Page 2 of 93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1 ST Introduction ...................................................................................................................7
1.1 ST Reference ................................................................................................................7
1.2 TOE Reference .............................................................................................................7
1.3 TOE Overview..............................................................................................................8
1.3.1 TOE Type ..................................................................................................................... 8
1.3.2 TOE Usage................................................................................................................... 8
1.3.3 Major Security Features of TOE .............................................................................. 10
1.4 TOE Description......................................................................................................... 11
1.4.1 Physical Boundary of TOE ........................................................................................11
1.4.2 Guidance Documents ................................................................................................ 14
1.4.3 Definition of Users .................................................................................................... 18
1.4.3.1. Direct User ......................................................................................................... 18
1.4.3.2. Indirect User ...................................................................................................... 19
1.4.4 Logical Boundary of TOE ......................................................................................... 21
1.4.4.1. Basic Functions.................................................................................................. 21
1.4.4.2. Security Functions............................................................................................. 24
1.4.5 Protected Assets ........................................................................................................ 26
1.4.5.1. User Data ........................................................................................................... 26
1.4.5.2. TSF Data ............................................................................................................ 27
1.4.5.3. Functions ............................................................................................................ 27
1.5 Glossary......................................................................................................................27
1.5.1 Glossary for This ST ................................................................................................. 27
2 Conformance Claim...........................................................................................................31
2.1 CC Conformance Claim ..............................................................................................31
2.2 PP Claims...................................................................................................................31
2.3 Package Claims ..........................................................................................................31
2.4 Conformance Claim Rationale....................................................................................32
2.4.1 Consistency Claim with TOE Type in PP................................................................ 32
2.4.2 Consistency Claim with Security Problems and Security Objectives in PP......... 32
2.4.3 Consistency Claim with Security Requirements in PP .......................................... 33
3 Security Problem Definitions ............................................................................................36