• Title/Summary/Keyword: secure transaction

Search Result 167, Processing Time 0.026 seconds

Dynamic Copy Security Protocol In Real-Time Database Systems (실시간 데이터베이스 시스템에서의 동적 복사 보안 프로토콜)

  • Park, Su-Yeon;Lee, Seung-Ryong;Jeong, Byeong-Su;Seung, Hyeon-U
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.955-963
    • /
    • 1999
  • 다단계 보안 실시간 데이타베이스 시스템은 데이타베이스의 일관성 유지와 실시간 요구인 마감시간의 만족, 그리고 기밀성을 띤 데이타가 노출될 수 있는 비밀채널(covert-channel)의 방지라는 요구사항을 모두 만족해야 한다. 기존의 SRT-2PL(Secure Real-Time 2 Phase Locking)은 원본과 복사본으로 데이타 객체를 분리시켜 다른 등급간에 불간섭(non-interference)을 유지하여 비밀채널의 방지를 가능하게 하였으나, 복사본이 모든 데이타 객체에 대해 항상 존재하므로 메모리의 낭비가 있을 수 있고, 복사본의 갱신을 위한 갱신 큐의 관리에 따르는 오버헤드와 그에 따른 예측성 결여라는 문제점을 갖고 있다. 이를 개선하기 위하여 본 논문에서는 다단계 보안 실시간 데이타베이스 시스템의 요구사항을 모두 만족하는 동적 복사 프로토콜을 제안한다. 동적 복사 프로토콜은 로킹 기법을 기초로 동작하고, 트랜잭션의 작업에 따라 동적으로 복사본을 생성하고 삭제한다. 모의 실험 결과 제안한 동적 복사 프로토콜은 비밀채널을 방지하고 동적인 복사본의 생성으로 SRT-2PL의 단점인 메모리 낭비를 줄일 수 있으며, 예측성을 높여 마감시간 오류율을 감소시켰다.Abstract Concurrency control of real-time secure database system must satisfy not only logical data consistency but also timing constraints and security requirements associated with transactions. These conflicting natures between timing constraints and security requirements are often resolved by maintaining several versions(or secondary copies) on the same data items. In this paper, we propose a new lock-based concurrency control protocol, Dynamic Copy Security Protocol, ensuring both two conflicting requirements. Our protocol aims for reducing the storage overhead of maintaining secondary copies and minimizing the processing overhead of update history. Main idea of our protocol is to keep a secondary copy only when it is needed to resolve the conflicting read/write operations in real time secure database systems. For doing this, a secondary copy is dynamically created and removed during a transaction's read/write operations according to our protocol. We have also examined the performance characteristics of our protocol through simulation under different workloads while comparing the existing real time security protocol. The results show that our protocol consumed less storage and decreased the missing deadline transactions.

A study of Web Service Security System using the Secure Network Transfer Message (안전한 네트워크 전송 메시지를 이용한 웹 서비스 보안 시스템에 관한 연구)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.850-853
    • /
    • 2008
  • As th Internet grew rapidly, the Electronic Commerce that is based on Internet increased. The Electronic Commerce is unsubstantial in the mutual authentication between the parties and a commerce As a solution to this issue, a Web server uses a Client Message technology. The purpose of Client Message is to validate the user and the electronic commercial transaction. Further, it increases efficiency and offers several ability at various purposes. However, the Client Message is transferred and stored as an unencrypted text file, the information can be exposed easily to the network threats, end system threats, and Client Message harvesting threats. In this paper designed by used crypto algorithm a Secure Message as a solution to the issue have proposed above. Further, designed a security service per Network transmitting message to transfer client's user input information to a Web server safety.

  • PDF

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

1.5-factor Authentication Method using Secure Keypads and Biometric Authentication in the Fintech (핀테크 환경에서 보안 키패드와 생체인증을 이용한 1.5-factor 인증 기법)

  • Mun, Hyung-Jin
    • Journal of Industrial Convergence
    • /
    • v.20 no.11
    • /
    • pp.191-196
    • /
    • 2022
  • In the fintech field, financial transactions with smart phones are actively conducted. User authentication technology is essential for safe financial transactions. PIN authentication through the existing security keypads is convenient to input but has weaknesses in security and others. The biometric authentication technique is secure, but there is a possibility of false positive and false negative authentication. To compensate for this, two-factor authentication is used. In this paper, we propose the 1.5-factor authentication that can increase convenience and security through PIN input with biometric authentication. It provides the stability of fingerprint authentication and convenience of two or three PIN inputs, and this makes safe financial transaction possible. Since biometric authentication is performed at the same time when entering PIN, while security is required by applying fingerprint authentication to the area touched while entering PIN. The User authentication is performed while ensuring convenience to input through additional PIN input in situations where high safety is required, and Safe financial transactions are possible.

The Security Risk and Countermeasures of Blockchain based Virtual Currency Trading (블록체인 기반 가상화폐 거래의 보안 위험 및 대응방안)

  • Chung, Young-Seek;Cha, Jae-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.100-106
    • /
    • 2018
  • Since the concept of virtual currency called Bitcoin was announced in 2008, the blockchain technology, which is the basis of Bitcoin, is attracting attention as an important platform technology in the era of the 4th industrial revolution that can change our society in the future. Although Existing electronic financial transactions store and manage all transaction history at a reliable central organization such as government and bank, blockchain-based electronic financial transactions are composed of a distributed structure in which all participants participating in the transaction store and manage the transaction history, it is possible to secure transaction transparency while reducing system construction and operation costs. Besides the virtual currency that started with bit coins, the technology of these blockchains has been extended in various fields such as smart contracts and document management. The key technology area of this blockchain is security based on proven cryptographic technology to make it difficult to forge and hack, but there are security risks such as security vulnerabilities in the virtual currency trading service, We will discuss security risks in using virtual currency and discuss countermeasures. Especially security accidents of virtual currency exchanges are occurring frequently recently, the damage of users who trade the virtual currency is also increasing, we propose security threats and security countermeasures against virtual currency exchanges.

