Page 2 of 91
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1
ST Introduction ..................................................................................................................... 7
1.1 ST Reference .................................................................................................................. 7
1.2 TOE Reference ............................................................................................................... 7
1.3 TOE Overview................................................................................................................ 8
1.3.1 TOE Type ...................................................................................................................8
1.3.2 TOE Usage.................................................................................................................8
1.3.3 Major Security Features of TOE.............................................................................11
1.4 TOE Description........................................................................................................... 11
1.4.1 Physical Boundary of TOE......................................................................................11
1.4.2 Guidance Documents...............................................................................................14
1.4.3 Definition of Users...................................................................................................17
1.4.3.1. Direct User........................................................................................................17
1.4.3.2. Indirect User.....................................................................................................18
1.4.4 Logical Boundary of TOE ........................................................................................19
1.4.4.1. Basic Functions ................................................................................................19
1.4.4.2. Security Functions............................................................................................22
1.4.5 Protected Assets.......................................................................................................24
1.4.5.1. User Data..........................................................................................................24
1.4.5.2. TSF Data...........................................................................................................24
1.4.5.3. Functions ..........................................................................................................25
1.5 Glossary........................................................................................................................25
1.5.1 Glossary for This ST................................................................................................25
2
Conformance Claim............................................................................................................. 29
2.1 CC Conformance Claim................................................................................................ 29
2.2 PP Claims..................................................................................................................... 29
2.3 Package Claims............................................................................................................ 29
2.4 Conformance Claim Rationale..................................................................................... 30
2.4.1 Consistency Claim with TOE Type in PP...............................................................30
2.4.2 Consistency Claim with Security Problems and Security Objectives in PP .........30
2.4.3 Consistency Claim with Security Requirements in PP..........................................31
3
Security Problem Definitions.............................................................................................. 34