• Title/Summary/Keyword: 뱅킹 서비스

Search Result 225, Processing Time 0.025 seconds

An Effect of Website quality on Service Value and Customer Satisfaction in the Internet Banking (인터넷뱅킹에서 웹사이트 품질이 서비스가치와 고객만족에 미치는 영향)

  • Jo, Cheol-Ho;Park, Jeong-Won;Kim, Jong-Won
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2006.04a
    • /
    • pp.216-223
    • /
    • 2006
  • An Effect of Website quality on Service Value and Customer Satisfaction in the Internet Banking Internet Banking is very popular in Korea these days. More than 25million are using Internet Banking. This study is to find Quality Factors for Internet Banking Services and relationship among Internet Banking Service Value, Customer Satisfaction and Reuse. In this study we found that Service Value is prior to Customer Satisfaction. And also, Service Value and Customer Satisfaction affect customers reuse respectively. This study also found that 7 factors compose Internet Banking Service Quality. They are Convenience Security, Informal ion Providing, Communication, Design, System Correcteness. Convenience, Informal ion Providing, Communication and Design affect Internet Banking Service Value. System, Correcteness and Convenience affect Customer Satisfaction. So we learened that Internet Banking Customers discriminate Service Value from Satisfaction.

  • PDF

Development of Integrated Preservation System for Fingerprint Recognition (지문인식 통합 보안 시스템 개발)

  • Kang, Young-Goo;Jin, Jin-Yu;Yang, Hae-Sool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.22-24
    • /
    • 2008
  • 인문 인식기술은 생체인식기술 가운데 안전성과 편리성 면에서 기능이 뛰어나고, 가장 간편하면서도 비용이 많이 들지 않으며, 다양한 분야에 적용이 가능하다는 장점이 있다. 적용 범위는 출입통제, 근태관리, 빌딩통합시스템, 금융자동화기기, 컴퓨터보안 분야, 전자상거래 인증, 공항정보 시스템 등 다양하다. 본 연구에서는 출입보안 및 대여금고, ATM(금융자동화기기)에 지문인식 기술을 적용을 통해 고객이 영업점을 방문하지 않고 가정에서도 금융업무가 가능한 인터넷뱅킹, 전자상거래 등과 같은 서비스에 인문인식 기술이 도입한 통합보안시템을 구축하며 활용방안을 제시하고자 한다.

Development a Mobile Transportation Payment System of Used Smartcard (스마트카드를 이용한 모바일 교통결재 시스템 개발)

  • Lee, Sang-Bum;Jung, Hyun-Ho;Choi, Lee-Kwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.171-179
    • /
    • 2011
  • In these days, various wireless internet services are possible since the advanced wireless networks enable to transfer more data than before and smarter devices have developed to display the multimedia information more efficiently. Therefore, Korean MIPS such as SKT and LGT provide many kinds of advanced services such as wireless on-line shopping, mobile banking system and etc using 2.5 generation wireless network technology and smartcards. In a transportation system, a cellular phone can be used as a useful payment tool since most people always keep it and a mobile payment system has developed as infrastructure for wireless on-line services. In this paper, a mobile transportation payment system is introduced. A driver needs to pay a toll fee when he/she uses the highways. Recently, a high pass system has introduced, in which a vehicle can pass a toll gate without stopping to pay the fee to a counter. The payment is done automatically by an attached payment device. We have developed an advanced mobile system in which a smartcard embedded cellular phone is used as a payment device. The personnel and financial information is stored at a smartcard and the communication between the phone and OBU(On Board Unit) is done by Bluetooth.

Two layered Secure Password Generation with Random Number Generator (난수 발생기를 이용한 이중화 구조의 안전한 비밀번호 생성 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.867-875
    • /
    • 2014
  • Rapid development of internet service is enabling internet banking services in anywhere and anytime. However, service access through internet can be exposed to adversary easily. To prevent, current service providers execute authentication process with user's identification and password. However, majority of users use short and simple password and do not periodically change their password. As a result of this, user's password could be exposed to attacker's brute force attack. In this paper, we presented enhanced password system which guarantee higher security even though users do not change their current password. The method uses additional secret information to replace real password periodically without replacement of real password.

Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks (네트워크 대역폭 고갈 공격에 대한 정책 기반 재구성 가능 대역폭제어기)

  • Park Sang-kil;Oh Jin-tae;Kim Ki-young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.951-958
    • /
    • 2004
  • Nowadays NGN is developed for supporting the e-Commerce, Internet trading, e-Government, e-mail, virtual-life and multimedia. Internet gives us the benefit of remote access to the information but causes the attacks that can break server and modify information. Since 2000 Nimda, Code Red Virus and DSoS attacks are spreaded in Internet. This attack programs make tremendous traffic packets on the Internet. In this paper, we designed and developed the Bandwidth Controller in the gateway systems against the bandwidth saturation attacks. This Bandwidth con-troller is implemented in hardware chipset(FPGA) Virtex II Pro which is produced by Xilinx and acts as a policing function. We reference the TBF(Token Bucket Filter) in Linux Kernel 2.4 and implemented this function in HDL(Hardware Description Language) Verilog. This HDL code is synthesized in hardware chipset and performs the gigabit traffic in real time. This policing function can throttle the traffic at the rate of band width controlling policy in bps speed.

