• Title/Summary/Keyword: 전자카드

Search Result 563, Processing Time 0.03 seconds

Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern (사용자 입력 패턴 및 전자 금융 거래 패턴을 이용한 모바일 뱅킹 이상치 탐지 방법)

  • Min, Hee Yeon;Park, Jin Hyung;Lee, Dong Hoon;Kim, In Seok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.157-170
    • /
    • 2014
  • As the increase of transaction using mobile banking continues, threat to the mobile financial security is also increasing. Mobile banking service performs the financial transaction using the dedicate application which is made by financial corporation. It provides the same services as the internet banking service. Personal information such as credit card number, which is stored in the mobile banking application can be used to the additional attack caused by a malicious attack or the loss of the mobile devices. Therefore, in this paper, to cope with the mobile financial accident caused by personal information exposure, we suggest outlier detection method which can judge whether the transaction is conducted by the appropriate user or not. This detection method utilizes the user's input patterns and transaction patterns when a user uses the banking service on the mobile devices. User's input and transaction pattern data involves the information which can be used to discern a certain user. Thus, if these data are utilized appropriately, they can be the information to distinguish abnormal transaction from the transaction done by the appropriate user. In this paper, we collect the data of user's input patterns on a smart phone for the experiment. And we use the experiment data which domestic financial corporation uses to detect outlier as the data of transaction pattern. We verify that our proposal can detect the abnormal transaction efficiently, as a result of detection experiment based on the collected input and transaction pattern data.

A Study on the Magnetic Field Improvement for 13.56MHz RFID Reader Antenna (13.56MHz RFID 리더 안테나의 자계 필드 개선에 관한 연구)

  • Kim, Hyuck-Jin;Yang, Woon-Geun;Yoo, Hong-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.1-8
    • /
    • 2006
  • In this paper, we suggested a new antenna structure for the RFID(Radio Frequency IDentification) reader. The conventional RFID reader uses a loop antenna. The central area of a loop antenna shows a low magnetic field strength, especially for the case of a large loop antenna diameter. We proposed a parallel-fed multiple loop antenna. Simulation and measurement were carried out for a single loop antenna, series-fed and parallel-fed multiple loop antennas. Simulation results show that we can obtain 0.40A/m, 0.68A/m, 1.98A/m of magnetic field strengths at the central point of a reader antenna for a single loop antenna, series-fed and parallel-fed multiple loop antennas, respectively. We measured the $79mm{\time}48mm$ tag area averaged induced voltages with applying 20Vp-p same source signals to reader antennas through the resistors. Measured tag area averaged induced voltages at the central point of a reader antennas were 0.76V, 1.45V, 4.04V for a single loop antenna series-fed and parallel-fed multiple loop antennas, respectively. The results show that we can get high induced voltage which can grantee a longer reading distance with a proposed parallel-fed multiple loop antenna.

A Fast Inversion for Low-Complexity System over GF(2 $^{m}$) (경량화 시스템에 적합한 유한체 $GF(2^m)$에서의 고속 역원기)

  • Kim, So-Sun;Chang, Nam-Su;Kim, Chang-Han
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.9 s.339
    • /
    • pp.51-60
    • /
    • 2005
  • The design of efficient cryptosystems is mainly appointed by the efficiency of the underlying finite field arithmetic. Especially, among the basic arithmetic over finite field, the rnultiplicative inversion is the most time consuming operation. In this paper, a fast inversion algerian in finite field $GF(2^m)$ with the standard basis representation is proposed. It is based on the Extended binary gcd algorithm (EBGA). The proposed algorithm executes about $18.8\%\;or\;45.9\%$ less iterations than EBGA or Montgomery inverse algorithm (MIA), respectively. In practical applications where the dimension of the field is large or may vary, systolic array sDucture becomes area-complexity and time-complexity costly or even impractical in previous algorithms. It is not suitable for low-weight and low-power systems, i.e., smartcard, the mobile phone. In this paper, we propose a new hardware architecture to apply an area-efficient and a synchronized inverter on low-complexity systems. It requires the number of addition and reduction operation less than previous architectures for computing the inverses in $GF(2^m)$ furthermore, the proposed inversion is applied over either prime or binary extension fields, more specially $GF(2^m)$ and GF(P) .

Design and Implementation of an Alternate System Interconnect based on PCI Express (PCI Express 기반 시스템 인터커넥트의 설계 및 구현)

  • Kim, Young Woo;Ren, Ye;Choi, WonHyuk
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.8
    • /
    • pp.74-85
    • /
    • 2015
  • PCI Express is a well-known and widely used de-facto system bus standard for connecting among a processor and IO devices. PCI Express is originated from old PCI standard, and its most of applications are limited to be used within a PC or server system. But, because of its fast speed, low power consumption, and good protocol efficiency, it is considered as one of a good candidate for an alternate system interconnect for many years. In this paper, we present design, implementation and early evaluation of an alternate system interconnect by utilizing PCI Express. The developed alternate system interconnect using PCI Express (named PCIeLINK) utilizes non-transparent bridging (NTB) technic which generally used in fail-over system in PCI and PCI Express. By using NTB technic, PCI Express device can be extended to outside of a system without electrical and logical problems arising during system boot and enumeration. To build up an alternate system interconnect, we designed and implemented a network interface card having multiple PCI Express ${\times}4$ connections (theoretically 20 Gbps) and tested, The early test results revealed that an ${\times}4$ port in the card showed 8.6 Gbps peak performance for bulk transmission and 5.1 Gbps peak for normal TCP/IP transfer.

