微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

This document provides a basic background on quantum computers and the risk they are expected to pose to cryptography - specifically the cryptography used by the financial industry.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

Part 1 of this technical report provides the numbering scheme for all standards associated with paper-based and image-based check payments that collectively will be referred to as check-related payments. The basic numbering scheme is divided into two sections; core standards and application standards. Core standards cover such items as paper requirements, MICR requirements, optical requirements, and image requirements. Application standards cover such items as check documents, deposit tickets, internal documents, image replacement documents, other documents, MICR, security, and electronic. Part 2 of this technical report lists the definitions of terms used within X9抯 check-related payment standards. The structure covered in this technical report was developed to define and explain the requirements for automated handling of paper-based and image-based check payments. It also offers a repository of definitions used in these standards. This technical report is available in electronic form free of charge to aid the user in identifying the standards for purchase.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

The purpose of this document is to formalize an industry standard for check image exchange using the ANSI X9.100-187 standard format and a compilation of industry norms. This document is not intended to replace the ANSI X9.100-187 standard, but rather to clarify how financial institutions should use the standard to ensure all necessary and appropriate payment data is exchanged between collecting and paying institutions. The use of this document requires that all image exchange participants obtain, use and adhere to the record and field usage definitions detailed in the ANSI X9.100-187 standard. Users of this document are required to review and be knowledgeable of the full standard to ensure file structure and data and field specifications are understood and used correctly. This document further defines the specific usage of the ANSI X9.100-187 standard and describes all of the records and fields which contain critical payment data.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

TR-48 Card-Not-Present (CNP) Fraud Mitigation in the United States: Strategies for Preventing, Detecting, and Responding to a Growing Threat summarizes CNP fraud mitigation tools used in the U.S. It identifies the primary types of CNP fraud attack trends currently impacting the payments industry and outlines the types of CNP fraud mitigation tools and strategies employed by industry stakeholders such as merchants, merchant acquirers, issuers, processors, payment gateways, and payment card networks. The document also provides information and recommendations for industry stakeholders to evaluate their current strategies for mitigating CNP fraud and reducing overall fraud losses.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

X9-TR-50 Quantum Techniques in Cryptographic Message Syntax (CMS) gives a general introduction to quantum computers and the consequences they pose to the financial services industry. Specifically, this report describes both cryptographic and non-cryptographic uses for quantum computers, considers the impact quantum computers will have on CMS, secure authentication and communication, and offers general recommendations for mitigating these impacts.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

The purpose of this document is to formalize an industry standard for exchange of legal orders using the ANSI X9.129 standard format and a compilation of industry norms. This document is not intended to replace the ANSI X9.129 standard, but rather to clarify how financial institutions and agencies should use the standard to ensure all necessary and appropriate levies and asset based orders are exchanged between financial institutions and/or agencies. The use of this document requires that all legal orders exchange participants obtain, use and adhere to the record and field usage definitions detailed in the ANSI X9.129 standard. Users of this document are required to review and be knowledgeable of the full standard to ensure file structure and data and field specifications are understood and used correctly. This document further defines the specific usage of the ANSI X9.129 standard and describes all of the records and fields which contain critical data. Based on this usage, it is reasonable to expect that exchange participants will implement file validation practices to ensure that all critical data is contained in legal order exchange files. If a file contains records or fields of critical data that do not conform to the usage practices detailed in the standard it is reasonable to expect the receiving institution or agency will reject the item or file back to the sending institution or agency as the order(s) contained in the file may be unusable/unprocessable. Conversely, if a record or field which does not contain critical data is populated with incomplete, erroneous, or invalid data it is reasonable to expect these files or items would be accepted and processed.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

This report presents guidelines for the design and usage of Unsigned Items including Remotely Created Checks (RCC). RCC items are a subclass of Unsigned Items, they all share the same characteristic of not bearing the signature of the Payor (also known as the maker or drawer, and is the check writer). RCC items are not created by the Paying bank while Unsigned Items can be created by the Paying bank or its agent. Although Unsigned Items are legitimate payment instruments many of the Unsigned Items being cleared today do not follow any design or usage guidelines. These items cause manual exception processing to complete the clearing process. The intent of this technical report is to provide a single document to originators and processors of Unsigned Items to provide guidance

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏
ASC X9 TR 54-2021 Blockchain Risk Assessment Framework 现行 发布日期 :  实施日期 : 

This technical report (TR) provides a framework for the performance of operational risk assessments on blockchain systems and applications within a distributed network. Operational risks include information technology (IT) and information security (IS) areas. IT includes interoperability, resiliency, accessibility, and software maintenance. IS includes data integrity, confidentiality, authentication, authorization, and accountability (logging capability). This report features some aspects of application risks including data accuracy, version control, backwards compatibility, and other usability functions.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏
ASC X9 TR 6-2016 Quality MICR Printing and Evaluation 现行 发布日期 :  实施日期 : 

