• Title/Summary/Keyword: Digital Wallet

Search Result 17, Processing Time 0.025 seconds

The development model of PT Visionet Internasional (OVO) in Indonesia

  • Yuhang Xia;Yuming Liu;Myeongcheol Choi;Chuijie Meng;Haanearl Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.2
    • /
    • pp.125-131
    • /
    • 2023
  • OVO is a digital platform that provides simple payments and smart financial services, as well as one of the largest digital payment platforms in Indonesia. It has wide coverage and security when making payments, and supports multiple settlement currencies. The purpose of this study is to explore the history, business model, and future strategic direction of OVO, an Indonesian e-wallet. To date, OVO has built its own mobile payment ecosystem covering a wide range of consumer scenarios including e-commerce, travel, offline shopping and finance. And it supports mobile banking, online banking, debit cards or selected partner merchants. Its three largest transaction categories are in the transportation, retail and e-commerce sectors. With over 110 million consumers and 1.3 million merchant users, it is one of the dominant e-wallets in Indonesian market and has become the country's e-payment market leader. OVO eWallet's 'One Card' model offers convenience and choice for users, thus contributing to the rapid growth of OVO eWallet. And OVO eWallet competes fiercely with other competitors, but OVO eWallet continues to grow in terms of the number of users and market share. Finally, this study analyzes the strategic goals and plans of OVO eWallet, predicts its future direction. OVO eWallet has a huge success, but there are still competition and challenges to face.

A study on QR code-based backup methods to strengthen the security of Cold wallet Purse (콜드월렛 지갑 보안 강화를 위한 QR코드 기반 백업 방안에 대한 연구)

  • Byoung Hoon Choi;JinYong Lee;Nam Hyun Koh;Sam Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.21-26
    • /
    • 2023
  • Recently, cryptocurrencies such as Ethereum and Bitcoin, which are called digital assets, Cryptocurrency has completely different characteristics from real assets and must be handled carefully and safely. But The disadvantage of digital assets is that anyone who knows the private key of the wallet can easily steal the digital assets. If the seed card is lost, stolen, or exposed when used, you can use the wallet by recovering the private key using the seed card acquired by someone else. In this paper We aim to safely protect encrypted assets by using QR codes when providing mnemonic words needed to create seed cards.

Status of Digital Wallet Technologies and Design of Next Generation Digital Wallet (전자지갑의 구조 현황과 차세대 구조 설계)

  • 임규건;이재규
    • Proceedings of the CALSEC Conference
    • /
    • 1998.10b
    • /
    • pp.391-401
    • /
    • 1998
  • 인터넷의 대중화로 전자상거래 시대를 맞이하게 되었다. 현재 전자상거래용 구매자의 전자지갑은 주로 상품의 입수를 위한 대금지불 수단으로 이용되고 있다. 본 논문에서는 현재 발표된 전자상거래용 전자지갑의 현황을 분석하고 그 구조를 파악하여, 이를 토대로 전자상거래 시대에 있어서의 구매자 입장에서의 차세대 전자지갑의 모델을 디자인하고자 한다. 차세대 전자지갑은 개방형 구조이며, 사용자의 의사결정에 도움을 주어야 하고, 개인 Profile 관리기능, 장바구니 기능, 다양한 지불수단제공, Workflow, ERP시스템과의 연계, 편리한 인증관리 기능 등을 가져야 할 것이다. 본 논문에서는 이러한 차세대 전자지갑의 정의, 특징, 기능, 구조 등에 대해서 논할 것이다.

  • PDF

The Mobile Digital ID Wallet based on LTE/SAE for 4G Networks (4G 네트워크를 위한 LTE/SAE 기반의 모바일 전자ID지갑)

  • Jung, Yun-Seon;Lim, Sun-Hee;Yi, Ok-Yeon;Lee, Sang-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10C
    • /
    • pp.764-777
    • /
    • 2008
  • In 4G environments, which is the next generation technology for mobile network, it is forecasted that the wireless Internet using a mobile devices such as a mobile phone, PDA will increase because of expansion of Internet and integration of heterogeneous networks. Therefore, we need a Digital ID management technology that can prevent illegal uses and manage private information efficiently in wired and wireless environments. In this paper, we analyze various Digital ID management technologies, and then define requirements of user-centric Digital ID management technology. In addition, we newly propose the authentication mechanism for mobile applications in LTE/SAE network. Finally, we propose the mobile Digital ID Wallet mechanism suitable for 4G environments.

A Digital ID Wallet User-oriented Mechanism in a Mobile Environment (모바일 환경에서 사용자 중심의 전자ID지갑 운용 메커니즘)

  • Song, Dong-Ho;Lim, Sun-Hee;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.57-64
    • /
    • 2007
  • As a ubiquitous environment approaches and the use of the wireless Internet using the mobile terminals is on the increase. Therefore, the users have to undergo the inconvenience of repeatedly input the same information for the user registration and the ID certification. The information the users have to put in to register in on-line services range from the basic personal information to the more other private information such as financial information. Accordingly the user can be in control of users personal information and safely manage the information by conveniently selecting from the Digital ID Wallet the Ticket that holds various information including the basic, financial or payment certification-related information. Consequently, we propose a digital identity management mechanism to control one's personal information in a mobile environment.

