{"id":349265,"date":"2024-10-20T00:35:45","date_gmt":"2024-10-20T00:35:45","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-419251-22013\/"},"modified":"2024-10-26T00:15:44","modified_gmt":"2024-10-26T00:15:44","slug":"bs-en-419251-22013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-419251-22013\/","title":{"rendered":"BS EN 419251-2:2013"},"content":{"rendered":"

This European Standard is a Protection Profile that defines the security requirements for an authentication device.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
8<\/td>\n1 Scope
2 Normative references
3 Conformance
3.1 CC Conformance Claim
3.2 PP Claim
3.3 Package Claim
3.4 Conformance Rationale
3.5 Conformance Statement <\/td>\n<\/tr>\n
9<\/td>\n4 Terms and definitions <\/td>\n<\/tr>\n
11<\/td>\n5 Symbols and abbreviations
6 Overview of the target of evaluation
6.1 TOE Type
6.2 TOE Usage
6.3 Security Features of the TOE <\/td>\n<\/tr>\n
13<\/td>\n6.4 Examples of applications
6.4.1 E-government
6.4.2 Multiple applications <\/td>\n<\/tr>\n
14<\/td>\n6.5 Required non-TOE Hardware and Software
6.6 Protection Profile Usage <\/td>\n<\/tr>\n
15<\/td>\n7 TOE Environment
7.1 Overall view <\/td>\n<\/tr>\n
16<\/td>\n7.2 Personalisation application
7.2.1 General
7.2.2 Functionalities
7.2.3 Communication <\/td>\n<\/tr>\n
17<\/td>\n7.3 Administration application
7.3.1 General
7.3.2 Functionalities
7.3.3 Communication <\/td>\n<\/tr>\n
18<\/td>\n7.4 Authentication application
7.4.1 General
7.4.2 Functionalities
7.4.3 Communication <\/td>\n<\/tr>\n
19<\/td>\n7.5 Verifier
7.5.1 Functionalities
7.5.2 Communication
7.6 Key Generator
7.6.1 Functionalities
7.6.2 Communication <\/td>\n<\/tr>\n
20<\/td>\n7.7 Certification Authority
7.7.1 Functionalities
7.7.2 Communication <\/td>\n<\/tr>\n
21<\/td>\n8 Life Cycle
8.1 Overview <\/td>\n<\/tr>\n
22<\/td>\n8.2 Pre-Personalisation phase
8.3 Personalisation phase
8.3.1 General <\/td>\n<\/tr>\n
23<\/td>\n8.3.2 Personalisation application
8.4 Usage phase
8.4.1 Authentication application <\/td>\n<\/tr>\n
24<\/td>\n8.4.2 Administration application <\/td>\n<\/tr>\n
25<\/td>\n8.4.3 Verifier
9 Security problem definition
9.1 Assets
9.1.1 General
9.1.2 Assets protected by the TOE
9.1.3 Sensitive assets of the TOE <\/td>\n<\/tr>\n
26<\/td>\n9.2 Users <\/td>\n<\/tr>\n
27<\/td>\n9.3 Threats <\/td>\n<\/tr>\n
29<\/td>\n9.4 Organisational security policies
9.4.1 Provided services
9.4.2 Other services <\/td>\n<\/tr>\n
30<\/td>\n9.5 Assumptions <\/td>\n<\/tr>\n
31<\/td>\n10 Security objectives
10.1 General
10.2 Security objectives for the TOE
10.2.1 Provided service
10.2.2 Authentication to the TOE <\/td>\n<\/tr>\n
32<\/td>\n10.2.3 TOE management <\/td>\n<\/tr>\n
33<\/td>\n10.3 Security objectives for the operational environment <\/td>\n<\/tr>\n
35<\/td>\n10.4 Rationale for Security objectives <\/td>\n<\/tr>\n
40<\/td>\n11 Extended component definition \u2013 Definition of the Family FCS_RNG <\/td>\n<\/tr>\n
41<\/td>\n12 Security requirements
12.1 General <\/td>\n<\/tr>\n
42<\/td>\n12.2 Introduction
12.2.1 Subjects Objects and security attributes
12.2.2 Operations <\/td>\n<\/tr>\n
43<\/td>\n12.3 Security functional requirements
12.3.1 General
12.3.2 Core
12.3.2.1 General <\/td>\n<\/tr>\n
44<\/td>\n12.3.2.2 Device authentication by the verifier <\/td>\n<\/tr>\n
45<\/td>\n12.3.2.3 User authentication <\/td>\n<\/tr>\n
46<\/td>\n12.3.2.4 Access control <\/td>\n<\/tr>\n
50<\/td>\n12.3.2.5 Protection of the TSF <\/td>\n<\/tr>\n
51<\/td>\n12.3.3 KeyImp <\/td>\n<\/tr>\n
54<\/td>\n12.3.4 KeyGen <\/td>\n<\/tr>\n
57<\/td>\n12.3.5 Admin <\/td>\n<\/tr>\n
61<\/td>\n12.3.6 Untrusted CA <\/td>\n<\/tr>\n
62<\/td>\n12.3.7 Untrusted AdminAppli <\/td>\n<\/tr>\n
63<\/td>\n12.4 Security assurance requirements
12.5 SFR \/ Security objectives <\/td>\n<\/tr>\n
69<\/td>\n12.6 SFR Dependencies <\/td>\n<\/tr>\n
71<\/td>\n12.7 Rationale for the Assurance Requirements <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Security requirements for device for authentication – Protection profile for extension for trusted channel to certificate generation application<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2013<\/td>\n76<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":349270,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[693,2641],"product_tag":[],"class_list":{"0":"post-349265","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-15","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/349265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/349270"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=349265"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=349265"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=349265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}