This technical report covers all MICR printing and is intended to improve MICR quality via understanding and uniform interpretation of existing standards and specifications of MICR. The basic elements of MICR are defined in existing American National Standards, which are referenced where appropriate. This document serves as a single reference for the foremost set of elements that will produce quality MICR documents. The purpose of the document is to aid existing MICR printers as well as a new and ever expanding producer group in the production and evaluation of MICR documents, and, to attain broader MICR print specification conformance.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

XML is a technical standard defined by W3C (the World Wide Web Consortium) that can be used for the physical representation (i.e. the syntax) of standardized ISO 20022 Messages. (Identical to ISO/TS 20022-4:2004)

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

The Technical Report provides some background material and a relevant synopsis of the ANSI X9.100-182 standard. It explains the structure principle behind the mapping approach. And finally, it provides field-by-field data content mapping from the image cash letter file records to the respective XML element layers. The Technical Report focuses on, and restricts itself to, those ANSI X9.100-182 Part 2-1 defined elements and element layers in the XML structure that have equivalence in the ANSI X9.100-187 file record fields. The Technical Report does not provide content detail on ANSI X9.100-182 Part 2-1 XML elements that do not have a direct equivalence in ANSI X9.100-187 file record fields. The guidelines and suggestions in the Technical Report apply to the technical specifications as documented in the ANSI X9.100.187 image cash letter standard, and the technical functionality implemented in the XML schema files that are a component of the ANSI X9.100-182 Part 2-1 standard. A proprietary adoption of the ANSI X9.100-187 standard, or the use of a proprietary rendering of the ANSI X9.100-182 schema files, may render some or all of the guidelines in this Technical Report to be incompatible with the programming processes of the adopter. Although it is possible and even desirable in certain situations to transfer data from the ANSI X9.100-182 XML element structure to equivalent data placement in an ANSI X9.100-187 cash letter file, this Technical Report does not provide specific information to assist with that directional transition. The Technical Report focuses on the transfer from ANSI X9.100-187 to ANSI X9.100-182 Part 2-1 only. However, the information provided in this Technical Report is sufficient for the reader to conclude how to affect a transfer of data from ANSI X9.100-182 Part 2-1 to ANSI X9.100-187.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

Errata to ASC X9.131-2015

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

In the current state of the art in public key cryptography, all methods require, in one way or another, the use of prime numbers as parameters to the various algorithms. This document presents a set of accepted techniques for generating primes. It is intended that ASC X9 standards that require the use of primes will refer to this document, rather than trying to define these techniques on a case-by-case basis. Standards, as they exist today, may differ in the methods they use for parameter generation from those specified in this document. It is anticipated that as each existing ASC X9 standard comes up for its 5-year review, it will be modified to reference this document instead of specifying its own techniques for generating primes. This standard defines methods for generating large prime numbers as needed by public key cryptographic algorithms. It also provides testing methods for testing candidate primes presented by a third party. This standard allows primes to be generated either deterministically or probabilistically, where:?A number shall be accepted as prime when a probabilistic algorithm that declares it to be prime is in error with probability less than 2?00.?A deterministic prime shall be generated using a method that guarantees that it is prime. In addition to algorithms for generating primes, this standard also presents primality certificates for some of the algorithms where it is feasible to do so. The syntax for such certificates is beyond the scope of this document. Primality certificates are never required by this standard. Primality certificates are not needed when a prime is generated and kept in a secure environment that is managed by the party that generated the prime. A requirement placed upon the use of this standard, but out of scope, is as follows:?When a random or pseudo-random number generator is used to generate prime numbers, an ANSI approved random number (or bit) generator (i.e., one that is specified in an ANSI X9 standard) shall be used. This requirement is necessary to ensure security. NOTE鵗he 2-100 failure probability is selected to be sufficiently small that errors are extremely unlikely ever to occur in normal practice. Moreover, even if an error were to occur when one party tests a prime, subsequent tests by the same or other parties would detect the error with overwhelming probability. Furthermore, the 2-100 probability is an upper bound on the worst-case probability that a test declares any non-prime candidate to be prime; not all non-primes may reach this bound, and the probability that a non-prime generated at random passes such a test is much lower. Accordingly, the 2-100 bound is considered appropriate independent of the size of the prime being generated and the intended security level of the cryptosystem in which the prime is to be employed. For high-assurance applications, however, the deterministic methods may nevertheless be preferable.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

Defines the data structures and basic operations on SQL-data. Provides functional capabilities for creating, accessing, maintaining, controlling, and protecting SQL-data.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏
3388 条记录,每页 15 条,当前第 1 / 226 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页