• Title/Summary/Keyword: e-Payment system

Search Result 162, Processing Time 0.019 seconds

Development of EBPP for Korea e-Post System (우체국 전자상거래 시스템을 위한 EBPP개발)

  • 박태준
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.12a
    • /
    • pp.411-419
    • /
    • 1999
  • EBPP는 소비자, 사업자간에 고지서 발송, 접수 및 지불을 네트워크를 통하여 전자적으로 처리하는데 필요한 환경을 의미하며, 인터넷을 기반으로 하여 전자우편 혹은 웹 페이지를 통하여 고지서를 처리한다 EBPP 시스템은 크게 소비자, 사업자 그리고 은행간의 거래로 이루어 지지만 컴퓨터 및 인터넷의 보급의 한계 등의 문제로 현재로서 모든 고지서를 전자적으로 처리하는 것은 무리가 따른다. 그럼에도 불구하고 EBPP 시스템은 1) 경쟁력 확보를 위해 기업/금융 기관들이 인터넷을 통한 고품질 서비스 개발에 주력하는 추세이고, 2) 고객과의 보다 긴밀한 관계 유지를 위한 수단 제공하며, 3) 인터넷 등 온라인 통신 인구가 급격한 증가(2701년에 전체 인구의 약 50%가 활용할 것으로 전망)하고 있으며,4) 소비자를게 보다 편리한 지불방법 제시해주며, 5) 또 다른 마케팅 매체로 활용 가능하므로 앞으로의 전망이 매우 밝다. EBPP시스템은 크게 금융기관, 기업, 소비자 부분으로 구성되며, 소비자와 접촉 방법으로는 대표적으로 Web과 전자우편을 생각할 수 있으며, EBPP 시스템을 구축하기 위해서는 기본적으로 상접 혹은 기업에서 청구에 필요한 정보를 등록시키는 통합 청구서버(Bill consolidation server), 소비자에게 청구 가능한 정보를 갖고있는 청구 제시서버 (Bill presentment server), 소비자의 지불요청에 따라 은행으로부터 지불을 요구하는 지불서버(Payment gateway) 등이 필요하며, 이들 각각의 서버들의 구성 요소들은 제공하는 서비스에 따라 달라질 수 있다. 통합 청구서버에서 청구 제시서버로 전송되는 청구 건은 통상적으로 실시간 처리되는 것이 아니라 통합 청구서버에 존재하는 Spool DB에 저장되어 그 양이 일정한도를 넘어서면 자동 전송되도록 하여, 망의 할용도를 높이는 역할을 수행한다. 청구 제시서버의 DB에 등록된 청구 건은 인터넷을 통해 소비자에게 청구되며, 소비자에게 전송 되는 청구서는 사용자DB를 참조하여 사용자가 미리 정의한 원하는 형태로 변환되어 전달되며, 필요시 암호화 과정을 거치는 것이 가능해야 한다. 전송된 청구서는 전자우편의 경우, 암호해독이 가능한 전용 브라우저를 통해 열람 되며, 이는 다시 전용 브라우저를 통해 지불인증이 승인되어 청구 제시서버에게 전송된다. EBPP 시스템의 제어 흐름은 크게 기업이 청구 정보를 소비자에게 제시하는 흐름과 소비자의 지불 승인으로 인해 기업이 은행에 지불을 요구하는 흐름으로 구분할 수 있다. 본 논문에서는 통합 청구서버 및 정구 제시서버의 역할 및 구성 요소들에 대해 서술하고, EBPP 시스템과 연동하여야 하는 메일 서버와의 상호 작용에 대해 서술할 것이다. 본 시스템을 아직 구현이 되지 않은 관계로 시스템의 성능 등의 수치적 결과를 제시할 수 없는 상태다.

  • PDF

Virtual Credit Card Number Payment System with Stored Hash Value for Efficient Authentication (효율적인 인증을 위한 해시 저장방식의 가상카드번호 결제 시스템)

  • Park, Chan-Ho;Kim, Gun-Woo;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.5-15
    • /
    • 2015
  • Electronic transactions have been increasing with the development of the high-speed Internet and wireless communication. However, in recent years financial corporations and mobile carriers were attacked by hackers. And large numbers of privacy information have been leaked. In particular, in the case of credit card information can be misused in the online transaction, and the damage of this given to cardholder. To prevent these problems, it has been proposed to use a virtual card number instead of the actual card number. But it has security vulnerability and requires additional security infrastructure. In this paper, we analyzed the proposed virtual card number schemes. and we propose a new virtual credit card number scheme. In the newly proposed scheme, cardholder generates a key pair (public key/private key) and pre-register public key to the issuer. then, cardholder can pay no additional security infrastructure while still efficiently satisfy the security requirements.

