Ricoh Aficio MP 5000b Specifikace

Procházejte online nebo si stáhněte Specifikace pro Tisk a skenování Ricoh Aficio MP 5000b. Ricoh Aficio MP 5000b Specifications Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 100
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
Page 1 of 100
Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved.
imagio MP 4000/5000 series, Aficio MP 4000/5000 series
Security Target
Authors : RICOH COMPANY, LTD. Yasushi FUNAKI, Hiroshi KAKII, Atsushi SATOH
Date : 2009-10-30
Version : 1.13
This document is a translation of the evaluated and certified security target
written in Japanese
Zobrazit stránku 0
1 2 3 4 5 6 ... 99 100

Shrnutí obsahu

Strany 1 - Security Target

Page 1 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. imagio MP 4000/5000 series, Aficio MP 4000/5000 series Security

Strany 2 - Revision History

Page 10 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 1: List of TOE Series Name Product Name/Model Name Ricoh

Strany 3 - Table of Contents

Page 100 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 8.4 PP Claims Rationale This ST does not conform to any PPs.

Strany 4 - Page 4 of 100

Page 11 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. image I/O device that incorporates the functionality of copier,

Strany 5 - Page 5 of 100

Page 12 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Terms Definitions Operation Panel A display-input device that

Strany 6 - Page 6 of 100

Page 13 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Terms Definitions Administrator Role Management functions give

Strany 7 - List of Tables

Page 14 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Terms Definitions Store and Print Function A function that co

Strany 8

Page 15 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Terms Definitions Complexity Setting for Password The minimum c

Strany 9 - 1 ST Introduction

Page 16 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 2 TOE Description This chapter outlines the type of the TOE, env

Strany 10 - 1.2 ST Overview

Page 17 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Location for TOE The TOE is assumed to be placed in general offi

Strany 11 - 1.4 Terminology

Page 18 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Connecting Internal and External Network When connecting the Int

Strany 12

Page 19 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Engine Unit The Engine Unit is configured with a Scanner Engine,

Strany 13

Page 2 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Revision History Version Date Authors Details 1.00 2008-12-16

Strany 14

Page 20 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Network Unit The Network Unit is an interface board for Ethernet

Strany 15

Page 21 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 3: List of Administrator Roles Administrator Roles Explan

Strany 16 - 2 TOE Description

Page 22 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Fax FunctionHDDFaxGeneral User Administrator SupervisorCEGenera

Strany 17

Page 23 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Figure 4: Operation Panel (for North America) In addition, Gen

Strany 18 - Operation Panel

Page 24 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. is operated from a client PC. Document Data stored in D-BOX for

Strany 19

Page 25 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 3. Check the TOE status. 2.5.2 Security Functions Security fun

Strany 20 - 2.4 Involved Roles of TOE

Page 26 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 2.5.2.3 Document Data Access Control Function The Document Data

Strany 21

Page 27 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 1. Download the Document Data with the Web Service Function fro

Strany 22

Page 28 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 5. Management of Machine Control Data Each Administrator is per

Strany 23 - 2.5.1.3 Fax Function

Page 29 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 2.6.1.3 Outputting Document Data Document Data can be output by

Strany 24 - 2.5.1.6 Management Function

Page 3 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table of Contents 1 ST Introduction...

Strany 25 - 2.5.2.1 Audit Function

Page 30 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 3 TOE Security Environment This chapter describes the assumption

Strany 26

Page 31 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. T.ABUSE_SEC_MNG (Abuse of Security Management Function) Persons

Strany 27

Page 32 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 4 Security Objectives This chapter describes the security object

Strany 28 - 2.6 Protected Assets

Page 33 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. O.LINE_PROTECT (Telephone Line Intrusion Protection) The TOE sh

Strany 29

Page 34 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 5 IT Security Requirements 5.1 TOE Security Functional Requirem

Strany 30 - 3 TOE Security Environment

Page 35 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Functional Requirements Actions which should be auditable Audita

Strany 31

Page 36 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Functional Requirements Actions which should be auditable Audita

Strany 32 - 4 Security Objectives

Page 37 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Functional Requirements Actions which should be auditable Audita

Strany 33

Page 38 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Functional Requirements Actions which should be auditable Audita

Strany 34 - 5 IT Security Requirements

Page 39 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. FAU_STG.4 Prevention of audit data loss Hierarchical to: FA

Strany 35

Page 4 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 2.5.2.4 Stored Data Protection Function...

Strany 36

Page 40 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. shown in Table 7] and cryptographic key sizes [assignment: crypt

Strany 37

Page 41 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 9: Subjects, Objects and Security Attributes Types Subje

Strany 38

Page 42 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. FDP_ACF.1.3 The TSF shall explicitly authorise access of subjec

Strany 39

Page 43 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 13: Security Attributes Corresponding to Subjects or Info

Strany 40

Page 44 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 14: List of Authentication Events Authentication events U

Strany 41 - Table 10]

Page 45 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. FIA_SOS.1 Verification of secrets Hierarchical to: No other

Strany 42 - Table 13]

Page 46 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. actions on behalf of that user. FIA_USB.1 User-subject binding

Strany 43

Page 47 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. FMT_MSA.1.1 The TSF shall enforce the [assignment: MFP access co

Strany 44 - Table 15, is taken]

Page 48 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 18: Property of static attribute initialisation Object S

Strany 45

Page 49 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. TSF data Operations User roles Query, modify Machine Administr

Strany 46 - Table 16]

Page 5 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 6.1 TOE Security Function...

