an atm with an eye

13,732 views

Published on

Published in: Technology, Economy & Finance
  • Be the first to comment

an atm with an eye

  1. 1. AN ATM WITH AN EYE THE FUTURE’S TECHNOLOGY MOHD NAZIR SHAKEEL 1
  2. 2. Outline  ATM  ATM WITH AN EYE  ON THE MOST CUSTOMER IS  WHERE IT IS USE  WORKING  TECHNIQUES  HOW IT WORK  PROTECTION  CONCLUSION  REFERENCES 2
  3. 3. Automated Teller Machine An automated teller machine (ATM) is :  Computerize telecommunications  Made money transactions easy for customers to bank.  Device that provides the customers of a financial transactions in a public space without the need for a human clerk or bank teller.  Security requiring combination Physical access card+ Password(PIN) 3
  4. 4. 4 Physical Access Card (ATM Card) 1. Card Provider Name : Name of Card Provider like bank or financial institute; for E.g.. ICICI Bank, SBI Bank etc. 2. Card Number : 16 Digit Number. It divided into 4 parts with 4 number. 3. 3D Hologram : Contain 3D Hologram to represent whether it is Visa card or Maestro. 4. Valid From : It contains valid from date, i.e. Contains the card activation date. 5. Valid Thru : It contains valid thru date, i.e. Contains last date for the use of card. 6. Brand Logo : Contains Brand FIGURE-1
  5. 5. 8. Magnetic Strip : Contains Magnetic Strip have special identification 9. Verification Number : Contains Three digit verification number. 10. Signature Panel : Contains Signature Panel, i.e. Card Holder Signature. FIGURE-2 5
  6. 6. Password  Whether you are on the internet or an online banking program, you are often required to use a password  The worst passwords to use are the ones that come to mind first name, spouse's name, maiden name, pets, children's name, even street addresses, etc.  The best passwords mix numbers with upper and lowercase letters. A password that is not found in the dictionary is even better. 6
  7. 7. Personal Identification Number (Pin)  PIN is one method used by banks and phone companies to protect your account from unauthorized access  PIN is a confidential code issued to the cardholder to permit access to that account  PIN should be memorized, secured and not given to anyone, not even family members or bank employees 7
  8. 8.  The chances of misuse of this much hyped 'insecure' baby product (ATM) are manifold due to the exponential growth of 'intelligent' criminals day by day.  There is an urgent need for improving security in banking region. With the advent of ATM though banking became a lot easier it even became a lot vulnerable.  Provide a cordless, password-free way to get their money out of an ATM An ATM With An Eye 8
  9. 9. On Most Modern ATM, The Customer Is Identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information, such as an expiration date or cvvc (cvv). Security is provided by : the customer entering A personal identification number (PIN). 9
  10. 10.  By forcing the ATM match a live image of a customer’s face/eye with an image stored in a bank database (associated with the account number) when the data matches(account image and stored image) user be considered fully verified  A system can examine just the eyes, or the eyes nose and mouth, or ears, nose, mouth and eyebrows, and so on. Working 10
  11. 11. Techniques BIOMETRIC IDENTIFICATION TECHNIQUES  Finger Printing  Retina Scanning  Facial Recognition  Iris Recognition 11
  12. 12. How It Work A camera based in ash machine will  Detect the pattern in second  Compare it with one store in a central computer.  Or encode on to the cash card. A sensor system examines the randomly  Formed features of the iris of the eye  as unique as a fingerprint. 12
  13. 13. Where It Used The development of such a system would  serve to protect consumers  financial institutions alike from fraud  other breaches of security. FIGURE-3 13
  14. 14. Camera Installation On ATM Machine FIGURE-4 14
  15. 15. Portrait camera Camera Snapshots Cash slot(Dispenser) camera FIGURE-5 15
  16. 16. Iris code generation FIGURE-6 16
  17. 17. Steps Of Iris Working 17
  18. 18. How you protect your password  Changing your password regularly  Memorizing your password.  If you do write down the password, keep it at home or hidden at work. Don't rewrite your password on a post-it note and stick it on your monitor or hard drive.  Web site remember a password for you, don't use it. Anyone who uses your machine will have automatic access to information that is password protected. 18
  19. 19. Protect Your ATM Cards  An ATM card should be treated as thought it were cash.  Avoid providing card and account information to anyone over the telephone.  When making a cash withdrawal at an ATM, immediately remove the case as soon as the machine releases it.  Put the case in your pocket and wait until you are in a secure location before counting it.  Never use an ATM in an isolated area or never leave up receipt  Be sure to take your receipt to record transactions and match them against monthly statements. 19
  20. 20. Conclusion We Thus Develop An Atm Model That Is  More reliable in providing security by using facial recognition software.  By keeping the time elapsed in the verification process to a negligible amount  Try to maintain the efficiency of this ATM system 20
  21. 21. REFERENCES [1] www.nationmaster.com [2] www.google.co.in [3] www.atmeye.net [4] Wikipedia 21
  22. 22. 22

×