DIN EN 419251-1:2013-05
Current
Current
The latest, up-to-date edition.
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
Available format(s)
Hardcopy , PDF
Language(s)
German, English
Published date
01-05-2013
€176.07
Excluding VAT
| Committee |
TC 224
|
| DevelopmentNote |
Supersedes DIN EN 16248-1. (05/2013)
|
| DocumentType |
Standard
|
| Pages |
52
|
| PublisherName |
German Institute for Standardisation (Deutsches Institut für Normung)
|
| Status |
Current
|
| Supersedes |
| Standards | Relationship |
| EN 419251-1:2013 | Identical |
| I.S. EN 419251-1:2013 | Equivalent |
| EN 419251-2:2013 | Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application |
| EN 419251-3:2013 | Security requirements for device for authentication - Part 3: Additional functionality for security targets |
| ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
| PREN 14169-3 : DRAFT 2010 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 3: DEVICE WITH KEY IMPORT |
| ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
| PREN 14169-5 : DRAFT 2010 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 5: DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION |
| PREN 14169-2 : DRAFT 2010 | PROTECTION PROFILE FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
| PREN 14169-6 : DRAFT 2010 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: DEVICE WITH KEY IMPORT AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION |
| ISO/IEC 10181-2:1996 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Authentication framework |
| PREN 14169-4 : DRAFT 2010 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 4: EXTENSION FOR DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH CERTIFICATE GENERATION APPLICATION |
| ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
| ISO/IEC 18045:2008 | Information technology — Security techniques — Methodology for IT security evaluation |
Summarise
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.