• Title/Summary/Keyword: 인터넷 금융거래

Search Result 122, Processing Time 0.021 seconds

Design and Implementation of an Application for Internet Banking (인터넷뱅킹을 위한 어플리케이션의 설계 및 구현)

  • 남철기;장길상
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.2
    • /
    • pp.95-113
    • /
    • 1999
  • Recently, Internet services are rapidly spreading all over the world. Internet will have a great influence on financial market and banking industry. Customers will obtain full banking services over Internet. Thus, Internet banking is an unavoidable choice to strengthen the competitive edge of banks. This paper designs and develops an application for Internet banking services in the existing banks. The implementation of Internet banking requires the construction of website, web pages and links to other related information. Using Oracle DBMS(Database Management System), Oracle Application Server, PL/SQL(Procedural Language/SQL), Java Applet, and Java Script, a prototype for Internet banking is implemented.

  • PDF

EPCglobal Network-Based Internet Escrow Service for Secure e-Commerce (EPCglobal 네트워크 기반 인터넷 에스크로 서비스)

  • Kim, Dong-Min;Huh, Jung-Hyun;Lee, Yong-Han;Rhee, Jong-Tae
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.4
    • /
    • pp.87-106
    • /
    • 2006
  • Today as the scale of e-commerce constantly expands, the number and the amount of the consumer frauds are also increasing very rapidly, without sufficient levels of systematic support to prevent them. Internet Escrow service is one of the promising payment mechanisms, which guarantees secure electronic trades and payments. Especially, if the real-time product delivery information is available via RFID-based track-and-trace environment, the security and efficiency of the Internet Escrow services would be improved a lot. In this research, proposed a novel approach to integrate EPCglobal Network, which is a de-facto standard for RFID-based information network model, with Internet Escrow services. The proposed service model was implemented in the form of "Integrated Financial Platform", which supports the contracts among trading partners and the payment via Escrow services by being fully integrated with bank systems. Using the implemented EPCglobal Network-based Escrow service system, we would be able not only to shorten the money-flow cycle and to develop new kinds of loan services, but also to overcome the problems of existing Escrow services including the lack of product-related information and the delay of purchasing decisions.

  • PDF

An Analysis on the Vulnerability of Secure Keypads for Mobile Devices (모바일 기기를 위한 보안 키패드의 취약점 분석)

  • Lee, Yunho
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.15-21
    • /
    • 2013
  • Due to the widespread propagation of mobile platforms such as smartphones and tablets, financial and e-commercial transactions based on these mobile platforms are growing rapidly. Unlike PCs, almost all mobile platforms do not provide physical keyboards or mice but provide virtual keypads using touchscreens. For this reason, an attacker attempts to obtain the coordinates of touches on the virtual keypad in order to get actual key values. To tackle this vulnerability, financial applications for mobile platforms use secure keypads, which change position of each key displayed on the virtual keypad. However, these secure keypads cannot protect users' private information more securely than the virtual keypads because each key has only 2 or 3 positions and moreover its probability distribution is not uniform. In this paper, we analyze secure keypads used by the most financial mobile applications, point out the limitation of the previous research, and then propose a more general and accurate attack method on the secure keypads.

A Study on the Priority of 『Personal Information Safety Measure』 Using AHP Method: Focus on the Defferences between Financial Company and Consignee (AHP 기법을 이용한 금융회사 『개인정보의 안전성 확보조치 기준』 우선순위에 관한 연구: 금융회사 위·수탁자 간 인식 차이를 중심으로)

  • KIM, Seyoung;KIM, Inseok
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.4
    • /
    • pp.31-48
    • /
    • 2019
  • To survive in the trend of the fourth industrial revolution, companies are putting a lot of attention and effort into personalization services using the latest technologies such as big data, artificial intelligence and the Internet of Things, while entrusting third parties to handle personal information on the grounds of work efficiency, expertise and cost reduction. In such an environment, consignors need to check trustees on a more effective and reasonable basis to ensure personal information safety for trustees. This study used AHP techniques to derive the importance and priority of each item of "Personal Information Safety Assurance Measures" for financial companies and trustees, and objectively compared and analyzed differences in perceptions of importance between financial institutions and trustees. Based on this, the company recognizes the difference between self-inspection of financial institutions and inspection of trustees and presents policy grounds and implications for applying differentiated inspection standards that reflect the weights appropriate for the purpose.

