SlideShare a Scribd company logo
1 of 23
Money Pad – The Future Wallet
Name : LAMEES MOHAMMED ANEES
USN: 4BP19CS029
Year :2022-23
Under the guidance of Coordinator
Prof. JALALUDDEEN B.M
DEPT. OF CSE
Prof. NUBILA JALEEL
DEPT. OF CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 1
MONEY PAD
- THE FUTURE WALLET
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 2
TABLE OF CONTENTS
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 3
1. INTRODUCTION 7. WHY USE MONEY PAD
2. WHAT IS BIOMETRICS 8. TECHNOLOGY USED
3. LITERATURE SURVEY 9. FIELDS OF APPLICATION
4. CREDIT CARDS 10. FURTHER ENHANCEMENT
5. SMART CARDS 11. CONCLUSION
6. METHODOLOGY 12. REFERENCES
1. INTRODUCTION
● Just as now everything that we use are using are under the shadow of “e”
today we have paper currency that is also being replaced by electronic
money or e- cash.
● The e-cash handling system is a device that facilitates secure currency
transactions. We call it as Money Pad which recognizes Finger Print’s of the
user and decides whether the user is a authorized person or not.
● Every time the user wants to access the Money Pad he has to make an
impression of his finger, which will be sensed and matched with the one in
the hard disk.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 4
2. WHAT IS BIOMETRICS?
Biometric Technologies are defined as automated methods of identifying or
authenticating the identity of a living person based on unique physiological
or behavioral characteristics. Biometrics can provide very secure and
convenient authentication for an individual since they cannot be stolen or
forgotten and very difficult to forge.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 5
3. LITERATURE SURVEY
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 6
[1]. An Efficient Method for Securing
the e-payment System : Money Pad
In the emerging field of electronic commerce, novel buzzwords like
smart-card, online banking, digital cash and electronic cheques are
being used as money. But how are these brand called as the new
forms of a secure payment? And most importantly, which of these
newly emerging secure electronic money technologies will survive
into the next century? These are some of the tough questions that is to
answered but here’s a solution, that provide security to these modes of
currencies, and these modes of currencies are exchanged by using the
“Biometrics Technology”.
[2]. Role of e – banking services in the
banking sector
This research paid an attention through exploratory method to
recognize the issues acting as difficulties in the practice of the of
clientele on banking through technology. banking services offered
through internet and rework the acuity
3. LITERATURE SURVEY(Contd..)
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 7
[3]. Reasons for Non-Adoption of
Internet Banking: A Study with
Reference to Vellore District of Tamil
Nadu, India J. Ramola Premalatha1 &
N. Sundaram1
With the expansion of Internet usage, E -banking has
become one of the most revolutionized components of
today's economic growth. E-banking is a powerful value-
added tool to attract new customers and retain the existing
ones.
4. CREDIT CARDS
Credit card is payment device that allow the consumer to make purchase within
guaranteed limit defined by the issuer of card. Processing of funds is done
electronically. The user insert he card into the card reader machine, the machine
asks secure information like password etc. for the verification of the user. After
providing the authentication the user is allowed to perform the transaction. As
credit card provides privacy and security it also has disadvantages:
● Clearing of funds instantly is not possible.
● Once the card is expired it has to be renewed.
● User has to pay additional charges to get the service from the bank thus it
always in under the pressure of limits
● Using fixed encryption transactions is insecure.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 8
5. SMART CARDS
Smart cards have embedded with a microchip and it appears like a credit card, but it
store information and sometime even performs simple calculation. Payment value in
the form of currency value is stored in this chip and can be retrieved with specially
designed card reader. Common smartcard chips hold about 8,000 bytes of
information that can perform variety of functions. As credit card has disadvantages,
smart card also has disadvantages:
● Using fixed encryption transactions is insecure.
● Due to chip failure there is a risk of data loss.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 9
6. METHODOLOGY
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 10
Fig 1. Working of money pad
1. Money Pad
3. Database Server
2. Fingerprint
Information collected is passed to the
server for verification
4. Further Transaction
Authorized
Not Authorized
5. Message is sent to
owner’s account
6. METHODOLOGY (Contd..)
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 11
Identification
Fingerprint
sensor
Feature
Extraction
Database
Feature
Extraction
Matching
Fingerprint
sensor
ID number
Verification
output
Fig 2. Identifying and Verification process in Money Pad
along with Finger Print Record
1. Money Pad
Money pad is secure medium of exchange for currency. It carries digital cash as paper cash will not
