Last Updated 2010-07-01
- Product Name :
- Ricoh imagio MP 5000SP/4000SP with security card Type 9
- Version of TOE :
-
- Firmware Configuration
System Version V2.16-00
System/Copy 1.11.1
Network Support 7.26
Network DocBox 1.10C
Web Support 1.59
Web Uapl 1.15
animation 1.3
Scanner 01.24
RPDL 7.33
Printer 1.11
MSIS 7.15.02
RPCS Font 1.01
Engine 1.04:05
OpePanel 1.01
LANG0 1.01
LANG1 1.01
ADF 15.000:15
- ASIC
Ic Key 1100
- Option
Data Erase Opt 1.01m
- Product Type :
- Multi Function Product
- Certification No. :
- C0246
- Date :
- 2010-02-25
- Version of Common Criteria:
- 3.1
- Conformance Claim :
- EAL3 Augmented with ALC_FLR.2
- PP Identifier :
- 2600.1, Protection Profile for Hardcopy Devices, Operational Environment A 1.0, dated June 2009
- Vendor :
- RICOH COMPANY, LTD.
-
- POC :
- Masahiro Itoh
- Division :
-
Project Management Department
GW Development Center
MFP Business Group
- Phone :
- +81-46-236-2400
- E-mail :
-
- Evaluation Facility :
-
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- Certification/Validation Report :
(226 KB)(2010-07-01) - CC Certificate Image :
(534 KB)(2010-04-14) - Security Target :
(455 KB)(2010-07-01)
PRODUCT DESCRIPTION
Description of TOE
The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions.
TOE security functionality
The main security functions are described as follows:
- | Audit Function: to generate / review audit log of the event. |
- | Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout. |
- | Access Control Function: to control available functions for each user, and to control the document operation. |
- | Network Protection Function: to protect information on the Network with use of the encrypted communication. |
- | Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data. |
- | Security Management Function: to make the administrators control the security functions. |
- | Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes. |