A CRM Study on the Using of Data Mining - Focusing on the "A" Fashion Company - (데이타마이닝을 이용(利用)한 CRM 사례연구(事例硏究) - A 패션기업(企業)을 중심(中心)으로 -)

  • Lee, Yu-Soon
    • Journal of Fashion Business
    • /
    • v.6 no.5
    • /
    • pp.136-150
    • /
    • 2002
  • In this study, we proposed a method to be standing customers as the supporting system for the improvement of fashion garment industry which was the marginal growth getting into full maturity of market. As for the customer creation method of Fashion garment company is developing a marketing program to be standing customer as customer scoring to estimate a existing customer‘s buying power, and figure out minimum fixed sales of company to use a future purchasing predict. This study was a result of data from total sixty thousands data to be created for the 11 months from september. 2000 to July. 2001. The data is part of which the company leading the Korean fashion garment industry has a lot of a customer purchasing history data. But this study used only 48,845 refined purchased data to discriminate from sixty thousands data and 21,496 customer case with the exception of overlapping purchased data among of those. The software used to handle sixty thousands data was SAS e-miner. As the analysis process is put in to operation the analysis of the purchasing customer’s profile firstly, and the second come into basket analysis to consider the buying associations for Association goods, the third estimate the customer grade of Customer loyalty by 3 ways of logit regression analysis, decision tree, Artificial Neural Network. The result suggested a method to be estimate the customer loyalty as 3 independent variables, 2 coefficients. The 3 independent variables are total purchasing amount, purchasing items per one purchase, payment amount by one purchasing item. The 2 coefficients are royal and normal for customer segmentation. The result was that this model use a logit regression analysis was valid as the method to be estimate the customer loyalty.

Analysis of Security Threats from Increased Usage of Mobile App Services (모바일 앱 서비스 이용 증가로 인한 보안 위협 분석)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.45-55
    • /
    • 2018
  • Recently, because the arrival of the fourth industrial revolution era, many information and telecommunication services have grown rapidly in the mobile business market. So, companies are based Mobile Apps on user customized services and expanding their services. From the standpoint of the business, to generate revenue, the company needs to maintain the existing current computer environment and develop Mobile Apps to offer convenience in various areas such as finance, admiration, e-commerce and sales support. However, as the number of users increase due to expansion of various Mobile services, security threats that are related to Mobile Apps are increasing and its damage is also increasing. Due to the rapid technological transformation of Mobile devices using the Internet, the level of security threats to Smartphones are rising and getting more advance, so this thesis is structured as follows. In Chapter 2, it will look at the overall trends of Mobile Apps as related research. In Chapter 3, it will discuss various security concerns that related to the latest Mobile Apps and learn about the threatening factors. In Chapter 4, it will compare and analyze the threatening factors. Then it will find and suggest the possible plan. In Chapter 5, it will end with conclusion. Finally, to protect mobile devices from security threats, the environment of operating system which manages the resources and data of Apps needs to be protected. Also, it is important that users to have awareness and check activation FinTech technology security in the process of simple payment with fingerprint or IC card.

A Comparison on the Factors Influencing Customer Values in Electronic Commerce between Korea and China (전자상거래 고객가치 요인의 한·중 비교)

