ATM SecurityATM Security
Existing ATM SystemExisting ATM System
 Government Developed ATMGovernment Developed ATM
Machine those people who doMachine those people who do
not a stand for a rank of row.not a stand for a rank of row.
Maximum People is attract thisMaximum People is attract this
system because it is timesystem because it is time
consuming and user friendly.consuming and user friendly.
Government provide manyGovernment provide many
security of that system like, ATMsecurity of that system like, ATM
Card No., PIN No.Card No., PIN No.
Drawback of Existing ATMDrawback of Existing ATM
MachineMachine
 ATM system is not secureATM system is not secure
Old ATM system is not provide proper
security, because of these system is only
provide Card Id and PIN number. Hacker or
Thief easily gathered this Card Id and PIN
number.
Thief and Hacker always followed
those type of users, they access there
account many times.
ATM Security SystemATM Security System
To overcomes all drawbacks of ExistingTo overcomes all drawbacks of Existing
ATM system so I developed aATM system so I developed a
softwaresoftware “ATM SECURITY“ATM SECURITY
SYSTEM”SYSTEM”.. This security systemThis security system
provide proper security to secureprovide proper security to secure
user accounts. This system is easyuser accounts. This system is easy
to access and provide strongto access and provide strong
security. This security is tough forsecurity. This security is tough for
hackers because of strong uniquehackers because of strong unique
code, these code is a actual securitycode, these code is a actual security
of in this system.of in this system.
Procedure of that SystemProcedure of that System
This software is similar to the Old ATM Machine SystemThis software is similar to the Old ATM Machine System
but difference is, in this system we entered first ATMbut difference is, in this system we entered first ATM
Card ID then second PIN Number and third isCard ID then second PIN Number and third is
UNIQUE CODE.UNIQUE CODE. Following are the step byFollowing are the step by
procedure of that system,procedure of that system,
1.1. We entered ATM Card in a Card Reader on the ATMWe entered ATM Card in a Card Reader on the ATM
Machine. Card Reader verify the ID number.Machine. Card Reader verify the ID number.
2.2. And also entered PIN number, these PIN numberAnd also entered PIN number, these PIN number
and Card ID by ATM Machine is sends to the bankand Card ID by ATM Machine is sends to the bank
server and Website through internet.server and Website through internet.
3.3. Server and Website verify this information, and thenServer and Website verify this information, and then
it match between original information to the gatheredit match between original information to the gathered
information, if it is match account is open else it isinformation, if it is match account is open else it is
exit.exit.
4.4. After verifying process website or bank server isAfter verifying process website or bank server is
sends one specific Code on customer Cell phonesends one specific Code on customer Cell phone
Procedure of that SystemProcedure of that System
5.5. Customer Accept this code and put on the ATMCustomer Accept this code and put on the ATM
Machine.Machine.
6.6. When customer press enter then another window isWhen customer press enter then another window is
open, it is Account module.open, it is Account module.
7.7. Customer enter amount, and then ATM System isCustomer enter amount, and then ATM System is
verify funds, Deduct funds and then Provide cashverify funds, Deduct funds and then Provide cash
and also receipt.and also receipt.
8.8. Customer accept cash and Reject the card in a cardCustomer accept cash and Reject the card in a card
reader.reader.
This is a quality of Software.This is a quality of Software.
ModulesModules
1.1. Login ModuleLogin Module
2.2. Information ModuleInformation Module
3.3. Account ModuleAccount Module
4.4. Record ModuleRecord Module
Hardware RequirementsHardware Requirements
Processor : Pentium IV 3.0 MHzProcessor : Pentium IV 3.0 MHz
Memory size : 512 MB RAMMemory size : 512 MB RAM
StorageStorage : 40 GB Hard Disk: 40 GB Hard Disk
DisplayDisplay :: VGA Color MonitorVGA Color Monitor
600 x 800 Pixel Resolution600 x 800 Pixel Resolution
High Color (16 Bit)High Color (16 Bit)
Key BoardKey Board :: Any with minimum requiredAny with minimum required
keyskeys
MouseMouse :: AnyAny
MobileMobile :: Any MobileAny Mobile
Software RequirementsSoftware Requirements
Operating System : Windows 2003, AnyOperating System : Windows 2003, Any
Server Operating SystemServer Operating System
Front-End Tool : Java Swing,Front-End Tool : Java Swing,
J2MEJ2ME
Back-End Tool : Ms-AccessBack-End Tool : Ms-Access
WebsiteWebsite : www. .com: www. .com
Features ScopeFeatures Scope
1.1. Long Time History ModuleLong Time History Module
Also Your Own Advised..Also Your Own Advised..

