•An automated teller machine (ATM) is acomputerized telecommunications devicethat provides the customers of a financialinstitution / bank with access to financialtransactions in a public space without theneed for a humanATMs, or bank teller is•On most modern clerk the customer roundthe clock (24inserting a plastic ATM card with aidentified by hrs a day)magnetic stripe or a plastic smartcard with achip, that contains a unique card number andsome security information.•Security is provided by the customer enteringa personal identification number (PIN).
•The ATM will service one customer at a time. Acustomer will be required to insert an ATM cardand enter a personal identification number (PIN) -both of which will be sent to the bank for validationas part of each transaction. The customer will thenbe able to perform one or more transactions. Thecard will be retained in the machine until thecustomer indicates that he/she desires no furthertransactions, at which point it will be returned -except as noted below.•The ATM must be able to provide the followingservices to the customer:
•A customer must be able to make a cash withdrawalfrom any suitable account linked to the card, in multiplesof RS.100. Approval must be obtained from the bankbefore cash is dispensed.•A customer must be able to make a deposit to anyaccount linked to the card, consisting of cash and/orchecks in an envelope. The customer will enter theamount of the deposit into the ATM, subject to manualverification when the envelope is removed from the •A customer must be able to make a transfer of moneymachine by an operator. Approval must be obtained from between any two accounts linked to the card.the bank before physically accepting the envelope. •A customer must be able to make a balance inquiry of any account linked to the card. •A customer must be able to abort a transaction in progress by pressing the Cancel key instead of responding to a request from the machine.
Product Perspective•An automated teller machine (ATM) is a computerized telecommunications devicethat provide the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller. On most modern ATMs, the customer is identified by inserting a plastic ATM card witha magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information, such as an expiration date or CVC (CVV). Security is provided by the customer entering a personal identification number (PIN).
Computerized machine that permits bankcustomers to gain access to their accountswith a magnetically encoded plastic card and acode number. It enables the customers toperform several banking operations withoutthe help of a teller, such as to withdrawcash, make deposits, pay bills, obtain bankstatements, effect cash transfers. Also calledautomated Banking machine, automatic tillmachine, or remote service unit
Using an ATM, customers can access theirbank accounts in order to make cash withdrawals (or credit card cash advances) andcheck their account balances.The functions of the system are: 1. Login 2. Get Balance Information 3. Withdraw Cash 4. Generate receipt
There are several users of the ATM network• Customer: The customer interacts with the ATMnetwork via the ATM It must be very easy forthem to use the ATM . They should besupported by the system in every possibleway•Maintainer:It should be easy to maintain the wholesystem The maintainer should be the onlyperson that is allowed to connect a new ATMto the network
•Some of the constraints that have to betaken care of with respect to the softwaredevelopment could be the platform wherethe software is to be run should have anaccess to MS-ACCESS . The end userneeds to have basic computer knowledge .• The user may fail to exactly explain hisrequirement however his requirements areanalyzed and understood by the developer, as the software is a generic one.
