• Title/Summary/Keyword: Banking System

Search Result 407, Processing Time 0.024 seconds

Design and Implementation of MongoDB-based Unstructured Log Processing System over Cloud Computing Environment (클라우드 환경에서 MongoDB 기반의 비정형 로그 처리 시스템 설계 및 구현)

  • Kim, Myoungjin;Han, Seungho;Cui, Yun;Lee, Hanku
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.71-84
    • /
    • 2013
  • Log data, which record the multitude of information created when operating computer systems, are utilized in many processes, from carrying out computer system inspection and process optimization to providing customized user optimization. In this paper, we propose a MongoDB-based unstructured log processing system in a cloud environment for processing the massive amount of log data of banks. Most of the log data generated during banking operations come from handling a client's business. Therefore, in order to gather, store, categorize, and analyze the log data generated while processing the client's business, a separate log data processing system needs to be established. However, the realization of flexible storage expansion functions for processing a massive amount of unstructured log data and executing a considerable number of functions to categorize and analyze the stored unstructured log data is difficult in existing computer environments. Thus, in this study, we use cloud computing technology to realize a cloud-based log data processing system for processing unstructured log data that are difficult to process using the existing computing infrastructure's analysis tools and management system. The proposed system uses the IaaS (Infrastructure as a Service) cloud environment to provide a flexible expansion of computing resources and includes the ability to flexibly expand resources such as storage space and memory under conditions such as extended storage or rapid increase in log data. Moreover, to overcome the processing limits of the existing analysis tool when a real-time analysis of the aggregated unstructured log data is required, the proposed system includes a Hadoop-based analysis module for quick and reliable parallel-distributed processing of the massive amount of log data. Furthermore, because the HDFS (Hadoop Distributed File System) stores data by generating copies of the block units of the aggregated log data, the proposed system offers automatic restore functions for the system to continually operate after it recovers from a malfunction. Finally, by establishing a distributed database using the NoSQL-based Mongo DB, the proposed system provides methods of effectively processing unstructured log data. Relational databases such as the MySQL databases have complex schemas that are inappropriate for processing unstructured log data. Further, strict schemas like those of relational databases cannot expand nodes in the case wherein the stored data are distributed to various nodes when the amount of data rapidly increases. NoSQL does not provide the complex computations that relational databases may provide but can easily expand the database through node dispersion when the amount of data increases rapidly; it is a non-relational database with an appropriate structure for processing unstructured data. The data models of the NoSQL are usually classified as Key-Value, column-oriented, and document-oriented types. Of these, the representative document-oriented data model, MongoDB, which has a free schema structure, is used in the proposed system. MongoDB is introduced to the proposed system because it makes it easy to process unstructured log data through a flexible schema structure, facilitates flexible node expansion when the amount of data is rapidly increasing, and provides an Auto-Sharding function that automatically expands storage. The proposed system is composed of a log collector module, a log graph generator module, a MongoDB module, a Hadoop-based analysis module, and a MySQL module. When the log data generated over the entire client business process of each bank are sent to the cloud server, the log collector module collects and classifies data according to the type of log data and distributes it to the MongoDB module and the MySQL module. The log graph generator module generates the results of the log analysis of the MongoDB module, Hadoop-based analysis module, and the MySQL module per analysis time and type of the aggregated log data, and provides them to the user through a web interface. Log data that require a real-time log data analysis are stored in the MySQL module and provided real-time by the log graph generator module. The aggregated log data per unit time are stored in the MongoDB module and plotted in a graph according to the user's various analysis conditions. The aggregated log data in the MongoDB module are parallel-distributed and processed by the Hadoop-based analysis module. A comparative evaluation is carried out against a log data processing system that uses only MySQL for inserting log data and estimating query performance; this evaluation proves the proposed system's superiority. Moreover, an optimal chunk size is confirmed through the log data insert performance evaluation of MongoDB for various chunk sizes.

The Effects of the Next-Generation System in the Banking Industry on the Simplification of Business Processes and the Development of New Products (금융기관의 차세대시스템이 금융상품 개발 및 비즈니스 프로세스 단순화에 미친 효과: 기업은행 사례를 중심으로)

  • Kim, Joon-S.;Kim, Woo-Sang
    • Information Systems Review
    • /
    • v.10 no.2
    • /
    • pp.159-177
    • /
    • 2008
  • Since the IMF crisis, the competition among banks in Korea has fiercely intensified. To survive in the severe competition, several leading banks including Industrial Bank of Korea (IBK) have recently developed their own proprietary systems called 'the Next-Generation Systems(NGS).' This case study was to answer several important issues as follows; 1); the reason why a bank make huge investment in the IT infrastructure; 2) the development methodology of the NGS; 3) the new architecture of the NGS; 4) the governance structure of the NGS investment; and 5) the effects of the NGS on the development of new products. To achieve such goals, a systematic tandem interview method and many archival reports from IBK were utilized. The conclusions are summarized as follows: First, the NGS has contributed to the integration and simplification of business processes. Second, new products as demanded in the market can be developed much faster through the NGS. Third, the change management of IT infrastructure is critically important. Fourth, the systems architecture can be different according to the IT governance. Fifth, the alignment of the NGS and business processes is most important to obtain the organizational goals.

