WO2016089148A1 - 복수 구매자의 서비스 이용정보 관계성을 이용한 전자상거래 서비스 제공방법 - Google Patents
복수 구매자의 서비스 이용정보 관계성을 이용한 전자상거래 서비스 제공방법 Download PDFInfo
- Publication number
- WO2016089148A1 WO2016089148A1 PCT/KR2015/013180 KR2015013180W WO2016089148A1 WO 2016089148 A1 WO2016089148 A1 WO 2016089148A1 KR 2015013180 W KR2015013180 W KR 2015013180W WO 2016089148 A1 WO2016089148 A1 WO 2016089148A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- service
- usage information
- service usage
- user
- relationship
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/201—Price look-up processing, e.g. updating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/384—Payment protocols; Details thereof using social networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/01—Customer relationship services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0641—Shopping interfaces
Definitions
- the present invention relates to an e-commerce service providing method, and more particularly, to an e-commerce service providing method that enables secure ordering and payment and mobile finance using the relationship of the service usage information of a plurality of buyers.
- Electronic wallets operating on portable electronic devices at sales sites are being used for payment of goods and services and for financial services.
- various e-commerce software can be ordered and settled in the field.
- the electronic wallet made of software that is, a third party who is not an authorized person can access and steal in various ways, and the limit of use is handled in software, and the damage is enormous in case of an accident.
- the identity verification process is necessary. In many cases, it is necessary to enter a PIN number such as a password that only you can know, or to check whether your own electronic wallet is used by biometric technology such as fingerprint recognition in order to secure and secure payment. .
- the first problem to be solved by the present invention is to provide an e-commerce service providing method that enables secure order and payment by using the relationship of the service usage information of a plurality of buyers.
- the second problem to be solved by the present invention is to provide an electronic commerce service providing apparatus and server to enable secure ordering and payment by using the relationship of the service usage information of a plurality of buyers.
- the present invention provides a method for providing an e-commerce service, comprising: receiving service usage information of one service user; And whether there is another service user having a relationship with a service user who has received the service usage information, or whether there is another service user having a relationship with the service user having received the service usage information on the server. Requesting a search to receive a corresponding search result, and when there is another service user having the service usage information relationship, the service use security procedure of the service user having the service usage information relationship is adjusted by one or more steps It provides a method characterized in that it is maintained or maintained.
- the service usage information relation may be set to service users that can be determined as one group service user.
- the relationship between the service usage information, service users, the history of performing the group service use, mutually registered in the contact list, or at the same time in the place where the service is provided In case of being located together or identified by the service users as having relationship with each other, there is a history of using the service at one or more common places set for the service users or providing services among the service users. If the use of the service in the place corresponds to the use of the group service, the method may be set to the corresponding service users.
- the service usage information relationality from the history of using the service of the service users to perform a correlation analysis of whether the place using the service in the same time zone, derived through the correlation analysis If the result value is greater than or equal to the threshold, the method may be set to the corresponding service users.
- the correlation analysis may be a method characterized in that is performed through Cohen's Kappa analysis.
- the service usage security procedure is adjusted by omitting or adding one or more identity authentication procedures to one or more of the service users having the service usage information relationship. Can be.
- the present invention in order to solve the first problem, in the electronic commerce service providing method, a search request whether there is a service user who has received the service usage information from the electronic commerce service providing apparatus and another service user having a relationship between the service usage information Receiving step; Performing a search if there is another service user having a service usage information relationship with the service user; And a service usage security procedure of a service user having the service usage information relation when the result of performing the search is transmitted to the electronic commerce service providing apparatus or there is another service user having the service usage information relation. It provides a method comprising the steps of adjusting or maintaining.
- the present invention provides a method for providing an e-commerce service, comprising: receiving service usage information of one service user; And whether there is another service user having a relationship with a service user who has received the service usage information, or whether there is another service user having a relationship with the service user having received the service usage information on the server. And requesting a search to receive a corresponding search result, wherein the received service usage information is a service of service users having the service usage information relation when there is another service user having the service usage information relation.
- adjusting or maintaining one or more steps of a security procedure of a service user corresponding to the service usage information determined to be an error may be performed. It may be a method further comprising.
- the service usage information prediction value may be a method which is derived by a T-test or an Anova test.
- the present invention in order to solve the first problem, in the electronic commerce service providing method, a search request whether there is a service user who has received the service usage information from the electronic commerce service providing apparatus and another service user having a relationship between the service usage information Receiving step; Performing a search if there is another service user having a service usage information relationship with the service user; And a result of performing the search to the electronic commerce service providing apparatus or, if there is another service user having the service usage information relation, derived from service usage information of the service users having the service usage information relation. And determining whether there is an error in the received service usage information by using a service usage information prediction value.
- the service usage information of one service user, or having received the service usage information to the server has a service usage information relationship
- a communication unit which transmits a search request for the presence of another service user and receives a corresponding search result; And searching whether there is another service user having a relationship with the service user who has received the service usage information, or another service user having a relationship with the service user having received the service usage information at the server.
- the service use security procedure of the service user having the relationship of the service usage information is adjusted or maintained at least one step, The service usage information relation is provided to a service user that can be determined as a group service user.
- the service usage information of one service user, or having received the service usage information to the server has a service usage information relationship
- a communication unit which transmits a search request for the presence of another service user and receives a corresponding search result; And whether there is another service user having a relationship with the service user who has received the service usage information, or whether there is another service user having a relationship with the service user having received the service usage information at the server.
- a processing unit for requesting a search wherein the received service usage information is a service derived from service usage information of service users having the service usage information relation when there is another service user having the service usage information relation. It is determined whether there is an error using a usage information predicted value, and the service usage information relation is set to service users that can be determined as one group service user.
- the present invention in order to solve the second problem, in the e-commerce service providing server, the search request whether there is another service user having a relationship between the service user and the service usage information received from the electronic commerce service providing apparatus; A communication unit which receives a result of receiving the search or transmits the result of the search to the electronic commerce service providing apparatus; And a processing unit for searching whether there is another service user having a service use information relationship with the service user, and when there is another service user having the service use information relationship, the service having the service use information relationship.
- a server is characterized in that the service usage security procedure of the user is adjusted or maintained by one or more levels, and the service usage information relation is set to service users who can be determined as one group service user.
- the present invention in order to solve the second problem, in the e-commerce service providing server, the search request whether there is another service user having a relationship between the service user and the service usage information received from the electronic commerce service providing apparatus; A communication unit which receives a result of receiving the search or transmits the result of the search to the electronic commerce service providing apparatus; And a processing unit that performs a search for whether there is another service user having a relationship with the service user and the service usage information, wherein the received service usage information includes the service service information when there is another service user having the service usage information relationship. It is determined whether there is an error by using the service usage information predicted value derived from the service usage information of service users having the service usage relations, and the service usage relations of the service users that can be determined as one group service user. It provides a server characterized in that is set to.
- the identity verification process may be reduced or the verification process may be adjusted. . It is not necessary for each of the multiple buyers to repeat the identity verification process with the seller in the field, and the identity verification process can be specifically adjusted by the face-to-face contact of the multiple persons who are in the payment stage or indirect authentication by the site attendant.
- the buyer when the buyer directly inputs information necessary for various purchases during the purchase process, the purchaser may understand the context of purchase information of multiple buyers who are connected and shared with friends, and if the input information is found to be out of this, the buyer may reconfirm or visually Expresses the deviation from the context to help secure payment.
- FIG. 1 is a block diagram of an electronic commerce service providing apparatus and a server according to an embodiment of the present invention.
- FIG. 2 is a flowchart illustrating a method for providing an e-commerce service according to an embodiment of the present invention.
- 3 to 7 are flowcharts of a method for providing an e-commerce service according to another embodiment of the present invention.
- a method for providing an e-commerce service includes receiving service use information of one service user, and searching whether there is another service user having a relationship with the service user that received the service use information. Or requesting a search for whether a service user who has received the service usage information has another service user having a relationship with the service usage information, and receiving a corresponding search result. If there is a service user, the service use security procedure of the service user having the service use information relationship is adjusted or maintained by one or more steps.
- the service usage information may include at least one of a user identifier, a user's service session connection information, a user group identifier, a user order information, a user payment information, a user location information, a user's financial information, a user's financial usage information, and a user's financial usage request information. It may include.
- E-commerce services may include electronic payment services and financial services.
- FIG. 1 is a block diagram of an electronic commerce service providing apparatus and a server according to an embodiment of the present invention.
- the electronic commerce service according to an embodiment of the present invention may be implemented only by the electronic commerce service providing apparatus 110 or may be implemented through communication with the electronic commerce service providing apparatus 110 and the electronic commerce service providing server 120.
- the e-commerce service may be a service used for payment at a service providing place, such as an electronic wallet, and the service requires identity verification in payment. If multiple service users use the service at the same time, performing the identity verification process for payment to all service users degrades the usability of the electronic wallet, etc., and adjusts the identity verification process using the relationship of service usage information. Can improve the usability. In addition, an error may occur when a service user inputs service usage information. By using the service usage information relation, the service user context is identified between service users having a relationship with service usage information to prevent payment errors. can do.
- the process of searching for another service user having the service usage information relationship or the service usage information processing for the service users having the service usage information relationship may be performed only at the electronic commerce providing apparatus 110 or at the electronic commerce providing apparatus 110.
- the electronic commerce service providing server 120 may vary depending on the service provider's configuration or environment.
- the same components of the electronic commerce providing apparatus 110 or the electronic commerce service providing server 120 may correspond to each other.
- the same configuration performed in the electronic commerce providing apparatus 110 or the electronic commerce service providing server 120 differs only in the apparatus in which it is performed, and a detailed description of the configuration corresponds.
- processes necessary for providing a service other than those described below correspond to processes performed in an existing service providing system.
- the electronic commerce service providing apparatus 110 includes a communication unit 111 and a processing unit 112. It may further include one or more storage.
- the electronic commerce service providing apparatus 110 may be a terminal of a service user or a terminal of a service provider. Or it may be a device installed in the service provider. When the electronic commerce service providing apparatus 110 is implemented as a terminal, it may be implemented through an application.
- the communication unit 111 receives the service usage information of one service user, or transmits a search request to the server to see if there is another service user having a relationship with the service user who has received the service usage information, and the corresponding search result.
- the communication unit 111 receives service use information of one service user using the service.
- the service usage information is information using a service, and includes information about an identifier or location information of a user, membership information, information on a service used or used by the user, or whether the user is a contact list, a group service user, or a group service. Information, service provider or service provider location.
- the service input information may be received from the outside through a user's input or wired or wireless communication.
- the communication unit 111 transmits a corresponding search request to the server and searches the server to check whether there is another service user having a relationship with the service user having received the service usage information. Can be. Alternatively, the server can receive the processed result.
- the communication unit 111 may be a communication unit of the terminal.
- the processing unit 112 searches whether there is another service user having a relationship with the service user who has received the service usage information, or the service user having received the service usage information at the server. Branches request a search for other service users.
- the communication unit 111 searches whether there is another service user having a relationship with the service user who has received the service usage information.
- the service usage information relation is established for service users that can be determined as one group service user. In the case where there is one service user and other service users that can be judged as a group service user, in order to provide the service as a group service user to the service users, the service usage information relation is used by using the service use information of one service user. Search for other service users with.
- the search may be performed in the electronic commerce service providing apparatus 110 or may be performed through a server. When the search is performed through the server, the communication unit 111 requests the server to search whether there is another service user having a relationship with the service user who has received the service usage information.
- the service usage information relationship is a relationship between the service users, the history of performing a group service use, registered in the contact list of each other, co-located in the same time zone at the place of providing the service, or by the service users If it is confirmed that there is a relationship between the service usage information between each other, it may be set to the corresponding service users.
- the service usage information relation is established to service users who can be judged as one group service user, and in order to judge as one group service user, there is a history of performing group service use or is registered in the contact list of each other. It is determined whether or not the service providing information is located at the same time zone in the place where the service is provided or by the service users.
- the group service user determines the group service user by giving relations of the service use information to the corresponding service users.
- the contact list may use a contact list stored in the terminal.
- the service providing place is located together at the same time zone, it is determined that the corresponding service users have visited the place together, so that the service user information relationship can be established between the service users.
- the same time zone may be within a time range used for sequentially using a service such as a payment. For example, it may be set to 5 minutes or 30 minutes.
- a request may be made to check a relationship between service usage information between users or a service usage information relation may be set.
- Tagging using QR code, NFC tagging, barcode, etc., or beacons installed in the field wireless communication with the terminal can be recognized on-site arrival. If the arrival of the service provider is recognized as tagging and beacon communication, one service user arrives at the service provider in the above manner, then leaves the service provider or before the end of payment, another service user arrives at the service provider. After the tagging or beacon recognition, the time zone before leaving the service providing place or before the end of payment can be determined as the same time zone. The time and location can be confirmed using the GPS of the terminal.
- the group composition request and confirmation procedure is a group composition request and confirmation procedure for using a service.
- a first user designates a second user and sends a group composition request
- information of the first user is displayed to the second user.
- the second user confirms the first user and then accepts the organization.
- This procedure can vary depending on the level of service usage relationship, for example, if the service usage relationship between two users is found to be above the threshold for organizational requirements, the second user is automatically transferred to the first service of the group user. Can be accepted.
- the threshold setting level and the relationship of the derived service usage information only the group composition request is automatically shown to the user, and the intention of accepting the final group can be received from each user.
- the service usage information relation between the corresponding service users may be established and determined as a group service user.
- Service users who are determined to be group service users can send money to each other as well as to group orders and payments.
- Remittance can also be adjusted for security and authentication levels. If there is a remittance history for the remittance service user and the user to whom the remittance is intended, and the relationship of usage information above the safe threshold is derived from the remittance history, for example, if a pattern is formed by periodically remitting at a certain level, Set the identity verification process to be additionally performed at the user's remittance stage.
- the user may omit the additional identification process at the end of receiving the remittance, that is, the final receiving step.
- the user may be set to omit an additional authentication process for the remittance between the two users.
- the usage information relationship used for the remittance service may be generated by reflecting the location-based information. That is, the user may be set in a situation where the user is recognized as one place at the time of remittance, that is, in a situation in which the situation may be determined to face each other.
- a remittance service when a user inputs a remittance amount by designating a counterpart user whom he / she wants to remit, it may be determined whether a statistically significant pattern exists in relation to the counterpart user. If there is a significant pattern, it is determined whether the amount to be remitted is out of the past remittance pattern for the other user. That is, in the past remittance pattern, if the service usage information is analyzed to be mainly a remittance amount less than 100,000 won, it may be determined that the transaction is abnormal when 1 million won is input as the remittance amount.
- remittance amount determined to detect an abnormal transaction may vary. For example, remittance of 1 million won may be determined to detect an abnormal transaction for the counterpart A, but may be determined to be a normal deal for the counterpart B. If it is determined to be a normal transaction, no additional certification procedure or amount verification request will be fulfilled. As such, it is possible to detect an abnormal transaction of the corresponding user by using service usage information derived differently according to the counterpart.
- the service usage information relation is provided to the service users when there is a history of using the service at one or more common places that provide the service among the service users, and the use of the service at the place corresponds to the use of the group service. Can be set.
