• Title/Summary/Keyword: SMS payment system

Search Result 11, Processing Time 0.024 seconds

Studying Business Strategies in a Total Payment Service Market through Mobilians Case (모바일 결제 서비스 시장의 성공요인 분석과 나아갈 방향 모색: [주]모빌리언스[Total Payment Service Provider]사례 중심으로)

  • An, Ji-Hyeon;Yun, Sang-Won;Lee, Mi-Yeong
    • Journal of Digital Convergence
    • /
    • v.4 no.2
    • /
    • pp.127-142
    • /
    • 2006
  • This paper uses a Mobilans case based on software system to derive the results of our study. Recently, the mobile phone payment entered its matured stage and became most frequently used payment method in all internet sites. And, in order to prepare for the future ubiquitous market, every mobile phone payment methods has different speed of development, market status and target segments in the market. This paper also discusses about the background and current status of Korean mobile phone payment market using SMS(Short Message Service) to purchase items on internet which is growing sharply every year. Also, we try find the key factors to succeed in this growing market. In addition to safety, delayed payment and the immediateness for use of mobile phone, we also suggest that a highly developed hardware system is an additional factor under the increased demands for the convenience with various applications.

  • PDF

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

Open Markets and FDS(Fraud Detection System) (오픈마켓과 부당거래 방지 시스템)

  • Yoo, Soon-Duck;Kim, Jung-Ihl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.113-130
    • /
    • 2011
  • Due to the development of information and communication technology, the global influence on politics, economics, society, and culture has grown. A major example of this impact on the economic sector is the growth of e-commerce, which increases both the speed and efficiency of businesses. In light of these new developments, businesses need to shift away from the misconception that information overwhelms to embrace the enhanced competitiveness that e-commerce provides. However, concern about fraudulent transactions through e-commerce is pertinent because of the loss in both critical revenue and consumer confidence in open markets. Current solutions for fraudulent transactions include real-time monitoring and processing, payment pending, and confirmation through SMS, E-mail, and other wired means. Our research focuses on the management of Fraud Detection Systems (FDS) to safeguard online electronic payment systems. With effective implementation of our research we hope to foster an honorable online trading culture and protect consumers. Future comparative research in domestic and abroad markets would provide further insight into preventing fraudulent transactions.

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

A Survey of Regulations on Smishing and Mobile Micropayment and a Research of Regulations and Laws for Reducing Monetary Damages in Mobile Micropayment (스미싱 제도와 소액결제 제도의 현황 조사 및 소액결제 피해를 줄이기 위한 법·제도 연구)

  • Park, Hanjin;Kim, Injung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1189-1199
    • /
    • 2017
  • With the rapid increase in mobile device users, there are many cyber attacks using SMS messages to infect the mobile device. The monetary demage from those attacks are also increasing. Since those demage are generally related to mobile micropayement systems, we study the details of the incidents on smishing and mobile micropayment. We have identified several limitations of current regulations and laws of them. Thus, we propose new regulations and laws to reduce the financial demage from simishing and to strengthen the security and responsibility of the mobile network operator, payment gateway, and content providers who are participating in the structure of a mobile micropayment systems, such as a regulation for information security evaluation system, several laws for compensation of financial demage within mobile micropayement system.

Usability and Security Analysis of Authentication Methods for Mobile Fin-Tech Services (모바일 핀테크 서비스에서 이용 가능한 인증 수단의 사용성, 안전성 분석 연구)

  • Kim, KyoungHoon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.843-853
    • /
    • 2017
  • In the case of electronic payment, the obligation to use the certificate-based authentication was abolished. As Fin-tech service providers gain autonomy, various authentication methods are provided. SMS, ARS, PIN, Text-passwords, Fingerprints are popular authentication methods in the mobile Fin-tech services. In this study evaluate the usability and security of authentication methods in a unified mobile environment. We evaluate the usability through SUS and interview. Also we evaluate the security level of authentication methods through NIST guideline. At the result of the usability evaluation, Fingerprint authentication method had been determined as the highest usability, also Fingerprint authentication method had been determined as the safest authentication method by obtaining Security Level 4.

