• Title/Summary/Keyword: Secure Payment

Search Result 178, Processing Time 0.03 seconds

Enhancing the Security of Credit Card Transaction based on Visual DSC

  • Wei, Kuo-Jui;Lee, Jung-San;Chen, Shin-Jen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1231-1245
    • /
    • 2015
  • People have transferred their business model from traditional commerce to e-commerce in recent decades. Both shopping and payment can be completed through the Internet and bring convenience to consumers and business opportunities to industry. These trade techniques are mostly set up based on the Secure Sockets Layer (SSL). SSL provides the security for transaction information and is easy to set up, which makes it is widely accepted by individuals. Although attackers cannot obtain the real content even when the transferred information is intercepted, still there is risk for online trade. For example, it is impossible to prevent credit card information from being stolen by virtual merchant. Therefore, we propose a new mechanism to solve such security problem. We make use of the disposable dynamic security code (DSC) to replace traditional card security code. So even attackers get DSC for that round of transaction, they cannot use it for the next time. Besides, we apply visual secret sharing techniques to transfer the DSC, so that interceptors cannot retrieve the real DSC even for one round of trade. This way, we can improve security of credit card transaction and reliability of online business. The experiments results validate the applicability and efficiency of the proposed mechanism.

A study on the Ship Mortgages in English Law (영국법상 선박 모게지 (Mortgages) 에 관한 연구)

  • Jeong, Seon-Cheol
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2007.12a
    • /
    • pp.58-59
    • /
    • 2007
  • The English law of ship mortgages is successor to a very long tradition. From the earliest times loans have been required to finance maritime commerce. The term "ship" describes any kind of vessel used in navigation, while the term "ship mortgage" described a method of secured financing, under which a borrower transferred its interest in ship or other property to a creditor, to secure the payment of the debt owed by the borrower or the performance of some their obligation. The shipowner (the borrower)is known as the 'mortgagor, and the person lending the money is known as the 'mortgagee'.

  • PDF

A Study on Blockchain Based Secure Financial Transaction System for Person-to-Person Payment Environment (Person-to-Person 결제 환경에 적합한 블록체인 기반의 안전한 금융 거래 시스템 연구)

  • Park, Byeong-ju;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.250-253
    • /
    • 2017
  • 최근 모바일 결제 시장의 규모가 2015년 45억 달러에서, 2016년 62억 달러로 성장하며, P2P 거래량도 함께 증가하고 있다. 또한, P2P 결제 시장에 페이팔, 비자와 같은 온라인 결제 업체와 대형은행 뿐만 아니라, 페이스북, 구글, 애플, 삼성 등 IT회사들도 참여하고 있다. 안전하고 편리한 P2P 결제를 위해 다양한 거래 방식이 연구되고 있지만, 다양한 기업 및 은행들의 참여로 인해 서로 다른 방식으로 사용자들이 불편을 겪고 있으며, 모바일 환경의 특성으로 인해 많은 보안위협들이 발생하고 있는 실정이다. 이에 따라, 모바일 환경에서의 P2P 결제를 고려한 통합적인 보안 기술이 개발되어야 하며, 민감 정보라고 할 수 있는 사용자의 계좌번호, 금융거래 관련 정보 등을 보호하기 위한 기술이 필수적이다. 따라서 기존 은행권의 P2P 거래 방법의 문제점을 분석하고 블록체인 시스템과 DHT에 대해 분석한 후, P2P 결제 환경에 적합한 안전한 블록체인 기반 금융 거래 시스템을 연구함으로써, P2P 거래 환경의 안전성을 향상시키고자 한다.

A study on the send and receive of the message in the bolero and TEDI system (Bolero와 TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.2
    • /
    • pp.105-121
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the both Bolero and TEDI System. Bolero System is the business processes and methods, together with the digital information system, which are provided by Bolero International for communicating Messages and Documents and facilitating business transactions, as well as the Bolero Rulebook and Operating Rules governing their use. On the other hand, The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Servers, a RSP Server, and Certification Servers.

  • PDF

A Study on the Operational Process of SURF under Bolero System (볼레로시스템 상 SURF(전자결제시스템)의 운용프로세스에 관한 연구)

  • 채진익
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.187-206
    • /
    • 2002
  • The purpose of this study is to review the process for the trade settlement system between all parties involved in the commercial transaction under SURF System. SURF application is the latest value added service from bolero.net and a fully automated documentary settlement system. It extends bolero.net's capability to enable trade transactions by providing a delivery versus payment system. It has been designed as a standard, shared, infrastructure component for handling trade settlement within an electronic environment to keep step with the operation of electronic Bolero bill of Lading. It exploits the services provided by the Bolero Core Messaging Platform - secure, guaranteed transactions based on boleroXML standards to provide document compliance services with optional bank guarantees. So, SURF system can automatically check all commonly used trade documents such as commercial invoices, bills of lading and certificates of weight and analysis, etc and supports a full range of settlement options including Open Account, Documentary Collections, Documentary Credit. 58 have key features as follows, ① automatic document compliance checking, ② integrated with the Title Registry, ③ supports various forms of vender financing, ④ governed by a set of legally binding rules, ⑤ fully prepared for Straight-Through-Processing, ⑥ Enabled compliance with UCP 500.

  • PDF

User Authentication Using Biometrics and OTP in Mobile Device (중소기업형 바이오정보와 OTP를 이용한 사용자 인증)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.27-31
    • /
    • 2014
  • According to increasing of payment and settlements like smart banking, internet shopping and contactless transaction in smart device, the security issues are on the rise, such as the vulnerability of the mobile OS and certificates abuse problem, we need a secure user authentication. We apply the OTP using biometrics and PKI as user authentication way for dealing with this situation. Biometrics is less risk of loss and steal than other authentication that, in addition, the security can be enhanced more when using the biometric with OTP. In this paper, we propose a user authentication using biometrics and OTP in the mobile device.

  • PDF

Secure RFID-based Payment System against Various Threats (위.변조에 안전한 RFID 지급결제시스템)

  • Kim, In-Seok;Choi, Eun-Young;Lee, Dong-Hoon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.141-146
    • /
    • 2007
  • Barcodes have been widely used to implement automatic identification systems but there are various problems such as security weakness or distance restriction in scanning barcode signals in a barcode-based automatic identifcation systems. Recently researchers are gradually interested in radio frequency identification (RFID) and RFID systems have been applied to various fields than before. Especially one of RFID application fields, a bank system uses RFID tagged bankontes to prevent illegal transactions such as counterfeiting banknotes and money laundering. In this paper, we propose a RFID system for protecting location provacy of a banknote holder. In addition, our paper describes that a trust party can trace a counterfeit banknote holder to provide against emergencies.

Direction and Tasks of Health Care Policy of Yoon Suk-yeol Government (윤석열 정부의 보건의료정책 방향과 과제)

  • Park, Eun-Cheol
    • Health Policy and Management
    • /
    • v.32 no.3
    • /
    • pp.247-257
    • /
    • 2022
  • The presidential election and the inauguration of the new government are a period of the policy window opening. The newly launched government is expected to improve the quality of life of the people. The Yoon Suk-yeol Government is also launched with new expectations with a transitional period in health care. The sustainability of health care in Korea is threatened. The environment of health care and the main policy issues of health care are difficult to secure the necessary finance for health care in spite of the increasing health care burden. Accordingly, the Yoon Suk-yeol Government's health care policy aims to provide intensive support to those in need of health and welfare and to improve the health of the people through investment in health. And for integrating fragmented health care and welfare services and creating people-centered community-based health care, a health care innovation center will be established for the evaluation platform of new delivery and payment systems, a health care development plan will be established for the blueprint of health care, and reorganizing the central & local government should be reviewed. Although we are facing unfavorable situations such as the distribution of the National Assembly, inflation, and the possibility of economic recession, we expect that announced health care policies will be implemented, recognizing that health care innovation is the only way to improve health care sustainability.

Secure SLA Management Using Smart Contracts for SDN-Enabled WSN

  • Emre Karakoc;Celal Ceken
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3003-3029
    • /
    • 2023
  • The rapid evolution of the IoT has paved the way for new opportunities in smart city domains, including e-health, smart homes, and precision agriculture. However, this proliferation of services demands effective SLAs between customers and service providers, especially for critical services. Difficulties arise in maintaining the integrity of such agreements, especially in vulnerable wireless environments. This study proposes a novel SLA management model that uses an SDN-Enabled WSN consisting of wireless nodes to interact with smart contracts in a straightforward manner. The proposed model ensures the persistence of network metrics and SLA provisions through smart contracts, eliminating the need for intermediaries to audit payment and compensation procedures. The reliability and verifiability of the data prevents doubts from the contracting parties. To meet the high-performance requirements of the blockchain in the proposed model, low-cost algorithms have been developed for implementing blockchain technology in wireless sensor networks with low-energy and low-capacity nodes. Furthermore, a cryptographic signature control code is generated by wireless nodes using the in-memory private key and the dynamic random key from the smart contract at runtime to prevent tampering with data transmitted over the network. This control code enables the verification of end-to-end data signatures. The efficient generation of dynamic keys at runtime is ensured by the flexible and high-performance infrastructure of the SDN architecture.

Bitcoin Cryptocurrency: Its Cryptographic Weaknesses and Remedies

  • Anindya Kumar Biswas;Mou Dasgupta
    • Asia pacific journal of information systems
    • /
    • v.30 no.1
    • /
    • pp.21-30
    • /
    • 2020
  • Bitcoin (BTC) is a type of cryptocurrency that supports transaction/payment of virtual money between BTC users without the presence of a central authority or any third party like bank. It uses some cryptographic techniques namely public- and private-keys, digital signature and cryptographic-hash functions, and they are used for making secure transactions and maintaining distributed public ledger called blockchain. In BTC system, each transaction signed by sender is broadcasted over the P2P (Peer-to-Peer) Bitcoin network and a set of such transactions collected over a period is hashed together with the previous block/other values to form a block known as candidate block, where the first block known as genesis-block was created independently. Before a candidate block to be the part of existing blockchain (chaining of blocks), a computation-intensive hard problem needs to be solved. A number of miners try to solve it and a winner earns some BTCs as inspiration. The miners have high computing and hardware resources, and they play key roles in BTC for blockchain formation. This paper mainly analyses the underlying cryptographic techniques, identifies some weaknesses and proposes their enhancements. For these, two modifications of BTC are suggested ― (i) All BTC users must use digital certificates for their authentication and (ii) Winning miner must give signature on the compressed data of a block for authentication of public blocks/blockchain.