SlideShare a Scribd company logo
1 of 21
AN ATM W ITH AN EYE
THE FUTURE’S
TECHNOLOGY
Ch. John Williams
ECE Department
B.Tech IV Year
1
Outline
2
▪
▪
▪
▪
▪
▪
▪
▪
▪
▪
▪
ATM
ATM WITH AN EYE
ON THE MOST CUSTOMER IS
WHERE IT IS USE
WORKING
TECHNIQUES
HOW IT WORK
FUNCTION
PROTECTION
CONCLUSION
REFERENCES
Automated Teller Machine
3
An automated teller machine (ATM) is :
▪
▪
▪
Computerize telecommunications
Made money transactions easy for customers to bank.
Device that provides the customers of a financial transactions in
a public space without the need for a human clerk or bank teller.
▪ Security requiring combination Physical access card+
Password(PIN)
Personal Identification Number
(Pin)
4
▪PIN is one method used by banks and phone companies to
protect your account from unauthorized access
▪PIN is a confidential code issued to the cardholder to permit
access to that account
▪PIN should be memorized, secured and not given to anyone, not
even family members or bank employees
▪
5
▪
▪
The chances of misuse of this much hyped 'insecure' baby
product (ATM) are manifold due to the exponential growth of
'intelligent' criminals day by day.
There is an urgent need for improving security in banking
region. With the advent of ATM though banking became a lot
easier it even became a lot vulnerable.
Provide a cordless, password-free way to get their money out of
an ATM
An ATM With An
Eye
On Most Modern ATM, The
Customer Is
6
Identified by inserting a plastic ATM card with a magnetic
stripe or a plastic smartcard with a chip, that contains a unique
card number and some security information, such as an
expiration date or cvvc (cvv). Security is provided by : the
customer entering A personal identification number (PIN).
▪
7
▪
By forcing the ATM match a live image of a customer’s
face/eye with an image stored in a bank database (associated
with the account number) when the data matches(account
image and stored image) user be considered fully verified
A system can examine just the eyes, or the eyes nose and
mouth, or ears, nose, mouth and eyebrows, and so on.
Working
Techniques
8
BIOMETRIC IDENTIFICATION TECHNIQUES
▪ Finger Printing
▪ Retina Scanning
▪ Facial Recognition
▪ Iris Recognition
How It Work
9
Acamera based in ash machine will
▪
▪
▪
Detect the pattern in second
Compare it with one store in a central computer.
Or encode on to the cash card.
Asensor system examines the randomly
▪
▪
Formed features of the iris of the eye
as unique as a fingerprint.
Where It Used
The development of such a system would
▪ serve to protect consumers
▪financial institutions alike from fraud
▪other breaches of security.
10
FIGURE-3
Camera Installation On ATM
Machine
FIGURE-4
11
Portrait camera
Camera Snapshots
Cash slot(Dispenser) camera
FIGURE-5
12
Function
13
Iris code generation
FIGURE-6 14
Steps Of Iris Working
15
Troubleshooting
16
FIGURE-6
EYE automatically discover SNMP enabled devices,
application servers and applications. EYE has up-to-date and
accurate end-to-end visibility on what’s happening on your
infrastructure.
Network of troubleshooting
17
Conclusion
18
We Thus DevelopAnAtm Model That Is
▪
▪
▪ More reliable in providing security by using facial recognition
software.
By keeping the time elapsed in the verification process to a
negligible amount
Try to maintain the efficiency of this ATM system
REFERENCES
19
1 www.nationmaster.com
2 www.google.co.in
3 www.atmeye.net
4 Wikipedia
20
21

More Related Content

Similar to anatmwithaneye-130613013000-phpapp01 (1).pptx

Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)amanjit9306
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
ATM and E- Banking
ATM and E- BankingATM and E- Banking
ATM and E- BankingAniketPujari
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingYiannis Hatzopoulos
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...IJSRED
 
ATM / Electronic Clearing Service
ATM / Electronic Clearing ServiceATM / Electronic Clearing Service
ATM / Electronic Clearing ServiceANANDHU BALAN
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
atmc-200505115106 (2).pptx
atmc-200505115106 (2).pptxatmc-200505115106 (2).pptx
atmc-200505115106 (2).pptxNEERAJRAJPUT81
 

