微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

ANSI X9.112 Wireless Management and Security is a multipart standard addressing different technologies and application environments using wireless communications. This standard, X9.112 Part 3: Mobile, addresses the management and security requirements for implementations applicable to manufacturers, application developers, and mobile financial service providers.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This X9.134 ?Part 1 standard provides a framework flexible enough to accommodate new mobile device technologies as well as to allow various business models. At the same time, it enables compliance with applicable regulations including data privacy, protection of personally identifiable data, consumer protection, anti-money laundering, and prevention of financial crime.

定价: 1365元 / 折扣价: 1161 加购物车

在线阅读 收 藏

The purpose of this document is to specify the lifecycle and management activities, principles, and requirements for applications (apps) used in Mobile Financial Services (MFSs). As defined in ASC X9.134-1, an application is a set of one or more software modules and any associated data used to provide functionality for an MFS.

定价: 592元 / 折扣价: 504 加购物车

在线阅读 收 藏

This document provides requirements and recommendations for implementation of mobile payments-to-persons programs. This document is structured as follows: Clause 5 sets forth the characteristics of mobile payments-to-persons; Clause 6 sets forth requirements for mobile payments-to-persons.

定价: 1593元 / 折扣价: 1355 加购物车

在线阅读 收 藏

Data security breaches continue to put millions of consumers at risk. Protecting consumer information is a shared responsibility for all parties involved including legacy and cloud service providers, organizations that store, transmit, or process consumer information, financial institutions, and individual consumers. This standard provides requirements, recommendations, and information regarding consumer information, business data, general data protection, and breach notification. Topics addressed within the scope of this standard Part 1: Data Protection include the following: NIST Security and Privacy Controls; Cryptography and Key Management; Device Management and Security.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

This part of ANS X9.24 establishes requirements and guidelines for the secure management and application-level interoperability of such automated keying operations. This part of this standard addresses symmetric keys managed with asymmetric keys, and asymmetric keys managed with symmetric keys (as in the storage of private keys encrypted with a symmetric master key for storage as cryptograms on a local database). This part of ANS X9.24 does NOT address using asymmetric keys to encrypt the Personal Identification Number (PIN) and does NOT address asymmetric keys managed with asymmetric keys.

定价: 1274元 / 折扣价: 1083 加购物车

在线阅读 收 藏

This part of the standard describes the AES DUKPT algorithm (Derived Unique Key Per Transaction), which uses a Base Derivation Key (BDK) to derive unique per device initial keys for transaction originating SCDs, and derive unique per transaction working keys from the initial keys based on the transaction number. Working keys can be used for a variety of functions, such as encryption of PINs, data or other keys, for derivation of other keys, for message authentication, etc. AES DUKPT supports the derivation of AES-128, AES-192, AES-256, and double and triple length TDEA keys from AES-128, AES-192, and AES-256 BDKs

定价: 1274元 / 折扣价: 1083 加购物车

在线阅读 收 藏

Produces a 160-bit representation of the message, called the message digest, when a message with a bit length less than 2 to 64th power is input. The message digest is used during the generation of a signature for the message. The message digest is computed during the generation of a signature for the message. The SHA-1 is also used to compute a message digest for the received version of the message during the process of verifying the signature. Any change to the message in transit will, with a very high probability, result in a different messages digest, and the signature will fail to verify. The Secure Hash Algorithm (SHA-1) described in this standard is required for use with the Digital Signature Algorithm and may be used whenever a secure hash algorithm is required.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This standard provides all parties involved in Electronic Benefits Transfer (EBT) transactions with technical specifications for exchanging financial transaction files for the Women, Infants, and Children (WIC) program and the framework for adding other EBT files and detail records in the future. The document standardizes file formats and thereby maximizes EBT productivity for all stakeholders in the industry. This standard describes the format of files and records between the Acquirer and Card issuer (or their agents). It specifies file structure, format and content, data elements and values for data elements used in EBT. The method by which the settlement of funds takes place is not within the scope of this standard.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

Specifies a general framework for testing conformance to a computer graphics standard. The general framework described in this International Standard addresses six component and is applicable to all standards within the scope of the subcommittee within ISO/IEC JTC 1 responsible for computer graphics and image processing.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

The CGRM defines a structure within which current and future Infernational Standards for computer graphics shall be compared and their relationships described. This standard also defines a set of concrpts and their interrelationships which should be applicable to the complete reange of future computer graphics standards.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

Specifies the physical and magnetic characteristics of a 3,81 mm wide magnetic tape cartridge to enable interchangeability of such cartridges. It also specifies the quality of the recorded signal, the recording method and the recorded format, thereby allowing data interchange between drives by means of such magnetic tape cartridges.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

Specifies the characteristics of a series of related Types of 130-mm optical cartridges (ODCs) and provides for intechange between optical disk drives (Types R/W, Type P-ROM, Type O-ROM and Type WO). Together with a standard for volume and file structure, it provides for full interchange between data processing systems.

定价: 0元 / 折扣价: 0 加购物车

在线阅读 收 藏

The requirements of this standard apply to: (a) Internal combustion engine-powered, hand-held, hedge trimmers; (b) Internal combustion engine-powered, hand-held, extended-reach hedge trimmers; and (c) Internal combustion engine-powered, hand-held, multi-purpose machines when configured as a hedge trimmer.

定价: 1709元 / 折扣价: 1453 加购物车

在线阅读 收 藏

This standard gives safety requirements and measures for their verification for the design and construction of portable, hand-held, pole-mounted pruners, including extendable and telescopic units, having an integral combustion engine as their power head and using a drive shaft to transmit power to a cutting attachment consisting of a saw chain, a reciprocating blade, or single-piece circular saw blade with a 205 mm (8.1 in) maximum outside diameter. Methods for the elimination or reduction of hazards arising from the use of these units and the type of information on safe working practices to be provided by the manufacturer are specified.

定价: 1709元 / 折扣价: 1453 加购物车

在线阅读 收 藏
595 条记录,每页 15 条,当前第 6 / 40 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页