A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device (스마트 기기를 이용한 안전한 QR-Login 사용자 인증 프로토콜의 설계 및 중요 정보의 안전성 보증을 위한 방법)

  • Lee, Jae-Sik;You, Han-Na;Cho, Chang-Hyun;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.949-964
    • /
    • 2012
  • Our PC have been under constant threat of malicious codes and viruses today. As many new ways of cyber attacks are being developed, such as zero-day-attack, nobody's PC is guaranteed to be safe from the attacks. In case where a user uses the existing verification protocol on a unsecured PC, the user's verification information may well be threatened by sniffing or man-in-the-middle attack. Especially, deadly attacks like memory hacking would give hard time for users to even recognize any symptom of virus infection. Therefore, this paper designs secured QR-Login user verification protocol for smart devices that are ready to communicate with QR-Code and proposes a way to keep critical data safe when using the internet. This way, user would be able to safeguard his/her critical data even when under attack by unknown attacks and safely carry out extremely sensitive task, like financial trading, on the device.

Design of M-Commerce using UML (UML을 이용한 모바일 전자상거래 M-Commerce 설계)

  • 차석일;장철수;노명찬;정승욱;김현희;이정은;신동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.559-561
    • /
    • 2001
  • 인터넷은 21세기 산업발전의 원동력이며, 인류 역사상 가장 빠른 속도로 확산된 미디어로서 현재 인터넷 비즈니스는 유통은 물론 금융, 주식거래, 경매, 오락, 택배 서비스 등 산업 전반으로 빠르게 확산되고 있다. 빠른 환경변화와 더불어 다양한 인터넷 사업 모델이 계속 새로 등장하고 있으며, 그 중 전자상거래는 더 이상 새로운 기술이 아닌 우리 환경의 필수적인 요소로 자리잡고 있다. 현재 모바일 전자상거래는 시장 형성의 초기 단계로 무선 인터넷 시장의 상황과 수익 창출의 관점에서 볼 때는 무선 인터넷 포탈 서비스의 핵심이 될 것이다. 이러한 요구에 부응하기 위하여 본 논문에서는 전자상거래를 위한 시스템을 UML (Unified Modeling Language)로 설계하여 시스템의 특성에 맞게 사용자가 시스템을 사용할 수 있도록 한다.

  • PDF

A Study of Protection Profile and Analysis of Related Standard for Internet Banking Systems (인터넷 뱅킹 시스템 관련 표준 분석 및 보호프로파일 개발에 관한 연구)

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.223-232
    • /
    • 2010
  • Due to the advance of Internet, offline services are expanded into online services and a financial transaction company provides online services using internet baning systems. However, security problems of the internet banking systems are caused by a lack of security for developing the internet banking systems. Although the financial transaction company has applied existing internal and external standards, ISO 20022, ISO/IEC 27001, ISO/IEC 9789, ISO/IEC 9796, Common Criteria, etc., there are still vulnerabilities. Because the standards lack in a consideration of security requirements of the internet banking system. This paper is intended to explain existing standards and discusses a reason that the standards have not full assurance of security when the internet baning system is applied by single standard. Moreover we make an analysis of a security functions for the internet baning systems and then selects the security requirements. In this paper, we suggest a new protection profile of the internet baning systems using Common Criteria V.3.1 from the analysis mentioned above.

A Study on User Authentication Model Using Device Fingerprint Based on Web Standard (표준 웹 환경 디바이스 핑거프린트를 활용한 이용자 인증모델 연구)

  • Park, Sohee;Jang, Jinhyeok;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.631-646
    • /
    • 2020
  • The government is pursuing a policy to remove plug-ins for public and private websites to create a convenient Internet environment for users. In general, financial institution websites that provide financial services, such as banks and credit card companies, operate fraud detection system(FDS) to enhance the stability of electronic financial transactions. At this time, the installation software is used to collect and analyze the user's information. Therefore, there is a need for an alternative technology and policy that can collect user's information without installing software according to the no-plug-in policy. This paper introduces the device fingerprinting that can be used in the standard web environment and suggests a guideline to select from various techniques. We also propose a user authentication model using device fingerprints based on machine learning. In addition, we actually collected device fingerprints from Chrome and Explorer users to create a machine learning algorithm based Multi-class authentication model. As a result, the Chrome-based Authentication model showed about 85%~89% perfotmance, the Explorer-based Authentication model showed about 93%~97% performance.

