• Title/Summary/Keyword: 결제

Search Result 1,046, Processing Time 0.026 seconds

Data Transmission System Applying An Adaptive Threshold Based Multi-channel Sound (적응적 임계치를 적용한 멀티 채널 소리 기반의 데이터 전송 시스템)

  • Gang, Hyun-Mo;Jung, Jin-Woo;Choi, Chun-Yong;Kwon, Young-Hun;Lee, Sung-Koo
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.93-99
    • /
    • 2014
  • Recently Wireless communication among short-distance devices has come to notice due to smart phone generalization recently. However, instead of setting up additional H/W, communication technology providing wireless communication based on S/W is in need due to limited availability of NFC's use. Accordingly, short-distance wireless communication technology that makes great use of mike and speaker which installed in every device draws attention. Our thesis suggests improvement of acoustic transmission speed by applying multi-channel parallel transmission and advancement of transmission rate that differed from each mike's own characteristics through optimizing adaptive threshold. The study is not only just applied in specific and limited conditions such as promoting corporation and payments system but also fast and convenient data transmit system general users-oriented.

Virtual Keypads based on Tetris with Resistance for Attack using Location Information (위치정보로 비밀정보를 유추할 수 있는 공격에 내성이 있는 테트리스 형태 기반의 보안 키패드)

  • Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.37-44
    • /
    • 2017
  • Mobile devices provide various services through payment and authentication by inputting important information such as passwords on the screen with the virtual keypads. In order to infer the password inputted by the user, the attacker captures the user's touch location information. The attacker is able to infer the password by using the location information or to obtain password information by peeping with Google Glass or Shoulder Surfing Attack. As existing secure keypads place the same letters in a set order except for few keys, considering handy input, they are vulnerable to attacks from Google Glass and Shoulder Surfing Attack. Secure keypads are able to improve security by rearranging various shapes and locations. In this paper, we propose secure keypads that generates 13 different shapes and sizes of Tetris and arranges keypads to be attached one another. Since the keypad arranges different shapes and sizes like the game, Tetris, for the virtual keypad to be different, it is difficult to infer the inputted password because of changes in size even though the attacker knows the touch location information.

방송통신사업자의 스마트미디어 전략에 대한 탐색적 연구: HTML5, 클라우드 컴퓨팅 등의 기술적 배경을 근간으로

  • Song, Min-Jeong
    • Broadcasting and Media Magazine
    • /
    • v.18 no.1
    • /
    • pp.89-104
    • /
    • 2013
  • 다양한 스마트기기 간 및 앱(Application) 간 연동을 통한 스마트미디어 생태계 환경에서 애플(Apple), 구글(Google), 마이크로소프트(Microsoft) 등 SW(Software) 기반 OS(Operating System) 플랫폼들은 개별 체제 강화를 더욱 견고히 하고 있다. 생태계 내 타(他) 구성원들은 이들에 의한 제약이 더욱 심해지자, 웹 문서의 표준화(HTML5)나 클라우드 컴퓨팅(Cloud computing) 같은 개방화된 기술들을 환영한다. 실제로 최근 웹 애플리케이션(Web application) 개발과 개발자들의 OS 플랫폼 이탈은 이러한 변화의 단면을 보여주기 시작했다. 본 고는 SW 중심에서 서비스 중심으로 이동 중인 플랫폼 경쟁 환경에서 네트워크를 보유 중인 방송통신사업자들의 새로운 스마트미디어 전략 방향을 제시하는데 그 목적을 둔다. 이를 위해 두 가지 기술적 배경인 HTML5와 클라우드 컴퓨팅 기술들을 살펴본 후, 그 동안 SW 중심 플랫폼 경쟁 환경에서 주도권을 빼앗겼다고 깨달은 방송통신사업자가 취해야 할, 두 가지 새로운 기술적 환경에서의 스마트미디어 전략을 제시하였다. 분석 결과, HTML5가 모바일 분야의 핵심 기술이 될 전망이지만, 단기적으로는 여전히 미성숙 문제가 제기될 것으로 보이며, 기존 경쟁력을 유지하려는 OS 사업자들의 가치사슬 통합 전략이 가시화되고 있는 환경이 목격된다. 또한, 클라우드 서비스 제공도 이미 이들 OS사업자들의 기존 생태계 유지를 위한 핵심 툴로 이미 활용되기 시작했다. 그럼에도 불구하고 HTML5와 클라우드 컴퓨팅은 방송통신사업자들에게 생태계 주도권을 탈환할 수 있는 중요한 기술로 인식되고 있다. 따라서 본 연구에서는 이를 기반으로 세 가지 이용자 경험인 '경계 없는', '동질적인', '끊김 없는' 이용자 경험(User Experience) 제공을 위해 노력하는 선도적인 사례 탐색이 시도되었으며, 이를 통해 방송통신사업자들의 미래 스마트미디어 전략 방향이 도출되었다. '경계 없는' 서비스에서는 구글, 애플 외의 멀티OS 전략과 기존 OS의 앱 서비스 대항마인 아마존(Amazon), 페이스북(Facebook) 등과의 적극적 서비스 제휴, '동질적인' 서비스에서는 클라우드 기반 주요 콘텐츠 플랫폼 제휴와 방송통신 가입자 기반의 All-IP기반으로의 확대, 마지막으로 '끊김 없는' 서비스에서는 SNS, LBS, 가상현실 등과의 매쉬업(Mash-up)과 의료, 금융 등과의 융합서비스 개발을 통한 스마트홈 전략 추진, 인증 및 결제시스템의 개방화 등이 제시되었다.

