• Shopping Cart
    There are no items in your cart

S.R. CWA 16374-6:2011

Current

Current

The latest, up-to-date edition.

EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.20 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE PROGRAMMER'S REFERENCE

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2011

€241.00
Excluding VAT

Foreword
1 Introduction
2 PIN Keypad
3 References
4 Info Commands
5 Execute Commands
6 Events
7 C-Header File
8 Appendix-A
9 Appendix-B - (Country Specific WFS_CMD_PIN_ENC_IO
                protocols)
10 Appendix-C - (Standardized lpszExtra fields)

Specifies the application program interface for personal identification number keypads (PIN pads) and other encryption/decryption devices.

DocumentType
Standard
Pages
212
PublisherName
National Standards Authority of Ireland
Status
Current

ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ANSI X9 TR 31 : 2010 INTEROPERABLE SECURE KEY EXCHANGE KEY BLOCK SPECIFICATION FOR SYMMETRIC ALGORITHMS
ISO 9564-1:2017 Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
ANSI X9.8 : 1995 BANKING - PERSONAL IDENTIFICATION NUMBER MANAGEMENT AND SECURITY - PART 1: PIN PROTECTION PRINCIPLES AND TECHNIQUES - PART 2: APPROVED ALGORITHMS FOR PIN ENCIPHERMENT
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO 8731-2:1992 Banking Approved algorithms for message authentication Part 2: Message authenticator algorithm
ANSI INCITS 92 : 1981 DATA ENCRYPTION ALGORITHM
ISO 9564-2:2014 Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment
ANSI X9.30.2 : 1997 PUBLIC KEY CRYPTOGRAPHY USING IRREVERSIBLE ALGORITHMS - PART 2: THE SECURE HASH ALGORITHM (SHA-1)

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.