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

Requisites for Adopting Electronic Payment Systems in International Trade Transactions (국제무역거래에서의 전자결제시스템 도입에 따른 과제)

  • Kyung, Yeun-Beom
    • The Journal of Information Technology
    • /
    • v.6 no.4
    • /
    • pp.147-162
    • /
    • 2003
  • The technique of information-communication rapidly developed has made it possible for us to do business through Internet. Electronic commerce was increased rapidly by the explosive development of the inter and communication revolution. E-Commerce has created a fundamentally new way of conduction and will change drastically accepted ways of doing business. Normally international trade has been formulated in a way that exporters and importers meet face-to-face and contract and pay by letter of credits. For the global electronic commerce to vitalized, the outstanding matters should encourage the creation of infrastructure of information security and new models in the field of electronic payment systems, electronic commerce agreement for remedy, adapting electronic date interchange in transport documents and negotiability of electronic bills of lading. The payment systems such as electronic fund transfers, tradecard system and electronic letters of credits issued by SWIFT system permit the parties concerned(sellers, buyers ad service providers) to settle payment electronically. Still they are many limitations for complete international electronic transactions. The following measures have to be taken to vitalize electronic trade transactions. It is needed to acquire information security such as authenticity, integrity, non-repudiation and confidentiality. All kinds of documents need to be replaced by electronic date exchange and the legal structure of international convention, national law for electronic payment systems have to be completed. Also a detailed guide of the banking operation and developing rules for electronic letters of credits need to be provided to adopt eUCP rules for the electronic presentation of documents.

  • PDF

An Application of Fuzzy AHP and TOPSIS Methodology for Ranking the Factors Influencing FinTech Adoption Intention: A Comparative Study of China and Korea (FinTech 채택 의도에 영향을 미치는 요소의 순위 결정을 위한 Fuzzy AHP 및 TOPSIS 방법론의 적용 : 중국과 한국의 비교 연구)

  • Mu, Hong-Lei;Lee, Young-Chan
    • Journal of Service Research and Studies
    • /
    • v.7 no.4
    • /
    • pp.51-68
    • /
    • 2017
  • Financial technology (FinTech) is an emerging financial service sector include innovations in financial literacy and investment, retail banking, education, and crypto-currencies like bitcoin. One of the crucial branch of financial technology-third-party payment (TPP) is undergoing rapid growth, with online/mobile systems replacing offline financial systems. System quality and user attitudes are key perceptions driving third-party payment usage, the importance of these perceptions, however, may be different with countries as users' thinking varies from country to country. Thus, the purpose of this study is to elaborate how factors differ from China to Korea by drawing on the unified theory of acceptance and use of technology (UTAUT2). Additionally, this study also aims to propose a multi-attribute evaluation of the third-party online payment system based on analytic hierarchy process (AHP), fuzzy sets and technique for order performance by similarity to ideal solution (TOPSIS), to examine the relative importance of the perceptions influencing new technology adoption intention. The results showed that the price value has the most significant influence on Chinese perceptions, while the perceived credibility has the most significant effect on Korean perceptions. Sub-criteria also performs different results to Chinese and Korean third-party online payment system.

An Analysis on the North-Africa Entry Strategies of Korea Logistics Companies (조선산업의 글로벌 경쟁력 강화를 위한 한중 선박금융제도의 비교연구)

  • Choi, Chang-Yeoul;Ham, Hyung-Bum
    • International Commerce and Information Review
    • /
    • v.14 no.4
    • /
    • pp.317-337
    • /
    • 2012
  • This study has investigated shipping finance systems in Korea and China, and extracted negative factors based on it to propose a way to develop the shipping financial system in Korea for shipbuilding industry and marine transportation. From after the global financial crisis in 2008 to right before the Lehman Brothers Holdings bankruptcy, shipping finance has been dominated by the major industrialized countries in Europe. However, the weight point is moving to the countries in Asia region such as Korea, Japan, and China based on relatively strong banking system and low interests rate. This study focused on the alternatives the current situation that the starter of shipping finance among three countries in Northeast Asia, South Korea is facing China's challenges. In the paper, shipping finance in Korea presented its defectives such as the limits of ship financing, lack of professional workforces, ever-present foreign exchange risks, and lack of understandings of the parties. As the countermeasures of them, it proposed establishing professional institute for ship financing, training professionals in financial industry, raising foreign credentials of won, and continuing associations between the parties. Even though we are the first Asian country introduced ship funds, the ship funds growth in China shall be under our eyes while we keep systemic networks between shipping, ship building, and ship financing.