- the service usage information relation may be confirmed through past purchase history and set up for service users. If there is a history of using the service at one or more common places providing the service among the service users, and the use of the service at the place corresponds to the use of the group service, the service usage information relation may be established. If there is a history of using the service at one or more common places, and corresponding to the use of the group service rather than the coincidence of the service use history, it may be set to the corresponding service users. If the history of using the service in a common place is repeated or the history of using the service in a plurality of places is duplicated, the service usage information relation may be set.
- the relationship of the service usage information is to perform a correlation analysis on whether or not the place using the service in the same time zone from the history of using the service of the service users, and if the result value derived through the correlation analysis is greater than or equal to the threshold value, the corresponding service Can be set for users. Correlation analysis can be used to derive more objective service usage information relationship. In order to confirm the service usage information relationship by using the service usage information of the past, when the places where the service is used in the same time zone are matched from the history of using the service of the service users, this case is the same with the service usage relation.
- a correlation analysis is performed on historical information located at the same place at the same time zone, and when the result value derived through the correlation analysis is greater than or equal to a threshold value, Can be set for the service users.
- a correlation between service users and service usage information is calculated, and when the result value obtained through the correlation analysis is greater than or equal to a threshold value, the service usage information relation is set to the corresponding service users.
- the correlation analysis may be performed through Cohen's Kappa analysis.
- the service use security procedure of the service user having the service usage information relationship is adjusted or maintained by one or more steps.
- service users having a relationship with service usage information may grant security through mutual confirmation, and thus, the service users may adjust or maintain the service usage security procedure by one or more steps.
- Coordination of service usage security procedures may be performed for all or some of the service users. That is, when the security process for one person is completed, it is possible to maintain or omit the authentication process for other service users. On the contrary, if the relationship between the service usage information is not confirmed, the authentication process may be maintained or added to provide a secure service. If security is ensured, one or more steps can be omitted or maintained. If security is not secured, one or more steps can be added or maintained.
- Adjustment of the security procedure may be performed at the electronic commerce service providing apparatus when the security procedure is performed at the electronic commerce service providing apparatus, or may be performed at the electronic commerce service providing server when the security procedure is performed at the electronic commerce service providing server. Coordination of security procedures may vary depending on the type and number of security procedures for service use.
- the electronic wallet of the terminal that is currently performing payment is not used by others due to theft. It can be judged that it is not a situation that is happening between buyers. Therefore, the identity verification process can be adjusted or reduced to be performed differently than the purchaser uses alone, or conversely, it can be strengthened in the case of single purchase compared to the case of joint purchase.
- a user has a common purchase history at a purchase site or a contact list is registered among the e-wallet or e-commerce function, there is a function that is automatically registered as a mutual acquaintance.
- There is a method of verifying the relationship that can be used to replace identity verification when payment is made later through the step of registering as a joint purchaser where the purchase step by is shared as an acquaintance authentication security method, and based on the relationship secured here Adjust your security steps.
- Buyer 1, Buyer 2, and Buyer 3 may have used Store A, Store B, and Store C during certain inevitable conditions. You may have visited a restaurant or a food and beverage store near your workplace in the same department at the same workplace.
- the security verification step can be adjusted by recommending and linking Buyer 1, Buyer 2, and Buyer 3 as an acquaintance co-buyer.
- Buyer 1, Buyer 2, and Buyer 3 may be members of the same organization even though there is no relationship, and only contact lists are registered as employees of the same organization. Thus, a visit between shop A, shop B and shop C in the same building during the same time period can be considered to be due to chance. In this case, it is not recommended to connect as a co-buyer, and furthermore, when a co-buyer is connected, it is not possible to verify the identity verification with each other.
- the statistical data of each shopper visiting each store can be used to determine whether the common purchase history is due to contingency or necessity due to acquaintance relationship, within the range of statistical error.
- One of the methods is to calculate the Cohen's Kappa coefficients for each of two people and use one of the arithmetic values that eliminates contingency by common decision making. Only when the Cohen's Kappa coefficient of each two-member combination is above the threshold set can be judged that the common purchase history is due to the intentional selection of each buyer. Therefore, it can be judged that it is due to acquaintance relations, and it is possible to carry out the purchase procedure as it is possible to authenticate each other by connecting as a joint purchaser.
- Buyer 1,2,3 Cohen's for the purpose of judging intentional simultaneous visits or coincidences by coincidences by the actual acquaintances of Buyer 1 and Buyer 2 in statistical data using this store A, B, and C at the same time.
- Statistical quantitative measurements can be made using Kappa coefficients.
- the Cohens Kappa coefficient can be calculated as follows if the number of purchases of shops A, B and C of Buyer 1 and Buyer 2 is equal to
- Buyer 1,2,3 Cohen's for the judgment of intentional simultaneous visits by the actual acquaintances of Buyer 1 and Buyer 3 or coincidences by chance in the historical data using shops A, B, and C at the same time.
- Statistical and quantitative measurements can be made using Kappa coefficients.
- the Cohens Kappa coefficient can be calculated as follows if the number of purchases of shops A, B and C of Buyer 1 and Buyer 3 at the same time is as follows.
- the purchase history of Buyer 1 and Buyer 2 has been difficult to judge that the Cohen's Kappa coefficient is 0.275 and the threshold is 0.5. It is statistically determined by both a close visit and an intentional simultaneous visit. Based on this judgment, when buyer 1 and buyer 3 simultaneously visit the store, the two buyers can judge that they can authenticate each other face to face, so the electronic wallet terminal can be judged as being safely used by me. , Recommend buyer connections, and adjust or mitigate your security verification procedures, if any. On the contrary, if the Cohen's Kappa index is below the threshold, it is determined that the history of the two buyers is close to the simultaneous store visit due to coincidence, and it is also determined that the identity of the terminal between the two buyers cannot be mutually confirmed. Do not adjust or enforce security levels.
- common purchasing information can be determined logically and arithmetically to recommend joint purchase connection with friends and adjust security level.
- arithmetically determining the relationship buyers who share a contact list compare the difference between the number of users who were connected to the co-buyer and the number that was not connected to the co-buyer when used in the same store. It is possible to determine whether security authentication is possible.
- Buyer 1 goes through the identity verification process, it can provide a function to adjust the identity verification process of the buyer 2 connected.
- the user may provide a function for adjusting the security procedure.
- the relationship of service usage information may be derived for the established organization.
- the service usage information received by the communication unit 111 is a service usage information prediction derived from past joint service usage information of service users having the service usage information relations when there are other service users having the service usage information relations. It is determined whether there is an abnormal pattern in the service usage information by using the value.
- the communication unit 111 determines whether there is an abnormal pattern in the service usage information received.
- the joint service usage information is used among the past service usage information of the plurality of service users. Objectivity can be derived from past service usage information of a plurality of service users, and mutual check is possible, thereby increasing safety.
- the service usage information prediction value derived from the past joint service usage information of the service users having a relationship with the service usage information, a criterion for determining whether the service usage information is correct is set; Determine that there is an error in the information.
- the service usage information prediction value may be derived by a T-test or an Anova test.
- Determination of the abnormal pattern for the service usage information may be made in the electronic commerce service providing apparatus or the electronic commerce service providing server. Where to determine whether the abnormal pattern for the service usage information is made according to the setting or environment of the service provider.
- the service user may be requested to confirm or re-enter the service usage information, or may adjust or maintain a security procedure such as identity authentication by one or more steps.
- a security procedure such as identity authentication by one or more steps.
- the received service usage information deviates from a criterion derived from the service usage information prediction value, it is determined that the received service usage information shows an abnormal pattern, and requests the corresponding service user to confirm or re-enter the service usage information.
- an abnormal pattern occurs in the service usage information may vary. The service user may incorrectly input the service usage information, or a distortion or error of the service usage information may occur through a security attack such as hacking, or a third party may use the service.
- the service user may be requested to confirm or re-enter the service usage information, or the security procedure may be adjusted or maintained by one or more steps.
