• Title/Summary/Keyword: Secure payment

Search Result 178, Processing Time 0.025 seconds

A study of ISP/3D Secure Protocol for buyer authentication of the Electronic Payment System (전자지불시스템에서 구매자인증을 위한 ISP/3D-Secure 프로토콜에 대한 연구)

  • Baek, Eun-Jung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.229-231
    • /
    • 2005
  • 인터넷의 발달로 점차 활성화 되고 있는 전자상거래는 기존 시스템의 결제 정보 도용에 따른 문제점을 개선한 새로운 전자지불 시스템의 필요성이 대두되었고 국민/BC카드사의 인터넷 안전결제(ISP)서비스, 비자 안심클릭 서비스를 전면 시행하게 되었다. 사용자 본인인증 강화를 위한 인증방안과 서비스모델을 분석하고 개선 방향을 제시한다.

  • PDF

Mobile payment system based on NFC for secure payment environment (안전한 결제 환경을 위한 NFC 기반 모바일 결제 시스템)

  • Kim, Dae-Suk;Park, Sung-Wook;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1028-1031
    • /
    • 2012
  • NFC 기능을 탑재한 스마트폰의 보급이 증가하고 점차적으로 NFC를 활성화하여 고객에게 편리함을 주려는 기업들이 늘어나고 있다. 하지만 기존의 NFC 기반 Payment System의 경우 사용자의 개인 정보를 부분적으로 암호화하지 않은 것과 내부 및 제 3자의 개인정보 유출, 그리고 개인정보를 무단활용을 대표적인 문제점으로 나타낼 수 있다. 뿐만 아니라 도난 및 분실의 위험으로 인한 피해가 있을 수 있다. 이러한 문제점들로 인하여 본 연구에서는 자체적인 NFC 보안에 사용자 어플리케이션 실행시 한 번의 개인정보 입력에 따른 암호화로써 NFC 단말기 간의 정보를 주고 받을 때 암호화를 할 수 있도록 구현하고자 한다. 이렇게 함으로써 NFC를 이용하여 결제를 하였을 시에 암호화 된 개인정보이기 때문에 외부의 공격자로부터 보안에 대한 위협을 줄일 수 있으며, 도난과 분실에도 개인정보가 식별되지 않기 때문에 보다 안정성을 높일 수 있다.

Refunds Reusable Electronic Check Payment System Using an EC-KCDSA Partially Blind Signature (EC-KCDSA 부분 은닉서명을 이용한 거스름 재사용 가능한 전자수표지불 시스템)

  • 이상곤;윤태은
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.3-10
    • /
    • 2003
  • In this paper, a partially blind signature schemes baled on EC-KCDSA is proposed and we applied it to design an electronic check payment system. Because the proposed partially blind signature scheme uses elliptic curve cryptosystem, it has better performance than any existing schems using RSA cryptosystem. When issuing a refund check, one-time pad secret key is used between the bank and the customer to set up secure channel. So the symmetric key management is not required.

An Analysis of Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting (안전한 브로드 캐스팅을 위한 Time-Bound Hierarchical Key Management 스킴 비교 분석)

  • Kim, Hyun-Cheol;Goo, Woo-Guen;Lee, Jun-Ho;Lee, Dong-Hoon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.556-558
    • /
    • 2008
  • Secure broadcasting is requirement for payment of TV systems, government or company. Hierarchical key management for access control provides efficient key management in those environment. Also, time-bound hierarchical key management technique generates different keys in each time period. In 2004, Tzeng proposed a time-bound cryptgraphic key assignment scheme for access control in a hierarchy and in 2008, Bertino et al proposed an efficient time-bound hierarchical key management scheme for secure broadcasting. Tzeng's scheme and Bertino et al's scheme are organized in different environment and primitive. In this paper, we analysis above two time-bound hierarchical key management scheme.

  • PDF

The Design of Electronic Payment Protocol Using Dual Signature based on Cardholder's Secret Number (카드사용자의 비밀번호 기반 이중서명을 이용한 전자 지불 프로토콜의 설계)

  • 김성열;이옥빈;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.411-420
    • /
    • 1999
  • The topic of electronic commerce is a hot issue in computer technology. There are many kinds of risks associated with electronic commerce which performs financial transactions by exchanging electronic information over public networks. Therefore, security factors such as confidentiality, integrity, authentication and non-repudiation should be required to construct secure electronic commerce systems. In this paper, the credit card-based payment protocol applying dual signature is presented. It provides payment information to the bank a cardholder pays to, but conceals ordering information. It also offers ordering information to a merchant, but hides payment information including the card number. Thus, cardholder's private information can be protected. In order to accomplish this, dual signature is performed employing both symmetric method utilizing cardholder's secret number as an encryption key and asymmetric method.

