• Title/Summary/Keyword: 소액결제

Search Result 50, Processing Time 0.024 seconds

Fraud Detection System in Mobile Payment Service Using Data Mining (모바일 결제 환경에서의 데이터마이닝을 이용한 이상거래 탐지 시스템)

  • Han, Hee Chan;Kim, Hana;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1527-1537
    • /
    • 2016
  • As increasing of smartphone penetration over the world, various mobile payment services have been emerged and fraud transactions have drastically increased. Although many financial companies have deployed security solutions to detect fraud transactions in on/off-line environment, mobile payment services still lack fraud detection solutions and researches. The mobile payment is mainly comprised of micro-payments and payment environment is different from other payments, so mobile-specialized fraud detection is needed. In this paper, we propose a FDS (Fraud Detection System) based on data mining for mobile payment services. The method of this paper is applied to the real data provided by a PG (Payment Gateway) company in Korea. The proposed FDS consists of two phases; (1) the first phase is focused on classifying transactions at high speed (2) the second is designed to detect abnormal transactions with high accuracy. We could detect 13 transactions per second with 93% accuracy rate.

DPay : Distributed-Hash-Table-based Micropayment System for Peer-to-Peer Environments (DPay : 피어-투-피어 환경을 위한 분산 해시 테이블 기반의 소액 지불 시스템)

  • Seo, Dae-Il;Kim, Su-Hyun;Song, Gyu-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.10
    • /
    • pp.752-760
    • /
    • 2009
  • Emerging peer-to-peer systems benefit from the large amount of resources provided by many peers. However, many peer-to-peer systems or applications suffer from malicious peers and it is not guaranteed that peers are always online. Micropayment systems are accounting and charging mechanism for buying services, so we can apply them to solve these problems. In the past the majority of micropayment system uses a centralized broker but the problem with most existing micropayment system is a heavy load on the broker. For instance, when an owner of the coin is offline, the broker delegates the owner and handles payment messages. It occurs frequently because of characteristic of peer-to-peer system and is another load of the broker. In this paper we introduce DPay, a peer-to-peer micropayment system that uses distributed hash table (DHT) for storing encrypted payment messages and increases scalability and reduces the load of broker by removing downtime protocol. We show the idea of real-time double spending detection in DPay and report the results of several evaluations in order to compare DPay and other payment scheme. In simulation result, the load of broker in DPay is reduced by 30% on average of other previous payment scheme. We expect that DPay can apply various peer-to-peer systems because it provides a real-time double spending detection and stores more secure payment messages.

동전 문제를 보는 두 가지 시각

  • 한국자동판매기공업협회
    • Vending industry
    • /
    • v.4 no.3 s.11
    • /
    • pp.52-54
    • /
    • 2004
  • 100원, 500원 동전을 가장 요긴하게 활용할 수 있는 유통수단은 자판기이다. 자판기를 통해 제공되는 커피, 캔음료의 가격대가 1000원 이하이다 보니 동전사용이 엄청나게 많이 이루어진다. 이렇게 소액결제의 대명사인 자판기가 동전사용의 비중이 높다 보니 이로 인해 파생되는 문제 역시 다양하다. 항시 자판기내 동전보관이 되어 있는 만큼 도난 파손의 문제가 작용하기도 하고, 화폐가치 차이가 있는 제3국 동전을 넣는다거나, 이물질을 넣는 문제가 발생하기도 한다. 또 애써 모은 동전을 은행이 교환해 주지 않아 골머리를 앓기도 한다. 한쪽에서는 무시를 받고, 또 한쪽에서는 한탕의 수단으로 혈안이 되게 만드는 게 자판기 동전이다. 인간사 다양한 이치처럼 자판기 동전으로 인해 파생되는 문제도 다양하다. 이번 정책초점에서는 자판기 동전 문제를 보는 두 가지 시각을 조명하고자 한다. 필리핀 동전 1페소가 국내 자판기에 유통되는 문제와 은행들의 교환거부로 애물단지로 전락한 자판기 동전 문제를 분석 정리했다.

  • PDF

Malicious application detection method of the Android platform (안드로이드 플랫폼의 악성 어플리케이션 탐지 방안)

  • Hwang, Jun-Ho;Kim, Min-Gyu;Kim, Seok-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.871-874
    • /
    • 2013
  • 기존 PC에서 발생되는 악성코드가 안드로이드 모바일 플랫폼에서 스미싱 어플리케이션으로 급증하고 있다. 스마트 폰 사용자는 SMS에 의해 악성코드를 설치하게 되며, 악성코드가 소액결제 서비스 인증번호를 가로채어 C&C 서버 등으로 송신함으로써 30 만원 이내의 금전적 손해를 일으키게 된다. 본 논문에서는 GCM(Google Cloud Messaging)과 MDM(Mobile Device Management)을 이용하여 사용자의 스마트 폰에서 동작하고 있는 악성 어플리케이션을 탐지하고, 악성 행위를 통제시키며 사용자로부터 직접 어플리케이션을 삭제하길 권하는 시스템을 설계하여 제안하고자 한다.

Study on NFC Security Technology and Vulnerability (NFC 보안 기술 및 보안 취약점에 관한 연구)

  • Kim, Mi-Sun;Kim, Hyun-Gon;Lee, Bum-Ki;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.2 no.3
    • /
    • pp.54-61
    • /
    • 2013
  • NFC is a Near Field wireless Communication technology, comes to the fore as an important technology of Mobile Payment System with supply of devices and diffusion of services. Because of the fact that the NFC retail payment services, ticketing, smart cards are able to operate in one device, it(NFC Technology) can make disclosure of personal information and security risks. Thus, the problem of security in NFC technology is essential, and the need for research on security threats are increasing. In this paper, we wil analyze for NFC's vulnerabilities and security technology.