Similar to anatmwithaneye-130613013000-phpapp01 (1).pptx (20)

Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
ATM WITH AN EYE
ATM WITH AN EYEATM WITH AN EYE
ATM WITH AN EYE
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Atm security
Atm securityAtm security
Atm security
 
ATM Security
ATM SecurityATM Security
ATM Security
 
13362741.ppt
13362741.ppt13362741.ppt
13362741.ppt
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
ATM and E- Banking
ATM and E- BankingATM and E- Banking
ATM and E- Banking
 
Tellerpass -
Tellerpass -  Tellerpass -
Tellerpass -
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for Banking
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
ATM / Electronic Clearing Service
ATM / Electronic Clearing ServiceATM / Electronic Clearing Service
ATM / Electronic Clearing Service
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
atmc-200505115106 (2).pptx
atmc-200505115106 (2).pptxatmc-200505115106 (2).pptx
atmc-200505115106 (2).pptx
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

anatmwithaneye-130613013000-phpapp01 (1).pptx

  • 1. AN ATM W ITH AN EYE THE FUTURE’S TECHNOLOGY Ch. John Williams ECE Department B.Tech IV Year 1
  • 2. Outline 2 ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ATM ATM WITH AN EYE ON THE MOST CUSTOMER IS WHERE IT IS USE WORKING TECHNIQUES HOW IT WORK FUNCTION PROTECTION CONCLUSION REFERENCES
  • 3. Automated Teller Machine 3 An automated teller machine (ATM) is : ▪ ▪ ▪ Computerize telecommunications Made money transactions easy for customers to bank. Device that provides the customers of a financial transactions in a public space without the need for a human clerk or bank teller. ▪ Security requiring combination Physical access card+ Password(PIN)
  • 4. Personal Identification Number (Pin) 4 ▪PIN is one method used by banks and phone companies to protect your account from unauthorized access ▪PIN is a confidential code issued to the cardholder to permit access to that account ▪PIN should be memorized, secured and not given to anyone, not even family members or bank employees
  • 5. ▪ 5 ▪ ▪ The chances of misuse of this much hyped 'insecure' baby product (ATM) are manifold due to the exponential growth of 'intelligent' criminals day by day. There is an urgent need for improving security in banking region. With the advent of ATM though banking became a lot easier it even became a lot vulnerable. Provide a cordless, password-free way to get their money out of an ATM An ATM With An Eye
  • 6. On Most Modern ATM, The Customer Is 6 Identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information, such as an expiration date or cvvc (cvv). Security is provided by : the customer entering A personal identification number (PIN).
  • 7. ▪ 7 ▪ By forcing the ATM match a live image of a customer’s face/eye with an image stored in a bank database (associated with the account number) when the data matches(account image and stored image) user be considered fully verified A system can examine just the eyes, or the eyes nose and mouth, or ears, nose, mouth and eyebrows, and so on. Working
  • 8. Techniques 8 BIOMETRIC IDENTIFICATION TECHNIQUES ▪ Finger Printing ▪ Retina Scanning ▪ Facial Recognition ▪ Iris Recognition
  • 9. How It Work 9 Acamera based in ash machine will ▪ ▪ ▪ Detect the pattern in second Compare it with one store in a central computer. Or encode on to the cash card. Asensor system examines the randomly ▪ ▪ Formed features of the iris of the eye as unique as a fingerprint.
  • 10. Where It Used The development of such a system would ▪ serve to protect consumers ▪financial institutions alike from fraud ▪other breaches of security. 10 FIGURE-3
  • 11. Camera Installation On ATM Machine FIGURE-4 11
  • 12. Portrait camera Camera Snapshots Cash slot(Dispenser) camera FIGURE-5 12
  • 15. Steps Of Iris Working 15
  • 16. Troubleshooting 16 FIGURE-6 EYE automatically discover SNMP enabled devices, application servers and applications. EYE has up-to-date and accurate end-to-end visibility on what’s happening on your infrastructure.
  • 18. Conclusion 18 We Thus DevelopAnAtm Model That Is ▪ ▪ ▪ More reliable in providing security by using facial recognition software. By keeping the time elapsed in the verification process to a negligible amount Try to maintain the efficiency of this ATM system
  • 20. 20
  • 21. 21