Top Banner
SECURITY SYSTEM FOR ATM BY SECURITY SYSTEM FOR ATM BY USING FINGERPRINT AND GSM USING FINGERPRINT AND GSM by by under guidence of under guidence of Suketha Suketha Mr. Santosh Hiremath Mr. Santosh Hiremath
20
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 153899_633706967663461250

SECURITY SYSTEM FOR ATM SECURITY SYSTEM FOR ATM BY USING FINGERPRINT AND BY USING FINGERPRINT AND

GSMGSM

by by under guidence ofunder guidence of

Suketha Mr. Santosh Suketha Mr. Santosh Hiremath Hiremath

Page 2: 153899_633706967663461250

Introduction

Now-a-days, in the self-service banking system has got extensive popularization with the characteristic offering high-quality 24 hours service for customer.

However, the financial crime case rises repeatedly in recent years, a lot of criminals tamper with the ATM terminal and steal user's credit card and password by illegal means.

Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer.

Page 3: 153899_633706967663461250

Traditional ATM systems authenticate generally by using the credit card and the password, the method has some defects

The original password authentication method combined with the biometric identification technology verify the clients identity better and achieve the purpose that use of ATM machines improve the safety effectively.

Gives 2 way security authentication process with the help of fingerprint system sends dynamically generated PIN or code to customer mobile number.

Page 4: 153899_633706967663461250

THE CHARACTERISTICS OF THE SYSTEM THE CHARACTERISTICS OF THE SYSTEM DESIGNDESIGN

The embedded ATM client authentication system is based on The embedded ATM client authentication system is based on fingerprint recognition. fingerprint recognition.

The S3C2440 chip is used as core of embedded system. The S3C2440 chip is used as core of embedded system.

The fingerprint is the easiest ‘something you are’ characteristic The fingerprint is the easiest ‘something you are’ characteristic

to capture and process.to capture and process.

The primary functions are shown as follows:The primary functions are shown as follows:

• • Fingerprint recognitionFingerprint recognition: :

• • Remote authenticationRemote authentication: :

• • Message alarmingMessage alarming: :

• • Two discriminate analysis method:Two discriminate analysis method:

Page 5: 153899_633706967663461250

HARDWARE DESIGN AND SOFTWARE HARDWARE DESIGN AND SOFTWARE DESIGNDESIGN

The design of entire system consisted of two part which are The design of entire system consisted of two part which are hardware and software. hardware and software.

Hardware Design Hardware Design

There are some modules consisted of the system as follows: There are some modules consisted of the system as follows: 

1.1. LCD module: The OMAP5910 is used in this module as a LCD module: The OMAP5910 is used in this module as a LCD controller. LCD controller.

2.2. keyboard module:keyboard module: It can be used for inputting passwords. It can be used for inputting passwords.

3.3. SRAM and FLASH: SRAM and FLASH: Their functions are storing the code and Their functions are storing the code and the information of fingerprint the information of fingerprint. .

4.4. Fingerprint recognition module:Fingerprint recognition module: AT77CI04B be used as a AT77CI04B be used as a fingerprint recognition.fingerprint recognition.

5.5. Ethernet switch controller:Ethernet switch controller: which can connect police which can connect police network and remote fingerprint data servernetwork and remote fingerprint data server

Page 6: 153899_633706967663461250

The block diagram of hardwareThe block diagram of hardware

Page 7: 153899_633706967663461250

Software DesignSoftware Design::

2 modes:2 modes:

1.Admin mode 1.Admin mode

2.User mode 2.User mode

Page 8: 153899_633706967663461250

The overall flow chart of softwareThe overall flow chart of software

Page 9: 153899_633706967663461250

WORKING PHASES OF THE SYSTEMWORKING PHASES OF THE SYSTEM

The proposed system design involves two phases namely: The proposed system design involves two phases namely: registration phase and verification phase.registration phase and verification phase.

1)1) Registration phaseRegistration phase- the objective of this process is to create - the objective of this process is to create the profile of the user. the profile of the user.

