Identification cards for banking purposes, смотри 35.240.15
Фильтр :
Стандарт и/или проект Этап ТК
Information processing — Magnetic ink character recognition — Part 1: Print specifications for E13B
90.93 ISO/TC 68/SC 9
Information processing — Magnetic ink character recognition — Part 2: Print specifications for CMC7
90.93 ISO/TC 68/SC 9
Information processing — Magnetic ink character recognition — Print specifications
95.99 ISO/TC 68
Blockchain and distributed ledger technologies – Use cases
60.60 ISO/TC 307
Financial services — Code-scanning payment security
40.20 ISO/TC 68/SC 2
Blockchain and distributed ledger technologies — Identifiers of subjects and objects for the design of blockchain systems
30.60 ISO/TC 307
Identification cards — Machine readable travel documents — Part 1: Machine readable passport
95.99 ISO/IEC JTC 1/SC 17
Identification cards — Card originated messages — Content for financial transactions
95.99 ISO/IEC JTC 1/SC 17
Identification cards — Physical characteristics
95.99 ISO/IEC JTC 1/SC 17
Identification cards — Recording technique — Part 2: Magnetic stripe
95.99 ISO/IEC JTC 1/SC 17
Identification cards — Recording technique — Part 3: Location of embossed characters on ID-1 cards
95.99 ISO/IEC JTC 1/SC 17
Identification cards — Recording technique — Part 4: Location of read-only magnetic tracks — Tracks 1 and 2
95.99 ISO/IEC JTC 1/SC 17
Identification cards — Recording technique — Part 5: Location of read-write magnetic track — Track 3
95.99 ISO/IEC JTC 1/SC 17
Identification cards — Numbering system and registration procedure for issuer identifiers
95.99 ISO/IEC JTC 1/SC 17
Identification cards — Numbering system and registration procedure for issuer identifiers — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 17
Identification cards — Financial transaction cards
95.99 ISO/IEC JTC 1/SC 17
Magnetic stripes on savingsbooks
95.99 ISO/IEC JTC 1/SC 17
Information technology — Magnetic stripes on savingsbooks
95.99 ISO/IEC JTC 1/SC 17
Information technology — Magnetic stripes on savingsbooks
90.93 ISO/IEC JTC 1/SC 17
Bank card originated messages — Interchange message specifications — Content for financial transactions
95.99 ISO/TC 68
Banking — Requirements for message authentication (wholesale)
95.99 ISO/TC 68/SC 2
Banking — Requirements for message authentication (wholesale)
95.99 ISO/TC 68/SC 2
Banking — Requirements for message authentication (wholesale) — Technical Corrigendum 1: .
95.99 ISO/TC 68/SC 2
Banking — Approved algorithms for message authentication — Part 1: DEA
95.99 ISO/TC 68/SC 2
Banking — Approved algorithm for message authentication — Part 2: Message authenticator algorithms
95.99 ISO/TC 68/SC 2
Banking — Approved algorithms for message authentication — Part 2: Message authenticator algorithm
95.99 ISO/TC 68/SC 2
Banking — Key management (wholesale)
95.99 ISO/TC 68/SC 2
Banking — Key management (wholesale) — Technical Corrigendum 1: .
95.99 ISO/TC 68/SC 2
Banking and related financial services — Vocabulary and data elements
95.99 ISO/TC 68
Securities — Optical character recognition line — Position and structure
90.93 ISO/TC 68/SC 9
Banking — Personal Identification Number management and security — Part 1: PIN protection principles and techniques
95.99 ISO/TC 68/SC 2
Banking — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for online PIN handling in ATM and POS systems
95.99 ISO/TC 68/SC 2
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
95.99 ISO/TC 68/SC 2
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems — Amendment 1
95.99 ISO/TC 68/SC 2
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
90.92 ISO/TC 68/SC 2
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
30.00 ISO/TC 68/SC 2
Banking — Personal Identification Number management and security — Part 2: Approved algorithm(s) for PIN encipherment
95.99 ISO/TC 68/SC 2
Banking — Personal Identification Number management and security — Part 2: Approved algorithms for PIN encipherment
95.99 ISO/TC 68/SC 2
Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment
90.93 ISO/TC 68/SC 2
Banking — Personal Identification Number management and security — Part 3: Requirements for offline PIN handling in ATM and POS systems
95.99 ISO/TC 68/SC 2
Financial services — Personal Identification Number (PIN) management and security — Part 4: Requirements for PIN handling in eCommerce for Payment Transactions
90.93 ISO/TC 68/SC 2
Banking — Personal Identification Number (PIN) management and security — Part 4: Guidelines for PIN handling in open networks
95.99 ISO/TC 68/SC 2
Financial services — Personal Identification Number (PIN) management and security — Part 5: Methods for the generation, change, and verification of PINs and card security data using the advanced encryption standard
40.98 ISO/TC 68/SC 2
Banking and related financial services — Requirements for message authentication (retail)
95.99 ISO/TC 68/SC 2
Banking — Procedures for message encipherment (wholesale) — Part 1: General principles
95.99 ISO/TC 68/SC 2
Banking — Procedures for message encipherment (wholesale) — Part 2: DEA algorithm
95.99 ISO/TC 68/SC 2
Banking — Key management by means of asymmetric algorithms — Part 1: Principles, procedures and formats
95.99 ISO/TC 68/SC 2
Banking — Key management by means of asymmetric algorithms — Part 2: Approved algorithms using the RSA cryptosystem
95.99 ISO/TC 68/SC 2
Banking — Key management (retail) — Part 1: Introduction to key management
95.99 ISO/TC 68/SC 2
Banking — Key management (retail) — Part 1: Principles
