• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.043 seconds

A Comparative Assessment Between ACSS of Canada and FedACH of America as a Electronic Payment System (전자결제시스템으로서 캐나다의 ACSS와 미국의 FedACH의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.18 no.1
    • /
    • pp.55-78
    • /
    • 2016
  • This paper discusses on Electronic Payment System between U.S.A. and Canada. In particular, I focused on ACSS compare with FedACH(Fed Automated Clearing House) to advance a research effects. Because both of them is a low-value, high-volume retail payment system which their countries represent. The ACSS(Automated Clearing Settlement System) is the system through which the vast majority of CPA payment items are cleared, through various payment streams. In 2014, ACSS system cleared approximately 6.8billion payments worth a total value of $ 44.9 trillion. While, The FedACH Network are the center of America Commerce, moving more than $40 trillion each year. That's made up of almost 23 billion electronic financial transaction, including direct deposit via ACH, social security and government benefits, electronic bill payments such as utility and mortgage payments. Thus in this article, first of all, I considered features of payment system and the types of payment items between ACSS and FedAch. Second, I analyzed the status of central bank and legal background. Third, I focused on the operational policy and risk aversion policy. Lastly, I suggested that their payment and banking system have to assume, with good reason, more efficiently accurately and securely operation to protect their customer from credit risk and financial fraud.

  • PDF

A study on the navigation message contents of the future Korean navigation satellite (미래 한국형 항법위성을 위한 위성항법메세지에 대한 연구)

  • Jo, Jung-Hyun;Lee, Woo-Kyoung;Choe, Nam-Mi;Baek, Jeong-Ho
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.1
    • /
    • pp.108-115
    • /
    • 2012
  • Many studies relating the satellite navigation has been done by a relatively small research community in Korea. Most of domestic research has been focused on the application of the satellite navigation technology, but recently the topics of the next generation satellite navigation system are emphasized for its importance. Even opinions suggesting a future Korea's own satellite navigation system are not that uncommon. Due to the geographic, economic, and technological reasons, it is not widely discussed yet. However, a development technical roadmap regarding the Korea's own navigation satellite was established on the Korea Space Development Plan in general term. Currently four global navigation satellite systems are operating or being deployed. Several regional navigation satellite systems are in planning and development phase. Particularly in Asia, China has launched several satellites to complete their own global navigation satellite system, COMPASS until 2020. Japan launched one satellite and has planned to launch rest of set until 2013. It is proper time to develop Korea's own navigation satellite system to acquire the domestic space development technology and the security of navigational infrastructure. In this study, the validity or the feasibility of the Korea's own satellite navigation system is not discussed; rather the possibility and suitability of the additional information to the current operational navigation message is main target. For the first payload of the future Korea's satellite navigation satellite, a regional augmented system is more likely. This study also is focused on that aspect.

Implementation of the Electronic Prescription Security System Using by an If Card (IC 카드에 의한 원외 전자처방전 보안을 위한 시스템 구축)

  • Kang, Se-Na;Lee, Ki-Han
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.281-286
    • /
    • 2003
  • Nowadays, a patient's private medical data which is exposed to the outside world has a severe effect on not only the patient's private life but also his/her social activities and environment. So, it is important to securely protect the patient's private medical data from the illegal manipulation. This paper studies the method to store the electronic prescription information in an IC card. For that, an access control for users, such as a doctor, a nurse, a medical institute member, a pharmacy, a pharmacist, or a patient, is proposed to access the data stored in an IC card. The certificate is issued using the Crypto API of a certificate management model supported by Windows 2000. The public/private key is created by the Cryptographic Service Provider program, and the electronic prescription is signed using the digital signature. The proposed system, therefore, can improve the quality of medical services by securing the safety and integrity of the electronic prescription, stored in an IC card.

Development of Signal Detection Methods for ECG (Electrocardiogram) based u-Healthcare Systems (심전도기반 u-Healthcare 시스템을 위한 파형추출 방법)

  • Min, Chul-Hong;Kim, Tae-Seon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.6
    • /
    • pp.18-26
    • /
    • 2009
  • In this paper, we proposed multipurpose signal detection methods for ECG (electrocardiogram) based u-healthcare systems. For ECG based u-healthcare system, QRS signal extraction for cardiovascular disease diagnosis is essential. Also, for security and convenience reasons, it is desirable if u-healthcare system support biometric identification directly from user's bio-signal such as ECG for this case. For this, from Lead II signal, we developed QRS signal detection method and also, we developed signal extraction method for biometric identification using Lead II signal which is relatively robust from signal alteration by aging and diseases. For QRS signal detection capability from Lead II signal, ECG signals from MIT-BIH database are used and it showed 99.36% of accuracy and 99.68% of sensitivity. Also, to show the performance of signal extraction capability for biometric diagnosis purpose, Lead III signals are measured after drinking, smoking, or exercise to consider various monitoring conditions and it showed 99.92% of accuracy and 99.97% of sensitivity.

Indicator-based Behavior Ontology for Detecting Insider Threats in Network Systems

  • Kauh, Janghyuk;Lim, Wongi;Kwon, Koohyung;Lee, Jong-Eon;Kim, Jung-Jae;Ryu, Minwoo;Cha, Si-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5062-5079
    • /
    • 2017
  • Malicious insider threats have increased recently, and methods of the threats are diversifying every day. These insider threats are becoming a significant problem in corporations and governments today. From a technology standpoint, detecting potential insider threats is difficult in early stage because it is unpredictable. In order to prevent insider threats in early stage, it is necessary to collect all of insiders' data which flow in network systems, and then analyze whether the data are potential threat or not. However, analyzing all of data makes us spend too much time and cost. In addition, we need a large repository in order to collect and manage these data. To resolve this problem, we develop an indicator-based behavior ontology (IB2O) that allows us to understand and interpret insiders' data packets, and then to detect potential threats in early stage in network systems including social networks and company networks. To show feasibility of the behavior ontology, we developed a prototype platform called Insider Threat Detecting Extractor (ITDE) for detecting potential insider threats in early stage based on the behavior ontology. Finally, we showed how the behavior ontology would help detect potential inside threats in network system. We expect that the behavior ontology will be able to contribute to detecting malicious insider threats in early stage.

