Seamlessness and Privacy Enhanced Ubiquitous Payment

  • Kyoung Jun Lee
  • Mu Jeong Jeong
  • Jeong-In Ju
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4082)


Payment is in nature an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme promoting seamlessness and privacy with a strong personal device and peer-based information transactions. We propose U-SDT(Secure Direct Transfer) Protocol as a way to make transactions seamless, secure and privacy-protected.


Smart Card Payment System Ubiquitous Computing Payment Method Account Number 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Acquisti, A.: Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498. Springer, Heidelberg (2002)Google Scholar
  2. 2.
    Boddupalli, P., Al-Bin-Ali, F., Davies, N., Friday, A., Storz, O., Wu, M.: Payment Support in Ubiquitous Computing Environments. In: IEEE Workshop on Mobile Computing Systems and Applications, pp. 110–121 (2003)Google Scholar
  3. 3.
    Floerkemeier, C., Schneider, R., Langheinrich, M.: Scanning with a Purpose – Supporting the Fair Information Principles in RFID Protocols, Institute for Pervasive Computing (2004)Google Scholar
  4. 4.
    Gross, S., Fleisch, E., Lampe, M., Müller, R.: Requirements and Technologies for Ubiquitous Payment, Multikonferenz Wirtschaftsinformat, Techniques and Applications for Mobile Commerce (2004)Google Scholar
  5. 5.
    Kourouthanasis, P., Spinellis, D., Roussos, G., Giaglis, G.: Intelligent cokes and diapers: MyGrocer ubiquitous computing environment. In: First International Mobile Business Conference, pp. 150–172 (2002)Google Scholar
  6. 6.
    Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  8. 8.
    Roussos, G., Moussouri, T.: Consumer perceptions of privacy, security and trust in ubiquitous commerce. Personal and Ubiquitous Computing 8(6), 416–429 (2004)CrossRefGoogle Scholar
  9. 9.
    Seigneur, J., Jensen, C.D.: Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss. In: Proceedings of the 19th Annual ACM Symposium on Applied Computing, vol. 03, pp. 1593–1599 (2004)Google Scholar
  10. 10.
    Zugenmaier, A., Hohl, A.: Anonymity for Users of Ubiquitous Computing. In: Security-Workshop at UbiComp (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Kyoung Jun Lee
    • 1
  • Mu Jeong Jeong
    • 2
  • Jeong-In Ju
    • 1
  1. 1.School of BusinessKyung Hee UniversitySeoulKorea
  2. 2.Design HouseJung-gu, SeoulKorea

Personalised recommendations