• 제목/요약/키워드: Electronic Security Service

검색결과 304건 처리시간 0.032초

A Study on the Active Plan of Internet Fashion Shopping-Mall (인터넷 패션 쇼핑몰의 활성화 방안에 관한 연구)

  • Jang, Dong-Rim;Kim, Yoon
    • The Research Journal of the Costume Culture
    • /
    • 제8권3호
    • /
    • pp.360-373
    • /
    • 2000
  • The purpose of this thesis is to analyze the present conditions and problems of the Internet Fashion Shopping-Mall, grope for as active plan to the Internet Fashion Shopping-Mall as a strategic method of fashion industry. The fashion industry of Internet Electronic Commerce has good prospect, and I propose the following some strategic plans of Internet Fashion Shopping-Mall. On the basis of my study, as a means of technology supplement, Virtual Reality System, such as 3D System or the newest Electronic Dressing Room System to solve the problem of products'an actual feeling, should be needed for consumers to feel as they really put the clothes on. Second, to offer more diversity programs, such as consumer sensitivity program, additional service, fashion news, life information and so on, are needed for companies to come over again the consumers to connect to the shopping-mall site. And, to build more perfect security terms of payment systems, such as ICash, Disital Cash, Net Check, Internet Insurance and so on, should be introduced for consumers to pay and furnish their personal information. If these technological developments are realized, Internet Fashion Shopping-Mall products will be a great success.

  • PDF

Loyalty System as a Secure Payment Scheme in Multiple Internet Shopping Malls (복수의 인터넷 쇼핑몰에서 통용되는 안전한 전자상거래 지불수단으로서 로열티시스템)

  • Yoon, Hye-Suk;Kim, Young-Kuk;Choi, Hoon;Hong, Seung-Jae
    • The Transactions of the Korea Information Processing Society
    • /
    • 제7권5S호
    • /
    • pp.1676-1686
    • /
    • 2000
  • The growth of the Internet has brought may kinds of electronic payment schemes that can be applied to electronic commerce applications. Generally speaking, conventional loyalty system is not a payment system but a part of customer service. Our loyalty system, however, adds monetary functions and security mechanism to the concept of bonus point, so it can make the electronic markets user entire bonus system as an electronic payment scheme, First, we introduce the organization and the protocol structure of he loyalty system. Next, we describe monetary characteristics, security scheme and anonymity to show our loyalty system can be used a functionally complete payment system.

  • PDF

Implementation of Kiosk-based Internet Public Services System (키오스크 기반 인터넷민원처리시스템의 구현)

  • An, Im-Sang;Jeong, Gi-Won
    • The KIPS Transactions:PartA
    • /
    • 제10A권5호
    • /
    • pp.433-438
    • /
    • 2003
  • To provede public services through Internet, there are several prerequisites such as security issue resolutions for public area installation and hardware support for authorized signatures etc. in addition to web-based system development. A kiosk-based system is a right solution for public services provision through Internet because a kiosk has hardware features supporting authorized signatures and also it can be installed at public area through Internet without security exposure, meeting security guidelines of National Intelligence Service. The process to provide public services through a koisk is that a client requests a kind of public services selecting menu through the kiosk, then the system issues a civil service documents after taking authentification and payment process. To support those kinds o processes it is required to support electronic payment using SMART card in addition to cash payment and to apply government standard security guidelines to protect administrative and personal information. This kiosk-based Internet public service system support and meet those all requirements.

Security Architecture for U-Healthcare Application in Wireless Sensor Network (무선 센서 네트워크에서의 유비쿼터스 헬스케어 시스템을 위한 보안 구조)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.884-885
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other health care related staffs. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper surveyed a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic personal health records.

  • PDF

A Comparison Analytical Study on the B2B Electronic Trade Settlement System (B2B 전자무역대금결제시스템 비교.분석에 관한 연구)

  • Song Yong-Jong
    • Management & Information Systems Review
    • /
    • 제14권
    • /
    • pp.151-180
    • /
    • 2004
  • Owing to the digital revolution, Internet Commerce and Electronic commerce, revolutionize the way of doing business and making payment. The entrance of the Internet has a prominent for spread of Electronic Commerce and those phenomenons will result in paperless trading and cashless trade. By virtue of Internet, an increasing share of business transactions occurs online. Electronic payment is essential for the smooth progress of the electronic commerce as electronic payment plays the important role in the electronic commerce, that is, the value transfer restyling from the electronic commerce. Traditionally international settlement systems such as letters of credits, remittance and documentary collections operated as important and poplar method of payment, Now, information technology has made it possible to pay for the sale of goods and services over the internet. In international trade, there are service providers (bolero, TradeCard, BeXcom) to settle payment electronically through the Internet. The purpose of this study is to Conduct comparative analysis with approach manner functional respect systematic respect, role. It is shown which the Electronic payment system is better. In this study, the author attempts to find the problems is (bolero, TradeCard, BeXcom) and solutions in switching from the documentary payment system to the electronic one. This conclusion of this study can be summarized as followings. In resoect of the law, bolero should seek to prevert the users from being treated unfairly due to multilateral agreement on Rulebook. TradeCard, BeXcom do not have the proper law that users are governed. so far as the practice problems concerned, stability of computer's operation and security of message interchange should be warranted and improved continuously. Through the standardization of the electronic document and the development of software, the examination of the shipping occuments must be done automatically. Bolero should induce more banks to take part in Bolero, and make the carrier the cost and time in managing the traditional document which will be used for the time being. In respect of information technology and security, to deduce the risk in the electronic settlement system and positively uses the global authentication guideline(Identrus).

