• Title/Summary/Keyword: Virtual money

Search Result 63, Processing Time 0.023 seconds

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

A Comparative Study of Block Chain : Bitcoin·Namecoin·MediBloc (블록체인 비교연구: 비트코인·네임코인·메디블록)

  • Kim, Ji Yeon
    • Journal of Science and Technology Studies
    • /
    • v.18 no.3
    • /
    • pp.217-255
    • /
    • 2018
  • Bitcoin, which appeared in 2008, was merely a conceptual virtual currency, but it now enjoys the status as actual money. Bitcoin is an electronic money system that can be traded directly without a central trust institution. Thanks to the popularization of Bitcoin, blockchain technology has become a widespread concern. That technology is expanding not only the currency mechanism, but also a variety of other services. The possibility of a blockchain in relation to actual currency is ongoing. This paper investigates the technological characteristics and social construction of the blockchain by comparing the cases of Bitcoin, Namecoin, and MediBloc among blockchain applications. Namecoin emerged in 2013 is an attempt to replace the centralized Internet Domain Name System(DNS). There has been controversy over that current system for a long time, but replacing the already established system is not easy. Nevertheless, Namecoin has potential as an alternative. Meanwhile, MediBloc is an application that involves distributed management of medical data in South Korea. MediBloc claims that the key producers of medical data are patients themselves. This is to challenge to the question who is a knowledge producer of medical data. Through these three cases, it has discussed that blockchain technology does supports to form more democratic decision-making or simply provide a technical solution as automation. As a citizen, we can intervene in the realization of blockchains by presenting social agenda. This will be a method of the social construction of technology.

A Study on the Types of Crime and Scalability in Metaverse (메타버스 내 범죄발생 유형과 확장성에 관한 연구)

  • Song, HyeJin;Nam, Wanwoo
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.218-227
    • /
    • 2022
  • Purpose: In the case of cavity discovered by ground penetrating radar exploration, it is necessary to accurately predict the filling amount in the cavity in advance, fill the cavity sufficiently and exert strength to ensure stability and prevent ground subsidence. Method: The cavity waveform analysis method by GPR exploration and the method using the cavity shape imaging equipment were performed to measure the cavity shape with irregular size and shape of the actual cavity, and the amount of cavity filling of the injection material was calculated during rapid restoration. Result: The expected filling amount was presented by analyzing the correlation between the cavity size and the filling amount of injection material according to the cavity scale and soil depth through the method by GPR exploration and the cavity scale calculation using the cavity shaping equipment. Conclusion: The cavity scale measured by the cavity imaging equipment was found to be in the range of 20% to 40% of the cavity scale by GPR exploration. In addition, the filling amount of injection material compared to the cavity scale predicted by GPR exploration was in the range of about 60% to 140%, and the filling amount of the injection material compared to the cavity size by the cavity shaping equipment was confirmed to be about 260% to 320 Purpose: The purpose of this study is to examine the types of crimes taking place in the metaverse, and to establish a crime prevention strategy and find a legal deterrent against it. Method: In order to classify crime types in the metaverse, crime types were analyzed based on the results of previous studies and current incidents. Result: Most of the crimes taking place in the metaverse are done in games such as Roblox or Zeppetto. Most of the game users were teenagers. Looking at the types, there are many teens for sexual crimes, violent crimes, and defamation, but professional criminals are often included in copyright infringement, money laundering using virtual currency, and fraud. Conclusion: Since the types of crimes in the metaverse are diverse, various institutional supplementary mechanisms such as establishment of police crime prevention strategies, legal regulations, and law revisions will have to be prepared.

High-Value Materials from Microalgae (미세조류 유래 고부가 유용물질)

  • 오희목;최애란;민태익
    • Microbiology and Biotechnology Letters
    • /
    • v.31 no.2
    • /
    • pp.95-102
    • /
    • 2003
  • Microalgae are a diverse group of photosynthetic organisms and abundant in every ecosystem in the biosphere. They are common in aqueous environments including marine, brackish and fresh waters and in some habitats that lack eukaryotic life such as some hot springs and highly alkaline lakes. Microalgal biotechnology that is focused on the microalgae-based production of a variety of useful materials such as pharmaceutical comfounds, health foods, natural pigments, and biofuels is considered as an important discipline with the development of biotechnology. In addition, the mass cultivation of microalgae can also contribute to improving the environmental quality by reducing the concentration of $CO_2$ which is one of major gases lead to global warming. Consequently, it seems that the microalgae can be used as an efficient, renewable, environmentally friendly source of high-value biomaterials such as chemicals, pigments, energy, etc. and the microalgal biotechnology will most likely represent a larger portion of modern biotechnology.

A study on Prevention of Large Scale Identity Theft through the Analysis of Login Pattern(Focusing on IP/Account Blocking System in Online Games) (로그인 패턴 분석을 통한 대규모 계정도용 차단 방안에 관한 연구(온라인 게임 IP/계정 차단시스템을 중심으로))

  • Yeon, Soo-Kwon;Yoo, Jin-Ho
    • Journal of Korea Game Society
    • /
    • v.16 no.2
    • /
    • pp.51-60
    • /
    • 2016
  • The incidents of massive personal information being leaked are occurring continuously over recent years. Personal information leaked outside is used for an illegal use of other's name and account theft. Especially it is happening on online games whose virtual goods, online game money and game items can be exchanged with real cash. When we research the real identity theft cases that happened in an online game, we can see that they happen massively in a short time. In this study, we define the characteristics of the mass attacks of the automated identity theft cases that occur in online games. Also we suggest a system to detect and prevent identity theft attacks in real time.

