• Title/Summary/Keyword: E-payment

Search Result 328, Processing Time 0.027 seconds

Ransomware Analysis and Method for Minimize the Damage (랜섬웨어 분석과 피해 최소화 방안)

  • Moon, Jaeyeon;Chang, Younghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.1
    • /
    • pp.79-85
    • /
    • 2016
  • Ransomware was a malicious code that active around the US, but now it spreads rapidly all over the world and emerges in korea recently because of exponential computer supply and increase in users. Initially ransomware uses e-mail as an attack medium in such a way that induces to click a file through the spam mail Pam, but it is now circulated through the smart phone message. The current trend is an increase in the number of damage, including attacks such as the domestic large community site by ransomware hangul version. Ransomware outputs a warning message to the user to encrypt the file and leads to monetary damages and demands for payment via bitcoin as virtual currency is difficult to infer the tracking status. This paper presents an analysis and solutions to damage cases caused by ransomware.

A Design of Protocol Based on Smartcard for Financial Information to Protect in E-payment System (온라인 소액결제 시스템에서 금융정보 보호를 위한 스마트카드 기반의 프로토콜 설계)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5872-5878
    • /
    • 2013
  • This study provides two channel structure and two factor authentication. First, a purchasing request by Internet and then user certification and a settlement approval process by mobile communication. Second, it support that proposal protocol utilize a partial factor value of stored in users smartcard, smart phone and password of certificate. Third, storage stability is improved because certificate store in smartcard. Finally, proposal protocol satisfy confidentiality, integrity, authentication, and non- repudiation on required E-commerce guideline. In comparative analysis, Efficiency of the proposal protocol with the existing system was not significantly different. But, In terms of safety for a variety of threats to prove more secure than the existing system was confirmed.

Active Authentication Method using NFC (NFC를 활용한 능동형 인증 방법)

  • Lee, Min-Gu;Kim, Dong-Wan;Sohn, Jin-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.140-156
    • /
    • 2012
  • Since most of recently launched smart devices support NFC(Near Field Communication), RFID applications are tend to be replaced. For instance, previous RFID application areas such as entrance control, mobile e-ticket, electronic payment and et. al are subject to change using NFC. Due to the limitation of passive communication in RFID, it is impossible to cover all security requirements of authentication and authorization mechanism that wide areas of applications demand. Therefore authentication and authorization mechanism based on NFC is very attractive to such applications because active communication methods make it possible to be highly secure in authentication and authorization. In this paper, authors propose a new approach of secure authentication and authorization mechanism using NFC smart devices based on EAP(Extensible Authentication Protocol) and AAA(Authentication, Authorization and Accounting) protocols.

A Study on ALTIBASETM LOG ANALYZER method for highly scalable, high-availability (고확장성, 고가용성을 위한 ALTIBASETM LOG ANALYZER 기법에 관한 연구)

  • Yang, Hyeong-Sik;Kim, Sun-Bae
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.1-12
    • /
    • 2014
  • Recently, the need for non-stop service is increasing by the business mission-critical Internet banking, e-payment, e-commerce, home shopping, securities trading, and petition business increases, clustered in a single database of existing, redundant research on high-availability technologies related to technique, etc. is increasing. It provides an API based on the Active Log in addition to the technique of redundancy, ALTIBASE$^{TM}$ Log Analyzer (below, ALA), provides scalability and communication of the same model or between heterogeneous. In this paper, we evaluated the performance of ALA by presenting the design of the database system that you can use the ALA, to satisfy all the synchronization features high scalability and high availability, real-time.

A Study on an Estimation of Adjusted Coefficient for the Maintenance of Information Security Software in Korea Industry (정보보안 소프트웨어 유지보수 대가기준을 위한 보정계수 산정에 관한 연구)

  • Park, You-Jin;Park, Eun-Ju
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.109-123
    • /
    • 2011
  • The maintenance prices in information security industry between Korean companies and foreign companies have been a big difference. Korea Information Security SW maintenance standards were not adequate for the rate, and there was disagreement between domestic companies and governments. This research, therefore, surveyed a standard of information SW and the status of maintenance payment rates. The study suggests an estimation method and verifies the method and an appropriate maintenance cost rate. According to the results of the study, the current maintenance cost should be increased or decreased independent with a kind of information security systems. Based on the study, Korea government is able to change the maintenance policy in information security. And the domestic companies get a theoretical ground for improving the rates of maintenance costs in information security systems and are able to allot the resources effectively.

