Page 2 of
93
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1
ST Introduction
.....................................................................................................................
7
1.1
ST Reference
..................................................................................................................
7
1.2
TOE Reference
...............................................................................................................
7
1.3
TOE Overview
................................................................................................................
8
1.3.1
TOE Type
...................................................................................................................
8
1.3.2
TOE Usage
.................................................................................................................
8
1.3.3
Major Security Features of TOE
.............................................................................
11
1.4
TOE Description
...........................................................................................................
11
1.4.1
Physical Boundary of TOE
......................................................................................
11
1.4.2
Guidance Documents
...............................................................................................
14
1.4.3
Definition of Users
...................................................................................................
17
1.4.3.1.
Direct User
........................................................................................................
17
1.4.3.2.
Indirect User
.....................................................................................................
18
1.4.4
Logical Boundary of TOE
........................................................................................
20
1.4.4.1.
Basic Functions
................................................................................................
20
1.4.4.2.
Security Functions
............................................................................................
23
1.4.5
Protected Assets
.......................................................................................................
25
1.4.5.1.
User Data
..........................................................................................................
25
1.4.5.2.
TSF Data
...........................................................................................................
25
1.4.5.3.
Functions
..........................................................................................................
25
1.5
Glossary
........................................................................................................................
26
1.5.1
Glossary for This ST
................................................................................................
26
2
Conformance Claim
.............................................................................................................
30
2.1
CC Conformance Claim
................................................................................................
30
2.2
PP Claims
.....................................................................................................................
30
2.3
Package Claims
............................................................................................................
30
2.4
Conformance Claim Rationale
.....................................................................................
31
2.4.1
Consistency Claim with TOE Type in PP
...............................................................
31
2.4.2
Consistency Claim with Security Problems and Security Objectives in PP
.........
31
2.4.3
Consistency Claim with Security Requirements in PP
..........................................
32
3
Security Problem Definitions
..............................................................................................
35