• Title/Summary/Keyword: 신용카드사용

Search Result 162, Processing Time 0.025 seconds

Anti-Fraud System for Credit Card By Using Hybrid Technique (Hybrid 기법을 적용한 효율적인 신용카드판단시스템)

  • 조문배;박길흠
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.5
    • /
    • pp.25-32
    • /
    • 2004
  • An anti-fraud system that utilizes association rules of fraud as well as AFS (Anti Fraud System) for credit card payments in e-commerce is proposed. The association rules are found by applying the data mining algorithm to millions of transaction records that have been generated as a result of orders on goods through the Internet. When a customer begins to process an order by using transaction components of a secure messaging protocol, the degree of risk for the transaction is assessed by using the found rules. More credit information will be requested or the transaction is rejected if it is interpreted as risky.

Protection Plan of Trustee Personal Credit Information for Credit Card Company Using Cloud Computing (클라우드컴퓨팅 이용 신용카드사의 영세수탁자 개인신용정보 보호방안)

  • Kim, Shi-in;Kim, In-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.885-895
    • /
    • 2019
  • As seen in recent cases of hacking in financial services, attackers are attempting to hacking trustee with poor security management, rather than directly hacking a financial company. As a result, the consignor is strengthening the security check and control of the trustee, but small trustee has difficulties to invest in information security with the lack of computer facilities and the excessive cost of security equipment. In this paper I investigate the vulnerability of personal information processing life cycle standards in order to enhance the security of small consignee that receive personal information form the credit card company. To solve the vulnerability the company should use litigation management system constructed on cloud computing service and install VPN to secure confidentiality and intergrity in data transfer section. Also, to enhance the security of users, it is suggested to protect personal credit information by installing PC firewall and output security on user PC.

UHF & HF RFID Credit Card Size Tag Antenna Designs Using Silver-Ink and Jumper Structure (실버잉크와 점퍼구조를 사용한 신용카드 크기의 UHF & HF RFID 태그 안테나)

  • Nam, Sehyun;Chung, Youchung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.11
    • /
    • pp.972-977
    • /
    • 2016
  • This paper introduces development process and results of HF & UHF band(13.56 MHz, 920 MHz) tag antennas using a single-side printing method on a PE film. The size of tag antenna is designed in the area of $80mm{\times}50mm$, little bit smaller than a credit card. The UHF tag antenna, $76mm{\times}44mm$, is located at the outside of the card size tag antenna, and the HF tag antenna, $40 mm{\times}42 mm$, is located at the center of the UHF tag antenna. The UHF and HF tag antennas are designed with consideration of coupling effects. The single-side printing method with a jumper structure without using a via is used to make a loop antenna of HF tag antenna. The reading range of UHF tag antenna is about 6m, and the reading of HF tag antenna is about 5 cm. The designed tag antennas have long enough reading ranges for both bands. The tag is applicable to logistics and authentification.

A Study on Shopping Orientation and Store Selection Criteria of Credit Card Apparel Shoppers (신용카드 사용 의류구매자의 쇼핑성향과 점포선택기준)

  • 정수경;김용숙
    • Journal of the Korean Society of Costume
    • /
    • v.53 no.2
    • /
    • pp.1-16
    • /
    • 2003
  • The purpose of this was to identify the shopping orientation and store selection criteria of credit card apparel shoppers. The subjects were credit card holding women who had experienced credit card apparel shopping at least one time during last 6 months. The results were as follows : 1. Women of 20's were segmented into multi-cards holding light users, multi-cards holding heavy users, and mono-card holding light users according their credit card numbers and the monthly credit card apparel expenditure. 2. The factors of apparel shopping orientation were pleasure, economy, brand loyalty. self-confidence. shopping plan, and fashion. And the factors of store selection criteria were additive service, store atmosphere, Product assortment, sales promotion. and product diversity. 3. Multi-card holding light users showed higher tendency in self-confidence and economy of shopping orientation, and considered additive service more. Multi-card holding heavy users showed higher tendency in pleasure. brand loyalty, self-confidence, shopping plan, and fashion of shopping orientation, and considered sales promotion and product diversity. Mono-card holding light users showed lower tendency in pleasure. brand loyalty, self-confidency, shopping plan, and fashion, and considered additive service, store atmosphere. product assortment, sales promotion, and product diversity less.

