Browse > Article
http://dx.doi.org/10.7472/jksii.2015.16.1.09

The secured mobile wallet system using by integrated ID  

Nam, Choon-Sung (School of Information, Yonsei University)
Jeon, Min-Kyung (College of Information and Communication Engineering, SungKyunKwan University)
Shin, Dong-Ryeol (College of Information and Communication Engineering, SungKyunKwan University)
Publication Information
Journal of Internet Computing and Services / v.16, no.1, 2015 , pp. 9-20 More about this Journal
Abstract
Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.
Keywords
Smart Wallet; Payment System; Integrated ID; Single Tapping;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Smart wallet : Google Patent http://www.google.com/patents/US20110320345
2 C. Benninger, "A Brave New Wallet - First look at decompiling Google Wallet," Intrepidus Group Insight,Sep. 2011, http://intrepidusgroup.com/insight/2011/09/a-brave-new-wallet-first-look-at-decompiling-google-wallet/
3 OpenID.net: OpenID Specifications, http://openid.net/developers/specs/
4 Luca Mainetti, Luigi Patrono, and Roberto Vergallo, "IDA-Pay: a secure and efficient micro-payment system based on Peer-to-Peer NFC technology for Android mobile devices", Journal of Communications Software & Systems. Vol. 8 Issue 4, Dec2012, pp 117-125. http://connection.ebscohost.com/c/articles/87531092/ida-pay-secure-efficient-micro-payment-system-based-peer-to-peer-nfc-technology-android-mobile-devices   DOI
5 Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis, "Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones". Radio Frequency Identification: Security and Privacy Issues, 2010. pp. 35-49. http://dx.doi.org/10.1007/978-3-642-16822-2_4   DOI
6 Michael Roland, Josef Langer, Josef Scharinger, "Applying relay attacks to Google Wallet", IEEE 5th NFC International Workshop, 2013. http://dx.doi.org/10.1109/NFC.2013.6482441   DOI
7 Andreas Leicher, Andreas U. Schmidt, Yogendra Shah, "Smart OpenID: A Smart Card Based OpenID Protocol", 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp 75-86. http://dx.doi.org/10.1007/978-3-642-30436-1_7   DOI
8 David Recordon, Drummond Reed, "OpenID 2.0: a platform for user-centric identity management", DIM '06 Proceedings of the second ACM workshop on Digital identity management, 2006, pp. 11-16. http://dx.doi.org/10.1145/1179529.1179532   DOI
9 Tsyrklevich, E., Tsyrklevich, "V.: Single Sign-On for the Internet: A Security Story, BlackHat Conference Las Vegas, 2007. http://amifan.googlecode.com/svn-history/r94/trunk/bh-usa-07-tsyrklevich-WP.pdf
10 Urien, P.: Convergent identity: Seamless OpenID services for 3G dongles using SSL enabled USIM smart cards. In: Consumer Communications and Networking Conference (CCNC), 2011, pp. 830-831. http://dx.doi.org/10.1109/CCNC.2011.5766616   DOI
11 Pascal Urien, "An OpenID Provider based on SSL Smart Cards", CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference, 2010, pp 444-445. http://dl.acm.org/citation.cfm?id=1834318
12 3GPP TS 33.220; "Generic Authentication Architecture (GAA). Generic Bootstrapping Architecture(GBA)", 2006. http://www.etsi.org/deliver/etsi_tr/133900_133999/133919/06.02.00_60/tr_133919v060200p.pdf
13 3GPP: 3G security; Security architecture. TS 33.102, 3rd Generation Partnership Project (3GPP), 2009. http://www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/old_vsns/33102-3b0.pdf
14 Liberty Alliance: ID-WSF Advanced Client Implementation and Deployment guidelines for SIM/UICC Card environment. Technical report, 2007. http://www.projectliberty.org/resource_center/specifications/?f=resource_center/specifications
15 Felix Gomez Marmol, Marcus Quintino Kuhnen, Gregorio Martinez Perez, "Enhancing OpenID through a Reputation Framework", 8th International Conference, ATC 11', Banff, Canada, Proceedings, Sep 2011, pp. 1-18. http://dx.doi.org/10.1007/978-3-642-23496-5_1
16 Rao, T. Venkat Narayana, and K. Vedavathi. "Authentication Using Mobile Phone as a Security Token." International Journal of Computer Science and Engineering Technology, IJCSET 1.9, 2011, pp.569-574. http://ijcset.net/docs/Volumes/volume1issue9/ijcset2011010908.pdf
17 Seung-Hyun Seo, "One-Time Virtual Card Number Generation & Transaction Protocol using Integrated Authentication Center",Journal of the Korea Institute of Information Security and Cryptology, Vol 20, no 3. 2010, pp. 9-21. http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2010_v20n3_9
18 Apple Inc, "Getting Started with Apple Pay - Version 1.0", 2014. https://developer.apple.com/apple-pay/Getting-Startedwith-Apple-Pay.pdf
19 Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le, "Lightweight Mobile Credit-Card Payment Protocol", 4th International Conference on Cryptology in India, New Delhi, India, Dec 2003, pp. 295-308. http://dx.doi.org/10.1007/978-3-540-24582-7_22   DOI
20 Martinez-Pelaez, Rafael, et al. "Performance Analysis of Mobile Payment Protocols over the Bluetooth Wireless Network." 6th COLLECteR Iberoamerica (2008). https://scholar.google.co.kr/scholar?q=Performance+Analysis+of+Mobile+Payment+Protocols+over+the+Bluetooth+Wireless+Network&btnG=&hl=en&as_sdt=0%2C5