• Title/Summary/Keyword: 결제 프로토콜

Search Result 55, Processing Time 0.027 seconds

Privacy-preserving Custom Manufacturing Service Protocol based on Smart Contract in Smart Factory (스마트 컨트랙트 기반의 프라이버시를 제공하는 스마트 팩토리 주문제작 서비스 프로토콜)

  • Lee, Yong-Joo;Woo, Sung-Hee;Lee, Sang-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.635-638
    • /
    • 2018
  • The Cost for introducing smart factory will decrease and the service type will change from a large scale to small quantity manufacturing, when 3D printing technologies have actively applied and smart factory related technologies have more stably developed. If customers have to provide private information, the availability of developed technology may cause slow progress. We propose a new protocol for custom manufacturing service of smart factory. The proposed approach is designed for smart contract based IoT convergence network. We analyzed the requirements of the proposed approach which provides anonymity, privacy, fairness, and non-repudiation. We compared it with closely related studies to show originality and differences.

  • PDF

Privacy-preserving Customized Order Service Protocol based on Smart Contract in Smart Factory (프라이버시를 제공하는 스마트 컨트랙트 기반의 스마트 팩토리 주문제작 프로토콜)

  • Lee, YongJoo;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.215-222
    • /
    • 2019
  • Advances in technologies about 3D (three-dimensional) printing and smart factory related issues will have the effect of reducing the cost of building a smart factory and making various types of service available. Manufacturers and service providers of small assets work with outside experts to provide small amounts of customized ordering services. If customers have to disclose their private information to subscribe to a new service, they may be reluctant to use it and the availability of developed technology may cause slow progress. We propose a new protocol for customized order service for smart factory. The proposed approach is designed to meet requirements of security and based on smart contract in IoT convergence network. We analyzed the requirements of the proposed approach which provided anonymity, privacy, fairness, and non-repudiation. We compared it with closely related studies to show originality and differences.

A remote user authentication protocol using a Smart Card (스마트카드를 이용한 원격 사용자 인증 프로토콜)

  • 김한수;송하윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.476-478
    • /
    • 2003
  • 정보 기술의 급속한 발전으로 스마트카드는 무선 통신, 공중전화 서비스, 전자 상거래, 교통 분야등 여러 활용 분야에서 사용되고 있으며 특히 현금이나 신용카드를 대체하는 결제수단으로 떠오르면서 우리 생활에 많은 변화를 일으키고 있다. 그러나 이러한 편리함 뒤에는 평소 우리가 생각하지 못했던 일들, 예컨대 개인 정보의 유출 등의 사고가 발생하여 시스템 안전에 대한 문제가 제기되고 있는 실정이다. 그동안 스마트카드를 이용한 원격 인증에 있어 ElGamal 알고리즘이나 해쉬 함수를 이용하여 시스템이 사용자를 인증하는 단방향 인증이 연구되어 왔으나, 기술의 발달로 시스템에 대한 위조가 가능해지면서 보다 강화된 보안의 필요성이 대두되었다. 본 논문에서는 이산대수와 해쉬 함수를 결합한 하이브리드 방식으로 스마트카드를 이용한 원격 사용자 양방향 인증을 설계하였다.

  • PDF

A Secure Quantum-Resistant Authentication and Key Distribution Protocol for NFC Payment Environments (NFC 결제 환경에서 양자 컴퓨팅에 안전한 인증 및 키 분배 프로토콜)

  • Kim, JongHyun;Park, KiSung;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.4
    • /
    • pp.485-492
    • /
    • 2018
  • Recently, the numerous authentication and key distribution protocol for NFC payment environment have been proposed using public key cryptosystems. However, these protocol are vulnerable to quantum computing attack because quantum computing can solve factoring and discrete logarithm problem effectively using Grover and Shor's algorithm. For these reason, the secure authentication and key distribution have become a very important security issue in order to prevent quantum computing attacks. Therefore, to ensure user's payment information and privacy, we propose a secure quantum resistant authentication and key distribution protocol for NFC payment environments.

An Implementation of EMV Specifications for Smartcard Terminals (스마트 카드 터미널를 위한 EMV Specification의 구현)

  • Park, Chang-Hyeon;Doo, Myung-Taek;Lee, Baek-Soon;Kwon, Oh-kyu
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.429-440
    • /
    • 2002
  • Smartcard is a kind of computing device with it's own processor and memory Thus, the international money market is going to accomodate the use of smartcards instead of traditional magnetic cards for the future money market. EMV is a standard protocol for smartcards, proposed by Europay, Mastercard, and Visa, which are three famous international settlement organizations. This paper presents the implementation of EMV specifications for the smartcard terminals for supporting various application programs. This paper shows that the implemented EMV terminal passes the international approval tests.