- a security procedure may be adjusted or maintained by one or more steps in order to request the service user to confirm or re-enter the service usage information or to increase the safety of service use.
- Coordinating security procedures can be done based on service usage relationships.
- the service usage information relationship or the service usage information prediction value may be provided as a weighting factor in detecting, analyzing, and calculating whether there is an abnormality in the financial transaction behavior of the corresponding group service user.
- Security procedures can be adjusted accordingly.
- the service usage information relation may be derived by reflecting the analysis result of the financial transaction behavior already analyzed, and the security procedure may be adjusted according to the derived service usage information relation.
- a context is information that can be obtained in any situation occurring with context information and is information derived from service usage information of service users having the service usage information relation.
- the context may be derived from a service usage information prediction value derived from service usage information of service users, and the context may be a criterion for determining whether the service usage information is correct.
- the service usage information used to derive the context may be past or present service usage information.
- the context may be a numerical value equal to the service usage information prediction value or a condition derived from the service usage information prediction value.
- Buyer 1 is 1, Buyer 2 is 2, and Buyer 3 is 33. If you enter, you can recognize the possibility that the purchaser 3 made an error in the context of the input value of the acquaintance in various ways and implement the verification procedure.
- One statistical method is to use the mean and the standard deviation, which calculates the average value of 12 and the standard deviation of 14.85, where buyer 3 enters values outside the standard deviation range of -2.85 and 26.85, i.e. 33 You can ask Buyer 3 to confirm re-entry by determining that you may have mistyped.
- the common context is recognized only for data that does not show statistically significant difference among the purchase information of each buyer through T Test or ANOVA Test. They may set the context to not make statistically significant inputs to each other, and may only implement this error prevention procedure if they make other inputs with large differences. For example, by using the purchase history of Buyer 1 and Buyer 3, the average and variance of the input values of Buyer 1 and Buyer 3 can be obtained, and through the T test, Buyer 1 and Buyer 3 can find statistically significant difference between input values. You can check if it is visible. If there has not been a statistically significant difference in the meantime, it is likely that the buyer 3 entered 33 this time is an input error, thus enhancing the verification process for safe input.
- T Test examples of T Test are as follows.
- Buyer 2 purchase amount 5000 5500 5500 5000 6000 4000 4000 4000 5000 5000 5000 6000 5500 4500 4000 4500 5000 5000
- the P-value is 0.594264016, which is above the threshold of 0.05, so we can conclude that the two buyers have made a purchase with a statistically similar purchase price. Can be generated.
- An example of using a common context for a purchase amount when two buyers are connected later is as follows. The purchase context between the two buyers is that the purchase amount of the two buyers is not significantly different. However, if Buyer 1 enters 5000 while Buyer 2 enters 15000, the two buyers deviate from the standard that the amount of money entered normally is not large. Therefore, in this case, the purchaser 2 can be executed to confirm the entered amount.
- the P value is 0.959737 and above the threshold of 0.05, it can be concluded that the three buyers have made a purchase with statistically similar purchase quantity, and the common context for the quantity of purchases that can be used for the safety decision criteria between the three buyers can be concluded. Can be generated.
- the purchase context of the three buyers is that the purchase quantity of the three buyers does not show much difference. However, if Buyer 1 enters 3 and Buyer 3 enters 33, the three buyers deviate from the standard that the difference in the amount of money normally entered is not large. Therefore, in this case, the purchaser 3 can be executed to confirm the entered quantity.
- Another example is to use the age of the purchaser's member information as a purchasing context. For example, if buyer 1's age is 10 and buyer 2's age is 40, buyer 1 is relatively higher than buyer 2.
- Buyer 1 and Buyer 2 can perform the procedures of verifying and re-entering identity verification or payment information input.
- the electronic commerce service providing server 120 may include a communication unit 121 and a processing unit 122, and may include one or more storage units.
- the communication unit 121 is requested to search whether there is another service user having a relationship between the service user who has received the service usage information from the electronic commerce service providing apparatus 110 and the service usage information, or the result of performing the search. Send to the service providing apparatus.
- the communication unit 121 is requested to search whether there is another service user having a service usage information relationship with the service user who has received the service usage information from the electronic commerce service providing apparatus 110.
- the processing unit 122 may transmit the search result to the electronic commerce service providing apparatus 110.
- the processing unit 122 may transmit the result.
- the processing unit 122 searches whether there is another service user having a relationship with the service user and the service usage information.
- a search is performed to see if there is another service user having a relationship with the service user.
- the service usage information relation is established for service users that can be determined as one group service user.
- the service usage security procedure of the service user having the service usage information relation is adjusted or maintained by one or more steps.
- the adjustment of the service use security procedure may be performed in the electronic commerce service providing apparatus 110 or the electronic commerce service providing server 120.
- the received service usage information is predicted from the service usage information of the service usage information of the service users having the service usage information relation.
- the value can be used to determine if there is an error.
- the service usage information relation is used to determine whether the service usage information is in error. Determination of the error of the service usage information may be made in the electronic commerce service providing apparatus 110 or the electronic commerce service providing server 120.
- the description of the adjustment of the service use security procedure of the e-commerce service providing server 120 or the determination of the error of the service use information is described in the adjustment of the service use security procedure of the e-commerce service providing apparatus 110 or the error of the service use information. Corresponds to the description of.
- FIG. 2 is a flowchart of a method for providing an e-commerce service according to an embodiment of the present invention, which is provided in an electronic commerce service providing apparatus.
- step 210 service usage information of one service user is received.
- the service usage information of one service user using the service is received.
- the detailed description of this step corresponds to the detailed description of the communication unit 111 of FIG. 1, and overlapping descriptions will be replaced with the detailed description of the communication unit 111 of FIG. 1.
- step 220 it is searched whether there is another service user having a relationship with the service user who has received the service usage information, or another service user having a relationship with the service user who has received the service usage information on the server. There is a step of receiving a search result by requesting a search.
- search whether there is another service user having a service usage information relation with the service user who has received the service usage information may be performed through a server.
- the search may be performed to request whether the server has another service user having a relationship with the service user who has received the service usage information, and receive a corresponding search result.
- the service usage information relation may be established for service users who can be determined as one group service user.
- the service usage information relationship is a relationship between the service users, the history of performing a group service use, registered in the contact list of each other, co-located in the same time zone at the place of providing the service, or by the service users If it is confirmed that there is a relationship between the service usage information between each other, it may be set to the corresponding service users.
- the service usage information relation may be set for the service users when there is a history of using the service at one or more common places providing the service among the service users, and when the use of the service at the place corresponds to the use of the group service. have.
- Correlation analysis is performed on whether or not the location of the service using the service in the same time zone from the history of the service users of the service users, and if the result value derived through the correlation analysis is more than a threshold value, it can be set to the corresponding service users have.
- the correlation analysis may be performed through Cohen's Kappa analysis.
- step 220 if there is another service user having the service usage information relationship, the service use security procedure of the service user having the service usage information relationship is adjusted or maintained by one or more steps.
- FIG. 3 is a flowchart illustrating a method for providing an e-commerce service according to an exemplary embodiment of the present invention, which is provided by an e-commerce service providing server.
- a search request is received for whether a service user who has received the service usage information from the e-commerce service providing apparatus has another service user having a relationship with the service usage information.
- the detailed description of this step corresponds to the detailed description of the communication unit 121 of FIG. 1, and overlapping descriptions will be replaced with the detailed description of the communication unit 121 of FIG. 1.
- step 320 a search is performed to see if there is another service user having a relationship with the service user.
- the detailed description of this step corresponds to the detailed description of the processing unit 122 of FIG. 1, and overlapping descriptions will be replaced with the detailed description of the processing unit 122 of FIG. 1.