  • PDF

Analysis of Bearing Capacity Change of Forest Roadbed by Opening Year (개설시기에 따른 임도 노반의 지지력 변화분석)

  • Chen, Hyeong-Uk;Kim, Dong-Hyeon;Lee, Kwan-Hee;Kim, Dong-Geun
    • Journal of Korean Society of Forest Science
    • /
    • v.108 no.3
    • /
    • pp.322-328
    • /
    • 2019
  • The purpose of this study was to provide basic data for maintenance and repair of the forest road surfaces using the light drop weight test (LDWT), density test, and grain size analysis at four sites in Yeongyang-gun Mt. (2011y, 2014y, 2016y, and 2017y). In terms of the density test results, the opening density in 2011 was the highest at $2.0694g/cm^3$, and the opening density in 2017 was the lowest at $1.7443g/cm^3$. The grain size analysis showed that the proportion of large aggregates was highest at the opening in 2017, and the proportion of large aggregates decreased with the delay of opening date. From the LDWT results, $E_{vd}$ (the dynamic deformation coefficient) of the 2011y forest road was $35.7MN/m^2$, 2014y was $30.5MN/m^2$, 2016y was $28.6MN/m^2$, and 2017y was $23.5MN/m^2$. The $E_{vd}$ value for the oldest forests opened with the 2011y forest road was the highest, the average $E_{vd}$ value of the center portion was $21.45MN/m^2$, the average $E_{vd}$ value of the wheel portion of the banking part was $31.31MN/m^2$, and the average $E_{vd}$ value of the wheel portion of the cut part was $36.71MN/m^2$.

Improving the In-Service Education for Teachers and Directors of Childcare Centers (보육교직원 보수교육 현황 고찰 및 발전 방안)

  • Lee, Mi Jeong
    • Korean Journal of Child Education & Care
    • /
    • v.19 no.3
    • /
    • pp.57-69
    • /
    • 2019
  • Objective: The purpose of this study is to identify the strengths and problems of the current in-service education system, and suggest ways to improve it in the future by looking at the current status of in-service education to strengthen the expertise of teachers and directors of childcare centers. In particular, I would like to search the current status of in-service education, including on-line special job competency education, which is responsible for one of the pillars of in-service education, and present the problems and measures to improve them. Methods: To that end, the present study conducted an analysis of issues based on the previous research on in-service education of childcare teachers' education, and conducted a literature examination focusing on laws, policies, and foreign cases related to in-service education. Results: In-service education for childcare teachers was categorized into educational process diversification and professionalism, educational method diversification, qualification management, and educational support, which were again organized into 14 core tasks. In addition, as a recent phenomenon that has not been discussed in detail in the preceding study, the phenomenon of increased participation in on-line special job competency education at the site of in-service education was analyzed and the problems were presented. Conclusion/Implications: Based on the results of this study, I proposed development measures such as changing the term 'in-service education' and recognizing the diversity of job competency education, the credit rating banking system for job competency education, the provision of on-line job competency education curriculum (basic courses/enhancing courses) for collective education courses, the expansion of education support for promotion to a higher grade courses and the conversion of the mandatory evaluation system for in-service educational institutions.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

A Case Study - IT Outsourcing of the Korea Development Bank (산업은행: 금융 IT 아웃소싱 - 공동협력으로 안전한 문을 연다)

  • Kang, Ju-Young;Lee, Jae-Kyu
    • Information Systems Review
    • /
    • v.7 no.2
    • /
    • pp.229-255
    • /
    • 2005
  • The Korea Development Bank promoted a total outsourcing for IT operation in 1999 for the first time in the banking industry. The Korea Development Bank became the center of public attention because the most banks were unwilling to take an outsourcing with external sources for the reason of financial operation accidents, securities, and threats of strikes. After the introduction of the total IT outsourcing, the Korea Development Bank has continuously diagnosed the problems of the IT outsourcing and adopted various proper complements for the enhancement of the IT outsourcing. As the result of the enhancement, the IT outsourcing of the Korea Development Bank marched into the joint liability operation period after going through the outsourcing operation period and the co-operation period. The joint liability operation which is the most leading outsourcing system which is adopted by the Korea Development Bank for the first time in the banking industry. Through the joint liability operation, the Korea Development Bank could accept the most up-to-date IT, concentrate internal manpower on the core capability, and secure flexibility of manpower. Also, the bank changed the relationship between the bank and the external sources from the one-sided relationship between a producers and a consumer to the joint liability relationship on which both sides are responsible for the operation, and could integrate the internal capacity with the professional know-how of the external IT outsourcing company. In this paper, we testified the soundness and validity for the worries of banks about the total IT outsourcing with external sources. And, we arranged the advantages and outcomes of the total IT outsourcing with external sources compared to the IT outsourcing with internal sources. Moreover, we expect that we can improve the closed financial IT outsourcing industry structure and raise the world competitive power of domestic IT outsourcing companies by correcting wrong ideas on the IT outsourcing with external sources.