Performance Analysis of RFID Interference Suppression System Based on the Gold Code (골드 코드 기반의 RFID 간섭제거 시스템 성능분석)

  • khadka, Grishma;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1491-1497
    • /
    • 2013
  • Radio frequency identification (RFID) is an important and essential components of ubiquitous computing, with the development of wireless communication technologies and mobile computing environment. Recently, RFID becomes the mainstream application that helps fast handling and uniquely identifying the physical objects. It utilizes the electromagnetic energy for data transmission from a tag to a reader in the presence of arbitrary interference and noise. In order to employ the portable mobile RFID reader, a tag-collision problem between two or more adjacent tags should be considered. In this paper, we present the operation of RFID system in which numerous tags are present in the interrogation zone of a single reader at the same time. Since there may exist a number of tagged objects in the narrow area, multiple RFID tags may interfere each other, caused to degrade the data reliability and efficiency of the RFID system. In order to suppress interference signals from multiple neighboring tags, we present an application of Gold code for RFID communication system, which uses spread spectrum technique. In this RFID system, data bits are spreaded in each tags with the unique Gold code and the spreaded data bits are despreaded in the reader with the same Gold code. The performance analysis of the considered RFID anti-collision system is illustrated via computer simulation examples.

Development of An Automatic Classification System for Game Reviews Based on Word Embedding and Vector Similarity (단어 임베딩 및 벡터 유사도 기반 게임 리뷰 자동 분류 시스템 개발)

  • Yang, Yu-Jeong;Lee, Bo-Hyun;Kim, Jin-Sil;Lee, Ki Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.1-14
    • /
    • 2019
  • Because of the characteristics of game software, it is important to quickly identify and reflect users' needs into game software after its launch. However, most sites such as the Google Play Store, where users can download games and post reviews, provide only very limited and ambiguous classification categories for game reviews. Therefore, in this paper, we develop an automatic classification system for game reviews that categorizes reviews into categories that are clearer and more useful for game providers. The developed system converts words in reviews into vectors using word2vec, which is a representative word embedding model, and classifies reviews into the most relevant categories by measuring the similarity between those vectors and each category. Especially, in order to choose the best similarity measure that directly affects the classification performance of the system, we have compared the performance of three representative similarity measures, the Euclidean similarity, cosine similarity, and the extended Jaccard similarity, in a real environment. Furthermore, to allow a review to be classified into multiple categories, we use a threshold-based multi-category classification method. Through experiments on real reviews collected from Google Play Store, we have confirmed that the system achieved up to 95% accuracy.

A Novel Redundant Binary Montgomery Multiplier and Hardware Architecture (새로운 잉여 이진 Montgomery 곱셈기와 하드웨어 구조)

  • Lim Dae-Sung;Chang Nam-Su;Ji Sung-Yeon;Kim Sung-Kyoung;Lee Sang-Jin;Koo Bon-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.33-41
    • /
    • 2006
  • RSA cryptosystem is of great use in systems such as IC card, mobile system, WPKI, electronic cash, SET, SSL and so on. RSA is performed through modular exponentiation. It is well known that the Montgomery multiplier is efficient in general. The critical path delay of the Montgomery multiplier depends on an addition of three operands, the problem that is taken over carry-propagation makes big influence at an efficiency of Montgomery Multiplier. Recently, the use of the Carry Save Adder(CSA) which has no carry propagation has worked McIvor et al. proposed a couple of Montgomery multiplication for an ideal exponentiation, the one and the other are made of 3 steps and 2 steps of CSA respectively. The latter one is more efficient than the first one in terms of the time complexity. In this paper, for faster operation than the latter one we use binary signed-digit(SD) number system which has no carry-propagation. We propose a new redundant binary adder(RBA) that performs the addition between two binary SD numbers and apply to Montgomery multiplier. Instead of the binary SD addition rule using in existing RBAs, we propose a new addition rule. And, we construct and simulate to the proposed adder using gates provided from SAMSUNG STD130 $0.18{\mu}m$ 1.8V CMOS Standard Cell Library. The result is faster by a minimum 12.46% in terms of the time complexity than McIvor's 2 method and existing RBAs.

