Shopping Cart

No products in the cart.

BS EN 419251-1:2013

$198.66

Security requirements for device for authentication – Protection profile for core functionality

Published By Publication Date Number of Pages
BSI 2013 54
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

This European Standard is a Protection Profile that defines the security requirements for an authentication device.

PDF Catalog

PDF Pages PDF Title
8 1 Scope
2 Normative references
3 Conformance
3.1 CC Conformance Claim
3.2 PP Claim
3.3 Package Claim
3.4 Conformance Rationale
3.5 Conformance Statement
9 4 Terms and definitions
11 5 Symbols and abbreviations
6 Overview of the target of evaluation
6.1 TOE Type
6.2 TOE Usage
6.3 Security Features of the TOE
12 6.4 Examples of applications
6.4.1 E-government
13 6.4.2 Multiple applications
6.5 Required non-TOE Hardware and Software
6.6 Protection Profile Usage
14 7 TOE Environment
7.1 Overall view
15 7.2 Personalisation application
7.2.1 General
7.2.2 Functionalities
7.2.3 Communication
16 7.3 Authentication application
7.3.1 General
7.3.2 Functionalities
7.3.3 Communication
17 7.4 Verifier
7.4.1 Functionalities
7.4.2 Communication
7.5 Key Generator
7.5.1 Functionalities
7.5.2 Communication
7.6 Certification Authority ā€• Functionalities
18 8 Life Cycle
8.1 Overview
19 8.2 Pre-Personalisation phase
20 8.3 Personalisation phase
8.3.1 General
8.3.2 Personalisation application
8.4 Usage phase ( Authentication application
8.4.1 General
21 8.4.2 Verifier
9 Security problem definition
9.1 Assets
9.1.1 General
9.1.2 Assets protected by the TOE
9.1.3 Sensitive assets of the TOE
22 9.2 Users
23 9.3 Threats
24 9.4 Organisational security policies
9.4.1 Provided services
9.4.2 Other services
25 9.5 Assumptions
26 10 Security objectives
10.1 General
10.2 Security objectives for the TOE
10.2.1 Provided service
10.2.2 Authentication to the TOE
10.2.3 TOE management
27 10.3 Security objectives for the operational environment
28 10.4 Rationale for Security objectives
32 11 Extended component definition
12 Security requirements
12.1 General
33 12.2 Introduction
12.2.1 Subjects Objects and security attributes
12.2.2 Operations
34 12.3 Security functional requirements
12.3.1 General
12.3.2 Core
12.3.2.1 General
12.3.2.2 Device authentication by the verifier
35 12.3.2.3 User authentication
36 12.3.2.4 Access control
41 12.3.2.5 Protection of the TSF
42 12.3.3 KeyImp
45 12.4 Security assurance requirements
12.5 SFR / Security objectives
48 12.6 SFR Dependencies
50 12.7 Rationale for the Assurance Requirements
12.7.1 EAL.4 methodically designed, tested, and reviewed
12.7.2 AVA_VAN.5 Advanced methodical vulnerability analysis
12.7.3 ALC_DVS.2 Sufficiency of security measures
BS EN 419251-1:2013
$198.66