Page 2 of
89
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1
ST Introduction ..................................................................................................................... 7
1.1
ST Reference .................................................................................................................. 7
1.2
TOE Reference ............................................................................................................... 7
1.3
TOE Overview................................................................................................................ 8
1.3.1 TOE Type ...................................................................................................................8
1.3.2 TOE
Usage .................................................................................................................8
1.3.3 Major
Security
Features of TOE.............................................................................10
1.4
TOE Description........................................................................................................... 11
1.4.1 Physical
Boundary of TOE ......................................................................................11
1.4.2 Guidance
Documents...............................................................................................14
1.4.3 Definition of Users...................................................................................................15
1.4.3.1. Direct User........................................................................................................15
1.4.3.2. Indirect User.....................................................................................................16
1.4.4 Logical
Boundary of TOE ........................................................................................17
1.4.4.1. Basic
Functions ................................................................................................17
1.4.4.2. Security Functions............................................................................................20
1.4.5 Protected Assets.......................................................................................................22
1.4.5.1. User Data..........................................................................................................22
1.4.5.2. TSF Data...........................................................................................................23
1.4.5.3. Functions ..........................................................................................................23
1.5
Glossary........................................................................................................................ 23
1.5.1 Glossary
for This ST................................................................................................23
2
Conformance Claim............................................................................................................. 27
2.1
CC Conformance Claim................................................................................................ 27
2.2
PP Claims..................................................................................................................... 27
2.3
Package Claims............................................................................................................ 27
2.4
Conformance Claim Rationale ..................................................................................... 28
2.4.1 Consistency
Claim
with TOE Type in PP...............................................................28
2.4.2
Consistency Claim with Security Problems and Security Objectives in PP .........28
2.4.3
Consistency Claim with Security Requirements in PP..........................................29
3
Security Problem Definitions.............................................................................................. 32