• Title/Summary/Keyword: Electronic Banking

Search Result 110, Processing Time 0.024 seconds

Design and Implementation of a Mail Browser that can control Data-Flow on the Web (Web에서 데이터 흐름제어가 가능한 Mail Browser의 설계 및 구현)

  • Park, Gyu-Seok;Kim, Seong-Hu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2752-2763
    • /
    • 1999
  • On account of the text based mail system has it's limit to support multimedia applications, GUI based mail system platform was developed to control document flow and automatize information process. The existing mail systems's to transmit data must need additional functions to automate document flow control. The platform of document flow control is deeply related to EDMAS(Electronic document Management System), workflow, Electronic Banking, DMS(Document Management System) automation, so it needs an ability to control proper data and document correctly. To resolve this problems, we are need of browser and engine to design work flow and to control documents flow. In this paper, we develope a mail browser to design document flow by follow user's requirements. This system can generate executive script code for document flow, and we add the function of workflow and process management to automatize the document flow in this system, and then we implement this Data flow engine.

  • PDF

Proposal for Analog Signature Scheme Based on RSA Digital Signature Algorithm and Phase-shifting Digital Holography

  • Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.4 no.6
    • /
    • pp.483-499
    • /
    • 2020
  • In this paper, a novel analog signature scheme is proposed by modifying an RSA-based digital signature scheme with optical phase-shifting digital holography. The purpose of the proposed method is generating an analog signature to provide data confidentiality and security during the data transfer, compared to the digital signature. The holographic encryption technique applied to a hash value reveals an analog-type of pseudo-random pattern in the analog signature scheme. The public key and secret key needed to verify the analog signature are computed from public key ciphers which are generated by the same holographic encryption. The proposed analog signature scheme contains a kind of double encryption in the process of generating signature and key, which enhances security level more than the digital signature. The results of performance simulations show the feasibility of the highly secure signature scheme, and security analysis shows high robustness against known-message attacks and chosen-message attacks. In addition, the proposed method can apply to one-time signature schemes which can be used to sign only one message and it can also apply to authentication, e-mails, electronic banking and electronic data interchange.

A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing (빅데이터 기반의 융합 보이스피싱을 이용한사회공학적 공격 기법과 대응방안)

  • Kim, Jung-Hoon;Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.1
    • /
    • pp.85-91
    • /
    • 2015
  • Recently government has distributed precautionary measure and response procedures for smishing(SMS phishing), pharming, phishing, memory hacking and intensified Electronic Financial Transaction Act because of the sharp increase of electronic bank frauds. However, the methods of electronic bank frauds also developed and changed accordingly so much it becomes hard to cope with them. In contrast to earlier voice phishing targeted randomizing object, these new methods find out the personal information of targets and analyze them in detail making a big data base. And they are progressed into new kind of electronic bank frauds using those analyzed informations for voice phishing. This study analyze the attack method of voice phishing blended with the Big Data of personal informations and suggests response procedures for electronic bank frauds increasingly developed. Using the method to save meaningless data in a memory, attackers cannot deduct accurate information and try voice phishing properly even though they obtain personal information based on the Big Data. This study analyze newly developed social technologic attacks and suggests response procedures for them.

Requisites for Adopting Electronic Payment Systems in International Trade Transactions (국제무역거래에서의 전자결제시스템 도입에 따른 과제)

  • Kyung, Yeun-Beom
    • The Journal of Information Technology
    • /
    • v.6 no.4
    • /
    • pp.147-162
    • /
    • 2003
  • The technique of information-communication rapidly developed has made it possible for us to do business through Internet. Electronic commerce was increased rapidly by the explosive development of the inter and communication revolution. E-Commerce has created a fundamentally new way of conduction and will change drastically accepted ways of doing business. Normally international trade has been formulated in a way that exporters and importers meet face-to-face and contract and pay by letter of credits. For the global electronic commerce to vitalized, the outstanding matters should encourage the creation of infrastructure of information security and new models in the field of electronic payment systems, electronic commerce agreement for remedy, adapting electronic date interchange in transport documents and negotiability of electronic bills of lading. The payment systems such as electronic fund transfers, tradecard system and electronic letters of credits issued by SWIFT system permit the parties concerned(sellers, buyers ad service providers) to settle payment electronically. Still they are many limitations for complete international electronic transactions. The following measures have to be taken to vitalize electronic trade transactions. It is needed to acquire information security such as authenticity, integrity, non-repudiation and confidentiality. All kinds of documents need to be replaced by electronic date exchange and the legal structure of international convention, national law for electronic payment systems have to be completed. Also a detailed guide of the banking operation and developing rules for electronic letters of credits need to be provided to adopt eUCP rules for the electronic presentation of documents.

  • PDF

Integrated OTP Authentication and Security Analysis (OTP 통합인증과 안전성 분석)

  • Kim, In-Seok;Kang, Hyung-Woo;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.101-107
    • /
    • 2007
  • In recent years, electronic financial services, such as internet banking, come into wide use since the personal computer and network technology have made reasonably good progress. The growth of electronic financial service contributes to promoting the business efficiency of financial institution and promoting the convenience of financial customer, while the security on electronic financial service is getting more important because it is not face-to-face financial service. Therefore, the financial sector had decided to introduce the OTP (One Time Password) in order to authenticate the identification of customer and has built the Integrated OTP Authentication Center for a customer being able to use only one OTP token in electronic financial transaction with several financial institution. In this paper, we introduce the business of Integrated OTP Authentication Center and present the security analysis on integrated OPT authentication service, which is the main function of Integrated OTP Authentication Center.

