• Title/Summary/Keyword: electronic cash

Search Result 135, Processing Time 0.019 seconds

Universal Description of Access Control Systems

  • Karel Burda
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.43-53
    • /
    • 2024
  • Access control systems are used to control the access of people to assets. In practice, assets are either tangible (e.g. goods, cash, etc.) or data. In order to handle tangible assets, a person must physically access the space in which the assets are located (e.g. a room or a building). Access control systems for this case have been known since antiquity and are based either on mechanical locks or on certificates. In the middle of the 20th century, systems based on electromagnetic phenomena appeared. In the second half of the same century, the need to control access to data also arose. And since data can also be accessed via a computer network, it was necessary to control not only the access of persons to areas with data storage, but also to control the electronic communication of persons with these storage facilities. The different types of the above systems have developed separately and more or less independently. This paper provides an overview of the current status of different types of systems, showing that these systems are converging technologically based on the use of electronics, computing and computer communication. Furthermore, the terminology and architecture of these systems is expanded in the article to allow a unified description of these systems. The article also describes the most common types of access control system configurations.

A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)

  • Jeong, Seong Hoon;Kim, Hana;Shin, Youngsang;Lee, Taejin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1525-1540
    • /
    • 2015
  • Due to a rapid advancement in the electronic commerce technology, the payment method varies from cash to electronic settlement such as credit card, mobile payment and mobile application card. Therefore, financial fraud is increasing notably for a purpose of personal gain. In response, financial companies are building the FDS (Fraud Detection System) to protect consumers from fraudulent transactions. The one of the goals of FDS is identifying the fraudulent transaction with high accuracy by analyzing transaction data and personal information in real-time. Data mining techniques are providing great aid in financial accounting fraud detection, so it have been applied most extensively to provide primary solutions to the problems. In this paper, we try to provide an overview of the research on data mining based fraud detection. Also, we classify researches under few criteria such as data set, data mining algorithm and viewpoint of research.

Smart Card Operating System for Various Applications (다양한 응용을 위한 스마트카드 운영체제)

  • Kim, Jeung-Seop;Cho, Byoung-Ho;Kim, Hyo-Cheol;Lee, Jong-Kook;Yoo, Ki-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.3
    • /
    • pp.277-288
    • /
    • 2002
  • In this paper, we describe a design and implementation method of a smart card operating system for multi applications. A smart card is the independent computing system and is able to be used in multi applications such as the electronic commerce and the electronic cash. Smart card operation system(SCOS) provides a basis of smart card booting, and controls and manages application programs. SCOS can produce and control a file system to support multi applications in EEPROM, communicate commands and messages with outside devices, process a command, produce a reply message, and provide security functions of file security in EEPROM, and communication security. Therefor, in this paper, we design and implement SCOS system that provides the authentication between a card and a terminal, the session authentication for multi applications, the processing of commands, and the maintenance of the security.

(A New Offline Check System with Reusable Refunds) (거스름의 재사용이 가능한 새로운 오프라인 수표시스템)

  • 김상진;최이화;오희국
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.355-370
    • /
    • 2003
  • In offline check systems, a client does not have to pay the exact amount. Instead, a client refunds the difference between the check value and the paid amount. In most offline systems, clients can not spend the remainder. But if the refund can be made spendable, it would provide a more convenient payment method. In this paper, we present a new offline system, which allows refunds to be reused as payments. In our system, the shop issues a new check using its private key for the difference. This new check, called the refund check, can be spent in the same way as checks issued by the bank. If the refund check is deposited to, or refunded at the bank, the bank charges the issuer of the check for the amount. The form of a check in this system is much simpler than previous check systems. It also uses a more flexible and efficient denomination method. The refund check is unlinkable to the check used in the payment where the refund check was issued. This system provides coin and owner tracing mechanisms to reinforce controls on illegal use of anonymous checks and was designed with consideration to the atomicity of transactions.

A Study on Implementation and Design of Scheme to Securely Circulate Digital Contents (디지털콘텐츠의 안전한 유통을 위한 구조 설계 및 구현에 관한 연구)

  • Kim, Yong;Kim, Eun-Jeong
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.2
    • /
    • pp.27-41
    • /
    • 2009
  • With explosive growth in the area of the Internet and IT services, various types of digital contents are generated and circulated, for instance, as converted into digital-typed, secure electronic records or reports, which have high commercial value, e-tickets and so on. However, because those digital contents have commercial value, high-level security should be required for delivery between a consumer and a provider with non face-to-face method in online environment. As a digital contents, an e-ticket is a sort of electronic certificate to assure ticket-holder's proprietary rights of a real ticket. This paper focuses on e-ticket as a typical digital contents which has real commercial value. For secure delivery and use of digital contents in on/off environment, this paper proposes that 1) how to generate e-tickets in a remote e-ticket server, 2) how to authenticate a user and a smart card holding e-tickets for delivery in online environment, 3) how to save an e-ticket transferred through network into a smart card, 4) how to issue and authenticate e-tickets in offline, and 5) how to collect and discard outdated or used e-tickets.

