• EN 419251-2:2013

    Current The latest, up-to-date edition.

    Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application

    Available format(s): 

    Language(s): 

    Published date:  06-03-2013

    Publisher:  Comite Europeen de Normalisation

    Pure ENs are not available for sale, please purchase a suitable national adoption

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    1 Scope
    2 Normative references
    3 Conformance
    4 Terms and definitions
    5 Symbols and abbreviations
    6 Overview of the target of evaluation
    7 TOE Environment
    8 Life Cycle
    9 Security problem definition
    10 Security objectives
    11 Extended component definition - Definition of the
       Family FCS_RNG
    12 Security requirements
    Bibliography
    Index

    Abstract - (Show below) - (Hide below)

    This European Standard is a Protection Profile that defines the security requirements for an authentication device.

    General Product Information - (Show below) - (Hide below)

    Committee CEN/TC 224
    Document Type Standard
    Publisher Comite Europeen de Normalisation
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    DIN EN 419251-3:2013-06 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    DIN EN 419251-1 E : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    BS EN 419251-1:2013 Security requirements for device for authentication Protection profile for core functionality
    DIN EN 419251-3 E : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    DIN EN 419251-1:2013-05 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    BS EN 419251-3:2013 Security requirements for device for authentication Additional functionality for security targets
    UNI EN 419251-3 : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    UNI EN 419251-1 : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    I.S. EN 419251-3:2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    I.S. EN 419251-1:2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    EN 419251-3:2013 Security requirements for device for authentication - Part 3: Additional functionality for security targets
    EN 419251-1:2013 Security requirements for device for authentication - Part 1: Protection profile for core functionality

    Standards Referencing This Book - (Show below) - (Hide below)

    EN 419251-3:2013 Security requirements for device for authentication - Part 3: Additional functionality for security targets
    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    PREN 14169-3 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 3: DEVICE WITH KEY IMPORT
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    EN 419251-1:2013 Security requirements for device for authentication - Part 1: Protection profile for core functionality
    PREN 14169-5 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 5: DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION
    PREN 14169-2 : DRAFT 2010 PROTECTION PROFILE FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION
    PREN 14169-6 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: DEVICE WITH KEY IMPORT AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION
    ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
    PREN 14169-4 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 4: EXTENSION FOR DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH CERTIFICATE GENERATION APPLICATION
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective