• Title/Summary/Keyword: personal credit information

Search Result 92, Processing Time 0.022 seconds

A Study On the Design of MyData API G/W (마이데이터 API G/W 설계 연구)

  • Sehjoon Dokko;Changwon Choi
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.47-54
    • /
    • 2023
  • The MyData service makes anyone possible to apply the personal information for the personal credit management or the financial management by proactive managing his/her own information. The MyData means that the anyone is able to control or manage the its own information by changing from the company-oriented or the organization-oriented information to his/her own information. It is mandatory to develop the API G/W which transforms the different user format to the standard format to support the MyData service. This study is to design the API G/W for the MyData service and the designed API G/W supports the 4 major functions - Validation function, Throttling function, Authentication&Authorization function, Mediation function. The designed API G/W make it possible to support the safely and efficient MyData service by serving the various queries with the different formats.

A Empirical Study on the Changed Consumer Perception to Internet Based Channel (인터넷 기반 유통경로에 대한 소비자인식의 변화에 관한 실증적 연구)

  • Jung, Ki-Su;Moon, Seung-Jae
    • Journal of Industrial Convergence
    • /
    • v.1 no.1
    • /
    • pp.143-157
    • /
    • 2003
  • This paper examines the changed consumer perception to internet based channel. Internet based channel has time merit, place merit, assortment merit, compatibility merit, and so on. For seller, in the mean while, it has merits in the way of diminishing physical distribution cost, promotion cost, and reaching globally in the same time. In spite of so many merits of internet based channel, there were many types complain in past. Most of all, consumers expect that it will provide low-price merit to consumer, because it doesn't need shop, warehouse, stock, etc. Based on the empirical analyses in past, it didn't work, especially to price oriented consumer's perception. But in this research, it shows changing consumer's perception. Comparing past data with current data, we found outstanding gross in price related variables figure. But, in goods delivery related factors and personal credit information related factor, consumer recognized much more negatively yet. So, we conclude that even though some factors show improved perception, there are tasks to solve. We will observe the tuning point at that time.

  • PDF

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

Secure Sharing and Recovering Scheme of e-Business Data Based on Weight Table (가중치 테이블 기반 안전한 e-비즈니스 데이터 분할 복원 방식)

  • Song, You-Jin;Kim, Jin-Seog
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.27-36
    • /
    • 2009
  • The leaking of personal information is mostly occurred by internal users. The confidential information such as credit card number can be disclosed or modified by system manager easily. The secure storaging and managing scheme for sensitive data of individual and enterprise is required for distributed data management. The manager owning private data is needed to have a weight which is a right to disclose a private data. For deciding a weight, it is required that system is able to designate the level of user's right. In this paper, we propose the new algorithm named digit-independent algorithm. And we propose a new data management scheme of gathering and processing the data based on digit-independent algorithm. Our sharing and recovering scheme have the efficient computation operation for managing a large quantity of data using weight table. The proposed scheme is able to use for secure e-business data management and storage in ubiquitous computing environment.

A Study on the Improvement of the Malware Evidence Collection Module Based On Windows (윈도우 기반 악성코드 증거 수집 모듈 개선에 관한 연구)

  • Heo, Geon-Il;Park, Chan-Uk;Park, Won-Hyung;Kuk, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.61-68
    • /
    • 2010
  • Recently a malware is increasing for leaking personal data, credit information, financial information, etc. The secondary damage is also rapidly increasing such as the illegal use of stolen name, financial fraud, etc. But when a system is infected by a malware of leaking information, the existing malware evidence collection tools do not provide evidences conveniently or sometimes cannot provide necessary evidences. So security officials have much difficulty in responding to malwares. This paper analyzes the current status and problems of the existing malware evidence collection tools and suggests new ways to improve those problems.

Study of Hacking Attacks Secure Payment(ISP) with Smishing (스미싱을 이용한 안전결제(ISP) 해킹 공격 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.267-270
    • /
    • 2013
  • Hacking damage is increasing year by year in the Internet payment service credit card applying the digital signature method of PKI-based first domestic, secure payment, was 180 million won in 2012. Revenues have soared for phishing that Smishing using smartphone after entering 2013. Hacking accident to the secure payment system using Smishing has occurred took over personal information and financial direct damage. In this paper, we analyzed for Smishing, to prevent the damage of secure payment using Smishing to study the hacking attack of secure payment. In addition, it would be studies to allow through the smartphone, online payment safer and more convenient.

