Last Updated 2010-12-06
- Product Name :
- Japan : bizhub PRESS C7000 / bizhub PRO C7000 /
bizhub PRESS C7000P / bizhub PRO C7000P /
ineo+ 7000 / bizhub PRESS C6000 /
bizhub PRO C6000 / ineo+ 6000
Image Control Program
Overseas : bizhub PRESS C7000 / bizhub PRO C7000 / bizhub PRESS C7000P / bizhub PRO C7000P / ineo+ 7000 / bizhub PRESS C6000 / bizhub PRO C6000 / ineo+ 6000 Image Control Program
- Version of TOE :
- A1DU0Y0-00I1-G00-10
- Product Type :
- Control Software for digital MFP
- Certification No. :
- C0278
- Date :
- 2010-10-27
- Version of Common Criteria:
- 3.1
- Conformance Claim :
- EAL3
- PP Identifier :
- None
- Vendor :
- Konica Minolta Business Technologies, Inc.
-
- POC :
- Yasuhiro Nakagami
- Division :
- R&D Headquarters
- Phone :
- +81-533-89-7929
- E-mail :

- Evaluation Facility :
- Mizuho Information & Research Institute, Inc.
Center for Evaluation of Information Security
- CC
Certificate Image :

(538 KB)(2010-12-06)
PRODUCT DESCRIPTION
Description of TOE
This TOE, that is installed with digital MFP manufactured by Konica Minolta Business Technologies, Inc., is a software product that provide the function of copier, printer and scanner. It prevents document data in HDD from disclosing during the abuse of functions such as copier, printer and scanner.
TOE security functionality
TOE provides the following security functions.
| - | Identification and authentication function |
| - | Access control function |
| - | Audit function |
| - | Management function |
| - | CE function |
| - | Test function of HDD lock system |
Security functional requirements
TOE achieves the following security function requirements.
| Security audit | Non-repudiation of origin/receipt | Cryptographic functionality | Access control |
| Data authentication | Export data protection | Information flow control | Import data protection |
| Internal transfer data protection | Residual information protection | Rollback | Stored data integrity |
| Transfer data confidentiality | Transfer data integrity | Identification and authentication | Security management |
| Privacy Control | Security functionality protection | Resource utilisation management | TOE access control |
| Trusted path/channels |


