Browse > Article
http://dx.doi.org/10.7236/JIIBC.2020.20.4.7

A Study on the Securing Technological Safety of Mobile Electronic Notification Service in Public and Administrative Agencies  

Kim, Jong-Bae (Department of Software Engineering, Sejong Cyber University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.20, no.4, 2020 , pp. 7-16 More about this Journal
Abstract
The mobile electronic notification service delivers notifications through mobile phone text or app-based message push to solve various problems of the paper-based mail service. And it is a service that an electronic document relay company proves to prove delivery. In order for public and administrative agencies to provide mobile electronic notification service, the user's identification information of the mobile phone number or the subscribed app is required. To overcome these limitations, ICT-regulated sandbox system was used to allow collective conversion of users' resident registration numbers into connecting information (CI). Therefore, in this paper, we propose a technical method for safe management of user CI in mobile electronic notice service, identity verification of electronic notice readers, and prevention of forgery and forgery of electronic notices. Through the proposed method, it is confirmed that the service can be activated by minimizing the adverse function of the mobile electronic notification service by securing the user's convenience and technical safety for the CI.
Keywords
Mobile electronic notification service; ICT-regulated sandbox; Connection Information; Personal proofing service;
Citations & Related Records
Times Cited By KSCI : 17  (Citation Analysis)
연도 인용수 순위
1 W. M, Sim, "Issues and Alternatives on Internet Identification: Analysis on the Basis of Architectural Regulation Theory", Korean Journal of Law & Society, Vol. 47, pp. 209-237, 2014. UCI: G704-001292.2014..47.004
2 H. K, Choi, H. R. Kim, "Design and Implementation of a Malicious SMS Training System for Preventing Smishing", The Journal of KIIT., Vol. 17, No. 10, pp. 93-99, 2019. DOI: https://doi.org/10.14801/jkiit.2019.17.10.93
3 J. K. Park,,"A Study of Realtime Malware URL Detection & Prevention in Mobile Environment", Journal of the Korea Society of Computer and Information, Vol. 20, No. 6, pp. 37-42, 2015.   DOI
4 G. W, Seo, L. Y. Moon,, "A Study of Technical Countermeasure System for the Smishing Detection and Prevention Based on the Android Platform", Journal of Advanced Navigation Technology, Vol. 18, No. 6, pp. 569-575, 2014. DOI: https://doi.org/10.12673/jant.2014.18.6.569   DOI
5 S. H. Song, S. T. Kim, J. H. Shin, J. H. Lee, "Recovery Phrase Management Scheme for Public Blockchain Wallets based on OTP", The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 20, No. 1, pp. 35-44, 2020. DOI: https://doi.org/10.7236/JIIBC.2020.20.1.35   DOI
6 S. H. Kim, Y. G. Kim, "A Study on the Blockchain-based System Authentication Method", The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 20, No. 1, pp. 211-218, 2020. DOI: https://doi.org/10.7236/JIIBC.2020.20.1.211   DOI
7 S. J. Nam, S. T. Kim, J. H. Shin, "Context-Aware Mobile User Authentication Approach using LSTM networks", The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 20, No. 1, pp. 11-18, 2020. DOI: https://doi.org/10.7236/JIIBC.2020.20.1.11   DOI
8 H. I. Choi, I. U. Song, "The Mediating Effect of Self-efficacy between the Elderly's Digital Information Literacy and Life Satisfaction", Journal of the Korea Academia-Industrial cooperation Society, Vol. 21, No. 6, pp. 246-255, 2020. DOI: http://dx.doi.org/10.5762/KAIS.2020.21.6.246   DOI
9 ICT regulation sandbox, https://www.sandbox.or.kr/
10 Internet World Stats (2020.07.20.) https://internetworldstats.com/asia.htm#kr
11 J. B. Kim, "A Study on Improvement of Personal Identity Proofing Service(PIPS) Based on Alternative Methods of Resident Registration Number", Journal of The Korea Society of Digital Industry and Information Management, Vol. 15, No. 2, pp. 29-42, 2019. DOI: https://doi.org/10.17662/ksdim.2019.15.2.029   DOI
12 H. K, Lee, "The Problems and Reformation of the Personal Identification by the Resident Registration Number on the Internet", Hanyang Law Association, Vol. 23-1, No. 37, pp. 341-371, 2012. UCI: G704-001896.2012..37.005
13 J. B. Kim, "Safety Improvement Methods of Personal Identification Services using the i-Pin", Journal of Information Technology Services, Vol. 16, No 2, pp. 97-110, 2017. DOI: https://doi.org/10.9716/KITS.2017.16.2.097   DOI
14 L. D. Nhac, N. T. Trang, N.T. Hau, N. H. Nam, G. S. Choi, "Detecting smartphone user habits using sequential pattern analysis", International Journal of Internet, Broadcasting and Communication, Vol, 7, No. 1, pp. 20-22, 2015. DOI: https://doi.org/https://doi.org/10.7236/IJIBC.2015.7.1.20   DOI
15 Y. J. Shin, J. B. Kim H. Y, Han, Research on alternative means of resident number and research on improvement of certification procedure, KISA, 2015.
16 J. B. Kim, "A Study on Differentiated Personal Proofing Service Based on Analysis of Personal Identification Requirements in Online Services", Journal of the Institute of Internet, Broadcasting and Communication, Vol. 20, No. 2, pp. 201-208, 2020. DOI: https://doi.org/10.7236/JIIBC.2020.20.2.201   DOI
17 Y. J. Shin, S. H, Shin, J. S. Lee, W. K. Han, "A Study on Improvement of Identification Means in R.O.K", Journal of The Korean Association for Regional Information, Vol. 18, No. 4, pp. 59-88, 2015. DOI: https://doi.org/10.22896/karis.2015.18.4.003
18 방송통신위원회, 본인확인기관 지정 등에 관한 기준 고시, http://www.law.go.kr/행정규칙/본인확인기관지정등에관한 기준