Home Cart Quotation Policy About-Us
www.ChineseStandard.net
Database: 221887 (14 Apr 2026)
SEARCH
Path: Home > GB/T > Page702 > GB/T 21080-2007

GB/T 21080-2007 PDF English

Price & Delivery

US$759.00 · In stock · Download in 9 seconds
GB/T 21080-2007: Banking and related financial services -- Sign-on authentication based on symmetric algorithm
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Obsolete
Std IDVersionUSDBuyDeliver [PDF] inTitle (Description)
GB/T 21080-2007English759 Add to Cart 3 days [Need to translate] Banking and related financial services -- Sign-on authentication based on symmetric algorithm

Click to Preview a similar PDF

Basic data

Standard ID GB/T 21080-2007 (GB/T21080-2007)
Description (Translated English) Banking and related financial services -- Sign-on authentication based on symmetric algorithm
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard A11
Classification of International Standard 03.060
Word Count Estimation 19,156
Date of Issue 2007-09-05
Date of Implementation 2007-12-01
Adopted Standard ISO 11131-1992, IDT
Regulation (derived from) China Announcement of Newly Approved National Standards No. 10 of 2007 (No. 110 overall)
Issuing agency(ies) General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary This standard specifies the authentication information has been transmitted to ensure the confidentiality and authentication through the authentication information reproducing method to provide detection, provides entity requesting access and authorization to allow access between entities of the three signature verification methods.

GB/T 21080-2007: Banking and related financial services -- Sign-on authentication based on symmetric algorithm




---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Banking and related financial services. Sign-on authentication based on symmetric algorithm ICS 03.060 A11 National Standards of People's Republic of China GB/T 21080-2007/ISO 11131.1992 Banking and related financial services Signature-based identification of symmetric algorithms (ISO 11131.1992, Bankingandrelatedfinancialservices- Sign-onauthentication, IDT) Posted 2007-09-05 2007-12-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released

Table of Contents

Preface Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Terms, Definitions and Abbreviations 1 4 Signature Verification 3 5 protection 6 6 Interoperability Protocol Specification 6 Appendix A (informative) The limitations of the standard 13 A. 131 scope of protection provided by this standard A. 2 pairs of warning to the user 13 Limitations Appendix B (informative) technical specifications of the standard 14 GB/T 21080-2007/ISO 11131.1992

Foreword

This standard is identical with ISO 11131.1992 "Banking and related financial services signature verification" (in English). For ease of use, this standard made the following editorial changes. a) Remove ISO foreword; b) "this International Standard" be replaced by "this standard"; c) According to the current actual development of the computer industry, increasing the informative Appendix B. Appendices A and B are informative appendices. The standard proposed by the People's Bank of China. This standard by the National Standardization Technical Committee on Finance. This standard is drafted by. China Financial Computerization Corporation. Participated in the drafting of this standard. People's Bank of China, Bank of China, China Construction Bank, China Everbright Bank, China UnionPay Co. Shares Company, Beijing Venus company. The main drafters of this standard. Tan Guoan, Yang , Lushu Chun, Li Shuguang, Liu Yun, Du Ning, Liu Zhijun, Zhang Yan, Zhang Dedong, Davey, Zhang Xiaodong, Ma, Li Jian, Wang Wei, Wang Qin, Sun Weidong, Li Huan. This standard was first formulated. GB/T 21080-2007/ISO 11131.1992

Introduction

Financial institutions are increasingly using electronic communication technology to provide more timely and accurate services to its customers to meet individual customers' demand. The technology continues to strengthen customers direct access to computer applications (or log) financial institutions. Specific examples include funds Transfer and cash management services. Historically, the financial industry commonly used user (user identification name) Personal identifiers used in combination with a secret password as provide consumers direct Then access to the standard method of service provider systems. However, the effectiveness of the password system has limitations. Authenticate the user can use a variety of methods to crack passwords, for example, it can be speculated Out, he was tapped or publicly displayed. Counterfeiting and reproduction are also two possible threats. --- Counterfeiting is to steal passwords for entities by displaying imitation, counterfeiting is usually accompanied by other attacks, such as data tampering; --- Is the playback recently recorded once again demonstrated effective exchange used to produce unauthorized effect. The two sides shared common key security signature verification procedures need to achieve a large number of conditions, including the following. a) holding identification system nodes complete the hardware and software; b) maintaining the authentication information between the supplicant and the complete authorized person, such as. assign a user identifier (user name), password selection, mouth Change orders, disrupting access method, the signature failed attempts audit; c) after a successful login to keep the entire session identified during continuity; d) maintain the ability to audit failed login attempts; e) ensure the integrity and resistance to crack misuse of Key Management System; f) ensure the confidentiality of transmitted authentication information; g) to provide detection reproducing method validation of authentication information. GB/T 21080-2007/ISO 11131.1992 Banking and related financial services Signature-based identification of symmetric algorithms

1 Scope

This standard implements the introduction of conditions f) and conditions g). It specifies the entity requesting access and authorization to allow access to three entities Species Signature Verification mode. a) by personal password authentication information (PAI) to authenticate the user, such as; b) by a unique user key to authenticate the user; c) key node by node unique identification. This standard uses a symmetric (key) algorithm, and the requesting party licensors symmetric algorithms use the same key. Chapter 6 gives an agreement to meet the requirements of this standard instance can be obtained interoperability instance. Appendix A describes the present standard Some limitations exist. Appendix B describes some of the limitations of the standard specification.

2 Normative references

The following documents contain provisions which, through reference in this standard and become the standard terms. For dated references, subsequent Amendments (not including errata content) or revisions do not apply to this standard, however, encourage the parties to the agreement are based on research Whether the latest versions of these documents. For undated reference documents, the latest versions apply to this standard. GB/T 15277-1994 Information processing 64bit block cipher algorithm works (eqv ISO 8372. 1987) ISO 8730.1990 requirements for banking message authentication (wholesale) ISO 8732. 1988 Banking - Key Management (Wholesale) ISO 10126-1.1991 Banking packet encryption program (wholesale) - Part 1. General principles ISO 10126-2.1991 Banking packet encryption program (wholesale) - Part 2. DEA algorithm 3 Terms, definitions and abbreviations 3.1 Terms and Definitions The following terms and definitions apply to this standard. 3.1.1 Used to identify the key. 3.1.2 Encrypted information. 3.1.3 One key is available to authorized time period, or in a given system remain valid key for a specified period of time. 3.1.4 Ciphertext (unreadable) is converted to plain text (readable) process. GB/T 21080-2007/ISO 11131.1992
...

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 21080-2007_English be delivered?


Answer: Upon your order, we will start to translate GB/T 21080-2007_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 21080-2007_English with my colleagues?


Answer: Yes. The purchased PDF of GB/T 21080-2007_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
Refund Policy Privacy Policy Terms of Service