An Empirical Study on the Revitalization of O2O: A Unified View of Offline Channel and Mobile Channel (O2O 서비스 활성화 방안에 대한 실증 연구: 오프라인 채널과 모바일 채널의 통합적 관점에서)

  • Kim, Byoungsoo
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.115-123
    • /
    • 2018
  • This study explores unified service experience to boost O2O services. Previous studies on service management and marketing only focused on customer experience in offline stores, while prior works on information systems looked only at the experience of services in mobile applications. In this vein, this study took into accounts the characteristics of offline stores and the benefits of their mobile applications. Moreover, the final dependent variable was share of wallet to measure customer's expenditure within the category. The theoretical model was tested based on 219 consumers who frequently visit Starbucks and use its mobile application. PLS method was applied to analysis the research model and hypotheses. The analysis results showed that customer satisfaction about offline store is not significantly related to share of wallet, while satisfaction about mobile application plays a significant role in enhancing share of wallet. Hedonic and social benefits were found to have significant effects on satisfaction about mobile application. The analysis results help establish service marketing and strategies to enhance the unified customer experience of O2O service.

NBAS: NFT-based Bluetooth Device Authentication System (NBAS: NFT를 활용한 블루투스 장치 인증시스템)

  • Hwang, Seong-Uk;Son, Sung-Moo;Chung, Sung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.793-801
    • /
    • 2022
  • Most Bluetooth devices are commonly used in various ways these days, but they can be often lost due to small-size devices. However, most Bluetooth protocol do not provide authentication functions to legitimate owners, and thus someone who obtains the lost Bluetooth device can easily connect to their smart devices to use it. In this paper, we propose NBAS can authenticates legitimate owners using NFT on lossy Bluetooth devices.NBAS generates a digital wallet on the blockchain using the decentralized network Ethereum blockchain and facilitating the MAC address of the Bluetooth device in the digital wallet. The owner of the wallet uses a private key to certify the Bluetooth device using NFT. The initial pairing time of NBAS was 10.25 sec, but the reconnection time was 0.007 sec similar to the conventional method, and the pairing rejection time for unapproved users was 1.58 sec on average. Therefore, the proposed NBAS effectively shows the device authentication over the conventional Bluetooth.

A Study on the Digital Forensics Artifacts Collection and Analysis of Browser Extension-Based Crypto Wallet (브라우저 익스텐션 기반 암호화폐 지갑의 디지털 포렌식 아티팩트 수집 및 분석 연구)

  • Ju-eun Kim;Seung-hee Seo;Beong-jin Seok;Heoyn-su Byun;Chang-hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.471-485
    • /
    • 2023
  • Recently, due to the nature of blockchain that guarantees users' anonymity, more and more cases are being exploited for crimes such as illegal transactions. However, cryptocurrency is protected in cryptocurrency wallets, making it difficult to recover criminal funds. Therefore, this study acquires artifacts from the data and memory area of a local PC based on user behavior from four browser extension wallets (Metamask, Binance, Phantom, and Kaikas) to track and retrieve cryptocurrencies used in crime, and analyzes how to use them from a digital forensics perspective. As a result of the analysis, the type of wallet and cryptocurrency used by the suspect was confirmed through the API name obtained from the browser's cache data, and the URL and wallet address used for the remittance transaction were obtained. We also identified Client IDs that could identify devices used in cookie data, and confirmed that mnemonic code could be obtained from memory. Additionally, we propose an algorithm to measure the persistence of obtainable mnemonic code and automate acquisition.

RSA Based Digital Signature for Secure Authentication

  • Allayear, Shaikh Muhammad;Park, Sung-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1083-1086
    • /
    • 2005
  • Now these days, many technical concepts and tools have been developed in the cryptographic field. Most digital signature schemes used in practice, such as RSA or DSA, have an important role in information privacy and secure authentication for perfect user. A clearly advantage of such schemes over with security proven relative to such common cryptographic assumptions, is their efficiency: as a result of their relative weak requirements regarding computation, bandwidth and storage, these scheme have so far beaten proven secure schemes in practice. Our aim is to contribute to bridge the gap that exists between the theory and practice of digital signature schemes. In this paper we present a digital signature that ensures information privacy. More precisely, under an appropriate assumption about RSA, the scheme is proven to be existentially forgeable under adaptively chosen message attacks. This mechanism can be applied to smart cards or E-Wallet for maintaining secure authentication for user’s information privacy.

  • PDF

A Private Key Management Guideline For Secure Blockchain-Based Services (안전한 블록체인 기반 서비스를 위한 개인키 관리 가이드라인)

  • Noh, Siwan;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.899-914
    • /
    • 2022
  • A blockchain-based decentralized service can offer reliable services without the centralized server by operating the system based on the consensus among byzantine participants. Participants can interact with the blockchain network through a digital signature mechanism but the private key management issue remains unresolved. NIST SP800-57 provides a key-management guidance but this guidance is not appropriate for blockchain-based services because it does not consider a decentralized environment. In this paper, we define the core functions of the blockchain wallet application for private key management and present security protections according to NIST SP800-57, as well as related techniques to satisfy them. Finally, we propose the private key management guideline for secure blockchain-based decentralized services.