• Title/Summary/Keyword: Code-banking

Search Result 38, Processing Time 0.021 seconds

An Efficient Software Update Technique with Code-Banking & Delta-Image for Wireless Sensor Networks (무선 센서 네트워크상에서 코드뱅킹 및 델타이미지 기반의 효율적인 센서노드 소프트웨어 업데이트 기법)

  • Nam, Young-Jin;Nam, Min-Seok;Park, Young-Kyun;Kim, Chang-Hoon;Lee, Dong-Ha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.3
    • /
    • pp.103-111
    • /
    • 2009
  • Software update has been regarded as one of fundamental functions in wireless sensor networks. It can disseminate a delta-image between a current software image operating on a sensor node and its new image in order to reduce an update image(transmission data) size, resultantly saving energy. In addition, code-banking capability of micro-controllers can decrease the update image size. In order to maximize the efficiency of the software update, the proposed scheme exploits both the delta-image and the code-banking at the same time. Besides, it additionally delivers a recovery delta-image to properly handle abnormal conditions, such as message corruptions and unexpected power-off during the update.

  • PDF

A Study of the Cross Certification in Internet Banking (인터넷뱅킹에서의 상호인증에 관한 연구)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.87-97
    • /
    • 2014
  • Pharming attack is a confidence trick that the hacker catch away customers financial information on Internet banking. At first, a hacker installs malicious execution code on customers PC in secret. As a customer tries to connect a Internet banking Web site, the malicious code changes it to phishing site in Internet explorer. The hacker catch away customers financial information in process of internet banking. The hacker steals money from customer's bank account using stolen information. PKI is a widespread and strong technology for providing the security using public key techniques. The main idea of PKI is the digital certificate that is a digitally signed statement binding an user's identity information and his public key. The Internet banking service stands on the basis of PKI. However, the bank is trusted in natural, the only customer is certified in the present Internet banking. In this paper, we propose a method of cross certification in Internet banking. The customer certify a bank and the bank certify the customer in proposed method. The method can service to customer the secure Internet banking about pharming attack. We compare the proposed method with other methods.

Boost Mobile Banking Monthly Active Customers with Vending Machines (자판기로 모바일뱅킹 월별 고객 활성화)

  • Yongjie Zhu
    • Journal of Digital Policy
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • In China, commercial banks have launched mobile banking one after another, and the homogeneous products make the competition of mobile banking extremely fierce. Mobile banking monthly active users (MAU) is an important indicator to evaluate the operation results of mobile banking. How to improve mobile banking monthly active users is a problem faced by commercial banks. The purpose of this study is to explore strategies to increase monthly active customers of mobile banking with the help of vending machines. This research is carried out through the literature method and case method. The research results show that the use of vending machines can not only effectively increase the monthly active customers of mobile banking, but also realize the differentiation strategy to occupy the mobile banking terminal market. At the same time, this study is helpful and instructive for commercial banks to develop their business.

An Investigation of Behavioral Intention Towards QR Code Payment in Bangkok, Thailand

  • SUEBTIMRAT, Panupong;VONGUAI, Rawin
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.1
    • /
    • pp.939-950
    • /
    • 2021
  • The purpose of this research is to investigate the factors affecting Thai commercial bank users' behavioral intention towards QR code payment system via mobile banking applications. The researchers conducted the study based on quantitative research approach. Non-probability sampling method such as the quota and convenience sampling was applied as sampling technique. A self-administered questionnaire was distributed. The data was collected from 1,800 respondents living in Bangkok, who have had an experience with QR code payment system with the top-three mobile banking applications in Thailand. This study concentrates on confirmatory factor analysis and structural equation modeling as a statistical tool to examine the data, model accuracy, and influence of critical variables. In addition, the researchers applied the first-order and second-order techniques to examine the relationship between constructs. Adoption readiness and perceived risk were second-order constructs. The results reveled that compatibility has an impact on attitude towards QR code payment. Moreover, adoption readiness, compatibility, attitude, and personal innovativeness are statistically significant that impact behavioral intention towards QR code payment. The strongest antecedents of behavioral intention were compatibility, attitude, adoption readiness, and personal innovativeness, respectively. Surprisingly, perceived risk and perceived trust do not statistically have a significant impact on behavioral intention towards QR code payment.

Design of Efficient Inspection Scope in e-banking System (e-뱅킹 시스템의 효율적인 인스펙션 범위 설계)

  • Park, Hae Yoon;Yoo, Hae Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.12
    • /
    • pp.841-848
    • /
    • 2013
  • Nowadays, the finance changes so rapidly that the time period of developing a e-banking system has been shorter. As a result, the risk of developing in the new e-banking system has increased. Therefore financial institutions constantly ask to review the quality test of their system during the project development. However, from the developer's point of view, additional system quality inspection will delay the development time for a new project, so financial investors and developers, because this problem will cause conflict. In order to solve this problem, in this paper define priority that considered characteristics of e-banking system and thereby design range priority decision criteria for efficient code inspection. Even in the e-banking system development, it is expected that using newly designed range of code inspection will allow high efficient quality performance.