Atm security

  • 1.
  • 2.
    Existing ATM SystemExistingATM System  Government Developed ATMGovernment Developed ATM Machine those people who doMachine those people who do not a stand for a rank of row.not a stand for a rank of row. Maximum People is attract thisMaximum People is attract this system because it is timesystem because it is time consuming and user friendly.consuming and user friendly. Government provide manyGovernment provide many security of that system like, ATMsecurity of that system like, ATM Card No., PIN No.Card No., PIN No.
  • 3.
    Drawback of ExistingATMDrawback of Existing ATM MachineMachine  ATM system is not secureATM system is not secure Old ATM system is not provide proper security, because of these system is only provide Card Id and PIN number. Hacker or Thief easily gathered this Card Id and PIN number. Thief and Hacker always followed those type of users, they access there account many times.
  • 4.
    ATM Security SystemATMSecurity System To overcomes all drawbacks of ExistingTo overcomes all drawbacks of Existing ATM system so I developed aATM system so I developed a softwaresoftware “ATM SECURITY“ATM SECURITY SYSTEM”SYSTEM”.. This security systemThis security system provide proper security to secureprovide proper security to secure user accounts. This system is easyuser accounts. This system is easy to access and provide strongto access and provide strong security. This security is tough forsecurity. This security is tough for hackers because of strong uniquehackers because of strong unique code, these code is a actual securitycode, these code is a actual security of in this system.of in this system.
  • 5.
    Procedure of thatSystemProcedure of that System This software is similar to the Old ATM Machine SystemThis software is similar to the Old ATM Machine System but difference is, in this system we entered first ATMbut difference is, in this system we entered first ATM Card ID then second PIN Number and third isCard ID then second PIN Number and third is UNIQUE CODE.UNIQUE CODE. Following are the step byFollowing are the step by procedure of that system,procedure of that system, 1.1. We entered ATM Card in a Card Reader on the ATMWe entered ATM Card in a Card Reader on the ATM Machine. Card Reader verify the ID number.Machine. Card Reader verify the ID number. 2.2. And also entered PIN number, these PIN numberAnd also entered PIN number, these PIN number and Card ID by ATM Machine is sends to the bankand Card ID by ATM Machine is sends to the bank server and Website through internet.server and Website through internet. 3.3. Server and Website verify this information, and thenServer and Website verify this information, and then it match between original information to the gatheredit match between original information to the gathered information, if it is match account is open else it isinformation, if it is match account is open else it is exit.exit. 4.4. After verifying process website or bank server isAfter verifying process website or bank server is sends one specific Code on customer Cell phonesends one specific Code on customer Cell phone
  • 6.
    Procedure of thatSystemProcedure of that System 5.5. Customer Accept this code and put on the ATMCustomer Accept this code and put on the ATM Machine.Machine. 6.6. When customer press enter then another window isWhen customer press enter then another window is open, it is Account module.open, it is Account module. 7.7. Customer enter amount, and then ATM System isCustomer enter amount, and then ATM System is verify funds, Deduct funds and then Provide cashverify funds, Deduct funds and then Provide cash and also receipt.and also receipt. 8.8. Customer accept cash and Reject the card in a cardCustomer accept cash and Reject the card in a card reader.reader. This is a quality of Software.This is a quality of Software.
  • 7.
    ModulesModules 1.1. Login ModuleLoginModule 2.2. Information ModuleInformation Module 3.3. Account ModuleAccount Module 4.4. Record ModuleRecord Module
  • 8.
    Hardware RequirementsHardware Requirements Processor: Pentium IV 3.0 MHzProcessor : Pentium IV 3.0 MHz Memory size : 512 MB RAMMemory size : 512 MB RAM StorageStorage : 40 GB Hard Disk: 40 GB Hard Disk DisplayDisplay :: VGA Color MonitorVGA Color Monitor 600 x 800 Pixel Resolution600 x 800 Pixel Resolution High Color (16 Bit)High Color (16 Bit) Key BoardKey Board :: Any with minimum requiredAny with minimum required keyskeys MouseMouse :: AnyAny MobileMobile :: Any MobileAny Mobile
  • 9.
    Software RequirementsSoftware Requirements OperatingSystem : Windows 2003, AnyOperating System : Windows 2003, Any Server Operating SystemServer Operating System Front-End Tool : Java Swing,Front-End Tool : Java Swing, J2MEJ2ME Back-End Tool : Ms-AccessBack-End Tool : Ms-Access WebsiteWebsite : www. .com: www. .com
  • 10.
    Features ScopeFeatures Scope 1.1.Long Time History ModuleLong Time History Module Also Your Own Advised..Also Your Own Advised..