• Title/Summary/Keyword: Internet Cash

Search Result 53, Processing Time 0.026 seconds

A study on Improvement of Bandwidth Efficiency to FSS Internet with Spoofing and Cash Function

  • Hong Wan-Pyo
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.3
    • /
    • pp.123-130
    • /
    • 2005
  • This study performed five methods of tests and measurements to verify the improvement of connection time and bandwidth efficient of FSS (fixed satellite service) TCP/IP network by means of the cash function and the spoofing function. Tests and measurements are performed with; 1. Not to apply the cash and spoofing function 2. Apply the cash function 4. Apply both cash and spoofing function in HUB station and VSAT 5. In a typical commercial terrestrial Internet with LAN. The study results in this paper show that application of the spoofing and cash function greatly improves the bandwidth efficiency to FSS TCP/IP Internet service.

Improvement Plan for Cash Receipt System

  • Kim, Ki Beom;Woo, Hyung Rok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.243-248
    • /
    • 2022
  • Considering the current situation where cash transactions account for 51.5% of private consumption expenditure, it is very important to secure a tax base by exposing business operators' cash transactions. In the September 2011 national audit, it was pointed out that although a significant part of the investment amount of businesses (VAN operators, etc.) related to the issuance of cash receipts has been recovered, they are still supported through the state tax. At this point in time when a significant amount of the initial investment has been recovered, it is necessary to study a new way to support business operators through methods other than the tax credit method. This study proposes various methods to improve the current cash receipt system and describes the advantages and disadvantages of each method. The most important thing for the improvement of the cash receipt system is that the issuance of cash receipts should be beneficial to business operators. As a result of this study, the most desirable improvement method is to provide differential compensation for the discriminatory cost because the cost is different for each cash receipt operator. For this purpose, we analyze the best way to improve the cash receipt system is a tax credit method and a tax credit for maintenance costs.

Double-Blind Compact E-cash from Bilinear Map

  • Chen, Jiyang;Lian, Bin;Li, Yongjie;Cui, Jialin;Yu, Ping;Shu, Zhenyu;Tao, Jili
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1266-1285
    • /
    • 2022
  • Compact E-cash is the first scheme which can withdraw 2l coins within 𝒪(1) operations and then store them in 𝒪(𝑙) bits. Because of its high efficiency, a lot of research has been carried out on its basis, but no previous research pay attention to the privacy of payees and in some cases, payees have the same privacy requirement as payers. We propose a double-blind compact E-cash scheme, which means that both the payer and the payee can keep anonymous while spending. In our scheme, the payer and the bank cannot determine whether the payees of two different transactions are the same one and connect the payee with transactions related to him, in this way, the privacy of the payee is protected. And our protocols disconnect the received coin from previous transaction, then, the coin can be transferred into an unspent coin which belongs to the payee. The proposed e-cash scheme is secure within y-DDHI and LRSW assumption.

Compact E-Cash with Practical and Complete Tracing

  • Lian, Bin;Chen, Gongliang;Cui, Jialin;He, Dake
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3733-3755
    • /
    • 2019
  • E-cash has its merits comparing with other payment modes. However, there are two problems, which are how to achieve practical/complete tracing and how to achieve it in compact E-cash. First, the bank and the TTP (i.e., trusted third party) have different duties and powers in the reality. Therefore, double-spending tracing is bank's task, while unconditional tracing is TTP's task. In addition, it is desirable to provide lost-coin tracing before they are spent by anyone else. Second, compact E-cash is an efficient scheme, but tracing the coins from double-spender without TTP results in poor efficiency. To solve the problems, we present a compact E-cash scheme. For this purpose, we design an embedded structure of knowledge proof based on a new pseudorandom function and improve the computation complexity from O(k) to O(1). Double-spending tracing needs leaking dishonest users' secret knowledge, but preserving the anonymity of honest users needs zero-knowledge property, and our special knowledge proof achieves it with complete proofs. Moreover, the design is also useful for other applications, where both keeping zero-knowledge and leaking information are necessary.

A Design and Implementation of a Network-type Electronic Payment System Optimized for Digital Goods (디지털 상품 거래를 위한 네트워크형 전자결재 시스템 설계 및 구현)

  • Han Jae-Kyun;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1537-1545
    • /
    • 2004
  • As the Internet continues to transform the commerce, the method of payment is one of critical components to conduct successful business across the internet. An electronic cash has all characteristics of traditional commodity cash and ensures security for all transactions. Accordingly an internet billing system based electronic cash is expected as the secure and efficient payment method in future electronic commerce. Digital Contents such as digital goods and services have the special characteristic that both the delivery of the goods and the transfer of money ran be accomplished on the same network. This allows the optimizations in the design of an electronic commerce system. In this paper, we propose an electronic payment protocol which is especially designed to purchase digital contents through internet. The proposed protocol guarantees anonymity by using a virtual ID, and minimizes payment processing steps.

