ANSI ASC X9 X9.95-2005 Trusted Time Stamp Management and Security.pdf
《ANSI ASC X9 X9.95-2005 Trusted Time Stamp Management and Security.pdf》由会员分享,可在线阅读,更多相关《ANSI ASC X9 X9.95-2005 Trusted Time Stamp Management and Security.pdf(143页珍藏版)》请在麦多课文档分享上搜索。
1、American National Standard for Financial Services ANSI X9.95-2005 Trusted Time Stamp Management and Security Accredited Standards Committee X9, Incorporated Financial Industry Standards Approved: June 28, 2005 American National Standards Institute ANS X9.95-2005 2005 ASC X9, Inc. iForeword Approval
2、of an American National Standard requires verification by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has b
3、een reached by directly and materially affected interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort be made toward their resolution. The use of American Nat
4、ional Standards is completely voluntary; their existence does not in any respect preclude anyone, whether he has approved the standards or not, from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standards. The American National Standards Inst
5、itute does not develop standards and will in no circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American National Standard in the name of the American National Standards Institute. Requests
6、 for interpretations should be addressed to the secretariat or sponsor whose name appears on the title page of this standard. CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The procedures of the American National Standards Institute require that action be ta
7、ken to reaffirm, revise, or withdraw this standard no later than five years from the date of approval. Published by: Accredited Standards Committee X9, Incorporated Financial Industry Standards P. O. Box 4035 Annapolis, MD 21403 http:/x9.org/ Copyright 2003-2005 by Accredited Standards Committee X9,
8、 Incorporated All rights reserved. No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without prior written permission of the publisher. Printed in the United States of America ANS X9.95-2005 2005 ASC X9, Inc. iiContents Foreword. i Introductio
9、n . vi 1 Scope1 2 Normative References1 3 Terms and Definitions.3 4 Symbols and Abbreviated Terms6 5 Time Stamp Framework .7 5.1 Time Stamp Architecture7 5.2 Time Stamp Applications .8 5.3 Non-Repudiation Considerations Relating to Time Stamp Tokens .12 6 Trusted Time Stamp Requirements13 6.1 Genera
10、l Requirements.13 6.2 Requirements for Time Source Entity (TSE)13 6.3 Requirements for TSA14 6.3.1 TSA TST Requirements.14 6.3.2 TSA Renewal Requirements15 6.4 Requirements for TST Requestor16 6.4.1 Requestor TST Requirements .16 6.4.2 Requestor Renewal Requirements16 6.5 Requirements for TST Verifi
11、er .16 6.5.1 Verifier TST Requirements.16 6.5.2 Verifier Renewal Requirements .17 7 Time Stamp Objects .17 7.1 Time Calibration Report (TCR) 17 7.1.1 TCR Objects.17 7.1.2 TCR ASN.1 18 7.1.3 TCR XML .19 7.2 Time Stamp Request .20 7.2.1 Time Stamp Request Object20 7.2.2 Time Stamp Request ASN.120 7.2.
12、3 Time Stamp Request XML.21 7.3 Time Stamp Response.22 7.3.1 Time Stamp Response Object .22 7.3.2 Time Stamp Response ASN.1 .22 7.3.3 Time Stamp Response XML 24 7.4 Time Stamp Token.24 7.5 Time Stamp Info.25 7.5.1 Time Stamp Info Object .25 7.5.2 Time Stamp Info ASN.1 .26 7.5.3 Time Stamp Info XML 2
13、8 7.6 Extensions28 7.6.1 Hash Extension28 7.6.2 Method Extension 29 7.6.3 Renewal Extension 29 7.7 Verification Request.29 7.7.1 Verification Request Object .30 7.7.2 Verification Request ASN.1 .30 7.7.3 Verification Request XML.30 7.8 Verification Response 30 ANS X9.95-2005 2005 ASC X9, Inc. iii7.8
