Customer Support: 131 242

  • Shopping Cart
    There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

EN 419251-2:2013

Current

Current

The latest, up-to-date edition.

Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application

Published date

06-03-2013

Sorry this product is not available in your region.

Foreword
1 Scope
2 Normative references
3 Conformance
4 Terms and definitions
5 Symbols and abbreviations
6 Overview of the target of evaluation
7 TOE Environment
8 Life Cycle
9 Security problem definition
10 Security objectives
11 Extended component definition - Definition of the
   Family FCS_RNG
12 Security requirements
Bibliography
Index

This European Standard is a Protection Profile that defines the security requirements for an authentication device.

Committee
CEN/TC 224
DocumentType
Standard
PublisherName
Comite Europeen de Normalisation
Status
Current

DIN EN 419251-3:2013-06 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
BS EN 419251-1:2013 Security requirements for device for authentication Protection profile for core functionality
DIN EN 419251-1:2013-05 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
BS EN 419251-3:2013 Security requirements for device for authentication Additional functionality for security targets
UNI EN 419251-3 : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
UNI EN 419251-1 : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
I.S. EN 419251-3:2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
I.S. EN 419251-1:2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
EN 419251-3:2013 Security requirements for device for authentication - Part 3: Additional functionality for security targets
EN 419251-1:2013 Security requirements for device for authentication - Part 1: Protection profile for core functionality

EN 419251-3:2013 Security requirements for device for authentication - Part 3: Additional functionality for security targets
ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
PREN 14169-3 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 3: DEVICE WITH KEY IMPORT
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
EN 419251-1:2013 Security requirements for device for authentication - Part 1: Protection profile for core functionality
PREN 14169-5 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 5: DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION
PREN 14169-2 : DRAFT 2010 PROTECTION PROFILE FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION
PREN 14169-6 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: DEVICE WITH KEY IMPORT AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
PREN 14169-4 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 4: EXTENSION FOR DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH CERTIFICATE GENERATION APPLICATION
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.