  • PDF

Secure OTP Smart Card Authentication Protocol for Denial of Service (서비스거부공격에 안전한 OTP 스마트카드 인증 프로토콜)

  • Shin, Kwang-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.201-206
    • /
    • 2007
  • Development of Information and Communication technology coming to activity of internet banking and electronic business, and smart card of medium is generalized prevailing for user authentication of electronic signature certificate management center with cyber cash, traffic card, exit and entrance card. In field that using public network, security of smart cart and privacy of card possessor's is very important. Point of smart card security is use safety for smart card by user authentication. Anonymous establishment for privacy protection and denial of service attack for availability is need to provision. In this paper, after analyze for Hwang-Li, Sun's, L-H-Y scheme, password identify element is a change of safety using one time password hash function. We proposed an efficient new smart card authentication protocol against anonymity and denial of service.

  • PDF

The Impact of Senders' Identity to the Acceptance of Electronic Word-of-Mouth of Consumers in Vietnam

  • DINH, Hung;DOAN, Thanh Ha
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.2
    • /
    • pp.213-219
    • /
    • 2020
  • Studies related to Electronic Word-of-Mouth (eWOM) show that the acceptance of eWOM information is an important factor in customer purchase decisions. When consumers accept eWOM information, they tend to use that information in considering before making purchase decisions. In Viet Nam, there are few studies about eWOM information, especially on the acceptance of eWOM information. Research is conducted to test the influence of consumers on the perception of the senders' identity to the acceptance of online reviews (a kind of eWOM) in Viet Nam - a case study in Ho Chi Minh City. Using adjustment techniques, inspecting the scales and a theoretical model represent the relationship among the influential factors. The research is based on a sample of 522 consumers who use the Internet to search for product reviews before buying and used Structural Equation Modeling (SEM) to test the relationships among the variables. The research results show that the scales of the variables: Message Quality, Source Credibility, Perceived Message Usefulness, Perceived Senders' Identity, Perceived Message Credibility, Message Acceptance attain the validity and reliability in the research. The research contributes to the understanding of the determinants that influence the acceptance of eWOM information, which are informational factors, and factors related to consumer skepticism.

IT Governance for the Effective Financial Services Informatization (효과적인 금융정보화를 위한 IT거버넌스)

  • Hahm, Yukun;Song, Jinseog;Lee, NaeChan;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.497-508
    • /
    • 2013
  • This article examines the organizational aspect of IT governance in Financial Services Informatization, which is one of the key informatizations led by the Korea government. Financial Services Informatization has deeply contributed to the development of electronic financial services in Korea and affected people's everyday life. Using qualitative data obtained through multiple-case analysis, this study identifies the barriers to effective IT governance within the context of Financial Services Informatization. It also reveals that the scope and role of participants and the coordination between authorities are the critical to IT governance adoption in Financial Services Informatization. The key to the successful IT governance of Financial Services Informatization will depend on the involvement and accountability of relevant regulatory bodies and the secondary financial institutions affected by it.

A Study on Wireless PKI Technology Standard (무선 PKI 기술 표준에 관한 연구)

  • Sung, Yeon-Guk;Kim, Hyun-Chul;Jung, Jin-Wook;Kim, Soon-Chul;Ryu, Won
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.29-38
    • /
    • 2002
  • Everyday demand of wireless internet is increasing. Security problem is certainly resolved for wireless internet activation. Especially problem is only wiretap in mobile communication with voice, but problems, user authentication, data integrity guarantee etc., are resolved in data-services that have commercial transaction over simple data information service such bill, banking. Necessity of wireless PKI that can offer security service likely in wired environment is requested for offering security service in wireless environment. For offering security services, confidentiality, integrity, non-repudiation etc, that of offered in wired environment in wireless environment, first it must construct wireless PKI infrastructure and do service activity. This paper analyze various wireless internet technology for offering safe wireless internet service and wireless PH standards. Performance Result of this paper expect activity of safe wireless PH service and activity of electronic commercial transaction used wireless internet such banking service, bill transaction, online shopping.

  • PDF

The Determination of an Original Document in L/C Transactions through Electronic Communication System (정보 및 전자통신하의 신용장거래에서 "Original Document"의 판단기준)

  • 한상현
    • The Journal of Information Technology
    • /
    • v.5 no.1
    • /
    • pp.51-67
    • /
    • 2002
  • Over a period of several years there have been a number of queries raised with the ICC Banking Commission as to the determination, by banks, of what is an "original"document under a letter of credit and the necessity, if my, for such a document to be so marked. So, the ICC Banking Commission Decision on original documents was sent to members in July. This Decision emphasizes the need to correctly interpret and apply sub-Article 20(b) of UCP 500. Consequently, about Hand signed documents, Facsimile signed documents, Photocopies and Telefaxed presentation of documents, Banks examine documents presented under a letter of credit to determine, among other things, whether on their face they appear to be original. Banks treat as original any document bearing an apparently original signature, mark, stamp, or label of the issuer of the document, unless the document itself indicates that it is not original. Accordingly, unless a document indicates otherwise, it is treated as original if it : appears to be written, typed, perforated, or stamped by the document issuer's hand; or appears to be on the document issuers original stationery; or states that it is original, unless the statement appears not to apply to the document presented (e.g. because it appears to be a photocopy of another document and the statement of originality appears to apply to that other document).document).

  • PDF