AN ATM WITH AN EYE
Presented by
###########
12####
Under the guidance of
##########
1
2
INTTRODUCTION
An automated teller machine (ATM) is :
 Computerize telecommunications
 Made money transactions easy for customers to bank.
 Device that provides the customers of a financial transactions in a public
space without the need for a human clerk or bank teller.
 Security requiring combination Physical access card+ Password(PIN)
Personal Identification Number
(Pin)
PIN is one method used by banks and phone companies to
protect your account from unauthorized access
PIN is a confidential code issued to the cardholder to permit
access to that account
PIN should be memorized, secured and not given to anyone, not
even family members or bank employees
3
 The chances of misuse of ATM are manifold due to the
exponential growth of 'intelligent' criminals day by day.
 There is an urgent need for improving security in banking region.
With the advent of ATM though banking became a lot easier it
even became a lot vulnerable.
 Provide a cordless, password-free way to get their money out of
an ATM
 The development of a system that integrates Facial recognition
and Iris scanning technology into the identity verification
process used in ATMs.
An ATM With An
Eye
4
On Most Modern ATM, The
Customer Is
Identified by inserting a plastic ATM card with a magnetic
stripe or a plastic smartcard with a chip, that contains a unique
card number and some security information, such as an
expiration date or cvvc (cvv). Security is provided by : the
customer entering A personal identification number (PIN).
5
 By forcing the ATM match a live image of a customer’s
face/eye with an image stored in a bank database (associated
with the account number) when the data matches(account
image and stored image) user be considered fully verified
 A system can examine just the eyes, or the eyes nose and
mouth, or ears, nose, mouth and eyebrows, and so on.
Working
6
Techniques
BIOMETRIC IDENTIFICATION TECHNIQUES
 Finger Printing
 Retina Scanning
 Facial Recognition
 Iris Recognition
7
8
How It Work
A camera based in ash machine will
 Detect the pattern in second
 Compare it with one store in a central computer.
 Or encode on to the cash card.
A sensor system examines the randomly
 Formed features of the iris of the eye
 as unique as a fingerprint.
Where It Used
The development of such a system would
 serve to protect consumers
financial institutions alike from fraud
other breaches of security.
FIGURE-3
9
Camera Installation On ATM
Machine
FIGURE-4 10
Portrait camera
Camera Snapshots
Cash slot(Dispenser) camera
FIGURE-5
11
15/03/11 12
Function
12
Iris code generation
FIGURE-6
13
Steps Of Iris Working
14
EYE automatically discover SNMP enabled devices,
application servers and applications. EYE has up-to-date and
accurate end-to-end visibility on what’s happening on your
infrastructure.
Troubleshooting
FIGURE-6
15
Network of troubleshooting
16
17
Conclusion
We Thus Develop An Atm Model That Is
 More reliable in providing security by using facial recognition
software.
 By keeping the time elapsed in the verification process to a
negligible amount
 Try to maintain the efficiency of this ATM system
REFERENCES
[1] www.nationmaster.com
[2] www.google.co.in
[3] www.atmeye.net
[4] Wikipedia
18
19

AN ATM WITH AN EYE BY SAIKIRAN PANJALA

  • 1.
    AN ATM WITHAN EYE Presented by ########### 12#### Under the guidance of ########## 1
  • 2.
    2 INTTRODUCTION An automated tellermachine (ATM) is :  Computerize telecommunications  Made money transactions easy for customers to bank.  Device that provides the customers of a financial transactions in a public space without the need for a human clerk or bank teller.  Security requiring combination Physical access card+ Password(PIN)
  • 3.
    Personal Identification Number (Pin) PINis one method used by banks and phone companies to protect your account from unauthorized access PIN is a confidential code issued to the cardholder to permit access to that account PIN should be memorized, secured and not given to anyone, not even family members or bank employees 3
  • 4.
     The chancesof misuse of ATM are manifold due to the exponential growth of 'intelligent' criminals day by day.  There is an urgent need for improving security in banking region. With the advent of ATM though banking became a lot easier it even became a lot vulnerable.  Provide a cordless, password-free way to get their money out of an ATM  The development of a system that integrates Facial recognition and Iris scanning technology into the identity verification process used in ATMs. An ATM With An Eye 4
  • 5.
    On Most ModernATM, The Customer Is Identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information, such as an expiration date or cvvc (cvv). Security is provided by : the customer entering A personal identification number (PIN). 5
  • 6.
     By forcingthe ATM match a live image of a customer’s face/eye with an image stored in a bank database (associated with the account number) when the data matches(account image and stored image) user be considered fully verified  A system can examine just the eyes, or the eyes nose and mouth, or ears, nose, mouth and eyebrows, and so on. Working 6
  • 7.
    Techniques BIOMETRIC IDENTIFICATION TECHNIQUES Finger Printing  Retina Scanning  Facial Recognition  Iris Recognition 7
  • 8.
    8 How It Work Acamera based in ash machine will  Detect the pattern in second  Compare it with one store in a central computer.  Or encode on to the cash card. A sensor system examines the randomly  Formed features of the iris of the eye  as unique as a fingerprint.
  • 9.
    Where It Used Thedevelopment of such a system would  serve to protect consumers financial institutions alike from fraud other breaches of security. FIGURE-3 9
  • 10.
    Camera Installation OnATM Machine FIGURE-4 10
  • 11.
    Portrait camera Camera Snapshots Cashslot(Dispenser) camera FIGURE-5 11
  • 12.
  • 13.
  • 14.
    Steps Of IrisWorking 14
  • 15.
    EYE automatically discoverSNMP enabled devices, application servers and applications. EYE has up-to-date and accurate end-to-end visibility on what’s happening on your infrastructure. Troubleshooting FIGURE-6 15
  • 16.
  • 17.
    17 Conclusion We Thus DevelopAn Atm Model That Is  More reliable in providing security by using facial recognition software.  By keeping the time elapsed in the verification process to a negligible amount  Try to maintain the efficiency of this ATM system
  • 18.
  • 19.