• Title/Summary/Keyword: PG(Payment gateway)

Search Result 8, Processing Time 0.019 seconds

An Empirical Study of Non-PG Based Mobile Payment Service (NonPG 기반 모바일 결제서비스에 관한 실증적 연구)

  • Lee, Chanhee;Bok, Joonghyo
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.13-19
    • /
    • 2016
  • Recently one of the main keywords representing of Korea is O2O The O2O market is an intersection of online commerce and offline commerce. The spread and popularization of smartphones transform payment market environment from online-based(PC) to mobile-based(Smartphone) which enable payment service expanses to on/off-line both markets. Due to this movement, data security is mo vulnerable than online-based payment service but the preference of serviceability, security threat becomes bigger.O2O service expansion is now at the stage of beginning with the limited influence, but could affect to the establishment of on/off line payment system of VAN and PG in the future. However, in the moment, the motivation to destruct the system is still weak. In this research, the possibility of Non-PG mobile payment service was suggested as a new way of mobile payment service by using PG. With suggestion, it could eliminate the issues of payment method beforehand and provide low fee to merchants.

Simple Credit Card Payment Protocols Based on SSL and Passwords (SSL과 패스워드 기반의 신용카드 간편결제 프로토콜)

  • Kim, Seon Beom;Kim, Min Gyu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.563-572
    • /
    • 2016
  • Recently, a plenty of credit card payment protocols have been proposed in Korea. Several features of proposed protocols include: using passwords for user authentication in stead of official certificate for authenticity, and no need to download additional security module via ActiveX into user's devices. In this paper, we suggest two new credit card payment protocols that use both SSL(Security Socket Layer) as a standardized secure transaction protocol and password authentication to perform online shopping and payment. The first one is for the case where online shopping mall is different from PG(Payment Gateway) and can be compared to PayPal-based payment methods, and the second one is for the case where online shopping mall is the same as PG and thus can be compared to Amazon-like methods. Two proposed protocols do not require users to perform any pre-registration process which is separate from an underlying shopping process, instead users can perform both shopping and payment into a single process in a convenient way. Also, users are asked to input a distinct payment password, which increases the level of security in the payment protocols. We believe that two proposed protocols can help readers to better understand the recent payment protocols that are suggested by various vendors, and to analyze the security of their payment protocols.

An Exploratory Study on the Activation of Fintech Payment through the Relation Analysis among Business Operators (사업자간 관계 분석을 통한 핀테크 결제 활성화 방안 연구)

  • Gil, Jin-Se;Kim, Eun-Jin;Kim, So-Dam;Kim, Hee-Woong
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.137-161
    • /
    • 2017
  • Purpose In this study, the difficulties were analyzed with the field data from two domestic and interview with industry practitioners. And We presented initiatives with feasibilities to overcome the hurdle for progress of easy-payment. Design/methodology/approach We collected industry data from two domestic credit card companies and analyzed that data to prove 7 proposition in detail. Also We had interview data from industry practitioners who can understand the relationship between stakeholders. For this analysis, we used the causal loop diagram to find activation inhibition and activation elements about easy-payment. Findings The Fintech easy-payment industry has been organically involved in various partners such as customers, merchants, PGs, VANs, credit card issuers, banks, payment providers, terminal manufacturers, etc. and they have been competing against each other to hold leader position in the easy-payment market. Because of the reasons, the easy-payment does not spread out as much as it expects. In this study, the difficulties were analyzed with the field data and interview with industry practitioners and proposed five initiatives with feasibilities to overcome the hurdle for progress of easy-payment. This study helps to understand current situation and issues of Fintech and easy-payment for related research in future.

Fraud Detection System in Mobile Payment Service Using Data Mining (모바일 결제 환경에서의 데이터마이닝을 이용한 이상거래 탐지 시스템)

  • Han, Hee Chan;Kim, Hana;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1527-1537
    • /
    • 2016
  • As increasing of smartphone penetration over the world, various mobile payment services have been emerged and fraud transactions have drastically increased. Although many financial companies have deployed security solutions to detect fraud transactions in on/off-line environment, mobile payment services still lack fraud detection solutions and researches. The mobile payment is mainly comprised of micro-payments and payment environment is different from other payments, so mobile-specialized fraud detection is needed. In this paper, we propose a FDS (Fraud Detection System) based on data mining for mobile payment services. The method of this paper is applied to the real data provided by a PG (Payment Gateway) company in Korea. The proposed FDS consists of two phases; (1) the first phase is focused on classifying transactions at high speed (2) the second is designed to detect abnormal transactions with high accuracy. We could detect 13 transactions per second with 93% accuracy rate.

Open Markets and FDS(Fraud Detection System) (오픈마켓과 부당거래 방지 시스템)

  • Yoo, Soon-Duck;Kim, Jung-Ihl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.113-130
    • /
    • 2011
  • Due to the development of information and communication technology, the global influence on politics, economics, society, and culture has grown. A major example of this impact on the economic sector is the growth of e-commerce, which increases both the speed and efficiency of businesses. In light of these new developments, businesses need to shift away from the misconception that information overwhelms to embrace the enhanced competitiveness that e-commerce provides. However, concern about fraudulent transactions through e-commerce is pertinent because of the loss in both critical revenue and consumer confidence in open markets. Current solutions for fraudulent transactions include real-time monitoring and processing, payment pending, and confirmation through SMS, E-mail, and other wired means. Our research focuses on the management of Fraud Detection Systems (FDS) to safeguard online electronic payment systems. With effective implementation of our research we hope to foster an honorable online trading culture and protect consumers. Future comparative research in domestic and abroad markets would provide further insight into preventing fraudulent transactions.

