• Title/Summary/Keyword: secure transaction

Search Result 166, Processing Time 0.029 seconds

A Study on the Operational Process of SURF under Bolero System (볼레로시스템 상 SURF(전자결제시스템)의 운용프로세스에 관한 연구)

  • 채진익
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.187-206
    • /
    • 2002
  • The purpose of this study is to review the process for the trade settlement system between all parties involved in the commercial transaction under SURF System. SURF application is the latest value added service from bolero.net and a fully automated documentary settlement system. It extends bolero.net's capability to enable trade transactions by providing a delivery versus payment system. It has been designed as a standard, shared, infrastructure component for handling trade settlement within an electronic environment to keep step with the operation of electronic Bolero bill of Lading. It exploits the services provided by the Bolero Core Messaging Platform - secure, guaranteed transactions based on boleroXML standards to provide document compliance services with optional bank guarantees. So, SURF system can automatically check all commonly used trade documents such as commercial invoices, bills of lading and certificates of weight and analysis, etc and supports a full range of settlement options including Open Account, Documentary Collections, Documentary Credit. 58 have key features as follows, ① automatic document compliance checking, ② integrated with the Title Registry, ③ supports various forms of vender financing, ④ governed by a set of legally binding rules, ⑤ fully prepared for Straight-Through-Processing, ⑥ Enabled compliance with UCP 500.

  • PDF

The Vulnerability Analysis of CA Arcot VPS (CA Arcot VPS의 취약점 분석)

  • Lee, Sang-Ho;Kim, Sung-Ho;Nyang, Dea-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.825-830
    • /
    • 2013
  • CA Arcot corporation in U.S.A has secure on-line financial trade solution and patent that verify whether transaction had change using virtual session. But, VPS(Virtual Private Session) has another vulnerability by way to construct CAPTCHA. We can't fully trust safety of VPS, Cause it could be attacked by using color information of CAPTCHA. In this paper, We suggest the method of attack VPS, and also point out the vulnerability of VPS though simulation.

A Study for risk management on Documentary Collection(D/P, D/A) Payment (추심결제(D/P, D/A)방식에서의 위험관리에 관한 연구)

  • Kwak, Su-Young
    • International Commerce and Information Review
    • /
    • v.10 no.2
    • /
    • pp.283-304
    • /
    • 2008
  • According to globalization and localization of world economics international trade payment method was also changed. A traditional payment was Letter of Credit basis, however it is being increased to various methods such as remittance, documentary collection(D/P, D/A) and open account. In order to acquire a secure export payment, exporters prefer to L/C basis which is guaranteed by a reliable bank. However, the L/C should bear a security so that importers would rather documentary collection than L/C. The reasons for the preference of collection payment rather than L/C are a low commission cost, the conversion of buyer's market from seller's market due to severe competition in the world market, transaction increase between main office and branches and a right to control the goods until executing the payment by exporters. Besides of them, collection payment can handle safer and faster than open account basis. However, the collection payment has a risk which it isn't guaranteed by bank for the payment so that I would suggest countermeasures to minimize the payment risk utilizing the collection basis as follows; using export credit insurance system, a large domestic credit report provider such as D&B for absolutely fresh and new information, a collection proxy service for overseas deferred credit and suggestion specifying to order B/L not straight one on consignee in order to transfer the right of ownership with endorsement without problem.

  • PDF

A Verifiable and Traceable Secondhand Digital Media Market Protocol

  • Chen, Chin-Ling;Chen, Chin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1472-1491
    • /
    • 2011
  • As used product transactions are currently on the rise, the demand for transactions of secondhand digital content will grow in the future; thus, learning to make secure transactions while avoiding cyber attacks becomes an important issue. In this paper, we combine the new buyer's secret key, the new buyer's watermark to embed in resold digital content, and the reseller's encrypted watermark, which can prove legal ownership of the reseller. Using the privacy homomorphism property of RSA and exponential calculus, the original seller of digital content can verify the legality of the reseller and the new buyer. We also reduced the load of encryption/decryption digital content using a partial encryption/decryption algorithm to make our protocol more efficient and practical. In the proposed protocol, the seller is not able to conduct piracy and easily frame any other innocent secondhand buyer when a case of piracy is found. In fact, piracy can be clearly traced using the privacy homomorphism property of RSA and the embedded watermark mechanism. Further, in the proposed protocol, the seller himself can trace the piracy using exponential calculus. Since it is unnecessary to trust third party participation, the conspiracy problem is resolved and the new buyer is not required to participate in the dispute. Moreover, the seller, reseller and new buyer can simultaneously benefit from the secondhand transaction.

