Page 2 of 91
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1 ST Introduction...................................................................................................................7
1.1 ST Reference ................................................................................................................7
1.2 TOE Reference .............................................................................................................7
1.3 TOE Overview ..............................................................................................................8
1.3.1 TOE Type ..................................................................................................................... 8
1.3.2 TOE Usage................................................................................................................... 8
1.3.3 Major Security Features of TOE ...............................................................................11
1.4 TOE Description......................................................................................................... 11
1.4.1 Physical Boundary of TOE ........................................................................................11
1.4.2 Guidance Documents ................................................................................................ 14
1.4.3 Definition of Users .................................................................................................... 17
1.4.3.1. Direct User ......................................................................................................... 17
1.4.3.2. Indirect User ...................................................................................................... 18
1.4.4 Logical Boundary of TOE ......................................................................................... 19
1.4.4.1. Basic Functions.................................................................................................. 19
1.4.4.2. Security Functions............................................................................................. 22
1.4.5 Protected Assets ........................................................................................................ 24
1.4.5.1. User Data ........................................................................................................... 24
1.4.5.2. TSF Data ............................................................................................................ 25
1.4.5.3. Functions ............................................................................................................ 25
1.5 Glossary......................................................................................................................25
1.5.1 Glossary for This ST ................................................................................................. 25
2 Conformance Claim...........................................................................................................29
2.1 CC Conformance Claim ..............................................................................................29
2.2 PP Claims...................................................................................................................29
2.3 Package Claims ..........................................................................................................29
2.4 Conformance Claim Rationale....................................................................................30
2.4.1 Consistency Claim with TOE Type in PP................................................................ 30
2.4.2 Consistency Claim with Security Problems and Security Objectives in PP ......... 30
2.4.3 Consistency Claim with Security Requirements in PP .......................................... 31
3 Security Problem Definitions ............................................................................................34