• Title/Summary/Keyword: 전자 지불

Search Result 360, Processing Time 0.023 seconds

Electronic Cash Schemes for EFT Using Smart Card (스마트카드를 이용한 새로운 전자현금 방식)

  • Youm, Heung-Youl;Lee, Seok-Lae;Rhee Man-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.5 no.1
    • /
    • pp.37-50
    • /
    • 1995
  • The smart card with the cryptography and VLSI technologies makes it possible to implement the electronic cash easily. A number of electronic each schemes have been proposed by many cryptographic researchers. In this paper, we propose a practical electronic cash system, using blind digital signature scheme. Schnorr's authentication scheme based on the discrete logarithm problem, and the hierarchical cash tree based on two one-way hash functions for dividable payment. Thisf electronic cash scheme has such properties as privacy of the payment, off-line payment, non-reuseability of cash, transferability of cash to another customer, and dividable payment of cash. This electronic cash protocol is well suited for implementing in smart card.

전자금융 침해사고 예방 및 대응 강화 방안

  • Lee, Jung-Ho
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.1-20
    • /
    • 2008
  • 편리한 금융거래 수단으로써 인터넷뱅킹을 포함한 전자금융 서비스가 생활화 되었으며 그 중요성 또한 갈수록 증가하고 있다. 이에 대한 부작용으로서 사용자의 실수나 금융기관, 쇼핑몰, 포털 등의 해킹을 통한 전자금융 접근매체의 유출, 비정상적인 지불결제나 인터넷뱅킹 이체 사고 등 침해사고 또한 함께 증가하고 있다. 금융권은 금융감독원을 중심으로 전자금융 종합보안 대책 수립(2005년) 및 전자금융거래법 시행(2007년) 등을 통해 고객 PC의 해킹방지를 위한 다양한 보안프로그램 제공 의무화, 보안등급에 따른 이체한도 차등화, 금융권 통합 OTP 인증체계 구축 등 전자금융 침해사고 예방을 위한 적극적인 노력을 기울여오고 있으나, 최근 들어 피싱/파밍 등 신종 사이버사기 기법이나 해외의 전문 해커에 의해 개발된 고도의 지능화된 해킹툴이 사용되어 보안프로그램을 무력화시킨 후 고객정보를 유출해가거나 일반 포털사이트, 웹하드, 웹메일 등의 해킹을 통해 인터넷 사이트에 등록된 고객의 인터넷뱅킹 접근 매체를 유출하여 인터넷뱅킹 침해 사고를 일으키는 등의 신종 침해사고를 완벽히 차단하지는 못하고 있어, 더욱 강력한 전자금융 침해사고 예방 통제 방안의 수립과 함께 침해사고 발생 시 원인 파악 및 범인 검거를 위한 역추적 시스템의 구축 등 기존 보안체계를 대폭 강화할 필요성이 발생하고 있다. 본 연구에서는 시중 은행의 인터넷뱅킹 침해사고 발생 현황 조사를 중심으로 최근 발생한 전자금융 침해사고의 추이분석, 침해사고 주요 원인과 기존 대응 체계의 현황, 한계점 등을 파악하였다. 그리고 전자금융 침해사고의 효과적인 예방 및 대응 강화 방안으로서 사용자 관점에서 공인인증서를 중심으로 한 전자금융 접근매체의 관리 강화 방안을 제안하였으며, 전자금융 서비스를 제공하는 금융 기관 관점에서 효과적인 전자금융거래 로깅 및 역추적 시스템의 구축 및 전체 금융기관과 감독기관 간의 유기적인 공조를 기반으로 한 침해사고 공동 대응체계의 구축 및 운영을 위한 시스템의 구성 방법, 운영 프로세스, 관련 법률의 검토 및 대응 방법 등을 제안하였다.