  • PDF

Implementation of Offline Payment Solution using USIM in IMT-2000 (IMT-2000 단말기용 USIM상에서의 오프라인 지불 솔루션 탑재에 관한 연구)

  • 백장미;하남수;홍인식
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.849-860
    • /
    • 2003
  • As mobile device is becoming more popular, E-Commerce changes into M-Commerce. Especially, IMT-2000 (International Mobile Telecommunication 2000) service is prepared for M-Commerce and this has USIM (Universal Subscriber Identity Module) as a core of certification of individuality and transactions. As a result, the area of mobile service going to expand by USIM. But, mobile services using USIM leave much to be desired, and developed application don't variety. In this paper, for the efficient design of USIM, the structure of USIM and protocol is analyzed, and secure payment solution in USIM is proposed. Specially, offline payment system is proposed for the verification of proposed protocols including security, saving, and calculation of balance. finally, the simulation of proposed payment system on USIM is performed using Java Card.

  • PDF

PayWord System using ID-based tripartite Key Agreement Protocol (ID 기반 키동의 프로토콜을 이용한 PayWord 시스템)

  • 이현주;이충세
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.348-353
    • /
    • 2004
  • Development of an efficient and secure payment system is prerequisite for the construction of electronic payment mechanism in mobile environment. Since current PayWord protocol system generates vendor's certificate for each transaction, it requires lot of operation for transaction. In this paper, we use a session key generated by ID-based tripartite Key agreement protocol which use an Elliptic Curve Cryptosystem over finite field $F_{q}$ for transactions. Therefore, our protocol reduces algorithm operations. In particular, proposed protocol using ID-based public key cryptosystem has the advantages over the existing systems in speed and it is more secure in Man-in-the-middle attacks and Forward secrecy.

Difference of Risk-relievers between High Risk and Low Risk in Online Purchasing

  • Fang, Hua-Long;Kwon, Sun-Dong;Bae, Kee-Su
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.3
    • /
    • pp.135-156
    • /
    • 2014
  • The Online business model for purchasing agent service is getting more popular. However, consumers perceive more risk when buying products from foreign online purchasing agents (FOPA) than from common online sellers (COS). This study focuses on finding out how consumers manage risk when they perceive risk and what different risk-reliever strategies they use when buying from high-risk FOPA and low-risk COS. This study has proved the following two. First, when consumers perceive risk at online purchasing, they tend to select risk-reliever strategies, such as the use of communication media, online assurance mark, seller's record, and secure payment to mitigate risk. With the application of those risk-reliever strategies, they built trust with the seller. Second, risk-perception of FOPA influences usage of communication media and check of online assurance mark more strongly than that of COS. On the contrary, risk-perception of COS influences the check of seller record more strongly than that of FOPA. This study helps to explain why FOPA is proliferating, despite its inherent high risk due to the fact that buyers and sellers are separated in time and space and that buyers and sellers have different social and cultural backgrounds. This study also helps managers of E-commerce to relieve consumer's risk-perception and to build trust.

Design and Implementation of the Electronic Payment Protocol for Digital Merchandise (디지털 상품 거래를 위한 전자지불 프로토콜 설계 및 구현)

  • Park Sei-Seung;Han Jae-Kyun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.988-999
    • /
    • 2005
  • As the Internet continues to have the commercial trade changed, the method of payment is one of critical components to conduct successful businesses through the internet. An electronic cash has all of the characteristics of a traditional commodity cash and ensures the security for all transactions. Accordingly an internet billing system based on the electronic cash is expected as the secure and efficient payment method for the future electronic commerces. The digital contents such as digital merchandise and services have the characteristic that both the delivery of merchandise and the payment of money can be accomplished on the same network and are helpful to idealize the design of the electronic commerce system. In this paper, Anonymity got to be possible by using a virtual ID in the process of payment, the payment steps were decreased by being processed on the same network, and the efficiency and the security were guaranteed by decreasing the frequency of the coding and communication.

  • PDF

Study on the credit Payment Systems (신용카드 기반 전자지불시스템 분석)

  • 강성우;박해룡;천동현;이재일
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.121-125
    • /
    • 2004
  • 전자상거래에서 신용카드를 이용하여 물품 대금을 지급하는 대표적인 방식으로 SSL과 SET을 사용하고 있다. 그러나, SSL은 시장의 폭넓은 지지를 받고 있지만, 카드소유자 본인 확인 기능이 없어서 카드소유자의 지불거부 뿐만 아니라, 부정거래가 발생할 수 있는 단점이 있다. 또한, SET도 카드소유자 본인 확인 기능이 없고 기술적으로 복잡해 시장의 큰 호응을 받지 못하는 단점이 있다. 이러한 SSL과 SET의 단점을 극복하기 위해서 최근 3D-SET, 3-D Secure가 개발되었으며, 3-D Secure 향후 신용카드 기반 전자지불시스템에서 주로 사용될 것으로 기대된다 이에 본 논문에서는 3D-SET, 3-D Secure의 개요, 객체별 역할과 책임, 장점/단점 등을 비교 분석하고자 한다.

  • PDF