Implement and Experiment of Efficient Off-Chain (단방향 해시 함수를 활용한 효율적인 Off-chain Payment Channel 구현 및 실험)

  • Kim, Sun Hyoung;Jeong, Jae Yeol;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1413-1424
    • /
    • 2019
  • Cryptocurrency has limitations to be used as an actual payment method due to the scalability problem of the blockchain consensus protocol, and various off-chain solutions to solve these limitations are being studied. In this paper, we design an efficient off-chain payment channel using one-way hash function and implement the designed payment channel using Ethereum smart contract. In addition, the experiment was conducted to measure and analyze execution time and cost for each method by deploying it in the same environment as the previously implemented plasma MVP. As a result, compared with plasma MVP, the proposed solution was able to reduce the total cumulative time by about 34% and reduce the overall execution cost by about 41%.

Anonymous Electronic Promissory Note System Based on Blockchain (블록체인 기반 익명 전자 어음 시스템)

  • HyunJoo Woo;Hyoseung Kim;Dong Hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.947-960
    • /
    • 2023
  • In Korea, traditional paper promissory notes are currently undergoing a transformation, being gradually replaced by electronic notes. This transformation is being steered under the Korea Financial Telecommunications Institute, a trusted authority. However, existing electronic systems have security vulnerabilities, including the risk of hacking and internal errors within the institute. To this end, we have defined a novel anonymous electronic promissory note system based on blockchain. We have constructed a concrete protocol and conducted security analysis of our protocol. Note that, in our protocol, every note information is committed so that the note remains undisclosed until the point of payment. Once the note information becomes public on the blockchain, it enables the detection of illicit activities, such as money laundering and tax evasion. Furthermore, our protocol incorporates a feature of split endorsement, which is a crucial functionality permitted by the Korean electronic note system. Consequently, our proposed protocol is suitable for practical applications in financial transactions.

Design and Implementation of the System Provide of the Loyalty Service for Electronic Commerce (전자상거래 로열티 서비스를 위한 시스템 제공자 설계 및 구현)

  • Hong, Jae-Young;Kim, Ki-Young;Lee, Young-Seok;Choi, Hoon;Kim, Young-Kuk;Hong, Seung-Jae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.3
    • /
    • pp.348-355
    • /
    • 2000
  • Loyalty is a bonus point that a customer earns in reward of purchasing goods of a shop or a manufacturer. The management of loyalty such as issuing, accounting, reimbursing is carried out by the loyalty system. Traditional loyalty systems were proprietary. As a result, the systems are not interoperable with each other. However, our loyalty system allows a group of merchants join together and use the same IC card to operate their own loyalty programs. Data and counters can be shared or totally isolated, using secret codes and keys. The loyalty pool system communicates with the loyalty service providers over the Internet and performs the management of loyalty in fully automated manner. This paper describes the functional architecture and internal behavior of the loyalty pool system along with the communication protocols.

  • PDF

An Effective Protection Mechanism for SSL Man-in-the-Middle Proxy Attacks (SSL MITM 프록시 공격에 대한 효과적 방어방법)

  • Lim, Cha-Sung;Lee, Woo-Key;Jo, Tae-Chang
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.693-697
    • /
    • 2010
  • In current e-commerce system, it happens that client's confidential information such as credit card numbers, pin numbers, or digital certificate may pass through a web proxy server or an altered proxy server without client's awareness. Even though the confidential information is encrypted and sent through SSL(Secure Sockets Layer) or TLS(Transport Layer Security) protocol, it can be exposed to the risk of sniffing by the digital certificate forgery at the proxy server, which is called the SSL MITM(Man-In-The-Middle) Proxy attack. In this paper, current credit card web-payment systems, which is weak at proxy information alternation attack, are analyzed. A resolution with certificate proxy server is also proposed to prevent the MITM attack.

A Study of PKI-Based E-commerce Security System Design under Java Code Environment (Java Code를 중심으로한 PKI기반 전자상거래 보안시스템 설계)

  • Bang, Kee-Chun;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • RSA is the most widely used public key algorithms. Payment via the SSL communications, and user authentication using RSA secure shopping mall that can protect the user's valuable information in the process of building. SSL-based electronic signature technology and encryption protocols for this technology are electronic documents are delivered to the other party through a separate encryption process, the information sender to enter information on a web browser (user) and the recipient (the Web server of the site Manager), except you will not be able to decrypt the contents. Therefore, the information is encrypted during the transfer of electronic documents even if hackers trying to Sniffing because its contents can never understand. Of internet shopping mall in the user authentication 'and' Communications' SSL secure shopping mall built with the goal of the methodology are presented.