• Title/Summary/Keyword: Mobile Payment System Service

Search Result 75, Processing Time 0.026 seconds

A Study on the Factors Influencing the Performance of FinTech Platform (핀테크 플랫폼의 성과에 영향을 미치는 요인 연구)

  • Xian, Feng Si;Um, Hyemi
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.2
    • /
    • pp.1-16
    • /
    • 2021
  • In recent years, as IT technologies such as cloud computing and mobile payment have evolved and Internet users have increased, the Internet financial market has become intelligent, mobile, and platformed. This study considers the impact of the psychological characteristics of platform systems and users on the performance of fintech platforms. The results of this study are as follows. Information quality affected trust and commitment, service quality affected commitment only, and system quality affected trust and commitment. The perceived risk affected trust and commitment, and the perceived benefit only affected trust and was shown to have an insignificant relationship with immersion. Trust has been shown to have a significant relationship with commitment, and both trust and commitment affected performance. In the validation of mediation effects, trust has shown a partially mediated effect between information quality, system quality, perceived risks, and perceived benefits and performance. There was no mediation effect between service quality and performance. Immersion has been shown to have a partial mediating effect between information quality, service quality, system quality, perceived risk and performance, and there is no mediating effect between perceived benefits and performance. This study showed what are the main factors that affect the performance of the fintech platform and will be used as a useful foundation for increasing the performance of the platform in the future.

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

Automatic Client Authentication Method in All-In-One Services (올인원 서비스에서 자동적인 고객 인증 기법)

  • Kim, Namyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.1-5
    • /
    • 2016
  • The all-in-one service, for example, mobile wallet enables users to have credit card, membership card, and coupon in one place. It has been one of important o2o services with offline payment. In order to take advantage of mobile commerce, it is necessary to authenticate clients automatically without entering their passwords. This paper proposes an automatic client authentication method in all-in-one service. At registration, clients receives and stores an authentication ticket from a company, which contains an user's identifier and password encrypted by company's symmetric key. Client can be authenticated by transferring authentication tickets to companies at service requests.

Study of NFC Library Execution in Real-time on Android 플랫폼 for NFC Application (NFC 전자 결제 시스템을 위한 Android NFC Library 실시간 실행 처리 연구)

  • Yoo, Hyun-Joo;Jung, Min-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.257-262
    • /
    • 2013
  • In mobile market which has been developed drastically, short distance mobile Near Field Communication is becoming the conversation topic. Google adopted this NFC technology to Android 플랫폼 for securing the leadership and many another countries including domestic companies are putting spurs to develop service and technology by connecting mobile carrier and the financial. Within this circumstance, most noticeable issue is securing stability of nfc application service. Android 플랫폼 is operating system of mobile device and also a software stack which is required limited hardware and immediate response. However, since its structural characteristic which is suitable for limited hardware, the response is not quite stable for real time process. That is, this paper researches by analyzing real time response of NFC related library provided from Android 플랫폼 and applying the result to NFC application for securing stable data process and response.

A Study on the Imporvement of Wireless Internet Service Tariff Scheme. (무선인터넷 데이터 서비스 과금 체계 개선 연구)

  • Min, Gyeong-Ju;Kim, Jeong-Ho;Park, Jin-Yang
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.1101-1110
    • /
    • 2004
  • In the first quarter of 2004, there were about 1 billion 348 million mobile phone users worldwide with a penetration rate of only 29%. Korea ranks among the highest in the use of mobile communication, having over 36 million mobile phone subscribers with a mobile phone penetration rate of 75% as of May 2004. Since the introduction of wireless Internet service in May 1999, the number of subscribers rose to 34.5 million with 95.3% of the total mobile phone subscribers using wireless Internet services in May 2004, largely due to continued investments by telecommunication service providers, improvement of mobile handsets (color and digital camera phones) and implementation of policies on mobile number portability. In the Korean wireless Internet market, there are many user complaints since the service providers are competing with each other through TV commercial sales and phone discounts rather than improving their call quality, services and billing systems. therefore there is a growing need to improve the billing systems through means such as the implementation of reasonable payment plans according to consumer use, development of a wireless Internet billing system that can predict the number of users and establishment of pricing standards for controlled data (head, tail, etc...) as well as menu information by testing the texts. multimedia, video and other types of content provided by the three major mobile communication companies. The purpose of this study is to promote wireless Internet services and protect user rights by proposing a reasonable way to improve the billing systems for wireless Internet services after conducting a comparative analysis of file size and billing data of each of the service providers through a verification test on a packet billing system for wireless Internet services.