  • PDF

주요국의 전자화폐 관련 주요 동향이 우리나라에 주는 시사점

  • Yun, Yeong-Han;Gwon, Sun-Dong
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.37-42
    • /
    • 2008
  • 최근 구축된 정보통신인프라를 이용한 금융수단이 보편화됨에 따라 금융인프라 역시 과거 ATM단말기나 FEDI 수준을 넘어서 급속히 본격화되고 있으며, 2000년대 이후 전자결제의 이용이 상당부분 보편화되고 있다. 이미 우리나라의 경우에도 전자화폐의 사용이 도입초기를 넘어서 상당부분 보편화 단계로 접어들고 있으며, 상법의 개정과 전자금융거래법의 신규제정 등 다양한 법적 기반 역시 어느 정도 정착단계에 정착되고 있다. 그럼에도 불구하고 비대면의 거래에서 발생할 수 있는 각종 문제점이 완벽하게 해결되었다고 보기는 어렵다. 이에 본 연구에서는 우리나라의 전자화폐 활용 현황 살펴보고 일본, 싱가포르의 최근 현황을 주요국의 선진사례로서 살펴본다. 이러한 선진국의 사례가 주는 시사점을 검토하고 이를 통하여 우리나라의 전자화폐 활용상의 활성화에 장애가 되는 요인을 규명함으로써 활성화 전략을 모색해 본다. 그리고 이와 함께 최근 야기되고 있는 각종 법적 문제점을 규명하고 대안을 발굴하는 방안도 함께 모색해 본다.

  • PDF

The Study of Mobile Convenient Payments According to the Type of High and Low Value Payment Intentions (모바일 간편 결제 서비스의 고액 결제 사용의도 집단과 소액 결제 사용의도 집단 간 차이 연구)

  • Kim, Kiho;Lee, Hyoung-Yong
    • The Journal of Information Systems
    • /
    • v.28 no.2
    • /
    • pp.181-200
    • /
    • 2019
  • Purpose In order to find out the influential factors to accept the mobile convenient payment service like Apple pay or Samsung Pay based on the Unified Theory of Acceptance and Use of Technology according to the type of High and Low value payments. Design/methodology/approach This research model is designed on the factors of Unified Theory of Acceptance and Use of Technology and simultaneously analysed, or performed the empirical analysis of the PLS-SEM(Partial Least Squares structural equation model) in order to forage for the association among mobile convenient payment service's features. Findings According to the empirical analysis consequence, this research confirmed that the adoption of mobile convenient payment services is influence by features on the basis of Unified Theory of Acceptance and Use of Technology, mobility, and trust. Also, this paper figure out that the behavior of an user acceptance of mobile convenient payment services according to the type of high and low value payments.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

User Review Analysis of Microtransactions in Freemium Massively Multiplayer Online Role-Playing Games Using Structural Topic Modeling (구조적 토픽모델링을 활용한 무료형 대규모 다중이용자 온라인 롤플레잉 게임의 소액결제에 대한 이용자 리뷰 분석)

  • Cheol Lee;Jae-Eun Chung
    • Human Ecology Research
    • /
    • v.61 no.3
    • /
    • pp.475-492
    • /
    • 2023
  • This study investigated player responses to microtransactions in freemium Massively multiplayer online roleplaying games (MMORPG), specifically focusing on the game LostArk using English language review data. To this end, structural topic modeling was employed and the following six microtransaction-relevant topics were identified: microtransactions, developer issues, real money trade (RMT), random number generator (RNG) upgrade system, game content, and collectibles & adventure. The first four topics were classified as being "not recommended". However, the proportions of microtransaction-related topics were relatively lower than the other topics. Additionally, this study did not extract keywords related to unfairness and unethical issues in previous microtransaction research. The last two topics, game content, and collectibles & adventure were "recommended" topics, indicating positive functions of microtransactions such as enhancing the game experience by purchasing virtual items. Moreover, it was found that players who do not engage in microtransactions can still be satisfied through continuous game content updates. Additionally, an examination of the interaction effect between time and recommendation status revealed that while the frequency with which the six microtransaction-related topics were mentioned increased over time in the reviews, the ratio of recommendations to non-recommendations varied differently. This study contributes to game-related research by revealing players' authentic opinions on microtransactions in freemium MMORPGs, thereby providing practical implications for game companies.

Study on security method for scenario-based smartphone vulnerability (시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구)

  • Lee, Jaeho;Son, Minwoo;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.835-844
    • /
    • 2018
  • Recently, as the number of smartphone users has been increasing worldwide, various services such as electronic payment, internet use, and financial settlement are being used as a smartphone. In addition, researches for home appliance control and automobile control using smartphone are conducted. As such, smartphone users can enjoy a more convenient life, but by hacking smartphones, tapping texts and conversations on smartphones, tracking location through spy apps, DDoS attacks using smartphones, and malicious apps When a message is received at a specific telephone number when using a micropayment, the corresponding text message is transmitted to a remote server, thereby increasing the risk of leakage of personal information and the like. Therefore, in this paper, we define the risk factors of the smartphone that are caused by the internal and external environmental, physical, contents (apps) of the smartphone through the smartphone that we use in real life, We propose a method to check vulnerability of smartphone security solution such as CC evaluation and the most effective response technique for each risk of smartphone by defining the technique.