A Study on DRM Model Using Electronic Cash System (전자화폐 시스템을 적용한 DRM 모델에 관한 연구)

  • Lee, Deok-Gyu;Oh, Hyung-Geun;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1107-1119
    • /
    • 2004
  • There is Electronic-cash system as important payment means in Electronic-commerce and the requirement of electronic cash is independence, transferability, divisibility etc. This is important requirement in DRM to provide contents as a same requirement to contents. Because contents itself can see that requirement of Electronic-cash can be transferred the control of to contents requirement as monetary concept. Can apply equally in reproduction and copy for contents, anonymity user's access etc, and several relations. In this paper, wish to put by value that is equal about Electronic-cash and contents, and apply concept of Electronic-cash through this and present DRM model after examine requirement of Electronic-cash and DRM's requirement. Concept used in this paper left copy use authority to use hierarchic tree structure and endowed anonymity for contents and anonymity about user for anonymous user. Finally, examines and compares and analyzes proposed existing methods.

  • PDF

A Study on the authentication scheme for Security of Wireless Internet (무선 인터넷에서 보안을 위한 인증방안에 관한 연구)

  • 최용식;강찬희;신승호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.11
    • /
    • pp.87-91
    • /
    • 2004
  • The continuing development of the information technology industry and wireless networking has increased the use of mobile device, which provides both portability and mobility. As follows, demands for extended services within the wireless Internet are increasing rapidly. Because it still in its initial stages of development, the wireless Internet presents continuing problems in security and limitations in the content of services. Furthermore, most mobile equipment utilizes the touch pad input method. This input method is inconvenient when a user needs to input a long sentence. This has led to the more convenient development of image selection by using a pen mouse. In order to provide security under these conditions, a HASH code may be used to transmit an array of information and input values, created by the image input at the early stages. Thus, authentication and key exchange are completed securely. Messages are encoded and transmitted, preventing both information drain by insiders and interference from outside.

Case study on the Applications of Simulation on ITS - Focused on Management of Tollgate and Incident in Freeway - (지능형교통시스템에서의 시뮬레이션 모델 개발연구 - 고속도로 요금소 및 유고관리 적용사례를 중심으로 -)

  • Kim, Ho-Jung;Jo, Yong-Seong;Baek, Seung-Geol;An, Byeong-Ha
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.1040-1046
    • /
    • 2005
  • 지능형교통시스템(Intelligent Transportation System: ITS)의 기술발전에 따라 고속도로 상에도 각종 검지 센서가 설치되고 교통정보가 다양한 형태로 제공되고 있으며, 전자요금징수시스템(Electronic Toll Collection System: ETCS) 또한 시범운영단계를 마치고 모든 고속도로를 대상으로 확대적용을 준비 중에 있다. 본 논문에서는 ITS 관련시스템 중 고속도로를 대상으로 적용되는 전자요금징수시스템과 유고관리 시스템을 대상으로 수행되었던 시뮬레이션 사례를 소개하고, ITS 분야에서의 시뮬레이션 적용 필요성에 대해서 논의하고자 한다. 전자요금징수시스템을 대상으로 한 시뮬레이션의 경우 현재 시범운영중인 영업소를 대상으로 향후 다양한 요금지불수단 도입에 따른 효과적인 영업소 운영방안을 도출하는 것을 목적으로 개발되었으며, 운전자들의 영업소 차로선택모형 등에 대한 사전연구를 통하여 모델링에 반영하였다. 또한, 고속도로 유고관리시스템의 경우 사고 직후 사고영향에 대한 실시간 시뮬레이션을 수행하여 지체지속시간 및 지체영향구간을 예측하여, 향후 교통정보제공에 활용하는 것을 목적으로 개발되었다. 개발된 시뮬레이션 모델을 통하여 각종운영방안에 대한 평가를 수행하였으며, 실제 유고상황에서의 검지자료와의 비교를 통하여 성능평가를 수행하였다.

  • PDF

Analysis Using Petri Nets for SKP-based SET Protocol (SKP기반 SET프로토콜의 Petri Nets를 이용한 분석)

  • Song, Yu-Jin;Seo, Mi-Gyeong;Lee, Jong-Geun
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.621-628
    • /
    • 2001
  • SET is one of the useful protocol for credit payment in the Electronic market. Since, the delivery problem is conformed to delivery cooperation not payment problem, the classic SET protocol didn\`t consider about the certification of delivery. But the environment of electronic market be changed to manage the sold, delivery and payment etc.. In this paper, based on this consider, we propose a new SET protocol which has an function to verify the delivery based on SKP and verify it after analyzed by Petri nets. Specially, we consider SKP between Customer, Merchant, and Acquirer for improve the verify function.

