微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

Whereas the Internet offers a ubiquitous but insecure channel that is susceptible to eavesdropping, phishing, man-in-the-middle, counterfeit web sites, and system intrusions including malware, spyware, screen scraping, key stroke loggers, mouse monitors, and man-in-the-browser attacks, this standard defines requirements for secure authentication methods for Internet-based payment transactions.?Where applicable, this standard also provides guidance for using other industry standards on the Internet.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

This ECDSA Standard provides methods and criteria for the generation of the public and private keys that are required by the ECDSA and the procedural controls required for the secure use of the algorithm with these keys. This ECDSA Standard also provides methods and criteria for the generation of the elliptic curve domain parameters that are required by the ECDSA and the procedural controls required for the secure use of the algorithm with these domain parameters.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

Provides specifications for uniquely identifying an eligible issue. It shall serve as the common denominator in communications among users for completion of transactions and exchange of information. It specifies both the configuration of the number and the meaning attached to each portion.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

In the current state of the art in public key cryptography, all methods require, in one way or another, the use of prime numbers as parameters to the various algorithms. This document presents a set of accepted techniques for generating primes. It is intended that ASC X9 standards that require the use of primes will refer to this document, rather than trying to define these techniques on a case-by-case basis. Standards, as they exist today, may differ in the methods they use for parameter generation from those specified in this document. It is anticipated that as each existing ASC X9 standard comes up for its 5-year review, it will be modified to reference this document instead of specifying its own techniques for generating primes. This standard defines methods for generating large prime numbers as needed by public key cryptographic algorithms. It also provides testing methods for testing candidate primes presented by a third party. This standard allows primes to be generated either deterministically or probabilistically, where: - A number shall be accepted as prime when a probabilistic algorithm that declares it to be prime is in error with probability less than 2?00. - A deterministic prime shall be generated using a method that guarantees that it is prime. In addition to algorithms for generating primes, this standard also presents primality certificates for some of the algorithms where it is feasible to do so. The syntax for such certificates is beyond the scope of this document. Primality certificates are never required by this standard. Primality certificates are not needed when a prime is generated and kept in a secure environment that is managed by the party that generated the prime.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

Wireless technologies have rapidly emerged as significant components of networks. The ease and speed of deployment, as well as inexpensive transmission rates, makes them ideal for deploying new systems. Whereas installations used to be delayed several months because of complicated landline connections, a wireless deployment can happen the same day an ATM or POS terminal is ordered. Greater wireless coverage, greater reliability, higher transfer speeds, and improved equipment quality has only increased the likelihood that ATMs with wireless are a preferred option. Data classification and risk assessments still need to be performed, however, to determine asset value and the risks introduced by transmission over wireless networks. The question is still how data is being secured. Numerous control methods must be used to protect sensitive data on wireless networks such as encrypting communication prior to transmission and decrypting it afterwards.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

This X9.134 ?Part 1 standard provides a framework flexible enough to accommodate new mobile device technologies as well as to allow various business models. At the same time, it enables compliance with applicable regulations including data privacy, protection of personally identifiable data, consumer protection, anti-money laundering, and prevention of financial crime.

定价: 1365元 / 折扣价: 1161 加购物车

在线阅读 收 藏

The purpose of this document is to formalize an industry standard for exchange of legal orders using the ANSI X9.129 standard format and a compilation of industry norms. This document is not intended to replace the ANSI X9.129 standard, but rather to clarify how financial institutions and agencies should use the standard to ensure all necessary and appropriate levies and asset based orders are exchanged between financial institutions and/or agencies. The use of this document requires that all legal orders exchange participants obtain, use and adhere to the record and field usage definitions detailed in the ANSI X9.129 standard. Users of this document are required to review and be knowledgeable of the full standard to ensure file structure and data and field specifications are understood and used correctly. This document further defines the specific usage of the ANSI X9.129 standard and describes all of the records and fields which contain critical data. Based on this usage, it is reasonable to expect that exchange participants will implement file validation practices to ensure that all critical data is contained in legal order exchange files. If a file contains records or fields of critical data that do not conform to the usage practices detailed in the standard it is reasonable to expect the receiving institution or agency will reject the item or file back to the sending institution or agency as the order(s) contained in the file may be unusable/unprocessable. Conversely, if a record or field which does not contain critical data is populated with incomplete, erroneous, or invalid data it is reasonable to expect these files or items would be accepted and processed.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

Specifies the data structure and content of an interface that permits communication between position-providing device(s) and position-using device(s) enabling the position-using device(s) to obtain and unambiguously interpret position information and determine, based on a measure of the degree of reliability, whether the resulting position information meets the requirements of the intended use. A standardized interface for positioning allows the integration of reliable position information obtained from non-specific positioning technologies and is useful in various location-focused information applications, such as surveying, navigation, intelligent transportation systems (ITS), and location-based services (LBS).

定价: 1358元 / 折扣价: 1155 加购物车

在线阅读 收 藏

Defines the management and operations of the ISO geodetic register and identifies the data elements, in accordance with ISO 19111:2007 and the core schema within ISO 19135-1:2015, required within the geodetic register.

定价: 1196元 / 折扣价: 1017 加购物车

在线阅读 收 藏

Specifies security and protection of personally identifiable information components, SLOs and SQOs for cloud service level agreements (cloud SLA) including requirements and guidance. This document is for the benefit and use of both CSPs and CSCs.

定价: 1500元 / 折扣价: 1275 加购物车

在线阅读 收 藏

The ANSI X9.124 standard defines a collection of methods for encrypting data strings so that the length and the character set for the ciphertext is the same as those of the plaintext. This is called format-preserving encryption (FPE). These methods are useful in situations where fixed-format data, such as Primary Account Numbers (PANs) or Social Security Numbers (SSNs), must be encrypted, but there is a requirement to limit changes to existing communication protocols, database schemata or application code. Part 1 of this standard includes a set of definitions common to all FPE techniques, a security model for FPE block cipher techniques, and a description of the pseudocode language used in defining the mode specified in this document.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

Defines the conceptual schema for the description of referencing by coordinates. It describes the minimum data required to define coordinate reference systems.

定价: 1500元 / 折扣价: 1275 加购物车

在线阅读 收 藏

This document establishes a methodology for cross-mapping vocabularies. It also specifies an implementation of ISO 19135-1:2015 for the purpose of registering cross-mapped vocabulary entries.

定价: 1358元 / 折扣价: 1155 加购物车

在线阅读 收 藏

ANSI X9.100-160 Part 2 establishes external processing code (EPC) assignments and management, and specifies which MICR characters are approved by ASC X9 for use in the U.S. Payments System. Part 1 of this standard defines the location of the EPC Field.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

Specifies a concrete* implementable, conformance-testable coverage structure based on the abstract schema for coverages defined in the ISO 19123 schema for coverage geometry. This document defines a structure that is suitable for encoding in many encoding formats. *"concrete" is used here as a contrast to "abstract" in the sense described in the Introduction.

定价: 1044元 / 折扣价: 888 加购物车

在线阅读 收 藏
200 条记录,每页 15 条,当前第 2 / 14 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页