV_FSP.3": 14,
"ADV_TDS.1": 3,
"ADV_TDS.2": 15
},
"AGD": {
"AGD_OPE.1": 13,
"AGD_PRE.1": 9
},
"ALC": {
"ALC_CMC.3": 14,
"ALC_CMS.1": 1,
"ALC_CMS.3": 7,
"ALC_DEL.1": 6,
"ALC_DVS.1": 7,
"ALC_FLR.2": 21,
"ALC_LCD.1": 8
},
"ASE": {
"ASE_CCL.1": 15,
"ASE_ECD.1": 13,
"ASE_INT.1": 15,
"ASE_OBJ.2": 12,
"ASE_REQ.1": 2,
"ASE_REQ.2": 14,
"ASE_SPD.1": 9,
"ASE_TSS.1": 6
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 6,
"ATE_DPT.1": 6,
"ATE_FUN.1": 12,
"ATE_IND.2": 8
},
"AVA": {
"AVA_VAN.2": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 1,
"EAL3": 7,
"EAL3 augmented": 4,
"EAL3+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 13,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 6,
"FAU_SAR.2.1": 1,
"FAU_SEL.1": 7,
"FAU_SEL.1.1": 1,
"FAU_STG.1": 7,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 6,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 7,
"FCS_CKM.4": 9,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 7,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 16,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 15,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_ETC.1": 7,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC.1": 27,
"FDP_IFC.1.1": 4,
"FDP_IFF.1": 23,
"FDP_IFF.1.1": 4,
"FDP_IFF.1.2": 4,
"FDP_IFF.1.3": 4,
"FDP_IFF.1.4": 4,
"FDP_IFF.1.5": 4,
"FDP_ITC.1": 4,
"FDP_ITC.2": 4,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 10,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 8,
"FIA_ATD.1.1": 1,
"FIA_GEN.2": 1,
"FIA_UAU.1": 5,
"FIA_UAU.2": 14,
"FIA_UAU.2.1": 1,
"FIA_UAU.7": 7,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 8,
"FIA_UID.2": 17,
"FIA_UID.2.1": 1,
"FIA_USB.1": 6,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 9,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 18,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 11,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 13,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 17,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 4,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.3": 10,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_TST.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"for accessing the box. - Store print \u0026 Confidential print Confidential print is used for printing confidential documents. U.USER needs to enter a password to print it. Store print also only allows the U.USER who stored": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 20
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 20
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 104
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20110630001511+09\u002700\u0027",
"/Creator": "ezPDF Builder 2006",
"/ModDate": "D:20110630001511+09\u002700\u0027",
"/Producer": "ezPDF Builder 2006",
"pdf_file_size_bytes": 1800323,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 93
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CISS-278-EN-NEW.pdf",
"scheme": "KR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL3+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CISS-278-ST-EN-NEW.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "56e1fcbcdab2618d79e38d196b08166fc26a8da7e0a45e33a9704eb46d7cb9ec",
"txt_hash": "52d1907efb98302a02f1f942d0d3fe4d021e850b1dcc6e109014714cec2a53ab"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "14b35d2ee58062740c897ed5d786de372061bafcccaa5cb8ba55f96449aba0ec",
"txt_hash": "d5fd56e6c55f5540e32110a968611360151843eb95c3291de42972a64f680c87"
}
},
"status": "archived"
}