• Title/Summary/Keyword: Transaction Information Network

Search Result 268, Processing Time 0.04 seconds

A Study on Electronic Commerce Transaction Modeling based on SET (SET을 기반으로 한 전자상거래 트랜잭션 모델링에 대한 연구)

  • 고영철;송병열;조현규;함호상
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.79-94
    • /
    • 1997
  • Commerce activities which are free form space and time constraint using a communication network are called Electronic Commerce(EC). Because of sending a commercial information using open network such as Internet in EC, they need the security of commerce information (payment information and purchase information), checking the integrity of transferring data and certifying all parts participated in commerce for a secure commerce. Recently Visa and MasterCard Co. released the Secure Electronic Transaction (SET) Protocol for secure payment card transaction on Internet. This paper proposes a Secure Electronic Commerce Transaction Model(SECTM) using SET in order to support the secure commerce on Internet. The proposed transaction model prevents merchant from abusing the cardholder's payment information (credit-card number etc.) and enables cardholder to shop securely in Electronic Shopping Mall.

  • PDF

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.200-206
    • /
    • 2021
  • Fraud in e-commerce transaction increased in the last decade especially with the increasing number of online stores and the lockdown that forced more people to pay for services and groceries online using their credit card. Several machine learning methods were proposed to detect fraudulent transaction. Neural networks showed promising results, but it has some few drawbacks that can be overcome using optimization methods. There are two categories of learning optimization methods, first-order methods which utilizes gradient information to construct the next training iteration whereas, and second-order methods which derivatives use Hessian to calculate the iteration based on the optimization trajectory. There also some training refinements procedures that aims to potentially enhance the original accuracy while possibly reduce the model size. This paper investigate the performance of several NN models in detecting fraud in e-commerce transaction. The backpropagation model which is classified as first learning algorithm achieved the best accuracy 96% among all the models.

A Solution towards Eliminating Transaction Malleability in Bitcoin

  • Rajput, Ubaidullah;Abbas, Fizza;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • v.14 no.4
    • /
    • pp.837-850
    • /
    • 2018
  • Bitcoin is a decentralized crypto-currency, which is based on the peer-to-peer network, and was introduced by Satoshi Nakamoto in 2008. Bitcoin transactions are written by using a scripting language. The hash value of a transaction's script is used to identify the transaction over the network. In February 2014, a Bitcoin exchange company, Mt. Gox, claimed that they had lost hundreds of millions US dollars worth of Bitcoins in an attack known as transaction malleability. Although known about since 2011, this was the first known attack that resulted in a company loosing multi-millions of US dollars in Bitcoins. Our reason for writing this paper is to understand Bitcoin transaction malleability and to propose an efficient solution. Our solution is a softfork (i.e., it can be gradually implemented). Towards the end of the paper we present a detailed analysis of our scheme with respect to various transaction malleability-based attack scenarios to show that our simple solution can prevent future incidents involving transaction malleability from occurring. We compare our scheme with existing approaches and present an analysis regarding the computational cost and storage requirements of our proposed solution, which shows the feasibility of our proposed scheme.

Proxync : A Framework for Proxy-based Mobile Database with SyncML

  • Park, Dong M.;Eenjun Hwang
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.186-191
    • /
    • 2001
  • Mobile agent technologies are getting popular as means for accessing network resources efficiently. In order for mobile agents to be accepted as a reliable technology for applications such as e-commerce, a proper framework for mobile database should be established. In this paper, we first discuss weak points of current mobile computing systems that mostly result from the limitations of current mobile computing technology including frequent disconnection, limited battery capacity, low-bandwidth communication and reduced storage capacity. These weak points also have become the cause of transaction problem where mobile devices issue transactions. In order to eliminate this transaction problem in the mobile environment, we propose a mobile database framework, Proxyne, which is based on the proxy and SyncML.

  • PDF

Per-transaction Shared Key Scheme to Improve Security on Smart Payment System

  • Ahmad, Fawad;Jung, Younchan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.7-18
    • /
    • 2016
  • Several authentication methods have been developed to make use of tokens in the mobile networks and smart payment systems. Token used in smart payment system is genearated in place of Primary Account Number. The use of token in each payment transaction is advantageous because the token authentication prevents enemy from intercepting credit card number over the network. Existing token authentication methods work together with the cryptogram, which is computed using the shared key that is provisioned by the token service provider. Long lifetime and repeated use of shared key cause potential brawback related to its vulnerability against the brute-force attack. This paper proposes a per-transaction shared key mechanism, where the per-transaction key is agreed between the mobile device and token service provider for each smart payment transaction. From server viewpoint, per-transaction key list is easy to handle because the per-transaction key has short lifetime below a couple of seconds and the server does not need to maintain the state for the mobile device. We analyze the optimum size of the per-transaction shared key which satisfy the requirements for transaction latency and security strength for secure payment transactions.

