• Title/Summary/Keyword: 신용정보

Search Result 1,110, Processing Time 0.029 seconds

A Study on Predicting Credit Ratings of Korean Companies using TabNet

  • Hyeokjin Choi;Gyeongho Jung;Hyunchul Ahn
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.11-20
    • /
    • 2024
  • This study presents TabNet, a novel deep learning method, to enhance corporate credit rating accuracy amidst growing financial market uncertainties due to technological advancements. By analyzing data from major Korean stock markets, the research constructs a credit rating prediction model using TabNet. Comparing it with traditional machine learning, TabNet proves superior, achieving a Precision of 0.884 and an F1 score of 0.895. It notably reduces misclassification of high-risk companies as low-risk, emphasizing its potential as a vital tool for financial institutions in credit risk management and decision-making.

Protection Plan of Trustee Personal Credit Information for Credit Card Company Using Cloud Computing (클라우드컴퓨팅 이용 신용카드사의 영세수탁자 개인신용정보 보호방안)

  • Kim, Shi-in;Kim, In-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.885-895
    • /
    • 2019
  • As seen in recent cases of hacking in financial services, attackers are attempting to hacking trustee with poor security management, rather than directly hacking a financial company. As a result, the consignor is strengthening the security check and control of the trustee, but small trustee has difficulties to invest in information security with the lack of computer facilities and the excessive cost of security equipment. In this paper I investigate the vulnerability of personal information processing life cycle standards in order to enhance the security of small consignee that receive personal information form the credit card company. To solve the vulnerability the company should use litigation management system constructed on cloud computing service and install VPN to secure confidentiality and intergrity in data transfer section. Also, to enhance the security of users, it is suggested to protect personal credit information by installing PC firewall and output security on user PC.

Probability of default validation in a corporate credit rating model (국내모회사와 해외자회사 신용평가모형의 적합성 검증 연구)

  • Lee, Woosik;Kim, Dong-Yung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.3
    • /
    • pp.605-615
    • /
    • 2017
  • Recently, financial supervisory authority of Korea and international credit rating agencies have been concerned about a stand-alone rating that is calculated without incorporating guaranteed support of parent companies. Guaranteed by parent companies, most foreign subsidiaries keeps good credit rate in spite of weak financial status. However, what if the parent companies stop supporting the foreign subsidiaries, they could have a probability to go bankrupt. In this paper, we have validated a credit rating model through statistical measurers such as performance, calibration, and stability for Korean companies owning foreign subsidiaries.

A study on the selection of the target scope for destruction of personal credit information of customers whose financial transaction effect has ended (금융거래 효과가 종료된 고객의 개인신용정보 파기 대상 범위 선정에 관한 연구)

  • Baek, Song-Yi;Lim, Young-Bin;Lee, Chang-Gil;Chun, Sam-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.163-169
    • /
    • 2022
  • According to the Credit Information Act, in order to protect customer information by relationship of credit information subjects, it is destroyed and stored separately in two stages according to the period after the financial transaction effect is over. However, there is a limitation in that the destruction of personal credit information of customers whose financial transaction effect has expired cannot be collectively destroyed when the transaction has been terminated, depending on the nature of the financial product and transaction. To this end, the IT person in charge is developing a computerized program according to the target and order of destruction by investigating the business relationship by transaction type in advance. In this process, if the identification of the upper relation between tables is unclear, a compliance issue arises in which personal credit information cannot be destroyed or even information that should not be destroyed because it depends on the subjective judgment of the IT person in charge. Therefore, in this paper, we propose a model and algorithm for identifying the referenced table based on SQL executed in the computer program, analyzing the upper relation between tables with the primary key information of the table, and visualizing and objectively selecting the range to be destroyed. presented and implemented.

The credit card approval information management using WIPI (WIPI를 이용한 신용카드 결제 정보 관리)

  • Kim, Won-Kyum;Han, Jae-Yong;Park, Hyo-Won;Lee, Sun-Heum
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.824-829
    • /
    • 2009
  • SMS service is widely used for providing the approval information of a credit card when the payment is made by a credit card. But the message contained in the SMS is very simple and includes one time approval information. Although detailed approval informations could be retrieved by means of wire-network or mobile network services, the wire-network service could not be used on moving and the mobile network service requires high cost. In this paper, a WIPI application program managing the approval informations of a credit card based on the accumulated SMS messages in the cell phone has been developed. A cell phone user can conveniently can get the useful information such as the approval list on last month, the approval list on this month, the total amount on this month and the information about payment by installment from the developed program without any cost.

