• Title/Summary/Keyword: Electronic Certification

Search Result 194, Processing Time 0.026 seconds

Changes in the environment of electronic finance and its challenges -Focusing on the prospects and implications of changes in electronic finance- (국내 전자금융의 환경 변화와 그 과제 -전자금융의 변화 전망과 시사점을 중심으로-)

  • Kim, Daehyun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.229-239
    • /
    • 2021
  • For this study, we have extensively analyzed the presentation data of the government's financial-related departments and the data of each financial institution and electronic financial institution.. As a result, In Korea's electronic financial environment, real changes such as first) expansion of non-face-to-face finance, second) teleworking in the financial sector, third) abolition of accredited certification, fourth) advanced voice phishing, fifth) openness of the financial industry and diversification of forms, sixth) the'walletless society'. In addition to the above, however, global changes triggered by the Fourth Industrial Revolution spread to the financial security sector, making it difficult to respond to problems such as artificial intelligence/ deep learning/ user analysis/ deepfake technology. As the proportion of electronic finance is increasing socially, it should be studied in the fields of electronic finance and its environment, and crime and criminal investigation.

A Study on The Mutually Authentication Mechanism for The Safe Electronic Signature (안전한 전자서명을 위한 상호인증 메커니즘에 관한 연구)

  • Choi, Sang-Wook;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.772-775
    • /
    • 2008
  • As the wireless communication technology developed, the Electric Commerce using a mobile was activated. WPKI was developed in order to guarantee the stability of the Electric Commerce but it is difficult to be ensured for the safe PKI service which is the same at the wire communication in the technical because of restriction of the mobile terminal. In this paper, we propose the authentication system for the electronic financial service which is safe and is effective in consideration of the restrictive characteristic of the mobile terminal. Moreover, the encryption algorithm for the safe electronic signature is proposed. In WPKI, this makes the cross certification of each certificate authority possible. Moreover, a stability was enhanced through the signature authentication using KCDSA and SEED algorithm.

  • PDF

Implementation of Portable Control Point for verifying compatibility of UPnP (UPnP 호환성 향상을 위한 휴대용 컨트롤 포인트의 구현)

  • Park, Se-Ho;Park, Yong-Suk;Kim, Hyun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.590-592
    • /
    • 2013
  • Devices compliant to the Universal Plug and Play (UPnP) Audio Video (A/V) specifications can easily establish multimedia home networks through zero or auto configuration. Despite the existing UPnP certification process many issues concerning interoperability still arise. Capabilities may not be fully implemented or there may be codec issues. Therefore, a means to check and verity interoperability prior to product purchasing or usage is necessary. In this paper, an implementation of a portable control point is proposed to store and manage UPnP device capability information. The portable control point can be used to find UPnP A/V compliant devices that are most compatible.

  • PDF

Improvements of Information Security Level in Electronic Financial Infrastructure(By Analyzing Information Security Management Level) (전자금융기반시설 정보보호 수준강화 방안 (정보보호 관리수준 분석을 통한))

  • Park, Keun-dug;Youm, Heung-youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1605-1618
    • /
    • 2016
  • In recent years, security incidents - such as personal information leakage, homepage hacking, DDoS and etc. - targeting finance companies(banks, securities companies, credit card companies, insurance companies and etc.) have increased steadily. In this paper, we analyze problems of information security management level in the existing electronic financial infrastructure from perspective of compliance and information security certification system and propose improvements to enable sustainable high level of information security activities under a comprehensive management system for the financial sector characteristics using ISMS, SECU-STAR and CNIVAM system.

e-C/O under FTA (FTA 체결에 따른 전자원산지증명서 활성화 방안)

  • Lee, Chang-Sook;Kim, Jong-Chill
    • International Commerce and Information Review
    • /
    • v.15 no.3
    • /
    • pp.475-498
    • /
    • 2013
  • The most fundamental reason why FTA Agreement must be concluded is based on the preferential tariff treatment among country parties. In order to get applied by the preferential tariff treatment under an FTA, the parties need to meet the rules of origin and the criteria stipulated under the FTA simultaneously. In addition, Certificate of Origin(C/O) document is required to claim for the preferential treatment under the FTA Agreement. In South Korea, the electronic Certificate of Origin can be issued by the UNI-PASS and FTA-PASS of the Korea Customs Service. The Web Certification System of the Korea Chamber of Commerce & Industry also is established. But the majority cases of requesting the preferential Certificate of Origin are generally performed by the business partners. The settlement and activation of electronic Certificate of Origin are urgently needed to maximize the effects of FTA, First, this paper examines the application situation of electronic Certificate of Origin throughly. Second, the current circumstances related to electronic Certificate Origin are analyzed in the practical and systematic perspectives. Finally, the improvements for activating electronic Certificate of Origin is suggested.

