• Title/Summary/Keyword: mobile phone payment

Search Result 49, Processing Time 0.023 seconds

A study of trend technology and application case using NFC (NFC의 기술 동향 분석 및 활용 사례)

  • Kim, Yeon-U;Moon, Il-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.519-521
    • /
    • 2011
  • NFC is enable communication between wireless davice within a distance of 10cm, one type of non-contanct short-range wireless communicaton using 13.56MHz frequency band. This is one type of RFID technology which include file transfer, contactless payment and RFID. NFC technology is standardized in 2003 already, it received much attention recently because NFC is announced full support in Android 2.3. And as APPLE is announced that have plan to monunt in iphone 5,mobile payment system is expected to change. Already SAMSUNG is launched NEXUS S mounted NFC chip and announced NFC chip will be mount GALAXY S2 LG Electronics is statemented NFC chip will be mount on smart phone that will realese this year. In this study, will announce about analysis for NFC technology and recently trend and used case.

  • PDF

A Study on the Strategies for Expanding Exports of Indonesia utilizing E-commerce Platform (전자상거래 플랫폼을 활용한 인도네시아 수출확대방안에 관한 연구)

  • Choi, Jang Woo;Park, Jae Han
    • International Commerce and Information Review
    • /
    • v.19 no.1
    • /
    • pp.99-126
    • /
    • 2017
  • The Indonesian e-commerce market has grown significantly due to sustained economic growth, middle class growth, rapid increase in Internet and SNS users, and increase in accessibility of mobile broadband services. In particular, consumers' online shopping through mobile and SNS has been increasing rapidly based on the expansion of the popularity of smart phone devices. This research suggested the strategies for expanding exports of Indonesia through e-commerce platform to the Korean firms, with deep analysis of the current status and features, problems, cases, and implications etc. of Indonesia's e-commerce market. As an export expansion strategy utilizing Indonesia's e-commerce platform, this study showed the Korean firms have to build a local online distribution network, establish a logistics & delivery and payment system, acquire Halal certification for Muslim market, carry out the in-depth market research, actively implement Hanryu marketing strategy, develop a creative product, set up market segmentation strategies, and develop SNS mobile marketing.

  • PDF

Study on the fintech activation and O2O service (O2O서비스와 핀테크 활성화에 관한 연구)

  • Lee, Young-hwan
    • Journal of Venture Innovation
    • /
    • v.1 no.1
    • /
    • pp.15-27
    • /
    • 2018
  • Interest in Fintech is extremely growing as O2O which means the binding of online and offline appears. The scale of private consumption in South korea reached about 700 trillion won, however, the online trading is only about 60 trillion won, which means 640 trillion won is still trading in offline. The reason the Fintech industry comes into the spotlight is because the foundation of related industries such as the rise of mobile traffic and the fast growth of the financial transaction through the mobile channel is forming. Especially, the introduction of payment systems among these Fintech industries offers convenience to the consumer. Mobile payment has been generalized in daily life such as utility bills and taxi fares. Use of O2O service in various industrial fields in commerce gives convenience to consumers and increase in sales to business in recent commercial transaction which is moving to on-demand channel services. People in smartphone life are supposed to find more convenient services for saving time using their phone, and this kind of environment makes the ordering goods and services through Fintech payments increase. The emergence of O2O services influences the development of Fintech industry and the emergence of convenient and reliable Fintech service through the deregulation of Fintech also affects the activation of O2O services. The complementary relationships between O2O services and Fintech would contribute to economic activation. From the standpoint of the researchers, I would like to further study the methods that can lead to a new paradigm of the financial payments industry through the development of Fintech and the drafts for the market expansion of the current offline commerce making it online in the advent of O2O services in variety industries.

A Study on SmartPhone Hacking and Forensic of Secondary Damage caused by Leakage of Personal Information (개인정보유출 2차 피해로 인한 스마트폰 Smishing 해킹과 Forensic 연구)

  • Park, In-woo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.273-276
    • /
    • 2014
  • In 2014, the leakage of personal information from 3 credit card companies resulted in divulging approximately 10,000 customers' personal information. Although the credit card companies concluded that there was no secondary loss due to the leakage of personal information, secondary financial losses resulting from the leakage of personal information currently occur. In particular, hackers who employ smishing masquerade acquaintances by using the divulged personal information to ask payment for Ms. Kim's Sochi Olympics legal processing or exposed traffic violations. The hackers cause secondary financial losses through smartphones. This study aims to conduct a forensic analysis of smishing incidents in smartphones through the leakage of personal information, and to make a forensic analysis of financial losses due to the smishing incidents.

