Page 2 of
93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1
ST Introduction
...................................................................................................................
7
1.1
ST Reference
................................................................................................................
7
1.2
TOE Reference
.............................................................................................................
7
1.3
TOE Overview
..............................................................................................................
8
1.3.1
TOE Type
.....................................................................................................................
8
1.3.2
TOE Usage
...................................................................................................................
8
1.3.3
Major Security Features of TOE
..............................................................................
10
1.4
TOE Description
.........................................................................................................
11
1.4.1
Physical Boundary of TOE
........................................................................................
11
1.4.2
Guidance Documents
................................................................................................
14
1.4.3
Definition of Users
....................................................................................................
18
1.4.3.1.
Direct User
.........................................................................................................
19
1.4.3.2.
Indirect User
......................................................................................................
20
1.4.4
Logical Boundary of TOE
.........................................................................................
21
1.4.4.1.
Basic Functions
..................................................................................................
21
1.4.4.2.
Security Functions
.............................................................................................
24
1.4.5
Protected Assets
........................................................................................................
26
1.4.5.1.
User Data
...........................................................................................................
26
1.4.5.2.
TSF Data
............................................................................................................
27
1.4.5.3.
Functions
............................................................................................................
27
1.5
Glossary
......................................................................................................................
27
1.5.1
Glossary for This ST
.................................................................................................
27
2
Conformance Claim
...........................................................................................................
31
2.1
CC Conformance Claim
..............................................................................................
31
2.2
PP Claims
...................................................................................................................
31
2.3
Package Claims
..........................................................................................................
31
2.4
Conformance Claim Rationale
....................................................................................
32
2.4.1
Consistency Claim with TOE Type in PP
................................................................
32
2.4.2
Consistency Claim with Security Problems and Security Objectives in PP
.........
32
2.4.3
Consistency Claim with Security Requirements in PP
..........................................
33
3
Security Problem Definitions
............................................................................................
36