•Some companies that manufacture ATMs areMERCHANT BANKARDNETWORK, HITACHI, AUSTRIAN BANKINGAOTOMATION SYSTEM INTEGRATOR.•At the end of this report I conclude with the followingpoints:- With the growing networks ATM might soon beinstalled at many places.- ATMs for the blind have also been designed & areavailable in the Chinese market.- ATMs that make available various types ofcurrencies are also available
•An ATM is simply a data terminal with two input andfour output devices. Like any other data terminal theATM has to connect to, and communicate through, ahost processor.•The host processor is analogous to an InternetService Provider (ISP) in that it is the gatewaythrough which all the various ATM networks becomeavailable to the cardholder .Most host processors can support either leased-lineor dial-up machines.•Leased-line machines connect directly to the hostprocessor through a four-wire, point-to-point, dedicated telephone line.•Dial-up ATMs connect to the host processor througha normal phone line or through an Internet service
•Leased-line machines commonly use a monochromeor color CRT (cathode ray tube) display.•Dial-up machines commonly use a monochrome orcolor LCD.•The host processor may be owned by a bank orfinancial institution, or it may be owned by anindependent service provider.•Bank-owned processors normally support only bank-owned machines, whereas the independentprocessors support merchant-owned machines
•24-hour access to cash•View Account Balances & Mini-statements•Order a Cheque Book / AccountStatement•Transfer Funds between accounts•Refill your Prepaid card•Pay your utility bills•Deposit cash or cheques•Change your PIN•Learn about other products
•The ATM network has to provide hardwareinterfaces to # various printers # various ATM machines•There are several companies producingthe ATM machines several types ofnetworks The exact speciation of thehardware interfaces is not part of thisdocument
Processor : Processorx86 Family 6 Model 15Stepping 13 GenuineIntel~2394MhzRAM : 512 MB or moreHard disk : 20 GB or moreMonitor : VGA/SVGAKeyboard : 104 KeysMouse : 2 buttons/ 3 buttons
•The ATM network has to provide softwareinterfaces to the software used by differentbanks different network software•The exact detailed specification of the softwareinterfaces is not part of this document
Operating System :Windows 2000/XPFront end : JavaAppletDatabase : Ms-Access.
The functional requirements are organized intwo sections; Requirements of the ATM and Requirementsof the bank computer1…Requirements of an ATM:•authorization process•Transaction (WITHDRAWAL PROCESS)2.Requirements of the bank computer•Authorization process(bank code &password)•Transaction
•The non-functional requirement is bellowed.•The ATM network has to be available 24 hours aday.•Each bank may be processing transactions fromseveral ATMs at the same time.•The ATM must be able to use several dataformats according to the data formats that areprovided by the database of different banks
Various protocols are used for transferringinformation over the network in the ATM. A fewof them are explained in brief:1. TCP (Transmission control protocol):- Connection oriented protocol.- TCP is used to dynamically adapt to propertiesof the internetwork & to be robust to face anyfailures.2. SMTP (Simple Mail Transfer Protocol):- Simple ASCII protocol, Accepts incomingmessages & sends them to appropriatelocations.
•As most of the ATMs are open for 24 hrs & alsoall of them are not guarded, it is important toprovide security to the machine. One of thetechnologies is explained here.•The Electronic Signature Lock (ESL) is apatented technology that can be implemented inhardware, firmware, or software and used toprotect digital resources, funds transfer, orphysical access. It can identify computerterminal users locally or remotely without havingto modify or attach anything to the terminal. It iscompletely transparent to the users and can be
Here are some security tips the card owner mustfollow while using the ATM :• Dont write down your PIN. If you must write itdown, do not store it in your wallet or purse.• Make your PIN a series of letters or numbers thatyou can easily remember, but that cannot easily beassociated with you personally.• Avoid using birth dates, initials, house numbers oryour phone number.• Store your ATM card in your purse or wallet, so that
•Modern ATM physical security concentrate on denying theuse of the machine inside the machine to a thief or a fraudusing some fraud detection techniques•The customer request a withdrawal from the machine whichdispenses no money but merely prints a receipt•The customer then takes the report to a sales clerk and•An additional security measures limits the total amount ofexchange it for cashATM withdrawal to some particular amount•This aims to reduce the amount of fraud withdrawal
•24-Hour, 365-Day Access to YourBank Accounts•International access to funds•Fraud Protection•Wider Network of BankingFacilities
•Record KeepingRequirements•Hidden Fees•Lost or Stolen Cards•Ease of Overspending
•So we came across many frauddetection techniques and the usage ofvarious types of cards depending on thecustomer needs.•Finally whenever you are dealing withthe money transaction ,don’t get deviatedand get your money in a finertransaction.•So ATM is made to provide us withbetter facility….. Please don’t miss use