• Title/Summary/Keyword: Digital Credit Card

Search Result 47, Processing Time 0.022 seconds

A Study on Vulnerability Analysis and Countermeasure in Barcode Payment System (바코드 지불 결제 시스템 취약점 분석 및 대응방안 연구)

  • Lee, Jae Sik;Lee, Sang Hun;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.65-74
    • /
    • 2012
  • A barcode is a representative means of cognition. It is either printed on the package of a product or attached to it as a sticker. It is used for the fast cognition of a product at a store. It is considerably cheap to make a barcode. Also, it is possible to read it fast by using a barcode reader. Because of such convenience provided by the barcode, a new system using the barcode as a means of settling payments like a currency or a credit card has been developed. However, due to its characteristics, it is easy to reduplicate, forge or falsify a barcode easily. Therefore, this study focuses on the case of applying the system using barcodes as a means of settling payments without providing solutions for the potential weaknesses. Also, this study suggests various points to consider regarding the creation of safe barcodes as one of the related measures, while providing various methods using additional means of certification other than the one of using barcodes in addition to the way of applying complexity with barcode numbers. Throughout this study, it will be possible to safely establish and operate the payment-settlement system using barcodes.

Dual Signature Scheme to provide efficient message decryption (효율적인 메시지 복호화를 제공하는 이중 전자서명 방식)

  • 김근옥;남정현;김승주;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.129-136
    • /
    • 2003
  • A representative payment broker system is SET and one of its signature shcemes is a dual digital signature scheme. A dual digital signature scheme expose neither user's payment information(credit card number etc.) to merchandiser, nor user's order information to bank So it keeps user's Privacy safe. The digital signature scheme like this is being necessary as E-commerce is revitalized. But a dual digital signature of SET is not appropriate for wireless environments because it needs so many computations and communications. In this paper, we propose a signcryption scheme that generates a polynomial using a payment information for merchandiser and an order information for bank in order to reduce communications. We analyze the problem of existing signcryption schemes and dual digital signature schemes. Also we analyze the security properties of the proposed scheme.

An Empirical Study on User Acceptance of Micro e-Payment Systems : System Features, Transaction Cost, and Provider (소액 전자결제시스템 수용의지에 관한 실증연구 : 시스템 특성, 거래비용과 제공업체를 중심으로)

  • Chung, Suk-Kyun;Ryoo, Chang-Wan;Ku, Tae-Yong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.4
    • /
    • pp.130-137
    • /
    • 2010
  • This paper analyzes the main factors affecting user selection of a small-sum electronic payment system using survey data of 396 users. Several findings emerge. First, users consider three pillars and eight factors in adopting a new system : system features(stability, security, and flexibility), transaction cost(payment commission and settlement period), and financial capability of provider(stability of financial structure, risk management capability, and funding capability). Second, the stability of the financial structure of the system provider is the most important factor to user acceptance of a new e-payment system. Users tend to consider uncertainty risk more seriously than transaction cost. This reflects the reality that electronic payment system service industry has not fully fledged yet. Third, some moderating effects exist according to payment methods and business usages. As for payment methods, speedy settlement cycle for wired/wireless phone payment, system stability for credit card and account transfer payment, and security for advance payment means are crucial factors. As for business usages, the stability of financial structure for online game content, system stability for music and video content, proxy payment commission for e-learning content, flexibility of the payment system for digital adult content, and security for public services are decisive ones.

Study of Hacking Attacks Secure Payment(ISP) with Smishing (스미싱을 이용한 안전결제(ISP) 해킹 공격 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.267-270
    • /
    • 2013
  • Hacking damage is increasing year by year in the Internet payment service credit card applying the digital signature method of PKI-based first domestic, secure payment, was 180 million won in 2012. Revenues have soared for phishing that Smishing using smartphone after entering 2013. Hacking accident to the secure payment system using Smishing has occurred took over personal information and financial direct damage. In this paper, we analyzed for Smishing, to prevent the damage of secure payment using Smishing to study the hacking attack of secure payment. In addition, it would be studies to allow through the smartphone, online payment safer and more convenient.

  • PDF

A Study on Website Operators Privacy Breaches through Hacking Forensic Research (통신사 홈페이지 해킹을 통한 개인정보유출 사고 포렌식 연구)

  • Noh, Jung-Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.257-260
    • /
    • 2014
  • Digital Forensics in the event of an accident, the system restore files and the only way to find evidence KT Website hacking happening now, credit card companies, and leakage of personal information by three recent spills occurred, such as Skin Food Home Up Customer Information hackers to find these crimes only means as well. This study attempted to bypass the KT website hacking attacks utilizing automated programs hacking programs, and if you try to experiment on whether any information has been disclosed and if so what home attacked forensics evidence for hackers to locate the can make a report is described.

