ANSI X9.95 : 2016
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
FINANCIAL SERVICES - TRUSTED TIME STAMP MANAGEMENT AND SECURITY
15-12-2016
17-06-2024
Foreword
Introduction
1 Scope
2 Normative References
3 Terms and Definitions
4 Symbols and Abbreviated Terms
5 Time Stamp Framework
6 Trusted Time Stamp Requirements
7 Time Stamp Objects
8 Time Stamp Methods
9 Time Stamp Message Flows
Annex A: (Normative) - ASN.1 Modules
Annex B: (Normative) - TS Control Objectives
Annex C: (Informative) - TS Policy and TS Practice Statement
Annex D: (Informative) - OASIS DSS TC Time Stamp Protocols
Annex E: (Informative) - Algorithms
Bibliography
Describes the minimum security requirements for the effective use of time stamps in a financial services environment.
| Committee |
X9
|
| DocumentType |
Standard
|
| PublisherName |
American Bankers Association
|
| Status |
Superseded
|
| SupersededBy |
| ISO/IEC TR 29149:2012 | Information technology — Security techniques — Best practices for the provision and use of time-stamping services |
| ISO/IEC 18014-4:2015 | Information technology — Security techniques — Time-stamping services — Part 4: Traceability of time sources |
| ANSI X9.112-1 : 2009 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
| ANSI X9.112 : 2016 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
| BS ISO/IEC 18014-4:2015 | Information technology. Security techniques. Time-stamping services Traceability of time sources |
| 13/30287820 DC : 0 | BS ISO/IEC 18014-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 4: TRACEABILITY OF TIME SOURCES |
| PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
| ANSI X9.79-4 : 2013 | PUBLIC KEY INFRASTRUCTURE (PKI) - PART 4: ASYMMETRIC KEY MANAGEMENT |
| ANSI X9.30.1 : 1997 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - PART 1: THE DIGITAL SIGNATURE ALGORITHM (DSA) |
| ANSI X9.19 : 1996 | FINANCIAL INSTITUTION RETAIL MESSAGE AUTHENTICATION |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| ISO 8601:2004 | Data elements and interchange formats — Information interchange — Representation of dates and times |
| ISO 21188:2006 | Public key infrastructure for financial services — Practices and policy framework |
| ANSI X9.30.2 : 1997 | PUBLIC KEY CRYPTOGRAPHY USING IRREVERSIBLE ALGORITHMS - PART 2: THE SECURE HASH ALGORITHM (SHA-1) |
| ANSI X9.31 : 1998 | DIGITAL SIGNATURES USING REVERSIBLE PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY (RDSA) |
| ANSI X9.73 : 2017 | CRYPTOGRAPHIC MESSAGE SYNTAX - ASN.1 AND XML |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.