Фильтр :
Стандарт и/или проект | Этап | ТК |
---|---|---|
Information processing — Magnetic ink character recognition — Part 1: Print specifications for E13B
|
90.60 | ISO/TC 68/SC 9 |
Information processing — Magnetic ink character recognition — Part 2: Print specifications for CMC7
|
90.60 | ISO/TC 68/SC 9 |
Information processing — Magnetic ink character recognition — Print specifications
|
95.99 | ISO/TC 68 |
Blockchain and distributed ledger technologies – Use cases
|
60.60 | ISO/TC 307 |
Financial services — Code-scanning payment security
|
60.60 | ISO/TC 68/SC 2 |
Blockchain and distributed ledger technologies — Identifiers of subjects and objects for the design of blockchain systems
|
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Data flow models for blockchain and DLT use cases
|
90.92 | ISO/TC 307 |
Identification cards — Machine readable travel documents — Part 1: Machine readable passport
|
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Card originated messages — Content for financial transactions
|
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Physical characteristics
|
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Recording technique — Part 2: Magnetic stripe
|
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Recording technique — Part 3: Location of embossed characters on ID-1 cards
|
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Recording technique — Part 4: Location of read-only magnetic tracks — Tracks 1 and 2
|
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Recording technique — Part 5: Location of read-write magnetic track — Track 3
|
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Numbering system and registration procedure for issuer identifiers
|
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Numbering system and registration procedure for issuer identifiers — Technical Corrigendum 1
|
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Financial transaction cards
|
95.99 | ISO/IEC JTC 1/SC 17 |
Magnetic stripes on savingsbooks
|
95.99 | ISO/IEC JTC 1/SC 17 |
Information technology — Magnetic stripes on savingsbooks
|
95.99 | ISO/IEC JTC 1/SC 17 |
Information technology — Magnetic stripes on savingsbooks
|
90.20 | ISO/IEC JTC 1/SC 17 |
Bank card originated messages — Interchange message specifications — Content for financial transactions
|
95.99 | ISO/TC 68 |
Banking — Requirements for message authentication (wholesale)
|
95.99 | ISO/TC 68/SC 2 |
Banking — Requirements for message authentication (wholesale)
|
95.99 | ISO/TC 68/SC 2 |
Banking — Requirements for message authentication (wholesale) — Technical Corrigendum 1: .
|
95.99 | ISO/TC 68/SC 2 |
Banking — Approved algorithms for message authentication — Part 1: DEA
|
95.99 | ISO/TC 68/SC 2 |
Banking — Approved algorithm for message authentication — Part 2: Message authenticator algorithms
|
95.99 | ISO/TC 68/SC 2 |
Banking — Approved algorithms for message authentication — Part 2: Message authenticator algorithm
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (wholesale)
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (wholesale) — Technical Corrigendum 1: .
|
95.99 | ISO/TC 68/SC 2 |
Banking and related financial services — Vocabulary and data elements
|
95.99 | ISO/TC 68 |
Securities — Optical character recognition line — Position and structure
|
90.93 | ISO/TC 68/SC 9 |
Guidelines for security framework of information systems of third-party payment services
|
60.00 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number management and security — Part 1: PIN protection principles and techniques
|
95.99 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for online PIN handling in ATM and POS systems
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems — Amendment 1
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
|
90.93 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number management and security — Part 2: Approved algorithm(s) for PIN encipherment
|
95.99 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number management and security — Part 2: Approved algorithms for PIN encipherment
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment
|
90.92 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment
|
40.00 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number management and security — Part 3: Requirements for offline PIN handling in ATM and POS systems
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 4: Requirements for PIN handling in eCommerce for Payment Transactions
|
90.93 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number (PIN) management and security — Part 4: Guidelines for PIN handling in open networks
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 5: Methods for the generation, change, and verification of PINs using 16-byte block ciphers
|
40.60 | ISO/TC 68/SC 2 |
Banking and related financial services — Requirements for message authentication (retail)
|
95.99 | ISO/TC 68/SC 2 |
Banking — Procedures for message encipherment (wholesale) — Part 1: General principles
|
95.99 | ISO/TC 68/SC 2 |
Banking — Procedures for message encipherment (wholesale) — Part 2: DEA algorithm
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management by means of asymmetric algorithms — Part 1: Principles, procedures and formats
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management by means of asymmetric algorithms — Part 2: Approved algorithms using the RSA cryptosystem
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 1: Introduction to key management
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 1: Principles
