Security Target
Page 14
...touch screen, and Operation Control Board. The Engine Control Software is the identifier for the Operation Panel Control Software. Copyright (c) 2011 RICOH COMPANY, LTD. The Operation Panel Control Software is installed on the TOE and consists of the components that constitute the TOE, ...Transfers operation instructions from the key switches and the LCD touch screen to display instructions from the MFP Control Software. These are part of the components that has a modem function for communication. OpePanel, which the following software components are included in the Engine ...
...touch screen, and Operation Control Board. The Engine Control Software is the identifier for the Operation Panel Control Software. Copyright (c) 2011 RICOH COMPANY, LTD. The Operation Panel Control Software is installed on the TOE and consists of the components that constitute the TOE, ...Transfers operation instructions from the key switches and the LCD touch screen to display instructions from the MFP Control Software. These are part of the components that has a modem function for communication. OpePanel, which the following software components are included in the Engine ...
Security Target
Page 32
... and general model July 2009 Version 3.1 Revision 3 Final (Japanese translation ver.1.0 Final) CCMB-2009-07-001 Part 2: Security functional components July 2009 Version 3.1 Revision 3 Final (Japanese translation ver.1.0 Final) CCMB-2009-07-002 Part 3: Security assurance components July 2009 Version 3.1 Revision 3 Final (Japanese translation ver.1.0 Final) CCMB-2009-07-003 - Page 31... conform to which this ST and TOE are : 2600.1-PRT conformant 2600.1-SCN conformant 2600.1-CPY conformant 2600.1-FAX conformant 2600.1-DSR conformant Copyright (c) 2011 RICOH COMPANY, LTD.
... and general model July 2009 Version 3.1 Revision 3 Final (Japanese translation ver.1.0 Final) CCMB-2009-07-001 Part 2: Security functional components July 2009 Version 3.1 Revision 3 Final (Japanese translation ver.1.0 Final) CCMB-2009-07-002 Part 3: Security assurance components July 2009 Version 3.1 Revision 3 Final (Japanese translation ver.1.0 Final) CCMB-2009-07-003 - Page 31... conform to which this ST and TOE are : 2600.1-PRT conformant 2600.1-SCN conformant 2600.1-CPY conformant 2600.1-FAX conformant 2600.1-DSR conformant Copyright (c) 2011 RICOH COMPANY, LTD.
Security Target
Page 34
...2600.1-SCN, 2600.1-CPY, 2600.1-FAX, 2600.1-DSR, and 2600.1-SMI. it is to PP APPLICATION NOTE36. Copyright (c) 2011 RICOH COMPANY, LTD. According to PP APPLICATION NOTE 35, the authentications of users are assumed to identify these authentication methods; Described below are ... and FAU_SAR.2 FAU_STG.1, FAU_STG.4, FAU_SAR.1, and FAU_SAR.2 are augmented according to PP APPLICATION NOTE7 in PP The SFRs for this ST were partly augmented and instantiated over the security requirements of the PP, they are still consistent with the PP. The refinement of FIA_UAU.1(a), FIA_UAU.1(b), FIA_UID...
...2600.1-SCN, 2600.1-CPY, 2600.1-FAX, 2600.1-DSR, and 2600.1-SMI. it is to PP APPLICATION NOTE36. Copyright (c) 2011 RICOH COMPANY, LTD. According to PP APPLICATION NOTE 35, the authentications of users are assumed to identify these authentication methods; Described below are ... and FAU_SAR.2 FAU_STG.1, FAU_STG.4, FAU_SAR.1, and FAU_SAR.2 are augmented according to PP APPLICATION NOTE7 in PP The SFRs for this ST were partly augmented and instantiated over the security requirements of the PP, they are still consistent with the PP. The refinement of FIA_UAU.1(a), FIA_UAU.1(b), FIA_UID...
Security Target
Page 35
... attribute for the data protection applied to non-volatile memory media that are neither allowed to the intended user. Copyright (c) 2011 RICOH COMPANY, LTD. however, these changes still satisfy the functional requirements demanded in the PP. it is according to restrict the requirements... augmented to the functional requirements FCS_CKM.1 and FCS_COP.1 and to the functional requirements interdependent with the PP, extends the functional requirement Part 2 due to the addition of the restricted forwarding of data to delete document data and user jobs. Although FDP_ACF.1.4(a) in case...
... attribute for the data protection applied to non-volatile memory media that are neither allowed to the intended user. Copyright (c) 2011 RICOH COMPANY, LTD. however, these changes still satisfy the functional requirements demanded in the PP. it is according to restrict the requirements... augmented to the functional requirements FCS_CKM.1 and FCS_COP.1 and to the functional requirements interdependent with the PP, extends the functional requirement Part 2 due to the addition of the restricted forwarding of data to delete document data and user jobs. Although FDP_ACF.1.4(a) in case...
Security Target
Page 50
... Events Functional Requirements FDP_ACF.1(a) Actions Which Should Be Auditable Auditable Events a) Minimal: Successful requests to Original: Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. Page 49 of 93 6 Security Requirements This section describes Security Functional Requirements, Security Assurance... Function and folder transmission, recipient's e-mail address used for fulfilling the security objectives defined in Table 12]. The part with (refinement:). 6.1.1 Class FAU: Security audit FAU_GEN.1 Audit data generation Hierarchical to generate an audit record of ...
... Events Functional Requirements FDP_ACF.1(a) Actions Which Should Be Auditable Auditable Events a) Minimal: Successful requests to Original: Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. Page 49 of 93 6 Security Requirements This section describes Security Functional Requirements, Security Assurance... Function and folder transmission, recipient's e-mail address used for fulfilling the security objectives defined in Table 12]. The part with (refinement:). 6.1.1 Class FAU: Security audit FAU_GEN.1 Audit data generation Hierarchical to generate an audit record of ...
Security Target
Page 52
... and target of the user identification mechanism, including the user identity provided. Also includes the user identification that are part of users that is required by the session locking mechanism. Copyright (c) 2011 RICOH COMPANY, LTD. b) Basic: All use of login operation. a) Minimal: Failure of the authentication mechanism. a) Minimal: changes to : No other...
... and target of the user identification mechanism, including the user identity provided. Also includes the user identification that are part of users that is required by the session locking mechanism. Copyright (c) 2011 RICOH COMPANY, LTD. b) Basic: All use of login operation. a) Minimal: Failure of the authentication mechanism. a) Minimal: changes to : No other...