• Title/Summary/Keyword: 결제 인증

Search Result 169, Processing Time 0.034 seconds

MVC Implementation of Online Digital Contents Shopping Mall (온라인 디지털 컨텐츠 쇼핑몰의 MVC 기반 구현)

  • Seo, Juwan;Choi, Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.1008-1011
    • /
    • 2015
  • 본 연구는 디지털 컨텐츠를 판매하는 쇼핑몰에서 각 컨텐츠에 대해서 개별적으로 신용카드 기반으로 결제/판매할 수 있도록 하는 시스템이다. 이를 위해 본 연구에서는 PHP 기반 쇼핑몰 전반부(front-end)와 Spring MVC 기반 쇼핑몰 후반후(Back-end)를 분리하여 구현하였다. 전반부에서는 기본적으로 판매되는 각 디지털 컨텐츠를 분류별로 보여주는 기능을 구현하였고, 후반부에서는 각 디지털 컨텐츠에 대한 상세정보를 보여주며 신용카드 결제/IP 기반 접속제한/로깅(logging) 기능 등을 제공하도록 하였다. 특정 디지털 컨텐츠를 온라인으로 결제시에는 그로부터 24시간내에는 몇 번이고 다운로드 할 수 있도록 서비스 하기 위해서, E-rnail을 통한 인증코드(access code)를 제공하는 기능도 구현하였다. 또한, 이러한 구현을 Spring MVC 3.0 기반 구조에 의거하여 구현함으로써, 향후 시스템 유지보수성을 획기적으로 향상시켰다.

The legal issues on the fintech and e-commerce payment (전자상거래 지급결제의 핀테크 활성화를 위한 보안 및 법제도적 과제)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.25-31
    • /
    • 2015
  • While information and communication develop, the Electronic commerce payment system is progressing. Recently, a government established the electronic commerce activation policy which simplified a payment Through this policy, the information which the financial company monopolizes can be fused with the other industry and create the popularization use of the electronic payment service and value added services. But on the other hand, the concern for the security is very high, Accordingly, the finnancial institute take a restriction of the requirements for the participation company according to the financial scale, this policy is led by the private institue, rather making a participation of fin tech venture difficulty. This paper tries to deal with the technical and legal problems for the activation of electronic payment system and fin tech. So I will examine the security matter that follows in grifting the innovation technology onto the existing payment service and propose a desirable way to improve the current legislation.

Active Authentication Method using NFC (NFC를 활용한 능동형 인증 방법)

  • Lee, Min-Gu;Kim, Dong-Wan;Sohn, Jin-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.140-156
    • /
    • 2012
  • Since most of recently launched smart devices support NFC(Near Field Communication), RFID applications are tend to be replaced. For instance, previous RFID application areas such as entrance control, mobile e-ticket, electronic payment and et. al are subject to change using NFC. Due to the limitation of passive communication in RFID, it is impossible to cover all security requirements of authentication and authorization mechanism that wide areas of applications demand. Therefore authentication and authorization mechanism based on NFC is very attractive to such applications because active communication methods make it possible to be highly secure in authentication and authorization. In this paper, authors propose a new approach of secure authentication and authorization mechanism using NFC smart devices based on EAP(Extensible Authentication Protocol) and AAA(Authentication, Authorization and Accounting) protocols.

Mobile User Authentication using Keystroke Dynamics Analysis (키스트로크 다이나믹스 분석을 이용한 모바일 사용자 인증)

  • Hwang, Seong-Seop;Jo, Seong-Jun;Park, Seong-Hun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.652-655
    • /
    • 2006
  • 최근 핸드폰 같은 휴대용 단말기의 용도는 통화 이외에도 예금, 증권, 결제, 신원확인 등과 같은 다양한 어플리케이션으로 발전하고 있다. 본 논문에서는 키스트로크 기반의 사용자 인증을 이용한 모바일 보안강화 방안에 대하여 논의한다. 키스트로크 다이나믹스 패턴분석은 사용자가 특정 문자열을 타이핑할 때의 입력 패턴을 고려한 분석 방법이다. 본 연구는 휴대단말기의 짧은 암호사용의 문제점을 극복하기 위하여 인공리듬과 템포 큐를 활용하였으며, 높은 분류 성능을 보여주었다.

  • PDF

User Authentication based on SMS and OTP (SMS와 OTP 개념을 이용한 사용자 인증)

  • 김우경;이경현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.433-435
    • /
    • 2004
  • 인터넷을 통한 자동화된 업무를 위하여, 공공 컴퓨터들에 대한 의존도가 높아지고 있다. 그러나 오늘날 웹 메일이나 옥션, 인터넷 뱅킹 흑은 휴대폰 결제 등을 위한 원격 서비스들은 사용자의 신원을 증명하기 위해 반드시 사용자의 아이디와 패스워드 또는 주민등록번호를 요구한다. 하지만 안전하지 못한 채널로 전송되는 사용자의 패스워드는 공격자에 의해서 도청되어, 재사용 될 가능성이 매우 높다. 본 논문에서는 위와 같이 보안이 취약한 환경에서 안전한 사용자 인증이 성공적으로 이루어 질 수 있는 새로운 시스템을 제안하고자 한다. 제안 시스템은 현대의 일반 사용자들이 항상 소지하는 휴대폰의 SMS(Simple Message Service)와 일회용 패스워드(OTP : One Time Password)를 기반으로 한다.