User Authentication Using Biometrics and OTP in Mobile Device (중소기업형 바이오정보와 OTP를 이용한 사용자 인증)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.27-31
    • /
    • 2014
  • According to increasing of payment and settlements like smart banking, internet shopping and contactless transaction in smart device, the security issues are on the rise, such as the vulnerability of the mobile OS and certificates abuse problem, we need a secure user authentication. We apply the OTP using biometrics and PKI as user authentication way for dealing with this situation. Biometrics is less risk of loss and steal than other authentication that, in addition, the security can be enhanced more when using the biometric with OTP. In this paper, we propose a user authentication using biometrics and OTP in the mobile device.

  • PDF

Proposal of Eco-M Business Model : Specialty Store of Eco-friendly Agricultural Products Joined with Suburban Agriculture

  • Kim, Jong-Baek;Lee, Hyen-Ho;Yang, Hoe-Chang
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.1 no.4
    • /
    • pp.15-21
    • /
    • 2014
  • The main purpose of the research is to suggest a new business model of direct distribution of organic agricultural products cultivated in suburban area. To secure competitiveness, logistics cost reduction is important through direct transaction of organic agricultural products cultivated on suburban area. The research addresses food safety, farmers' income and unemployment issues with Eco-M business model. The research methods include investigation on the followings: current domestic agriculture; related problems on the existing literature reviews; the current status of suburban agriculture; specialty store of eco-friendly agricultural products. Eco-M business model can solve various problems of suburban agriculture supply system, challenges of organic farming specialty stores, unemployment issues, and difficulties of processing verticalization. Future research should include followings. First, there should be comparative analysis between businesses of environment-friendly specialty stores through suburban agriculture and producer's agriculture connected with organic farming market. Second, it is required to develop strategy of environment-friendly specialty stores. Finally, analysis of the potential of Sextic industries is necessary throughout production-process-service process.

The Doctrine of Separability and Kompetenz-Kompetenz under International Commercial Arbitration. (전자상거래분쟁에서 국제재판관할권의 논점)

  • 박종삼
    • Journal of Arbitration Studies
    • /
    • v.13 no.2
    • /
    • pp.235-262
    • /
    • 2004
  • A study on the international Jurisdiction to Application in Electronic Transaction Disputes The implementation of electronic commerce raises some new legal and institutional problem so it is necessary for us to prepare alternatives. As the development of electronic commerce is difficult without smooth settlement of dispute the pursue of smooth settlement of dispute is very important menu. while the most common method relating to the settlement of dispute is litigation. them relating to the litigation, the subject of jurisdiction and the subject of governing laws should be resolved above all. Further more in addition, the old act prior act was regarded as insufficient in that it lacked rules on international jurisdiction to adjudicate, or international adjudicatory jurisdiction, where as the expectation of the public was that the private international law should function as the basic law of the legal relational encompassing rules on international jurisdiction given the increase of It international disputes. for the move the private international law has also attracted more attention from the korean. Therefore, International jurisdiction to application concerned about electronic commerce should be prepared and the environment to keep electronic commerce secure and stable be guaranteed. And we should make plans to protect companies and consumers and should make efforts to expand electronic commerce infrastructure.

