• Title/Summary/Keyword: Mobile Payment System

Search Result 189, Processing Time 0.029 seconds

Analysis of Minimum Logistics Cost in SMEs using Korean-type CIPs Payment System (한국형 CIPs 결제 시스템을 이용한 중소기업의 최소 물류비용 분석)

  • Kim, Ilgoun;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.7-18
    • /
    • 2021
  • Recently, various connected industrial parks (CIPs) architectures using new technologies such as cloud computing, CPS, big data, fifth-generation mobile communication 5G, IIoT, VR-AR, and ventilation transportation AI algorithms have been proposed in Korea. Korea's small and medium-sized enterprises do not have the upper hand in technological competitiveness than overseas advanced countries such as the United States, Europe and Japan. For this reason, Korea's small and medium-sized enterprises have to invest a lot of money in technology research and development. As a latecomer, Korean SMEs need to improve their profitability in order to find sustainable growth potential. Financially, it is most efficient for small and medium-sized Korean companies to cut costs to increase their profitability. This paper made profitability improvement by reducing costs for small and medium-sized enterprises located in CIPs in Korea a major task. VJP (Vehicle Action Program) was noted as a way to reduce costs for small and medium-sized enterprises located in CIPs in Korea. The method of achieving minimum logistics costs for small businesses through the Korean CIPs payment system was analyzed. The details of the new Korean CIPs payment system were largely divided into four types: "Business", "Data", "Technique", and "Finance". Cost Benefit Analysis (CBA) was used as a performance analysis method for CIPs payment systems.

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments (이동통신 환경에서 임시 익명 아이디를 이용한 위치 불추적 서비스와 지불 프로토콜에 관한 연구)

  • 김순석;김성권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.78-92
    • /
    • 2003
  • In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.

Personal and System Factors for Trust in Mobile Payment System (모바일 간편결제시스템의 신뢰 형성을 위한 개인 및 시스템 특성)

  • Choi, Yoojung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2017.05a
    • /
    • pp.195-196
    • /
    • 2017
  • 본 연구는 모바일 간편결제시스템에 대한 신뢰 형성에 영향을 미치는 주요 요인을 개인적인 측면과 시스템적인 측면에서 도출해내는 것에 목적을 두고 있다. 개인적 특성으로는 개인의 혁신성과 익숙함이 포함되고, 시스템적 특성으로는 편의성, 접근성, 호환성이 포함된다. 또한, 이러한 개인의 혁신성과 익숙함, 편의성, 접근성, 호환성은 사용자의 신뢰에 영향을 끼치게 된다. 사용자의 신뢰향상은 모바일 간편결제시스템의 지속사용을 이끄는데 중요한 선행변수로 작용될 수 있다. 본 연구를 위해 부산과 대구지역의 대학생을 대상으로 설문을 실시하였으며, SPSS와 PLS를 이용해 자료를 분석하였다. 분석결과, 개인측면의 요인과 시스템적 요인이 사용자의 신뢰에 영향을 끼치는 것으로 나타났다. 이러한 연구결과는 모바일 간편결제시스템의 신뢰형성과정을 살펴볼 수있다는 점에서 의의를 가지게 된다.

  • PDF

Effective and Safe Electronic Payment System using Elliptic Curve Public Key Algorithm in Mobile system (이동 통신 환경에서의 타원곡선 암호 알고리즘을 이용한 효율적이고 안전한 전자지불시스템)

  • Kang, Hyeok;Lee, Hyung-Woo;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1655-1658
    • /
    • 2002
  • 본 논문은 최소한의 정보량을 가지고 높은 안전성을 제공하는 타원곡선을 이용한 전자 지불 프로토콜을 제안한다. 타원 곡선 공개키 암호 알고리즘의 이용은 지불과정에서 필요한 계산 속도를 빠르게 함으로써 실제로 지불 시스템을 구현하였을 때 사용자들에게 지불시스템의 효율적이고 편리함으로서 실제로 지불 시스템을 구현하였을 때 사용자들에게 지불시스템의 효율적이고 편리한 이용환경을 제공할 수 있고 타원 곡선 공개키 암호 알고리즘이 가지는 높은 안전성은 사용자들에게 지불시스템에 대한 신뢰성을 가지게 할 수 있다. 타원곡선 공개키 암호 알고리즘을 통하여 설계된 지불 시스템은 미래의 이동 컴퓨팅 환경에서도 효과적으로 사용될 수 있을 것이다.

  • PDF

Design and Development on 2D Barcode Based Network Advertising Contents (2차원 바코드 기반 네트워크 광고 콘텐츠의 설계와 구현)

  • Shin, Hwan-Seob;Lee, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.376-383
    • /
    • 2019
  • In recent decades, China's economy has grown rapidly and two-dimensional bar code-based payments services have been activated. This is a model that will be introduced by developing countries that lack mobile payment infrastructure, and countries that are looking to leap into cashless societies are also drawing attention. Along with this, the existing CRM market is expanding around the mobile device called m-CRM, and research is active on the importance of collective use for online advertising and two-dimensional bar code-based payments services. Therefore, through this study, we have explored the concepts and status of online advertising and customer relationship management which using the two-dimensional bar code-based system, and designed and implemented the method and mobile application system to effectively disseminate transactional advertising information at the point of sale or at the point of share. We also presented an application approach to look at the direction of two-dimensional bar code-based ads contents sharing system and its development.