  • PDF

How Do Children Interact with Phishing Attacks?

  • Alwanain, Mohammed I
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.127-133
    • /
    • 2021
  • Today, phishing attacks represent one of the biggest security threats targeting users of the digital world. They consist of an attempt to steal sensitive information, such as a user's identity or credit and debit card details, using various methods that include fake emails, fake websites, and fake social media messages. Protecting the user's security and privacy therefore becomes complex, especially when those users are children. Currently, children are participating in Internet activity more frequently than ever before. This activity includes, for example, online gaming, communication, and schoolwork. However, children tend to have a less well-developed knowledge of privacy and security concepts, compared to adults. Consequently, they often become victims of cybercrime. In this paper, the effects of security awareness on users who are children are investigated, looking at their ability to detect phishing attacks in social media. In this approach, two Experiments were conducted to evaluate the effects of security awareness on WhatsApp application users in their daily communication. The results of the Experiments revealed that phishing awareness training has a significant positive effect on the ability of children using WhatsApp to identify phishing messages and thereby avoid attacks.

Evaluating the User Experience between Generations of Easy Payment Service -Focusing on KakaoPay and PAYCO- (간편 결제 서비스의 세대 간 사용자 경험 평가 - 카카오페이와 페이코 중심으로 -)

  • Kim, So-Young;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.453-459
    • /
    • 2020
  • This research aims to evaluate how each generation experiences easy payment services. Recently, the easy payment service business has been on an upward trajectory and pin-tech companies have introduced various types of products. In this regard, it becomes crucial to understand differences among generations in terms of using those services due to their accessibility and serviceability. Based on the statistical analysis of surveys and in-depth interviews based on Peter Morville's Honeycomb model, this study suggests four ways to improve this payment service. The analysis indicates that those who are older tend to use easy payment services provided by their credit card companies or services which they frequently have already used. Findings of this analysis are expected to find the relationship between ages and payment applications.

Service Design for Utilizing Government Information -Focusing on the Case of Gov3.0 Design Group for East North Statistics- (정부 정보의 활용을 위한 서비스디자인 -동북지방통계청의 국민디자인단 사례를 중심으로-)

  • Lee, Yun-Ju;Baek, Su-hyun;Kim, Sun-Ah
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.335-341
    • /
    • 2018
  • This study is to innovate policy service development by utilizing beneficiary - centered service design to public information and public data and services that citizens can experience. The Gov 3.0 Design Group operated by the Dongbuk Regional Bureau of Statistics in Daegu in 2015, proposed a 'start-up decision support service' for pre-founders, using data mining on the GIS spatial information held by the Statistical Office and real-time settlement information of credit card companies. For this, service design process and methodology were adopted and participation of various stakeholders. This study suggests that national design activity based on service design is effective in transforming public service based on government information disclosure. It is also worthwhile as an approach that can be considered when the government wants to release or open information or public data in useful form to the public.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Effect of the leader's behavioral integrity on the trust in leaders and voice behavior of the Members -moderating effect of phychological safety- (상사의 언행일치가 상사신뢰와 구성원의 발언행동에 미치는 영향 -심리적 안전감의 조절효과-)

  • Han, Jin-Hwan
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.235-245
    • /
    • 2022
  • This study confirmed the effects of leaders' behavioral integrity on organizational members' voice behavior. It verified whether trust in leaders mediates behavioral integrity and voice behavior and ascertained the moderating effect of members' psychological safety on trust in leaders and members' voice behavior through leaders' behavioral integrity. It targeted organizational members in the service industry, including insurance, securities, banks, consulting, and credit card companies, with a questionnaire survey carried out with 424 response copies. The study results confirmed a significant and positive effect of leaders' behavioral integrity on trust in leaders and voice behaviors. Second, trust in leaders was found to mediate between leaders' behavioral integrity and members' voice behavior. Third, members' psychological safety had a moderating effect on trust in leaders and members' voice behavior. When psychological safety was higher than average, there was a moderated mediating effect of psychological safety in the behavioral integrity on voice behavior with trust mediation in leaders. Therefore, this study has significance in that it was determined that trust in leaders and the psychological safety of the members are essential for leaders' behavioral integrity to enhance members' voice behavior.