• Title/Summary/Keyword: digital receipt

Search Result 26, Processing Time 0.021 seconds

A System Implementation for Issuing and Verifying the Electronic Receipt for M-Commerce (무선 전자상거래를 위 한 전자영수증 발급 및 검증 기법 구현)

  • Park, Keun-Hong;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.559-566
    • /
    • 2003
  • As cell phone and PDA have been in common use recently, there is a growing tendency to utilize the mobile terminals for M-Commerce. The information security and the receipt of e-trade are very important to support reliable digital transactions in wireless environment as in wired environment. Even though some work such as WML digital signature and WPKI has been studied for M-Commerce, there are several problems on the aspects of the functional limitation of the mobile terminals and the unsecure data transformation of WAP gateway. In this study we have designed and implemented a prototype system of issuing and verifying the electronic receipt that guarantees authentication, data integrity and non-repudiation for secure mobile e-commerce. Moreover, we have enhanced the system performance by letting the trusted independent server verify and manage the electronic receipt.

A study of the transaction certification model in the e-commerce (전자 상거래에서 거래 인증 모델 연구)

  • Lee, Chang-Yeol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.81-88
    • /
    • 2007
  • In on-line transaction, the transparency is the key factor for the taxation and customer's rights. Using the cash register concept of the off-line transaction, we studied on-line transaction register model for the e-commerce transparency. Although on-line transaction register may be used under the related e-commerce laws, in this paper, we only considered the mechanism of the register. The register issues the digital receipt, and then the receipt can be verified the validation by the models developed in this paper.

A Fair Certified Electronic Mail Protocol that Enhances Guarantee of Reception (수신 보장성이 향상된 공평한 배달 증명 전자 메일 프로토콜)

  • 박용수;조유근
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.86-94
    • /
    • 2003
  • Certified e-mail system guarantees that recipient will get mail content if and only if mall originator receives a receipt. Unlike previous schemes, Optimistic protocols recently published generate a receipt when it meets the condition that the mail content can be accessed by recliner at any time. So originator cannot assure the delivery of e-mail although he can get a receipt. In this paper, we show some flaws in optimistic protocols and propose improved schemes using delivery deadline. Modified protocols guarantee proof-of-receipt and eliminate the problem mentioned above. Furthermore, proposed modification technique can be applicable to most optimistic protocols and is efficient in the sense that modified schemes do not increase the number of messages.

A Study on the Effect of Credit Card Usage on the Intention to Use Mobile Payment (신용카드 사용이 모바일 간편결제 이용의도에 미치는 영향에 관한 연구)

  • Lee, Eun-Mi;Goo, Jayoung James
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.149-161
    • /
    • 2020
  • This paper aims to explore the question of whether the environment in Korea where credit card use is prevalent affects the intention to accept Fintech-based mobile payment. The institution that encourages the credit card use such as credit card receipt obligation may lead to the lock-in and build infrastructures to influence the acceptance of new payment acceptance. This paper investigates how the perceived of use, usefulness, accessibility and stability affect the intention to use mobile payment based on the Technology Acceptance Model(TAM) model with the mediator of lock-in and moderator of credit card receipt obligation. In the results, we found that the perceived usefulness, perceived ease of use and accessibility positively impact on the intention of mobile payment usages. It is also observed that the usefulness and accessibility of credit cards positively mediate to the intention of mobile payment use.

A Study on u-paperless and secure credit card delivery system development

  • Song, Yeongsim;Jang, Jinwook;jeong, Jongsik;Ahn, Taejoon;Joh, Joowan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.83-90
    • /
    • 2017
  • In the past, when the credit card was delivered to the customer, the postal agreement and receipt were signed by customer. The repossessed documents were sent back to the card company through the reorganization process. The card company checks the error by scanning and keeps it in the document storage room. This process is inefficient in cost and personnel due to delivery time, document print out, document sorting, image scanning, inspection work, and storage. Also, the risk of personal data spill is very high in the process of providing personal information. The proposed system is a service that receives a postal agreement and a receipt to a recipient when signing a credit card, signing the mobile image instead of paper, and automatically sending it to the card company server. We have designed a system that can protect the cost of paper documents, complicated work procedures, delivery times and personal information. In this study, we developed 'u-paperless' and secure credit card delivery system applying electronic document and security system.