The Role of Bank Payment Obligation under SWIFTNet's Trade Service Utility (SWIFTNet TSU BPO의 역할)

  • Lee, Bong-Soo
    • International Commerce and Information Review
    • /
    • v.17 no.2
    • /
    • pp.3-18
    • /
    • 2015
  • This thesis examines the performance and improvement strategy of SWIFTNet TSU's BPO for computerization and suggests the following results: First, the URBPO should be legally complemented, and the SWIFT and banks need to keep improving the systems to meet trade parties' diverse needs. Second, the SWIFTNet TSU's BPO should have an institutionally unified sharing platform with security, stability and convenience. In other words, it is needed to develop services which meet e-payment paradigm and international and regional environments through continued analysis on market changes and flow. Third, in order for the SWIFTNet TSU BPO to evolve into a perfect global system, there should be an innovative payment solution which can meet all trade parties all over the world. For this, technology standardization for a worldwide e-trade payment system is essential. Lastly, based on the results derived from this study, an analysis framework with which more diverse and practical environmental variables can be analyzed should be developed.

  • PDF

Carrier Sensing Techniques for Long Range Internet of Things (장거리 사물인터넷을 위한 케리어 센싱 기술)

  • Lee, Il-Gu
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.33-39
    • /
    • 2018
  • In the Internet of Things (IoT) era, objects are connected to each other by wired and wireless networks, and information is exchanged whenever necessary. Channel and network environments change over time; thus, a carrier sensing function that identifies whether signals containing information are present in the channel is essential. The carrier sensing circuit of a wireless communication system determines the receiver sensitivity, and the receiver sensitivity is closely related to the service coverage and service quality of the system. As the receiver sensitivity decreases, the service coverage increases but it becomes sensitive to noise. However, as the receiver sensitivity increases, the service coverage decreases but it becomes insensitive to the noise. Therefore, carrier sensing design and optimization are very important from the viewpoint of the receiver sensitivity and noise sensitivity. This paper proposes an effective carrier sensing technique from the viewpoint of the receiver sensitivity for the long range IoT.

A study on Prevention of Large Scale Identity Theft through the Analysis of Login Pattern(Focusing on IP/Account Blocking System in Online Games) (로그인 패턴 분석을 통한 대규모 계정도용 차단 방안에 관한 연구(온라인 게임 IP/계정 차단시스템을 중심으로))

  • Yeon, Soo-Kwon;Yoo, Jin-Ho
    • Journal of Korea Game Society
    • /
    • v.16 no.2
    • /
    • pp.51-60
    • /
    • 2016
  • The incidents of massive personal information being leaked are occurring continuously over recent years. Personal information leaked outside is used for an illegal use of other's name and account theft. Especially it is happening on online games whose virtual goods, online game money and game items can be exchanged with real cash. When we research the real identity theft cases that happened in an online game, we can see that they happen massively in a short time. In this study, we define the characteristics of the mass attacks of the automated identity theft cases that occur in online games. Also we suggest a system to detect and prevent identity theft attacks in real time.

A Selection of Artificial Surveillance Zone through the Spatial Features Analysis of Crime Occurrence Place (범죄발생지점의 공간적 특성분석을 통한 인위적 감시지역의 선정)

  • Kim, Dong-Moon;Park, Jae-Kook
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.3
    • /
    • pp.83-90
    • /
    • 2010
  • In modern society, there has been an increase in needs to protect the life and property of the people, because the number of various crimes is on the increase due to the sudden and complicated changes of the urban environment. For the needs, security persons in the urban area are expanding the role and skill of police for more effective crime prevention and surveillance, although the number of policeman/woman is insufficient and their tasks are hard. Recently, a system to observe and prevent crime in effective has been introduced by using such an artificial surveillance device as CCTV to monitor focusing on one area for 24 hours. However, the system brings such problems as the insufficiency of systematic criteria to install surveillance device and the invasion of privacy. Therefore, in this study, artificial surveillance zones to monitor crimes are selected by applying spatial features between artificial surveillance devices including CCTV and crime occurrence place, and using GIS spatial analysis techniques. As a result of selecting, it's found that the number of CCTV is absolutely insufficient and spatial distribution is not fully considered in the existing location of installed CCTV.

The Improving Method of Facial Recognition Using the Genetic Algorithm (유전자 알고리즘에 의한 얼굴인식성능의 향상 방안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.95-105
    • /
    • 2005
  • As the security system using facial recognition, the recognition performance depends on the environments (e. g. face expression, hair style, age and make-up etc.) For the revision of easily changeable environment, it's generally used to set up the threshold, replace the face image which covers the threshold into images already registered, and update the face images additionally. However, this usage has the weakness of inaccuracy matching results or can easily active by analogous face images. So, we propose the genetic algorithm which absorbs greatly the facial similarity degree and the recognition target variety, and has excellence studying capacity to avoid registering inaccuracy. We experimented variable and similar face images (each 30 face images per one, total 300 images) and performed inherent face images based on ingredient analysis as face recognition technique. The proposed method resulted in not only the recognition improvement of a dominant gene but also decreasing the reaction rate to a recessive gene.

  • PDF