AN ATM WITH AN EYE THE FUTURE’S TECHNOLOGY MOHD NAZIR SHAKEEL 1
Nov 15, 2014
AN ATM WITH AN EYE
THE FUTURE’S TECHNOLOGY
MOHD NAZIR SHAKEEL
1
Outline ATM
ATM WITH AN EYE
ON THE MOST CUSTOMER IS
WHERE IT IS USE
WORKING
TECHNIQUES
HOW IT WORK
PROTECTION
CONCLUSION
REFERENCES
2
Automated Teller Machine
An automated teller machine (ATM) is : Computerize telecommunications
Made money transactions easy for customers to bank.
Device that provides the customers of a financial transactions in
a public space without the need for a human clerk or bank teller.
Security requiring combination Physical access card+
Password(PIN)
3
4
Physical Access Card(ATM Card)
1. Card Provider Name : Name of Card Provider like bank or financial institute; for E.g.. ICICI Bank, SBI Bank etc.
2. Card Number : 16 Digit Number. It divided into 4 parts with 4 number.
3. 3D Hologram : Contain 3D Hologram to represent whether it is Visa card or Maestro.
4. Valid From : It contains valid from date, i.e. Contains the card activation date.
5. Valid Thru : It contains valid thru date, i.e. Contains last date for the use of card.
6. Brand Logo : Contains Brand Logo, whether it is Visa or Master.
FIGURE-1
8. Magnetic Strip : Contains Magnetic Strip have special identification
9. Verification Number : Contains Three digit verification number.
10. Signature Panel : Contains
Signature Panel, i.e. Card Holder Signature.
FIGURE-2
5
Password
Whether you are on the internet or an online banking program,
you are often required to use a password
The worst passwords to use are the ones that come to mind first
name, spouse's name, maiden name, pets, children's name, even
street addresses, etc.
The best passwords mix numbers with upper and lowercase
letters. A password that is not found in the dictionary is even
better.
6
Personal Identification Number (Pin)
PIN is one method used by banks and phone companies to
protect your account from unauthorized access
PIN is a confidential code issued to the cardholder to permit
access to that account
PIN should be memorized, secured and not given to anyone,
not even family members or bank employees
7
The chances of misuse of this much hyped 'insecure' baby
product (ATM) are manifold due to the exponential growth of
'intelligent' criminals day by day.
There is an urgent need for improving security in banking
region. With the advent of ATM though banking became a lot
easier it even became a lot vulnerable.
Provide a cordless, password-free way to get their money out of
an ATM
An ATM With An Eye
8
On Most Modern ATM, The Customer Is
Identified by inserting a plastic ATM card with a magnetic
stripe or a plastic smartcard with a chip, that contains a unique
card number and some security information, such as an
expiration date or cvvc (cvv). Security is provided by : the
customer entering A personal identification number (PIN).
9
By forcing the ATM match a live image of a customer’s
face/eye with an image stored in a bank database (associated
with the account number) when the data matches(account
image and stored image) user be considered fully verified
A system can examine just the eyes, or the eyes nose and
mouth, or ears, nose, mouth and eyebrows, and so on.
Working
10
Techniques
BIOMETRIC IDENTIFICATION TECHNIQUES
Finger Printing
Retina Scanning
Facial Recognition
Iris Recognition
11
How It Work
A camera based in ash machine will
Detect the pattern in second
Compare it with one store in a central computer.
Or encode on to the cash card.
A sensor system examines the randomly
Formed features of the iris of the eye
as unique as a fingerprint.
12
Where It Used
The development of such a system would serve to protect consumersfinancial institutions alike from fraud other breaches of security.
FIGURE-3
13
Camera Installation On ATMMachine
FIGURE-414
Portrait camera
Camera Snapshots
Cash slot(Dispenser) camera
FIGURE-5
15
Iris code generation
FIGURE-6 16
Steps Of Iris Working
17
How you protect your password Changing your password regularly
Memorizing your password.
If you do write down the password, keep it at home or
hidden at work. Don't rewrite your password on a post-it
note and stick it on your monitor or hard drive.
Web site remember a password for you, don't use it. Anyone
who uses your machine will have automatic access to
information that is password protected.
18
Protect Your ATM Cards
An ATM card should be treated as thought it were cash.
Avoid providing card and account information to anyone over
the telephone.
When making a cash withdrawal at an ATM, immediately
remove the case as soon as the machine releases it.
Put the case in your pocket and wait until you are in a secure
location before counting it.
Never use an ATM in an isolated area or never leave up
receipt
Be sure to take your receipt to record transactions and match
them against monthly statements. 19
Conclusion
We Thus Develop An Atm Model That Is
More reliable in providing security by using facial recognition
software.
By keeping the time elapsed in the verification process to a
negligible amount
Try to maintain the efficiency of this ATM system
20
REFERENCES
[1] www.nationmaster.com
[2] www.google.co.in
[3] www.atmeye.net
[4] Wikipedia
21
thanks22