an atm with an eye

Post on 15-Nov-2014

5266 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

Transcript

AN ATM WITH AN EYE

THE FUTURE’S TECHNOLOGY

MOHD NAZIR SHAKEEL

1

Outline ATM

ATM WITH AN EYE

ON THE MOST CUSTOMER IS

WHERE IT IS USE

WORKING

TECHNIQUES

HOW IT WORK

PROTECTION

CONCLUSION

REFERENCES

2

Automated Teller Machine

An automated teller machine (ATM) is : Computerize telecommunications

Made money transactions easy for customers to bank.

Device that provides the customers of a financial transactions in

a public space without the need for a human clerk or bank teller.

Security requiring combination Physical access card+

Password(PIN)

3

4

Physical Access Card(ATM Card)

1. Card Provider Name : Name of Card Provider like bank or financial institute; for E.g.. ICICI Bank, SBI Bank etc. 

2. Card Number : 16 Digit Number. It divided into 4 parts with 4 number. 

3. 3D Hologram : Contain 3D Hologram to represent whether it is Visa card or Maestro. 

4. Valid From : It contains valid from date, i.e. Contains the card activation date. 

5. Valid Thru : It contains valid thru date, i.e. Contains last date for the use of card.

6. Brand Logo :  Contains Brand Logo, whether it is Visa or Master.

FIGURE-1

8. Magnetic Strip : Contains Magnetic Strip have special identification

 9. Verification Number : Contains Three digit verification number.

 10. Signature Panel : Contains

Signature Panel, i.e. Card Holder Signature. 

FIGURE-2

5

Password

Whether you are on the internet or an online banking program,

you are often required to use a password

The worst passwords to use are the ones that come to mind first

name, spouse's name, maiden name, pets, children's name, even

street addresses, etc.

The best passwords mix numbers with upper and lowercase

letters. A password that is not found in the dictionary is even

better.

6

Personal Identification Number (Pin)

PIN is one method used by banks and phone companies to

protect your account from unauthorized access

PIN is a confidential code issued to the cardholder to permit

access to that account

PIN should be memorized, secured and not given to anyone,

not even family members or bank employees

7

The chances of misuse of this much hyped 'insecure' baby

product (ATM) are manifold due to the exponential growth of

'intelligent' criminals day by day.

There is an urgent need for improving security in banking

region. With the advent of ATM though banking became a lot

easier it even became a lot vulnerable.

Provide a cordless, password-free way to get their money out of

an ATM

An ATM With An Eye

8

On Most Modern ATM, The Customer Is

Identified by inserting a plastic ATM card with a magnetic

stripe or a plastic smartcard with a chip, that contains a unique

card number and some security information, such as an

expiration date or cvvc (cvv). Security is provided by : the

customer entering A personal identification number (PIN).

9

By forcing the ATM match a live image of a customer’s

face/eye with an image stored in a bank database (associated

with the account number) when the data matches(account

image and stored image) user be considered fully verified

A system can examine just the eyes, or the eyes nose and

mouth, or ears, nose, mouth and eyebrows, and so on.

Working

10

Techniques

BIOMETRIC IDENTIFICATION TECHNIQUES

Finger Printing

Retina Scanning

Facial Recognition

Iris Recognition

11

How It Work

A camera based in ash machine will

Detect the pattern in second

Compare it with one store in a central computer.

Or encode on to the cash card.

A sensor system examines the randomly

Formed features of the iris of the eye

as unique as a fingerprint.

12

Where It Used

The development of such a system would serve to protect consumersfinancial institutions alike from fraud other breaches of security.

FIGURE-3

13

Camera Installation On ATMMachine

FIGURE-414

Portrait camera

Camera Snapshots

Cash slot(Dispenser) camera

FIGURE-5

15

Iris code generation

FIGURE-6 16

Steps Of Iris Working

17

How you protect your password Changing your password regularly

Memorizing your password.

If you do write down the password, keep it at home or

hidden at work. Don't rewrite your password on a post-it

note and stick it on your monitor or hard drive.

Web site remember a password for you, don't use it. Anyone

who uses your machine will have automatic access to

information that is password protected.

18

Protect Your ATM Cards

An ATM card should be treated as thought it were cash.

Avoid providing card and account information to anyone over

the telephone.

When making a cash withdrawal at an ATM, immediately

remove the case as soon as the machine releases it.

Put the case in your pocket and wait until you are in a secure

location before counting it.

Never use an ATM in an isolated area or never leave up

receipt

Be sure to take your receipt to record transactions and match

them against monthly statements. 19

Conclusion

We Thus Develop An Atm Model That Is

More reliable in providing security by using facial recognition

software.

By keeping the time elapsed in the verification process to a

negligible amount

Try to maintain the efficiency of this ATM system

20

REFERENCES

[1] www.nationmaster.com

[2] www.google.co.in

[3] www.atmeye.net

[4] Wikipedia

21

thanks22

top related