A study of service control strategies against infringement accidents (침해사고 대응을 위한 서비스 제어전략에 관한 연구)

  • Shin, Young-Sun;Park, Jin-Sub;Park, Jung-Jin;Lee, Hee-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.127-136
    • /
    • 2007
  • With the construction of vast networks, Internet based services such as online games and Internet banking are steadily increasing. As dysfunctions of the trend, various threats from worms/viruses to hacking are proliferating and new types and variations of worms/viruses are emerging. In response to the problems, telecommunication carriers and the government we establishing systems to cope with infringement accidents and resultant damages. However, in case of nationwide emergencies like the 1.25 Accident, infringement may spread rapidly while analyzing what kind of infringement it is and that may result in enormous losses. Thus, the paper purposed to analyze the states of infringement accidents occurring at each network and coping methods and checklist, based on the results. and to propose strategies for controlling services in case of large scale infringement accidents.

  • PDF

Design of An Fair Non-Repudiation Protocol Using Digital Signature Recorder (전자서명 기록기를 이용한 공정한 부인방지 프로토콜의 설계)

  • Lee, Yong-Joon;Oh, Hae-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9C
    • /
    • pp.1345-1351
    • /
    • 2004
  • Due to the overwhelming importance the Internet gained nowadays, more and more sophisticated security services are requested. However many applications such as Internet Banking, Home Trading System, Electronic Medical Recede, electronic commerce, etc. are related to non-repudiation. Non-repudiation services are one of these new security requirements. ill comparison to other security issues, such as privacy or authenticity of communications, non-repudiation has not been studied intensively. Informally, we say that a protocol is fair if at the end of the protocol execution either originator receives a non-repudiation of receipt evidence and recipient receives a non-repudiation of origin evidence or none of them receives any valid evidence. The most non-repudiation protocols rely on a trusted third party(TIP) that has to intervene during each protocols run. the TIP may create a communication bottleneck. ill this paper, we suggest the digital signature recorder that guarantees fairness logically and supplies minimal network bottleneck to be composed verification server physically.

A Study on System of OCSP server for Services (OCSP서버의 지속적인 서비스를 위한 시스템 연구)

  • Shin, Jaehoon;Choi, Haelahng;Shin, Donghwi;Won, Dongho;Kim, Seungjoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1270-1273
    • /
    • 2007
  • 최근 인터넷의 급속한 발달은 온라인 뱅킹, 인터넷 쇼핑몰 등에서의 실물 경제행위를 온라인상으로 처리할 수 있는 환경을 제공하지만 온라인상의 업무처리는 개인정보유출, 개인정보의 위조 및 변조 등의 문제를 가지고 있다. 사용자가 CA에게서 받은 인증서의 공개키로 전자서명 함으로써 개인정보유출, 정보의 위조 및 변조 등의 문제를 해결한 PKI(Public Key Infrastructure)기반의 인증서 검증시스템이 제안되어 사용되고 있다. 인증서 상태검증 방법에는 CRL(Certificate Revocation List)기반의 검증방식, OCSP(Online Certificate Status Protocol)기반의 검증방식 등이 있다. CRL기반의 인증서 검증방식은 인증서 취소목록을 검색해서 인증서의 유효성 여부를 응답하는 방식으로 시간이 지남에 따라 크기 증가와 오프라인 방식으로 인해서 목록을 다운받는 시간의 부담으로 인해서 OCSP방식이 제안되었다. 하지만 OCSP 방식 역시 서비스의 요청이 집중될 경우 문제가 발생될 수 있다. 그래서 분산된 OCSP를 구축하고 각 서버의 부하의 균형을 유지하기 위해 로드밸런싱 기법을 사용하고 있지만 그 방법 역시 지속적인 서비스 제공이 불가한 문제를 가지고 있다. 본 논문에서는 서비스 요청의 집중으로 인한 시스템 마비나 각 응답서버의 부하가 불균형적임으로써 생길 수 있는 문제를 해결할 수 있는 방법을 제안한다.

A Study of Accident Prevention Effect through Anomaly Analysis in E-Banking (전자금융거래 이상징후 분석을 통한 사고예방 효과성에 관한 연구)

  • Park, Eun Young;Yoon, Ji Won
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.119-134
    • /
    • 2014
  • Financial companies are providing electronic financial transactions through a variety of user terminals for non-face-to-face services such as Internet banking, smart phone banking, or etc. However, in these services users' security awareness and the limitations of technical responses has frequently caused the financial loss so that fundamental protection measures are required from financial authorities. Accordingly, financial industry is planning and establishing systems that block unusual financial transactions by comprehensively analyzing and detecting user's electronic information, access information, transaction information, and so on in accordance with "Guide for building Unusual financial transactions detection system" to prevent the financial loss that happens in electronic financial transactions. In this paper, we analyze case studies of unusual financial transactions detection and prevention system that is built and operated in financial companies and current operating status and propose effects of the accident prevention and security measures later.

A Study on improvement for a means of access to electronic financial service (전자금융서비스 접근매체 변화에 따른 법제도 개선방안)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.17-22
    • /
    • 2015
  • As financial deregulation policies implemented by the government, electronic financial service is improved but security concerns are increasing and ultimately weaken trust in the financial service. Electronic financial service becomes more and more dependant on the IT platform and the initiatives of access device is also gradually shift to that platform. As biometric sensor is mounted on the smartphone, structural change in the access device is coming. It must be a positive signs in terms of fintech development, in the other side, it can cause many problems such as weakness of regulation and ambiguity of principals of responsibility. So in this paper, by analysing this problem-the shift of service initiative-on the access device I'll propose the best way to the the legal amendments.