be there. Money pad contains biometric technology. It is similar to credit cards and smart cards just
like floppy disk. It consists of touch sensor and magnetic disk as its peripherals. Touch sensor
records the fingerprint of the user, and magnetic disk has read and write permission and also and
holds authentication details of user.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 12
6. METHODOLOGY (Contd..)
Fig 3. Operations on money pad
2. HOW TO USE MONEY PAD
New User:
● With e-banking facility visit a nearby bank.
● With some balance create an account.
● Give important details along with fingerprints.
● Along with money pad user is given bank code and account number.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 12
6. METHODOLOGY (Contd..)
3. Transaction using money pad
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 13
6. METHODOLOGY (Contd..)
1. Money Pad 2. Fingerprint 3. Enter Bank Code
& Account number
4. Checks for authorization
5. If authorized allows further
transaction
6. If not authorized it will mailed
back to the owner’s account
7. WHY USE MONEY PAD?
● Instant clearing of funds
● Avoids the Unsafe Way of Carrying
● Provide Strong Security
● Can be Meet by a Common
● Avoids the Issue of Renewing
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 14
8. TECHNOLOGY USED
● Biometrics comprises methods for uniquely recognizing human based upon
one or more intrinsic physical or behavioral traits.
● In Computer Science, biometrics is used as a form of identifying access
management and access control. It is also used to identify individuals in
groups that are under surveillance.
● Biometrics attempts to confirm an individuals claimed identity by comparing
a submitted sample to one or more previously enrolled templates.
● Closed set identification is the person known to exist in the database. Open
set identification is the person that is not existed in the database. System
determines if the person identification from the database.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 16
The accuracy of biometric system is measured in two ways:
● False Acceptance Rate – when an unauthorized subject is accepted as valid.
● False Rejection Rate – when an authorized subject is rejected by the
biometric system as unauthorized.
Biometric system contains fingerprint verification, which
authenticates whether the user is an authorized person or not. It has a glass plate
that involves the user to place his or her finger over it, which resides over a high-
resolution change coupled cameras. The image that is captured is compared to the
image in system database and decides the user authentication.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 17
8. TECHNOLOGY USED (Contd..)
9. FIELD OF APPLICATIONS
● Applicable in any kind of e-banks and e-transaction.
● Can be used to carry out remote transaction.
● Useful to carry Digital Cash.
● Utilization of individual data in filling order forms
● Applicable in m-commerce transaction
● Applicable in daily life
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 18
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 19
PROS CONS
Easy and fast
Portable
Flexible
Secured
Expensive
For security purpose it
uses fingerprint detection,
so if person’s finger gets
accidently cut or injured
the detection technique
will fail to match the
patterns.
10. FURTHER ENHANCEMENT
● Understanding the disadvantage of the current working of money pad
that is the fingerprint scan, not so worthy for the disabled people.
● In the new version of Money Pad which is enhanced by me includes
retina scan instead of finger print.
● In current version finger print of the user is used in biometric system
and the disadvantage of it was that if the user doesn’t have the finger
so he/she can’t access the money pad.
● Now in the future the user that doesn’t have finger can also access
the money pad through retina scan.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 20
11. CONCLUSION
● The following are three necessary requirements:
1. Instant clearing of funds.
2. Elimination of payment risk.
3. Using strong encryption there is a secure transaction.
● Since the money pad is able to satisfy the above requirements there will be no
doubt that in future it will be widely suggested for use.
● In future when the internet will capture the whole world. All the work will be
done through the internet then there will be no use of any card or pad, just a
small device which can detect the fingerprint will be attached at any place
throughout the world.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 21
12. REFERENCES
1. An Efficient Method for Securing the e-payment System : Money Pad Swapnesh
Taterh1 1 Associate Professor, Amity Institute of Information Technology, Amity
University, Rajasthan, India. Email: staterh@jpr.amity.edu
2. Role of e – banking services in the banking sector, Ghobadian, A. (1994). ‘Service
quality
3. Reasons for Non-Adoption of Internet Banking: A Study with Reference to
Vellore District of Tamil Nadu, India J. Ramola Premalatha1 & N. Sundaram1
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 22
THANK YOU !
Any queries?
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 23