14、.1 Verification Response Object.30 7.8.2 Verification Response ASN.1.31 7.8.3 Verification Response XML31 7.9 Logging 32 8 Time Stamp Methods32 8.1 Digital Signature Method32 8.1.1 General 32 8.1.2 Time Stamp Request .33 8.1.3 Time Stamp Token Generation33 8.1.4 Time Stamp Token Verification38 8.2 M
15、AC Method 39 8.2.1 General 39 8.2.2 Time Stamp Token Request 39 8.2.3 Time Stamp Token Generation39 8.2.4 Time Stamp Token Verification42 8.3 Linked Token Method.42 8.3.1 General 42 8.3.2 Time Stamp Token Request 43 8.3.3 Time Stamp Token Generation43 8.3.4 Time Stamp Token Verification50 8.4 Linked
16、 and Signed Method 50 8.4.1 General 50 8.4.2 Time Stamp Token Request 51 8.4.3 Time Stamp Token Generation51 8.4.4 Time Stamp Token Verification52 8.5 Transient Key Method52 8.5.1 General 52 8.5.2 Time Stamp Request .55 8.5.3 Time Stamp Token Generation55 8.5.4 Time Stamp Token Verification62 9 Time
17、 Stamp Message Flows 62 9.1 General 62 9.2 Time Calibration Messages .62 9.3 Time Stamp Acquisition Messages65 9.3.1 Time Stamp Token Request 65 9.3.2 Time Stamp Token Response .68 9.4 Time Stamp Verification Messages .69 9.4.1 Time Stamp Token Verification69 9.4.2 Time Stamp Token Verification Requ
18、est .69 9.4.3 Time Stamp Token Verification Response.70 Annex A: (Normative) ASN.1 Modules A-1 A.1 TrustedTimeStamp ASN.1 Module A-1 A.2 TransientKey ASN.1 Module A-8 Annex B: (Normative) TS Control Objectives B-1 B.1 Overview B-1 B.2 Environmental Controls B-2 B.2.1 Security Policy B-2 B.2.2 Securi
19、ty Organization. B-4 B.2.3 Asset Classification and Management. B-5 B.2.4 Personnel Security. B-5 B.2.5 Physical and Environmental Security. B-6 B.2.6 Operations Management B-8 B.2.7 System Access Management B-10 B.2.8 Systems Development and Maintenance B-12 ANS X9.95-2005 2005 ASC X9, Inc. ivB.2.9
20、 Business Continuity Management . B-14 B.2.10 Monitoring and Compliance. B-15 B.2.11 Event Journaling B-16 B.3 Key Management Controls B-19 B.3.1 Key Generation B-19 B.3.2 Key Storage, Backup and Recovery B-20 B.3.3 Key Distribution B-21 B.3.4 Key Usage B-21 B.3.5 Key Destruction and Archival. B-22
21、B.3.6 Cryptographic Device Controls B-23 B.4 Time Management Controls. B-25 B.4.1 Time Calibration. B-26 B.4.2 Time Stamp Token Request B-26 B.4.3 Time Stamp Token Response . B-27 B.4.4 Time Stamp Token Handling . B-28 B.4.5 Time Stamp Token Verification B-28 Annex C: (Informative) TS Policy and TS
22、Practice Statement C-1 C.1 Overview C-1 C.2 Time Stamp Policy (TSP). C-1 C.2.1 Environmental Policies. C-1 C.2.2 Key Management Policies . C-3 C.2.3 Time Management Policies C-4 C.3 Time Stamp Practice Statement (TSPS) . C-5 C.3.1 Environmental Practice Statements. C-5 C.3.2 Key Management Practice
23、Statements C-8 C.3.3 Time Management Practice Statements C-11 Annex D: (Informative) OASIS DSS TC Time Stamp Protocols D-1 D.1 OASIS DSS TC Time Stamp Protocols . D-1 D.2 Time Stamp Request . D-1 D.3 Time Stamp Verify Protocol . D-2 D.4 OASIS DSS TC Time Stamp Token D-2 D.4.1 XML Structure .D-2 D.5
24、References. D-3 Annex E: (Informative) Algorithms E-1 E.1 Linear Chain Linking E-1 E.2 Merkle Tree Aggregation E-2 E.3 Publishing Algorithms. E-5 Bibliography . Bb-1 ANS X9.95-2005 2005 ASC X9, Inc. vFigures Figure 1 - Time Stamp Entities .7 Figure 2 - TST Request on Digital Data8 Figure 3 - TST Res
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIASCX9X9952005TRUSTEDTIMESTAMPMANAGEMENTANDSECURITYPDF

链接地址:http://www.mydoc123.com/p-431362.html