  • Lee, Hyun-Kyu;Han, Jae-Ho
    • The Journal of Information Systems
    • /
    • v.21 no.4
    • /
    • pp.155-183
    • /
    • 2012
  • Means-Ends Network model was used to identify factors of means objective(means supplied by vendor) and fundamental objectives(purchasing motivations) for purchasing decision-making structure and dimensions of customer values on purchasers of internet shopping mall in Korea and China. In Means-Ends Network 6 factors(shopping travel, shipping assurance, vendor trust, online payment, product choice, and recommender systems) were found as a means objectives and 3 factors(shopping convenience, internet environment, customer support) as a fundamental objectives of shopping. However the results of hypotheses test for Means-Ends Network show some important differences between two countries. Something important to notice here is that Chinese customers shopping in China recognize shipping assurance factor and vendor trust factor as important factors satisfying all fundamental objectives unlike as in the case of our country. As these two factors are attribution factors responsible to the sellers, it is identified that customers do not trust the sellers and sellers have not met the expectations of customers. Therefore, these results show that the seller efforts assuring the reliability of the seller themselves, such as conducting its own compensation scheme are more important rather than the establishment of the guarantee institution to guarantee reliability and delivery assurance of sellers and implementation of legal and institutional apparatus such as the settlement of e-commerce licence system. Though this study presents such an important marketing implications, it can be pointed out that the limits are this research was done on the general Internet shopping malls without considering the Internet shopping mall types of diversity, the survey was designed around the student samples for convenience of the investigation because it was an international survey and the collected data has been limited to the western coast cities, such as China's Beijing, Shanghai, and Dalian.

The Negotiation Model of Negotiation Agents for m-Commerce (모바일 전자상거래를 위한 협상 에이전트의 협상모델)

  • 정진국;이순근;조근식
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.155-175
    • /
    • 2003
  • In context of e-commerce, negotiation is a procedure to help negotiate between buyer and seller by adjusting their negotiation issues such as price and in terms of payment. We used intelligent agent and mobile device to promote new framework of e-commerce. Moreover, this framework can help buyers and sellers to carry their commercial transactions effectively. In regard to that issue, we need to carry out the research of negotiation agent that can be used in e-commerce fields. In this paper, we modeled the negotiation using CSP for the performance of agent in m-commerce environment. Furthermore we implemented interface for mobile device to extract buyer's requirement and preference easily Besides that we used utility function to make a decision for various evaluation functions and suggestions that are used for evaluation of negotiation issues. A difficulty of generating offer is dependent on the number of negotiation issues and the range of the values. Therefore, if any offer has a number of negotiation issues and the range of values are wide, the search space will be exponentially expanded. There have been many studies fur solving this problem, we applied those techniques to improve the agent's ability of negotiation. For example, a contract can be accomplished by exchanging seller and buyer's offer that is generated by agent to adjust the requisite profit for each party. Finally, we show the improvement of satisfaction as the negotiation is processed.

  • PDF

Expanding User Types for Utilizing Certified e-Document Authorities (공인전자문서보관소의 이용 활성화를 위한 사용자 유형 확대방안)

  • Song, Byoungho
    • The Korean Journal of Archival Studies
    • /
    • no.30
    • /
    • pp.175-204
    • /
    • 2011
  • Electronic records are generated not only in public sector but also in private sector. Records will be used across the public-private boundary. The Certified e-Document Authorities(CeDAs) may keep electronic documents in private sector for preservation and evidence, like the official Record Management Systems for Public sector. A CeDA is the Trusted Third Party (TTP) as a business to be entrusted and proof interchanging documents between parties. This CeDA system could be sustainable only if the CeDA earn the enough sales through enough uses. And yet, all the eight CeDA companies have not had enough users. How to utilize CeDAs is one of the hot issues in this area. In this paper, We analyze the threat to trustworthiness of CeDA due to payment of only one party among others, and describe the difficulty in use of CeDA for an individual user. These things make CeDAs cannot have enough users. To do address these, We expand the boundary of relevant parties for a document, present a delegate-establishing option under a joint name, show the needs of identifying and notifying minimum relevant parties, and suggest the proxy parties to help the individual users.

A study on the risk factors of the fishermen's in offshore large powered purse seine fishery using the accident compensation insurance proceeds payment data of NFFC (수협의 어선원 재해보상보험 자료를 이용한 대형선망어업 선원의 위험요인 연구)