Design and Implementation of the Electronic Payment Protocol for Digital Merchandise (디지털 상품 거래를 위한 전자지불 프로토콜 설계 및 구현)

  • Park Sei-Seung;Han Jae-Kyun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.988-999
    • /
    • 2005
  • As the Internet continues to have the commercial trade changed, the method of payment is one of critical components to conduct successful businesses through the internet. An electronic cash has all of the characteristics of a traditional commodity cash and ensures the security for all transactions. Accordingly an internet billing system based on the electronic cash is expected as the secure and efficient payment method for the future electronic commerces. The digital contents such as digital merchandise and services have the characteristic that both the delivery of merchandise and the payment of money can be accomplished on the same network and are helpful to idealize the design of the electronic commerce system. In this paper, Anonymity got to be possible by using a virtual ID in the process of payment, the payment steps were decreased by being processed on the same network, and the efficiency and the security were guaranteed by decreasing the frequency of the coding and communication.

  • PDF

Study on the Fashion Trend of Contemporary Men's Wear Since 1990 (1990년대 이후 현대 남성복에 나타난 패션 경향에 관한 연구)

  • Kim, Hye-Jeong
    • Journal of Fashion Business
    • /
    • v.14 no.5
    • /
    • pp.78-92
    • /
    • 2010
  • The culture phenomenon, which the desire of self expression is noticeable and the diversity of gender identity is widely accepted, simply makes a difference in the lifestyle of one human being rather than the dichotomous classification of male and female. Now, the delicate and aesthetic sensitivity classified as the feminine characteristics is no longer the exclusive property of female and this refers to substituting it as a social gender from the concept of biological sex. This phenomenon has influenced on the male culture and is creating various codes according to the cultural gender extended from the gender as a social role. Also, the transition into the western lifestyle has extended the aesthetic emotion to accommodate new codes from the diversification and globalization of lifestyle. The mansumer power, which does not care too much about the money for the emotionally attached items, has enabled various fashion styles. After analyzing the diversified clothing behavior conducted by these people in connection with the social phenomenon, First, this shows the phenomenon of emotional value pursuit that finds pleasure over the clothing as the item of augmented reality is added to the concept of play, in which the real space referred to as garment and virtual space of playing the rock, paper and scissors game meet together within the augmented reality. Second, the convergence concept has enabled the coordination of new style by obscuring the area of design concept and this refers to the changes in design from the development of new items and transformation into double-style details. Third, the divergence that intensively provides specific use/convenience and specialized value shows a change in the fashion market from the phenomenon that admits various gene rations of culture and specifically, takes differently about the recognition of middle-aged males. Fourth, the variety seeking tendency receives attention as the value of future design together with the phenomenon of discriminative value pursuit. In the male fashion, it is linked to the collaboration with the design area and this tells that the fashion with the narcissistic cross-dressing and motto of neutral gender without being sided to male/female is rising.

The Effects of Needs for Affiliation and Needs for Self-Presentation on Digital Item Purchase Intention: The Moderating Roles of Gender and Purchase Experience (친교욕구와 자기표현욕구가 디지털 아이템 구매의도에 미치는 영향: 성별과 구매경험의 조절효과를 중심으로)

  • Shin, Seon-Jin;Jang, Heeh-Young;Koh, Joon
    • The Journal of Information Systems
    • /
    • v.17 no.3
    • /
    • pp.79-109
    • /
    • 2008
  • Cyworld was successful where others have foiled because of its unique and profitable business model that relies on the purchase of digital items and its ability to mimic and recreate aspects of face-to-face interpersonal relationships among the members of the online community. The purpose of this study is to understand how the needs for self-presentation and needs for affiliation influence digital item purchase intention, and to analyze the moderating roles of gender and purchase experience in those relationships. Based on the theoretical framework including self-presentation theory and theory of affiliation, we developed the research model and proposed ten hypotheses. A survey was conducted with 225 members of Cyworld. The research model and the related hypotheses were tested using Amos. As the result of the analysis, eight hypotheses out of ten hypotheses were supported. In particular, digital item purchase intention in virtual world was found to be affected by both members' needs for self-presentation and needs for affiliation. We also found that the needs for self-presentation is significantly influenced by innovativeness of members, self-efficacy, and group norm. Also, needs for affiliation is significantly affected by self-efficacy, group norm and perceived value. Furthermore, the results indicate that 1) moderating effects of gender on those relationship is supported; and 2) moderating effects of purchase experience is partially identified. This study provides several implications for academic community and practitioners to understand why the community members pay real money for their digital items as well as how the sales of digital items can be increased in online communities. Some study limitations and future research directions are also discussed.

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.

A Study on Object Recognition Technique based on Artificial Intelligence (인공지능 기반 객체인식 기법에 관한 연구)

  • Yang Hwan Seok
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, in order to build a cyber physical system(CPS) that is a technology related to the 4th industry, the construction of the virtual control system for physical model and control circuit simulation is increasingly required in various industries. It takes a lot of time and money to convert documents that are not electronically documented through direct input. For this, it is very important to digitize a large number of drawings that have already been printed through object recognition using artificial intelligence. In this paper, in order to accurately recognize objects in drawings and to utilize them in various applications, a recognition technique using artificial intelligence by analyzing the characteristics of objects in drawing was proposed. In order to improve the performance of object recognition, each object was recognized and then an intermediate file storing the information was created. And the recognition rate of the next recognition target was improved by deleting the recognition result from the drawing. In addition, the recognition result was stored as a standardized format document so that it could be utilized in various fields of the control system. The excellent performance of the technique proposed in this paper was confirmed through the experiments.