CD Copy Service to Enhance Customer Satisfaction Through Improved Flow Study - Based on QI Use - (CD Copy업무 flow개선을 통한 고객만족도 향상에 관한 연구 - QI 활용을 중심으로 -)

  • Choi, Sung-Hyun;Hwang, Sun-Kwang;Lee, Jong-Woong;Dong, Kyung-Rae;Kweon, Dae-Cheol;Goo, Eun-Hoe;Park, Chang-Hee
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.13 no.3
    • /
    • pp.127-132
    • /
    • 2011
  • This is to improve the complicate process of the existing CD copy flow in Department of Radiology. It is also to improve the medical service of the hospital to secure private information of patients. Survey: The patients who ask for CD copies in the Department of Radiology of this hospital(for 6 months in 2010). Time: Comparing the total amount of time of the previous and the modified CD copy flow. Using the SPSS 12.0 program for testing significance of independent two-samples t-test. Private information: Introducing the identification-system based on the medical law to supplement the security of personal information of patients. There was manifold complaints due to receipt and issuing the prescription in Admission and Discharging office and outpatient department. The time has been approximately 50% reduced from 70 mistunes to 32 mistunes due to simplifying the routes. The security of the personal information has been supplemented by let patients submit documentary evidence based on the medical law. The service in the hospital has been improved as a result of simplifying the whole process of the routes and receipt process. Therefore, the each stage of waiting time has been decreased. In addition, the personal information of the patients has been more secured.

  • PDF

Design of a Secure Payment Mechanism based on S/MIME (S/MIME을 적용한 안전한 지불 메커니즘 설계)

  • Chun, Cheul-Woo;Lee, Jong-Hu;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.482-494
    • /
    • 2002
  • In E-mail based accounting system, the remitter does not have need to find collector's account number. To transfer money to a collector's account, what remitter need is just a collector's E-mail address. But the current E-mail based accounting systems are built on SSL technology. Basically SSL provides some security services - confidentiality, user authentication and data integrity, but does not provide non-repudiation. So, in the current E-mail based accounting system, it is possible to deny transaction. And there is no receipt of transaction. In this paper, we design and implementation of a S/MIME applied Secure Payment Mechanism. In our system, every account information - account number, receiver name, amount of money, etc. - is included in a 'check' message. And this message is protected under the Secure Web-mail using S/MIME. In a view point of the convenience, users using our system do not have need to find collector's account number. And in a view point of the security, our system provides confidentiality, user authentication, data integrity and non-repudiation. Moreover our system provides a receipt.

A Study on the design of voice cryptograph system (음성암호시스템 설계에 관한 연구)

  • Choi, Tae-Sup;Ahn, In-Soo
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.2
    • /
    • pp.51-59
    • /
    • 2002
  • In this paper, we studied the voice cryptograph system designed by the SEED algorithm for the safe transmission and receipt on the voice communication. Voice band signal converts to digital signal by the CODEC and DSP that applied the improved SEED algorithm encrypt the digital signal. The CODEC convert Encryption signal into analog voice signal. This voice signal is transmitted safely because of encryption signal even if someone wiretap. Receiver can hear the source voice, because the encryption signal decrypted using the SEED algorithm. In this paper, We designed the 32 round key instead of 16 round key in the SEED algorithm so that we improve the truncated differential probability from $2^{-143.1}$ to $2^{-286.6}$

A Medium Access Control Scheme for Reducing Energy Consumption through Avoiding Receipt of Redundant Messages in Wireless Sensor Networks (무선 센서 네트워크에서 중복 메세지 순신 회피를 통한 에너지 소비절감 매체 접근 제어)

  • Han, Jung-An;Lee, Moon-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.13-24
    • /
    • 2005
  • The sensor network is a key component of the ubiquitous computing system which is expected to be widely utilized in logistics control, environment/disaster control, medical/health-care services, digital home and other applications. Nodes in the sensor network are small-sized and exposed to adverse environments. They are demanded to perform their missions with very limited power supply only. Also the sensor network is composed of much more nodes than the wireless ad hoc networks are. In case that some nodes consume up their power capacity, the network topology should change, and rerouting/retransmission is necessitated. Communication protocols studied for conventional wireless networks or ad hoc networks are not suited for the sensor network resultantly. Schemes should be devised to control the efficient usage of node power in the sensor network. This paper proposes a medium access protocol to enhance the efficiency of energy consumption in the sensor network node. Its performance is analyzed by simulation.

  • PDF

Effect of Anthropomorphism Level of Digital Human Banker Speech on User Experience: Focusing on Social Presence, Affinity, Trust, Perceived Intelligence, and Usefulness (디지털 휴먼 은행원 발화의 의인화 수준이 사용자 경험에 미치는 영향: 사회적 실재감, 친밀감, 신뢰도, 인지된 지능, 유용성을 중심으로)

  • Choi, Bomi;Jang, Seojin;Kang, Hyunmin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.469-476
    • /
    • 2022
  • As the 3D modeling technology and conversational algorithm is developed, digital humans are being used in various fields, and also virtual bankers have begun to appear in banks, including major banks such as Shin-Han Bank and Nong-Hyup Bank. However, most of the research of digital human mainly focus on its appearance, and research on robot persona that should be considered in anthropomorphizing a robot is insufficient. In this study, an experiment was conducted to find out the user experience of three scenarios (student ID receipt, deposit and withdrawal account opening, leasehold loan consultation) in which the level of anthropomorphism of the speech strategy and the level of personal information use differed in the specific context of banking. As a result of the study, social presence and usefulness had an interactive effect on the scenario and the level of anthropomorphism. There was no interaction effect on intimacy, trustworthiness, and perceived intelligence, but a tendency could be confirmed.