Minolta bizhub C300 Specifications Page 23

  • Download
  • Add to my manuals
  • Print
  • Page
    / 110
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 22
bizhub C352 / bizhub C300 / ineo
+
351 / ineo
+
300
Control Software, Security Target
Copyright © 2006 KONICA MINOLTA BUSINESS TECHNOLOGIES, INC., All Rights Reserved.
23 / 110
5. IT Security Requirements
In this chapter, the TOE security requirements and IT environment security requirements are
described.
Definition of Label
The security function requirements required for the TOE and IT environment are described.
Those regulated in CC Part 2 will be directly used for the functional requirements components,
and the same labels will be used as well. The new additional requirement which is not described
in CC part 2 is newly established and identified with the label that doesn't compete with CC part
2. In addition, [E] is added at the end of a label of a requirement needed in IT environment in
order to state it clearly whether an object of each requirement is TOE or IT environment.
< Method of specifying security function requirement "Operation" >
In the following description, when items are indicated in italic and bold, it means that they
are assigned or selected. When items are indicated in italic and bold with parenthesis right
after the underlined original sentences, it means that the underlined sentences are refined. A
number in the parentheses after a label means that the functional requirement is used
repeatedly. (The number to indicate the repetition is added with separating respectively by TOE
requirement and IT environmental requirement.)
Method of clear indication of dependency
The label in the parentheses ( ) in the dependent section indicates a label for the security
functional requirements used in this ST. When it is a dependency that is not required to be used
in this ST, it is described as N/A in the same parentheses.
5.1. TOE Security Requirements
5.1.1. TOE Security Function Requirements
5.1.1.1. Cryptographic Support
FCS_CKM.1 Cryptographic key generation
FCS_CKM.1.1
The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation
algorithm [assignment:
cryptographic key generation algorithm
] and specified cryptographic key sizes
[assignment:
cryptographic key sizes
] that meet the following: [assignment:
list of standards
].
[assignment:
list of standards
]
KonicaMinolta Encryption specification standard
[assignment:
cryptographic key generation algorithm
]
KonicaMinolta HDD Encryption key generation algorithm (SHA-1)
[assignment:
cryptographic key sizes
]
128bit
Hierarchical to
No other components
Dependencies
FCS_CKM.2 or FCS_COP.1FCS_COP.1[E]FCS_CKM.4N/A
FMT_MSA.2N/A
Page view 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 ... 109 110

Comments to this Manuals

No comments