More Related Content

Similar to technical seminar-money pad.pptx

Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATMParas Garg
 
Moneypad- the future wallet
Moneypad- the future walletMoneypad- the future wallet
Moneypad- the future walletShubham Kolapkar
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future walletAbbas Ambawala
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET Journal
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET Journal
 
15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)IAESIJEECS
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sectorsuhasmcomplex
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometricijtsrd
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Mobile based secure digital wallet for peer to peer payment system
Mobile based secure digital wallet for peer to peer payment systemMobile based secure digital wallet for peer to peer payment system
Mobile based secure digital wallet for peer to peer payment systemijujournal
 
Money pad,the future wallet
Money pad,the future walletMoney pad,the future wallet
Money pad,the future walletSmitakshi Sen
 

Similar to technical seminar-money pad.pptx (20)

Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
D0351022026
D0351022026D0351022026
D0351022026
 
Moneypad- the future wallet
Moneypad- the future walletMoneypad- the future wallet
Moneypad- the future wallet
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
MONEY PAD
MONEY PADMONEY PAD
MONEY PAD
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
moneypad.pptx
moneypad.pptxmoneypad.pptx
moneypad.pptx
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
 
15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sector
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Mobile based secure digital wallet for peer to peer payment system
Mobile based secure digital wallet for peer to peer payment systemMobile based secure digital wallet for peer to peer payment system
Mobile based secure digital wallet for peer to peer payment system
 
N044057478
N044057478N044057478
N044057478
 
Money pad,the future wallet
Money pad,the future walletMoney pad,the future wallet
Money pad,the future wallet
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