The study of cash management system model using the RFID (RFID를 이용한 자산관리시스템 모델 연구)

  • Lee, Sun-Hyun;Kim, Min-Hong
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.8
    • /
    • pp.801-810
    • /
    • 2004
  • It is only 2 ~ 3 years in the interior to be introduced as a Ubiquitous era after going through mainframe, PC and internet era on account of the advent of computer. This thesis intends to present a model device of an epoch-making cash management system using the RFID(Radio Frequency Identification) Tag and EPC (Electronic Product Code) Platform which are core technologies of the Ubiquitous Computing on the assumption that cable and wireless internet is constructed in university. Also this sets up a purpose to minimize the administrative procedure as well as the waste of time, people and cost which are problems of the cash management system operating now. Therefore as a research project hereafter, it will be able to present an imporvement device about the problems which cannot solve these days through the model of the proposing cash management system when the standardization, normalization and commercialization of advanced IT department are accomplished.

  • PDF

Design and Implementation of the Electronic Payment Protocol for Digital Merchandise (디지털 상품 거래를 위한 전자지불 프로토콜 설계 및 구현)

  • Park Sei-Seung;Han Jae-Kyun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.988-999
    • /
    • 2005
  • As the Internet continues to have the commercial trade changed, the method of payment is one of critical components to conduct successful businesses through the internet. An electronic cash has all of the characteristics of a traditional commodity cash and ensures the security for all transactions. Accordingly an internet billing system based on the electronic cash is expected as the secure and efficient payment method for the future electronic commerces. The digital contents such as digital merchandise and services have the characteristic that both the delivery of merchandise and the payment of money can be accomplished on the same network and are helpful to idealize the design of the electronic commerce system. In this paper, Anonymity got to be possible by using a virtual ID in the process of payment, the payment steps were decreased by being processed on the same network, and the efficiency and the security were guaranteed by decreasing the frequency of the coding and communication.

  • PDF

A Study on Factors of Internet Overdependence for Adults Using the Decision Tree Analysis Model (성인층의 인터넷 과의존 영향요인: 의사결정나무분석을 활용하여)

  • Seo, Hyung-Jun;Shin, Ji-Woong
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.20-45
    • /
    • 2018
  • This study aims to find the factors of Internet overdependence in adults, through the decision tree analysis model, which is a data mining method using National Information Society Agency's raw data from the survey on Internet overdependence in 2016. As a result of the decision tree analysis, a total 16 nodes of Internet overdependence risk groups were identified. The main predicated variables were the amount of time spent per smart media usage in weekdays; amount of time spent per smart media usage in weekends; experiences of purchasing cash items; percentage of using smart media for leisure; negative personality; percentage of using smart media for information search and utilization; and awareness on good functions of the Internet, all of which in order had greater impact on the risk groups. Users in the highest risk node spent the smart media for more than 5 minutes per use and less than 5~10 minutes in weekdays, had experiences of cash item purchase, and had lower level of awareness on the good functions of the Internet. The analysis led to the following recommendations: First, even a short-time use has higher chances of causing Internet overdependence, and therefore, guidelines need to be developed based on research on the usage behavior rather than the usage time. Second, self-regulation is required because factors that affect overindulgence in games, such as the cash items, increase Internet overdependence. Third, using the Internet for leisure causes higher risk of overdependence and therefore, other means of leisure should be recommended.

HWbF(Hit and WLC based Firewall) Design using HIT technique for the parallel-processing and WLC(Weight Least Connection) technique for load balancing (병렬처리 HIT 기법과 로드밸런싱 WLC기법이 적용된 HWbF(Hit and WLC based Firewall) 설계)

  • Lee, Byung-Kwan;Kwon, Dong-Hyeok;Jeong, Eun-Hee
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.15-28
    • /
    • 2009
  • This paper proposes HWbF(Hit and WLC based Firewall) design which consists of an PFS(Packet Filter Station) and APS(Application Proxy Station). PFS is designed to reduce bottleneck and to prevent the transmission delay of them by distributing packets with PLB(Packet Load Balancing) module, and APS is designed to manage a proxy cash server by using PCSLB(Proxy Cash Server Load Balancing) module and to detect a DoS attack with packet traffic quantity. Therefore, the proposed HWbF in this paper prevents packet transmission delay that was a drawback in an existing Firewall, diminishes bottleneck, and then increases the processing speed of the packet. Also, as HWbF reduce the 50% and 25% of the respective DoS attack error detection rate(TCP) about average value and the fixed critical value to 38% and 17%. with the proposed expression by manipulating the critical value according to the packet traffic quantity, it not only improve the detection of DoS attack traffic but also diminishes the overload of a proxy cash server.

  • PDF

Balance Algorithm for Long-term Bond First of Cash Flow Matching Problem (자금흐름 일치 문제의 장기채권 우선 잔고 알고리즘)

  • Sang-Un Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.167-173
    • /
    • 2023
  • The cash flow matching problem(CFMP) aims to minimize the initial investment by paying the total amount due for the T-year in principal and interest of bonds or bank deposits without paying the full amount in cash. Linear programming(LP) is the only known way to solve CFMP. The linear programming method is a problem that optimizes T linear functions, and it cannot be solved by handwriting, so LINGO, which is a solution to the linear programming method, is used. This paper proposes an algorithm that obtains the solution of CFMP solely by handwriting without the help of LINGO. The proposed algorithm determines the amount of bond purchases by covering payments until the previous year of the next maturity bond in the order that the maturity date falls from the longest to the short term. In addition, until the year before the maturity of the shortest maturity bond, the amount of deposit covered by the principal and interest of the bank deposit was determined. As a result of applying the proposed algorithm to two experimental data, it was shown that more accurate results can be obtained compared to the linear programming method.