Security Target
Page 8
... the functions of a copier, scanner, printer, and fax (optional). All Rights Reserved. Audit Function 2. Telephone Line Intrusion Protection Function 9. Copyright (c) 2009,2010 RICOH COMPANY, LTD. The TOE can operate the TOE from a client computer via a network, USB connection, or fax...some of the assumed TOE environment. Identification and Authentication Function 3. Figure 1 shows an example of these functions and provides a Copy Function, Scanner Function, Printer Function, and Fax Function. The following are for digitising paper documents and managing and printing them ...
... the functions of a copier, scanner, printer, and fax (optional). All Rights Reserved. Audit Function 2. Telephone Line Intrusion Protection Function 9. Copyright (c) 2009,2010 RICOH COMPANY, LTD. The TOE can operate the TOE from a client computer via a network, USB connection, or fax...some of the assumed TOE environment. Identification and Authentication Function 3. Figure 1 shows an example of these functions and provides a Copy Function, Scanner Function, Printer Function, and Fax Function. The following are for digitising paper documents and managing and printing them ...
Security Target
Page 17
...of the Basic Functions and described later. Fax Functions consists of copies, magnification, and custom settings (e.g. Scanner Function This function is for sending and receiving fax data over a telephone line. Document Server Function This function is for faxing can be ...Copy Function can be printed and deleted using the "Document Server Function", which is available from the Operation Panel, and also include LAN-Fax transmission, which are available from a client computer. This function can also be printed or deleted using the Document Server Copyright (c) 2009,2010 RICOH...
...of the Basic Functions and described later. Fax Functions consists of copies, magnification, and custom settings (e.g. Scanner Function This function is for sending and receiving fax data over a telephone line. Document Server Function This function is for faxing can be ...Copy Function can be printed and deleted using the "Document Server Function", which is available from the Operation Panel, and also include LAN-Fax transmission, which are available from a client computer. This function can also be printed or deleted using the Document Server Copyright (c) 2009,2010 RICOH...
Security Target
Page 18
...browser. Printing document data stored in the D-BOX. Document data stored using the Copy Function, Document Server Function, Fax Function, or Printer Function can be updated according...Network Communication Data Protection Function, Security Management Function, Service Mode Lock Function, Telephone Line Intrusion Protection Function, and MFP Control Software Verification Function. When document data is ...is for setting the following TOE operations are available: 1. Copyright (c) 2009,2010 RICOH COMPANY, LTD. Although the Management Function also provides Back Up/Restore Address Book ...
...browser. Printing document data stored in the D-BOX. Document data stored using the Copy Function, Document Server Function, Fax Function, or Printer Function can be updated according...Network Communication Data Protection Function, Security Management Function, Service Mode Lock Function, Telephone Line Intrusion Protection Function, and MFP Control Software Verification Function. When document data is ...is for setting the following TOE operations are available: 1. Copyright (c) 2009,2010 RICOH COMPANY, LTD. Although the Management Function also provides Back Up/Restore Address Book ...
Security Target
Page 40
... [assignment: subjects, information, and an operation listed inTable 11 Copyright (c) 2009,2010 RICOH COMPANY, LTD. Dependencies: FDP_IFF.1 Simple security attributes. FDP_IFC.1.1 The TSF shall enforce the [assignment: telephone line information flow SFP] on security attributes that explicitly deny access of subjects to objects]. ...40 of 80 Subject General user process Operations on object Deleting document data Rules governing access When the file administrator is copied to the document data ACL associated with the document data. When the document data is stored, the document data ...
... [assignment: subjects, information, and an operation listed inTable 11 Copyright (c) 2009,2010 RICOH COMPANY, LTD. Dependencies: FDP_IFF.1 Simple security attributes. FDP_IFC.1.1 The TSF shall enforce the [assignment: telephone line information flow SFP] on security attributes that explicitly deny access of subjects to objects]. ...40 of 80 Subject General user process Operations on object Deleting document data Rules governing access When the file administrator is copied to the document data ACL associated with the document data. When the document data is stored, the document data ...
Security Target
Page 76
... files between two faxes that comprise the MFP and controls their operation. It can identify TOE components such as system/copy, network support, scanner, printer, fax, Web support, Web Uapl, and Network Doc Box. In this ST, ...hardware device that is connected to a TCP/IP network. Information about each general user that encrypts data to a telephone line. 8 Appendix Page 76 of 80 8.1 Definitions of Terminology For ease of reader understanding,Table 34 provides definitions of an... files with a client computer using File Transfer Protocol. Copyright (c) 2009,2010 RICOH COMPANY, LTD.
... files between two faxes that comprise the MFP and controls their operation. It can identify TOE components such as system/copy, network support, scanner, printer, fax, Web support, Web Uapl, and Network Doc Box. In this ST, ...hardware device that is connected to a TCP/IP network. Information about each general user that encrypts data to a telephone line. 8 Appendix Page 76 of 80 8.1 Definitions of Terminology For ease of reader understanding,Table 34 provides definitions of an... files with a client computer using File Transfer Protocol. Copyright (c) 2009,2010 RICOH COMPANY, LTD.