• Title/Summary/Keyword: 사기거래

Search Result 89, Processing Time 0.025 seconds

Real Estate Transaction System in Private Blockchain Environment (프라이빗 블록체인 환경에서의 부동산 거래 시스템)

  • Kim, Seugh-Ho;Kang, Hyeok;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.11-16
    • /
    • 2022
  • Efforts to incorporate blockchain into various fields are continuing as cryptocurrency transactions become more active. Blockchain has the characteristic that once recorded facts cannot be modified or deleted. Due to these characteristics, the use in the field of recording and proving certain facts, such as voting or proof of ownership, is attracting attention. In this paper, users who want to participate in the transaction process using private blockchain, one of the types of blockchain, are divided into real estate brokers, building owners, and purchasers (lessors), and roles are assigned to each user. In addition, we would like to propose a system to increase reliability through the participation of institutions. Through this, we intend to not only present a real estate transaction system that prevents damage from real estate fraud related to false sales and fraudulent contracts, but also enhances reliability and contributes to finding ways to utilize blockchain in the future.

Ethereum Mining and a Plan of Practical Use (이더리움 채굴 및 활용 방안)

  • Choi, Hyo Hyun;Yoon, Do Jin;Lee, Jong Yoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.211-212
    • /
    • 2016
  • 본 논문에서는 가상화폐이자 전자 거래의 신뢰성 있는 계약을 보장해 줄 수 있는 이더리움 (Ethereum)의 채굴 과정을 소개하고 향후 활용 방안을 제안한다. 이더리움의 거래 내역은 블록체인 (BlockChain)에 저장이 되며, 반영구적으로 삭제가 불가능하다. 이로써 전자상거래의 최대 단점인 사기 거래가 사전에 방지가 되고, 안전하고 깨끗한 거래가 성사될 수 있도록 하는 것이 목표이다. 이더리움 채굴을 위해서는 비디오카드의 GPU (Graphics Processing Unit)를 이용하였으며, 지갑 생성, 비디오카드 드라이버 설치, pool 서버 가입, 채굴 소프트웨어 설치 및 GPU 오버클럭킹 등의 과정을 수행하였다.

  • PDF

A Study on the Internet Escrow Service for Electronic Commerce (전자상거래를 위한 에스크로 서비스에 관한 연구)

  • Kim, Jeong-Gon;Kim, Shin-Kon;Jin, B.W.;Hahn, Y.S.
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.11a
    • /
    • pp.342-349
    • /
    • 2002
  • 세계 인터넷 사용 인구가 급증함에 따라 인터넷을 이용한 여러 형태의 전자상거래가 두드러지게 증가하고 있다. 이와 함께 인터넷을 통한 거래가 증가할수록 온라인 거래의 익명성과 비대면성을 이용한 여러 형태의 범죄 및 피해가 증가하고 있는 추세이다. 인터넷 전자상거래의 신뢰성의 문제를 극복하고 여러 가지 사기, 범죄로부터 소비자와 판매자를 보호하는 해결방안의 하나로서 인터넷 에스크로 서비스(Internet Escrow Service)가 그 대안이 될 수 있다. 에스크로 서비스에서는 구매자가 물품 수령을 확인한 후에 판매자에게 대금이 지급되기 때문에 구매자는 안전한 전자상거래 서비스를 제공 받을 수 있고 판매자는 확실한 물품대금지급을 보장 받을 수 있다. 또한 인터넷 에스크로 서비스 사업자(Internet Escrow Service Provider)는 에스크로 서비스를 전자상거래 계약체결 이후에 거래를 원활히 성공시키기 위한 제반 필요 사항들을 종합적으로 제공하는 종합 거래관리시스템 ( Total Transaction Management System)으로 확대, 발전시킬 수도 있다고 사료된다.

