SlideShare a Scribd company logo
1 of 10
ATM SecurityATM Security
Existing ATM SystemExisting ATM System
 Government Developed ATMGovernment Developed ATM
Machine those people who doMachine those people who do
not a stand for a rank of row.not a stand for a rank of row.
Maximum People is attract thisMaximum People is attract this
system because it is timesystem because it is time
consuming and user friendly.consuming and user friendly.
Government provide manyGovernment provide many
security of that system like, ATMsecurity of that system like, ATM
Card No., PIN No.Card No., PIN No.
Drawback of Existing ATMDrawback of Existing ATM
MachineMachine
 ATM system is not secureATM system is not secure
Old ATM system is not provide proper
security, because of these system is only
provide Card Id and PIN number. Hacker or
Thief easily gathered this Card Id and PIN
number.
Thief and Hacker always followed
those type of users, they access there
account many times.
ATM Security SystemATM Security System
To overcomes all drawbacks of ExistingTo overcomes all drawbacks of Existing
ATM system so I developed aATM system so I developed a
softwaresoftware “ATM SECURITY“ATM SECURITY
SYSTEM”SYSTEM”.. This security systemThis security system
provide proper security to secureprovide proper security to secure
user accounts. This system is easyuser accounts. This system is easy
to access and provide strongto access and provide strong
security. This security is tough forsecurity. This security is tough for
hackers because of strong uniquehackers because of strong unique
code, these code is a actual securitycode, these code is a actual security
of in this system.of in this system.
Procedure of that SystemProcedure of that System
This software is similar to the Old ATM Machine SystemThis software is similar to the Old ATM Machine System
but difference is, in this system we entered first ATMbut difference is, in this system we entered first ATM
Card ID then second PIN Number and third isCard ID then second PIN Number and third is
UNIQUE CODE.UNIQUE CODE. Following are the step byFollowing are the step by
procedure of that system,procedure of that system,
1.1. We entered ATM Card in a Card Reader on the ATMWe entered ATM Card in a Card Reader on the ATM
Machine. Card Reader verify the ID number.Machine. Card Reader verify the ID number.
2.2. And also entered PIN number, these PIN numberAnd also entered PIN number, these PIN number
and Card ID by ATM Machine is sends to the bankand Card ID by ATM Machine is sends to the bank
server and Website through internet.server and Website through internet.
3.3. Server and Website verify this information, and thenServer and Website verify this information, and then
it match between original information to the gatheredit match between original information to the gathered
information, if it is match account is open else it isinformation, if it is match account is open else it is
exit.exit.
4.4. After verifying process website or bank server isAfter verifying process website or bank server is
sends one specific Code on customer Cell phonesends one specific Code on customer Cell phone
Procedure of that SystemProcedure of that System
5.5. Customer Accept this code and put on the ATMCustomer Accept this code and put on the ATM
Machine.Machine.
6.6. When customer press enter then another window isWhen customer press enter then another window is
open, it is Account module.open, it is Account module.
7.7. Customer enter amount, and then ATM System isCustomer enter amount, and then ATM System is
verify funds, Deduct funds and then Provide cashverify funds, Deduct funds and then Provide cash
and also receipt.and also receipt.
8.8. Customer accept cash and Reject the card in a cardCustomer accept cash and Reject the card in a card
reader.reader.
This is a quality of Software.This is a quality of Software.
ModulesModules
1.1. Login ModuleLogin Module
2.2. Information ModuleInformation Module
3.3. Account ModuleAccount Module
4.4. Record ModuleRecord Module
Hardware RequirementsHardware Requirements
Processor : Pentium IV 3.0 MHzProcessor : Pentium IV 3.0 MHz
Memory size : 512 MB RAMMemory size : 512 MB RAM
StorageStorage : 40 GB Hard Disk: 40 GB Hard Disk
DisplayDisplay :: VGA Color MonitorVGA Color Monitor
600 x 800 Pixel Resolution600 x 800 Pixel Resolution
High Color (16 Bit)High Color (16 Bit)
Key BoardKey Board :: Any with minimum requiredAny with minimum required
keyskeys
MouseMouse :: AnyAny
MobileMobile :: Any MobileAny Mobile
Software RequirementsSoftware Requirements
Operating System : Windows 2003, AnyOperating System : Windows 2003, Any
Server Operating SystemServer Operating System
Front-End Tool : Java Swing,Front-End Tool : Java Swing,
J2MEJ2ME
Back-End Tool : Ms-AccessBack-End Tool : Ms-Access
WebsiteWebsite : www. .com: www. .com
Features ScopeFeatures Scope
1.1. Long Time History ModuleLong Time History Module
Also Your Own Advised..Also Your Own Advised..