Study of NFC Library Execution in Real-time on Android 플랫폼 for NFC Application (NFC 전자 결제 시스템을 위한 Android NFC Library 실시간 실행 처리 연구)

  • Yoo, Hyun-Joo;Jung, Min-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.257-262
    • /
    • 2013
  • In mobile market which has been developed drastically, short distance mobile Near Field Communication is becoming the conversation topic. Google adopted this NFC technology to Android 플랫폼 for securing the leadership and many another countries including domestic companies are putting spurs to develop service and technology by connecting mobile carrier and the financial. Within this circumstance, most noticeable issue is securing stability of nfc application service. Android 플랫폼 is operating system of mobile device and also a software stack which is required limited hardware and immediate response. However, since its structural characteristic which is suitable for limited hardware, the response is not quite stable for real time process. That is, this paper researches by analyzing real time response of NFC related library provided from Android 플랫폼 and applying the result to NFC application for securing stable data process and response.

Automatic Client Authentication Method in All-In-One Services (올인원 서비스에서 자동적인 고객 인증 기법)

  • Kim, Namyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.1-5
    • /
    • 2016
  • The all-in-one service, for example, mobile wallet enables users to have credit card, membership card, and coupon in one place. It has been one of important o2o services with offline payment. In order to take advantage of mobile commerce, it is necessary to authenticate clients automatically without entering their passwords. This paper proposes an automatic client authentication method in all-in-one service. At registration, clients receives and stores an authentication ticket from a company, which contains an user's identifier and password encrypted by company's symmetric key. Client can be authenticated by transferring authentication tickets to companies at service requests.

The Tax Structure of Welfare States - Recommendations for Universal Welfare States - (복지국가의 조세체계와 함의 - 보편적 복지국가 친화적인 조세구조는 있는 것일까 -)

  • Yoon, Hong-Sik
    • Korean Journal of Social Welfare
    • /
    • v.63 no.4
    • /
    • pp.277-299
    • /
    • 2011
  • The current study analyzed the tax structure in the welfare states. The appropriate tax structure of universal welfare state should be based on expanding all taxes, rather than choosing between direct and indirect, progressive and regressive, or mobile and immobile tax. The revenue for the universal welfare payment should be raised by levying tax on all people provided that the welfare payment is made available to all people. The analysis led to classification of tax structure into the high tax European model and the low tax English and East Asian model. The high tax European model was further classified into the balance tax model and the high social security model. The low tax English and East Asian model was classified into the low social security model and the high property tax model. Based on the results, the study maintained that the universal welfare states need not only to expand welfare resources but to develop tax system that corresponds to the universal welfare system.

  • PDF

A Study on the Imporvement of Wireless Internet Service Tariff Scheme. (무선인터넷 데이터 서비스 과금 체계 개선 연구)

  • Min, Gyeong-Ju;Kim, Jeong-Ho;Park, Jin-Yang
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.1101-1110
    • /
    • 2004
  • In the first quarter of 2004, there were about 1 billion 348 million mobile phone users worldwide with a penetration rate of only 29%. Korea ranks among the highest in the use of mobile communication, having over 36 million mobile phone subscribers with a mobile phone penetration rate of 75% as of May 2004. Since the introduction of wireless Internet service in May 1999, the number of subscribers rose to 34.5 million with 95.3% of the total mobile phone subscribers using wireless Internet services in May 2004, largely due to continued investments by telecommunication service providers, improvement of mobile handsets (color and digital camera phones) and implementation of policies on mobile number portability. In the Korean wireless Internet market, there are many user complaints since the service providers are competing with each other through TV commercial sales and phone discounts rather than improving their call quality, services and billing systems. therefore there is a growing need to improve the billing systems through means such as the implementation of reasonable payment plans according to consumer use, development of a wireless Internet billing system that can predict the number of users and establishment of pricing standards for controlled data (head, tail, etc...) as well as menu information by testing the texts. multimedia, video and other types of content provided by the three major mobile communication companies. The purpose of this study is to promote wireless Internet services and protect user rights by proposing a reasonable way to improve the billing systems for wireless Internet services after conducting a comparative analysis of file size and billing data of each of the service providers through a verification test on a packet billing system for wireless Internet services.

  • PDF

A Proposal of traceable Electronic Payment Protocol in Mobile System (이동통신 시스템에서 추적 가능한 전자지불 프로토콜의 제안)

  • Kang, Hyeok;Kim, Tai-Yun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.400-402
    • /
    • 2002
  • 최근 IT 산업의 발달로 인터넷 이용자가 폭발적인 성장에 따라 인터넷을 통한 전자 상거래가 새로운 경제 활동으로 등장과 동시에 무선 인터넷 시장이 급속한 성장을 하고 있다. 이에 따라 기존에 사용되어지고 있는 on-line상에서의 전자 지불 방식보다 실용적인 무선 인터넷상의 전자 지불 방식이 요구되고 있다. 이에 따라 본 논문에서는 무선 인터넷 상에서 전자상거래를 통한 결제대금 지급을 할 때 부정 사용자에 대한 사용자 추적, 즉 익명성 제어가 가능한 프로토콜을 제안한다. 본 논문에서 제안한 프로토콜의 특징은 기존의 on-line 상에서의 제공되어지고 있는 전자지불 프로토콜의 추적기능을 무선 인터넷 환경에서 보다 효율적이며 안전하게 사용할 수 있는 프로토콜을 제시한다.

  • PDF