Table of Contents
Introduction
1Methodsofvalidation
2Fullvalidationprocedures
2.1Validationinformationflow
2.2Authorizationrequest
2.3Requestresponse
2.4Calldisposition(optional)
3Limitedvalidationprocedures
3.1Typesoflimitedvalidationprocedures
3.2Locationofpersonalidentifyinginformation
AnnexASecurityduringvalidationoveranX.25network
A.2Recommendations
A.3Validationsecurityprocedures Abstract
Specifies validation procedures for processing between Administrations. Does not define any equipment, facilities and data transmission techniques.