technical seminar-money pad.pptx

  • 1. Money Pad – The Future Wallet Name : LAMEES MOHAMMED ANEES USN: 4BP19CS029 Year :2022-23 Under the guidance of Coordinator Prof. JALALUDDEEN B.M DEPT. OF CSE Prof. NUBILA JALEEL DEPT. OF CSE DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 1
  • 2. MONEY PAD - THE FUTURE WALLET DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 2
  • 3. TABLE OF CONTENTS DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 3 1. INTRODUCTION 7. WHY USE MONEY PAD 2. WHAT IS BIOMETRICS 8. TECHNOLOGY USED 3. LITERATURE SURVEY 9. FIELDS OF APPLICATION 4. CREDIT CARDS 10. FURTHER ENHANCEMENT 5. SMART CARDS 11. CONCLUSION 6. METHODOLOGY 12. REFERENCES
  • 4. 1. INTRODUCTION ● Just as now everything that we use are using are under the shadow of “e” today we have paper currency that is also being replaced by electronic money or e- cash. ● The e-cash handling system is a device that facilitates secure currency transactions. We call it as Money Pad which recognizes Finger Print’s of the user and decides whether the user is a authorized person or not. ● Every time the user wants to access the Money Pad he has to make an impression of his finger, which will be sensed and matched with the one in the hard disk. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 4
  • 5. 2. WHAT IS BIOMETRICS? Biometric Technologies are defined as automated methods of identifying or authenticating the identity of a living person based on unique physiological or behavioral characteristics. Biometrics can provide very secure and convenient authentication for an individual since they cannot be stolen or forgotten and very difficult to forge. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 5
  • 6. 3. LITERATURE SURVEY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 6 [1]. An Efficient Method for Securing the e-payment System : Money Pad In the emerging field of electronic commerce, novel buzzwords like smart-card, online banking, digital cash and electronic cheques are being used as money. But how are these brand called as the new forms of a secure payment? And most importantly, which of these newly emerging secure electronic money technologies will survive into the next century? These are some of the tough questions that is to answered but here’s a solution, that provide security to these modes of currencies, and these modes of currencies are exchanged by using the “Biometrics Technology”. [2]. Role of e – banking services in the banking sector This research paid an attention through exploratory method to recognize the issues acting as difficulties in the practice of the of clientele on banking through technology. banking services offered through internet and rework the acuity
  • 7. 3. LITERATURE SURVEY(Contd..) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 7 [3]. Reasons for Non-Adoption of Internet Banking: A Study with Reference to Vellore District of Tamil Nadu, India J. Ramola Premalatha1 & N. Sundaram1 With the expansion of Internet usage, E -banking has become one of the most revolutionized components of today's economic growth. E-banking is a powerful value- added tool to attract new customers and retain the existing ones.
  • 8. 4. CREDIT CARDS Credit card is payment device that allow the consumer to make purchase within guaranteed limit defined by the issuer of card. Processing of funds is done electronically. The user insert he card into the card reader machine, the machine asks secure information like password etc. for the verification of the user. After providing the authentication the user is allowed to perform the transaction. As credit card provides privacy and security it also has disadvantages: ● Clearing of funds instantly is not possible. ● Once the card is expired it has to be renewed. ● User has to pay additional charges to get the service from the bank thus it always in under the pressure of limits ● Using fixed encryption transactions is insecure. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 8
  • 9. 5. SMART CARDS Smart cards have embedded with a microchip and it appears like a credit card, but it store information and sometime even performs simple calculation. Payment value in the form of currency value is stored in this chip and can be retrieved with specially designed card reader. Common smartcard chips hold about 8,000 bytes of information that can perform variety of functions. As credit card has disadvantages, smart card also has disadvantages: ● Using fixed encryption transactions is insecure. ● Due to chip failure there is a risk of data loss. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 9
  • 10. 6. METHODOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 10 Fig 1. Working of money pad 1. Money Pad 3. Database Server 2. Fingerprint Information collected is passed to the server for verification 4. Further Transaction Authorized Not Authorized 5. Message is sent to owner’s account
  • 11. 6. METHODOLOGY (Contd..) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 11 Identification Fingerprint sensor Feature Extraction Database Feature Extraction Matching Fingerprint sensor ID number Verification output Fig 2. Identifying and Verification process in Money Pad along with Finger Print Record
  • 12. 1. Money Pad Money pad is secure medium of exchange for currency. It carries digital cash as paper cash will not be there. Money pad contains biometric technology. It is similar to credit cards and smart cards just like floppy disk. It consists of touch sensor and magnetic disk as its peripherals. Touch sensor records the fingerprint of the user, and magnetic disk has read and write permission and also and holds authentication details of user. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 12 6. METHODOLOGY (Contd..) Fig 3. Operations on money pad
  • 13. 2. HOW TO USE MONEY PAD New User: ● With e-banking facility visit a nearby bank. ● With some balance create an account. ● Give important details along with fingerprints. ● Along with money pad user is given bank code and account number. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 12 6. METHODOLOGY (Contd..)
  • 14. 3. Transaction using money pad DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 13 6. METHODOLOGY (Contd..) 1. Money Pad 2. Fingerprint 3. Enter Bank Code & Account number 4. Checks for authorization 5. If authorized allows further transaction 6. If not authorized it will mailed back to the owner’s account
  • 15. 7. WHY USE MONEY PAD? ● Instant clearing of funds ● Avoids the Unsafe Way of Carrying ● Provide Strong Security ● Can be Meet by a Common ● Avoids the Issue of Renewing DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 14
  • 16. 8. TECHNOLOGY USED ● Biometrics comprises methods for uniquely recognizing human based upon one or more intrinsic physical or behavioral traits. ● In Computer Science, biometrics is used as a form of identifying access management and access control. It is also used to identify individuals in groups that are under surveillance. ● Biometrics attempts to confirm an individuals claimed identity by comparing a submitted sample to one or more previously enrolled templates. ● Closed set identification is the person known to exist in the database. Open set identification is the person that is not existed in the database. System determines if the person identification from the database. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 16
  • 17. The accuracy of biometric system is measured in two ways: ● False Acceptance Rate – when an unauthorized subject is accepted as valid. ● False Rejection Rate – when an authorized subject is rejected by the biometric system as unauthorized. Biometric system contains fingerprint verification, which authenticates whether the user is an authorized person or not. It has a glass plate that involves the user to place his or her finger over it, which resides over a high- resolution change coupled cameras. The image that is captured is compared to the image in system database and decides the user authentication. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 17 8. TECHNOLOGY USED (Contd..)
  • 18. 9. FIELD OF APPLICATIONS ● Applicable in any kind of e-banks and e-transaction. ● Can be used to carry out remote transaction. ● Useful to carry Digital Cash. ● Utilization of individual data in filling order forms ● Applicable in m-commerce transaction ● Applicable in daily life DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 18
  • 19. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 19 PROS CONS Easy and fast Portable Flexible Secured Expensive For security purpose it uses fingerprint detection, so if person’s finger gets accidently cut or injured the detection technique will fail to match the patterns.
  • 20. 10. FURTHER ENHANCEMENT ● Understanding the disadvantage of the current working of money pad that is the fingerprint scan, not so worthy for the disabled people. ● In the new version of Money Pad which is enhanced by me includes retina scan instead of finger print. ● In current version finger print of the user is used in biometric system and the disadvantage of it was that if the user doesn’t have the finger so he/she can’t access the money pad. ● Now in the future the user that doesn’t have finger can also access the money pad through retina scan. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 20
  • 21. 11. CONCLUSION ● The following are three necessary requirements: 1. Instant clearing of funds. 2. Elimination of payment risk. 3. Using strong encryption there is a secure transaction. ● Since the money pad is able to satisfy the above requirements there will be no doubt that in future it will be widely suggested for use. ● In future when the internet will capture the whole world. All the work will be done through the internet then there will be no use of any card or pad, just a small device which can detect the fingerprint will be attached at any place throughout the world. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 21
  • 22. 12. REFERENCES 1. An Efficient Method for Securing the e-payment System : Money Pad Swapnesh Taterh1 1 Associate Professor, Amity Institute of Information Technology, Amity University, Rajasthan, India. Email: staterh@jpr.amity.edu 2. Role of e – banking services in the banking sector, Ghobadian, A. (1994). ‘Service quality 3. Reasons for Non-Adoption of Internet Banking: A Study with Reference to Vellore District of Tamil Nadu, India J. Ramola Premalatha1 & N. Sundaram1 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 22
  • 23. THANK YOU ! Any queries? DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 23