Draft Design of 2-Factor Authentication Technique for NFC-based Security-enriched Electronic Payment System (보안 강화를 위한 NFC 기반 전자결제 시스템의 2 팩터 인증 기술의 초안 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.2
    • /
    • pp.77-83
    • /
    • 2016
  • Today, the great revolution in all financial industrial such as bank have been progressing through the utilization of IT technology actively, it is called the fintech. In this paper, we draw the draft design of NFC-based electronic payment and coupon system using FIDO framework to apply the 2 factor authentication technique for strength security. In detailed, we will study that the terminal device in front-end will be applied the 2 factor authentication and electric signature, and cloud-based payment gateway in back-end will be applied malicious code detection technique of distributed avoidance type.

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF

A Study on the Critical Success Factors of Social Commerce through the Analysis of the Perception Gap between the Service Providers and the Users: Focused on Ticket Monster in Korea (서비스제공자와 사용자의 인식차이 분석을 통한 소셜커머스 핵심성공요인에 대한 연구: 한국의 티켓몬스터 중심으로)

  • Kim, Il Jung;Lee, Dae Chul;Lim, Gyoo Gun
    • Asia pacific journal of information systems
    • /
    • v.24 no.2
    • /
    • pp.211-232
    • /
    • 2014
  • Recently, there is a growing interest toward social commerce using SNS(Social Networking Service), and the size of its market is also expanding due to popularization of smart phones, tablet PCs and other smart devices. Accordingly, various studies have been attempted but it is shown that most of the previous studies have been conducted from perspectives of the users. The purpose of this study is to derive user-centered CSF(Critical Success Factor) of social commerce from the previous studies and analyze the CSF perception gap between social commerce service providers and users. The CSF perception gap between two groups shows that there is a difference between ideal images the service providers hope for and the actual image the service users have on social commerce companies. This study provides effective improvement directions for social commerce companies by presenting current business problems and its solution plans. For this, This study selected Korea's representative social commerce business Ticket Monster, which is dominant in sales and staff size together with its excellent funding power through M&A by stock exchange with the US social commerce business Living Social with Amazon.com as a shareholder in August, 2011, as a target group of social commerce service provider. we have gathered questionnaires from both service providers and the users from October 22, 2012 until October 31, 2012 to conduct an empirical analysis. We surveyed 160 service providers of Ticket Monster We also surveyed 160 social commerce users who have experienced in using Ticket Monster service. Out of 320 surveys, 20 questionaries which were unfit or undependable were discarded. Consequently the remaining 300(service provider 150, user 150)were used for this empirical study. The statistics were analyzed using SPSS 12.0. Implications of the empirical analysis result of this study are as follows: First of all, There are order differences in the importance of social commerce CSF between two groups. While service providers regard Price Economic as the most important CSF influencing purchasing intention, the users regard 'Trust' as the most important CSF influencing purchasing intention. This means that the service providers have to utilize the unique strong point of social commerce which make the customers be trusted rathe than just focusing on selling product at a discounted price. It means that service Providers need to enhance effective communication skills by using SNS and play a vital role as a trusted adviser who provides curation services and explains the value of products through information filtering. Also, they need to pay attention to preventing consumer damages from deceptive and false advertising. service providers have to create the detailed reward system in case of a consumer damages caused by above problems. It can make strong ties with customers. Second, both service providers and users tend to consider that social commerce CSF influencing purchasing intention are Price Economic, Utility, Trust, and Word of Mouth Effect. Accordingly, it can be learned that users are expecting the benefit from the aspect of prices and economy when using social commerce, and service providers should be able to suggest the individualized discount benefit through diverse methods using social network service. Looking into it from the aspect of usefulness, service providers are required to get users to be cognizant of time-saving, efficiency, and convenience when they are using social commerce. Therefore, it is necessary to increase the usefulness of social commerce through the introduction of a new management strategy, such as intensification of search engine of the Website, facilitation in payment through shopping basket, and package distribution. Trust, as mentioned before, is the most important variable in consumers' mind, so it should definitely be managed for sustainable management. If the trust in social commerce should fall due to consumers' damage case due to false and puffery advertising forgeries, it could have a negative influence on the image of the social commerce industry in general. Instead of advertising with famous celebrities and using a bombastic amount of money on marketing expenses, the social commerce industry should be able to use the word of mouth effect between users by making use of the social network service, the major marketing method of initial social commerce. The word of mouth effect occurring from consumers' spontaneous self-marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers; in this context, the word of mouth effect should be managed as the CSF of social commerce. Third, Trade safety was not derived as one of the CSF. Recently, with e-commerce like social commerce and Internet shopping increasing in a variety of methods, the importance of trade safety on the Internet also increases, but in this study result, trade safety wasn't evaluated as CSF of social commerce by both groups. This study judges that it's because both service provider groups and user group are perceiving that there is a reliable PG(Payment Gateway) which acts for e-payment of Internet transaction. Accordingly, it is understood that both two groups feel that social commerce can have a corporate identity by website and differentiation in products and services in sales, but don't feel a big difference by business in case of e-payment system. In other words, trade safety should be perceived as natural, basic universal service. Fourth, it's necessary that service providers should intensify the communication with users by making use of social network service which is the major marketing method of social commerce and should be able to use the word of mouth effect between users. The word of mouth effect occurring from consumers' spontaneous self- marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers. in this context, it is judged that the word of mouth effect should be managed as CSF of social commerce. In this paper, the characteristics of social commerce are limited as five independent variables, however, if an additional study is proceeded with more various independent variables, more in-depth study results will be derived. In addition, this research targets social commerce service providers and the users, however, in the consideration of the fact that social commerce is a two-sided market, drawing CSF through an analysis of perception gap between social commerce service providers and its advertisement clients would be worth to be dealt with in a follow-up study.