Design and Implementation of Multi-functional Java Card for AMR (원격검침을 위한 다기능 자바카드 설계 및 구현)

  • Kang, Hwan-Soo;Cho, Jin-Hyung;Kwon, Kwi-Seok;Lee, Jong-Man;Kang, Hwan-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.64-72
    • /
    • 2009
  • AMR(Automatic Meter Reading), which means that it reads the meter of electricity, gas, or water, etc at a remote place automatically through wired or wireless communication, has been studied in terms of Power Line Communication method and Local Area Wireless Communication method, etc. In this paper, we designed and implemented JCA(Java Card for AMR) capable of AMR, which is based on java Card technology indispensable to the ubiquitous world. In this paper, JCA follows standard transactional procedures offered by power supply company and manages power usage log and billing data, and is designed in order to satisfy EMV multi-functional specifications. Because JCA is a multi-functional smart card capable of post-issuance applets as an open platform, it is installed into other applications of affiliated concerns as well as credit card and traffic card applications. Not only the proposed JCA is a low cost system, compared to other AMR systems, but is capable of paying rates in advance or later by applying authentication and security function of java Card. In addition the proposed JCA system can create value added services such as affiliated services with corporate alliance.

Design and Implementation of Face Recognition Security System for ATM based on extracting skin color using Java (Java로 구현한 피부색 추출 기반 ATM 안면 인식 보안 시스템의 설계 및 구현)

  • Kang, Bo-Gyung;Bae, Seok Chan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.373-376
    • /
    • 2010
  • 요즘 현금카드나 신용카드를 훔치고 비밀번호를 알아내 ATM(현금자동지급기)에서 현금을 인출하는 범죄가 늘고 있는데 범인들은 대부분 선글라스, 안경, 마스크, 모자 등으로 얼굴을 가리고 인출을 함으로 은행의 CCTV는 범인색출에 거의 도움이 되지 않는다. 본 논문에서의 영상처리는 모두 Java언어를 사용하였으며 피부색을 사전 추출하는 과정을 거쳐 구현된 분류기능을 이용해 얼굴의 이목구비들의 위치를 인식하도록 한다. 이는 ATM이용자가 선글라스, 안경, 마스크 등으로 얼굴을 가리면 기기에서 애초에 서비스 받는 것을 불가능 하게 하여, 범죄를 예방할 수 있게 한다. 또한 카드의 사용자 정보와 서비스를 시도했던 시간과 캡쳐 이미지를 저장해 놓음으로써 범인의 인상착의, 알리바이 등을 확인하는데 크게 도움을 주는 ATM 안면 인식 보안 시스템의 가능성을 제안하고자 한다.

안전한 사용자 식별 번호 입력을 위한 사용자 인터페이스

  • Lee, Mun-Kyu
    • Review of KIISC
    • /
    • v.24 no.3
    • /
    • pp.27-35
    • /
    • 2014
  • 사용자 식별 번호(personal identification number: PIN)는 은행 계좌, 신용카드, 스마트폰, 도어락 등 다양한 응용에서 널리 활용되는 사용자 인증 수단이나, 전통적으로 사용되어 온 PIN 입력 방식은 PIN을 입력하는 과정을 어깨 너머로 지켜본 공격자가 이를 기억하여 그대로 입력에 사용하는 엿보기 공격 등 안전성에 많은 문제점을 가지고 있다. 본 고에서는 이러한 문제점을 해결하기 위한 그동안의 연구 결과들을 살펴보고, 향후 안전한 PIN 입력 방식의 연구에서 고려되어야 할 요소들을 도출한다.

Virtual Credit Card Number Payment System with Stored Hash Value for Efficient Authentication (효율적인 인증을 위한 해시 저장방식의 가상카드번호 결제 시스템)

  • Park, Chan-Ho;Kim, Gun-Woo;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.5-15
    • /
    • 2015
  • Electronic transactions have been increasing with the development of the high-speed Internet and wireless communication. However, in recent years financial corporations and mobile carriers were attacked by hackers. And large numbers of privacy information have been leaked. In particular, in the case of credit card information can be misused in the online transaction, and the damage of this given to cardholder. To prevent these problems, it has been proposed to use a virtual card number instead of the actual card number. But it has security vulnerability and requires additional security infrastructure. In this paper, we analyzed the proposed virtual card number schemes. and we propose a new virtual credit card number scheme. In the newly proposed scheme, cardholder generates a key pair (public key/private key) and pre-register public key to the issuer. then, cardholder can pay no additional security infrastructure while still efficiently satisfy the security requirements.

Software integrity verification method in POS system (POS시스템 내 소프트웨어 무결성 검증 방안)

  • Cho, Sung-A;Kim, Sung Hoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.987-997
    • /
    • 2012
  • A Point-of-Sales (POS) terminal manages the selling process by a salesperson accessible interface in real time. Using a POS system makes a business and customer management much more efficient. For these reasons, many store install POS terminal and used it. But it has many problem that stealing personal information by hacking and insider corruption. Because POS system stored payment information like that sales information, card valid period, and password. In this paper, I proposed software integrity verification technique in POS system based on White list. This method can prevent accidents that personal information leak by hacking and POS system forge and falsification. This proposed method provides software integrity, so it can prevent inside and outside threats in advance.