  • PDF

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

A Design of Protocol Based on Smartcard for Financial Information to Protect in E-payment System (온라인 소액결제 시스템에서 금융정보 보호를 위한 스마트카드 기반의 프로토콜 설계)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5872-5878
    • /
    • 2013
  • This study provides two channel structure and two factor authentication. First, a purchasing request by Internet and then user certification and a settlement approval process by mobile communication. Second, it support that proposal protocol utilize a partial factor value of stored in users smartcard, smart phone and password of certificate. Third, storage stability is improved because certificate store in smartcard. Finally, proposal protocol satisfy confidentiality, integrity, authentication, and non- repudiation on required E-commerce guideline. In comparative analysis, Efficiency of the proposal protocol with the existing system was not significantly different. But, In terms of safety for a variety of threats to prove more secure than the existing system was confirmed.

Implemention of Refrigerator Application using NFC (NFC를 이용한 냉장고 Application 구현)

  • Ham, Ji-Hun;Yun, Min-Gyu;Han, Jung-Woo;Kim, Tae Yong;Jang, Won-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.570-572
    • /
    • 2015
  • NFC (Near Field Communication) is an area of the RFID technology is a kind of short-range wireless communication. NFC technology is to utilize the data transfer, the access control system is usefully employed in many fields, such as mobile payment. Recently smartphone application development using NFC is activated, recognition of the convenience of the current NFC tag is insignificant state. In this paper, it is the content of the Application that was created in order to provide the knowledge of convenience food to the customer to visit the mart. Users with Mart, using smartphones, at a NFC tag that is attached to the food display stand food information, purchasing tips, keeping method, data such efficacy is provided over the screen of the smartphone. If you purchased the food is placed in the refrigerator "moves to the food list of application to click the button, through the food list screen their food list in the refrigerator, and by providing information such as expiration date, the user There is help me to be able to buy the more convenient food.

  • PDF

A Side Channel Attack with Vibration Signal on Card Terminal (진동 신호를 이용한 카드 단말기 부채널 공격)

  • Jang, Soohee;Ha, Youngmok;Yoon, Jiwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1045-1053
    • /
    • 2014
  • In this paper, we assume that the information leakage through side-channel signal may occur from the card payment terminal and newly introduce a real application attack model. The attack model is a side channel attack based on vibration signals, which are detected by a small sensor attached on card terminal by attacker. This study is similar to some other studies regarding side channel attack. However, this paper is different in that it is based on the non-language model. Because the financial transaction information such as a card number, password, mobile phone number and etc cannot have a constant pattern. In addition, there was no study about card terminal. Therefore, this new study is meaningful. We collected vibration signals on card terminal with a small wireless sensor and analyzed signal data with statistical signal processing techniques using spectrum of frequency domain and principal component analysis and pattern recognition algorithms. Finally, we evaluated the performances by using real data from the sensor.

A Study on Digital Divide from Socio-Technical Convergence: With Focus on Korean Women's Travel Activities (사회기술융합적 관점에서 살펴본 디지털기기 이용한계에 대한 연구: 한국 여성의 관광유형을 중심으로)

  • Lee, Seung-Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.177-185
    • /
    • 2015
  • The gender difference in social roles affects digital devices' utilization differences in man and woman even in the 21st Century. Prior studies analyze the digital divide (genders, ages, etc.) from the assessment perspectives of digital equipment, such as PCs. In the area of high speed internet, most functions of PCs have been replaced with smartphones, and around 80% of the mobile phone users adopt smartphones. Subsequently the inequality of physical access to the digital devices is no longer a criterion for digital divide. The focus on digital divide should be shifted from the physical access to other factors, such as socio-technical or socio-cultural ones. This paper examines utilization of women's digital equipment, in particular, preparing for tourism activities, which is popular but sensitive to the technology. A survey was conducted with participants of [Suncheon Garden Expo] 2013. The results of this study capture the inactive use of digital devices particularly women over 50s. This phenomenon (high utilization of the digital devices for social or informative purposes, but low utilization of the digital payment) implies other aspects of Korean women (economic independence, low self-assertion, technical difficulties, etc.), which is considered from the socio-technological convergence perspective. This study also has a practical implication on the side of the digital device developers as well as marketing, where the qualitative communication is likely to be incorporated for the women over 50s.