Path:
Home >
GB/T >
Page702 > GB/T 21080-2007
Price & Delivery
US$759.00 · In stock · Download in 9 secondsGB/T 21080-2007: Banking and related financial services -- Sign-on authentication based on symmetric algorithm
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Obsolete
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GB/T 21080-2007 | English | 759 |
Add to Cart
|
3 days [Need to translate]
|
Banking and related financial services -- Sign-on authentication based on symmetric algorithm
|
Click to Preview a similar PDF
Basic data
| Standard ID | GB/T 21080-2007 (GB/T21080-2007) |
| Description (Translated English) | Banking and related financial services -- Sign-on authentication based on symmetric algorithm |
| Sector / Industry | National Standard (Recommended) |
| Classification of Chinese Standard | A11 |
| Classification of International Standard | 03.060 |
| Word Count Estimation | 19,156 |
| Date of Issue | 2007-09-05 |
| Date of Implementation | 2007-12-01 |
| Adopted Standard | ISO 11131-1992, IDT |
| Regulation (derived from) | China Announcement of Newly Approved National Standards No. 10 of 2007 (No. 110 overall) |
| Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China |
| Summary | This standard specifies the authentication information has been transmitted to ensure the confidentiality and authentication through the authentication information reproducing method to provide detection, provides entity requesting access and authorization to allow access between entities of the three signature verification methods. |
GB/T 21080-2007: Banking and related financial services -- Sign-on authentication based on symmetric algorithm
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Banking and related financial services. Sign-on authentication based on symmetric algorithm
ICS 03.060
A11
National Standards of People's Republic of China
GB/T 21080-2007/ISO 11131.1992
Banking and related financial services
Signature-based identification of symmetric algorithms
(ISO 11131.1992, Bankingandrelatedfinancialservices-
Sign-onauthentication, IDT)
Posted 2007-09-05
2007-12-01 implementation
Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
Standardization Administration of China released
Table of Contents
Preface Ⅰ
Introduction Ⅱ
1 Scope 1
2 Normative references 1
3 Terms, Definitions and Abbreviations 1
4 Signature Verification 3
5 protection 6
6 Interoperability Protocol Specification 6
Appendix A (informative) The limitations of the standard 13
A. 131 scope of protection provided by this standard
A. 2 pairs of warning to the user 13
Limitations Appendix B (informative) technical specifications of the standard 14
GB/T 21080-2007/ISO 11131.1992
Foreword
This standard is identical with ISO 11131.1992 "Banking and related financial services signature verification" (in English).
For ease of use, this standard made the following editorial changes.
a) Remove ISO foreword;
b) "this International Standard" be replaced by "this standard";
c) According to the current actual development of the computer industry, increasing the informative Appendix B.
Appendices A and B are informative appendices.
The standard proposed by the People's Bank of China.
This standard by the National Standardization Technical Committee on Finance.
This standard is drafted by. China Financial Computerization Corporation.
Participated in the drafting of this standard. People's Bank of China, Bank of China, China Construction Bank, China Everbright Bank, China UnionPay Co. Shares
Company, Beijing Venus company.
The main drafters of this standard. Tan Guoan, Yang , Lushu Chun, Li Shuguang, Liu Yun, Du Ning, Liu Zhijun, Zhang Yan, Zhang Dedong, Davey, Zhang Xiaodong,
Ma, Li Jian, Wang Wei, Wang Qin, Sun Weidong, Li Huan.
This standard was first formulated.
GB/T 21080-2007/ISO 11131.1992
Introduction
Financial institutions are increasingly using electronic communication technology to provide more timely and accurate services to its customers to meet individual customers'
demand. The technology continues to strengthen customers direct access to computer applications (or log) financial institutions. Specific examples include funds
Transfer and cash management services.
Historically, the financial industry commonly used user (user identification name) Personal identifiers used in combination with a secret password as provide consumers direct
Then access to the standard method of service provider systems.
However, the effectiveness of the password system has limitations. Authenticate the user can use a variety of methods to crack passwords, for example, it can be speculated
Out, he was tapped or publicly displayed. Counterfeiting and reproduction are also two possible threats.
--- Counterfeiting is to steal passwords for entities by displaying imitation, counterfeiting is usually accompanied by other attacks, such as data tampering;
--- Is the playback recently recorded once again demonstrated effective exchange used to produce unauthorized effect.
The two sides shared common key security signature verification procedures need to achieve a large number of conditions, including the following.
a) holding identification system nodes complete the hardware and software;
b) maintaining the authentication information between the supplicant and the complete authorized person, such as. assign a user identifier (user name), password selection, mouth
Change orders, disrupting access method, the signature failed attempts audit;
c) after a successful login to keep the entire session identified during continuity;
d) maintain the ability to audit failed login attempts;
e) ensure the integrity and resistance to crack misuse of Key Management System;
f) ensure the confidentiality of transmitted authentication information;
g) to provide detection reproducing method validation of authentication information.
GB/T 21080-2007/ISO 11131.1992
Banking and related financial services
Signature-based identification of symmetric algorithms
1 Scope
This standard implements the introduction of conditions f) and conditions g). It specifies the entity requesting access and authorization to allow access to three entities
Species Signature Verification mode.
a) by personal password authentication information (PAI) to authenticate the user, such as;
b) by a unique user key to authenticate the user;
c) key node by node unique identification.
This standard uses a symmetric (key) algorithm, and the requesting party licensors symmetric algorithms use the same key.
Chapter 6 gives an agreement to meet the requirements of this standard instance can be obtained interoperability instance. Appendix A describes the present standard
Some limitations exist. Appendix B describes some of the limitations of the standard specification.
2 Normative references
The following documents contain provisions which, through reference in this standard and become the standard terms. For dated references, subsequent
Amendments (not including errata content) or revisions do not apply to this standard, however, encourage the parties to the agreement are based on research
Whether the latest versions of these documents. For undated reference documents, the latest versions apply to this standard.
GB/T 15277-1994 Information processing 64bit block cipher algorithm works (eqv ISO 8372. 1987)
ISO 8730.1990 requirements for banking message authentication (wholesale)
ISO 8732. 1988 Banking - Key Management (Wholesale)
ISO 10126-1.1991 Banking packet encryption program (wholesale) - Part 1. General principles
ISO 10126-2.1991 Banking packet encryption program (wholesale) - Part 2. DEA algorithm
3 Terms, definitions and abbreviations
3.1 Terms and Definitions
The following terms and definitions apply to this standard.
3.1.1
Used to identify the key.
3.1.2
Encrypted information.
3.1.3
One key is available to authorized time period, or in a given system remain valid key for a specified period of time.
3.1.4
Ciphertext (unreadable) is converted to plain text (readable) process.
GB/T 21080-2007/ISO 11131.1992
...