  • PDF

Construction for Safe Transaction System using Blockchain Technology(Case:Used Car) (블록체인 기술을 이용한 안전 거래 시스템 구축(사례:중고자동차))

  • Ahn, Byeongtae
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.237-242
    • /
    • 2020
  • Online e-commerce management systems are gradually increasing, and transactions are made in various items. However, the reliability between sellers and buyers is very important in high-priced transactions such as automobiles when used transactions online. Nevertheless, in the existing used trading system, a device that prevents fraud or trusts the seller is insufficient. This paper developed a blockchain-based used transaction management system to improve the reliability that occurs during used transactions. We have improved the safety trading system by developing a trading management system for used cars with the highest amount of used cars in various fields. This system uses Ethereum-based smart contract to guarantee reliability without third party intervention. By designing the contracts required for used car trading by utilizing smart contracts, it was possible to reduce the effort and time of trading participants in the existing used car transactions, while enabling safe transactions. In addition, this system mitigated information asymmetry between buyers and sellers, and reduced and prevented brokerage fees in the distribution process without third parties.

A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing (빅데이터 기반의 융합 보이스피싱을 이용한사회공학적 공격 기법과 대응방안)

  • Kim, Jung-Hoon;Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.1
    • /
    • pp.85-91
    • /
    • 2015
  • Recently government has distributed precautionary measure and response procedures for smishing(SMS phishing), pharming, phishing, memory hacking and intensified Electronic Financial Transaction Act because of the sharp increase of electronic bank frauds. However, the methods of electronic bank frauds also developed and changed accordingly so much it becomes hard to cope with them. In contrast to earlier voice phishing targeted randomizing object, these new methods find out the personal information of targets and analyze them in detail making a big data base. And they are progressed into new kind of electronic bank frauds using those analyzed informations for voice phishing. This study analyze the attack method of voice phishing blended with the Big Data of personal informations and suggests response procedures for electronic bank frauds increasingly developed. Using the method to save meaningless data in a memory, attackers cannot deduct accurate information and try voice phishing properly even though they obtain personal information based on the Big Data. This study analyze newly developed social technologic attacks and suggests response procedures for them.

A Study on Risk Analysis and Countermeasures of Electronic Financial Fraud (전자금융사기 위험 분석과 대응방안에 관한 연구)

  • Jeong, Dae Yong;Kim, Gibum;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.115-128
    • /
    • 2017
  • The methods of electronic financial fraud continue to evolve. Various research and countermeasures have been proposed to counter this problem, but it is difficult to eradicate it. The purpose of this study is to analyze the risk of electronic financial fraud through MS Threat Risk Modeling and to propose the countermeasures against the electronic financial fraud. As a result of the analysis, it is confirmed that despite the difference of authentication methods, there is a high risk of pharming, and it is difficult to prevent attack by using only additional authentication means, device security or user authentication based security system. Therefore, this study suggests the introduction of preventive measures such as readjustment of transaction limit by security means, account authentication, and additional physical security measures. It also suggests the establishment and implementation of a comprehensive electronic financial fraud prevention policy through linkage of electronic fraud prevention system and improvement of public relations and user awareness.

Detecting Credit Loan Fraud Based on Individual-Level Utility (개인별 유틸리티에 기반한 신용 대출 사기 탐지)

  • Choi, Keunho;Kim, Gunwoo;Suh, Yongmoo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.79-95
    • /
    • 2012
  • As credit loan products significantly increase in most financial institutions, the number of fraudulent transactions is also growing rapidly. Therefore, to manage the financial risks successfully, the financial institutions should reinforce the qualifications for a loan and augment the ability to detect a credit loan fraud proactively. In the process of building a classification model to detect credit loan frauds, utility from classification results (i.e., benefits from correct prediction and costs from incorrect prediction) is more important than the accuracy rate of classification. The objective of this paper is to propose a new approach to building a classification model for detecting credit loan fraud based on an individual-level utility. Experimental results show that the model comes up with higher utility than the fraud detection models which do not take into account the individual-level utility concept. Also, it is shown that the individual-level utility computed by the model is more accurate than the mean-level utility computed by other models, in both opportunity utility and cash flow perspectives. We provide diverse views on the experimental results from both perspectives.