A Study on Unconsciousness Authentication Technique Using Machine Learning in Online Easy Payment Service (온라인 간편 결제 환경에서 기계학습을 이용한 무자각 인증 기술 연구)

  • Ryu, Gwonsang;Seo, Changho;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1419-1429
    • /
    • 2017
  • Recently, environment based authentication technique had proposed reinforced authentication, which generating statistical model per user after user login history classifies into account takeover or legitimate login. But reinforced authentication is likely to be attacked if user was not attacked in past. To improve this problem in this paper, we propose unconsciousness authentication technique that generates 2-Class user model, which trains user's environmental information and others' one using machine learning algorithms. To evaluate performance of proposed technique, we performed evasion attacks: non-knowledge attacker that does not know any information about user, and sophisticated attacker that only knows one information about user. Experimental results against non-knowledge attacker show that precision and recall of Class 0 were measured as 1.0 and 0.998 respectively, and experimental results against sophisticated attacker show that precision and recall of Class 0 were measured as 0.948 and 0.998 respectively.

A Study on Security Requirements of Electric Vehicle Charging Infrastructure Using Threat Modeling (위협모델링을 이용한 전기차 충전 인프라의 보안요구사항에 대한 연구)

  • Cha, Ye-Seul;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1441-1455
    • /
    • 2017
  • In order to build a secure electric vehicle charging infrastructure, security research is required because various data including charging and payment data are transmitted in the electric vehicle charging infrastructure. However, previous researches have focused on smart grid related security research such as power system infrastructure rather than charging infrastructure for electric vehicle charging. In addition, research on charging infrastructure is still lacking, and research using a systematic methodology such as threat modeling is not yet under way. Therefore, it is necessary to apply threat modeling to identify security threats and systematically analyze security requirements to build a secure electric vehicle charging infrastructure. In this paper, we analyze the electric vehicle charging infrastructure by accurately identifying possible threats and deriving objective security requirements using threat modeling including Data Flow Diagram, STRIDE, and Attack Tree.

Implementation of Data Integrity Module in Wireless Internet Terminal for Mobile Customer Relationship Management(m-CRM) (m-CRM을 위한 무선인터넷단말기의 데이터무결성 모듈의 구현)

  • Park, Hyun-Cheol;Kim, Dong-Gyu
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.485-494
    • /
    • 2004
  • Recently, the wireless internet terminals like mobile phones or PDAs prevail in the management of customers. With such terminals, businessmen can get business data and information of customers in real time, in connection with mobile group wares. By the wireless terminals, customers can conveniently get information of goods, search purchase sites, and give orders and do settlement. This paper aims to present the safe data integrity modules of the wireless internet terminal, for service providing correct real-time promotion information, by using users' disposition, situation, Purchase information. This study aims to suggest an implementation methodology of security module for data integrity of mobile internet terminal. This is based on the WTLS of WAP Protocol. This security module is expected to achieve central role in conversion of wireless internet environment and emphasis of encryption technology and safe and calculable wireless communication environment construction

Preparation of Castable Refractories by Recycling of Aluminum Dross (알루미늄드로스를 재활용한 캐스타블내화물 제조)

  • Park Hyungkyu;Lee Hooin;Lee Jinyoung
    • Resources Recycling
    • /
    • v.12 no.3
    • /
    • pp.46-53
    • /
    • 2003
  • Recycling of aluminum dross is an important issue in the secondary aluminum industries. In this study, aluminum dross generated in the domestic secondary aluminum industry was processed to use it as raw material for producing alumina refractories. Sample dross was classified according to its size. The dross smaller than 1 mm was leached with sodium hydroxide solution to extract the remained aluminum from the dross into the solution. and then aluminum hydroxide precipitate was recovered from the leach liquor. The waste residue in the leaching was washed, dried and roasted. Most remained metallic components in the residue was changed into oxide through the processes. The roasted dross was made into alumina castable refractories by mixing with aggregates and a binder. Bending strength of the tested castable specimen was over $25\;kg/\textrm{m}^2$ and compressive strength over $80\;kg/\textrm{cm}^2$, which satisfied the Korean Standard value respectively. From the results, it was suggested that this process could be applicable to recycling of aluminum dross.