  • PDF

A Study on the Practical Methodology of Engineering Education through the Making of Smart Mirror (스마트 거울의 제작을 통해 이루어진 공학 교육 실천 방법론에 관한 연구)

  • Seo, Myeong-Deok;Kwon, Ji-Young;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.10 no.1
    • /
    • pp.9-15
    • /
    • 2018
  • A digital signage is constructed using a speech recognition based API, and VRSM (Voice Recognition Smart Mirror) that obtains information such as weather, map, exercise information, schedule, and image by user's voice command so as to be different from other commercialized products is proposed. This course provides an effective method of engineering education through the process of being evaluated as the result of independent graduation certification system, and also it had been the opportunity to design and produce works for 3 semesters by 2 students one group in the majors. Through the comprehensive capstone design, it has experienced engineering approach and creative thinking opportunity. We have won the best academic prize by participating in the academic conferences of the institute about the interim result, and obtained the results of the prize contest in other academic conferences. The improvement in practical skills obtained through this process proved to be beneficial for self-confidence and job-seeking opportunities through actual employment.

Design and Implementation of U-healthcare system with zigbee in service integration system (서비스 통합 시스템에서 지그비를 이용한 유비쿼터스 헬스케어 시스템의 설계 및 구현)

  • Jang, Mun-Suck;Shin, Kwang-Sik;Cheong, Jin-Ha;Yee, Yang-Hee;Shim, Jae-Hong;Lee, Eung-Hyuk;Choi, Sang-Bang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.16-24
    • /
    • 2006
  • In this paper, we implement a U-healthcare system that can be applied to a service integration system. This system consists of a wireless network system a sensor module, and a integration server. The wireless network system collects data and the sensor module measures body fat, blood pressure, quantity of exercise, and SPO2. The server integrates user certification, security service and VOD service and collects user health information in real-time, and sends the data in case of emergency to a doctor or guardian.

Establishing Security Level Standards and Case Studies for Safe Electronic Financial Transactions (안전한 전자금융거래를 위한 보안등급 기준마련 및 사례연구)

  • Jang, Kil-Young;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.729-741
    • /
    • 2018
  • On June 24, 2015, the Financial Services Commission (Financial Services Commission) completely abolished the security review process, and said that it would substitute self-security review obligations with self-security reviews. Security officials at financial institutions conduct security reviews based on CIA security grade when they conduct security reviews for secure electronic financial transactions. However, the recent security review for Internet and mobile electronic financial transactions has carried out a security review, either by checking separate processes or by referring to new technologies and data related to security. This paper proposes the CIAAP security gradesl with the addition of certification and privacy protection indicators to the CIA based security grades, especially through the security review of electronic financial transactions.

A Design and Implementation of Secure Electronic Bidding System (인터넷 기반 전자입찰시스템의 보안 설계 및 구현)

  • 윤선희
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.861-870
    • /
    • 2002
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. Widely spread the use of the internet, there are various applications for Business to Business (B to B) or Business to Customer(B to C) model that are based on the intranet or extranet. This paper designed and implemented the Web-based Electronic Bidding System for Business to Business (B to B) model. The technical issues of electronic bidding system in the internet are involved in the connection between web client and server, electronic data interchange for the contract document, and security solution during the bidding and contracting processes. The web-based electronic bidding system in this paper is implemented using Java applet and servlet as a connection interface for web client and sewer, XML/EDI-based documents for a bid and a contract, and bidding server and notary server for enhancing the security using PKI(Public Key Infrastructure)-based public key cryptography, digital signature and Certification Authority (CA).

  • PDF

A Multimedia Data Security System Based on MPEG Using The Specific of Wireless Device (무선 이동 단말기의 특성을 이용한 MPEG 기반의 멀티미디어 데이터 보안 시스템)

  • Lee, Jong-Kap;Seong, Hong-Seok;Won, Young-Jin;Lee, Jong-Sung;Lim, Seung-Ha;Lim, Young-Hwan
    • 전자공학회논문지 IE
    • /
    • v.46 no.2
    • /
    • pp.22-32
    • /
    • 2009
  • In this article, the protection system on wireless mobile communication circumstance for the information providers and the users is recommended. Because of its usefulness and convenience, the users of the wireless mobile communication are growing explosively. However, the function of protecting data systems is not secured enough so, personal information may disclose to the outside, regardless of one's intention. Therefore, the contents protection system, which can provide information to the user or hide it depending on user's identity, is suggested. If so, the providers and the users can trust each other for interchanging information, also the users may safely use contents menu whatever they want by doing simple certification process.