Your SlideShare is downloading. ×
  • Like
Mobile t fa_for_atm_1
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Mobile t fa_for_atm_1

  • 326 views
Published

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
326
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
5
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Mobile T-FA For ATM J. Nirmalraj raj S.Satheesh Kumar Ra.ja.prabu T.Suresh GUIDED BY: MISS.K.SHAYAMAL B.E
  • 2. CONTENTS
      • INTRODUCTION.
      • OBJECTIVE.
      • TWOFACTORAUTHENTICATION.
      • EXISTING METHOD.
      • PROPOSED METHOD.
      • COMPONENTS DESCRIPTION.
      • CONCLUSION.
  • 3. ATM
      • History
      • Types of security
      • Global analysis
      • services
  • 4. ATM FRAUDS
      • Card skimmers
      • Magnetic tape
      • Shoulder surfing
  • 5. SOLUTIONS
      • Anti skimmer devices,
      • Remote monitoring,
      • Security guards,
      • “ effective authentication methods”
  • 6. OBJECTIVE
      • Providing Efficient Authentication.
      • Preventing identity fraud.
  • 7. TWO FACTOR/TWO LEVEL AUTHENTICATION
      • What is T-FA?
      • Why needed?
  • 8. EXISTING METHOD
    • BIOMETRIC
    • Types
      • Contact
      • Contact less
    • Drawbacks
      • Cost
      • Maintenance
  • 9. PROPOSED METHOD MOBILE based authentication ATM MACHINE AUTHENTICATION AGENT USER MOBILE SUCCESS FULL AUTHNETICATION
  • 10. APPLICATIONS WEB AUTHENTICATION SERVER USER MAN IN THE MIDDLE
  • 11. BLOCK DIAGRAM PIC 16F887A CARD HOLDER GSM INTERNAL SECURITY MOBILE AUTHENTICATION AGENT MEMORY
  • 12. COMPONENT DESCRIPTION
      • MT8870
      • PIC 16F887A
      • USART
      • INTER INTEGRATED CIRCUIT
  • 13. INTRODUCTION
      • DTMF stands for dual tone multiple frequency
      • It is also known as touch-tone ,tone dialing.
      • Each DTMF tone consists of two simultaneous tones
      • Tones travel through the red and green wires, in a telephone.
  • 14. KEYPAD
  • 15. Tone 1:Frequency + = Low frequency High frequency
  • 16. MT8870 DECODER IC
  • 17. TIMING DIAGRAM
  • 18. ABOUT PIC
      • PIC is stands for Peripheral Inter Face controller.
      • PIC microcontroller is used for the controlling.
      • 40 pin IC.
      • 33 I/O pins.
      • Operating voltage 5V.
      • Operating frequency 4-20 mhz.
  • 19. REASON FOR USING PIC
      • Harvard Architecture
      • Instruction Pipelining
      • RISC
      • Only 35 single word instruction
  • 20. I2C
      • I2C is Inter Integrated Circuit.
      • Communication between the EEPROM card
    • and controller is I2C.
      • I2C can easily link multiple devices.
      • It provides good support for communication.
  • 21.
    • I2C is a serial interface of only two signals.
      • SDA
      • SCL
  • 22. I2C DATA TRANSFER. SSPBUF MASTER CONTROL ACTION SLAVE
  • 23. USART
      • Universal Synchronous/Asynchronous Receiver/Transmitter.
      • Serial data communication between PIC and terminal.
      • We used asynchronous mode.
      • half duplex
          • typically asynchronously
          • 5 – 9 bits of data
          • 2 or 3 framing bits
            • start bit
            • 1 or 2 stop bits
          • 0 or 1 parity bits
  • 24. ASYNCHRONOUS MODE
      • Baud rate generator.
      • Asynchronous transmitter.
  • 25. Baud Rate Generator (BRG)
      • It support both asynchronous and synchronous mode.
      • SPBRG
      • Baud rate formula
  • 26. ASYNCHRONOUS TRANSMITTER
  • 27. ASYNCHRONOUS MASTER TRANSMISSION
  • 28.  
  • 29. COMPARISON
      • SECURITY
      • USABILITY
      • ECONOMY
  • 30. CONCLUSION