• Title/Summary/Keyword: Electronic Finance

Search Result 125, Processing Time 0.025 seconds

A Personal Information Security System using Form Recognition and Optical Character Recognition in Electronic Documents (전자문서에서 서식인식과 광학문자인식을 이용한 개인정보 탐지 및 보호 시스템)

  • Baek, Jong-Kyung;Jee, Yoon-Seok;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.451-457
    • /
    • 2020
  • Format recognition and OCR techniques are widely used as methods for detecting and protecting personal information from electronic documents. However, due to the poor recognition rate of the OCR engine, personal information cannot be detected or false positives commonly occur. It also takes a long time to analyze a large amount of electronic documents. In this paper, we propose a method to improve the speed of image analysis of electronic documents, character recognition rate of the OCR engine, and detection rate of personal information by improving the existing method. The analysis speed was increased using the format recognition method while the analysis speed and character recognition rate of the OCR engine was improved by image correction. An algorithm for analyzing personal information from images was proposed to increase the reconnaissance rate of personal information. Through the experiments, 1755 image format recognition samples were analyzed in an average time of 0.24 seconds, which was 0.5 seconds higher than the conventional PAID system format recognition method, and the image recognition rate was 99%. The proposed method in this paper can be used in various fields such as public, telecommunications, finance, tourism, and security as a system to protect personal information in electronic documents.

Comparative Analysis on Digital Currency Models and Electronic Payments (중앙은행의 디지털화폐 발행방식 및 전자지급수단의 비교분석)

  • Yoon, Jae-Ho;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.63-72
    • /
    • 2022
  • With the advent of cryptocurrencies such as Bitcoin in 2009, the paradigm of money, a means of payment, has been changing significantly. And it has a great impact on our daily lives. Thus central banks have attempted various analyzes on the issuance and impact of digital currencies including electronic payments but a study on which issuance method is suitable is insufficient. In this study, the issuance of digital currency was analyzed compared to the electronic payments which are currently used. As a result, the account-based model did not show any significant differences from the current RTGS(real-time gross settlement systems) and retail payment systems. But the token-based model is expected that it can improve the efficiency of finance and induce technological innovation in the financial field. However, it was analyzed that this model would weaken the intermediary function of financial institutions such as loans due to the characteristics of digital signature technology. In addition, in order to protect consumers against security attacks such as hacking and phishing of CBDCs, legal and institutional supports similar to the current electronic payment method are required, and continuous technology development efforts are also required for the CBDC issuance model to maintain convenience and anonymity equivalent to cash.

BR2K: A Replication and Recovery Technique Using Kubernetes for Blockchain Services

  • Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.77-86
    • /
    • 2020
  • In this paper, we propose a technique for blockchain service replication and recovery using kubernetes(BR2K) that robustly executes blockchain services based on replication and supports systematic recovery in case of the service failure. Blockchain services are being developed and applied in various fields such as administration, finance, and medical systems based on the features of blockchain, such as decentralization, high security, and data integrity. In such areas where service continuity is important, it is necessary to provide robustness for execution of blockchain services, and a recovery plan for service failure is also required. To this end, BR2K provides an execution replication technique that systematically supports the sustainable execution of blockchain application services. Also, it introduces a robust container registry based on the blockchain service registry, systematically supporting the recovery of service failures by using it. In addition, Truffle, a blockchain service development framework, is extended to utilize the Kubernetes container management tool, and BR2K provides a technique for rapidly deploying blockchain services using the extended framwork.

Portfolio of Real Estate Price Index for ICT Environment Study on Diversification Effect (ICT 환경에서 부동산 가격지수 포트폴리오 분산효과에 관한 연구)

  • Jang, Dae-Seub;Min, Guy-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.3
    • /
    • pp.393-402
    • /
    • 2014
  • ICT environment to the survey released by the Bureau of Statistics 2012 Household Finance. Korean Welfare survey 24.9% of all households in financial assets, real estate is about three times more than 69.9%, respectively. The problem is that the information is slow and income deciles(deciles 1-4), a relatively high proportion of households with low(78.8 to 69%) of the real estate assets of the expansion of the world economy with low growth and low uncertainty, work from home due to the information changes in the structure of the economy, such as increases in real estate prices remain exposed to the risk of a phenomenon such as Pour House Pour Talent and low-income people is bound to be more serious symptoms. This low correlation is by constructing a composite asset portfolio, the weighted average risk of the individual assets while increasing overall revenue decrease that risk is based on the principle of portfolio by type and different areas in the ICT environment in a portfolio of real estate price index low correlation to financial assets by including the effect of dispersion stable complex asset portfolio and empirical Growth was divided.

Designing and Implementing AI Chat-bot System for Small-business Owner (중소상인을 위한 AI 챗봇 플랫폼의 설계 및 구현)

  • Lee, Dae-Kun;Na, Seung-Yoo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.561-570
    • /
    • 2018
  • Artificial Intelligence is one of the technologies that are being discussed in the Fourth Industrial Revolution, attracting the attention from companies around the world and this technology is being applied to various industries such as education, finance, automobile, etc. AI integrated ChatBot is a system designed to respond to user questions according to defined response rules. This system is gradually expanded from simple inquiry responses for intelligent virtual assistant service, weather, traffic, schedule, etc. to service provisions through user pattern analysis, to solidify its position as a life-style service. As a result, research on AI integrated ChatBot platform has become necessary. Therefore, this study suggests the design and implementation of an intelligent chatbot service platform for small businesses.