Reclamation of Furan Sand and Its Effect on the Cast (후란 주물사의 재생 및 그의 주물에 미치는 영향)

  • 백고길;최양진;황교현
    • Resources Recycling
    • /
    • v.5 no.1
    • /
    • pp.21-28
    • /
    • 1996
  • Burmng method tn Bnidi-ied beds 101 the effectlvr reclamation of Sunn fi,uadry sand war u~ed lather tl~an rncchan1c;ll or p~~cumatiace thodq. which are co~nmonlyu scd in foundry factoricr in Kojcu In olrlcr to rcrnuvc hlc;~ns and ha~doersi ~nm foundry sand sndaces in the fluidized bcd, the lnnsl sffccuve lcmpemture mge was h00-70W. Sulbcr slab~l~liyn dca and comliresslvc streugtli oL rccla~mcd sand recyclcd by the burning luctllod wcre lalgcr dao those of rcclalmcd a n d by lllc pncumatlc mctllod. Tile energy cost IOIt he bummy mctliod was cstimalcd al SlZ0011'on oi llie iccl;~~rncds md. The coql l~ductlon in pul.chasing nzw s;od as well as the prevenllon or cnv~conmcnl.il contamlnallnn could hc hmefitcrl hy usl~lg Ihc rec1;~rnnl~oonf liisndry siod ~ecycledb y the method rleieloped in thls sludy

  • PDF

THYMOMA -A Review of Fourteen Patients- (흉선종 - 14명에 대한 치료 효과 -)

  • Kim S. K.;Lee H. S.;Cho K. H.;Suh C. O.;Kim G. E.
    • Radiation Oncology Journal
    • /
    • v.3 no.1
    • /
    • pp.29-33
    • /
    • 1985
  • 흉선종은 비교적 드문 종양으로 알려져 있다. 예후를 알 수 있는 가장 중요한 인자는 수술시 육안적인 종양의 침윤정도이며, 치료는 수술에 의한 종양의 제거가 무엇보다 중요하고, 방사선 치료 역시 수출 후 국소적 계발의 방지를 위해 쓰이고 있다. 근치적 목적의 방사선 치료도 수술이 어려운 경우에 시행되고 있는 형편이다. 저자들은 1977년 1월부터 1984년 12월까지 세브란스병원 연세암센타 치료방사선과에서 흉선종 진단받고 치료한 14명의 환자를 후향성 분석에 의해 다음과 같은 결과를 얻었다. 1. 6명의 환자$(14\%)$가 근무력증을 나타냈다. 2. 주변조직의 침윤이 $86\%(12/14)$에서 관찰되었다. 3. $43\%$에서 육안적 완전 절제를 시행하였고 $14\%$에서 부분결제, 그리고 $43\%$에서는 생검만 시행 하였다. 4. 수술 후 혹은 근치적 목적의 방사선치료는 8명의 환자에서 시행하였으며 그중 현재 5명은 생존(4년, 2.8년, 1.6년, 1.4년, 1.3년), 3명은 사망(1년, 0.6년, 0.6년)하였다. 5. 방사선 치료선량은 대체료 $4,000\~4,500rad(1950\~7,000rad)$를 전후 흉곽 부위에 외부 조사하였다.

  • PDF

The Study on the Motivation of Cruise Tourist and the Use Intention of Ubiquitous Service based upon ICT (크루즈 관광객의 동기와 ICT 기반 유비쿼터스 서비스 이용의도에 관한 연구)

  • Park, Hyun-Jee;Park, Joong-Hwan;Kim, Jung-In;Lee, Joung-Sil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4251-4259
    • /
    • 2010
  • This study investigates the needs of cruise tourists for building customer oriented ubiquitous tourism services. Through the field survey, the relationship between cruise tourism motivations and ubiquitous cruise services were analyzed. In this study, cruise tourism motivations mean destination attraction, family friendship, socialization, education/novelty and escape from daily routine. And ubiquitous cruise services are consists of boarding service, security service, safety service, customization service, and payment services. The results are as follows; cruise tourists with more socialization motivation get more use intention of ubiquitous payment service; cruise tourists with more destination attraction have more use intention of ubiquitous customization service.