Page 2 of 87
Table of Contents
1
ST Introduction ..................................................................................................................... 6
1.1 ST Reference .................................................................................................................. 6
1.2 TOE Reference ............................................................................................................... 6
1.3 TOE Overview................................................................................................................ 8
1.3.1 TOE Type ...................................................................................................................8
1.3.2 TOE Usage.................................................................................................................8
1.3.3 Major Security Features of TOE.............................................................................10
1.4 TOE Description........................................................................................................... 10
1.4.1 Physical Boundary of TOE......................................................................................10
1.4.2 Guidance Documents...............................................................................................13
1.4.3 Definition of Users...................................................................................................17
1.4.3.1. Direct User........................................................................................................18
1.4.3.2. Indirect User.....................................................................................................18
1.4.4 Logical Boundary of TOE ........................................................................................19
1.4.4.1. Basic Functions ................................................................................................19
1.4.4.2. Security Functions............................................................................................22
1.4.5 Protected Assets.......................................................................................................23
1.4.5.1. User Data..........................................................................................................23
1.4.5.2. TSF Data...........................................................................................................24
1.4.5.3. Functions ..........................................................................................................24
1.5 Glossary........................................................................................................................24
1.5.1 Glossary for This ST................................................................................................24
2
Conformance Claim............................................................................................................. 27
2.1 CC Conformance Claim................................................................................................ 27
2.2 PP Claims..................................................................................................................... 27
2.3 Package Claims............................................................................................................ 27
2.4 Conformance Claim Rationale..................................................................................... 28
2.4.1 Consistency Claim with TOE Type in PP...............................................................28
2.4.2 Consistency Claim with Security Problems and Security Objectives in PP .........28
2.4.3 Consistency Claim with Security Requirements in PP..........................................28
3
Security Problem Definitions.............................................................................................. 31
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.