Page 2 of
87
Table of Contents
1
ST Introduction
.....................................................................................................................
6
1.1
ST Reference
..................................................................................................................
6
1.2
TOE Reference
...............................................................................................................
6
1.3
TOE Overview
................................................................................................................
8
1.3.1
TOE Type
...................................................................................................................
8
1.3.2
TOE Usage
.................................................................................................................
8
1.3.3
Major Security Features of TOE
.............................................................................
10
1.4
TOE Description
...........................................................................................................
10
1.4.1
Physical Boundary of TOE
......................................................................................
10
1.4.2
Guidance Documents
...............................................................................................
13
1.4.3
Definition of Users
...................................................................................................
17
1.4.3.1.
Direct User
........................................................................................................
18
1.4.3.2.
Indirect User
.....................................................................................................
18
1.4.4
Logical Boundary of TOE
........................................................................................
19
1.4.4.1.
Basic Functions
................................................................................................
19
1.4.4.2.
Security Functions
............................................................................................
22
1.4.5
Protected Assets
.......................................................................................................
23
1.4.5.1.
User Data
..........................................................................................................
23
1.4.5.2.
TSF Data
...........................................................................................................
24
1.4.5.3.
Functions
..........................................................................................................
24
1.5
Glossary
........................................................................................................................
24
1.5.1
Glossary for This ST
................................................................................................
24
2
Conformance Claim
.............................................................................................................
27
2.1
CC Conformance Claim
................................................................................................
27
2.2
PP Claims
.....................................................................................................................
27
2.3
Package Claims
............................................................................................................
27
2.4
Conformance Claim Rationale
.....................................................................................
28
2.4.1
Consistency Claim with TOE Type in PP
...............................................................
28
2.4.2
Consistency Claim with Security Problems and Security Objectives in PP
.........
28
2.4.3
Consistency Claim with Security Requirements in PP
..........................................
28
3
Security Problem Definitions
..............................................................................................
31
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.