• Title/Summary/Keyword: electronic financial transaction

Search Result 65, Processing Time 0.02 seconds

A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing (빅데이터 기반의 융합 보이스피싱을 이용한사회공학적 공격 기법과 대응방안)

  • Kim, Jung-Hoon;Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.1
    • /
    • pp.85-91
    • /
    • 2015
  • Recently government has distributed precautionary measure and response procedures for smishing(SMS phishing), pharming, phishing, memory hacking and intensified Electronic Financial Transaction Act because of the sharp increase of electronic bank frauds. However, the methods of electronic bank frauds also developed and changed accordingly so much it becomes hard to cope with them. In contrast to earlier voice phishing targeted randomizing object, these new methods find out the personal information of targets and analyze them in detail making a big data base. And they are progressed into new kind of electronic bank frauds using those analyzed informations for voice phishing. This study analyze the attack method of voice phishing blended with the Big Data of personal informations and suggests response procedures for electronic bank frauds increasingly developed. Using the method to save meaningless data in a memory, attackers cannot deduct accurate information and try voice phishing properly even though they obtain personal information based on the Big Data. This study analyze newly developed social technologic attacks and suggests response procedures for them.

Virtual Credit Card Number Payment System with Stored Hash Value for Efficient Authentication (효율적인 인증을 위한 해시 저장방식의 가상카드번호 결제 시스템)

  • Park, Chan-Ho;Kim, Gun-Woo;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.5-15
    • /
    • 2015
  • Electronic transactions have been increasing with the development of the high-speed Internet and wireless communication. However, in recent years financial corporations and mobile carriers were attacked by hackers. And large numbers of privacy information have been leaked. In particular, in the case of credit card information can be misused in the online transaction, and the damage of this given to cardholder. To prevent these problems, it has been proposed to use a virtual card number instead of the actual card number. But it has security vulnerability and requires additional security infrastructure. In this paper, we analyzed the proposed virtual card number schemes. and we propose a new virtual credit card number scheme. In the newly proposed scheme, cardholder generates a key pair (public key/private key) and pre-register public key to the issuer. then, cardholder can pay no additional security infrastructure while still efficiently satisfy the security requirements.

New high-efficient universal code(BL-beta) proposal for com pressed data transferring of real-time IoT sensing or financia l transaction data (IoT 및 금융 거래 실시간 데이터 정보의 압축 전송을 위한 새로운 고효율 유니버설 코드(BL-beta) 제안)

  • Kim, Jung-Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.421-429
    • /
    • 2018
  • While IoT device sensing data or financial transaction data is transmitted in real time, huge data traffic is generated in processing it. This huge data can be effectively compressed or transmitted using universal code, which is a real-time lossless compressor. In this paper, we propose our BL-beta code, which is newly developed universal code for compressing stock trading data, which the maximum range of measured values is difficult to predict and is generated within a relatively constant range over a very short period of time. For compressing real-time stock trading data, Compared with the fixed length bit transmission, the compression efficiency is at least 49.5% higher than that of the fixed length bit transmission, and the compression transmission performance is 16.6% better than the Exponential Golomb code.

A Comparative Assessment Between ACSS of Canada and FedACH of America as a Electronic Payment System (전자결제시스템으로서 캐나다의 ACSS와 미국의 FedACH의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.18 no.1
    • /
    • pp.55-78
    • /
    • 2016
  • This paper discusses on Electronic Payment System between U.S.A. and Canada. In particular, I focused on ACSS compare with FedACH(Fed Automated Clearing House) to advance a research effects. Because both of them is a low-value, high-volume retail payment system which their countries represent. The ACSS(Automated Clearing Settlement System) is the system through which the vast majority of CPA payment items are cleared, through various payment streams. In 2014, ACSS system cleared approximately 6.8billion payments worth a total value of $ 44.9 trillion. While, The FedACH Network are the center of America Commerce, moving more than $40 trillion each year. That's made up of almost 23 billion electronic financial transaction, including direct deposit via ACH, social security and government benefits, electronic bill payments such as utility and mortgage payments. Thus in this article, first of all, I considered features of payment system and the types of payment items between ACSS and FedAch. Second, I analyzed the status of central bank and legal background. Third, I focused on the operational policy and risk aversion policy. Lastly, I suggested that their payment and banking system have to assume, with good reason, more efficiently accurately and securely operation to protect their customer from credit risk and financial fraud.

  • PDF

A Study on the Electronic Payment Systems for International e-Business (국제전자상거래를 위한 전자결제시스템에 관한 연구)

  • 이내준
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1339-1348
    • /
    • 2001
  • This study is directed to compare the payment systems between conventional and internet, under international commerce. A stable and secure payment system is necessary for the progress of e-business through the internet. There are three typical methods of payment system in conventional transactions; the letter of credit(L/C) basis, the collection basis and the remittance basis. The exporter prefers L/C basis because of authentic payment, financial convenience and reduced risk Buyers and sellers who have enjoyed long creditable relationships use carefully the collection basis. The remittance basis is adequate for small amount payment for sample. In this paper, the merits and demerits of electronic payment system are compared to the conventional payment one. Internet payment system has an advantage of speed-up in payment against the conventional, but has a limited usage in the area of consumer based(B to C) transaction. The conventional payment system has been becoming overwhelm electronic payment one in the business to business(B to B) area.