  • PDF

A Study on the Object of the Fraud by Use of Computer

  • Lim, Jong-hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.137-145
    • /
    • 2015
  • The Criminal Law of South Korea has needed to cope with new kinds of crimes such as the fraud by use of computer efficiently in a legislative way because the society has witnessed the rapid progress of the industrialization and informatization after established in 1953. As a result, the Criminal Law revised on December 29, 1995, created the regulations of the crimes related to fraud by use of computer, work disturbance, and secret piracy by using information processing units. The regulation stipulated in Clause 347, Article 2 of Criminal Law is the most typical one against the new crimes. However, the new regulation of fraud by use of computer, established and revised to supplement the lacking parts of the current rules of the punishment of fraud, limits its object to "any benefits to property." not to "property" itself, and so cannot achieve the purpose of the revision of the law. This paper aims to suggest a new legislative measure about the object of the regulation of fraud by use of computer to solve this kind of problem efficiently.

A study on the success factor of the Sam Bo Hwa Seong Co., Ltd. (중소기업 성공요인에 관한 연구)

  • 전영승
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.3
    • /
    • pp.56-64
    • /
    • 2000
  • The purpose of this study is to analyze the success factors of the Sam Bo Hwa Seong Co., Ltd. this research is case study. In order to accomplish the objective, 1 had personal interview with the present Kim and reviewed business policy and company regulation. The main success factors of the Sam Bo Hwa Seong corporation are as following: first, a large experience of the top management, second, the artisan spirit and a mission sense of the CEO, third, a strong thrust of the present Kim, fourth, the partnership between labor and management, fifth, an exhaustive credit and a perfect quality control, sixth, research and development investment for the technical improvement. The result of this research will be a useful information to the management in small-medium firms and to the reserve management who wants establishment of the corporation.

  • PDF

Comparison of the Practical Use Condition of e-finance Portal Site between Korea and U.S.A. (한.미간 e-finance 금융포털사이트의 활용실태 비교)

  • Kim Dong-Gyoon;Cha Soon-Kwean
    • Management & Information Systems Review
    • /
    • v.7
    • /
    • pp.21-51
    • /
    • 2001
  • For increasing the competitiveness and efficiency of Korea's finance industry under the new e-finance paradigm, this paper compared the practical use of finance portal site' on service parts and stage between Korea and U.S.A.. The services which can be served from site are banking, mortgage and credit loan, stock, card, retirement tax, PFM(Personal Finance Management), EBPP(Electronic Bill Presentment and Payment) and Account Aggregation and so on. The stage of site can be divided as the information provide stage which only gives information about service parts, on-line transaction stage which real-time transaction is possibile and PFM services provide stage according to development process. As a result, the beginning of finance portal service in Korea was lated about 10years and more than it of U.S.A. So the development stage of domestic portal site is still staying in the first step and the providing services and contents or business model development parts are also in the same stage than U.S.A. Resides, Korea's sites mainly focus on their first service parts even though they recently aim internet finance portal, and provide not real time transaction but finance information. On the other hand, the U.S.A. site support substantially not only various on-line transactions but also distinctive personal services like PFM(Personal Finance Management), EBPP(Electronic Bill Presentment and Payment), Account Aggregation and Trans-account, brokerage, education center, mortgage loan, mutual fund, option, pension fund and IPOs and so on. Thus, the site of Korea need to establish real type of internet finance portal which provides one-stop services on every type of finance to customers in the real time and also require the strategic integration among finance institutions. The next turn, they need to build information system and education center to give best satisfaction to customers and acquire customer information and marker environment changes and need to provide distinctive services to quality customers throughout database from this. Also the site should provide various type of banking services which refereed above like PEM, EBPP and education center etc, and the government of Korea should support the building of IT infrastructure to Physical, legal, systematic, sociocultural, technical and human resource sections. This paper provided the future movement direction of the domestic finance portal through comparison and analysis on the practical use of it between Korea and U.S.A. and also wanted to contribute for developing and reading of Korea finance portal in the new era of the finance paradigm.

  • PDF

A Study on the Recognition of Face Based on CNN Algorithms (CNN 알고리즘을 기반한 얼굴인식에 관한 연구)

  • Son, Da-Yeon;Lee, Kwang-Keun
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • Recently, technologies are being developed to recognize and authenticate users using bioinformatics to solve information security issues. Biometric information includes face, fingerprint, iris, voice, and vein. Among them, face recognition technology occupies a large part. Face recognition technology is applied in various fields. For example, it can be used for identity verification, such as a personal identification card, passport, credit card, security system, and personnel data. In addition, it can be used for security, including crime suspect search, unsafe zone monitoring, vehicle tracking crime.In this thesis, we conducted a study to recognize faces by detecting the areas of the face through a computer webcam. The purpose of this study was to contribute to the improvement in the accuracy of Recognition of Face Based on CNN Algorithms. For this purpose, We used data files provided by github to build a face recognition model. We also created data using CNN algorithms, which are widely used for image recognition. Various photos were learned by CNN algorithm. The study found that the accuracy of face recognition based on CNN algorithms was 77%. Based on the results of the study, We carried out recognition of the face according to the distance. Research findings may be useful if face recognition is required in a variety of situations. Research based on this study is also expected to improve the accuracy of face recognition.