PREN 14169-5 : DRAFT 2010
Current
The latest, up-to-date edition.
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 5: DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION
01-12-2013
Foreword
Introduction
1 Scope
2 Normative references
3 Conventions and Terminology
4 Protection Profile Introduction
5 Conformance Claims
6 Security Problem Definition
7 Security Objectives
8 IT Security Requirements
9 Rationale
Bibliography
Defines a protection profile for a secure signature creation device that may generate signing keys internally and export the public key in protected manner: Secure Signature-creation Device with key generation and trusted communication with certificate generation application.
Committee |
TC 224
|
DocumentType |
Draft
|
PublisherName |
Comite Europeen de Normalisation
|
Status |
Current
|
Standards | Relationship |
DIN EN 14169-5:2010-08 (Draft) | Identical |
10/30228464 DC : 0 | Identical |
NEN EN 14169-5 : DRAFT 2010 | Identical |
DIN EN 419251-3:2013-06 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
11/30239962 DC : 0 | BS EN 16248-3 - SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
BS EN 419251-2:2013 | Security requirements for device for authentication Protection profile for extension for trusted channel to certificate generation application |
13/30274713 DC : 0 | BS EN 419111-5 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE VERIFICATION APPLICATION - PART 5: POSSIBLE EXTENSIONS |
13/30274710 DC : 0 | BS EN 419111-4 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE VERIFICATION APPLICATION - PART 4: CORE PP |
BS EN 419251-1:2013 | Security requirements for device for authentication Protection profile for core functionality |
11/30239959 DC : 0 | BS EN 16248-2 - SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
13/30274704 DC : 0 | BS EN 419111-2 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE CREATION APPLICATION - PART 2: CORE PP |
13/30274701 DC : 0 | BS EN 419111-1 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - PART 1: INTRODUCTION |
DIN EN 419251-2:2013-06 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
DIN EN 419251-1:2013-05 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
BS EN 419251-3:2013 | Security requirements for device for authentication Additional functionality for security targets |
I.S. EN 419251-2:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
UNI EN 419251-3 : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
UNI EN 419251-1 : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
13/30274707 DC : 0 | BS EN 419111-3 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE CREATION APPLICATION - PART 3: POSSIBLE EXTENSIONS |
EN 419251-2:2013 | Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application |
EN 419251-3:2013 | Security requirements for device for authentication - Part 3: Additional functionality for security targets |
EN 419251-1:2013 | Security requirements for device for authentication - Part 1: Protection profile for core functionality |
11/30239956 DC : 0 | BS EN 16248-1 - SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
UNI EN 419251-2 : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
I.S. EN 419251-3:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
I.S. EN 419251-1:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.