  • PDF

A Study on the Perceived characteristics of the mobile payment service using the technology acceptance model (기술수용모델을 활용한 모바일 소액결제 시스템의 인지적 특성 분석)

  • 이석기;김성희
    • Journal of the Korea Society of Computer and Information
    • /
    • 제9권1호
    • /
    • pp.103-109
    • /
    • 2004
  • Mobile payment service is a new innovating technology in the micro payment industry. Although it emerged only one or two years a9o in Korea, it is now highly used and prospered by many online companies. Traditional studies concerning the electronic payment system are usually about the payment process itself, so they stressed the security or the robustness of the process. The study from the angle of behavioral science seldom exists. This article describes the phenomenon of technology adoption with a particular focus on telephone Payment service. The article identifies which characteristic of the telephone payment service affects to the user status (user, non-users). To do this, this article mainly used Roger's Technology Acceptance Model and some characteristics are added to the model. The most important perceptual characteristic that affects to the user status was not security, but ease of use-the telephone payment service had to enhance continuously for the competitive advantage over the other payment service. Observability and convenience are also noted as important.

  • PDF

POSCAL : A Protocol of Service Access Control by Authentication Level (인증 수준에 의한 서비스 접근제어 프로토콜)

  • Yoo, SeongMin;Choi, SeokJin;Park, JunHoo;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제28권6호
    • /
    • pp.1509-1522
    • /
    • 2018
  • The purpose of this study is to support flexible authentication functions in various services using various types of user information. Rather than requiring the same level of authentication for all services, the goal is to identify the level of authentication at the time of user authentication and to increase convenience and efficiency by dynamically granting authority. In this paper, we propose POSCAL (Protocol of Service Control by Authentication Level) protocol which can control service access based on various local authentication information. To verify the function of the authentication framework, we developed the electronic wallet service based on the POSCAL authentication framework and evaluated the implementation function based on the use case scenario. The proposed protocol satisfies user and message authentication, confidentiality of authentication information, integrity of authentication history, non - repudiation of authorization, and access control by service according to security level.

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

A Study of Factors Affecting on Trust and Participation of Group Buying on the Internet (인터넷 공동구매의 신뢰와 참여에 영향을 미치는 요인에 관한 연구)

  • Jeon, Gun-Su;Lee, Young-Hun
    • Journal of Industrial Convergence
    • /
    • 제1권2호
    • /
    • pp.107-124
    • /
    • 2003
  • With rapid growth and competition of electronic commerce through internet, various buying types and business models are being appeared. In this paper, we studied group buying which is new business model to consumer and factors affecting on trust and participation of group buying. The followings are the regression result of this study. First, familiarity factor, customer service factor, seal of security and product value factor made a significant effect on trust. Second, familiarity factor, perceived reputation factor, customer service factor, seal of security and product value factor made a significant effect on participation of group buying. Third, trust of group buying made a significant effect on participation of group buying. In this study, modeling and empirical test were implemented about structure of trust and participation of group buying. We can know where our group buying strategies should focus and which factor we should improve.

  • PDF

Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.1180-1200
    • /
    • 2017
  • Currently, automated payment services provide intuitive user interfaces by adapting various wireless communication devices with mobile services. For example, companies like Samsung, Google, and Apple have selected the NFC payment method to service payments of existing credit cards. An electronic payment standard has been released for NFC activation within Korea and will strengthen the safety of payment service communications. However, there are various security risks regarding the NFC-based electronic payment method. In particular, the NFC payment service using the recently released lightweight devices cannot provide the cryptographic strength that is supported by many financial transaction services. This is largely due to its computational complexity and large storage resource requirements. The chaotic map introduced in this study can generate a highly complicated code as it is sensitive to the initial conditions. As the lightweight study using the chaotic map has been actively carried out in recent years, associated authentication techniques of the lightweight environment have been released. If applied with a chaotic map, a high level of cryptographic strength can be achieved that can provide more functions than simple XOR operations or HASH functions. Further, this technique can be used by financial transaction services. This study proposes a mutual authentication technique for NFC-PCM to support an NFC payment service environment based on the chaotic map.