- step 330 the service usage security procedure of the service user having the service usage information relation is provided by one or more steps when the search result is transmitted to the e-commerce service providing apparatus or when there is another service user having the service usage information relation. It is a step to adjust or maintain.
- the detailed description of this step corresponds to the detailed descriptions of the communication unit 121 and the processing unit 122 of FIG. 1, and overlapping descriptions will be provided with the detailed description of the communication unit 121 and the processing unit 122 of FIG. 1. Instead.
- 4 to 6 are flowcharts of a method for providing an electronic commerce service according to another embodiment of the present invention, which is provided in the electronic commerce service providing apparatus.
- step 410 service usage information of one service user is received.
- the detailed description of this step corresponds to the detailed description of step 210 of FIG. 2.
- step 420 a search is made whether there is another service user having a relationship with a service user who has received the service usage information, or another service user having a relationship with a service user who has received the service usage information on a server.
- step 420 There is a step of receiving a search result by requesting a search.
- the service usage information relation may be established for service users who can be determined as one group service user.
- the service usage information relationship is a relationship between the service users, the history of performing a group service use, registered in the contact list of each other, co-located in the same time zone at the place of providing the service, or by the service users If it is confirmed that there is a relationship between the service usage information between each other, it may be set to the corresponding service users.
- the service usage information relation may be related to whether or not the location of the service using the service in the same time zone from the history of using the service when there is a history of using the service at one or more common places providing the service among the service users. If the correlation analysis is performed, and the result value obtained through the correlation analysis is greater than or equal to a threshold value, the corresponding service user is set, and the correlation analysis may be performed through Cohen's Kappa analysis.
- the received service using the service usage information prediction value derived from the service usage information of the service users having the service usage information relationship Determine whether there is an error in the usage information.
- the service usage information relation is used to determine whether there is an error in the service usage information.
- a service usage information prediction value is derived using service usage information of a plurality of service users, and the service usage information prediction value is used to determine whether there is an error in the received service usage information.
- the service usage information prediction value may be derived by a T-test or an Anova test. The detailed description of this step corresponds to the detailed description of the processing unit 112 of FIG. 1, and the detailed description of the processing unit 112 will be replaced with the detailed description of the processing unit 112 of FIG. 1.
- step 510 when it is determined that there is an error in the received service usage information, a step of requesting confirmation or re-entry of service usage information is requested to a service user corresponding to the service usage information determined to be in error.
- the service user corresponding to the service usage information determined to be in error may request confirmation or re-entry of the service usage information.
- the input of the service usage information may be wrong or an error may occur during the reception process. Therefore, the service user may be requested to confirm this.
- the detailed description of this step corresponds to the detailed description of the processing unit 112 of FIG. 1, and the detailed description of the processing unit 112 will be replaced with the detailed description of the processing unit 112 of FIG. 1.
- step 610 if it is determined that there is an error in the received service usage information, the step of adjusting or maintaining one or more steps of a security procedure of a service user corresponding to the service usage information determined to be an error.
- the security procedure of the service user corresponding to the service use information determined to be the error may be adjusted or maintained by one or more steps. If a third party tries to use the service or is concerned about a security attack such as hacking, the security procedure of the service user corresponding to the service use information determined to be the error may be adjusted or maintained by one or more steps.
- the detailed description of this step corresponds to the detailed description of the processing unit 112 of FIG. 1, and the detailed description of the processing unit 112 will be replaced with the detailed description of the processing unit 112 of FIG. 1.
- FIG. 7 is a flowchart illustrating a method for providing an e-commerce service according to an embodiment of the present invention, which is provided by an e-commerce service providing server.
- a search request is received for whether there is another service user having a service use information relationship with the service user who has received the service use information from the electronic commerce service providing apparatus.
- the detailed description of this step corresponds to the detailed description of the communication unit 121 of FIG. 1, and overlapping descriptions will be replaced with the detailed description of the communication unit 121 of FIG. 1.
- a search is performed to see if there is another service user having a relationship with the service user.
- the detailed description of this step corresponds to the detailed description of the processing unit 122 of FIG. 1, and overlapping descriptions will be replaced with the detailed description of the processing unit 122 of FIG. 1.
- the service usage derived from the service usage information of the service users having the service usage information relation is provided. It is a step of determining whether there is an error using the information prediction value.
- the detailed description of this step corresponds to the detailed descriptions of the communication unit 121 and the processing unit 122 of FIG. 1, and overlapping descriptions will be provided with the detailed description of the communication unit 121 and the processing unit 122 of FIG. 1. Instead.
- Embodiments of the present invention may be implemented in the form of program instructions that can be executed by various computer means and recorded in a computer readable medium.
- the computer readable medium may include program instructions, data files, data structures, etc. alone or in combination.
- Program instructions recorded on the media may be those specially designed and constructed for the purposes of the present invention, or they may be of the kind well-known and available to those having skill in the computer software arts.
- Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tape, optical media such as CD-ROMs, DVDs, and magnetic disks, such as floppy disks.
- Examples of program instructions include not only machine code generated by a compiler, but also high-level language code that can be executed by a computer using an interpreter or the like.
- the hardware device described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
구매자 2 A | 구매자 2 B | 구매자 2 C | |
구매자 1 A | 1 | 2 | 1 |
구매자 1 B | 2 | 1 | |
구매자 1 C | 1 | 2 |
구매자 3 A | 구매자 3 B | 구매자 3 C | |
구매자 1 A | 2 | 1 | |
구매자 1 B | 4 | 1 | |
구매자 1 C | 2 |
구매자1 구매금액 | 구매자2 구매금액 |
5000 | 5500 |
5500 | 5000 |
6000 | 4000 |
4000 | 4000 |
5000 | 5000 |
5000 | 6000 |
5500 | 4500 |
4000 | 4500 |
5000 | 5000 |
구매자1 구매금액 | 구매자2 구매금액 | |
평균 | 5000 | 4833.333333 |
분산 | 437500 | 437500 |
관측수 | 9 | 9 |
피어슨 상관 계수 | 0.071428571 | |
가설 평균차 | 0 | |
자유도 | 8 | |
t 통계량 | 0.554700196 | |
P(T<=t) 단측 검정 | 0.297132008 | |
t 기각치 단측 검정 | 1.859548038 | |
P(T<=t) 양측 검정 | 0.594264016 | |
t 기각치 양측 검정 | 2.306004135 |
구매자1 구입수량 | 구매자2 구입수량 | 구매자3 구입수량 |
63 | 73 | 82 |
68 | 88 | 90 |
87 | 81 | 81 |
53 | 71 | 85 |
75 | 81 | 74 |
58 | 48 | 76 |
69 | 81 | 75 |
33 | 81 | 81 |
61 | 83 | 76 |
58 | 76 | 82 |
46 | 77 | 83 |
45 | 69 | 82 |
67 | 62 | 72 |
63 | 65 | 81 |
67 | 75 | 79 |
66 | 60 | 75 |
60 | 90 | 77 |
86 | 59 | 79 |
65 | 76 | 74 |
84 | 74 | 81 |
인자의 수준 | 관측수 | 합 | 평균 | 분산 |
구매자1 구입수량 | 20 | 1274 | 63.7 | 182.2211 |
구매자2 구입수량 | 20 | 1470 | 73.5 | 111.4737 |
구매자3 구입수량 | 20 | 1585 | 79.25 | 19.35526 |
변동의 요인 | 제곱합 | 자유도 | 제곱평균 | F비 | P 값 | F기각치 |
처리 | 2472.7 | 2 | 1236.35 | 11.88608 | 0.00005 | 3.158843 |
잔차 | 5928.95 | 57 | 104.0167 | |||
계 | 8401.65 | 59 |
구매자1 구입수량 | 구매자2 구입수량 | 구매자3 구입수량 |
4 | 3 | 3 |
3 | 4 | 4 |
4 | 2 | 2 |
5 | 4 | 4 |
2 | 5 | 3 |
2 | 2 | 4 |
3 | 3 | 3 |
2 | 2 | 3 |
인자의 수준 | 관측수 | 합 | 평균 | 분산 |
구매자1 구입수량 | 8 | 25 | 3.125 | 1.267857 |
구매자2 구입수량 | 8 | 25 | 3.125 | 1.267857 |
구매자3 구입수량 | 8 | 26 | 3.25 | 0.5 |
변동의 요인 | 제곱합 | 자유도 | 제곱평균 | F비 | P 값 | F기각치 |
처리 | 0.083333 | 2 | 0.041667 | 0.041176 | 0.959737 | 3.4668 |
잔차 | 21.25 | 21 | 1.011905 | |||
계 | 21.33333 | 23 |
Claims (14)
- 전자상거래 서비스 제공방법에 있어서,적어도 1인의 전자상거래 서비스 이용자의 서비스 이용정보를 수신하는 단계;상기 수신된 서비스 이용정보에 기초하여 서비스 이용정보 관계성을 도출하는 단계;상기 도출된 서비스 이용정보 관계성에 기초하여 서비스 이용자 단체를 형성하는 단계; 및상기 서비스 이용자 단체에 속하는 모든 서비스 이용자에 대한 본인 인증 절차를 이행하여 본인 인증을 완료하는 단계를 포함하고,상기 본인 인증을 완료하는 단계는 상기 서비스 이용정보 관계성에 기초하여 상기 서비스 이용자 별로 기본 본인 인증 절차 대비 동일 또는 더 간략한 인증 절차를 이행하거나 별도의 인증 절차 없이 본인 인증을 완료하는 단계를 더 포함하고,상기 전자상거래 서비스는 전자결제 서비스를 포함하고,상기 서비스 이용정보 관계성은 상기 수신된 서비스 이용정보 중 동일한 서비스 이용자 단체에 속하여 서비스를 이용한 이력에 근거하여 도출되는 것을 특징으로 하는 방법.