  • PDF

A Secure Agent of Integrated Administration System for the Electronic Commerce (전자상거래 서비스를 위한 통합 관리 시스템의 보안 에이전트)

  • 서대희;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.6
    • /
    • pp.674-682
    • /
    • 2002
  • Nowadays economic and commercial businesses have been increased because of the Internet. As a result of this, electronic commerce is becoming one of the most Interesting topic of discussion. Electronic commerce is equal to a real market, only the place of business is the imaginary space supported by the Internet. There are a few conditions to consider, making electronic commerce work safely. The electronic commerce should be connected by a substantial system and an on-line Protocol. There are some conditions needed for information security, authentication, and payment by electronic currency etc. Although there are many kinds of existing systems, which create services successfully, further research for security is required. Therefore, this paper suggests an authenticated Agent management, which offers more convenience and security than before. Also, this paper shows many authenticated methods for a management system. An Agent that is one of interesting things to study can handle information problems and works related to electronic commerce.

  • PDF

A Study on an Efficient e-business System based on .NET (.NET을 기반으로 한 효율적인 전자상거래 시스템에 관한 연구)

  • 나윤지
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.4
    • /
    • pp.51-58
    • /
    • 2002
  • A electronic business user is increased rapidly, and load of a electronic business system and network traffic are increased rapidly. Also, the data which included an audio and video is increasing in a electronic business system gradually, and According to this an Internet service businessman is paying for an enormous cost for management of a system and a maintenance of a line. It is brought a delay of a response speed about a service wish of a Web customer this system load and network traffic raise. Also, this decreases customer satisfaction and becomes an important factor to decrease competitive power of an e-business enterprise. In this study, we proposed the electronic business system that improved answer delay time about a Web customer in an e-business system based on the .net which was a the latest version of Microsoft company, and analyzed performance of a proposal system through an experiment. In the experiment result, the system that proposed it can have response time to have been improved and fast adaptability about various requests of a Web customer. Also, in a proposed system, a decrease gets a delay of a response speed to occur because of the multiple user done.

  • PDF

User Evaluation to the Factors Affecting the Traditional Functions of Academic Libraries (대학도서관의 전통적 기능에 대한 이용자 평가)

  • Park, Il-Jong;Shin, Sang-Heun
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.1 s.59
    • /
    • pp.243-259
    • /
    • 2006
  • This paper examines the values of various library functions according to users' points of view. To execute this study, the several 'circumstance', related variables and 'condition' variables that lead to factors or functions of academic libraries were measured. Analysis was carried out in three stages. In the first, factor analysis was used on the three multi variable dimensions to ensure that the groups of variables loaded significantly and uniquely on the respective dimensions. The second phase of analysis involved the use of binary logistic regression analysis to complete research models. In the third phase, t-test was used to identify significant differences in the independent variables for additional explanation of the models. Books, competition & effectiveness and fee verses free (fee-free hereafter) are the three main factors that distinguish not only the purpose of using an academic library but also the degree of influence on knowledge, information and library facilities for the users. In addition, the fee-free factor related to digital library facilities was also uncovered.

Households' willingness to pay for the residential electricity use (주택용 전력에 대한 지불의사액 분석)

  • Lim, Seul-Ye;Kim, Ho-Young;Yoo, Seung-Hoon
    • Journal of Energy Engineering
    • /
    • v.22 no.2
    • /
    • pp.141-147
    • /
    • 2013
  • Electricity is a basis for human existence. This paper attempts to analyze the households' willingness to pay (WTP) for the residential electricity use. The WTP for the residential electricity use can be defined as the sum of actual price of and additional WTP for it. The former is easily observed in the market, but the second is not observed and thus should be obtained through a WTP survey of households. To this end, this study conducted a survey of randomly selected 1,000 households in Korea in November 2010. The results indicate that the mean additional WTP for the residential electricity use was estimated to be KRW 11.24 per kWh. Given that the average price of residential electricity was KRW 98.07 per kWh at the time of the survey, the economic benefit from the residential electricity use was computed as KRW 109.31 per kWh. This information can be compared with the cost involved in the supply of one kWh of residential electricity.