Fuji Xerox C2265/C2263 Security Target
- 36 - Copyright
2016 by Fuji Xerox Co., Ltd
6. SECURITY REQUIREMENTS
This chapter describes the security functional requirements, security assurance requirements,
and security requirement rational.
The terms and phrases used in this chapter are defined below.
- Subject
Term/phrase Definition
Key Operator Operation upon using Mailbox and Store Print when the
user authentication of key operator succeeded.
SA Operation upon using Mailbox and Store Print when the
user authentication of SA succeeded.
U.ADMINISTRATOR Operation upon using Mailbox and Store Print when the
user authentication of Key Operator/SA succeeded.
U.NORMAL Operation upon using Mailbox and Store Print when the
user authentication of U.NORMAL succeeded.
U.USER Operation upon using Mailbox and Store Print when the
user authentication of U.ADMINISTRATOR/ U.NORMAL
succeeded.
- Object
Term/phrase Definition
Mailbox This term covers Personal Mailbox and Shared Mailbox.
Personal Mailbox Mailbox to be used individually by general user
(U.NORMAL) or SA.
Shared Mailbox Mailbox to be used and shared by all users
Store Print/Private Print A print function in which bitmap data (decomposed print
data) is temporarily stored in the MFD internal HDD and
then printed out according to the authenticated user’s
instruction from the control panel.
Used document data
stored in the internal HDD
The remaining data in the MFD internal HDD even after
deletion. The document data are first stored into the
internal HDD, used, and then only there files are deleted.
Document data Document data means all the data including image data
transmitted across the MFD when any of copy, print, scan
or fax function is operated by a general user.
Security Audit Log The chronologically recorded data of important events of
the TOE. The events such as device failure, configuration
change, and user operation are recorded based on when
and who caused what event and its result.