Filter :
Standard and/or project | Stage | TC |
---|---|---|
Information processing — Magnetic ink character recognition — Part 1: Print specifications for E13B |
90.93 | ISO/TC 68/SC 9 |
Information processing — Magnetic ink character recognition — Part 2: Print specifications for CMC7 |
90.93 | ISO/TC 68/SC 9 |
Information processing — Magnetic ink character recognition — Print specifications |
95.99 | ISO/TC 68 |
Blockchain and distributed ledger technologies – Use cases |
60.60 | ISO/TC 307 |
Financial services — Code-scanning payment security |
40.93 | ISO/TC 68/SC 2 |
Blockchain and distributed ledger technologies — Identifiers of subjects and objects for the design of blockchain systems |
60.00 | ISO/TC 307 |
Identification cards — Machine readable travel documents — Part 1: Machine readable passport |
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Card originated messages — Content for financial transactions |
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Physical characteristics |
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Recording technique — Part 2: Magnetic stripe |
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Recording technique — Part 3: Location of embossed characters on ID-1 cards |
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Recording technique — Part 4: Location of read-only magnetic tracks — Tracks 1 and 2 |
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Recording technique — Part 5: Location of read-write magnetic track — Track 3 |
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Numbering system and registration procedure for issuer identifiers |
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Numbering system and registration procedure for issuer identifiers — Technical Corrigendum 1 |
95.99 | ISO/IEC JTC 1/SC 17 |
Identification cards — Financial transaction cards |
95.99 | ISO/IEC JTC 1/SC 17 |
Magnetic stripes on savingsbooks |
95.99 | ISO/IEC JTC 1/SC 17 |
Information technology — Magnetic stripes on savingsbooks |
95.99 | ISO/IEC JTC 1/SC 17 |
Information technology — Magnetic stripes on savingsbooks |
90.93 | ISO/IEC JTC 1/SC 17 |
Bank card originated messages — Interchange message specifications — Content for financial transactions |
95.99 | ISO/TC 68 |
Banking — Requirements for message authentication (wholesale) |
95.99 | ISO/TC 68/SC 2 |
Banking — Requirements for message authentication (wholesale) |
95.99 | ISO/TC 68/SC 2 |
Banking — Requirements for message authentication (wholesale) — Technical Corrigendum 1: . |
95.99 | ISO/TC 68/SC 2 |
Banking — Approved algorithms for message authentication — Part 1: DEA |
95.99 | ISO/TC 68/SC 2 |
Banking — Approved algorithm for message authentication — Part 2: Message authenticator algorithms |
95.99 | ISO/TC 68/SC 2 |
Banking — Approved algorithms for message authentication — Part 2: Message authenticator algorithm |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (wholesale) |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (wholesale) — Technical Corrigendum 1: . |
95.99 | ISO/TC 68/SC 2 |
Banking and related financial services — Vocabulary and data elements |
95.99 | ISO/TC 68 |
Securities — Optical character recognition line — Position and structure |
90.93 | ISO/TC 68/SC 9 |
Guidelines for security framework of information systems of TPP services |
30.20 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number management and security — Part 1: PIN protection principles and techniques |
95.99 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for online PIN handling in ATM and POS systems |
95.99 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
95.99 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems — Amendment 1 |
95.99 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
90.93 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
30.98 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number management and security — Part 2: Approved algorithm(s) for PIN encipherment |
95.99 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number management and security — Part 2: Approved algorithms for PIN encipherment |
95.99 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment |
90.93 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number management and security — Part 3: Requirements for offline PIN handling in ATM and POS systems |
95.99 | ISO/TC 68/SC 2 |
Financial services — Personal Identification Number (PIN) management and security — Part 4: Requirements for PIN handling in eCommerce for Payment Transactions |
90.93 | ISO/TC 68/SC 2 |
Banking — Personal Identification Number (PIN) management and security — Part 4: Guidelines for PIN handling in open networks |
95.99 | ISO/TC 68/SC 2 |
Banking and related financial services — Requirements for message authentication (retail) |
95.99 | ISO/TC 68/SC 2 |
Banking — Procedures for message encipherment (wholesale) — Part 1: General principles |
95.99 | ISO/TC 68/SC 2 |
Banking — Procedures for message encipherment (wholesale) — Part 2: DEA algorithm |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management by means of asymmetric algorithms — Part 1: Principles, procedures and formats |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management by means of asymmetric algorithms — Part 2: Approved algorithms using the RSA cryptosystem |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 1: Introduction to key management |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 1: Principles |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 2: Key management techniques for symmetric ciphers |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