Strany 47 - Table 17]

Page 50 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 20: List of Specification of Management Functions Functio

Strany 48

Page 51 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. - Minimum Password Length - Complexity Setting for Password FIA_

Strany 49 - Table 20]

Page 52 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Administrators and delete Administrator Roles. FMT_MSA.1 a) Man

Strany 50

Page 53 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. FMT_SMR.1.1 The TSF shall maintain the roles [assignment: Genera

Strany 51

Page 54 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 5.1.7 Class FTP: Trusted path/channels FTP_ITC.1 Inter-TSF tru

Strany 52

Page 55 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 5.2 Minimum Strength of Function Claim The minimum strength leve

Strany 53

Page 56 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 5.4 Security Requirements for the Environment There are no secu

Strany 54

Page 57 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 6 TOE Summary Specification This chapter describes the TOE secur

Strany 55

Page 58 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. SF.AUDIT SF.I&A SF.DOC_ACC SF.SEC_MNG SF.CE_OPE_LOCK SF.CIP

Strany 56 - Page 56 of 100

Page 59 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 6.1.1.1 Audit logs generation The TOE generates the audit logs

Strany 57 - 6 TOE Summary Specification

Page 6 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 8.2 Security Requirements Rationale...

Strany 58

Page 60 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Communication with trusted IT product Communication IP address C

Strany 59

Page 61 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 6.1.2.1 User Identification and Authentication The TOE displays

Strany 60

Page 62 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. ", the TOE resets the consecutive number of times of failur

Strany 61

Page 63 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. (2) Registerable Password length: For General Users No fewer tha

Strany 62

Page 64 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 6.1.3.2 Operations on Document Data by File Administrator The T

Strany 63

Page 65 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. File Users. The TOE allows the login General Users to perform th

Strany 64

Page 66 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 6.1.4.4 Management of General User Information Management of Ge

Strany 65

Page 67 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 31: List of Administrator for Machine Control Data Machin

Strany 66

Page 68 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 6.1.6.1 Encryption of Document Data The TOE encrypts the data w

Strany 67

Page 69 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 6.1.7.3 Sending by E-mail from TOE When sending Document Data b

Strany 68

Page 7 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. List of Figures Figure 1: Environment for usage of TOE...

Strany 69 - 6.3 Assurance Measures

Page 70 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. AGD depend on the region in which the TOE is sold. One of [Japan

Strany 70 - Page 70 of 100

Page 71 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 33: Assurance Requirements and Assurance Measures for EAL

Strany 71

Page 72 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Assurance classes Assurance components Assurance measures AGD: G

Strany 72

Page 73 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Assurance classes Assurance components Assurance measures [Engl

Strany 73

Page 74 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Assurance classes Assurance components Assurance measures [Engl

Strany 74

Page 75 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Assurance classes Assurance components Assurance measures ALC: L

Strany 75

Page 76 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 7 PP Claims This ST does not claim conformance to any PP.

Strany 76 - 7 PP Claims

Page 77 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 8 Rationale This chapter describes the rationale for the securit

Strany 77 - 8 Rationale

Page 78 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. By OE.ADMIN, Responsible Manager for MFP selects trusted persons

Strany 78

Page 79 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Administrator. The Machine Administrator detects afterwards whet

Strany 79

Page 8 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 34: Relation between Security Environment and Security Obje

Strany 80

Page 80 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 35: Relation between Security Objectives and Functional R

Strany 81

Page 81 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Table 35 shows that each TOE security functional requirement co

Strany 82

Page 82 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. O.I&A User Identification and Authentication The details of

Strany 83

Page 83 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. the users, and each security attribute associated with the subje

Strany 84

Page 84 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. • Machine Administrators to inquire and set the Number of Attem

Strany 85

Page 85 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. the TOE. For this, FCS_CKM.1 generates the encryption keys at th

Strany 86

Page 86 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. a) Check the integrity of MFP Control Software To accomplish O.

Strany 87

Page 87 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 8.2.3 Dependencies of Security Functional Requirements On the T

Strany 88

Page 88 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. TOE Security Functional Requirements Dependencies claimed by CC

Strany 89

Page 89 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. The TOE consists of both hardware and software, and there are no

Strany 90

Page 9 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 1 ST Introduction 1.1 ST Identification This section identifies t

Strany 91

Page 90 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. Functional Requirements Bypass Prevention De-activation Preventi

Strany 92

Page 91 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 8.2.5.3 Tampering Prevention Since FPT_SEP.1 prevents interferen

Strany 93

Page 92 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 8.3 TOE Summary Specification Rationale 8.3.1 Rationale for TO

Strany 94

Page 93 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. FAU_SAR.1 (Audit review), FAU_SAR.2 (Restricted audit review)

Strany 95

Page 94 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. FDP_ACC.1 (Subset access control), FDP_ACF.1 (Security attribut

Strany 96

Page 95 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. security attributes and maintains those attributes. Therefore, F

Strany 97

Page 96 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. FIA_UID.2 (User identification before any action) FIA_UID.2 req

Strany 98

Page 97 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. SF.SEC_MNG provides the function to set the "Document Data

Strany 99

Page 98 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. FPT_SEP.1 (TSF domain separation) FPT_SEP.1 requires that the TS

Strany 100 - 8.4 PP Claims Rationale

Page 99 of 100 Copyright (c) 2008, 2009 RICOH COMPANY, LTD. All Rights Reserved. 8.3.3 Rationale for Assurance Measures The documents, which are

Komentáře k této Příručce

Žádné komentáře