A Study on Legal Issues with Airline Over-booking Practice (항공권 초과예약의 법률적 문제에 관한 연구)

  • Jeong, Jun-Sik;Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.143-166
    • /
    • 2012
  • This paper deals in depth with airline over-booking practices and legal questions therefrom in the light of public interests. Chapter I as an introduction gives clear ideas of what are the over-booking, fact-revealing current state of denied boarding and nature of the problems inherent but veiled in those practices. In Chapter II, it is reviewed whether legal instruments for DBC(Denied Boarding Compensation) are adequately equipped for airline passengers in R. O. K. Upon the results of the review that international law to which Korea is a party, domestic law and administrative preparedness for the DBC are either null or virtually ineffective, the Chapter by contrast illustrates how well the U. S. and the E. U. safeguard civil rights of their passengers from such an 'institutionalized fraud' as the over-booking. In Chapter III on which a main emphasis lies, it is examined whether the over-booking practice constitutes a criminal offense: Fraud. In section 1, the author identifies actus reus and mens rea required for fraud then compares those with every aspect of the over-booking. In conjunction with the structural element analysis, he reviews the Supreme Court's precedents that lead the section into a partial conclusion that the act of over-booking judicially constitutes a crime of fraud. Despite the fulfillment of drawing up an intended answer, the author furthers the topic in section 2 by arguing a dominant view from Korean academia taking opposite stance to the Supreme Court. The commentators assert, "To consummate a crime of fraud, there must be property damage of the victim." For this notion correlates with a debate on legally protected interest in criminalization of fraud, the section 2 shows an argument over 'Rechtgut' matters specific to fraud. The view claims that the Rechtgut comes down rather to 'right to property' than 'transactional integrity' or 'fair and equitable principles'. However, the section concludes that the later values shall be deemed as 'freedom in economic decision-making' which are the benefit and protection of the penal law about fraud. Section 3 demonstrates the self-contradiction of the view as it is proved by a conceptual analysis that the infringement on freedom in economic decision-making boils down to the 'property damage'. Such a notion is better grounded in section 4 by foreign court decisions and legislation in its favour. Therefore, this paper concludes that the airline's act of over-booking is very likely to constitute fraud in both theory and practice.

  • PDF

Corresponds problems to Business scam and measures in the trade industry (무역 산업에서의 비즈니스 스캠(Business Scam) 대응 문제점과 대책 방안)

  • Lee, Eun-Kyoung;Jo, Young-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.307-310
    • /
    • 2016
  • 우리나라의 무역 교역량이 '11년부터 3년 연속 1조 달러를 돌파하면서 인터넷 무역도 활성화 되고 있으나 인터넷 무역의 특징인 비대면 거래과정을 악용한 사기 행위가 급증하여 기업의 피해가 증가하고 있는 실정이다. 이메일을 해킹하여 거래처로 위장해 무역 거래대금을 가로채는 사이버범죄 수법인 비즈니즈 스캠(Business Scam)은 건전한 무역 활동에 위협적인 요소로 작용하고 있다. 이와 같이 무역 산업의 위협이 증가하고 있는 현재 상황에서 본 연구는 정보보호 관점에서 기술, 정책, 제도, 법률, 관련 사례를 조사 분석하여 비즈니스 스캠의 효율적인 피해방지 방안을 제시하고자 한다.

  • PDF

전자금융거래 환경에서 보안카드 실수입력방지기법 적용을 통한 피싱/파밍 사고 방지 방안

  • Park, Jin Kyu;Lee, Jung Ho
    • Review of KIISC
    • /
    • v.23 no.6
    • /
    • pp.30-40
    • /
    • 2013
  • 본 논문에서는 피싱, 파밍 등 전자금융 신종 사기 수법에 의한 사고 예방을 위하여, 모 시중은행의 전자금융거래 환경에서 약 3개월 동안의 자금이체 관련 로그를 기준으로 현(現) 보안카드 인증 방식의 안전도를 분석하고, 개선할 수 있는 방안을 제안 한다. 제안 기법은 보안카드 지시번호의 배열 형식과 순서, 일부 보안카드 번호에 마스킹 적용 등을 통해 보안카드를 사용자마다 상이한 형식으로 발급하여, 사용자가 피싱 웹사이트 상 보안카드 번호 입력 화면과 본인이 가진 실물 보안카드가 크게 상이함을 스스로 인지하거나, 피싱 웹사이트 상 제시 화면에 따라 보안카드 번호의 입력 가능성을 낮추도록 하는 것이다. 이 기법은 저비용으로, 사용자의 추가 학습 노력을 최소화하면서도 사용자 부주의에 의한 보안카드 정보유출 위험을 감소시켜 전자금융거래의 안전성을 향상 시킬 수 있다.