set of trusted information and cryptographic key material that is used by an application in a specific security context
Note 1 to entry: A personality typically includes the device's own cryptographic material like private keys, secret keys, own public key certificates. A personality can also include information required to establish trust towards partners.
Note 2 to entry: A personality is used within the scope of a specific application. A device can use different personalities in different application contexts.
Note 3 to entry: A personality may make use of secret storage (confidentiality and integrity protected), trusted storage (integrity protected), and general storage (unprotected).
[SOURCE: ISO/IEC TS 30168]