• Title/Summary/Keyword: Mobile transaction system

Search Result 100, Processing Time 0.025 seconds

An Efficient Recovery Method for Mobile Main Memory Database System (모바일 메인메모리 데이터베이스 시스템을 위한 효율적인 복구 기법)

  • Cho, Sung-Je
    • Journal of Information Technology Services
    • /
    • v.7 no.2
    • /
    • pp.181-195
    • /
    • 2008
  • The rapid growth of mobile communication technology has provided the expansion of mobile internet services, particularly mobile realtime transaction takes much weight among mobile fields. There is an increasing demand for various mobile applications to process transactions in a mobile computing fields. Thus, During transmission in wireless networks a base station failure inevitably causes data loss of the base station buffer. It is required to compensate the loss for communication. The existing methods for a base station failure are not adequate because they all suffer from too much overhead and resolve only the link failure. In this paper, we study an efficient recovry systems for a mobile DBMS. We propose SLL (Segment Log List) that enables the mobile host to compensate data loss efficiently in the case of base station failure. In SLL, a base station deliveries an output information of data cells to a mobile host. when a base station fails, the mobile host can retransmit just next data cells. We also prove the efficiency of new method.

Identifying the Dynamic Structure of Mobile Banking Market: The System Dynamics Perspective (모바일 뱅킹 시장의 동태적 구조 분석: 시스템 다이내믹스 관점)

  • Kim, Hyo-Gun;Yun, Sun-Hee;Suh, Hyun-Ju
    • The Journal of Information Systems
    • /
    • v.15 no.4
    • /
    • pp.99-124
    • /
    • 2006
  • The development of IT has made it possible to use various terminal systems for financial transaction and demands for financial survices are getting more and more diversified at the same time. Among others, mobile banking service market based on IC chips has been expanded its service areas and the number of mobile banking users has been increased. The study analyzes and tests the dynamic effects of the inflow of potential customers on mobile banking market condition by using system dynamics methodology to identify the dynamic structure of mobile banking market. The simulation model is designed to track the variation in the number of subscribers of mobile banking servides according to two scenarios, and the results are as follows; First the effect of word of mouth by customers who have used the service already is significant. The satisfactory level of early adopters is reflected in WOM, and as a test result shows, increase in word-of-mouth causes the growth of potential customers' demands for mobile banking service. Second, perceived attractiveness of mobile banking service market is another important construct. Factors such as convenience, mobility, time saving, security, and various services explain the construct perceived attractiveness of the service, and it makes the potential customers adopt the service, causing the increase of demands.

  • PDF

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.

Implementation of Personalized Advertisement and Information Application Services Using RFID Virtual Tag (RFID 가상 태그를 활용한 개인화된 광고 및 정보 응용 서비스 개발)

  • Park, Nam-Je
    • Journal of Information Technology Services
    • /
    • v.8 no.4
    • /
    • pp.151-163
    • /
    • 2009
  • In this paper, we design and develop a personalized advertisement and information services system based on mobile RFID using RFID virtual tag. It is a system to perform the use of the contents information or the commercial transaction on the contents products through internet server connection by using RFID tag information with a mobile according as transmitting immediately to a cell phone after a tag generator derived RFID tag information to be substituted for the contents information being output at present, after being transmitted from a cell phone the information request signal on the contents information being output from video media. This service system provides a mechanism for gathering advertisement information left behind by many clients visiting advertisement sites for analysis of customers property, service model for selecting personalized services, and mechanism for providing them to customers who visited in a advertisement mall joined to the shopping site.

On a Enhanced Mobile OTP generator design using Transaction (이체정보를 활용한 강화된 모바일 OTP 생성기 설계)

  • Park, Beum-Su;Cho, Sang-Il;Kim, Tae-Yong;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.227-228
    • /
    • 2010
  • Generated One-Time Password (OTP) is used only once. This attributes is to safety than to repeated use the same password. Recently, Park's proposed on "Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction" use challenge-response based one-time password generator. However, Challenge exchange problem and currently OTP the same security level. In this paper, Park's proposed OTP generator design for us analysis. And then presents a resolution to the problem and new system logic. New system strong to Man-In-Middle attack and replay attack. In addition, OTP security level is higher.

  • PDF

A Sophistication Framework for a Mother Company-Driven Global Manufacturing Network (모기업 주도적 글로벌 생산 네트워크를 위한 조정 프레임웍)

  • Park, Kwang-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.1
    • /
    • pp.65-85
    • /
    • 2009
  • The main purpose of this paper is to propose a sophistication framework for a global manufacturing network (GMN) driven by a mother company to autonomously propagate and coordinate transaction data that are exchanged among manufacturing partners. The framework is based on conceptual fundamentals of previous research that provide a step toward ultimate successful collaboration in the supply chain and employs mobile agents for the coordination and propagation of transaction data. Maintaining the integrity of transaction data linked to a huge information web is difficult. With the sophistication functionalities of this framework, it becomes easy to effectively control the overall GMN operations and to accomplish the intended goals. The current level of sophistication focuses on the transaction data propagation. The sophistication level may be expanded up to business intelligence in the future.

  • PDF

A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)

  • Jeong, Seong Hoon;Kim, Hana;Shin, Youngsang;Lee, Taejin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1525-1540
    • /
    • 2015
  • Due to a rapid advancement in the electronic commerce technology, the payment method varies from cash to electronic settlement such as credit card, mobile payment and mobile application card. Therefore, financial fraud is increasing notably for a purpose of personal gain. In response, financial companies are building the FDS (Fraud Detection System) to protect consumers from fraudulent transactions. The one of the goals of FDS is identifying the fraudulent transaction with high accuracy by analyzing transaction data and personal information in real-time. Data mining techniques are providing great aid in financial accounting fraud detection, so it have been applied most extensively to provide primary solutions to the problems. In this paper, we try to provide an overview of the research on data mining based fraud detection. Also, we classify researches under few criteria such as data set, data mining algorithm and viewpoint of research.

Public Key based Virtual Credit Card Number Payment System for Efficient Authentication in Card Present Transaction (대면거래환경에서 효율적인 인증을 위한 공개키 기반의 가상카드번호 결제 기법)

  • Park, Chan-ho;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1175-1186
    • /
    • 2015
  • Financial fraud has been increasing along with credit card usage. Magnetic stripe cards have vulnerabilities in that credit card information is exposed in plaintext and cardholder verification is untrustworthy. So they have been replaced by a smart card scheme to provide enhanced security. Furthermore, the FinTech that combines the IT with Financial product is being prevalent. For that reason, many mobile device based payment schemes have been proposed for card present transaction. In this paper, we propose a virtual credit card number payment scheme based on public key system for efficient authentication in card present transaction. Our proposed scheme is able to authenticate efficiently in card present transaction by pre-registering virtual credit card number based on cardholder's public key without PKI. And we compare and analyze our proposed scheme with EMV.