Comparative Analysis on Digital Currency Models and Electronic Payments (중앙은행의 디지털화폐 발행방식 및 전자지급수단의 비교분석)

  • Yoon, Jae-Ho;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.63-72
    • /
    • 2022
  • With the advent of cryptocurrencies such as Bitcoin in 2009, the paradigm of money, a means of payment, has been changing significantly. And it has a great impact on our daily lives. Thus central banks have attempted various analyzes on the issuance and impact of digital currencies including electronic payments but a study on which issuance method is suitable is insufficient. In this study, the issuance of digital currency was analyzed compared to the electronic payments which are currently used. As a result, the account-based model did not show any significant differences from the current RTGS(real-time gross settlement systems) and retail payment systems. But the token-based model is expected that it can improve the efficiency of finance and induce technological innovation in the financial field. However, it was analyzed that this model would weaken the intermediary function of financial institutions such as loans due to the characteristics of digital signature technology. In addition, in order to protect consumers against security attacks such as hacking and phishing of CBDCs, legal and institutional supports similar to the current electronic payment method are required, and continuous technology development efforts are also required for the CBDC issuance model to maintain convenience and anonymity equivalent to cash.

Implementation of Kiosk-based Internet Public Services System (키오스크 기반 인터넷민원처리시스템의 구현)

  • An, Im-Sang;Jeong, Gi-Won
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.433-438
    • /
    • 2003
  • To provede public services through Internet, there are several prerequisites such as security issue resolutions for public area installation and hardware support for authorized signatures etc. in addition to web-based system development. A kiosk-based system is a right solution for public services provision through Internet because a kiosk has hardware features supporting authorized signatures and also it can be installed at public area through Internet without security exposure, meeting security guidelines of National Intelligence Service. The process to provide public services through a koisk is that a client requests a kind of public services selecting menu through the kiosk, then the system issues a civil service documents after taking authentification and payment process. To support those kinds o processes it is required to support electronic payment using SMART card in addition to cash payment and to apply government standard security guidelines to protect administrative and personal information. This kiosk-based Internet public service system support and meet those all requirements.

A Study on Measures for Preventing Credit Card Fraud (신용카드 부정사용 방지 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.33-40
    • /
    • 2016
  • Credit card is means of payment used like cash in terms of function and its users have increased consistently. With development of Internet and electronic commerce a role as payment method of credit card has been growing. But as the risk which results from centralized information and online increases, credit card fraud is also growing. Card theft and loss are decreasing due to countermeasure of card companies and financial supervisory authorities, while card forge and identity theft are increasing. Recently because of frequent personal information leakage and deregulation of financial security following easy-to-use payment enforcement, customer's anxiety about card fraud is growing. And the increase of card fraud lowers trust on credit system as well as causes social costs. In this paper, the security problems of card operating system are addressed in depth and the measures such as immediate switch to IC card terminals, introduction of new security technology, supervision reinforcement of the authorities are proposed.

Providing Payment Atomicity Using Verifiable Encryption (확인 가능한 암호기법을 사용한 지불의 원자성 보장 방법)

  • 최형섭;김상진;오희국
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.69-80
    • /
    • 2003
  • Verifiable encryption is an encryption technique with which one can verify what has been encrypted even if one can not decrypt the ciphertext. This technique can be used in fair exchange to convince the counterpart of his or her receiving an item by presenting an encrypted form in advance. In this paper, a method that can guarantee the payment atomicity is proposed by applying verifiable encryption to an electronic cash system based on the representation problem. With the new method, the process of dispute settlement is improved in the fact that the trusted third party do not have to interact with the bank to resolve disputes. This method is also flexible in a sense that clients and shops can request for dispute settlement regardless of any deadline constraint. However, additional proof is necessary to apply verifiable encryption during payment. We discuss the security and the atomicity of our method, and compare ours with others.

A New Offline Check System with Spendable Refunds (남은 금액을 재사용할 수 있는 오프라인 전자수표시스템)

  • 김상진;오희국
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.27-40
    • /
    • 2001
  • In an offline system, the bank does not participate in payments. As a result, it is difficult to make the refund spendable. Due to this, current offline systems do not provide spendable refunds. In these systems, a check consists of two parts: a spendable part and a refund part. A client uses the spendable part during the payment phase, and uses the refund part to get the refund for the remainder of the check. Therefore, a client cannot reuse the remaining and must always refund it. Moreover, the relationship between the spent amount and the refund amount can be used to guess which check the client used when the client refunds the remaining. To remedy these problems, we propose a new offline system which allow clients to reuse the remaining values of the check. This system provides unlinkability of the payments made by using a single check. It also provides mechanisms to detect and identify clients who perform misconduct such as double spending and over spending. The required overall computational cost to withdraw, spend and refund a check in our system is lower than using several checks in other offline systems.