  • PDF

An Application of Fuzzy AHP and TOPSIS Methodology for Ranking the Factors Influencing FinTech Adoption Intention: A Comparative Study of China and Korea (FinTech 채택 의도에 영향을 미치는 요소의 순위 결정을 위한 Fuzzy AHP 및 TOPSIS 방법론의 적용 : 중국과 한국의 비교 연구)

  • Mu, Hong-Lei;Lee, Young-Chan
    • Journal of Service Research and Studies
    • /
    • v.7 no.4
    • /
    • pp.51-68
    • /
    • 2017
  • Financial technology (FinTech) is an emerging financial service sector include innovations in financial literacy and investment, retail banking, education, and crypto-currencies like bitcoin. One of the crucial branch of financial technology-third-party payment (TPP) is undergoing rapid growth, with online/mobile systems replacing offline financial systems. System quality and user attitudes are key perceptions driving third-party payment usage, the importance of these perceptions, however, may be different with countries as users' thinking varies from country to country. Thus, the purpose of this study is to elaborate how factors differ from China to Korea by drawing on the unified theory of acceptance and use of technology (UTAUT2). Additionally, this study also aims to propose a multi-attribute evaluation of the third-party online payment system based on analytic hierarchy process (AHP), fuzzy sets and technique for order performance by similarity to ideal solution (TOPSIS), to examine the relative importance of the perceptions influencing new technology adoption intention. The results showed that the price value has the most significant influence on Chinese perceptions, while the perceived credibility has the most significant effect on Korean perceptions. Sub-criteria also performs different results to Chinese and Korean third-party online payment system.

Implementation of Authentication Algorithm for CDMA Digital Mobile Communication System (CDMA 디지털 이동통신 시스템의 인증 알고리즘 구현)

  • Kim, Bum-Sik;Shin, In-Chul
    • Journal of IKEEE
    • /
    • v.3 no.2 s.5
    • /
    • pp.204-214
    • /
    • 1999
  • The user authentication service can be used to prevent telecommunications piracy and to demand reliable payment from subscriber. Over the last few years several of the cryptographic systems being used by the IS-41 North American Mobile telephones have been broken. These algorithms included ORYX, CMEA and CAVE. The process of replacing these algorithms is already underway. In this paper we designed a hash function and applied it to the authentication algorithm of IS-95A authentication system. We also analyzed the randomness properties of designed algorithm using statistical analysis and simulated the validity of this algorithm using C programming language.

  • PDF

A Study on the Efficient e-Commerce Policies under the Smart Phone Environment (스마트융합환경에서의 전자상거래 정책)

  • Kim, Sun-Bae;Kim, Kyoung-Mook
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.125-133
    • /
    • 2012
  • The volume of electronic banking service via smart phone is expected to increase dramatically under smart convergence environment. Under such circumstances, the effort to establish the mobile electronic banking culture which took a major step forward from the conventional electronic commerce method is essential. It is necessary to standardize the mobile payment infrastructure in order to resolve the initiative conflicts between financial institutions and newly launched non-financial institutions. Furthermore, a domestic and international strategy is required as the number of NFC technology based smart phone transaction business is increased. As various types of business enter the electronic commerce field, efforts to resolve the dissatisfaction of the customers are critical. Additionally, security is one of the significant issue due to the conversation process to open-type operating system. This study surveyed and analyzed the current domestic and foreign status, the problems in Korea, and suggested an effective counterplan and policy, which could be helpful in governments' preparation for electronic commerce policy.

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments (이동통신 환경에서 임시 익명 아이디를 이용한 위치 불추적 서비스와 지불 프로토콜에 관한 연구)

  • 김순석;김성권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.78-92
    • /
    • 2003
  • In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.

Function verification and demonstration of mobile Gallery-Auction using NFC-based 2-Factor electronic payment (NFC 기반 2 Factor 전자결제를 이용한 모바일 갤러리-옥션의 기능 검증 및 시현)

  • Cha, Yoon Seok;Oh, Soo Hee;Kim, YongIl;Noh, SunKuk
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.24-30
    • /
    • 2018
  • Acquisition of the FIDO authentication technology in pursuit of improved security function of the NFC-based 2 factor electronic payment system enabled GenoTech Ch., Ltd. to develop its new service, Gallery-Auction, demoed at Daegu Exhibition. The demonstration was followed by the improvement requests in banner creation & installation, changes in UI, changes in order of operation, etc, which were taken into account for the succeeding update. During the second demonstration held at 'Art: Gwangju: 17,' it analyzed and visualized the number of visitors per hour there.