  • PDF

A remote user authentication protocol using a Smart Card (스마트카드를 이용한 원격 사용자 인증 프로토콜)

  • 김한수;송하윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.476-478
    • /
    • 2003
  • 정보 기술의 급속한 발전으로 스마트카드는 무선 통신, 공중전화 서비스, 전자 상거래, 교통 분야등 여러 활용 분야에서 사용되고 있으며 특히 현금이나 신용카드를 대체하는 결제수단으로 떠오르면서 우리 생활에 많은 변화를 일으키고 있다. 그러나 이러한 편리함 뒤에는 평소 우리가 생각하지 못했던 일들, 예컨대 개인 정보의 유출 등의 사고가 발생하여 시스템 안전에 대한 문제가 제기되고 있는 실정이다. 그동안 스마트카드를 이용한 원격 인증에 있어 ElGamal 알고리즘이나 해쉬 함수를 이용하여 시스템이 사용자를 인증하는 단방향 인증이 연구되어 왔으나, 기술의 발달로 시스템에 대한 위조가 가능해지면서 보다 강화된 보안의 필요성이 대두되었다. 본 논문에서는 이산대수와 해쉬 함수를 결합한 하이브리드 방식으로 스마트카드를 이용한 원격 사용자 양방향 인증을 설계하였다.

  • PDF

A Proposal for Mobile Gallery Auction Method Using NFC-based FIDO and 2 Factor Technology and Permission-type Distributed Director Block-chain (NFC 기반 FIDO(Fast IDentity Online) 및 2 Factor 기술과 허가형 분산원장 블록체인을 이용한 모바일 갤러리 경매 방안 제안)

  • Noh, Sun-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.129-135
    • /
    • 2019
  • Recently, studies have been conducted to improve the m-commerce process in the NFC-based mobile environment and the increase of the number of smart phones built in NFC. Since authentication is important in mobile electronic payment, FIDO(Fast IDentity Online) and 2 Factor electronic payment system are applied. In addition, block-chains using distributed raw materials have emerged as a representative technology of the fourth industry. In this study, for the mobile gallery auction of the traders using NFC embedded terminal (smartphone) in a small gallery auction in which an unspecified minority participates, password-based authentication and biometric authentication technology (fingerprint) were applied to record transaction details and ownership transfer of the auction participants in electronic payment. And, for the cost reduction and data integrity related to gallery auction, the private distributed director block chain was constructed and used. In addition, domestic and foreign cases applying block chain in the auction field were investigated and compared. In the future, the study will also study the implementation of block chain networks and smart contract and the integration of block chain and artificial intelligence to apply the proposed method.

Proposal of Promotion Strategy of Mobile Easy Payment Service Using Topic Modeling and PEST-SWOT Analysis (모바일 간편 결제 서비스 활성화 전략 : 토픽 모델링과 PEST - SWOT 분석 방법론을 기반으로)

  • Park, Seongwoo;Kim, Sehyoung;Kang, Juyoung
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.365-385
    • /
    • 2022
  • The easy payment service is a payment and remittance service that uses a simple authentication method. As online transactions have increased due to COVID-19, the use of an easy payment service is increasing. At the same time, electronic financial industries such as Naver Pay, Kakao Pay, and Toss are diversifying the competition structure of the easy payment market; meanwhile overseas fintech companies PayPal and Alibaba have a unique market share in their own countries, while competition is intensifying in the domestic easy payment market, as there is no unique market share. In this study, the participants in the easy payment market were classified as electronic financial companies, mobile phone manufacturers, and financial companies, and a SWOT analysis was conducted on the representative services in each industry. The analysis examined the user reviews of Google Play Store via a topic modeling analysis, and it employed positive topics as strengths and negative topics as weaknesses. In addition, topic modeling was conducted by dividing news articles into political, economic, social, and technology (PEST) articles to derive the opportunities and threats to easy payment services. Through this research, we intend to confirm the service capabilities of easy payment companies and propose a service activation strategy that allows gaining the upper hand in the market.

Function verification and demonstration of mobile Gallery-Auction using NFC-based 2-Factor electronic payment (NFC 기반 2 Factor 전자결제를 이용한 모바일 갤러리-옥션의 기능 검증 및 시현)

  • Cha, Yoon Seok;Oh, Soo Hee;Kim, YongIl;Noh, SunKuk
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.24-30
    • /
    • 2018
  • Acquisition of the FIDO authentication technology in pursuit of improved security function of the NFC-based 2 factor electronic payment system enabled GenoTech Ch., Ltd. to develop its new service, Gallery-Auction, demoed at Daegu Exhibition. The demonstration was followed by the improvement requests in banner creation & installation, changes in UI, changes in order of operation, etc, which were taken into account for the succeeding update. During the second demonstration held at 'Art: Gwangju: 17,' it analyzed and visualized the number of visitors per hour there.

Electronic Settlement System Model Using an Indirect Authentication Method by Interrelationship (상호 관계성을 가진 간접 인증 방법을 이용한 전자 결제 시스템)

  • Park, Young-Ho;Lee, Keum-Suk
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.2
    • /
    • pp.93-99
    • /
    • 1998
  • There is only authentication of end-to-end in electronic commerce technique. But in a distributed system, an authentication that is ensured users and computers has a big threats which an identify of those is unbelievable because it can be occurred an fabrication or a false personation. Authentication for other elements included customers and vendors is required in the case that there is many a broker connecting customers with vendors as well. In authentication like above, many elements playing different role participated, were performed by the known techniques, processing was more complicated. In this paper, the Mutual Indirect Authentication technique is used to solve and avoid that condition and the generalized electronic commerce using a mobile agent is accomplished with this technique.

  • PDF