2025-12-5 216.73.216.21
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/JR/T 0068-2012
JR/T 0068-2012   General Specification for Information Security of On-line Banking System (English Version)
Standard No.: JR/T 0068-2012 Status:superseded remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 25000 words Translation Price(USD):620.0 remind me the price change

Email:

Implemented on:2012-5-8 Delivery: via email in 1 business day

→ → →

,2020-2-5,2012-5-8,141138181901229E21CD6803CE535
Standard No.: JR/T 0068-2012
English Name: General Specification for Information Security of On-line Banking System
Chinese Name: 网上银行系统信息安全通用规范
Professional Classification: JR    Professional Standard - Finance
Source Content Issued by: China People's Bank
Issued on: 2012-5-8
Implemented on: 2012-5-8
Status: superseded
Superseded by:JR/T 0068-2020 General specification of information security for internet banking system
Superseded on:2020-2-5
Target Language: English
File Format: PDF
Word Count: 25000 words
Translation Price(USD): 620.0
Delivery: via email in 1 business day
1 Scope This specification gives the description of Internet banking system, security specification, security management specification and business operation security specification. It is applicable to regulating the building, operation and assessment for Internet banking systems. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 25069 Information security technology—Glossary 3 Terms and definitions For the purposes of this document, the terms and definitions established in GB/T 25069 and the following apply. 3.1 Internet banking enabling customers of a commercial bank or other financial institutions to conduct online financial transactions through Internet, mobile communication network and other open public network or private network infrastructure 3.2 Internet Internet or other similar form of general-purpose public computer communication network 3.3 sensitive information mainly referring to information such as passwords, keys and sensitive transaction data that affect the security of Internet banking. Passwords include but are not limited to transfer passwords, inquiry passwords, login passwords, PIN of certificates, etc. Keys include but are not limited to those used to ensure communication security, message integrity, etc. Sensitive transaction data include but are not limited to complete track information, validity period, CVN, CVN2, certificate number, etc. 3.4 client program program that enables Internet banking customers to conduct human-machine interaction, and component that provides necessary functions, including but not limited to executables, controls, static link libraries and dynamic link libraries, excluding IE and other Generic Browsers 3.5 USB Key hardware equipment with a USB interface. It has built-in single-chip or smart card chip, which has a certain storage space to store the user's private key and digital certificate. 3.6 USB Key firmware built-in program code in USB Key that affects the security of USB Key 3.7 mobile terminal specifically referring to mobile equipment such as mobile phones and tablet computers, different from the traditional PC mode, that access Internet banking through communication networks 3.8 strong encryption general term used to describe an encryption algorithm that is considered highly resistant to cryptanalysis. The robustness of encryption depends on the cryptographic key used. The effective length of the key shall not be less than the minimum key length required for comparable strength recommendations
Foreword i Introduction ii 1 Scope 2 Normative references 3 Terms and definitions 4 Symbols and abbreviations 5 General 6 Security specification Annex A (Informative) Reference map for basic network protection architecture Annex B (Informative) Reference map for enhanced network protection architecture Annex C (Normative) Physical security Bibliography
Referred in JR/T 0068-2012:
*GB/T 14394-2008 Computer software reliability and maintainability management
*GB/T 18336.1-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model
*GB/T 18336.2-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements
*GB/T 18336.3-2008 Information Technology - Security Techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements
*GBT20983-2008
*GB/T 20984-2007 Information security technology-Risk assessment specification for information security
*GB/T 22080-2008 Information technology - Security techniques - Information security management systems - Requirments
*GB/T 22081-2008 Information technology—Security techniques—Code of practice for information security management
*GB/T 22239-2008 Ionformation secuiryt technology - Baseline for classified protection of information system security
Code of China
Standard
JR/T 0068-2012  General Specification for Information Security of On-line Banking System (English Version)
Standard No.JR/T 0068-2012
Statussuperseded
LanguageEnglish
File FormatPDF
Word Count25000 words
Price(USD)620.0
Implemented on2012-5-8
Deliveryvia email in 1 business day
Detail of JR/T 0068-2012
Standard No.
JR/T 0068-2012
English Name
General Specification for Information Security of On-line Banking System
Chinese Name
网上银行系统信息安全通用规范
Chinese Classification
Professional Classification
JR
ICS Classification
Issued by
China People's Bank
Issued on
2012-5-8
Implemented on
2012-5-8
Status
superseded
Superseded by
JR/T 0068-2020 General specification of information security for internet banking system
Superseded on
2020-2-5
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
25000 words
Price(USD)
620.0
Keywords
JR/T 0068-2012, JR 0068-2012, JRT 0068-2012, JR/T0068-2012, JR/T 0068, JR/T0068, JR0068-2012, JR 0068, JR0068, JRT0068-2012, JRT 0068, JRT0068
Introduction of JR/T 0068-2012
1 Scope This specification gives the description of Internet banking system, security specification, security management specification and business operation security specification. It is applicable to regulating the building, operation and assessment for Internet banking systems. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 25069 Information security technology—Glossary 3 Terms and definitions For the purposes of this document, the terms and definitions established in GB/T 25069 and the following apply. 3.1 Internet banking enabling customers of a commercial bank or other financial institutions to conduct online financial transactions through Internet, mobile communication network and other open public network or private network infrastructure 3.2 Internet Internet or other similar form of general-purpose public computer communication network 3.3 sensitive information mainly referring to information such as passwords, keys and sensitive transaction data that affect the security of Internet banking. Passwords include but are not limited to transfer passwords, inquiry passwords, login passwords, PIN of certificates, etc. Keys include but are not limited to those used to ensure communication security, message integrity, etc. Sensitive transaction data include but are not limited to complete track information, validity period, CVN, CVN2, certificate number, etc. 3.4 client program program that enables Internet banking customers to conduct human-machine interaction, and component that provides necessary functions, including but not limited to executables, controls, static link libraries and dynamic link libraries, excluding IE and other Generic Browsers 3.5 USB Key hardware equipment with a USB interface. It has built-in single-chip or smart card chip, which has a certain storage space to store the user's private key and digital certificate. 3.6 USB Key firmware built-in program code in USB Key that affects the security of USB Key 3.7 mobile terminal specifically referring to mobile equipment such as mobile phones and tablet computers, different from the traditional PC mode, that access Internet banking through communication networks 3.8 strong encryption general term used to describe an encryption algorithm that is considered highly resistant to cryptanalysis. The robustness of encryption depends on the cryptographic key used. The effective length of the key shall not be less than the minimum key length required for comparable strength recommendations
Contents of JR/T 0068-2012
Foreword i Introduction ii 1 Scope 2 Normative references 3 Terms and definitions 4 Symbols and abbreviations 5 General 6 Security specification Annex A (Informative) Reference map for basic network protection architecture Annex B (Informative) Reference map for enhanced network protection architecture Annex C (Normative) Physical security Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
JR/T 0068-2012, JR 0068-2012, JRT 0068-2012, JR/T0068-2012, JR/T 0068, JR/T0068, JR0068-2012, JR 0068, JR0068, JRT0068-2012, JRT 0068, JRT0068