More Related Content

What's hot

ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMAlpesh Kurhade
 
Integration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxIntegration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxNShravani1
 
Paper currency recognigation with counterfeit detection using image processing
Paper currency recognigation with counterfeit detection using image processingPaper currency recognigation with counterfeit detection using image processing
Paper currency recognigation with counterfeit detection using image processingmeghanaaandy
 
Smart Attendance System using RFID
Smart Attendance System using RFIDSmart Attendance System using RFID
Smart Attendance System using RFIDPratikdd
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingSavitaHanchinal
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eyeChand Pasha
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future walletrmangal
 
Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operationsAnil Chaurasiya
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfMansiMehta96928
 
Parkinson's disease motor symptoms in machine learning a review
Parkinson's disease motor symptoms in machine learning a reviewParkinson's disease motor symptoms in machine learning a review
Parkinson's disease motor symptoms in machine learning a reviewhiij
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemlaharipothula
 
11 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may1211 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may12Traitet Thepbandansuk
 
Attendance Management System
Attendance Management SystemAttendance Management System
Attendance Management SystemArhind Gautam
 

What's hot (20)

ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Integration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxIntegration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptx
 
Paper currency recognigation with counterfeit detection using image processing
Paper currency recognigation with counterfeit detection using image processingPaper currency recognigation with counterfeit detection using image processing
Paper currency recognigation with counterfeit detection using image processing
 
Srs for banking system
Srs for banking systemSrs for banking system
Srs for banking system
 
Smart Attendance System using RFID
Smart Attendance System using RFIDSmart Attendance System using RFID
Smart Attendance System using RFID
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
RFID based Automatic vehicle access control system
RFID based Automatic vehicle access control systemRFID based Automatic vehicle access control system
RFID based Automatic vehicle access control system
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operations
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
 
Parkinson's disease motor symptoms in machine learning a review
Parkinson's disease motor symptoms in machine learning a reviewParkinson's disease motor symptoms in machine learning a review
Parkinson's disease motor symptoms in machine learning a review
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing system
 
SRS on blood bank
SRS on blood bankSRS on blood bank
SRS on blood bank
 
Ppt final
Ppt finalPpt final
Ppt final
 
11 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may1211 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may12
 
our srs (1).pdf
our srs (1).pdfour srs (1).pdf
our srs (1).pdf
 
Atm project
Atm projectAtm project
Atm project
 
Attendance Management System
Attendance Management SystemAttendance Management System
Attendance Management System
 

Viewers also liked

Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atmargoncillo
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Features of Credit Card
Features of Credit CardFeatures of Credit Card
Features of Credit CardAseem R
 
Automatic teller machine
Automatic teller machineAutomatic teller machine
Automatic teller machineawais ahmad
 
Hostel management system Software Engineering SRS
Hostel management system Software Engineering SRSHostel management system Software Engineering SRS
Hostel management system Software Engineering SRSFahad Chishti
 
Dishonour of cheque priyanka agarwal bvdu_pune
Dishonour of cheque priyanka agarwal bvdu_puneDishonour of cheque priyanka agarwal bvdu_pune
Dishonour of cheque priyanka agarwal bvdu_punePriyanka Agarwal
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Online hostel management_system
Online hostel management_systemOnline hostel management_system
Online hostel management_systemmd faruk
 
Dishonour of cheque
Dishonour of chequeDishonour of cheque
Dishonour of chequeDivya Kalra
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineDiotima Gupta
 
