HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

JR/T 0025.7-2018 English PDF

US$1819.00 · In stock
Delivery: <= 10 days. True-PDF full-copy in English will be manually translated and delivered via email.
JR/T 0025.7-2018: China financial integrated circuit card specifications - Part 7: Debit/credit application security specification
Status: Valid

JR/T 0025.7: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
JR/T 0025.7-2018English1819 Add to Cart 10 days [Need to translate] China financial integrated circuit card specifications - Part 7: Debit/credit application security specification Valid JR/T 0025.7-2018
JR/T 0025.7-2013English360 Add to Cart 0--9 seconds. Auto-delivery China financial integrated circuit card specifications. Part 7: Debit/credit application security specification Obsolete JR/T 0025.7-2013
JR/T 0025.7-2010EnglishRFQ ASK 11 days [Need to translate] China financial integrated circuit card specifications. Part 7: Debit/credit application security specification Obsolete JR/T 0025.7-2010
JR/T 0025.7-2005EnglishRFQ ASK 11 days [Need to translate] China financial integrated circuit card specifications - Part 7: Debit/credit security specification Obsolete JR/T 0025.7-2005

PDF similar to JR/T 0025.7-2018


Standard similar to JR/T 0025.7-2018

GB/T 19584   GB/T 12406   JR/T 0025.3   JR/T 0025.18   JR/T 0025.16   

Basic data

Standard ID JR/T 0025.7-2018 (JR/T0025.7-2018)
Description (Translated English) China financial integrated circuit card specifications - Part 7: Debit/credit application security specification
Sector / Industry Finance Industry Standard (Recommended)
Classification of Chinese Standard A11
Word Count Estimation 79,781
Date of Issue 2018-11-28
Date of Implementation 2018-11-28
Older Standard (superseded by this standard) JR/T 0025.17-2013; JR/T 0025.7-2013
Regulation (derived from) Bank-Announcement (2018) No.307
Issuing agency(ies) People's Bank of China
JR/T 0025.7-2013 JR FINANCIAL INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.240.40 A 11 File No.. Replacing JR/T 0025.7-2010 China financial integrated circuit card specifications - Part 7. Debit/credit application security specification ISSUED ON. FEBRUARY 5, 2013 IMPLEMENTED ON. FEBRUARY 5, 2013 Issued by. People's Bank of China 3. No action is required - Full-copy of this standard will be automatically & immediately delivered to your EMAIL address in 0~60 minutes.

Table of Contents

Foreword ... 3 Introduction ... 5 1 Scope ... 6 2 Normative references ... 6 3 Terms and definitions ... 7 4 Symbols and abbreviations ... 12 5 Offline data authentication ... 13 6 Application cryptogram and issuer authentication ... 45 7 Security message ... 47 8 Card security ... 49 9 Terminal security ... 56 10 Key management system ... 64 11 Security mechanism ... 74 12 Approved algorithms ... 83 Bibliography ... 87

Foreword

JR/T 0025 China Financial Integrated Circuit Card Specifications consists of the following parts. - Part 1. Electronic Purse/Electronic Deposit Application Card Specification; - Part 2. Electronic Purse/Electronic Deposit Application Specification; - Part 3. Specification on Application Independent ICC to Terminal Interface Requirements; - Part 4. Debit/Credit Application Overview; - Part 5. Debit/Credit Application Card Specification; - Part 6. Debit/Credit Application Terminal Specification; - Part 7. Debit/Credit Application Security Specification; - Part 8. Contactless Specification Independent of Application; - Part 9. Electronic Purse Extended Application Guide; - Part 10. Debit/Credit Card Personalization Guide; - Part 11. Contactless Integrated Circuit Card Communication Specification; - Part 12. Contactless Integrated Circuit Card Payment Specification; - Part 13. Low-value Payment Specifications Based on Debit/Credit Application; - Part 14. Comprehensive Application Specification Based on Contactless Low-value Payment Application; - Part 15. Electronic Cash Dual-currency Payment Specification; - Part 16. IC Card Internet Terminal Specification; - Part 17. Enhanced Debit/Credit Application Security Specification. This is the 7th Part of JR/T 0025. This Part was drafted in accordance with the rules given in GB/T 1.1-2009. This Part replaces JR/T 0025.7-2010 “China Financial Integrated Circuit Card Specifications - Part 7. Debit/Credit Application Security Specification”. China financial integrated circuit card specifications - Part 7. Debit/credit application security specification

Scope

This Part of JR/T 0025 describes the requirements for debit/credit application security functions and the security mechanisms involved in implementing these security functions and the encryption algorithms allowed for use, including IC card offline data authentication method, communication security between IC card and issuer, and related symmetric and asymmetric key managements, as specified as follows. - offline data authentication; - application cryptogram and issuer authentication; - security message; - card security; - terminal security; - symmetric and asymmetric key management system. In addition, it also includes the security mechanisms involved in implementing these security features and the specifications for the encryption algorithms approved for use. This Part applies to the security related equipment, cards, terminal equipment and management of financial debit/credit IC card application issued or accepted by the bank. The users are mainly the research, development, integration, maintenance and other relevant departments (organizations) of design, manufacture, management, distribution and application systems of cards, terminals and encryption devices related to the financial debit credit IC card application.

