• Title/Summary/Keyword: ATM Security

Search Result 66, Processing Time 0.017 seconds

Development of T-commerce Processing Payment Module Using IC Credit Card(EMV) (IC신용카드(EMV)를 이용한 T-커머스 결제처리 모듈 개발)

  • Choi, Byoung-Kyu;Lee, Dong-Bok;Kim, Byung-Kon;Heu, Shin
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.51-60
    • /
    • 2012
  • IC(Integrated circuits)card, generally be named smard card, embedded MPU(Micro Processor Unit) of small-size, memory, EEPROM, Card Operating System(COS) and security algorithm. The IC card is used in almost all industry such as a finance(credit, bank, stock etc.), a traffic, a communication, a medical, a electronic passport, a membership management and etc. Recently, a application field of IC card is on the increase by method for payments of T-commerce, as T-commerce is becoming a new growth engine of the broadcating industry by trend of broadcasting and telecommunication convergence, smart mechanization of TV. For example, we can pay in IC credit card(or IC cash card) on T-Commerce. or we can be provided TV banking service in IC cash card such as ATM. However, so far, T-commerce payment services have weakness in security such as storage and disclosure of card information as well as dropping sharply about custom ease because of taking advantage of card information input method using remote control. To solve this problem, This paper developed processing payment module for implementing TV electronic payment system using IC credit card payment standard, EMV.

A Study on the Performance of VPN based on MPLS Networks (MPLS 망을 기반으로 하는 VPN의 성능에 관한 연구)

  • Shin, Tae-Sam;Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2007
  • In this paper we introduce the concept of MPLS-based VPN and propose a scheme for providing VPN services in MPLS networks. Furthermore, we design the control components and the operational procedures and evaluated the performance of traditional VPN implementation methods and MPLS-based VPN. In this scheme it is possible to solve several problems that IP-based VPN pertains via the allocation of VPN ID and virtual space without tunneling, thereby providing effective VPN services. In other words, the MPLS-based VPN scheme uses MPLS networking technology together with the PSTN which can achieve a perfect segregation of user traffic on per-customer basis in a physical link and can guarantee high reliability and security levels. Specially, in the perspective of customers, it can save networking facilities installation and maintenance costs considerably. On the contrary, it possesses some shortcomings in that its deployment tends to be restricted within an ISP's network boundary and it is vulnerable to external security break-ins when going through public networks such as the Internet due to its lack of data encryption capability.

  • PDF

A Method to Suppress False Alarms of Sentinel-1 to Improve Ship Detection

  • Bae, Jeongju;Yang, Chan-Su
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.4
    • /
    • pp.535-544
    • /
    • 2020
  • In synthetic aperture radar (SAR) based ship detection application, false alarms frequently occur due to various noises caused by the radar imaging process. Among them, radio frequency interference (RFI) and azimuth smearing produce substantial false alarms; the latter also yields longer length estimation of ships than the true length. These two noises are prominent at cross-polarization and relatively weak at co-polarization. However, in general, the cross-polarization data are suitable for ship detection, because the radar backscatter from background sea surface is much less in comparison with the co-polarization backscatter, i.e., higher ship-sea image contrast. In order to improve the ship detection accuracy further, the RFI and azimuth smearing need to be mitigated. In the present letter, Sentinel-1 VV- and VH-polarization intensity data are used to show a novel technique of removing these noises. In this method, median image intensities of noises and background sea surface are calculated to yield arithmetic tendency. A band-math formula is then designed to replace the intensities of noise pixels in VH-polarization with adjusted VV-polarization intensity pixels that are less affected by the noises. To verify the proposed method, the adaptive threshold method (ATM) with a sliding window was used for ship detection, and the results showed that the 74.39% of RFI false alarms are removed and 92.27% false alarms of azimuth smearing are removed.

Improvement Schemes of IIC’s MIC-NET Management (정보통신부 기반망 운영개선 방안)

  • 최종호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.5
    • /
    • pp.1129-1133
    • /
    • 2004
  • The MIC-NET of 3,010 circuits to process on-line business on post, insurance, finance, electromagnetic wave, and so forth has the problems on spending of bandwidth for the lack of flexibility of leased-line service band. In this paper, it is suggested to establish the efficient 3 steps conversion plan through analysis and comparison with economical efficiency on MIC-NET. The promoting policy proposed in this paper, both MIC and local post office will raise image as financial institute and provide high level service with reliability and security as distinguished government organization.

바이오인식 국제표준화 동향

  • Kim, Jason
    • Review of KIISC
    • /
    • v.29 no.4
    • /
    • pp.29-34
    • /
    • 2019
  • 바이오인식기술은 사람의 지문 얼굴 홍채 정맥 등 신체적 특징(Physiological characteristics) 또는 음성 서명 자판 걸음걸이 등 행동적 특징(Behavioral characteristics)을 자동화된 IT 기술로 추출 저장하여 다양한 IT 기기로 개인의 신원을 확인하는 사용자 인증기술이다. 전통적으로 바이오인식기술은 출입국심사(전자여권, 승무원 승객 신원확인), 출입통제(도어락, 출입 근태관리), 행정(무인민원발급, 전자조달), 사회복지(미아찾기, 복지기금관리), 의료(원격의료, 의료진 환자 신원확인), 정보통신(휴대폰인증, PC 인터넷 로그인), 금융(온라인 뱅킹, ATM 현금인출) 등 다방면에서 폭넓게 보급되어 실생활 깊숙이 자리잡게 되었다. 2001년 미국의 911 테러사건으로 인하여 전 세계 국제공항 항만 국경에서 지문 얼굴 홍채 등 바이오정보를 이용한 출입국심사가 보편화됨과 동시에 ISO/IEC JTC1 SC37(Biometrics) 국제표준화기구를 중심으로 표준화가 급속도로 진행되어 왔다. 최근 들어 스마트폰 테블릿 PC 등 모바일기기에 지문 얼굴 등 바이오정보를 탑재하여 다양한 모바일 응용서비스를 가능하게 해주는 모바일 바이오인식 응용기술이 전 세계적으로 개발 보급되고, 삼성전자 페이팔 중심으로 바이오인식기술을 이용한 모바일 지급결제솔루션에 대하여 페이팔 구글 마이크로소프트 비자카드 마스터카드 등 미국 주도의 사실표준화협의체인 FIDO1), ITU-T SG17 Q9(Telebiometrics) 국제표준화기구를 중심으로 표준화가 진행되고 있다. 특히, 이러한 모바일 바이오인식기술은 스마트폰을 통한 비대면 인증기술 수단으로서 핀테크, 원격의료분야에서 중요한 요소기술로 작용될 전망이다. 본 논문에서는 이러한 바이오인식 표준화를 위한 국외 표준화 기구를 소개하고, 각 기구별 표준화 현황을 살펴본다.

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.