Face Recognition System Technologies for Authentication System - A Survey (인증시스템을 위한 얼굴인식 기술 : 서베이)

  • Hwang, Yooncheol;Mun, Hyung-Jin;Lee, Jae-Wook
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.9-13
    • /
    • 2015
  • With the advance of ICT, the necessity of user authentication to verify the identity of an opponent online not face to face is increasing. The authentication, the basis of the security, is used in various fields. Because ID-based authentication has weaknesses in terms of stability and losses, two or more than two authentication tools are used in the place in which the security is important. Recently, biometric authentication rather than ID, OTP, SMS authentication has been an issue in terms of credibility and efficiency. As the fields applied to current biometric recognition technologies are increasing, the application of the biometric recognition is being used in various fields such as mobile payment system, intelligent CCTV, immigration inspection, and access control. As the biometric recognition, finger print, iris, retina, vein, and face recognition have been studied actively. This study is to inspect the current state of domestic and foreign standardization including understanding of the face recognition and the trend of technology.

  • PDF

A Case Study on the Business Innovation for increasing National Science and Technology Competitiveness power - Simplification and Digitalization of R&D Expenses Performance procedure - (국가과학기술경쟁력 제고를 위한 과학기술부 업무혁신 사례 - 연구비 집행절차 간소화 및 디지털화 -)

  • Kim, Bong-Su;Lee, Eun-Yeong;Choe, Un-Baek;Jang, Bo-Hyeon
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.51-58
    • /
    • 2007
  • Considering innovation a key to raising living standards, the Ministry of Science and Technology has put in place various measures meeting the needs of the newly promoted Deputy Prime Minister of Science and Technology. Such measures include business process reengineering as streamlining the work process to achieve the improvement in quality and efficiency: building the integrated performance management system to promote performance-or tented environment; and running the 1ifelong learning system for better competitiveness of government officials. Further to the innovation efforts at work, the number of steps of the R&D budget execution is streamlined from eight to five and its payment period is considerably reduced to 15 days from 60 days. In addition, the digitalized R&D budget management systems such as e-Contract System, One-click Processing Monitoring System, and Information Service System through Short Message Service (SMS) will contribute to improving R&D performance. And these systems are efficiently integrated into a portal interface named "Yeon-gu-ma-ru." The Ministry of Science and Technology, spearheading nationwide innovation, will continue efforts to make viable achievements of innovation.

  • PDF

Design and Implement of Anti-Smishing System based-on Android (안드로이드 기반 스미싱 방지 시스템 설계 및 구현)

  • Jang, Rae-Young;Bae, Jung-Min;Jung, Sung-Jae;Sung, Kyung;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.790-793
    • /
    • 2013
  • Lastest Smishing is one of the hacking techniques target on the Android smartphone. Smishing using the SMS message is a new hacking techniques. smishing sends a message to the user included trojan address. It collects personal information and to control smartphones. In particular, without the user's knowledge of the retail payment service provider uses the service. It caused damage worth up to 300,000 won. It damage to users through different types of text messages. This paper Smishing typical methods and types are described in damages. This paper are described in damages and type by Smishing. This paper propose preventive and fundamental solution. We designed and implemented a anti-smishing system for android.

  • PDF

The study for making active marketing organization both group stations and region headquarters in KORAIL (코레일의 지사 및 그룹역 마케팅 조직 활성화를 위한 연구 - 서울지사 서울역 마케팅 팀의 사례를 중심으로 -)

  • Chae, Il-Kwon;Choi, Young-Jin
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.1878-1885
    • /
    • 2009
  • The railway advance policy from Korea government, KORAIL have to reduce a half of his railway business loss until 2010 and turnout railway business black ink until 2012. To overcome this difficult management situation, KORAIL has been set up new marketing organization in Seoul station which is necessary and venerable. According to the leadership of Seoul station master, Seoul station's marketing team was launched at April 2008. The marketing team will introduce total marketing for KORAIL corporation in their marketing activity such as advertisement, B to B railway tickets, railway travel package sales and customer satisfaction event with other corporations, and so on. After automated ticket system(SMS and Home-printed ticket) will lead to existing ticket sales persons to become activating marketing team members. In the organization case study in Seoul station, this study how to manage new marketing team have a great performance last 8 months and analysed what was a successful factors and principals, and also their team limits within KORAIL's organization structure. In the long run, we suggest that how can be this team to be support within KORAIL system such as incentive system, payment system, and marketing budgets etc.

  • PDF