Security requirements for device for authentication - Part 1: Protection profile for core functionality

This European Standard is a Protection Profile that defines the security requirements for an authentication device.

Sicherheitsanforderungen für Geräte zur Authentisierung - Teil 1: Schutzprofil für Kernfunktionalitäten

Diese Europäische Norm ist ein Schutzprofil, das die Sicherheitsanforderungen an ein Gerät zur Authentisierung definiert.

Profils de protection pour dispositif d'authentification - Partie 1: Dispositif avec import de clés

Le présent document est un Profil de Protection qui définit les exigences de sécurité pour un dispositif
d’authentification.

Varnostne zahteve naprav za overjanje - 1. del: Profil za zaščito ključne funkcionalnosti

Ta evropski standard je profil za zaščito, ki določa varnostne zahteve naprav za overjanje.

General Information

Status
Published
Publication Date
05-Mar-2013
Withdrawal Date
29-Sep-2013
Current Stage
9060 - Closure of 2 Year Review Enquiry - Review Enquiry
Start Date
03-Mar-2024
Completion Date
03-Mar-2024

Buy Standard

Standard
EN 419251-1:2013
English language
50 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.IXQNFLRQDOQRVWLSicherheitsanforderungen für Geräte zur Authentifizierung - Teil 1: Schutzprofil für KernfunktionalitätenProfils de protection pour dispositif d'authentification - Partie 1: Dispositif avec import de clésSecurity requirements for device for authentication - Part 1: Protection profile for core functionality35.240.15Identifikacijske kartice in sorodne napraveIdentification cards and related devicesICS:Ta slovenski standard je istoveten z:EN 419251-1:2013SIST EN 419251-1:2013en01-maj-2013SIST EN 419251-1:2013SLOVENSKI
STANDARD



SIST EN 419251-1:2013



EUROPEAN STANDARD NORME EUROPÉENNE EUROPÄISCHE NORM
EN 419251-1
March 2013 ICS 35.240.15 English Version
Security requirements for device for authentication - Part 1: Protection profile for core functionality
Profils de protection pour dispositif d'authentification - Partie 1: Dispositif avec import de clés
Sicherheitsanforderungen für Geräte zur Authentisierung - Teil 1: Schutzprofil für Kernfunktionalitäten This European Standard was approved by CEN on 7 December 2012.
CEN members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation under the responsibility of a CEN member into its own language and notified to the CEN-CENELEC Management Centre has the same status as the official versions.
CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION EUROPÄISCHES KOMITEE FÜR NORMUNG
Management Centre:
Avenue Marnix 17,
B-1000 Brussels © 2013 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No. EN 419251-1:2013: ESIST EN 419251-1:2013



EN 419251-1:2013 (E) 2 Contents Page Foreword . 5 1 Scope . 6 2 Normative references . 6 3 Conformance . 6 3.1 CC Conformance Claim . 6 3.2 PP Claim . 6 3.3 Package Claim . 6 3.4 Conformance Rationale . 6 3.5 Conformance Statement . 6 4 Terms and definitions . 7 5 Symbols and abbreviations . 9 6 Overview of the target of evaluation . 9 6.1 TOE Type . 9 6.2 TOE Usage . 9 6.3 Security Features of the TOE . 9 6.4 Examples of applications. 10 6.4.1 E-government .
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.