• Title/Summary/Keyword: Mobile transaction system

Search Result 100, Processing Time 0.031 seconds

A Dynamic Path Computation Database Model in Mobile LBS System (모바일 LBS 시스템에서 동적 경로 계산 데이터베이스 모델)

  • Joo, Yong-Jin
    • Spatial Information Research
    • /
    • v.19 no.3
    • /
    • pp.43-52
    • /
    • 2011
  • Recently, interest in location-based service (LBS) which utilizes a DBMS in mobile system environment has been increasing, and it is expected to overcome the existing file-based system's limitation in advanced in-vehicle system by utilizing DBMS's advantages such as efficient storage, transaction management, modelling and spatial queries etc. In particular, the road network data corresponds to the most essential domain in a route planning system, which needs efficient management and maintenance. Accordingly, this study aims to develop an efficient graph-based geodata model for topological network data and to support dynamic path computation algorithm based on heuristic approach in mobile LBS system. To achieve this goal, we design a data model for supporting the hierarchy of network, and implement a path planning system to evaluate its performance in mobile LBS system. Last but not least, we find out that the designed path computation algorithm with hierarchical graph model reduced the number of nodes used for finding and improved the efficiency of memory.

Concurrency Control for Transaction Management in Mobile Computing (모바일 계산환경에서 거래 관리를 위한 동시성 제어)

  • Rhee, Hae-kyung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.22-31
    • /
    • 2003
  • Traditional concurrency control strategies for database system are inappropriate for mobile computing environments in which communication disconnection could occur frequently. The time available to access transactions may be extremely limited in mobile computing. In order to ensure that this time is utilized most effectively, the short-lived transactions must be a main stream of transactions. Service handoffs which occur due to communication disconnection, could degrade the performance of mobile transactions especially for short-lived transactions. Altruistic locking protocol is in its nature favorable to short-lived transactions since it applies the donation of locks to long-lived transactions as early as possible. Performance for short-lived transactions could be improved when we applied altruistic locking to mobile computing.

A Study of Information Security Maturity Measurement Methodology for Banking System based on Cyber -based Transaction Processing Architecture Diagnosis (사이버거래 처리 구조 진단을 기반으로 한 뱅킹시스템 정보보호 성숙도 측정방법론 연구)

  • Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.121-128
    • /
    • 2014
  • SSE-CMM for security engineering, engineering, assurance, risk is divided into three elements of the process maturity assessment model and the level of information security presented. Maturity measurement of privacy, vulnerability diagnosis and risk analysis methodologies is used in practical field for present a comprehensive conclusion. The common cyber services are internet banking, mobile banking, telephone banking and the like. Transaction structure, a kind of cyber-banking system, information security maturity of the existing measurement methodologies for research purposes, vulnerability diagnosis and risk analysis methodologies to be used in practical field present a comprehensive conclusion. To ensure safety and convenience for the user, convenient to deal with cyber environment is the key to the activation of cyber trading. Particularly by measuring the maturity of cyber banking system to ensure the safety of the practice field much effects are expected as a result.

PayWord System using ID-based tripartite Key Agreement Protocol (ID 기반 키동의 프로토콜을 이용한 PayWord 시스템)

  • 이현주;이충세
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.348-353
    • /
    • 2004
  • Development of an efficient and secure payment system is prerequisite for the construction of electronic payment mechanism in mobile environment. Since current PayWord protocol system generates vendor's certificate for each transaction, it requires lot of operation for transaction. In this paper, we use a session key generated by ID-based tripartite Key agreement protocol which use an Elliptic Curve Cryptosystem over finite field $F_{q}$ for transactions. Therefore, our protocol reduces algorithm operations. In particular, proposed protocol using ID-based public key cryptosystem has the advantages over the existing systems in speed and it is more secure in Man-in-the-middle attacks and Forward secrecy.

