Page 2 of 93
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1
ST Introduction ..................................................................................................................... 7
1.1 ST Reference .................................................................................................................. 7
1.2 TOE Reference ............................................................................................................... 7
1.3 TOE Overview................................................................................................................ 8
1.3.1 TOE Type ...................................................................................................................8
1.3.2 TOE Usage.................................................................................................................8
1.3.3 Major Security Features of TOE.............................................................................11
1.4 TOE Description........................................................................................................... 11
1.4.1 Physical Boundary of TOE......................................................................................11
1.4.2 Guidance Documents...............................................................................................14
1.4.3 Definition of Users...................................................................................................17
1.4.3.1. Direct User........................................................................................................17
1.4.3.2. Indirect User.....................................................................................................18
1.4.4 Logical Boundary of TOE ........................................................................................20
1.4.4.1. Basic Functions ................................................................................................20
1.4.4.2. Security Functions............................................................................................23
1.4.5 Protected Assets.......................................................................................................25
1.4.5.1. User Data..........................................................................................................25
1.4.5.2. TSF Data...........................................................................................................25
1.4.5.3. Functions ..........................................................................................................25
1.5 Glossary........................................................................................................................26
1.5.1 Glossary for This ST................................................................................................26
2
Conformance Claim............................................................................................................. 30
2.1 CC Conformance Claim................................................................................................ 30
2.2 PP Claims..................................................................................................................... 30
2.3 Package Claims............................................................................................................ 30
2.4 Conformance Claim Rationale..................................................................................... 31
2.4.1 Consistency Claim with TOE Type in PP...............................................................31
2.4.2 Consistency Claim with Security Problems and Security Objectives in PP .........31
2.4.3 Consistency Claim with Security Requirements in PP..........................................32
3
Security Problem Definitions.............................................................................................. 35