• PREN 14169-5 : DRAFT 2010

    Current The latest, up-to-date edition.

    PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 5: DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION

    Available format(s): 

    Language(s): 

    Published date:  12-01-2013

    Publisher:  Comite Europeen de Normalisation

    Pure ENs are not available for sale, please purchase a suitable national adoption

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Conventions and Terminology
    4 Protection Profile Introduction
    5 Conformance Claims
    6 Security Problem Definition
    7 Security Objectives
    8 IT Security Requirements
    9 Rationale
    Bibliography

    Abstract - (Show below) - (Hide below)

    Defines a protection profile for a secure signature creation device that may generate signing keys internally and export the public key in protected manner: Secure Signature-creation Device with key generation and trusted communication with certificate generation application.

    General Product Information - (Show below) - (Hide below)

    Comment Closes On
    Committee TC 224
    Document Type Draft
    Publisher Comite Europeen de Normalisation
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    DIN EN 419251-3:2013-06 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    11/30239962 DC : 0 BS EN 16248-3 - SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    BS EN 419251-2:2013 Security requirements for device for authentication Protection profile for extension for trusted channel to certificate generation application
    13/30274713 DC : 0 BS EN 419111-5 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE VERIFICATION APPLICATION - PART 5: POSSIBLE EXTENSIONS
    DIN EN 419251-1 E : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    13/30274710 DC : 0 BS EN 419111-4 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE VERIFICATION APPLICATION - PART 4: CORE PP
    BS EN 419251-1:2013 Security requirements for device for authentication Protection profile for core functionality
    11/30239959 DC : 0 BS EN 16248-2 - SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION
    13/30274704 DC : 0 BS EN 419111-2 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE CREATION APPLICATION - PART 2: CORE PP
    13/30274701 DC : 0 BS EN 419111-1 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - PART 1: INTRODUCTION
    DIN EN 419251-2:2013-06 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION
    DIN EN 419251-3 E : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    DIN EN 419251-1:2013-05 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    BS EN 419251-3:2013 Security requirements for device for authentication Additional functionality for security targets
    I.S. EN 419251-2:2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION
    UNI EN 419251-3 : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    UNI EN 419251-1 : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    13/30274707 DC : 0 BS EN 419111-3 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE CREATION APPLICATION - PART 3: POSSIBLE EXTENSIONS
    EN 419251-2:2013 Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application
    EN 419251-3:2013 Security requirements for device for authentication - Part 3: Additional functionality for security targets
    EN 419251-1:2013 Security requirements for device for authentication - Part 1: Protection profile for core functionality
    11/30239956 DC : 0 BS EN 16248-1 - SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    DIN EN 419251-2 E : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION
    UNI EN 419251-2 : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION
    I.S. EN 419251-3:2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    I.S. EN 419251-1:2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective