ANSI ASC X9 X9.119-2017 Retail Financial Services - Requirements for Protection of Sensitive Payment Card Data - Part 2 Implementing Post-Authorization Tokenization Systems.pdf
《ANSI ASC X9 X9.119-2017 Retail Financial Services - Requirements for Protection of Sensitive Payment Card Data - Part 2 Implementing Post-Authorization Tokenization Systems.pdf》由会员分享,可在线阅读,更多相关《ANSI ASC X9 X9.119-2017 Retail Financial Services - Requirements for Protection of Sensitive Payment Card Data - Part 2 Implementing Post-Authorization Tokenization Systems.pdf(64页珍藏版)》请在麦多课文档分享上搜索。
1、 American National Standard for Financial Services ANSI X9.119-2017 Retail Financial Services - Requirements for Protection of Sensitive Payment Card Data - Part 2: Implementing Post-Authorization Tokenization Systems Accredited Standards Committee X9, Incorporated Financial Industry Standards Date
2、Approved: August 3, 2017 American National Standards Institute American National Standards, Technical Reports and Guides developed through the Accredited Standards Committee X9, Inc., are copyrighted. Copying these documents for personal or commercial use outside X9 membership agreements is prohibit
3、ed without express written permission of the Accredited Standards Committee X9, Inc. For additional information please contact ASC X9, Inc., 275 West Street, Suite 107, Annapolis, MD 21401. ASC X9, Inc. 2017 All rights reserved 1 This page left intentionally blank ANSI X9.119-2-2017 ASC X9, Inc. 201
4、7 All rights reserved v Contents Page Foreword . vii Introduction viii 1 Scope . 1 1.1 General . 1 1.2 Application . 2 2 Normative references . 2 3 Terms and definitions 3 4 Symbols and abbreviated terms . 7 5 Sensitive Payment Card Data Elements 7 6 Tokens, their Attributes and Utility 8 6.1 Token
5、Attributes 8 6.2 Token Utility . 10 7 Tokenization Systems, Components and Security Requirements . 10 7.1 The Tokenization System Model 10 7.2 Risk Vectors for Tokenization Systems 14 7.2.1 Risk Vector 1: Tokenization Secret Data Controls . 14 7.2.2 Risk Vector 2: Random Mapping Controls . 15 7.2.3
6、Risk Vector 3: Access Control Rules 15 7.2.4 Risk Vector 4: Control Tokenization Isolation 16 7.2.5 Risk Vector 5: Control the Confidentiality and Integrity of Data Between the TRI and the Tokenization Service . 20 7.2.6 Risk Vector 6: Maintenance of Overall System Health via Auditing, Logging and M
7、onitoring 21 7.3 Data Element-Specific Requirements . 22 7.3.1 Cardholder Name . 22 7.3.2 Primary Account Number (PAN) . 22 7.3.3 Discretionary Track Data . 22 8 Schema for Identification and Referencing of Tokenization Methods . 23 Annex A (Normative) Abstract Schema . 24 A.1 General 24 A.2 Tokeniz
8、ation schema specification 24 A.3 Normative References of Annex A 25 Annex B (Normative) Acceptable Tokenization Techniques . 26 B.1 General 26 B.2 Tokenization Schemes . 27 B.2.1 On Demand Random Assignment (ODRA) . 27 B.2.2 Encryption-based Tokenization Scheme 28 B.2.3 Message Authentication Code-
9、based Tokenization Scheme . 30 B.2.4 Static Table-driven (STD) Tokenization Scheme 32 B.3 Minimum Security Level 34 B.4 Requirements for Random Generation 34 B.5 Requirements for the protection of the Tokenization Secret . 34 B.6 Collision Resistance / Avoidance . 34 B.7 Token Domain . 35 ANSI X9.11
10、9-2-2017 vi ASC X9, Inc. 2017 All rights reserved B.8 Hash Based Tokenization 35 B.9 Informative References of Annex B 35 Annex C (Informative) Static Table-driven Tokenization Reference Schemes 36 C.1 General .36 C.2 Direct-Lookup Table .37 C.2.1 General 37 C.2.2 Security of the Direct-Lookup Table
11、 scheme .37 C.2.3 Security Analysis of the Direct Lookup Table scheme 38 C.3 Feistel Network-based Tokenization Scheme 39 C.3.1 General 39 C.3.2 Feistel Security 40 C.3.3 Feistel based STD Reference Round Functions .41 C.4 Informative References for Annex C 43 Annex D (Informative) Token Use-cases a
