微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

This standard lists the Return Reason codes for both Customer and Administrative Returns for image exchange and IRD creation within the U.S. Payments System. It includes the Short Name and Overlay Abbreviation required for an IRD creation. The standard establishes the process to add, change or delete a Return Reason code. It is up to each individual financial institution to determine what Return Reason code they will use when returning a check. The standard also includes guidance for the proper use of Return Reason codes.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

This standard specifies the shape, dimensions, magnetic signal level, and tolerances for the E-13B characters which include ten numeral characters and four special symbol characters. When these E-13B font characters are printed in magnetic ink and used for the purpose of character recognition, the printed characters become magnetic ink character recognition, or what is commonly referred to as MICR. Also described are the various known types of printing defects and other printing considerations, together with the tolerances permitted.

定价: 1274元 / 折扣价: 1083 加购物车

在线阅读 收 藏

Wireless technologies have rapidly emerged as significant components of networks. The ease and speed of deployment, as well as inexpensive transmission rates, makes them ideal for deploying new systems. Whereas installations used to be delayed several months because of complicated landline connections, a wireless deployment can happen the same day an ATM or POS terminal is ordered. Greater wireless coverage, greater reliability, higher transfer speeds, and improved equipment quality has only increased the likelihood that ATMs with wireless are a preferred option. Data classification and risk assessments still need to be performed, however, to determine asset value and the risks introduced by transmission over wireless networks. The question is still how data is being secured. Numerous control methods must be used to protect sensitive data on wireless networks such as encrypting communication prior to transmission and decrypting it afterwards.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

ANSI X9.112 Wireless Management and Security is a multipart standard addressing different technologies and application environments using wireless communications. This standard, X9.112 Part 3: Mobile, addresses the management and security requirements for implementations applicable to manufacturers, application developers, and mobile financial service providers.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This X9.134 ?Part 1 standard provides a framework flexible enough to accommodate new mobile device technologies as well as to allow various business models. At the same time, it enables compliance with applicable regulations including data privacy, protection of personally identifiable data, consumer protection, anti-money laundering, and prevention of financial crime.

定价: 1365元 / 折扣价: 1161 加购物车

在线阅读 收 藏

The purpose of this document is to specify the lifecycle and management activities, principles, and requirements for applications (apps) used in Mobile Financial Services (MFSs). As defined in ASC X9.134-1, an application is a set of one or more software modules and any associated data used to provide functionality for an MFS.

定价: 592元 / 折扣价: 504 加购物车

在线阅读 收 藏

This document provides requirements and recommendations for implementation of mobile payments-to-persons programs. This document is structured as follows: Clause 5 sets forth the characteristics of mobile payments-to-persons; Clause 6 sets forth requirements for mobile payments-to-persons.

定价: 1593元 / 折扣价: 1355 加购物车

在线阅读 收 藏

Data security breaches continue to put millions of consumers at risk. Protecting consumer information is a shared responsibility for all parties involved including legacy and cloud service providers, organizations that store, transmit, or process consumer information, financial institutions, and individual consumers. This standard provides requirements, recommendations, and information regarding consumer information, business data, general data protection, and breach notification. Topics addressed within the scope of this standard Part 1: Data Protection include the following: NIST Security and Privacy Controls; Cryptography and Key Management; Device Management and Security.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

This part of ANS X9.24 establishes requirements and guidelines for the secure management and application-level interoperability of such automated keying operations. This part of this standard addresses symmetric keys managed with asymmetric keys, and asymmetric keys managed with symmetric keys (as in the storage of private keys encrypted with a symmetric master key for storage as cryptograms on a local database). This part of ANS X9.24 does NOT address using asymmetric keys to encrypt the Personal Identification Number (PIN) and does NOT address asymmetric keys managed with asymmetric keys.

定价: 1274元 / 折扣价: 1083 加购物车

在线阅读 收 藏

This part of the standard describes the AES DUKPT algorithm (Derived Unique Key Per Transaction), which uses a Base Derivation Key (BDK) to derive unique per device initial keys for transaction originating SCDs, and derive unique per transaction working keys from the initial keys based on the transaction number. Working keys can be used for a variety of functions, such as encryption of PINs, data or other keys, for derivation of other keys, for message authentication, etc. AES DUKPT supports the derivation of AES-128, AES-192, AES-256, and double and triple length TDEA keys from AES-128, AES-192, and AES-256 BDKs

定价: 1274元 / 折扣价: 1083 加购物车

在线阅读 收 藏

Produces a 160-bit representation of the message, called the message digest, when a message with a bit length less than 2 to 64th power is input. The message digest is used during the generation of a signature for the message. The message digest is computed during the generation of a signature for the message. The SHA-1 is also used to compute a message digest for the received version of the message during the process of verifying the signature. Any change to the message in transit will, with a very high probability, result in a different messages digest, and the signature will fail to verify. The Secure Hash Algorithm (SHA-1) described in this standard is required for use with the Digital Signature Algorithm and may be used whenever a secure hash algorithm is required.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This standard provides all parties involved in Electronic Benefits Transfer (EBT) transactions with technical specifications for exchanging financial transaction files for the Women, Infants, and Children (WIC) program and the framework for adding other EBT files and detail records in the future. The document standardizes file formats and thereby maximizes EBT productivity for all stakeholders in the industry. This standard describes the format of files and records between the Acquirer and Card issuer (or their agents). It specifies file structure, format and content, data elements and values for data elements used in EBT. The method by which the settlement of funds takes place is not within the scope of this standard.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

The requirements of this standard apply to: (a) Internal combustion engine-powered, hand-held, hedge trimmers; (b) Internal combustion engine-powered, hand-held, extended-reach hedge trimmers; and (c) Internal combustion engine-powered, hand-held, multi-purpose machines when configured as a hedge trimmer.

定价: 1709元 / 折扣价: 1453 加购物车

在线阅读 收 藏

This standard gives safety requirements and measures for their verification for the design and construction of portable, hand-held, pole-mounted pruners, including extendable and telescopic units, having an integral combustion engine as their power head and using a drive shaft to transmit power to a cutting attachment consisting of a saw chain, a reciprocating blade, or single-piece circular saw blade with a 205 mm (8.1 in) maximum outside diameter. Methods for the elimination or reduction of hazards arising from the use of these units and the type of information on safe working practices to be provided by the manufacturer are specified.

定价: 1709元 / 折扣价: 1453 加购物车

在线阅读 收 藏

Part 1 of this standard covers design considerations that apply to placement and location of magnetic ink printing on checks, drafts, and other documents intended for automated processing among depository institutions. The vertical and horizontal format of the MICR print band, the print tolerance of between MICR characters and between fields, and considerations of format at the leading edge and the trailing edge of checks, whether personal sized or business sized, and proper restrictions on magnetic and nonmagnetic ink usage in specified area are the primary focus of the specifications. Although some aspects of Part 1 may still be applicable, other types of documents such as internal control forms are not covered. A complete understanding of MICR printing requires reference to other standards listed in Clause 2.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏
553 条记录,每页 15 条,当前第 5 / 37 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页