Page 2 of
91
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1
ST Introduction
...................................................................................................................
7
1.1
ST Reference
................................................................................................................
7
1.2
TOE Reference
.............................................................................................................
7
1.3
TOE Overview
..............................................................................................................
8
1.3.1
TOE Type
.....................................................................................................................
8
1.3.2
TOE Usage
...................................................................................................................
8
1.3.3
Major Security Features of TOE
...............................................................................
11
1.4
TOE Description
.........................................................................................................
11
1.4.1
Physical Boundary of TOE
........................................................................................
11
1.4.2
Guidance Documents
................................................................................................
14
1.4.3
Definition of Users
....................................................................................................
17
1.4.3.1.
Direct User
.........................................................................................................
17
1.4.3.2.
Indirect User
......................................................................................................
18
1.4.4
Logical Boundary of TOE
.........................................................................................
19
1.4.4.1.
Basic Functions
..................................................................................................
19
1.4.4.2.
Security Functions
.............................................................................................
22
1.4.5
Protected Assets
........................................................................................................
24
1.4.5.1.
User Data
...........................................................................................................
24
1.4.5.2.
TSF Data
............................................................................................................
25
1.4.5.3.
Functions
............................................................................................................
25
1.5
Glossary
......................................................................................................................
25
1.5.1
Glossary for This ST
.................................................................................................
25
2
Conformance Claim
...........................................................................................................
29
2.1
CC Conformance Claim
..............................................................................................
29
2.2
PP Claims
...................................................................................................................
29
2.3
Package Claims
..........................................................................................................
29
2.4
Conformance Claim Rationale
....................................................................................
30
2.4.1
Consistency Claim with TOE Type in PP
................................................................
30
2.4.2
Consistency Claim with Security Problems and Security Objectives in PP
.........
30
2.4.3
Consistency Claim with Security Requirements in PP
..........................................
31
3
Security Problem Definitions
............................................................................................
34