35.240.40 - IT applications in banking
ICS 35.240.40 Details
IT applications in banking
IT-Anwendungen im Bankwesen
Applications des TI dans le domaine bancaire
Uporabniške rešitve IT v bančništvu
General Information
e-Library Subscription
Create subscription and get permanent access to documents within 35.240.40 - IT applications in banking
Currently subscription includes documents marked with .We are working on making all documents available within the subscription.
- 1 (current)
- 2
- 3
- 4
- 5
This document specifies the security characteristics for secure cryptographic devices (SCDs) based on the cryptographic processes defined in the ISO 9564 series, ISO 16609 and ISO 11568. This document states the security characteristics concerning both the operational characteristics of SCDs and the management of such devices throughout all stages of their life cycle. This document does not address issues arising from the denial of service of an SCD. This document does not address software services that use multi-party computation (MPC) to achieve some security objectives and, relying on these, offer cryptographic services. NOTE These are sometimes called “soft” or software hardware security modules (HSMs) in common language, which is misleading and does not correspond to the definition of HSM in this document.
- Standard27 pagesEnglish languagesale 15% off
This document provides an overview, risk assessment, minimum security requirements and extended security guidelines for code-scanning payment in which the payer uses a mobile device to operate the payment transaction. This document is applicable to cases where the payment code is used to initiate a mobile payment and presented by either the payer or the payee. The following is excluded from the scope of this document: — details of payer and payee onboarding; — details of the supporting payment infrastructure, as described in 5.1.
- Standard30 pagesEnglish languagesale 15% off
This document uses a set of models that describe the flows of different types of data between distributed ledger technologies (DLT) and related systems, as well as between different DLT nodes. It provides a descriptive analysis of data flows in the development of use cases, as well as the basis for understanding the characteristics of DLT data flows, to support DLT application design and system analysis. The models referenced are in accordance with ISO 23257:2022 and the use case analysis approach provided in ISO/TR 3242:2022.
- Technical report49 pagesEnglish languagesale 15% off
This document defines fundamental terminology for blockchain and distributed ledger technologies.
- Standard14 pagesEnglish languagesale 15% off
This document specifies an acceptable security framework for the issuance and management of digital currencies using cryptographic mechanisms standardized by ISO/TC 68/SC 2 and other references. This document proposes a framework approach based on standards for mitigating vulnerabilities for digital currency systems. The objective is that security aspects are integrated by design and not added afterwards as an extra processing layer that needs to accommodate legacy infrastructures.
- Technical specification14 pagesEnglish languagesale 15% off
This document provides an overview of identifiers [and their standards and register(s)] relevant for the design of blockchain systems and the interoperability of those systems with non-blockchain systems. The following criteria were used for inclusion of identifiers in this document: — Identifiers (and their standards and registers) issued by the public sector for subjects and objects such as citizen numbers, business registration numbers or land registration numbers; — Identifiers that are internationally recognized and fulfil one of the following criteria: — An identifier is an international standard of an SDO (Standard Development Organization); — An identifier is a de facto standard according to the norms of the industry involved (even if it is not an international standard of an SDO). — Identifiers that have relevance for DLT systems as it fulfils one of the following criteria: — An identifier that has been used without DLT, but has proven to solve the problems of DLT services using DLT; — An identifier that was designed with the usage of DLT in mind from the beginning.
- Technical report50 pagesEnglish languagesale 15% off
This specification shows the modifications made to version 3.40 of CWA 16926-11 in version 3.50.
- Standardization document32 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report32 pagesEnglish languagesale 10% offe-Library read for1 day
This document describes concepts and considerations on the use of trust anchors for systems leveraging blockchain and distributed ledger technologies (DLTs) for identity management, i.e. the mechanism by which one or more entities can create, be given, modify, use and revoke a set of identity attributes.
- Technical report25 pagesEnglish languagesale 15% off
This document describes the management of cryptographic keys in a blockchain, or distributed system used in the financial sector The objective of this document is to consider the impact of different types of key management processes that are required for PKI implementations in Blockchain and DLT projects
- Technical report18 pagesEnglish languagesale 15% off
This document provides fundamental terminology for blockchain and distributed ledger technologies.
- Standard18 pagesEnglish languagesale 10% offe-Library read for1 day
This document specifies the security framework for using biometrics for authentication of customers in financial services, focusing exclusively on retail payments. It introduces the most common types of biometric technologies and addresses issues concerning their application. This document also describes representative architectures for the implementation of biometric authentication and associated minimum control objectives. The following are within the scope of this document: — use of biometrics for the purpose of: — verification of a claimed identity; — identification of an individual; — biometric authentication threats, vulnerabilities and controls; — validation of credentials presented at enrolment to support authentication; — management of biometric information across its life cycle, comprising enrolment, transmission and storage, verification, identification and termination processes; — security requirements for hardware used in conjunction with biometric capture and biometric data processing; — biometric authentication architectures and associated security requirements. The following are not within the scope of this document: — detailed specifications for data collection, feature extraction and comparison of biometric data and the biometric decision-making process; — use of biometric technology for non-financial transaction applications, such as physical or logical system access control.
- Standard65 pagesEnglish languagesale 15% off
This specification shows the modifications made to version 3.40 of CWA 16926-1 in version 3.50.
- Standardization document173 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report173 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-17 in version 3.50.
- Standardization document29 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report29 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-6 in version 3.50.