  • PDF

A Study on the Implications by the Introduction of TSU/BPO System as a Instrument of Trade Settlement (무역결제수단인 TSU/BPO 제도의 도입에 따른 시사점에 관한 연구)

  • Han, Nak Hyun;Kim, Young Gon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.60
    • /
    • pp.141-175
    • /
    • 2013
  • The purpose of this study aims to the implications by the introduction of TSU/BPO system as a instrument of trade settlement. Jointly with financial messaging provider SWIFT, the ICC Banking Commission has developed the URBPO to take into account the legitimate expectations of all relevant sectors. Once the goods have been shipped, the seller's bank uploads the shipping and logistics data to the TSU to be checked against the baseline. URBPO is the first ever set of standards in supply chain finance that governs BPO transactions worldwide. BPO enables banks to reduce the risks associated with international trade to the benefit of both buyers and sellers. A BPO is an irrevocable undertaking given by an Obliger Bank to a Recipient Bank to pay a specified amount under the condition of a successful electronic matching of data or acceptance of mismatches. The BPO should be viewed as an exercise in collaboration between trading partners and their banks. Drawings upon global standards and incorporating the benefits offered by letters of credit, the new instrument has the potential to benefit all parties in a trade transaction-and bring trade settlement into the 21st century.

  • PDF

Applications of Data Mining Techniques to Operations Planning for Real Time Order Confirmation (실시간 주문 확답을 위한 데이터 마이닝 기반 운용 계획 모델)

  • Han Hyun-Soo;Oh Dong-Ha
    • Korean Management Science Review
    • /
    • v.21 no.3
    • /
    • pp.101-113
    • /
    • 2004
  • In the rapidly propagating Internet based electronic transaction environment. the importance of real time order confirmation has been more emphasized, In this paper, using data mining techniques, we develop intelligent operations decision model to allow real time order confirmation at the time the customer places an order with required delivery terms. Among various operation plannings used for order fulfillment. mill routing is the first interface decision point to link the order receiving at the marketing with the production planning for order fulfillment. Though linear programming based mathematical optimization techniques are mostly used for mill routing problems, some early orders should wait until sufficient orders are gathered for optimization. And that could effect longer order fulfillment lead-time, and prevent instant order confirmation of delivery terms. To cope with this problem, we provide the intelligent decision model to allow instant order based mill routing decisions. Data mining techniques of decision trees and neural networks. which are more popular in marketing and financial applications, are used to develop the model. Through diverse computational trials with the industrial data from the steel company. we have reported that the performance of the proposed approach is effective compared to the present heuristic only mill routing results. Various issues of data mining techniques application to the mill routing problems having linear programming characteristics are also discussed.

Development of e-Receipt System Using Embedded Software Engineering Techniques (임베디드 소프트웨어 공학기법을 사용한 전자영수증 체계의 개발)

  • Lim, Joon-Suk;Oh, Young-Seok;Um, Sung-Sik;Joo, Bok-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.117-122
    • /
    • 2009
  • In these days, world economic crisis is getting worse and most of us are having difficulties in handling financial balance. By noticing that credit card is the most important payment method of individuals, we developed e-receipt system, which helps a person easily keep track of credit card spendings by showing purchase and transaction details in real-time. We've used embedded software engineering techniques in developing the e-receipt system. The system we developed here will benefit most of us by preventing over-spending of credit cards and will lead to healthy spending habits.

  • PDF

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

A Study on the Improvement of Competitive Power of Small and Medium Export Business through using the BPO and SCF (BPO·공급망금융의 이용을 통한 중소수출기업의 경쟁력 제고방안에 관한 연구)

  • Jang, Eun-Hee;Hwang, Jee-Hyon
    • Korea Trade Review
    • /
    • v.42 no.5
    • /
    • pp.233-252
    • /
    • 2017
  • The fast changes of global financial environment in recent years increase the risk of trade settlement. This means are required to minimize risk of non payment and to maximize secure payment. Open Account trade accounts for 90% of global trade flows. The O/A system means that the goods, along with all the necessary documents, are shipped and delivered before payment is due, usually within a time frame from 30 to 90 days. Meanwhile, Korean small and medium-sized export enterprises are compelled to globalize their activities owing to limitation and competitiveness of domestic marketplace. To keep face with the global trade settlement system and to support globalization of small and medium-sized export firms, the BPO together with Supply Chain Finance will be solutions. The introduction of the BPO system will allow banks to broaden O/A offerings to their client base and due to secure safety, sellers could ship the goods without delay according to orders and buyers could settle promptly by payment undertaking of correspondent banks. Therefore, it is more effective for companies which have sustainable customers and stable transaction. This study take a look at the trend of the global payment systems and suggested limitation of existed payment in order to derive improvement measures of electronic payment for small and medium-sized export enterprises.

  • PDF