- 제1항에 있어서,상기 본인 인증 절차는 서비스 이용자 단체에 속하는 이용자의 결제 비밀번호를 입력받고 인증하는 절차인 것을 특징으로 하는 방법.
- 제3항에 있어서,상기 서비스 이용정보 관계성은,상기 서비스 이용자들의 서비스를 이용한 이력들로부터 동일 시간대에 서비스를 이용한 장소의 일치 여부에 대한 상관분석을 수행하고, 상기 상관분석을 통해 도출되는 결과 값이 임계치 이상인 경우, 해당 서비스 이용자들에게 설정되는 것을 특징으로 하는 방법.
- 제3항에 있어서,상기 상관분석은 코헨스 카파(Cohen's Kappa) 분석을 통해 수행되는 것을 특징으로 하는 방법.
- 제1항에 있어서,상기 서비스 이용자 단체를 형성하는 단계는 상기 서비스 이용자 단체에 편입되는 것을 수락하는 의사를 확인하는 수락 의사 확인 절차를 포함하고,상기 수락 의사 확인 절차를 구성하는 단계의 수는 상기 서비스 이용정보 관계성의 수준에 기반하여 가변적인 것을 특징으로 하는 방법.
- 전자상거래 서비스 제공방법에 있어서, 서비스 제공 장치가,적어도 1인의 전자상거래 서비스 이용자의 서비스 이용정보를 수신하는 단계;서버에 상기 수신된 서비스 이용정보와 서비스 이용정보 관계성을 갖는 서비스 이용자를 검색해 줄 것을 요청하는 단계;상기 서버로부터 상기 검색 결과를 수신하는 단계; 및상기 수신된 검색 결과에 기초하여 서비스 이용자 단체를 형성하는 단계;상기 서비스 이용자 단체에 속하는 모든 서비스 이용자에 대한 본인 인증 절차를 이행하여 본인 인증을 완료하는 단계를 포함하고,상기 본인 인증을 완료하는 단계는 상기 서비스 이용정보 관계성에 기초하여 상기 서비스 이용자 별로 기본 본인 인증 절차 대비 동일 또는 더 간략한 인증 절차를 이행하거나 별도의 인증 절차 없이 본인 인증을 완료하는 단계를 더 포함하고,상기 전자상거래 서비스는 전자결제 서비스를 포함하고,상기 서비스 이용정보 관계성은 상기 수신된 서비스 이용정보 중 동일한 서비스 이용자 단체에 속하여 서비스를 이용한 이력에 근거하여 도출되는 것을 특징으로 하는 방법.
- 전자상거래 서비스 제공방법에 있어서,적어도 1인의 전자상거래 서비스 이용자의 서비스 이용정보를 수신하는 단계;상기 수신된 서비스 이용정보에 기초하여 서비스 이용정보 관계성을 도출하는 단계;서비스 이용자 단체를 형성하는 단계;상기 서비스 이용자 단체에 속하는 이용자들로부터 주문 내역을 수신하는 단계;상기 서비스 이용정보 관계성에 기초하여 상기 서비스 이용자 단체에 속하는 이용자들의 서비스 이용정보를 분석하는 단계;상기 서비스 이용자 단체에 속하는 모든 서비스 이용자에 대한 본인 인증 절차를 이행하여 본인 인증을 완료하는 단계를 포함하고,상기 본인 인증을 완료하는 단계에서, 상기 분석된 서비스 이용정보 중 공동 서비스 이용정보에서 비정상 패턴을 보인 서비스 이용정보를 송신한 서비스 이용자에에 대해서는 기본 본인 인증 절차보다 강화된 본인 인증 절차를 이행하고, 상기 분석된 공동 서비스 이용정보 중 공동 서비스 이용정보에서 비정상 패턴을 보이지 않은 서비스 이용정보를 송신한 서비스 이용자들에 대해서는 상기 기본 본인 인증 절차와 동일 또는 더 간략한 인증 절차를 이행하거나 별도의 인증 절차 없이 본인 인증을 완료하는 단계를 더 포함하고,상기 전자상거래 서비스는 전자결제 서비스를 포함하고,상기 서비스 이용정보 관계성은 상기 수신된 서비스 이용정보 중 동일한 서비스 이용자 단체에 속하여 서비스를 이용한 이력에 근거하여 도출되는 것을 특징으로 하는 방법.
- 제7항에 있어서,상기 서비스 이용정보를 분석하는 단계는,티-테스트(T-test) 또는 아노바 테스트(Anova test)를 수행하는 것을 특징으로 하는 방법.
- 제 1 항 내지 제 8 항 중에 어느 한 항의 방법을 컴퓨터에서 실행시키기 위한 프로그램을 기록한 컴퓨터로 읽을 수 있는 기록매체.
- 전자상거래 서비스 제공장치에 있어서,적어도 1인의 전자상거래 서비스 이용자의 서비스 이용정보를 수신하는 통신부;상기 수신된 서비스 이용정보에 기초하여 서비스 이용정보 관계성을 도출하고,상기 도출된 서비스 이용정보 관계성에 기초하여 서비스 이용자 단체를 형성하고,상기 서비스 이용자 단체에 속하는 모든 서비스 이용자에 대한 본인 인증 절차를 이행하여 본인 인증을 완료하는 처리부를 포함하되,상기 본인 인증 절차는 상기 서비스 이용정보 관계성에 기초하여 상기 서비스 이용자 별로 기본 본인 인증 절차 대비 동일 또는 더 간략한 인증 절차를 이행하거나 별도의 인증 절차 없이 본인 인증을 수행하는 절차이고,상기 전자상거래 서비스는 전자결제 서비스를 포함하고,상기 서비스 이용정보 관계성은 상기 수신된 서비스 이용정보 중 동일한 서비스 이용자 단체에 속하여 서비스를 이용한 이력에 근거하여 도출되는 것을 특징으로 하는 전자상거래 서비스 제공장치.