A Design of Internet-Based Safety Guarantee Global Integrated Logistics Management System Framework (인터넷 기반의 안전보장 글로벌 통합물류관리시스템 프레임워크 설계)

  • Hong, Ho-Seon;Hong, Ki-Sung;Lee, Chulung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.103-111
    • /
    • 2013
  • This paper provide a framework for an IGILMS(internet-based global integrated logistics management system) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system. To validate an efficiency of the proposed system, we develop a simulation model and analyze the performance of the proposed system.

A study on the send and receive of the message in the TEDI system (TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.43-56
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the TEDI System. The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Serves, a RSP Server, and Certification Servers. TEDI has development the system and legal frame work. Exporters, importers, carriers, banks insurance and companies those who engage in the trade releated business have tested TEDI system and evaluated the legal frame work from the practical point of view. TEDI is now refining the system and preparing for the service. A fundamental feature of the TEDI System is the attribution to participants of data messages through public key certificates issued by certification authorities that allow for verification of digital signatures. Access to servers maintained by such certification authorities also takes place through the internet. In principle, certificates used by any reputable certification authority may be employed as long as they are compatible with X.509 V3.

  • PDF

The Complex Interrelationship of Work-Related Factors Underlying Risky Driving Behavior of Food Delivery Riders in Athens, Greece

  • Papakostopoulos, Vassilis;Nathanael, Dimitris
    • Safety and Health at Work
    • /
    • v.12 no.2
    • /
    • pp.147-153
    • /
    • 2021
  • Background: In this study, the association of work and demographic characteristics with different traffic offenses committed by food delivery riders in Greece was examined. Previous research has identified various factors related to risky driving however, there is a need for exploring the complex interrelationship of work-related factors underlying risky driving behavior. Materials and Methods: A 2-items uestionnaire was used exploring delivery riders demographic characteristics, terms of employment, issues of concern during work and type of traffic offenses committed. In total, uestionnaires were analyzed using logistic regression in order to identify characteristics independently associated with serious traffic offenses, namely, red-light running and helmet non-use. Results: The analysis showed that: (i) typical health and safety measures had no effect on serious traffic offenses, (ii) young age was related to both offenses however (iii) different sets of work conditions were associated with reports of red-light running (i.e. low work experience, use of personal vehicle for work, and payment by hour) and helmet non-use respectively (i.e. intense work pace, high tip income per day and low concern about vehicle condition). Conclusion: The above findings provide evidence that serious traffic offenses are manifestations of underlying conflict experienced by the riders between safety and various performance criteria. Each one of the two offenses is related to different rider profiles aiming to satisfy different goals, namely, those mainly trying to maximize profit non-helmet users and those, mostly inexperienced ones, trying to cope with work pressure red light runners. Potential regulatory measures to alleviate risky practices are discussed.

The effect of AI shopping assistant's motivated consumer innovativeness on satisfaction and purchase intention (AI 쇼핑 도우미 사용자의 소비자 혁신 동기가 만족도와 구매의도에 미치는 영향)

  • Hye Jung Kim ;Young-Ju Rhee
    • The Research Journal of the Costume Culture
    • /
    • v.31 no.5
    • /
    • pp.651-668
    • /
    • 2023
  • This study aims to help companies with efficient investment and marketing strategies by empirically verifying the impact on satisfaction and purchase intention for artificial intelligence-based digital technology supported shopping assistants introduced in e-commerce. Frequency, factor, SEM, and multiple group analysises were conducted using SPSS 26.0 and Amos 26.0. As a result, first, motivated consumer innovativeness elements of AI shopping assistant were derived into a total of four categories: functional, hedonic, rational, and reliable. Second, in the order of hedonic and rational, satisfaction with the AI shopping assistant was significantly affected, and in the order of rational and functional, purchase intention was significantly affected. The satisfaction with the AI shopping assistant did not affect the purchase intention. Third, in the case of hedonic, the AI-preferred group had a more significant effect on satisfaction than the human-preferred group, and in the case of rational, there was no difference by group in purchase intention. Thus, it was found that consumers prefer AI shopping helpers for e-commerce because they can shop reasonably and are functionally convenient. Therefore, when introducing AI shopping assistants, it is essential to include content that can compare and analyze fundamental information, such as product prices, as well as search functions and payment system compatibility that facilitate shopping.

