Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
<p>This document describes a data element related to key management which can be transmitted either in transaction messages to convey information about cryptographic keys used to secure the current transaction, or in cryptographic service messages to convey information about cryptographic keys to be used to secure future transactions.</p>
<p>This document addresses the requirements for the use of the data element related to key management within ISO 8583, using the following ISO 8583 data elements:</p>
<ul>
<li>security related control information (data element 53)</li>
<li>key management data (data element 96)</li>
<li>encryption data (data elements 50, 110 or 111)</li>
</ul>
<p>Data elements convey information about the associated transaction's cryptographic key(s) and is divided into subfields including a control field, a key-set identifier and additional optional information. This document is applicable to either symmetric or asymmetric cipher systems.</p>
Reģistrācijas numurs (WIID)
93312
Darbības sfēra
<p>This document describes a data element related to key management which can be transmitted either in transaction messages to convey information about cryptographic keys used to secure the current transaction, or in cryptographic service messages to convey information about cryptographic keys to be used to secure future transactions.</p>
<p>This document addresses the requirements for the use of the data element related to key management within ISO 8583, using the following ISO 8583 data elements:</p>
<ul>
<li>security related control information (data element 53)</li>
<li>key management data (data element 96)</li>
<li>encryption data (data elements 50, 110 or 111)</li>
</ul>
<p>Data elements convey information about the associated transaction's cryptographic key(s) and is divided into subfields including a control field, a key-set identifier and additional optional information. This document is applicable to either symmetric or asymmetric cipher systems.</p>