Topic Analysis Using Big Data Related to 'Blockchain usage': Focused on Newspaper Articles ('블록체인 활용' 관련 빅데이터를 활용한 토픽 분석: 신문기사를 중심으로)

  • Kim, Sungae;Jun, Soojin
    • Journal of Industrial Convergence
    • /
    • v.18 no.1
    • /
    • pp.73-78
    • /
    • 2020
  • To analyze the main topics related to the use of blockchain technology, the Topic Modeling Technique was applied to the 'Blockchain Technology Utilization' big data shown in newspaper articles. To this end, from 2013 to 2019, when newspaper articles on the use of blockchain technology first appeared, the topics were extracted from 21 newspapers and analyzed by time to 15,537 articles. As a result of the analysis, articles related to the utilization of blockchain technology have increased exponentially since 2015 and focused on IT_science and economics. Key words related to cryptocurrency, bitcoin and virtual currency were weighted high, although they differed depending on time. Blockchain technology, which had focused on financial transactions, gradually expanded to big data, Internet of Things and artificial intelligence. As a result, changes in corporate topics were also made together to expand into various fields at banks for financial transactions, focusing on large and global companies. The study showed how these topics were changing, along with the main topics in newspaper articles related to the use of blockchain technology.

The Effect of Trust and Distrust on the Purchase Intention at Internet Shopping Malls - Focusing on the Chinese Users - (인터넷 쇼핑몰에서 신뢰와 불신이 구매의도에 미치는 영향 - 중국 인터넷 쇼핑몰 사용자를 중심으로 -)

  • Park, Hye-Ryeong;Lee, Jin-Yong
    • Proceedings of the Korean DIstribution Association Conference
    • /
    • 2006.05a
    • /
    • pp.103-115
    • /
    • 2006
  • 중국은 세계 무역기구에 가입하면서 세계경제에서 차지하는 위치가 강화되고 디지털 경제체제에 편입되면서 산업구조를 고부가가치 산업으로 개편하고 있다. 동안 상대적으로 외국기업에 대해 폐쇄적이었던 중국의 유통시장은 2006년부터 전면개방이 시작될 것으로 전망되고 있다. 그러나 중국전자상거래 시장에서 정보 기초화와 물류배송 금융체계의 문제는 나날이 안정화되어 온라인 구매환경은 나아지고 있으나, 오히려 해마다 인터넷쇼핑물 구매율의 하락은 온라인 쇼핑몰 상거래에 대한 불신 문제가 그대로 남아있음을 알 수 있다. 따라서 본 연구에서는 중국의 소비자수준에서의 온라인 구매가 활성화되지 못하는 주요 장애요인으로써 불신(distrust)을 제기하고자 하며 신뢰를 신뢰와 불신의 2차원으로 파악하여 각각의 차원(신뢰와 불신)이 마케팅 성과에 차별적으로 공헌하고 있음을 밝히고자 한다. 본 연구에서 선행변수로 상호작용, 지각된 평판, 정보유용성, 지각된 보안위험, 지각된 거래위험을 설정했으며 매개변수로는 신뢰와 불신을, 결과 변수로는 관계몰입과 구매의도로 구성하였다. 결과에서는 온라인 맥락에서는 신뢰와 불신의 선행요인이 온라인 쇼핑몰에 대한 관계몰입과 구매의도에 서로 차별적으로 공헌한다는 것을 밝혔다. 이는 기존의 신뢰를 2차원으로 구분하여 신뢰와 불신으로 분리하여 관리하는 것이 필요하다는 것을 시사한다고 할 수 있다.

  • PDF