{"id":630250,"date":"2024-11-06T00:27:44","date_gmt":"2024-11-06T00:27:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/iso-9564-42016\/"},"modified":"2024-11-06T00:27:44","modified_gmt":"2024-11-06T00:27:44","slug":"iso-9564-42016","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/iso\/iso-9564-42016\/","title":{"rendered":"ISO 9564-4:2016"},"content":{"rendered":"

ISO 9564-4:2016 provides requirements for the use of personal identification numbers (PIN) in eCommerce. The PINs in scope are the same cardholder PINs used as a means of cardholder verification in card-based financial transactions; notably, automated teller machine (ATM) systems, point-of-sale (POS) terminals, automated fuel dispensers, and vending machines.<\/p>\n

It is applicable to financial card-originated transactions requiring verification of the PIN and to those organizations responsible for implementing techniques for the management of the PIN in eCommerce.<\/p>\n

The provisions of this part of ISO 9564 are not intended to cover<\/p>\n

– passwords, passcodes, pass phrases and other shared secrets used for customer authentication in online banking, telephone banking, digital wallets, mobile payment, etc.,<\/p>\n

– management of cardholder PINs for use as a means of cardholder verification in retail banking systems in, notably, automated teller machine (ATM) systems, point-of-sale (POS) terminals, automated fuel dispensers, vending machines, banking kiosks and PIN selection\/change systems, which are covered in ISO 9564-1,<\/p>\n

– card proxies such as mobile phones or key fobs,<\/p>\n

– approved algorithms for PIN encipherment, which are covered in ISO 9564-2,<\/p>\n

– the protection of the PIN against loss or intentional misuse by the customer or authorized employees of the issuer,<\/p>\n

– privacy of non-PIN transaction data,<\/p>\n

– protection of transaction messages against alteration or substitution, e.g. an online authorization response,<\/p>\n

– protection against replay of the transaction,<\/p>\n

– functionality of devices used for PIN entry which is related to issuer functions other than PIN entry,<\/p>\n

– specific key management techniques, and<\/p>\n

– access to, and storage of, card data other than the PIN by applications such as wallets.<\/p>\n","protected":false},"excerpt":{"rendered":"

Financial services \u2014 Personal Identification Number (PIN) management and security \u2014 Part 4: Requirements for PIN handling in eCommerce for Payment Transactions<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
ISO<\/b><\/a><\/td>\n2016-03<\/td>\n22<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":630267,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[696,2634],"product_tag":[],"class_list":{"0":"post-630250","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-40","7":"product_cat-iso","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/630250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/630267"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=630250"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=630250"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=630250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}