  • PDF

Study for Secure Wireless Communication (안전한 무선 통신 연구)

  • Lee, Jik-Su;Choi, Byung-Sun;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.828-832
    • /
    • 2005
  • 무선 인터넷에서는 원격지 이동, 근무자의 근무지원, 무선 상거래로 그 초점이 맞추어지면서 당연히 현재 무선인터넷의 보안도 트랜잭션(transaction) 보안을 시발점으로 하고 있다. 본 논문에서는 현재 무선인터넷에서 가장 화두가 되고 있는 WPKI(Wireless Public Key Infrastructure)를 이용한 단대단(End-to-End) 시스템과 MVPN(Mobile Virtual Private Network)을 분석하고, 현재 국내에서 무선인터넷 서비스를 하고 있는 이동통신 사업자의 네트워크 환경을 분석하여, 우선적으로 이동통신망을 이용한 무선 인터넷에서의 보안 시스템에 대해 기술하고자 한다. 그리고 이동전화사업자와 단말기 업체들에 이어 종합 포털(portal)들도 호환성이 강점인 자바 기반의 ‘J2ME(Jave 2 Micro Edition)’을 사용하여 무선인터넷 플랫폼 최적화 움직임이 가속화되고 있는 추세에 맞추어, 본 논문에서는 무선 인터넷 서비스 방식 중 콘텐츠 프로그램의 서버 보관 등 타사 플랫폼과는 차별화된 서비스를 제공하기 때문에 이용자들에게 한층 더 향상된 무선인터넷 서비스를 이용할 수 있게 하는 J2ME 서비스를 기초로 한 단대단간의 보안 역할을 하는 중계보안시스템에 대해 논의하고자 하며, 향후 그 모듈의 일환으로 무선 암호 메시지 전송의 구현을 통하여 이를 현실화하고자 한다.

  • PDF

An Analysis of Low-Carbon Certification Premium of Fresh Agricultural Products on Online (온라인 거래 신선 농산물의 저탄소 인증 프리미엄 분석)

  • Lee, Choon-Soo;Kim, Hyeon-Seo;Kim, Hyeon-Sik;Oh, Jin-A
    • Korean Journal of Organic Agriculture
    • /
    • v.30 no.3
    • /
    • pp.375-391
    • /
    • 2022
  • This study investigated the online transaction status of low-carbon certified fresh agricultural products and analyzed the low-carbon certified premium. For two months from March to April 2022, eight products (rice, apple, pear, sweet persimmons, paprika, tomatoes, cherry tomatoes, and lettuce) were surveyed at major online shopping malls. The low-carbon certification premium was analyzed using hedonic price analysis model. As a result of the online market survey, the low-carbon certified agricultural products were not traded in the case of rice, cherry tomatoes, and paprika. And the proportion of low-carbon certified agricultural products in the case of tomatoes and lettuce was low. As a result of the low-carbon premium analysis, of the five products that analyzed the low-carbon certification premium, four products excluding pear did not have a low-carbon certification premium. Thus, it is necessary to expand the sale of the low-carbon certified agricultural products by distributors, and various efforts to secure the premium of certified agricultural products are important.

Simple Credit Card Payment Protocols Based on SSL and Passwords (SSL과 패스워드 기반의 신용카드 간편결제 프로토콜)

  • Kim, Seon Beom;Kim, Min Gyu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.563-572
    • /
    • 2016
  • Recently, a plenty of credit card payment protocols have been proposed in Korea. Several features of proposed protocols include: using passwords for user authentication in stead of official certificate for authenticity, and no need to download additional security module via ActiveX into user's devices. In this paper, we suggest two new credit card payment protocols that use both SSL(Security Socket Layer) as a standardized secure transaction protocol and password authentication to perform online shopping and payment. The first one is for the case where online shopping mall is different from PG(Payment Gateway) and can be compared to PayPal-based payment methods, and the second one is for the case where online shopping mall is the same as PG and thus can be compared to Amazon-like methods. Two proposed protocols do not require users to perform any pre-registration process which is separate from an underlying shopping process, instead users can perform both shopping and payment into a single process in a convenient way. Also, users are asked to input a distinct payment password, which increases the level of security in the payment protocols. We believe that two proposed protocols can help readers to better understand the recent payment protocols that are suggested by various vendors, and to analyze the security of their payment protocols.