• Title/Summary/Keyword: digital banking

Search Result 137, Processing Time 0.026 seconds

A Study on ALTIBASETM LOG ANALYZER method for highly scalable, high-availability (고확장성, 고가용성을 위한 ALTIBASETM LOG ANALYZER 기법에 관한 연구)

  • Yang, Hyeong-Sik;Kim, Sun-Bae
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.1-12
    • /
    • 2014
  • Recently, the need for non-stop service is increasing by the business mission-critical Internet banking, e-payment, e-commerce, home shopping, securities trading, and petition business increases, clustered in a single database of existing, redundant research on high-availability technologies related to technique, etc. is increasing. It provides an API based on the Active Log in addition to the technique of redundancy, ALTIBASE$^{TM}$ Log Analyzer (below, ALA), provides scalability and communication of the same model or between heterogeneous. In this paper, we evaluated the performance of ALA by presenting the design of the database system that you can use the ALA, to satisfy all the synchronization features high scalability and high availability, real-time.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Economy Effects of IT Industry on Financial and Insurance Services (IT산업이 금융서비스에 미치는 경제적 효과)

  • Choi, Sung Wook;Shin, Yong Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.191-203
    • /
    • 2015
  • IT is based industry on finance and insurance services and is essential equipment of survival for competitive on market. The importance of IT industry on finance and insurance is bigger than other industries. So, This study examinate effects of hardware and software divided by IT industry on each 6 finance and insurances. Research models are production inducing effects of Demand-Driven model, Shortage effects of Supply-Driven model finally, Leontief's price model by using data for analysis is Input-Output table for 2000~2009. Results are that IT Service effects are more impact than IT hardware effects on Finance and Insurance Service. Especially, IT service's supply shortage effects is 0.0847KWR to produce 1KRW of finance and insurance service for 2-fold increase compared to 2000. In addition, Central Bank and banking institutions of finance and insurance services are the greatest impact from IT industry. These are which is increasing to interdependence between IT industry and finance and insurance service.

Design The User Authentication Framework Using u-health System (u-health 시스템을 이용한 사용자 인증 프레임워크 설계)

  • Choo, Yeun-Su;Jin, Byung-Wook;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.219-226
    • /
    • 2015
  • OTP(One Time Password) is for user authentication of Internet banking and users should carry their security card or OTP generator to use OTP. If they lost their security card or OTP generator, there is at risk for OTP leak. This paper suggests a new User Authentication Framework using personal health information from diverse technology of u-Health. It will cover the problem of OTP loss and illegal reproduction A User Authentication Framework is worthy of use because it uses various combinations of user's physical condition which is inconstant. This protocol is also safe from leaking information due to encryption of reliable institutes. Users don't need to bring their OTP generator or card when they use bank, shopping mall, and game site where existing OTP is used.

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

Application and Policy Direction of Blockchain in Logistics and Distribution Industry (물류 및 유통산업의 블록체인 활용과 정책 방향)

  • Kim, Ki-Heung;Shim, Jae-Hyun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.77-85
    • /
    • 2018
  • Purpose - The purpose of this study is to subdivide trade transaction-centered structure in a logistics/distribution industry system to apply blockchain, to establish and resolve with which types of technology, and to provide policy direction of government institution and technology to apply blockchain in this kind of industry. Research design, data, and methodology - This study was conducted with previous researches centered on cases applied in various industry sectors on the basis of blockchain technology. Results - General fields of blockchain application include digital contents distribution, IoT platform, e-Commerce, real-estate transaction, decentralized app. development(storage), certification service, smart contract, P2P network infrastructure, publication/storage of public documents, smart voting, money exchange, payment/settlement, banking security platform, actual asset storage, stock transaction and crowd funding. Blockchain is being applied in various fields home and abroad and its application cases can be explained in the banking industry, public sector, e-Commerce, medical industry, distribution and supply chain management, copyright protection. As examined in the blockchain application cases, it is expected to establish blockchain that can secure safety through distributed ledger in trade transaction because blockchain is established and applied in various sectors of industries home and abroad. Parties concerned of trade transaction can secure visibility even in interrupted specific section when they provide it as a base for distributed ledger application in trade and establish trade transaction model by applying blockchain. In case of interrupted specific section by using distributed ledger, blockchain model of trade transaction needs to be formed to make it possible for parties concerned involved in trade transaction to secure visibility and real-time tracking. Additionally, management should be possible from the time of contract until payment, freight transfer to buyers through land, air and maritime transportation. Conclusions - In order to boost blockchain-based logistics/distribution industry, the government, institutionally, needs to back up adding legal plan of shipping, logistics and distribution, reviewing standardization of electronic switching system and coming up with blockchain-based industrial road maps. In addition, the government, technologically, has to support R&D for integration with other high technology, standardization of distribution industry's blockchain technology and manpower training to expand technology development.

