Ricoh Aficio MP 8001 sec - Page 77

FMT_MTD.1 Management of TSF data, and FPT_TST.1 TSF testing are satisfied.

Page 77 highlights

Page 76 of 82 generation algorithm (compliant with the BSI-AIS31 standard). When the TOE writes to or reads from the HDD, it performs the encryption operations shown in Table 34. Table 34: List of encryption operations on data stored on the HDD Encryption-triggering operation Writing data to HDD Reading data from HDD Encryption operations Encrypt Decrypt Standard Encryption algorithm FIPS197 AES Key size 256 bits The HDD encryption keys can also be printed. If the logged-in user is the machine administrator, the TOE displays a screen on the Operation Panel that the administrator can use to print the HDD encryption keys. The printed encryption keys are used to restore the encryption keys in the event of the encryption keys in the TOE becoming unavailable. In addition, the TOE verifies that the encryption function of the Ic Ctlr operates normally at start-up and verifies the integrity of the HDD encryption keys. If the TOE is not able to verify the integrity of the HDD encryption keys, it will show that the HDD encryption keys have changed. By the above, FCS_CKM.1 (Cryptographic key generation), FCS_COP.1 (Cryptographic operation), FMT_MTD.1 (Management of TSF data), and FPT_TST.1 (TSF testing) are satisfied. 7.1.7 SF.NET_PROT Network Communication Data Protection Function This protects document data and print data in transit on internal networks from leakage, and also detects attempts at tampering. Following are explanations of each functional item in "SF.NET_PROT Network Communication Data Protection Function" and their corresponding security functional requirements. 7.1.7.1 Use of Web Service Function from Client Computer Whenever it receives a request from a client computer for use of the Web Service Function, the TOE communicates with the client computer using the SSL protocol to create a trusted path. By the above, FTP_TRP.1 (Trusted path) is satisfied. 7.1.7.2 Printing and Faxing from Client Computer Whenever it receives a request from a client computer for printing or transmitting faxes, the TOE communicates with the client computer using the SSL protocol to create a trusted path. By the above, FTP_TRP.1 (Trusted path) is satisfied. 7.1.7.3 Sending by E-mail from TOE When sending document data by e-mail to a client computer, the TOE attaches the document data to e-mail and sends the e-mail using S/MIME. The S/MIME destination information is registered as S/MIME user information within general user information. Users can send e-mail referring to the registered destination Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83

Page 76 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
generation algorithm (compliant with the BSI-AIS31 standard). When the TOE writes to or reads from the
HDD, it performs the encryption operations shown in Table 34.
Table 34: List of encryption operations on data stored on the HDD
Encryption-triggering
operation
Encryption
operations
Standard
Encryption
algorithm
Key size
Writing data to HDD
Encrypt
Reading data from HDD
Decrypt
FIPS197
AES
256 bits
The HDD encryption keys can also be printed. If the logged-in user is the machine administrator, the TOE
displays a screen on the Operation Panel that the administrator can use to print the HDD encryption keys.
The printed encryption keys are used to restore the encryption keys in the event of the encryption keys in
the TOE becoming unavailable.
In addition, the TOE verifies that the encryption function of the Ic Ctlr operates normally at start-up and
verifies the integrity of the HDD encryption keys. If the TOE is not able to verify the integrity of the HDD
encryption keys, it will show that the HDD encryption keys have changed.
By the above, FCS_CKM.1 (Cryptographic key generation), FCS_COP.1 (Cryptographic operation),
FMT_MTD.1 (Management of TSF data), and FPT_TST.1 (TSF testing) are satisfied.
7.1.7
SF.NET_PROT
Network Communication Data Protection Function
This protects document data and print data in transit on internal networks from leakage, and also detects
attempts at tampering.
Following are explanations of each functional item in "SF.NET_PROT
Network
Communication
Data Protection Function" and their corresponding security functional requirements.
7.1.7.1
Use of Web Service Function from Client Computer
Whenever it receives a request from a client computer for use of the Web Service Function, the TOE
communicates with the client computer using the SSL protocol to create a trusted path.
By the above, FTP_TRP.1 (Trusted path) is satisfied.
7.1.7.2
Printing and Faxing from Client Computer
Whenever it receives a request from a client computer for printing or transmitting faxes, the TOE
communicates with the client computer using the SSL protocol to create a trusted path.
By the above, FTP_TRP.1 (Trusted path) is satisfied.
7.1.7.3
Sending by E-mail from TOE
When sending document data by e-mail to a client computer, the TOE attaches the document data to e-mail
and sends the e-mail using S/MIME. The S/MIME destination information is registered as S/MIME user
information within general user information. Users can send e-mail referring to the registered destination