This process is carried out by the administrator of the system. This process is carried out by the administrator of the system. The process consists of the following two steps: The process consists of the following two steps:

Sample CaptureSample Capture- the users fingerprint sample is captured by - the users fingerprint sample is captured by placing a finger on a fingerprint reader.placing a finger on a fingerprint reader.

Conversion and EncryptionConversion and Encryption- the individual measurements - the individual measurements and data points are converted to a mathematical algorithm and and data points are converted to a mathematical algorithm and encryptedencrypted

Page 10: 153899_633706967663461250

22.Identification and verification process- .Identification and verification process- once the individual once the individual has been enrolled in a system he/she can start the use of has been enrolled in a system he/she can start the use of biometric technology to have access to his account via the biometric technology to have access to his account via the ATM machine to authorize transaction.ATM machine to authorize transaction.

Identification- Identification- The user provides a biometric sample and the The user provides a biometric sample and the system looks at all user templates in the database.system looks at all user templates in the database.

Verification- Verification- it is one to one match requiring the user provides it is one to one match requiring the user provides identification such as PIN and valid ATM card in addition to identification such as PIN and valid ATM card in addition to the biometric samplethe biometric sample

Page 11: 153899_633706967663461250

FINGERPRINT RECOGNITION PROCESSFINGERPRINT RECOGNITION PROCESS

These include patterns, which are aggregate characteristics of ridges, These include patterns, which are aggregate characteristics of ridges, and minutia points. and minutia points.

PatternsPatterns

The three basic patterns of fingerprint ridges are the arch, loop, The three basic patterns of fingerprint ridges are the arch, loop, and whorl:and whorl:

  

Page 12: 153899_633706967663461250

Loop: Loop: The ridges enter from one side of a finger, form a The ridges enter from one side of a finger, form a curve, and then exit on that same side.curve, and then exit on that same side.

Page 13: 153899_633706967663461250

Arch: Arch: The ridges enter from one side of the finger, rise in the The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the center forming an arc, and then exit the other side of the finger.finger.

Page 14: 153899_633706967663461250

Whorl:Whorl: Ridges form circularly around a central point on the Ridges form circularly around a central point on the fingerfinger

Page 15: 153899_633706967663461250

Fingerprint processing has three primary functions: enroll, Fingerprint processing has three primary functions: enroll, search, and verify.search, and verify.

  EnrollmentEnrollment: : acquires a fingerprint image from the sensor and acquires a fingerprint image from the sensor and saves it .saves it .

SearchSearch compares a raw candidate image to a list of previously compares a raw candidate image to a list of previously enrolled templates. enrolled templates.

VerificationVerification validates a user’s identity by comparing a raw validates a user’s identity by comparing a raw candidate image to a previously enrolled template via real-candidate image to a previously enrolled template via real-time algorithmstime algorithms

Page 16: 153899_633706967663461250

The design of fingerprint recognition algorithm

The fingerprint recognition algorithm is composed of two main technologies: image processing technology matching algorithm technology

Page 17: 153899_633706967663461250

GSM

Global System for Mobile Communications ( GSM: originally from Group Special Mobile) is the most popular standard for mobile phones in the world.

GSM uses a variation of Time Division Multiple Access(TDMA)

GSM is the most widely used in digital wireless telephone technologies

It operates at either the 900 MHz or 1,800 MHz frequency band.  

Page 18: 153899_633706967663461250

CONCLUSION

The Implementation of ATM security by using fingerprint recognition and GSM MODEM took advantages of the stability and reliability of fingerprint characteristics

The system also contains the original verifying methods which was inputting owner's password which is send by the controller.

The security features were enhanced largely for the stability and reliability of owner recognition.

The whole system was build on the technology of embedded system which makes the system more safe, reliable and easy to use.

Page 19: 153899_633706967663461250

REFERENCES

[1] S.S, Das and J. Debbarma, “Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian e-banking System”, International Journal of Information and Communication Technology Research, vol.1, no. 5, pp.197-203, 2011.

[2] P.KRISHNAMURTHY, MR. M. M REDDDY, 2012. Implementation of ATM Security by Using Fingerprint Recognition and GSM

Page 20: 153899_633706967663461250

THANK YOUTHANK YOU