- 전자상거래 서비스 제공장치에 있어서,적어도 1인의 전자상거래 서비스 이용자의 서비스 이용정보를 수신하는 통신부;서버에 상기 수신된 서비스 이용정보와 서비스 이용정보 관계성을 갖는 서비스 이용자를 검색해 줄 것을 요청하고,상기 서버로부터 상기 수신된 검색 결과에 기초하여 서비스 이용자 단체를 형성하고,상기 서비스 이용자 단체에 속하는 모든 서비스 이용자에 대한 본인 인증 절차를 이행하여 본인 인증을 완료하는 처리부를 포함하되,상기 본인 인증 절차는 상기 서비스 이용정보 관계성에 기초하여 상기 서비스 이용자 별로 기본 본인 인증 절차 대비 동일 또는 간략한 인증 절차를 이행하거나 별도의 인증 절차 없이 본인 인증을 수행하는 절차이고,상기 전자상거래 서비스는 전자결제 서비스를 포함하고,상기 서비스 이용정보 관계성은 상기 수신된 서비스 이용정보 중 동일한 서비스 이용자 단체에 속하여 서비스를 이용한 이력에 근거하여 도출되는 것을 특징으로 하는 전자상거래 서비스 제공장치.
- 전자상거래 서비스 제공서버에 있어서,적어도 1인의 전자상거래 서비스 이용자의 서비스 이용정보를 수신하는 통신부와,상기 수신된 서비스 이용정보에 기초하여 서비스 이용정보 관계성을 도출하고,상기 도출된 서비스 이용정보 관계성에 기초하여 서비스 이용자 단체를 형성하고,상기 서비스 이용자 단체에 속하는 모든 서비스 이용자에 대한 본인 인증 절차를 이행하여 본인 인증을 완료하는 처리부를 포함하되,상기 본인 인증 절차는 상기 서비스 이용정보 관계성에 기초하여 상기 서비스 이용자 별로 기본 본인 인증 절차 대비 동일 또는 간략한 인증 절차를 이행하거나 별도의 인증 절차 없이 본인 인증을 수행하는 절차이고,상기 전자상거래 서비스는 전자결제 서비스를 포함하고,상기 서비스 이용정보 관계성은 상기 수신된 서비스 이용정보 중 동일한 서비스 이용자 단체에 속하여 서비스를 이용한 이력에 근거하여 도출되는 것을 특징으로 하는 전자상거래 서비스 제공서버.
- 전자상거래 서비스 제공장치에 있어서,적어도 1인의 전자상거래 서비스 이용자의 서비스 이용정보와 주문내역을 수신하는 통신부와,상기 수신된 서비스 이용정보에 기초하여 서비스 이용정보 관계성을 도출하고,서비스 이용자 단체를 형성하고,상기 서비스 이용정보 관계성에 기초하여 상기 서비스 이용자 단체에 속하는 이용자들의 서비스 이용정보를 분석하고,상기 서비스 이용자 단체에 속하는 모든 서비스 이용자에 대한 본인 인증 절차를 이행하여 본인 인증을 완료하되,상기 분석된 서비스 이용정보 중 공동 서비스 이용정보에서 비정상 패턴을 보인 서비스 이용정보를 송신한 서비스 이용자에에 대해서는 기본 본인 인증 절차보다 강화된 본인 인증 절차를 이행하고, 상기 분석된 서비스 이용정보 중 공동 서비스 이용정보에서 비정상 패턴을 보이지 않은 서비스 이용정보를 송신한 서비스 이용자들에 대해서는 상기 기본 본인 인증 절차와 동일 또는 더 간략한 인증 절차를 이행하거나 별도의 인증 절차 없이 본인 인증을 완료하는 처리부를 포함하고,상기 전자상거래 서비스는 전자결제 서비스를 포함하고,상기 서비스 이용정보 관계성은 상기 수신된 서비스 이용정보 중 동일한 서비스 이용자 단체에 속하여 서비스를 이용한 이력에 근거하여 도출되는 것을 특징으로 하는 전자상거래 서비스 제공장치.
- 전자상거래 서비스 제공서버에 있어서,적어도 1인의 전자상거래 서비스 이용자의 서비스 이용정보와 주문내역을 수신하는 통신부와,상기 수신된 서비스 이용정보에 기초하여 서비스 이용정보 관계성을 도출하고,서비스 이용자 단체를 형성하고,상기 서비스 이용정보 관계성에 기초하여 상기 서비스 이용자 단체에 속하는 이용자들의 서비스 이용정보를 분석하고,상기 서비스 이용자 단체에 속하는 모든 서비스 이용자에 대한 본인 인증 절차를 이행하여 본인 인증을 완료하되,상기 분석된 서비스 이용정보 중 공동 서비스 이용정보에서 비정상 패턴을 보인 서비스 이용정보를 송신한 서비스 이용자에 대해서는 기본 본인 인증 절차보다 강화된 본인 인증 절차를 이행하고, 상기 분석된 서비스 이용정보 중 공동 서비스 이용정보에서 비정상 패턴을 보이지 않은 서비스 이용정보를 송신한 서비스 이용자들에 대해서는 상기 기본 본인 인증 절차와 동일 또는 더 간략한 인증 절차를 이행하거나 별도의 인증 절차 없이 본인 인증을 완료하는 처리부를 포함하고,상기 전자상거래 서비스는 전자결제 서비스를 포함하고,상기 서비스 이용정보 관계성은 상기 수신된 서비스 이용정보 중 동일한 서비스 이용자 단체에 속하여 서비스를 이용한 이력에 근거하여 도출되는 것을 특징으로 하는 전자상거래 서비스 제공서버.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2017530209A JP2018505465A (ja) | 2014-12-05 | 2015-12-03 | 複数購買者のサービス利用情報関係性を利用した電子商取引サービス提供方法 |
US15/533,179 US20170345072A1 (en) | 2014-12-05 | 2015-12-03 | Method for providing electronic commerce service using connection between service use information of multiple purchasers |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20140173695 | 2014-12-05 | ||
KR10-2014-0173695 | 2014-12-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016089148A1 true WO2016089148A1 (ko) | 2016-06-09 |
Family
ID=55801173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2015/013180 WO2016089148A1 (ko) | 2014-12-05 | 2015-12-03 | 복수 구매자의 서비스 이용정보 관계성을 이용한 전자상거래 서비스 제공방법 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20170345072A1 (ko) |
JP (1) | JP2018505465A (ko) |
KR (2) | KR101952429B1 (ko) |
WO (1) | WO2016089148A1 (ko) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7506457B2 (ja) * | 2018-12-21 | 2024-06-26 | LINE Pay株式会社 | プログラム、情報処理方法、サーバ |
US11282126B1 (en) * | 2019-06-24 | 2022-03-22 | Maplebear Inc. | Learning staple goods for a user |
KR102546242B1 (ko) | 2021-02-02 | 2023-06-22 | 주식회사 다해줘테크 | 블록체인 기반 패션 제조 플랫폼 |
US11676196B2 (en) | 2021-03-09 | 2023-06-13 | Maplebear, Inc. | Mapping recipe ingredients to products |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005208822A (ja) * | 2004-01-21 | 2005-08-04 | Seiko Epson Corp | 認証装置、携帯端末、電子決済システムおよび認証プログラム |
WO2013085176A1 (ko) * | 2011-12-09 | 2013-06-13 | (주)네오위즈게임즈 | 지역 및 친밀도 기반의 게임 운영 방법 및 그 시스템 |
KR20130065849A (ko) * | 2011-12-05 | 2013-06-20 | 에스케이플래닛 주식회사 | 애플리케이션 추천 시스템, 방법 및 그에 대한 기록매체 |
KR20130094359A (ko) * | 2011-12-29 | 2013-08-26 | 한국인터넷진흥원 | 모바일 클라우드 접속 상황 정보 이용 인증 강화 시스템 및 방법 |
WO2014010952A1 (ko) * | 2012-07-11 | 2014-01-16 | Park Jin Won | 네트워크를 이용한 소비자그룹 형성 시스템, 이를 이용한 상거래 시스템 및 그 방법 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001318892A (ja) * | 2000-05-11 | 2001-11-16 | Cyber Sign Japan Inc | オンラインサービスにおける個人認証方法及びオンラインサービス提供装置 |
JP2003099685A (ja) * | 2001-09-26 | 2003-04-04 | Casio Soft Co Ltd | 取引データ処理装置、及びプログラム |
US20050021965A1 (en) * | 2002-06-10 | 2005-01-27 | Van Horn Richard J. | In a networked environment, providing characterized on-line identities and matching credentials to individuals based on their profession, education, interests or experiences for use by independent third parties to provide tailored products and services |
KR20060062672A (ko) * | 2004-12-06 | 2006-06-12 | 김유정 | 카드사 커뮤니티 운영방법과 이를 위한 카드사 서버,기록매체 및 정보 저장매체 |
JP2007286872A (ja) * | 2006-04-17 | 2007-11-01 | Konica Minolta Holdings Inc | 通行管理システム、及び通行管理方法 |
US7844609B2 (en) * | 2007-03-16 | 2010-11-30 | Expanse Networks, Inc. | Attribute combination discovery |
