{"id":349265,"date":"2024-10-20T00:35:45","date_gmt":"2024-10-20T00:35:45","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-419251-22013\/"},"modified":"2024-10-26T00:15:44","modified_gmt":"2024-10-26T00:15:44","slug":"bs-en-419251-22013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-419251-22013\/","title":{"rendered":"BS EN 419251-2:2013"},"content":{"rendered":"
This European Standard is a Protection Profile that defines the security requirements for an authentication device.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
8<\/td>\n | 1 Scope 2 Normative references 3 Conformance 3.1 CC Conformance Claim 3.2 PP Claim 3.3 Package Claim 3.4 Conformance Rationale 3.5 Conformance Statement <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 4 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 Symbols and abbreviations 6 Overview of the target of evaluation 6.1 TOE Type 6.2 TOE Usage 6.3 Security Features of the TOE <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.4 Examples of applications 6.4.1 E-government 6.4.2 Multiple applications <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.5 Required non-TOE Hardware and Software 6.6 Protection Profile Usage <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7 TOE Environment 7.1 Overall view <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.2 Personalisation application 7.2.1 General 7.2.2 Functionalities 7.2.3 Communication <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.3 Administration application 7.3.1 General 7.3.2 Functionalities 7.3.3 Communication <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.4 Authentication application 7.4.1 General 7.4.2 Functionalities 7.4.3 Communication <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.5 Verifier 7.5.1 Functionalities 7.5.2 Communication 7.6 Key Generator 7.6.1 Functionalities 7.6.2 Communication <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.7 Certification Authority 7.7.1 Functionalities 7.7.2 Communication <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8 Life Cycle 8.1 Overview <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8.2 Pre-Personalisation phase 8.3 Personalisation phase 8.3.1 General <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 8.3.2 Personalisation application 8.4 Usage phase 8.4.1 Authentication application <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 8.4.2 Administration application <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 8.4.3 Verifier 9 Security problem definition 9.1 Assets 9.1.1 General 9.1.2 Assets protected by the TOE 9.1.3 Sensitive assets of the TOE <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 9.2 Users <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 9.3 Threats <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 9.4 Organisational security policies 9.4.1 Provided services 9.4.2 Other services <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 9.5 Assumptions <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 10 Security objectives 10.1 General 10.2 Security objectives for the TOE 10.2.1 Provided service 10.2.2 Authentication to the TOE <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 10.2.3 TOE management <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 10.3 Security objectives for the operational environment <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 10.4 Rationale for Security objectives <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 11 Extended component definition \u2013 Definition of the Family FCS_RNG <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 12 Security requirements 12.1 General <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 12.2 Introduction 12.2.1 Subjects Objects and security attributes 12.2.2 Operations <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 12.3 Security functional requirements 12.3.1 General 12.3.2 Core 12.3.2.1 General <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 12.3.2.2 Device authentication by the verifier <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 12.3.2.3 User authentication <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 12.3.2.4 Access control <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 12.3.2.5 Protection of the TSF <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 12.3.3 KeyImp <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 12.3.4 KeyGen <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 12.3.5 Admin <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 12.3.6 Untrusted CA <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 12.3.7 Untrusted AdminAppli <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 12.4 Security assurance requirements 12.5 SFR \/ Security objectives <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 12.6 SFR Dependencies <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 12.7 Rationale for the Assurance Requirements <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Security requirements for device for authentication – Protection profile for extension for trusted channel to certificate generation application<\/b><\/p>\n |