90.92 ISO/TC 68/SC 2
Banking — Key management (retail) — Part 2: Key management techniques for symmetric ciphers
95.99 ISO/TC 68/SC 2
Banking — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
95.99 ISO/TC 68/SC 2
Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
90.92 ISO/TC 68/SC 2
Banking — Key management (retail) — Part 3: Key life cycle for symmetric ciphers
95.99 ISO/TC 68/SC 2
Banking — Key management (retail) — Part 4: Key management techniques using public key cryptosystems
95.99 ISO/TC 68/SC 2
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
90.92 ISO/TC 68/SC 2
Banking — Key management (retail) — Part 5: Key life cycle for public key cryptosystems
95.99 ISO/TC 68/SC 2
Banking — Key management (retail) — Part 6: Key management schemes
95.99 ISO/TC 68/SC 2
Financial services — Key management (retail)
60.00 ISO/TC 68/SC 2
Banking — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods
95.99 ISO/TC 68/SC 2
Banking — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods
95.99 ISO/TC 68/SC 2
Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods
90.92 ISO/TC 68/SC 2
Banking — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in magnetic stripe card systems
95.99 ISO/TC 68/SC 2
Banking — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
95.99 ISO/TC 68/SC 2
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
95.99 ISO/TC 68/SC 2
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
90.92 ISO/TC 68/SC 2
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
60.00 ISO/TC 68/SC 2
Banking — Key management related data element (retail)
95.99 ISO/TC 68/SC 2
Financial services — Key management related data element — Application and usage of ISO 8583 data elements 53 and 96
95.99 ISO/TC 68/SC 2
Financial services — Key-management-related data element — Application and usage of ISO 8583-1 data elements for encryption
60.60 ISO/TC 68/SC 2
Financial services — Recommendations on cryptographic algorithms and their use
90.92 ISO/TC 68/SC 2
Certificate management for financial services — Part 1: Public key certificates
95.99 ISO/TC 68/SC 2
Certificate management for financial services — Part 1: Public key certificates
95.99 ISO/TC 68/SC 2
Banking — Certificate management — Part 2: Certificate extensions
95.99 ISO/TC 68/SC 2
Banking — Requirements for message authentication using symmetric techniques
95.99 ISO/TC 68/SC 2
Financial services — Requirements for message authentication using symmetric techniques
95.99 ISO/TC 68/SC 2
Financial services — Requirements for message authentication using symmetric techniques
60.60 ISO/TC 68/SC 2
Banking — Security and other financial services — Framework for security in financial systems
95.99 ISO/TC 68/SC 2
Banking and related financial services — Triple DEA — Modes of operation — Implementation guidelines
90.93 ISO/TC 68/SC 2
Financial services — Biometrics — Part 1: Security framework
95.99 ISO/TC 68/SC 2
Financial services — Biometrics — Security framework
90.92 ISO/TC 68/SC 2
Financial services — Biometrics — Security framework
50.20 ISO/TC 68/SC 2
Banking and related financial services — Key wrap using AES
90.20 ISO/TC 68/SC 2
Banking and related financial services — Key wrap using AES — Amendment 1
30.99 ISO/TC 68/SC 2
Public key infrastructure for financial services — Practices and policy framework
95.99 ISO/TC 68/SC 2
Public key infrastructure for financial services — Practices and policy framework
60.60 ISO/TC 68/SC 2
ISO 20022 semantic models — Part 3: Semantic enrichment of the ISO 20022 conceptual model
50.20 ISO/TC 68/SC 9
Financial services — Semantic technology — Part 5: Mapping from FIX Orchestra to the common model
60.60 ISO/TC 68/SC 9
Blockchain and distributed ledger technologies — Vocabulary
90.92 ISO/TC 307
Blockchain and distributed ledger technologies — Vocabulary
40.00 ISO/TC 307
Web-service-based application programming interface (WAPI) in financial services
60.60 ISO/TC 68/SC 9
Security objectives of information systems of third-party payment services
60.60 ISO/TC 68/SC 2
Blockchain and distributed ledger technologies — Privacy and personally identifiable information protection considerations
60.60 ISO/TC 307
Blockchain and distributed ledger technologies – Overview of existing DLT systems for identity management
60.60 ISO/TC 307
Blockchain and distributed ledger technologies — Reference architecture
60.60 ISO/TC 307
Blockchain and distributed ledger technologies — Taxonomy and Ontology
60.60 ISO/TC 307
Blockchain and distributed ledger technologies — Legally binding smart contracts
30.98 ISO/TC 307
Blockchain and distributed ledger technologies — Overview of and interactions between smart contracts in blockchain and distributed ledger technology systems
60.60 ISO/TC 307
Security aspects for digital currencies
30.99 ISO/TC 68/SC 2
Blockchain and distributed ledger technologies — Security management of digital asset custodians
60.60 ISO/TC 307
Blockchain and distributed ledger technologies — Guidelines for governance
60.60 ISO/TC 307
Blockchain and distributed ledger technologies - Overview of trust anchors for DLT-based identity management
50.00 ISO/TC 307
Financial services — Security information for PKI in blockchain and DLT implementations
50.00 ISO/TC 68/SC 2
Internet of Things (IoT) — System requirements of IoT/SN technology-based integrated platform for chattel asset monitoring supporting financial services
60.60 ISO/IEC JTC 1/SC 41

По запросу ничего не найдено. Пожалуйста, попробуйте изменить настройки фильтра.