Factors Affecting Consumers' Acceptance of e-Commerce Consumer Credit Service: Multiple Group Path Analysis by Naver Shopping and Coupang (이커머스 후불결제(BNPL) 수용에 영향을 미치는 요인: 네이버쇼핑과 쿠팡 간 다중집단 비교)

  • Kim, Su Jin;Mo, Jeonghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.105-135
    • /
    • 2022
  • As COVID-19 has led to a surge in e-commerce Buy Now Pay Later(BNPL) has become preferred choice among millennials. In Korea Coupang followed by Naver Pay offers a deferred payment, aiming to create customer lock-in effect, save credit card processing fee and lay the groundwork for entering into new financial services. However the literature related to the influential factors of customers' usage intention toward a deferred payment is scarce. For the study, a multi-group analysis was carried out to find differences between Naver shopping and Coupang. The results revealed that the important factors that affect a deferred payment adoption were compatibility, impulsive buying tendency in Naver shopping, whereas compatibility, relative advantage, additional value in Coupang(listed in order of most important). In addition, impulsive buying tendency had a positive effect on adoption intention in Naver shopping and on perceived risk in Coupang. The results imply that Naver shopping need to focus on managing delinquency while Coupang should provide sufficient information on how late fees and credit rating downgrade work and try not to make a deferred payment option stand out. In order to increase adoption rate it is recommendable to narrow down target segment of a deferred payment and expand it to a specialized vertical such as travel.

A Study on Trust and Commitment between Buyer and Supplier of Industrial Parts, and Their Usage of Information Technology (산업재 부품 구매자와 공급자의 신뢰와 몰입, 그리고 정보기술의 이용에 관한 연구)

  • Kim, Jong-Hun;Yun, Hui-Taek
    • Proceedings of the Korean DIstribution Association Conference
    • /
    • 2006.08a
    • /
    • pp.47-68
    • /
    • 2006
  • This study aims to determine the association structure of the behavioral relationship variables, such as trust, commitment, cooperation, communication and coercive power, in the relationship between the buyers and suppliers of industrial parts. It also investigates the impact of the use of IT technologies on the relationships quality. Data was collected from 216 part suppliers of machinery, electronics and automobiles located in Incheon. Data supported all of the proposed hypotheses. First, it was confirmed that parts suppliers' trust in buyers leads to the commitment into relationships with buyers. Second, cooperation and communication showed a positive influence on parts suppliers' trust in buyers, and coercive power gave a negative influence on trust. Third, the use of IT technologies like Internet and E-Mail between parts suppliers and buyers was verified to have generally a positive influence on the quality of relationships. At the same time, cooperation and communication were confirmed to have a positive influence on each other, and cooperation and coercive power as well as communication and coercive power were confirmed to have negative influence on each other. This study is a pioneering attempt to examine the relationships between suppliers and buyers of industrial parts, and the influence IT technologies on the relationship quality. Also, the findings will be practically much helpful to find how to reinforce the relationships between parts suppliers and buyers.

  • PDF

Influencing Factors for Adoption of Smart Cards in Hospitals (종합병원 전자건강카드 도입에 영향을 미치는 요인)

  • Ahn, Lee-Su;Yoon, Seok-Jun;Ahn, Hyeong-Sik;Hong, Seok-Won
    • Quality Improvement in Health Care
    • /
    • v.12 no.2
    • /
    • pp.113-123
    • /
    • 2006
  • Objective : This research is focused on understanding the current status of the Health Smart Card already in use in other advanced countries. This research will analyze the current status of the medical institutions Health Smart Card system adoption process and its effects, and provide a basis for future policy decisions for the effective adoption and diffusion of a Health Smart Card system, in the medical field, through the completed research and analysis. Method : This research surveys the domestic, and foreign, status of Health Smart Card usage. The research also presents up-to-date methodology for the evaluation of the effects of medical and health care technology. The research also conducts a survey of the domestic medical institutions that have implemented a Health Smart Card system, and then analyzes the results of the survey. Additionally, the research carried out a survey and analysis of medical institutions with no Health Smart Card system implemented, and considered the factors affecting the diffusion of Health Smart Card systems in considering an effective policy for the introduction and diffusion of such a system. Research Results : Through the study of the methodology of medical and health care information technology in advanced countries, the methodology for assessing Health Smart Card technology has been established, and focuses on 6 aspects. The study on the status of foreign implementation has shown a model for the Health Smart Card system. A survey was conducted on the current status of medical institutions with an implemented Health Smart Card system, and the survey results have been analyzed. Also, factors influencing the adoption of Health Smart Card systems have been analyzed through the survey on those medical institutions that have not implemented a Health Smart Card system. Conclusion : The government must provide institutional measures for sharing medical records by constructing an IT infrastructure at the national level to enable the adoption and diffusion of a Health Smart Card system. Such a network will make connections between medical institutions possible, thus making the diffusion of the Health Smart Card system nationwide. For the successful adoption and diffusion of a Health Smart Card system, a model system development, under a medical record sharing system, should be conducted. Additionally, a regional unit based model should be developed for the model project, as is done in advanced countries, along with the application of such results.

  • PDF