• Title/Summary/Keyword: transaction certificate

Search Result 36, Processing Time 0.026 seconds

A Study on the International Business English focusing on Reading (읽기를 중심으로 한 무역영어에 관한 연구)

  • Park, Eun-Ok
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.36
    • /
    • pp.173-194
    • /
    • 2007
  • The purpose of this article is primarily to give prominence to the importance of International Business English education. Although English is one of the most crucial parts in international business transaction it has not been treated as one of academical sciences. As English is a main language when the international business transaction is done International Business English should be studied by scholars who majored in international business area. It is true that there has been no study at all regarding International Business English(in this article, it does not mean General International Business English) so far. Anyone who does and learn the international business should have some opportunities to have a contact towards international business correspondence and other documents before they do in reality. However, in Korea, most English education has been focused on general English and English certificate tests at universities. At universities' level, it is certainly a scholars' task to study International Business English education in order to provide decent education to the students. For doing so, this article examine, focusing only on reading part, how International Business English should be taught and especially, how reading skills should be activated and integrated with other language skills. This objective will be fulfilled by asking, what reading means in International Business English, as well as what role reading plays in International Business English education.

  • PDF

A Comparative Analysis of PKI Authentication and FIDO Authentication (PKI 인증과 FIDO 인증에 대한 비교 분석)

  • Park, Seungchul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1411-1419
    • /
    • 2017
  • The two factor authentication capability, private key possession and key protection password knowledge, and the strong public key cryptography protocol of PKI authentication have largely contributed to the rapid construction of Internet transaction trusted infrastructure. The reusability of a certificate-based identity for every PKI site was another contribution factor of the spread of PKI authentication. Nevertheless, the PKI authentication has been criticised mainly for the cost of PKI construction, inconvenience of individual certificate management, and difficulties of password management. Recently FIDO authentication has received high attention as an alternative of the PKI authentication. The FIDO authentication is also based on the public key cryptography which provides strong authentication services, but it does not require individual certificate issuance and provides user-friendly and secure authentication services by integrating biometric technologies. The purpose of this paper is to concretely compare the PKI-authentication and FIDO-authentication and, based on the analysis result, to propose their corresponding applications.

A Study on the Examination Criteria and Case Study of Certificate of Origin in ISBP 745 (ISBP 745에서 원산지증명서의 심사기준과 사례분석)

  • Jeon, Soon-Hwan
    • International Commerce and Information Review
    • /
    • v.16 no.3
    • /
    • pp.203-221
    • /
    • 2014
  • ICC Banking Commission have approved the new version of ISBP for UCP 600(Publication 745) on April 17, 2013. This is called the ISBP 745. This revised version of ISBP includes a lot of shipping documents including bill of exchange. These shipping documents stated in the ISBP 745, especially the certificate of origin is the document necessary for carrying out the customs formalities in FTA era. Particularly, practitioners such as bankers, buyers and sellers, lawyers, freight forwarders and carriers in import and export transactions have to know the UCP 600 and ISBP 745 (2013) thoroughly in order to avoid the disputes due to discrepancies of the documents with the terms and conditions of the credit. The purpose of this article is to reduce the disputes occurred in the credit transaction by providing the examination criteria and case study of the certificate of origin in ISBP 745.

  • PDF

Study on a Real Time Based Suspicious Transaction Detection and Analysis Model to Prevent Illegal Money Transfer Through E-Banking Channels (전자금융 불법이체사고 방지를 위한 실시간 이상거래탐지 및 분석 대응 모델 연구)

  • Yoo, Si-wan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1513-1526
    • /
    • 2016
  • Since finance companies started e-banking services, those services have been diversified and use of them has continued to increase. Finance companies are implementing financial security policy for safe e-banking services, but e-Banking incidents are continuing to increase and becoming more intelligent. Along with the rise of internet banks and boosting Fintech industry, financial supervisory institutes are not only promoting user convenience through improving e-banking regulations such as enforcing Non-face-to-face real name verification policy and abrogating mandatory use of public key certificate or OTP(One time Password) for e-banking transactions, but also recommending the prevention of illegal money transfer incidents through upgrading FDS(Fraud Detection System). In this study, we assessed a blacklist based auto detection method suitable for overall situations for finance company, a real-time based suspicious transaction detection method linking with blacklist statistics model by each security level, and an alternative FDS model responding to typical transaction patterns of which information were collected from previous e-Banking incidents.

ID-based Payment Protocol for Mobile Electronic Commerce (모바일 전자상거래를 위한 ID 기반 지불 프로토콜)

  • 이현주;김선신;이충세
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.405-413
    • /
    • 2004
  • Design an efficient and secure electronic payment system is important for M-Commerce. In this paper, we propose an efficient Micro-Payment Protocol that allows multiple transactions using ID-based public key cryptosystem. Current PayWord system requires to generate certificate of the vendor for each transaction. In this paper, we use a session key instead of certificate key generated by Weil Pairing which use an Elliptic Curve Cryptosystem over finite field $F_q$ for transactions Therefore, it is more secure in Known key attacks as well as Man-in-the-middle attacks.