A new password authentication scheme using two-way password in Smartphone Banking (이중 패스워드 방식을 이용한 스마트폰 뱅킹 관리)

  • Song, Jong-Gun;Kim, Tae-Yong;Lee, Hoon-Jae;Jang, Won-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.195-200
    • /
    • 2012
  • Smart Phone devices offer convenience for users, but present a new set of security issues due to loss or malicious code. In this paper, a mobile cloud system environment is used with existing smart phones in an attempt to solve the problems in a banking environment. In order to prevent financial damages due to loss or personal information leakage by malicious code, a mobile cloud computing service that provides control and protection of personal information in environment that ensures individual authentication is used. Existing ID / Password with certificate, with the way smart phone dual password authentication scheme using the gyro sensors proposed.

Survey on Phishing using Malicious Code in Internet Banking (인터넷 뱅킹에서 악성코드를 이용한 피싱에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.753-756
    • /
    • 2012
  • The type of phishing changes rapidly and also threat model changes very fastly Accordingly, frauds develop new methods of attacks to avoid the counterparts. Recently, the type of phishing in internet banking is developing specifically. In this paper, to help encounter for it, we first review the meaning of phishing and the types of attacks in phishing in the second chapter,and in the third chapter, we will analyze phishing which is using malicious code in internet banking,and in the fourth chapter, we will describe the conclusion of this paper.

  • PDF

Automatic Recognition of Bank Security Card Using Smart Phone (스마트폰을 이용한 은행 보안카드 자동 인식)

  • Kim, Jin-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.19-26
    • /
    • 2016
  • Among the various services for mobile banking, user authentication method using bank security card is still very useful. We can use mobile banking easily and safely in case of saving encoded security codes in smart phone and entering codes automatically whenever user authentication is required without bank security card. In this paper automatic recognition algorithm of security codes of bank security card is proposed in oder to enroll the encoded security codes into smart phone using smart phone camera. Advanced adaptive binarization is used for extracting digit segments from various background image pattern and adaptive 2-dimensional layout analysis method is developed for segmentation and recognition of damaged or touched digits. Experimental results of proposed algorithm using Android and iPhone, show excellent security code recognition results.

Factors Affecting Consumer Intention on QR Payment of Mobile Banking: A Case Study in Indonesia

  • KOSIM, Krisananda Putera;LEGOWO, Nilo
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.391-401
    • /
    • 2021
  • Technological developments facilitate payment transactions. In 2020, Bank Indonesia issued a regulation that supports QR payments using the Indonesian Standard Quick Response Code (QRIS). PT ABC is one of the banks that launched a QR payment feature on mobile banking with QRIS standards to make it easier for customers to make payment transactions at various merchants. In its implementation, the interest of QR payment users still tends to be small, so an analysis of the interests of QR payment users is carried out. The purpose of this study is to analyze the factors that influence user interest by using a modified UTAUT model. The UTAUT model was modified by adding variables to perceived trust, perceived risk, perceived regulatory support, and promotional benefits. The population taken is the company's customers in the DKI Jakarta area and it takes 403 samples for this case study. The results of empirical analysis show that 8 out of 12 hypotheses are considered proven where business expectations, social influence, perceived trust, perceived risk, perceptions of regulatory support, promotion benefits, age-moderated performance expectations, and age-moderate effort expectations have a significant effect on behavioral intentions, while performance expectations, facilitation conditions, business expectations are moderated by experience and social influence.

A study on the vulnerability of integrity verification functions of android-based smartphone banking applications (안드로이드 스마트폰 뱅킹 앱 무결성 검증 기능의 취약점 연구)

  • Kim, Soonil;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.743-755
    • /
    • 2013
  • In recent years, the malicious apps with malicious code in normal apps are increasingly redistributed in Android market, which may incur various problems such as the leakage of authentication information and transaction information and fraudulent transactions when banking apps to process the financial transactions are exposed to such attacks. Thus the financial authorities established the laws and regulations as an countermeasures against those problems and domestic banks provide the integrity verification functions in their banking apps, yet its reliability has not been verified because the studies of the safety of the corresponding functions have seldom been conducted. Thus this study suggests the vulnerabilities of the integrity verification functions of banking apps by using Android reverse engineering analysis techniques. In case the suggested vulnerabilities are exploited, the integrity verification functions of banking apps are likely to be bypassed, which will facilitate malicious code inserting attacks through repackaging and its risk is very high as proved in a test of this study. Furthermore this study suggests the specific solutions to those vulnerabilities, which will contribute to improving the security level of smartphone financial transaction environment against the application forgery attacks.