{"id":349259,"date":"2024-10-20T00:35:43","date_gmt":"2024-10-20T00:35:43","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-419211-12014\/"},"modified":"2024-10-26T00:15:43","modified_gmt":"2024-10-26T00:15:43","slug":"bs-en-419211-12014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-419211-12014\/","title":{"rendered":"BS EN 419211-1:2014"},"content":{"rendered":"
This European Standard:<\/p>\n
specifies terms used in specifying protection profiles for secure signature creation devices,<\/p>\n<\/li>\n
specifies functional and operational requirements for secure signature creation devices,<\/p>\n<\/li>\n
describes the targets of evaluation for these protection profiles.<\/p>\n<\/li>\n<\/ul>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
5<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | 1 Scope 2 Normative references 3 Terminology 3.1 Legislative references 3.2 Technical terms <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Abbreviated terms 5 Protection Profile Overview <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 6 Target of Evaluation 6.1 General <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6.2 Functions of an SSCD 6.2.1 Core functions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.2.2 Additional functions 6.2.2.1 General 6.2.2.2 User authentication and identification 6.2.2.3 User management of signing key 6.2.2.4 Secure communication 6.2.2.5 Other standards <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.3 TOE life cycle 6.3.1 General Figure 1 \u2014 TOE life cycle 6.3.2 Preparation stage <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.3.3 Operational-use stage 6.4 Operations of the TOE <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7 TOE definitions 7.1 General 7.2 TOE with key generation <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.3 TOE with key import 7.4 TOE with key generation and trusted channel to certificate generation application 7.5 TOE with trusted channel to signature creation application <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Figure 2 \u2014 TOE and operational environments with key generation Figure 3 \u2014 TOE and operational environments with key import <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Figure 4 \u2014 TOE and operational environments with trusted channel to certificate generation application Figure 5 \u2014 TOE and operational environments with trusted channel to signature creation application and key generation <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Figure 6 \u2014 TOE and operational environments with trusted channel to signature creation application and key import <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Annex A (informative) Comparison with CWA 14169:2004, Annex C A.1 General A.2 Technical Differences <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Protection profiles for secure signature creation device – Overview<\/b><\/p>\n |