US8961619B2 (en) * | 2009-01-06 | 2015-02-24 | Qualcomm Incorporated | Location-based system permissions and adjustments at an electronic device |
EP2249540B1 (en) * | 2009-05-04 | 2020-03-18 | Alcatel Lucent | Method for verifying a user association, intercepting module and network node element |
WO2012037479A1 (en) * | 2010-09-17 | 2012-03-22 | Universal Secure Registry, Llc | Apparatus, system and method employing a wireless user-device |
US8582828B2 (en) * | 2011-06-24 | 2013-11-12 | Google Inc. | Using photographs to manage groups |
US20130060708A1 (en) * | 2011-09-06 | 2013-03-07 | Rawllin International Inc. | User verification for electronic money transfers |
US20130173467A1 (en) * | 2011-12-29 | 2013-07-04 | Ebay Inc. | Methods and systems for using a co-located group as an authorization mechanism |
WO2013101192A1 (en) * | 2011-12-30 | 2013-07-04 | Intel Corporation | Method and system for bulk purchase negotiating using an ad hoc online group |
JPWO2014020710A1 (ja) * | 2012-07-31 | 2016-07-11 | 順子 杉中 | 決済システム及び決済方法 |
KR101292326B1 (ko) * | 2012-11-22 | 2013-07-31 | (주)원더피플 | 인간관계 정보를 이용하여 사용자를 인증하는 방법 및 서버 |
US8904480B2 (en) * | 2012-11-29 | 2014-12-02 | International Business Machines Corporation | Social authentication of users |
BR112015026800A2 (pt) * | 2013-04-25 | 2017-07-25 | Offla Selfsafe Ltd | auto autenticação |
GB2516660A (en) * | 2013-07-29 | 2015-02-04 | Barclays Bank Plc | Payment authorisation system |
US20150095177A1 (en) * | 2013-10-01 | 2015-04-02 | Adobe Systems Incorporated | Method and apparatus for providing subscriber eligibility verification using community validation |
-
2015
- 2015-12-03 KR KR1020150171765A patent/KR101952429B1/ko active IP Right Grant
- 2015-12-03 WO PCT/KR2015/013180 patent/WO2016089148A1/ko active Application Filing
- 2015-12-03 US US15/533,179 patent/US20170345072A1/en not_active Abandoned
- 2015-12-03 JP JP2017530209A patent/JP2018505465A/ja active Pending
-
2019
- 2019-02-20 KR KR1020190020130A patent/KR102184482B1/ko active IP Right Grant
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005208822A (ja) * | 2004-01-21 | 2005-08-04 | Seiko Epson Corp | 認証装置、携帯端末、電子決済システムおよび認証プログラム |
KR20130065849A (ko) * | 2011-12-05 | 2013-06-20 | 에스케이플래닛 주식회사 | 애플리케이션 추천 시스템, 방법 및 그에 대한 기록매체 |
WO2013085176A1 (ko) * | 2011-12-09 | 2013-06-13 | (주)네오위즈게임즈 | 지역 및 친밀도 기반의 게임 운영 방법 및 그 시스템 |
KR20130094359A (ko) * | 2011-12-29 | 2013-08-26 | 한국인터넷진흥원 | 모바일 클라우드 접속 상황 정보 이용 인증 강화 시스템 및 방법 |
WO2014010952A1 (ko) * | 2012-07-11 | 2014-01-16 | Park Jin Won | 네트워크를 이용한 소비자그룹 형성 시스템, 이를 이용한 상거래 시스템 및 그 방법 |
Also Published As
Publication number | Publication date |
---|---|
KR102184482B1 (ko) | 2020-11-30 |
KR20190020011A (ko) | 2019-02-27 |
US20170345072A1 (en) | 2017-11-30 |
KR101952429B1 (ko) | 2019-02-26 |
KR20160040129A (ko) | 2016-04-12 |
JP2018505465A (ja) | 2018-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2742910C1 (ru) | Обработка закодированной информации | |
US10325088B2 (en) | Method and system for information authentication | |
US20150221149A1 (en) | Wifi wallet payments and entry keys | |
WO2016089148A1 (ko) | 복수 구매자의 서비스 이용정보 관계성을 이용한 전자상거래 서비스 제공방법 | |
US20090327135A1 (en) | Credit card paired with location identifiable device for point of service fraud detection | |
US20170169435A1 (en) | Method and system for authorizing a transaction | |
US20140229379A1 (en) | Mobile communication terminal payment system using one-time code | |
WO2017178816A1 (en) | Event tickets with user biometric verification on the user mobile terminal | |
US12008574B2 (en) | Authentication and authorization with physical cards | |
WO2016064127A1 (ko) | 모바일 교차 인증 시스템 및 방법 | |
US20020083011A1 (en) | Transaction mediation system and transaction mediation method | |
GB2489332A (en) | Handling encoded information and identifying user | |
JP2001312471A (ja) | 携帯電話等を利用したワンタイムパスワード認証システムおよびそれを利用した決済システム | |
KR20140046829A (ko) | 사용자 인증 시스템 및 방법 | |
WO2022163893A1 (ko) | 결제 서비스 제공 방법 및 이를 수행하는 전자 장치 | |
KR20080043057A (ko) | 음성통화를 이용한 휴대폰 결제 방법 | |
GB2519876A (en) | Handling encoded information | |
KR20050074262A (ko) | 위치에 기반한 고객 인증 시스템 및 그 방법 | |
WO2015080349A1 (ko) | 전자 상거래 카드 부정사용 방지 방법 및 서버 | |
KR20200133709A (ko) | 복수 구매자의 서비스 이용정보 관계성을 이용한 전자상거래 서비스 제공방법 및 서버 | |
US12008572B2 (en) | Methods and systems for authentication for remote transactions | |
US11663357B2 (en) | System and method of providing secure access to personal information | |
KR20180073538A (ko) | 네트워크 기반의 상거래에서 본인 인증 방법 및 장치 | |
KR20130089746A (ko) | 스마트 디바이스를 이용한 결제방법 | |
WO2021085732A1 (ko) | 사용자 선택에 의한 다중 인증 시스템과 다중인증 방법 및 맞춤형 결재인증시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15865648 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2017530209 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15533179 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15865648 Country of ref document: EP Kind code of ref document: A1 |