12、nd Guidance.45 D.1 Other Token and Tokenization terminology 45 D.2 Securing the PAN from Point-of-sale to Settlement 46 List of Figures Figure 1: The Tokenization System 11 Figure 2: Risk Vectors for Tokenization Systems .14 Figure 3: Common Tokenization Architecture .47 Figure 4: Workflow around to
13、kenization at the Acquirer48 Figure 5: Workflow around tokenization at the Merchant 51 ANSI X9.119-2-2017 ASC X9, Inc. 2017 All rights reserved vii Foreword Approval of an American National Standard requires verification by ANSI that the requirements for due process, consensus, and other criteria fo
14、r approval have been met by the standards developer. Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a simple majority, but not neces
15、sarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort be made toward their resolution. The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether it has approved the standard
16、s or not from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standards. The American National Standards Institute does not develop standards and will in no circumstances give an interpretation of any American National Standard. Moreover, no pe
17、rson shall have the right or authority to issue an interpretation of an American National Standard in the name of the American National Standards Institute. Requests for interpretation should be addressed to the secretariat or sponsor whose name appears on the title page of this Standard. CAUTION NO
18、TICE: This American National Standard may be revised or withdrawn at any time. The procedures of the American National Standards Institute require that action be taken to reaffirm, revise, or withdraw this Standard no later than five years from the date of approval. Published by Accredited Standards
19、 Committee X9, Incorporated Financial Industry Standards 275 West Street, Suite 107 Annapolis, MD 21401 USA X9 Online http:/www.x9.org Copyright 2017 ASC X9, Inc. All rights reserved. No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without p
20、rior written permission of the publisher. Published in the United States of America. ANSI X9.119-2-2017 viii ASC X9, Inc. 2017 All rights reserved Introduction Suggestions for the improvement or revision of this Standard should be sent to the X9 Committee Secretariat, Accredited Standards Committee
21、X9, Inc., Financial Industry Standards, 275 West Street, Suite 107, Annapolis, MD 21401 USA. This Standard was processed and approved for submission to ANSI by the Accredited Standards Committee on Financial Services, X9 Inc. Committee approval of the Standard does not necessarily imply that all the
22、 committee members voted for its approval. At the time this Standard was approved, the X9 committee had the following members: Roy DeCicco, X9 Chairman Angela Hendershott, X9 Vice-Chairman Steve Stevens, Executive Director Janet Busch, Program Manager Organization Represented Representative ACI Worl
23、dwide Doug Grote American Bankers Association Diane Poole American Express Company David Moore Bank of America . Daniel Welch Bank of New York Mellon Arthur Sutton Blackhawk Network Anthony Redondo Bloomberg LP . Corby Dear Capital One Marie LaQuerre Citigroup, Inc. Karla McKenna CLS Bank . Ram Koma
24、rraju Conexxus, Inc. Gray Taylor CUSIP Service Bureau . Gerard Faulkner Delap LLP .Andrea Beatty Delap LLP . Darlene Kargel Deluxe Corporation . Angela Hendershott Diebold Nixdorf Bruce Chapa Discover Financial Services Michelle Zhang eCurrency David Wen Federal Reserve Bank . Mary Hughes First Data
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIASCX9X91192017RETAILFINANCIALSERVICESREQUIREMENTSFORPROTECTIONOFSENSITIVEPAYMENTCARDDATAPART2IMPLEMENTINGPOSTAUTHORIZATIONTOKENIZATIONSYSTEMSPDF

链接地址:http://www.mydoc123.com/p-431339.html