A Comparative Study on the Documentary Conditions of International Trade Transaction (국제무역거래에서의 서류조건에 관한 비교연구 - Incoterms(R) 2010규칙과 UCP 600규칙을 중심으로 -)

  • Sin, Jung-Sik
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.54
    • /
    • pp.99-122
    • /
    • 2012
  • According to the United Nations Convention on the International Sale of Goods, the Seller must deliver the goods, hand over any documents relating to the them and transfer the property the to the goods as required by the contract, and buyer must pay the price for the goods and take delivery of them as required by the contract. In particular, the seller provides the documents is important. If the documents are discrepancies in credit, the beneficiary may not receive the payment. So It is important to study on conditions of documents in international trade. Documents provided by the seller shall be determined by express terms. If there is no agreement on the express terms, it shall be determined by the implied terms or governing law terms. In practice Seller shall provide the documents are as follows, For example, transport documents, commercial invoice, certificate of origin, insurance policy, packing list, inspection certificate etc. As stated above if it can not be determined by express terms, it is determined by the implied terms. In international trade, leading to the implied terms is incoterms(R) 2010 and UCP 600. Incoterms(R) 2010 define the seller must provide the goods and the commercial in conformity with the sales contract and any other evidence of conformity that may be required by the contract and UCP 600 are rules that apply to documentary credit. This paper, the practical utility between Incoterms(R) 2010 and UCP 600 is studied.

  • PDF

The Study on Improvement Plan of FTA Origin Information Management System (FTA 원산지정보 관리체계 개선방안에 관한 연구)

  • Jin, Byung-Jin
    • International Commerce and Information Review
    • /
    • v.18 no.2
    • /
    • pp.107-127
    • /
    • 2016
  • There has not been enough distribution of documentary evidence of origin at the stage of domestic transaction yet due to the exporter bias of interest in utilizing FTA and shortage of attracting their issues, etc. although about more ten years has passed since Korea-Chile FTA was running. Furthermore, in case of issued and distributed documentary evidence of origin, the accuracy was doubt, so it contains various problems like errors in the certificate of origin issued by the final exporter. Accordingly, this study was to find out the limitations of 'declaration of origin third party confirmation system' operated in order to solve problems of lacking the management ability of origin place of the domestic supplier and improve the accuracy of certificate of origin (comprehensive), and to investigate a method of improvement. To achieve this, this study was to suggest the institutional complementary plans for distribution activation and error prevention on the declaration of origin and introduction plan of loss prevention plan due to the errors in the certificate of origin that the final exporter did not intend in the domestic areas in order to support the use of FTA smoothly for our enterprises.

  • PDF

A Study on the Utilization Schemes of E-Commerce for the Consumer Protecion (소비자보호를 통한 전자상거래 활성화 방안 연구)

  • Park, Chu-Hwan;Lee, Yong-Pil
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.3
    • /
    • pp.39-56
    • /
    • 2004
  • This study introduces consumer protection policies at domestic and overseas, regarding the current situation that is raised about, and analyzes how to promote e-commerce with consumer protection oriented. This article explores e-commerce protection policies aiming at enforcing consumer protection and introduces some strategies - enhancing consumer trust, improving electronic transaction disputation, personal information security and privacy and using authorized certificate. This paper aims at suggesting the method of promoting e-commerce through ensuring the consumer trust and decreasing the transaction cost.

  • PDF

Enhanced Transaction Signing-based Authentication Scheme for Secure Internet Banking (안전한 인터넷 뱅킹을 위한 트랜잭션 서명기법에 관한 연구)

  • Lim, Hyung-Jin;Lee, Jeong-Gun;Kim, Moon-Seong
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.73-79
    • /
    • 2008
  • Nowadays, all over the world's banks use internet banking through various authentication methods. Although there are strong authentication methods using OTP (One Time Password), there still has vulnerability from sophisticated attacks such as MITM (Man In The Middle). This letter proposes signing-based authentication protocol that copes with attacks, such as MITB (Man In The Browser), and provides non-repudiation function. The protocol shows generic method to prevent the sophisticated attacks through connecting advantages from OTP and PKI (Public Key Infrastructure) certificate, and that can be deployed to various extended form in internet banking.

  • PDF

PayWord System using ID-based tripartite Key Agreement Protocol (ID 기반 키동의 프로토콜을 이용한 PayWord 시스템)

  • 이현주;이충세
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.348-353
    • /
    • 2004
  • Development of an efficient and secure payment system is prerequisite for the construction of electronic payment mechanism in mobile environment. Since current PayWord protocol system generates vendor's certificate for each transaction, it requires lot of operation for transaction. In this paper, we use a session key generated by ID-based tripartite Key agreement protocol which use an Elliptic Curve Cryptosystem over finite field $F_{q}$ for transactions. Therefore, our protocol reduces algorithm operations. In particular, proposed protocol using ID-based public key cryptosystem has the advantages over the existing systems in speed and it is more secure in Man-in-the-middle attacks and Forward secrecy.