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 2: Key management techniques for symmetric ciphers
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 3: Key life cycle for symmetric ciphers
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 4: Key management techniques using public key cryptosystems
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 5: Key life cycle for public key cryptosystems
|
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 6: Key management schemes
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Key management (retail)
|
60.60 | ISO/TC 68/SC 2 |
Banking — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods
|
95.99 | ISO/TC 68/SC 2 |
Banking — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Secure cryptographic devices (retail) — Part 1: Concepts and requirements
|
60.60 | ISO/TC 68/SC 2 |
Banking — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in magnetic stripe card systems
|
95.99 | ISO/TC 68/SC 2 |
Banking — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
|
60.60 | ISO/TC 68/SC 2 |
Banking — Key management related data element (retail)
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Key management related data element — Application and usage of ISO 8583 data elements 53 and 96
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Key-management-related data element — Application and usage of ISO 8583-1 data elements for encryption
|
90.20 | ISO/TC 68/SC 2 |
Financial services — Recommendations on cryptographic algorithms and their use
|
90.92 | ISO/TC 68/SC 2 |
Certificate management for financial services — Part 1: Public key certificates
|
95.99 | ISO/TC 68/SC 2 |
Certificate management for financial services — Part 1: Public key certificates
|
95.99 | ISO/TC 68/SC 2 |
Banking — Certificate management — Part 2: Certificate extensions
|
95.99 | ISO/TC 68/SC 2 |
Banking — Requirements for message authentication using symmetric techniques
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Requirements for message authentication using symmetric techniques
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Requirements for message authentication using symmetric techniques
|
60.60 | ISO/TC 68/SC 2 |
Banking — Security and other financial services — Framework for security in financial systems
|
95.99 | ISO/TC 68/SC 2 |
Security controls and implementation guidance for third party payment service providers
|
40.20 | ISO/TC 68/SC 2 |
Banking and related financial services — Triple DEA — Modes of operation — Implementation guidelines
|
90.93 | ISO/TC 68/SC 2 |
Financial services — Biometrics — Part 1: Security framework
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Biometrics — Security framework
|
95.99 | ISO/TC 68/SC 2 |
Financial services — Biometrics — Security framework
|
60.60 | ISO/TC 68/SC 2 |
Banking and related financial services — Key wrap using AES
|
90.92 | ISO/TC 68/SC 2 |
Banking and related financial services — Key wrap using AES
|
40.60 | ISO/TC 68/SC 2 |
Public key infrastructure for financial services — Practices and policy framework
|
95.99 | ISO/TC 68/SC 2 |
Public key infrastructure for financial services — Practices and policy framework
|
90.92 | ISO/TC 68/SC 2 |
Financial services — Semantic technology — Part 2: OWL representation of the ISO 20022 metamodel and e-repository
|
50.20 | ISO/TC 68/SC 9 |
Financial services — Semantic technology — Part 3: Semantic enrichment of the ISO 20022 conceptual model
|
60.60 | ISO/TC 68/SC 9 |
Financial services — Semantic technology — Part 5: Mapping from FIX Orchestra to the common model
|
60.60 | ISO/TC 68/SC 9 |
Blockchain and distributed ledger technologies — Vocabulary
|
95.99 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Vocabulary
|
60.60 | ISO/TC 307 |
Web-service-based application programming interface (WAPI) in financial services
|
90.93 | ISO/TC 68/SC 9 |
Security objectives of information systems of third-party payment services
|
60.60 | ISO/TC 68/SC 2 |
Blockchain and distributed ledger technologies — Privacy and personally identifiable information protection considerations
|
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies – Overview of existing DLT systems for identity management
|
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Reference architecture
|
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Taxonomy and Ontology
|
90.20 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Overview of and interactions between smart contracts in blockchain and distributed ledger technology systems
|
60.60 | ISO/TC 307 |
Security aspects for digital currencies
|
60.60 | ISO/TC 68/SC 2 |
Blockchain and distributed ledger technologies — Security management of digital asset custodians
|
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Guidelines for governance
|
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies (DLTs) — Overview of trust anchors for DLT-based identity management
|
60.60 | ISO/TC 307 |
Financial services — Security information for PKI in blockchain and DLT implementations
|
60.60 | ISO/TC 68/SC 2 |
Information technology — Financial information exchange — Simple binary encoding
|
40.20 | ISO/IEC JTC 1 |
Information technology — Security techniques — Privacy guidelines for fintech services
|
50.20 | ISO/IEC JTC 1/SC 27 |
Internet of Things (IoT) — System requirements of IoT/SN technology-based integrated platform for chattel asset monitoring supporting financial services
|
60.60 | ISO/IEC JTC 1/SC 41 |
По запросу ничего не найдено. Пожалуйста, попробуйте изменить настройки фильтра.