A Design of Lightweight Mutual Authentication Based on Trust Model (신용모델 기반의 경량 상호인증 설계)

  • Kim Hong-Seop;Cho Jin-Ki;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.237-247
    • /
    • 2005
  • Ubiquitous Sensor Network(USN) is the very core of a technology for the Ubiquitous environments. There is the weakness from various security attacks such that tapping of sensor informations, flowing of abnormal packets, data modification and Denial of Service(DoS) etc. And it's required counterplan with them. Especially it's restricted by the capacity of battery and computing. By reasons of theses. positively, USN security technology needs the lightweighted design for the low electric energy and the minimum computing. In this paper, we propose lightweight USN mutual authentication methology based on trust model to solve above problems. The proposed authentication model can minimize the measure of computing because it authenticates the sensor nodes based on trust information represented by subjective logic model. So it can economize battery consumption and resultingly increse the lifetime of sensor nodes.

  • PDF

Undecided inference using bivariate probit models (이변량 프로빗모형을 이용한 미결정자 추론)

  • Hong, Chong-Sun;Jung, Mi-Yang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1017-1028
    • /
    • 2011
  • When it is not easy to decide the credit scoring for some loan applicants, credit evaluation is postponded and reserve to ask a specialist for further evaluation of undecided applicants. This undecided inference is one of problems that happen to most statistical models including the biostatistics and sportal statistics as well as credit evaluation area. In this work, the undecided inference is regarded as a missing data mechanism under the assumption of MNAR, and use the bivariate probit model which is one of sample selection models. Two undecided inference methods are proposed: one is to make use of characteristic variables to represent the state for decided applicants, and the other is that more accurate and additional informations are collected and apply these new variables. With an illustrated example, misclassification error rates for undecided and overall applicants are obtainded and compared according to various characteristic variables, undecided intervals, and thresholds. It is found that misclassification error rates could be reduced when the undecided interval is increased and more accurate information is put to model, since more accurate situation of decided applications are reflected in the bivariate probit model.

A Proposal of Secure Electronic Payment System Using Smartcard (스마트카드를 이용한 보안성 높은 전자지불시스템 제안)

  • 박필승;남길현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1998.12a
    • /
    • pp.201-210
    • /
    • 1998
  • 전자상거래의 활성화를 위한 전자지불시스템은 보안성과 통용성의 양면을 만족해야한다. 현재 서비스중인 전자현금이나 전자화폐는 디지털정보가 직접 화폐가치를 지니고 있기 때문에 인터넷에서 분실시 복구가 불가능하다. 또한 전자수표나 가상은행을 이용한 계좌이체방식은 인터넷 통용성이 약하며, 신용카드를 이용한 전자지불시스템은 통용성은 양호하나 신용카드번호 노출의 위험이 있고 수수료 등 트랜잭션 비용이 소요되므로 소액지불에는 불리하다. 전자지불시스템의 활성화를 위해서는 신용카드와 같이 휴대 가능하고 실세계에서의 통용성이 우수한 시스템이어야 하며, 직접 지불이 가능하고 소액지불도 가능한 체계이어야 한다. 본 논문에서는 제안하는 새로운 지불시스템 "스마트-Pay"는 모든 사람들이 은행을 사용하고 있다는 점을 착안하여 은행계좌기반이면서 실세계 및 인터넷에서 직접지불이 가능하도록 설계한 것이다. 본 지불시스템의 안전도는 발행기관, 은행, 고객으로 이어지는 인증사슬에 의한 강력한 인증과 스마트카드에 의한 전자서명에 의존하며 기밀성, 무결성, 부인봉쇄를 제공하므로 안전하다고 평가된다.

  • PDF

포커스

  • Korean Associaton of Information & Telecommunication
    • 정보화사회
    • /
    • s.106
    • /
    • pp.68-70
    • /
    • 1996
  • PDF