Normative References

The following standards contain the provisions which, through reference in this Part, constitute the provisions of this Part. For dated references, subsequent amendments (excluding corrections) or revisions do not apply to this Part. However, the parties who enter into agreement based on this Part are encouraged to investigate whether the latest versions of these documents are applicable. For undated reference documents, the latest versions apply to this Part. GB/T 16649.4, Identification Cards - Integrated circuit cards - Part 4. Organization, security and commands for interchange (GB/T 16649.4-2010, ISO/IEC 7816-4.2005, IDT) GB/T 16649. 5, Identification cards - Integrated circuit cards - Part 15. Cryptographic information application (GB/T 16649.5-2002, ISO/IEC 7816- 5.1994) GB/T 20547.2, Banking - Secure cryptographic devices(retail) - Part 2. Security compliance checklists for devices used in financial transactions (GB/T 20547.2-2006, ISO 13491-2.2005, IDT) ISO 873-1, Intelligent transport systems - Cooperative ITS - Test architecture ISO 8732, Banking - Key management (wholesale) ISO/IEC 9796-2, Information technology - Security techniques - Digital signature schemes giving message recovery - Part 2. Integer factorization based mechanisms ISO/IEC 9797-1, Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1. Mechanisms using a block cipher ISO/IEC 10116, Information technology - Security techniques - Modes of operation for an n-bit block cipher ISO 13491-1, Financial services - Secure cryptographic devices (retail) - Part 1. Concepts, requirements and evaluation methods

Terms and Definitions

For the purposes of this document, the following terms and definitions apply. 3.1 accelerated revocation recover keys before the issued expired key expiry date 3.2 application application protocols and related data sets between cards and terminals 3.3 asymmetric cryptographic technique are not used for offline data authentication processing and all other data in the READ RECORD command response data field (except SW1, SW2) is participating in offline data authentication; - for files with SFI from 11 to 30, the recorded Tag ('70') and recording length are used for offline data authentication processing so that all data in the READ RECORD command response data field (except SW1, SW2) is participating in the offline data authentication; - if the tag for the record in the file for offline data authentication is not '70', the offline data authentication is considered to have been performed and failed; the terminal must set the TSI's “Offline Data Authentication Execution” bit and the TVR's corresponding “Offline Static Data Authentication Failure” bit, “Offline Dynamic Data Authentication Failure” bit, or “CDA Failure” bit. 5.1 Key and certificate Terminal, through the use of public key algorithm, verifies the signature and certificate on the IC card to achieve offline data authentication. Public key technology uses private keys to generate encrypted data (certificates or signatures) that can be decrypted by the public key for authentication and data recovery. The bit length of the RSA public key mode shall be a multiple of 8 and the leftmost (high) bit of the leftmost (high) byte is 1. All lengths are in bytes. If the static application data on the card is not unique (e.g. the card uses a different CVM for international and domestic transactions), the card must support multiple IC card public key certificates (or static data signatures). If the signed static application data may be modified after the card is issued, the card must support updating of the IC card public key certificate (or static data signature). 5.1.1 Certification authority Offline data authentication requires a certification authority (CA). Certification authority has a high level of security encryption device that is used to issue the public key certificate of card issuer. Each terminal complying with JR/T 0025 shall store the corresponding certification authority public key for each application it can recognize. 5.1.2 Public-private key pair The certification authority and the issuer must use the asymmetric algorithm specified in 12.2 to generate the public-private key pair of the certification authority, the public-private key pair of the issuer and the public-private key pair of the IC card. In this Clause, the offline data authentication process and related data elements are described by using the RSA algorithm as an example. which generates the IC card public key certificate and is stored in the card. The length of IC card public key modulus must be less than or equal to the issuer public key modulus length. The le...

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of JR/T 0025.7-2018_English be delivered?

Answer: Upon your order, we will start to translate JR/T 0025.7-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 6 ~ 10 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of JR/T 0025.7-2018_English with my colleagues?

Answer: Yes. The purchased PDF of JR/T 0025.7-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version JR/T 0025.7-2018?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version JR/T 0025.7-2018 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.