  • CHOI, Jun-Ik;KIM, Hyung-Seok;LEE, Chun-Woo;OH, Taeg-Yun;SEO, Young-Il;LEE, Yoo-Won;RYU, Kyung-Jin
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.55 no.1
    • /
    • pp.82-93
    • /
    • 2019
  • The International Labor Organization (ILO) selected fishing as the most dangerous group of jobs in the world, and it is well known in Korea as a 4D industry. Offshore large purse seine accounts for the largest portion of the fishing industry in the coastal region with high death rate and the accident rate. The repeated disaster rate survey by the Korea Maritime Institute (KMI) shows offshore large purse seiner is the highest at 22.3 percent and coastal gill nets and offshore stow net are following at 12.4 percent and 11.9 percent in order. Therefore, risk factors occurring in offshore large purse seiners were analyzed based on data from the National Federation of Fisheries Cooperatives (NFFC) for three years from 2015 to 2017 and 4M (Man, Machine, Media, Management) 3E (Engineering, Education, Enforcement) techniques were used to provide a safe fishing environment. The number of accidents on offshore large purse seiners each year was more than 150, and the number of accidents on every fishing boats was as high as 17 percent in 2015. If the accident rate and the risk level were divided by insurance, the accident resulting from contact with machinery was the highest, and the risk of a contact with gear was low but frequently occurring. This was caused by collisions and contact with gear in situations where death and disappearance risk are not high, and accident types in situations where death and loss risk are considered to be contact with machinery, falls or other accidents. Through these analysis techniques, the frequency and risk of each type of accident on a offshore large purse seiners can be demonstrated, and it is expected to raise awareness of a safer fishing environment and contribute to the reduction of accidents.

A Review on End-of-life Care System between South Korea and the United States (한국과 미국의 생애말기케어 시스템 비교 연구)

  • Choi, Ji-Won;Rhee, YongJoo
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.301-310
    • /
    • 2019
  • This study aims to examine eligibilities, services and delivery of services for the current end-of-life care and analyze the quality control of services for end-of-life care. We analyzed the literature and laws on end-of-life systems in Korean and the United States. Current end-of-life care, hospice and palliative care in Korea is being provided mainly in hospital setting. Quality control for the services focuses on setting the criteria for structures in hospitals (i.e. staffing, facilities and equipment). Whereas American end-of-life care system has much broader eligibility for service beneficiaries and provides care mostly at home. Also quality control for services includes process (delivering service) and outcomes, such as monitoring performance indicators and consumer's satisfaction. This is linked to annual payment. The comparative analysis findings contributed to give the next direction of current Korean end-of-life care system. It is nessary to establish the better and extensive end-of-life care system in Korea in considering other countries' end-of-life care systems based on more future research.

A Study on the Passengers liability of the Carrier on the Montreal Convention (몬트리올협약상의 항공여객운송인의 책임(Air Carrier's Liability for Passenger on Montreal Convention 1999))

  • Kim, Jong-Bok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.23 no.2
    • /
    • pp.31-66
    • /
    • 2008
  • Until Montreal Convention was established in 1999, the Warsaw System is undoubtedly accepted private international air law treaty and has played major role on the carrier's liability in international aviation transport industry. But the whole Warsaw System, though it was revised many times to meet the rapid developments of the aviation transport industry, is so complicated, tangled and outdated. This thesis, therefore, aim to introduce the Montreal Convention by interpreting it as a new legal instrument on the air carrier's liability, specially on the passenger's, and analyzing all the issues relating to it. The Montreal Convention markedly changed the rules governing international carriage by air. The Montreal Convention has modernized and consolidated the old Warsaw System of international instruments of private international air law into one legal instrument. One of the most significant features of the Montreal Convention is that it sifted its priority to the protection of the interest of the consumers from the protection of the carrier which originally the Warsaw Convention intended to protect the fledgling international air transport business. Two major features of the Montreal Convention adopts are the Two-tier Liability System and the Fifth Jurisdiction. In case of death or bodily injury to passengers, the Montreal Convention introduces a two-tier liability system. The first tier includes strict liability up to 100,000SDR, irrespective of carriers' fault. The second tier is based on presumption of fault of carrier and has no limit of liability. Regarding Jurisdiction, the Montreal Convention expands upon the four jurisdiction in which the carrier could be sued by adding a fifth jurisdiction, i.e., a passenger can bring suit in a country in which he or she has their permanent and principal residence and in which the carrier provides a services for the carriage of passengers by either its own aircraft or through a commercial agreement. Other features are introducing the advance payment, electronic ticketing, compulsory insurance and regulation on the contracting and actual carrier etc. As we see some major features of the Montreal Convention, the Convention heralds the single biggest change in the international aviation liability and there can be no doubt it will prevail the international aviation transport world in the future. Our government signed this Convention on 20th Sep. 2007 and it came into effect on 29th Dec. 2007 domestically. Thus, it was recognized that domestic carriers can adequately and independently manage the change of risks of liability. I, therefore, would like to suggest our country's aviation industry including newly-born low cost carrier prepare some countermeasures domestically that are necessary to the enforcement of the Convention.

  • PDF