Design of Ubiquitous Payment Process for Enhancing Seamlessness and Privacy

연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계

  • Published : 2006.09.30

Abstract

Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. Payment, however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, strong personal device, and peer-based information transactions. We also propose U-SDT Protocol integrating technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

본 연구는 U-Commerce의 주요 특성이자 이슈인 Seamlessness(연결완전성)와 프라이버시가 강화된 U-Payment 메쏘드를 제안한다. 유비쿼터스 환경에서 나타나는 중요한 사용자 결제환경의 특성은, 사용자의 결제정보 생성 및 변환, 전송 등이 Seamless하게 이루어지는 것과 사용자의 결제 디바이스 기능 및 정보처리능력, 저장능력 등이 매우 강해진다는 점이다. U-Payment 환경에서 예상되는 이러한 특성은 이전의 결제방식과는 다른, 새로운 결제방식을 가능하게 할 것으로 예상되는데, 본 논문은 RFID와 사용자 단말의 강화, 금융기관 계정의 결합을 통해 사용자의 Seamless한 가치를 창출하고, 동시에 프라이버시 보호의 개선이 가능한 U-SDT(Secure Direct Transaction) 프로토콜을 시나리오와 시스템 아키텍처를 통해 설명한다. 또한 이에 수반되는 바람직한 특징으로 결제정보소유의 분리적 구조를 제시한다.

Keywords

References

  1. 이경전, 주정인, "연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 상거래의 설계 방안", 2005 추계 지능정보시스템학회 논문집, (2005).
  2. Acquisti, A., "An User-centric MIX-net Protocol to Protect Privacy", Workshop on Privacy in Digital Environments : Empowering Users, 2002.
  3. Acquisti, A., "Protecting Privacy with Economics : Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments", Workshop on Socially-informed Design of Privacy-enhancing Solutions, 4th International Conference on Ubiquitous Computing (UBICOMP 02), 2002.
  4. Boddupalli, P., F. Al-Bin-Ali, N. Davies, A. Friday, O. Storz, and M. Wu, "Payment Support in Ubiquitous Computing Environments", IEEE Workshop on Mobile Computing Systems and Applications, (2003), 110-121.
  5. Divyan, M. Konidala, C. Yeun, and K. Kim, "A Secure and Privacy Enhanced Protocol for Location-based Services in Ubiquitous Society", GLOBECOM, 2004.
  6. Floerkemeier, C., R. Schneider, and M. Langheinrich, "Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols", Institute for Pervasive Computing, 2004.
  7. Gross, S., E. Fleisch, M. Lampe, and R. Muller, "Requirements and Technologies for Ubiquitous Payment", Multikonferenz Wirtschaftsinformat, Techniques and Applications for Mobile Commerce, 2004.
  8. Kourouthanasis, P., D. Spinellis, G. Roussos, and G. Giaglis, "Intelligent cokes and diapers : MyGrocer ubiquitous computing environment", In First International Mobile Business Conference, (2002), 150-172.
  9. Labrou Y., J. Agre, L. Ji, J. Molina, and W. Chen, "Wireless Wallet", MobiQuitous, (2004), 32-41.
  10. Langheinrich, M., "Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems", Ubicomp, (2001), 273-291.
  11. Langheinrich, M., "A Privacy Awareness System for Ubiquitous Computing Environments", Ubicomp, (2002), 237-245.
  12. Roussos, G. and T. Moussouri, "Consumer perceptions of privacy, security and trust in ubiquitous commerce", Personal and Ubiquitous Computing, Vol.8, No.6 (2004), 416-429. https://doi.org/10.1007/s00779-004-0307-6
  13. Seigneur, J. and C. D. Jensen, "Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss", In Proceedings of the 19th Annual ACM Symposium on Applied Computing, Vol.03(2004), 1593-1599.
  14. Zugenmaier, A. and A. Hohl, "Anonymity for Users of Ubiquitous Computing", Security-Workshop at UbiComp, 2003.