Select Page

Standards Under Public Review

The following standards are currently open under ANSI’s public review period. Please check back regularly as items are constantly updated.

The following Public Review announcement will appear as shown below in ANSI Standards Action 2/6/2026

Comment Deadline: March 23, 2026

X9.112-202x, Wireless Management and Security Part 1: General Requirements —Part 2: ATM and POS Requirements — Wireless Equipment (revision, redesignation and consolidation of ANSI X9.112-1-2016 and ANSI X9.112-2-2020)

Risks in wireless networks are equal to the sum of the risk of operating any network, plus the new risks introduced by weaknesses in wireless equipment and wireless protocols. This X9 standard identifies relevant risks, discussed as threats and vulnerabilities, which includes but are not limited to those identified in associated NIST documents addressing wireless network security. This X9 standard also defines relevant requirements and recommendations for the financial services industry. Areas considered within the scope of this X9 standard include the following topics.

• General wireless security requirements and recommendations

• ATM wireless security requirements and recommendations

• POS wireless security requirements and recommendations

• Other wireless equipment, such as self-checkout terminals, cash dispensers, service kiosks, scales, scanners, handheld terminals, etc. used within the financial services industry
Single copy price: $100.00

X9.24-4-202x, Retail Financial Services Symmetric Key Management Part 4 : Stateless Host-to-Host Unique Key Per Transaction (new standard)

The scope of the standard is to provide an automated method for the management of Symmetric Keys between hosts on a per-transaction basis. These hosts may be between two separate entities or between two systems within an organization. This part of the standard describes the Stateless Host-to-Host Unique Key Per Transaction (SHH-UKPT) algorithm, which is used to derive keys to be used between two hosts. Derived transaction keys can be used for a variety of functions, such as encryption of PINs, data or other keys, for derivation of other keys, for message authentication, etc. SHH-UKPT supports the derivation of AES-128 and AES-256 keys.
Single copy price: $100.00

Questions? Complete the form below to submit questions or comments about the standards listed above.

Public Review Contact Form (#32)