Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Basic principles of PIN management
5 PIN handling devices
6 PIN security issues
7 PIN verification
8 Techniques for management/protection of
account-related PIN functions
9 Techniques for management/protection of transaction-related
PIN functions
10 Approval procedure for encipherment algorithms
Annex A (normative) - Destruction of sensitive data
Annex B (informative) - Additional guidelines for the design
of a PIN entry device
Annex C (informative) - Information for customers
Bibliography