A Study on Transaction Service of Virtual Real Estate based on Metaverse (메타버스 기반 가상부동산 거래 서비스 연구)

  • Yoo, Jongyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.83-88
    • /
    • 2022
  • The purpose of this study is to present an analysis and implications for the metaverse-based virtual real estate transaction service. Through blockchain-based technology and metaverse, the world we live in is expanding naturally. Therefore, changes in the environment and perceptions of market participants are also very important factors. The concept and thinking about the existing asset value change and investment are also changing. This means that you can generate profits through value and investment in intangible assets. The service user aspect is a case of investing in the future value of virtual real estate that if more users participate rather than the present value, the principle of supply and demand will be applied to increase the number of consumers and the price will naturally rise according to the principle of scarcity. The service provider provides a technical platform for the service to directly transact the portion of the virtual area considered of interest directly through the virtual real estate purchase business. As the number of participants increases as well as funds and transaction fees, various revenue models such as advertisements can be discovered and provided. It plays the role of providing jobs and information through new services. As a stakeholder, governments can exploit the emergence of new technologies and products to create people and services and secure economic benefits. Of course, various institutional supports should be provided so that new services can settle in the market while mitigating risk factors. This study is meaningful in that it contributes to the establishment of a domestic metaverse-based environment and related research and is utilized in the study of virtual space real estate services.

Formal Specification and Analysis of Mobile E-commerce protocol (모바일 전자상거래 프로토콜의 정형명세 및 분석)

  • Noh Jung Hyun;Kim Il-Gon;Choi Jin-Ghoo;Kim Hyun-Seok;Choi Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.124-126
    • /
    • 2005
  • 무선 인터넷을 이용한 전자상거래가 증가함에 따라 모바일 환경에서 전자상거래를 보다 안전하고 효율적으로 사용할 수 있도록 SET/A (Secure Electronic Transaction Agent) 프로토콜이 제안되었다. 본 논문에서는 키 노출에 따른 보안 취약점을 분석이 아닌 프로토콜의 행위적 관점에서 SET/A를 정형 명세하고 무선망 접속 불량이나 에이전트 동작 실패와 같은 오류 상황에 의해 교착 상태에 빠지지 않는지 정형 검증하였다. 그 결과 SET/A가 교착 상태에 빠질 수 있음을 확인하였고 확장된 SET/A 프로토콜을 제안하고 검증하였다.

  • PDF

Vulnerability Analysis of E-cash Load Transaction (전자화폐 충전기능의 취약점 분석)

  • Kim Il-Gon;Moon Young-Joo;Kang Inhye;Lee Ji-Yeon;Han Geun Hui;Choi Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.133-135
    • /
    • 2005
  • CEPS(Common Electronic Purse Specification) 전자지갑 규제 표준을 기반으로 한 전자상거래서비스의 요구사항 및 시장성이 점차 큰 비중을 차지하고 있다. 전자지갑의 전자화폐 충전기능은 물품기능 만큼 매우 중요한 안전 필수 요구사항이다. CEPS에서는 LSAM (Load Secure Application Module) 기능을 통해, 전자금액 충전기능을 담당하도록 정의하고 있다. 전자지갑 본 논문에서는 전자지갑의 전자금액 충전기능을 설명하였다. 그리고 정형기법을 이용하여 CEPS 전자지갑 표준에서 정의한 전자금액 충전기능을 정형명세 및 정형검증 하여, 전자상거래시 발생할 수 있는 취약점을 확인하고 분석하였다.

  • PDF

A Study on the Transaction Security of Electronic Signature in the Electronic Commerce (전자상거래하에서의 전자서명의 보안성에 관한 연구)

  • 전순환
    • The Journal of Information Technology
    • /
    • v.1 no.2
    • /
    • pp.229-244
    • /
    • 1998
  • In this paper, we discussed various securities of electronic signature. Merchants or sellers must address all Internet security concerns. Security technology may secure the routes of Internet communication, but it does not protect consumers from people with whom they might choose to do business. To Protect consumer information, they must maintain physical security of their servers and control access to software passwords and private keys. Techniqaues such as secret and public-key encryption and digital signatures play a crucial role in developing consumer confidence in electronic commerce.

  • PDF

A Secure Credit Card Transaction Method Based on Kerberos

  • Kim, Jung-Eun;Kim, Yoo-Hwan
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.51-70
    • /
    • 2011
  • This paper introduces a new credit card payment scheme called No Number Credit Card that can significantly reduce the possibility of credit card fraud. The proposed payment system is loosely based on Kerberos, a cryptographic framework that has stood the test of time. In No Number Credit Card, instead of card numbers, only payment tokens are exchanged between the customers and merchants. The tokens are generated based on the payment amount, payment type, client information, and merchant information. However, it does not contain the credit card number, so the merchant or a database hacker cannot acquire and illegally use any credit card numbers. The No Number Credit Card system is ideal for online e-commerce transactions and can be used with any credit card that users possess. It can be used with minor modifications to the current card payment system. We provide the principles of its operation through scenario analysis, a sample implementation, and a security analysis