The Effects of Financial and non-Financial Factors on the Formation of Main Bank Relations of Parts and Material Industry in Pusan-Kyungnam Region (기업의 재무적 및 비재무적 특성이 주거래은행관계 형성에 미치는 영향을 : 동남경제권 부품소재산업을 중심으로)

  • Choi, Jin-Bae
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.8 no.2
    • /
    • pp.247-266
    • /
    • 2005
  • The purpose of this paper is to analyse the effects of a firm's financial and non-financial factors on the relationship formation with its main bank in the industry of parts and material in Pusan-Kyungnam region. The results, out of accordance with the relation-banking or regional financial market perspective, do not support the hypothesis that regional financial institutions would be useful for decreasing the financial difficulties of the small and medium firms in the region. The analyses about the effects of non-financial factors on the formation of main bank relations show that while Kookmin Bank and Industrial Bank play important roles as main banks of small businesses other national banks put emphasis on the transaction lending. And the analyses about the effects of financial factors show that firms having main bank relations with non-bank financial institutions and Kookmin bank are more profitable and stable than firms having main bank relations with other banks including local banks. On the whole it seems that local banks are not making a commitment to the regional economy and their operational grounds are not strong enough.

  • PDF

Factors Influencing Digital Native's Acceptance and Use of 4th Industrial Revolution Technology : Focusing on FinTech and AR (Augmented Reality) Technology (Digital Native의 4차산업혁명 기술수용 영향 요인: FinTech 및 AR(증강현실) 기술을 중심으로)

  • Chung, Byoung-Gyu
    • Journal of Venture Innovation
    • /
    • v.4 no.2
    • /
    • pp.77-95
    • /
    • 2021
  • In the midst of the progress of the 4th industrial revolution, the Corona19 Pandemic was forming giant double wave. Companies riding this wave can win, but companies that do not will fall into the wave and struggle. In connection with the 4th industrial revolution, various technologies are emerging and commercialized. At this point, consumers, especially digital natives, who have been with digital since birth, tried to find out what factors affect the intention to use these technologies and which factors have the most important influence. For this purpose, data were collected through a survey on factors affecting the intention to use FinTech technology and AR technology for 150 digital natives in their 20s. Based on this, statistical analysis was conducted and the following results were obtained. As a result of the overall analysis regardless of the type of technology, it was found that performance expectancy, effort expectancy, social influence, and habits have a positive (+) effect on digital natives' intention to use the 4th industrial technology. On the other hand, a significant influence relationship between the facilitating conditions, hedonic motivation and intention to use the 4th industrial technology was not tested. It was found that the influence was greatly influenced by social influence and habits. In the case of FinTech and AR, which were further subdivided into this study, different aspects were revealed as a result of separate analysis. In the case of FinTech technology that emphasizes utilitarian value, performance expectancy, effort expectancy, social influence, and habits had a positive (+) effect on intention to use. It was found that the influence was greatly influenced by habits and social influence. In the case of AR, which emphasizes the hedonic value, all the variables adopted in this study had a positive (+) effect on the intention to use the technology. It was found that hedonic motivation and social influence had a great influence. Combining the results of the analysis, social influence was found to be an important influence variable regardless of the type of 4th industrial technology. FinTech technologies such as mobile banking, where services are becoming more common, are habits, and in the case of AR, which has not yet been universalized and is provided mainly for entertainment, hedonic motivation was found to be an important factor. This study was able to present academic and practical implications based on the above confirmation of factors affecting digital natives' acceptance and use of the 4th industry technology.

A Study on Features Analysis for Retrieving Image Containing Personal Information on the Web (인터넷상에서 개인식별정보가 포함된 영상 검색을 위한 특징정보 분석에 관한 연구)

  • Kim, Jong-Bae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.91-101
    • /
    • 2011
  • Internet is becoming increasingly popular due to the rapid development of information and communication technology. There has been a convenient social activities such as the mutual exchange of information, e-commerce, internet banking, etc. through cyberspace on a computer. However, by using the convenience of the internet, the personal IDs(identity card, driving license, passport, student ID, etc.) represented by the electronic media are exposed on the internet frequently. Therefore, this study propose a feature extraction method to analyze the characteristics of image files containing personal information and a image retrieval method to find the images using the extracted features. The proposed method selects the feature information from color, texture, and shape of the images, and the images as searched by similarity analysis between feature information. The result which it experiments from the image which it acquires from the web-based image DB and correct image retrieval rate is 89%, the computing time per frame is 0.17 seconds. The proposed method can be efficiently apply a system to search the image files containing personal information and to determine the criteria of exposure of personal information.