Study on Modernized Real Estate Transaction System based on Spatial Information (공간정보기반 부동산거래선진화시스템 구축방안)

  • Cho, Chun Man;Chung, Moon Sub
    • Spatial Information Research
    • /
    • v.21 no.6
    • /
    • pp.69-80
    • /
    • 2013
  • Our country has made every efforts to develop Real Estate Transaction culture with emphasis on Licensed Realtors by introducing Real Estate Transaction Law in 1983. Also, MOLIT(Ministry of Land, Infrastructure and Transport) designated several organizations including KAR(Korea Association of Realtors) as Real Estate Transaction Information Network Licensees for data credibility enhancement and transaction transparency. Nevertheless, the level of law abiding spirit and transaction culture are still similar to those of the old 'Bokdeokbang' era. The under-developed transaction behaviors prevent the social capital of people's credibility on Licensed Realtors from advancing, and results in the outcomes of unnecessary social cost. That is, very low credibility on the data on Sales Items in the market and the fear of speculative real estate price uprise and market distortions are continuing on. In this context, the purpose of this study is to propose the model of GIS-based Modernized Real Estate Transaction System and its execution policies to support credible Real Estate Information to the general public for efficient transactions in the market. Accordingly, the study aims at contributing to the modernization of Real Estate Transactions, fostering competitiveness of Realtors in the Real Estate Market.

A Study On the Industrial Clusters In a Region Using Big data (빅데이타 분석을 이용한 지역내 산업클러스터 연구)

  • Jung, Jaeheon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.543-554
    • /
    • 2017
  • We tried to get useful information from social network analysis on the transaction network for the companies in Busan, Ulsan, Kyong-nam region using more than 80 thousand company transaction data obtained from Korean enterprise data (KED). We found that there are 282 clusters having more than 3 companies when we made clusters composed of the companies having the transactions with each other as the first transaction partners in the region. Most of clusters have a major big company with most of sales in the clusters and have the member companies without the transaction with other cluster's member companies so that they have closed and hierarchical transaction pattern. Analysing the transaction network using the network index, we know that there are small medium size companies playing the central role in the regional transaction network and a few clusters have many transactions with other clusters. Also we found that there are very rare sale transactions to the companies outside the region and many purchasing transactions from the companies outside the region. Policy makers need to try to diversify the transaction patterns and to use the exceptional companies and clusters as the levers.

A Sophistication Framework for a Mother Company-Driven Global Manufacturing Network (모기업 주도적 글로벌 생산 네트워크를 위한 조정 프레임웍)

  • Park, Kwang-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.1
    • /
    • pp.65-85
    • /
    • 2009
  • The main purpose of this paper is to propose a sophistication framework for a global manufacturing network (GMN) driven by a mother company to autonomously propagate and coordinate transaction data that are exchanged among manufacturing partners. The framework is based on conceptual fundamentals of previous research that provide a step toward ultimate successful collaboration in the supply chain and employs mobile agents for the coordination and propagation of transaction data. Maintaining the integrity of transaction data linked to a huge information web is difficult. With the sophistication functionalities of this framework, it becomes easy to effectively control the overall GMN operations and to accomplish the intended goals. The current level of sophistication focuses on the transaction data propagation. The sophistication level may be expanded up to business intelligence in the future.

  • PDF

Transaction Signing-based Authentication Scheme for Protecting Sinkhole Attack in Directed Diffusion based Wireless Sensor Networks (디렉티드 디퓨젼 기반의 무선 센서 네트워크에서의 싱크홀 공격을 막기 위한 트랜잭션 서명기법에 관한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.31-36
    • /
    • 2010
  • In this paper, We propose a transaction signing-based authentication scheme for protecting sinkhole attacks in wireless sensor networks. Sinkhole attack makes packets that flow network pass through attacker. So, Sinkhole attack can be extended to various kind of attacks such as denial of service attacks, selective delivery or data tamper etc. We analyze sinkhole attack methods in directed diffusion based wireless sensor networks. For the purpose of response to attack method, Transaction signing-based authentication scheme is proposed. This scheme can work for those sensor networks which use directed diffusion based wireless sensor networks. The validity of proposed scheme is provided by BAN logic.

A Comparative Study on ACH and Fedwire as a Cross-Border Payment System (국제전자결제시스템으로서 ACH와 Fedwire의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.139-154
    • /
    • 2008
  • This research want to discuss some issues about payment system of America. This research focuses on comparing ACH with Fedwire. Firstly Fedwire is the payment system for only large-dollar transfer(Large-Value Transfer System; LVTS), while ACH(Automated Clearing House)payment mainly applies a consumer account. Secondly ACH transaction is either credit or debit transfer, while Fedwire is only credit transfer. Thirdly the communication system of Fedwire has twoway method, telephonelike communication network, but ACH is oneway store and forward electronic mail. At present LVTS divides into RTGS(Real-Time Gross Settlement) and DNS(Deferred Net Settlement). However Fedwire uses either RTGS(instantaneous for every transaction) or DNS(net net transaction) but ACH uses only DNS(net net transaction). Fourthly ACH is substantially cheaper than the Fedwire payment. lastly security is important in both Fedwire and ACH, it is even more crucial in Fedwire In addition, for each transaction, Fedwire may entail individual instantaneous confirmation to the originator and notification to the receiver, whereas ACH do not.

  • PDF