Performance Enhancement Architecture for HLR System Based on Distributed Mobile Embedded System (분산 모바일 임베디드 시스템 기반의 새로운 위치정보 관리 시스템)

  • Kim Jang Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12B
    • /
    • pp.1022-1036
    • /
    • 2004
  • In mobile cellular network the ever-changing location of a mobile host necessitates the continuous tracking of its current position and efficient management of location information. A database called Home Location Register(HLR) plays a major role in location management in this distributed environment, providing table management, index management, and backup management facilities. The objectives of this paper are to identify the p개blems of the current HLR system through rigorous analysis, to suggest solutions to them, and to propose a new architecture for the HLR system. In the HLR system, a main memory database system is used to provide real-time accesses and updates of subscriber's information. Thus it is suggested that the improvement bemade to support better real-time facilities, to manage subscriber's information more reliably, and to accommodate more subscribers. In this paper, I propose an efficient backup method that takes into account the characteristics of HLR database transactions. The retrieval speed and the memory usage of the two-level index method are better than those of the T-tree index method. Insertion md deletion overhead of the chained bucket hashing method is less than that of modified linear hashing method. In the proposed backup method, I use two kinds of dirty flags in order to solve the performance degradation problem caused by frequent registration-location operations. Performance analysis has been performed to evaluate the proposed techniques based on a system with subscribers. The results show that, in comparison with the current techniques, the memory requirement is reduced by more than 62%,directory operations, and backup operation by more than 80%.

Mobile Web Server Performance Improvement with Enhancing SOAP Message Transaction and NBTM (SOAP 메시지 처리 개선과 NBTM을 사용한 모바일 웹 서버의 성능 향상)

  • Kim, Young-Tae;Jeong, Yoon-Su;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.135-142
    • /
    • 2008
  • Recently, the mobile Internet is rapidly changing environment in a user's web server performance requires frequent connection is difficult because the proper response is needed to improve the performance of web services engine. Therefore, the goal of this paper is to improve the performance of web services for the installation of additional access to users regardless of tomcat servlet container and process the request and to shorten processing time of SOAP (Simple Object Access Protocol) message of the server structure to of for web mobile services. The web-sever structure is consists of user demand receiver, web document processor, SOAP protocol processor, NBTM(Non-Blocking and Thread Manager) manager, session manager. The system fully supports a standard web-service protocol, reduces the message processing time and communication overhead of mobile web-service system in Web 2.0 and overhead of server, and confirms the improvement of capability by comparing and evaluating Web 2.0 standard mobile web-service system through delaying achievement evaluation by the experiment of realization in Web 2.0 environment.

  • PDF

A Study on the Realtime Wireless Remote Control Systems (실시간 무선 원격 제어 시스템에 관한 연구)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.6
    • /
    • pp.63-69
    • /
    • 2009
  • The decentralized and open characteristic of the internet, along with the mobility and portability of mobile communication, and the interactivity of the internet and mobile communications all have been grafted to enable the creation of wireless internet in our lives, bringing about a lot of change. However, existing system management software solutions show limitations in time and space, as well as problems such as uncertain error messages, and also difficulty providing swift assistance or real time emergency support. Therefore, a wireless remote control system has been designed and implemented in this thesis, which is capable of managing and monitoring remote systems using mobile communication devices (Mobile Phone, PDA, Smart Phone, Webpad) for realtime control. The implemented real time wireless remote control system provides remote server management functions, error or event message functions, log record functions, authentication function via mobile devices and system performance evaluation function classified by client transaction.

A Study on Java COS for Devices Which Have Safe Power System (전력공급이 안정된 장치들을 위한 자바 COS에 관한 연구)

  • Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.103-111
    • /
    • 2011
  • Legacy Java card which adapts a Java platform loads and executes an application when electronics power is provided. However, recently the most Java cards are embedded into a mobile terminal as USIM cards, therefore the power is continually provided for the smart cards. In this case, operation of a Java card system needs to consider its operating system to be advanced in memory management, object management and transaction mechanism. In this paper, we present a high performance Java Card system which is able to have efficient installation, loading and execution of application by applying a new memory management of the smart card that has safe power system.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Design and Implementation of a Java-Based WAP Transaction Layer with Priority Policy (자바기반 WAP 상의 우선순위 트랜잭션 계층의 설계 및 구현)

  • 이준규;임경수;안순신
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.244-251
    • /
    • 2003
  • As the Internet and wireless mobile communication is being widespread, the WAP (Wireless Application Protocol) that merges these two technologies has emerged. Also, the research of the WAP gateway that enables efficient processing of multiple user demands concurrently and prompt response to requests from various wireless devices has been performed in many working groups. The WAP stack is the most fundamental technology among these researches. In this paper, we implement the WAP container utilizing the JAVA's multithreading and applying to the connection pooling technique to manage the available resource in the container efficiently. Also, we design and implement the WTP(Wireless Transaction Protocol) layer and the UDP(User Datagram Protocol) layer based on the priority Policy. Our design and implementation showed the shorter waiting time than that of the existing FCFS(First-Come, First-Served) system in the transaction layer and its efficiency was proved through simulation.