On-Line music score recognition by DPmatching (DP매칭에 의한 On-Line 악보인식)

  • 구상훈;이병선;김수경;이은주
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.502-511
    • /
    • 2002
  • 컴퓨터의 기술적 발전은 사회 여러 분야에 막대한 영향을 끼쳤다. 그중 악보 인식분야에도 커다란 영향을 주었다 그러나, On-line 상에서 그린 악보를 실시간으로 정형화된 악보형태로 변환하는 처리에 대한 연구가 미흡하여 이에 대한 연구가 필요하다. 본 논문에서는 실시간으로 악보를 인식하고, 사용자의 편의를 도모하기 위해 DP(Dynamic Programming) 매칭법을 이용한 On-Line 악보인식에 관한 방법을 제안하였다. 본 연구에서는 실시간으로 입력되는 악상기호를 인식하기 위해, 가장 유효한 정보인 악상 기호내의 방향, x, y 좌표를 이용하여 벡터형태로 추출한 후 음표와 비음표(쉼표, 기타기호)의 두개의 그룹으로 나누어진 표준패턴과의 DP매칭을 통해 인식한다. 먼저 tablet을 통해 실시간으로 악상 기호를 입력할 때 생기는 x, y좌표를 이용하여, 펜의 움직임에 대한 16방향 부호화를 수행한다. 음표와 비음표를 구분하기 위한 시간을 줄이고자 16방향 부호화를 적용하치 않고 사사분면부호화를 적용한다. 음표를 약식으로 그릴 경우 음표 머리에 해당하는 부분의 좌표는 삼사분면에 분포하고, 폐곡선의 음표일 경우에는 좌표가 사사분면에 고르게 나타난다. 폐곡선을 제외한 음표의 머리는 폐곡선과 같은 조건이면서 입력받은 y좌표값들 중에서 최소값과 최대값을 구한 다음 2로 나눈 값을 지나는 y좌표의 개수가 임의의 임계값 이상이면 음표로 판단한다. 위 조건을 만족하지 않을 경우 비음표로 취급한다. 음표와 비음표를 결정한 다음, 입력패턴과 표준패턴과의 DP매칭을 통하여 벌점을 구한다. 그리고 경로탐색을 통해 벌점에 대한 각각의 합계를 구해 최소값을 악상기호로 인식 하였다. 실험결과, 표준패턴을 음표와 비음표의 두개의 그룹으로 나누어 인식함으로써 DP 매칭의 처리 속도를 개선시켰고, 국소적인 변형이 있는 패턴과 특징의 수가 다른 패턴의 경우에도 좋은 인식률을 얻었다.r interferon alfa concentrated solution can be established according to the monograph of EP suggesting the revision of Minimum requirements for biological productss of e-procurement, e-placement, e-payment are also investigated.. monocytogenes, E. coli 및 S. enteritidis에 대한 키토산의 최소저해농도는 각각 0.1461 mg/mL, 0.2419 mg/mL, 0.0980 mg/mL 및 0.0490 mg/mL로 측정되었다. 또한 2%(v/v) 초산 자체의 최소저해농도를 측정한 결과, B. cereus, L. mosocytogenes, E. eoli에 대해서는 control과 비교시 유의적인 항균효과는 나타나지 않았다. 반면에 S. enteritidis의 경우는 배양시간 4시간까지는 항균활성을 나타내었지만, 8시간 이후부터는 S. enteritidis의 성장이 control 보다 높아져 배양시간 20시간에서는 control 보다 약 2배 이상 균주의 성장을 촉진시켰다.차에 따른 개별화 학습을 가능하게 할 뿐만 아니라 능동적인 참여를 유도하여 학습효율을 높일 수 있을 것으로 기대된다.향은 패션마케팅의 정의와 적용범위를 축소시킬 수 있는 위험을 내재한 것으로 보여진다. 그런가 하면, 많이 다루어진 주제라 할지라도 개념이나 용어가 통일되지 않고 사용되며 검증되어 통용되는 측정도구의 부재로 인하여 연구결과의 축적이 미비한 상태이다. 따라서, 이에 대한 재고와 새로운 방향 모색이 필요하다고 사료된다.로 사료되며, 임신관련 cytokine에 대한 다양한 연구가 요구되고 있다.₂/Hf(Variable)/Si 계에서 HfO₂ 박막이 Si 기판위에 직접 증착되면, 순수 HfO₂ 박막의

  • PDF