Shopping Cart

No products in the cart.

BS EN 419251-2:2013

$215.11

Security requirements for device for authentication – Protection profile for extension for trusted channel to certificate generation application

Published By Publication Date Number of Pages
BSI 2013 76
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

This European Standard is a Protection Profile that defines the security requirements for an authentication device.

PDF Catalog

PDF Pages PDF Title
8 1 Scope
2 Normative references
3 Conformance
3.1 CC Conformance Claim
3.2 PP Claim
3.3 Package Claim
3.4 Conformance Rationale
3.5 Conformance Statement
9 4 Terms and definitions
11 5 Symbols and abbreviations
6 Overview of the target of evaluation
6.1 TOE Type
6.2 TOE Usage
6.3 Security Features of the TOE
13 6.4 Examples of applications
6.4.1 E-government
6.4.2 Multiple applications
14 6.5 Required non-TOE Hardware and Software
6.6 Protection Profile Usage
15 7 TOE Environment
7.1 Overall view
16 7.2 Personalisation application
7.2.1 General
7.2.2 Functionalities
7.2.3 Communication
17 7.3 Administration application
7.3.1 General
7.3.2 Functionalities
7.3.3 Communication
18 7.4 Authentication application
7.4.1 General
7.4.2 Functionalities
7.4.3 Communication
19 7.5 Verifier
7.5.1 Functionalities
7.5.2 Communication
7.6 Key Generator
7.6.1 Functionalities
7.6.2 Communication
20 7.7 Certification Authority
7.7.1 Functionalities
7.7.2 Communication
21 8 Life Cycle
8.1 Overview
22 8.2 Pre-Personalisation phase
8.3 Personalisation phase
8.3.1 General
23 8.3.2 Personalisation application
8.4 Usage phase
8.4.1 Authentication application
24 8.4.2 Administration application
25 8.4.3 Verifier
9 Security problem definition
9.1 Assets
9.1.1 General
9.1.2 Assets protected by the TOE
9.1.3 Sensitive assets of the TOE
26 9.2 Users
27 9.3 Threats
29 9.4 Organisational security policies
9.4.1 Provided services
9.4.2 Other services
30 9.5 Assumptions
31 10 Security objectives
10.1 General
10.2 Security objectives for the TOE
10.2.1 Provided service
10.2.2 Authentication to the TOE
32 10.2.3 TOE management
33 10.3 Security objectives for the operational environment
35 10.4 Rationale for Security objectives
40 11 Extended component definition ā€“ Definition of the Family FCS_RNG
41 12 Security requirements
12.1 General
42 12.2 Introduction
12.2.1 Subjects Objects and security attributes
12.2.2 Operations
43 12.3 Security functional requirements
12.3.1 General
12.3.2 Core
12.3.2.1 General
44 12.3.2.2 Device authentication by the verifier
45 12.3.2.3 User authentication
46 12.3.2.4 Access control
50 12.3.2.5 Protection of the TSF
51 12.3.3 KeyImp
54 12.3.4 KeyGen
57 12.3.5 Admin
61 12.3.6 Untrusted CA
62 12.3.7 Untrusted AdminAppli
63 12.4 Security assurance requirements
12.5 SFR / Security objectives
69 12.6 SFR Dependencies
71 12.7 Rationale for the Assurance Requirements
BS EN 419251-2:2013
$215.11