Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

I.S. EN 419211-6:2014

Current

Current

The latest, up-to-date edition.

PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2014

Preview

For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.

Only cited Standards give presumption of conformance to New Approach Directives/Regulations.

$76.62
Including GST where applicable

Foreword
Introduction
1 Scope
2 Normative references
3 Conventions and terminology
4 PP introduction
5 Conformance claims
6 Security problem definition
7 Security objectives
8 Extended components definition
9 Security requirements
Bibliography

Describes a protection profile for a secure signature creation device that may import signing keys and communicate with the signature creation application in protected manner: secure signature creation device with key import and trusted communication with signature creation application (SSCD KI TCSCA).

DevelopmentNote
Supersedes I.S. CWA 14169. (11/2014)
DocumentType
Standard
Pages
28
PublisherName
National Standards Authority of Ireland
Status
Current
Supersedes

Standards Relationship
EN 419211-6:2014 Identical

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
EN 419211-1:2014 Protection profiles for secure signature creation device - Part 1: Overview
TS 101 733 : 2.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CMS ADVANCED ELECTRONIC SIGNATURES (CADES)
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
TS 102 778 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); PDF ADVANCED ELECTRONIC SIGNATURE PROFILES; CMS PROFILE BASED ON ISO 32000-1
TS 101 903 : 1.4.2 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); XML ADVANCED ELECTRONIC SIGNATURES (XADES)
EN 419211-3:2013 Protection profiles for secure signature creation device - Part 3: Device with key import

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more