Certified/Validated Products List

RICOH IM C530F/C530FB,
SAVIN IM C530FB,
LANIER IM C530FB,
nashuatec IM C530F/C530FB,
Rex Rotary IM C530F/C530FB,
Gestetner IM C530F/C530FB
E-1.00

RICOH COMPANY, LTD.
Last Updated 2022-10-03
Product Name :
RICOH IM C530F/C530FB,
SAVIN IM C530FB,
LANIER IM C530FB,
nashuatec IM C530F/C530FB,
Rex Rotary IM C530F/C530FB,
Gestetner IM C530F/C530FB
Version of TOE :
E-1.00
Product Type :
Multifunction Product
Certification Identification :
JISEC-C0754
Date :
2022-07-26
Version of Common Criteria:
3.1 Release5
Conformance Claim :
EAL2
PP Identifier :
None

PRODUCT DESCRIPTION

Description of TOE

The TOE is a multifunction product that provides Copy, Printer, Scanner, and Fax functions.
The TOE provides security functions to prevent unauthorized disclosure and alteration of user data and security function setting data.

 

TOE security functionality

The major security functions of this TOE are as follows:

- Audit Function: Enables the TOE to record information related to security events and allows users to review it.
- Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
- Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
- Network Protection Function: Enables the TOE to protect network communications using encryption.
- Stored Data Protection Function: Enables the TOE to protect the stored data using encryption.
- Security Management Function: Enables the TOE administrator to control security functions.
- Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software.
- Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.

 

Security functional requirements

This TOE implements the following security functional requirements.

Security audit Non-repudiation of origin/receipt Cryptographic functionality Access control
Data authentication Export data protection Information flow control Import data protection
Internal transfer data protection Residual information protection Rollback Stored data integrity
Transfer data confidentiality Transfer data integrity Identification and authentication Security management
Privacy Control Security functionality protection Resource utilisation management TOE access control
Trusted path/channels Random number generation