Page
2
of
93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1
ST Introduction ...................................................................................................................7
1.1
ST Reference ................................................................................................................7
1.2
TOE Reference .............................................................................................................7
1.3
TOE Overview ..............................................................................................................8
1.3.1 TOE
Type ..................................................................................................................... 8
1.3.2 TOE
Usage................................................................................................................... 8
1.3.3
Major Security Features of TOE .............................................................................. 10
1.4
TOE Description......................................................................................................... 11
1.4.1
Physical Boundary of TOE ........................................................................................11
1.4.2 Guidance
Documents ................................................................................................ 14
1.4.3
Definition of Users .................................................................................................... 18
1.4.3.1. Direct
User ......................................................................................................... 19
1.4.3.2. Indirect
User ...................................................................................................... 20
1.4.4
Logical Boundary of TOE ......................................................................................... 21
1.4.4.1. Basic
Functions .................................................................................................. 21
1.4.4.2. Security
Functions ............................................................................................. 24
1.4.5 Protected
Assets ........................................................................................................ 26
1.4.5.1. User
Data ........................................................................................................... 26
1.4.5.2. TSF
Data ............................................................................................................ 27
1.4.5.3. Functions ............................................................................................................ 27
1.5
Glossary......................................................................................................................27
1.5.1
Glossary for This ST ................................................................................................. 27
2
Conformance Claim...........................................................................................................31
2.1
CC Conformance Claim ..............................................................................................31
2.2
PP Claims...................................................................................................................31
2.3
Package Claims ..........................................................................................................31
2.4
Conformance Claim Rationale....................................................................................32
2.4.1
Consistency Claim with TOE Type in PP................................................................ 32
2.4.2
Consistency Claim with Security Problems and Security Objectives in PP ......... 32
2.4.3
Consistency Claim with Security Requirements in PP .......................................... 33
3
Security Problem Definitions ............................................................................................36