- Standardization document328 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report328 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-18 in version 3.50.
- Standardization document125 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report125 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-8 in version 3.50.
- Standardization document46 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report46 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-9 in version 3.50.
- Standardization document58 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report58 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-12 in version 3.50.
- Standardization document36 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report36 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-7 in version 3.50.
- Standardization document57 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report57 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-4 in version 3.50.
- Standardization document96 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report96 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-13 in version 3.50.
- Standardization document21 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report21 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-5 in version 3.50.
- Standardization document140 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report140 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-10 in version 3.50.
- Standardization document84 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report84 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-15 in version 3.50.
- Standardization document210 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report210 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-14 in version 3.50.
- Standardization document55 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report55 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-16 in version 3.50.
- Standardization document38 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report38 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-3 in version 3.50.
- Standardization document133 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report133 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-19 in version 3.50.
- Standardization document55 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report55 pagesEnglish languagesale 10% offe-Library read for1 day
This document describes the management of symmetric and asymmetric cryptographic keys that can be used to protect sensitive information in financial services related to retail payments. The document covers all aspects of retail financial services, including connections between a card-accepting device and an Acquirer, between an Acquirer and a card Issuer, and between an ICC and a card-accepting device. It covers all phases of the key life cycle, including the generation, distribution, utilization, archiving, replacement and destruction of the keying material. This document covers manual and automated management of keying material, and any combination thereof, used for retail financial services. It includes guidance and requirements related to key separation, substitution prevention, identification, synchronization, integrity, confidentiality and compromise, as well as logging and auditing of key management events. Requirements associated with hardware used to manage keys have also been included in this document.
- Standard115 pagesEnglish languagesale 15% off
This specification describes the functionality of the services provided by the Depository (DEP) services under XFS, by defining the service-specific commands that can be issued, using the WFSGetInfo, WFSAsyncGetInfo, WFSExecute and WFSAsyncExecute functions.
A Depository is used for the acceptance and deposit of media into the device or terminal. There are two main types of depository: an envelope depository for the deposit of media in envelopes and a night safe depository for the deposit of bags containing bulk media.
An envelope depository accepts media, prints on the media and deposits the media into a holding container or bin. Some envelope depositories offer the capability to dispense an envelope to the customer at the start of a transaction. The customer takes this envelope, fills in the deposit media, possibly inscribes it and puts it into the deposit slot. The envelope is then accepted, printed and transported into a deposit container.
The envelope dispense mechanism may be part of the envelope depository device mechanism with the same entry/exit slot or it may be a separate mechanism with separate entry/exit slot.
Envelopes dispensed and not taken by the customer can be retracted back into the device. When the dispenser is a separate mechanism the envelope is retracted back into the dispenser container. When the dispenser is a common mechanism the envelope is retracted into the depository container.
A night safe depository normally only logs the deposit of a bag and does not print on the media.
- Standardization document47 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report47 pagesEnglish languagesale 10% offe-Library read for1 day
This document examines semantic enrichment to support the maintenance of the ISO 20022 conceptual model. It reports on existing and proposed practices to enrich a model: — in a repository, annotating repository concepts with metadata using semantic markup or constraints; — outside a repository, using references to repository concepts, such as the provenance of changes.
- Technical report12 pagesEnglish languagesale 15% off
This specification shows the modifications made to version 3.40 of CWA 16926-14 in version 3.50.
- Standardization document55 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report55 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-18 in version 3.50.
- Standardization document125 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report125 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-1 in version 3.50.
- Standardization document173 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report173 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-4 in version 3.50.
- Standardization document96 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report96 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-13 in version 3.50.
- Standardization document21 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report21 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-15 in version 3.50.
- Standardization document210 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report210 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-9 in version 3.50.
- Standardization document58 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report58 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-5 in version 3.50.
- Standardization document140 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report140 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-3 in version 3.50.
- Standardization document133 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report133 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-17 in version 3.50.
- Standardization document29 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report29 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-6 in version 3.50.
- Standardization document328 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report328 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-8 in version 3.50.
- Standardization document46 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report46 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-12 in version 3.50.
- Standardization document36 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report36 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-11 in version 3.50.
- Standardization document32 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report32 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-16 in version 3.50.
- Standardization document38 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report38 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-19 in version 3.50.
- Standardization document55 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report55 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-7 in version 3.50.
- Standardization document57 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report57 pagesEnglish languagesale 10% offe-Library read for1 day
This specification shows the modifications made to version 3.40 of CWA 16926-10 in version 3.50.
- Standardization document84 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report84 pagesEnglish languagesale 10% offe-Library read for1 day
This specification describes the functionality of the services provided by the Camera (CAM) services under XFS, by defining the service-specific commands that can be issued, using the WFSGetInfo, WFSAsyncGetInfo, WFSExecute and WFSAsyncExecute functions.
Banking camera systems usually consist of a recorder, a video mixer and one or more cameras. If there are several cameras, each camera focuses a special place within the self-service area (e.g. the room, the customer or the cash tray). By using the video mixer it can be decided, which of the cameras should take the next photo. Furthermore data can be given to be inserted in the photo (e.g. date, time or bank code).
If there is only one camera that can switch to take photos from different positions, it is presented by the Service Provider as a set of cameras, one for each of its possible positions.
- Standardization document36 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical report36 pagesEnglish languagesale 10% offe-Library read for1 day
- 1 (current)
- 2
- 3
- 4
- 5