95.99 | ISO/TC 68/SC 2 |
Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 3: Key life cycle for symmetric ciphers |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 4: Key management techniques using public key cryptosystems |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 5: Key life cycle for public key cryptosystems |
95.99 | ISO/TC 68/SC 2 |
Banking — Key management (retail) — Part 6: Key management schemes |
95.99 | ISO/TC 68/SC 2 |
Financial services — Key management (retail) |
60.60 | ISO/TC 68/SC 2 |
Banking — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
95.99 | ISO/TC 68/SC 2 |
Banking — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
95.99 | ISO/TC 68/SC 2 |
Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
90.92 | ISO/TC 68/SC 2 |
Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
30.99 | ISO/TC 68/SC 2 |
Banking — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in magnetic stripe card systems |
95.99 | ISO/TC 68/SC 2 |
Banking — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
95.99 | ISO/TC 68/SC 2 |
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
95.99 | ISO/TC 68/SC 2 |
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
95.99 | ISO/TC 68/SC 2 |
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
60.60 | ISO/TC 68/SC 2 |
Banking — Key management related data element (retail) |
95.99 | ISO/TC 68/SC 2 |
Financial services — Key management related data element — Application and usage of ISO 8583 data elements 53 and 96 |
95.99 | ISO/TC 68/SC 2 |
Financial services — Key-management-related data element — Application and usage of ISO 8583-1 data elements for encryption |
60.60 | ISO/TC 68/SC 2 |
Financial services — Recommendations on cryptographic algorithms and their use |
90.92 | ISO/TC 68/SC 2 |
Certificate management for financial services — Part 1: Public key certificates |
95.99 | ISO/TC 68/SC 2 |
Certificate management for financial services — Part 1: Public key certificates |
95.99 | ISO/TC 68/SC 2 |
Banking — Certificate management — Part 2: Certificate extensions |
95.99 | ISO/TC 68/SC 2 |
Banking — Requirements for message authentication using symmetric techniques |
95.99 | ISO/TC 68/SC 2 |
Financial services — Requirements for message authentication using symmetric techniques |
95.99 | ISO/TC 68/SC 2 |
Financial services — Requirements for message authentication using symmetric techniques |
60.60 | ISO/TC 68/SC 2 |
Banking — Security and other financial services — Framework for security in financial systems |
95.99 | ISO/TC 68/SC 2 |
Banking and related financial services — Triple DEA — Modes of operation — Implementation guidelines |
90.93 | ISO/TC 68/SC 2 |
Financial services — Biometrics — Part 1: Security framework |
95.99 | ISO/TC 68/SC 2 |
Financial services — Biometrics — Security framework |
95.99 | ISO/TC 68/SC 2 |
Financial services — Biometrics — Security framework |
60.60 | ISO/TC 68/SC 2 |
Banking and related financial services — Key wrap using AES |
90.92 | ISO/TC 68/SC 2 |
Banking and related financial services — Key wrap using AES — Amendment 1 |
30.98 | ISO/TC 68/SC 2 |
Banking and related financial services — Key wrap using AES |
40.20 | ISO/TC 68/SC 2 |
Public key infrastructure for financial services — Practices and policy framework |
95.99 | ISO/TC 68/SC 2 |
Public key infrastructure for financial services — Practices and policy framework |
90.20 | ISO/TC 68/SC 2 |
Financial services — Semantic technology — Part 3: Semantic enrichment of the ISO 20022 conceptual model |
60.60 | ISO/TC 68/SC 9 |
Financial services — Semantic technology — Part 5: Mapping from FIX Orchestra to the common model |
60.60 | ISO/TC 68/SC 9 |
Blockchain and distributed ledger technologies — Vocabulary |
90.92 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Vocabulary |
40.60 | ISO/TC 307 |
Web-service-based application programming interface (WAPI) in financial services |
90.20 | ISO/TC 68/SC 9 |
Security objectives of information systems of third-party payment services |
60.60 | ISO/TC 68/SC 2 |
Blockchain and distributed ledger technologies — Privacy and personally identifiable information protection considerations |
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies – Overview of existing DLT systems for identity management |
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Reference architecture |
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Taxonomy and Ontology |
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Legally binding smart contracts |
30.98 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Overview of and interactions between smart contracts in blockchain and distributed ledger technology systems |
60.60 | ISO/TC 307 |
Security aspects for digital currencies |
50.00 | ISO/TC 68/SC 2 |
Blockchain and distributed ledger technologies — Security management of digital asset custodians |
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies — Guidelines for governance |
60.60 | ISO/TC 307 |
Blockchain and distributed ledger technologies (DLTs) — Overview of trust anchors for DLT-based identity management |
60.60 | ISO/TC 307 |
Financial services — Security information for PKI in blockchain and DLT implementations |
60.60 | ISO/TC 68/SC 2 |
Privacy guidelines for fintech services |
30.20 | ISO/IEC JTC 1/SC 27 |
Internet of Things (IoT) — System requirements of IoT/SN technology-based integrated platform for chattel asset monitoring supporting financial services |
60.60 | ISO/IEC JTC 1/SC 41 |
No matching records found. Please try changing the filter settings.