Common Criteria Security Target for VoiceIdent Unit 2.0
ثبت نشده
چکیده
• EW02: Update the " nuance " versions, ASR (Automatic Speech Recognition) and SV (Speech Verification) For VoiceIdent Unit 1.0 it was agreed upon the following arrangement: All text, which is taken from the PP, is in blue colour. New text specific to this ST is in black colour and additionally in Italics. For VoiceIdent Unit 2.0 only the extensions between the versions are highlighted. The following subchapters will provide some information for the further understanding of this document and introduce the reader to some used conventions: The author would like to acknowledge the significant contributions of four draft Protection Profiles for biometric systems [PP_UK_BD], [PP_US_BV_BR], [PP_US_BV_MR], and [PP_US_BS] as well as of the Biometric Evaluation Methodology Supplement [BEM] of the Common Criteria Biometric Evaluation Methodology Working Group. Due to its overall relevance, much of their work has been incorporated into this document. Application notes are provided where they may contribute to the understanding of the reader. These notes, while not part of the formal statement of the Security Target, are included as an acknowledgment of the diverse backgrounds of potential users of this Security Target. It should be understood, that these application notes cannot completely substitute an understanding of the biometric techniques or related [CC] documents. Application notes are divided into: • General Application Note (GEN)-explains basic principles of the approach and provides general information.
منابع مشابه
Selected Papers in Security Studies: Volume 9 Common Criteria Meets Realpolitik Trust, Alliances, and Potential Betrayal
Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common C...
متن کاملCompliance of POLYAS with the Common Criteria Protection Profile - A 2010 Outlook on Certified Remote Electronic Voting
In 2008, the German Federal Office for Information Security issued the common criteria protection profile for Online Voting Products (PP-0037). Accordingly, we evaluated the Polyas electronic voting system, which is used for legally binding elections in several international organizations (German Gesellschaft for Informatik, GI, among others), for compliance with the common criteria protection ...
متن کاملCompliance of POLYAS with the Common Criteria Protection Profile
In 2008, the German Federal Office for Information Security issued the common criteria protection profile for Online Voting Products (PP-0037). Accordingly, we evaluated the Polyas electronic voting system, which is used for legally binding elections in several international organizations (German Gesellschaft for Informatik, GI, among others), for compliance with the common criteria protection ...
متن کاملWhite Paper: Infineon Trusted Platform Module Security Conformance
To insure that a Trusted Platform Module (TPM) has been manufactured according to high security standards, Trusted Computing Group (TCG) specifications are accomplished by conformance tests. Conformance describes the correct and secure implementation of a TPM according to the specification and the respective protection profile. Conformance with a protection profile and security target, which bo...
متن کاملIntelligent Sensors Security
The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IE...
متن کامل