The Study on the Design and Optimization of Storage for the Recording of High Speed Astronomical Data (초고속 관측 데이터 수신 및 저장을 위한 기록 시스템 설계 및 성능 최적화 연구)

  • Song, Min-Gyu;Kang, Yong-Woo;Kim, Hyo-Ryoung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.75-84
    • /
    • 2017
  • It becomes more and more more important for the storage that supports high speed recording and stable access from network environment. As one field of basic science which produces massive astronomical data, VLBI(: Very Long Baseline Interferometer) is now demanding more data writing performance and which is directly related to astronomical observation with high resolution and sensitivity. But most of existing storage are cloud model based for the high throughput of general IT, finance, and administrative service, and therefore it not the best choice for recording of big stream data. Therefore, in this study, we design storage system optimized for high performance of I/O and concurrency. To solve this problem, we implement packet read and writing module through the use of libpcap and pf_ring API on the multi core CPU environment, and build a scalable storage based on software RAID(: Redundant Array of Inexpensive Disks) for the efficient process of incoming data from external network.

A study on Performance Analysis Affecting the Korea Internet eXchange (한국인터넷교환노드 성과분석에 관한 연구)

  • Park, Hyun-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.304-312
    • /
    • 2008
  • In this study, the performance analysis was divided into the public sector and private business sector. The four perspectives of the BSC performance analysis for the private business sector can be applied to all of the enterprises as there are Logical Linkages between the four Perspectives. However, these can not be applied in the same way to the public sector. There is no Logical Linkage between public sector and private sectors. Therefore, since there is no Logical Linkage, the KIX project of the public sector has a constrained condition. With the internal and external perspective views, the BSC of the KIX identifies the quality(operation) factor, user(customer) satisfaction factor, and economic costs effects(finance) factor. Based on the linkage model in both the internal and external perspective views and the BSC performance analysis of these views, a performance analysis model was developed and then performance results were analyzed of the whole KIX project.

  • PDF

New Trends in Private International Law and Our Response (국제상거래(國際商去來)의 사법통일(私法統一)노력과 우리의 대응(對應))

  • Park, Whon-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.12
    • /
    • pp.65-84
    • /
    • 1999
  • During the past few decades, we have witnessed three approaches to overcome the legal disparities between trading countries: - determining the individual governing law in accordance with the conflict of laws principle; - unifying and harmonizing private international law into uniform rules and substantive laws under the auspices of ICC, UNCITRAL, UNIDROIT and various NGOs ; and - drafting model laws like the UNCITRAL Model Law on Electronic Commerce and promoting member countries to enact them. Against this backdrop, the United Nations Convention on Contracts for the International Sale of Goods (CISG) and the process by which it was adopted, established the benchmark for the unification of commercial law. The CISG, completed in 1980, merged civil and common law concepts and came into force in 1988 after a certain number of countries endorsed the treaty. Besides the CISG, the U.N. Limitations Convention and the UNIDROIT Principles of International Commercial Law, to name a few, have attempted to set cross-border legal norms and standards in the international business transactions. However, since the advent of computer-based commerce, there have emerged all-out efforts to establish uniform rules before national legal systems have been developed. As a consequence, the Model Law on Electronic Commerce has become a specimen legislation covering functional equivalents of paper-based writing and signature. For the credit enhancement exemplified by the Uniform Rules for Demand Guarantees (ICC Publication No.458), the UNCITRAL prepared the U.N. Convention on Independent Guarantees and Stand-by Letters of Credit, which was adopted by the U.N. General Assembly in 1995 but remains still not effective as only two countries have ratified this treaty so far. In this connection, two draft conventions underway at UNIDROIT and UNCITRAL deserve our attention as the probability of unification in the Korean Peninsula is mounting. They are to create security interests for commercial finance in moveable equipment and accounts receivable. The UCC-type security rights are regarded to be useful to enable the North Koreans with limited properties to borrow from the banks.

  • PDF

A Study on IT Outsourcing Policy Based on Operational Risks of Financial Industries (금융보안 리스크 기반의 IT도급 정책 연구)

  • Choi, Chang-Lai;Yun, Jang-Ho;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.681-694
    • /
    • 2014
  • For the continuous financial incidents occurred in 2011, Korean government has announced the amendment on electronic finance supervision regulation including human resources, organization and budget. The major part of the regulation is mainly focused on human resources and budget. It states that company has to employ at least 5 percent of IT staff out of total staff, and at least 5 percent of security staff in IT staff employment number. Budget for security should be at least 7 percent of total IT budgets. This paper studies IT outsourcing policy based on operational risks of financial industries caused by amendment of regulation. This paper provides the policy decision procedure for resolving the 3rd party problems and suggests the effective operation policy to 3rd party for the program quality improvement and case studies at the IT task classification.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.