• Title/Summary/Keyword: Electronic Banking Channel

Search Result 6, Processing Time 0.019 seconds

The Effect of E-Finance on Bank Performance and Its Determinants in Korea (전자금융채널의 경영성과에의 영향 및 결정요인 연구)

  • Kim, Hoe-Sook;Choi, Seung-Bin
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.6 no.2
    • /
    • pp.25-50
    • /
    • 2011
  • The purpose of this study is to investigate the difference of performance between banks with electronic-based banking service and banks without electronic-based banking service in Korea. The performance indicators we use are DEA efficiency and profitability such as NI, ROA and ROE. The findings are that the performance of bank with electronic banking service are significantly different from that of bank without electronic banking service in DEA efficiency, financial efficiency(cost and revenue) and profitability. But there are some differences among the type of electronic-based service channel that banks provide. The banking channels comprise two major groups: the traditional channels and e-channels. E-channels provide cost-saving for banks and their clients. Among them, only card-related ATM significantly affects the profitability of banks in the positive direction, and technical efficiency also affects the bank's profitability. But the others do not affect.

  • PDF

A Study on the Two-channel Authentication Method which Provides Two-way Authentication using Mobile Certificate in the Internet Banking Environment (인터넷 뱅킹 환경에서 사용자 인증 보안을 위한 Two-Channel 인증 방식)

  • You, Han-Na;Lee, Jae-Sik;Kim, Jung-Jae;Park, Jae-Pio;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.939-946
    • /
    • 2011
  • The Internet banking service provides convenience than the traditional offline services. However, it still causes a number of security problems including hacking. In order to strengthen security, the financial institutions have provided such authentication methods as the official authentication certificate, the security token, the security card and OTP. However, the incidents related to hacking have continuously occurred. Especially, various weak points have been suggested for the authentication methods in regard to such types of hacking as the memory hacking or the MITM attack. So I needed was a new authentication method. In this study, the two-channel authentication method which provide two-way authentication on the user's PC and mobile device when executing the electronic financial transactions in the Internet banking environment is suggested. Also, by analyzing it in comparison with other existing methods, it is possible to check that the prospects of safety and credibility are strengthened.

A study on types and performance of major retail banks automated service channel strategy (자동화기기를 이용한 국내 시중은행의 서비스 채널 전략의 유형 및 유효성 분석에 관한 연구)

  • 변지석;이동규
    • Korean Management Science Review
    • /
    • v.14 no.2
    • /
    • pp.139-159
    • /
    • 1997
  • Recently banking industry is experiencing fundamental changes by advancement of information technology. The traditional role of branches is rapidly being replaced with new electronic service channels such as ATM. Phone and PC for they are time-saving and convenient. Automated service channel strategy of retail banks is divided into two different ways, automation and networking. Automation is mainly focused on cost reduction related to the branch operation, while networking is on expansion of customer contact points. Strategic types of banks can be defined from a matrix model shere the positioning is determined by the extent of automation and networking. The effectiveness of automated channel strategy depends on how separate strategic types show their performance. Results for deposits and productivity will be given to verify the economic performance of each strategic type.

  • PDF

A Study on Types and Performance of Major Retail Banks Automated Service Channel Strategy (자동화기기를 이용한 국내 시중은행의 서비스채널 전략의 유형 및 유효성 분석에 관한 연구)

  • 변지석;이동규
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.14 no.2
    • /
    • pp.139-139
    • /
    • 1989
  • Recently banking industry is experiencing fundamental changes by advancement of information technology. The traditional role of branches is rapidly being replaced with new electronic service channels such as ATM. Phone and PC for they are time-saving and convenient. Automated service channel strategy of retail banks is divided into two different ways, automation and networking. Automation is mainly focused on cost reduction related to the branch operation, while networking is on expansion of customer contact points. Strategic types of banks can be defined from a matrix model where the positioning is determined by the extent of automation and networking. The effectiveness of automated channel strategy depends on how separate strategic types show their performance. Results for deposits and productivity will be given to verify the economic performance of each strategic type.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.