Hostel Management System
Hostel Management System Hostel Management System
Hostel Management System RegmiBhanu
 

Viewers also liked (20)

Security
SecuritySecurity
Security
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
ATM
ATMATM
ATM
 
Features of Credit Card
Features of Credit CardFeatures of Credit Card
Features of Credit Card
 
Atm
AtmAtm
Atm
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Automatic teller machine
Automatic teller machineAutomatic teller machine
Automatic teller machine
 
Hostel management system Software Engineering SRS
Hostel management system Software Engineering SRSHostel management system Software Engineering SRS
Hostel management system Software Engineering SRS
 
CREDIT CARD
CREDIT CARDCREDIT CARD
CREDIT CARD
 
Dishonour of cheque priyanka agarwal bvdu_pune
Dishonour of cheque priyanka agarwal bvdu_puneDishonour of cheque priyanka agarwal bvdu_pune
Dishonour of cheque priyanka agarwal bvdu_pune
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Online hostel management_system
Online hostel management_systemOnline hostel management_system
Online hostel management_system
 
Hms ppt
Hms pptHms ppt
Hms ppt
 
Dishonour of cheque
Dishonour of chequeDishonour of cheque
Dishonour of cheque
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
Hostel Management System
Hostel Management System Hostel Management System
Hostel Management System
 

Similar to Atm security

IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...IRJET Journal
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSJournal For Research
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
python pre-submission report.pdf
python pre-submission report.pdfpython pre-submission report.pdf
python pre-submission report.pdfSruthiMugle
 
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET Journal
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 

Similar to Atm security (20)

IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
N044057478
N044057478N044057478
N044057478
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
C132733
C132733C132733
C132733
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
 
python pre-submission report.pdf
python pre-submission report.pdfpython pre-submission report.pdf
python pre-submission report.pdf
 
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
 
Atm
AtmAtm
Atm
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
What is ATM
What is ATMWhat is ATM
What is ATM
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
Atm machine
Atm machineAtm machine
Atm machine
 

More from Pushkar Dutt (20)

Wireless usb
Wireless usbWireless usb
Wireless usb
 
Wearable computers
Wearable computersWearable computers
Wearable computers
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Nui
NuiNui
Nui
 
Network security
Network securityNetwork security
Network security
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Manet
ManetManet
Manet
 
Jquery
JqueryJquery
Jquery
 
Intelligent highway
Intelligent highwayIntelligent highway
Intelligent highway
 
Gi fi
Gi fiGi fi
Gi fi
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Eye phone
Eye phoneEye phone
Eye phone
 
Epoc
EpocEpoc
Epoc
 
E commerce
E commerceE commerce
E commerce
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
5 pen pc
5 pen pc5 pen pc
5 pen pc
 

Recently uploaded

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

Atm security

  • 2. Existing ATM SystemExisting ATM System  Government Developed ATMGovernment Developed ATM Machine those people who doMachine those people who do not a stand for a rank of row.not a stand for a rank of row. Maximum People is attract thisMaximum People is attract this system because it is timesystem because it is time consuming and user friendly.consuming and user friendly. Government provide manyGovernment provide many security of that system like, ATMsecurity of that system like, ATM Card No., PIN No.Card No., PIN No.
  • 3. Drawback of Existing ATMDrawback of Existing ATM MachineMachine  ATM system is not secureATM system is not secure Old ATM system is not provide proper security, because of these system is only provide Card Id and PIN number. Hacker or Thief easily gathered this Card Id and PIN number. Thief and Hacker always followed those type of users, they access there account many times.
  • 4. ATM Security SystemATM Security System To overcomes all drawbacks of ExistingTo overcomes all drawbacks of Existing ATM system so I developed aATM system so I developed a softwaresoftware “ATM SECURITY“ATM SECURITY SYSTEM”SYSTEM”.. This security systemThis security system provide proper security to secureprovide proper security to secure user accounts. This system is easyuser accounts. This system is easy to access and provide strongto access and provide strong security. This security is tough forsecurity. This security is tough for hackers because of strong uniquehackers because of strong unique code, these code is a actual securitycode, these code is a actual security of in this system.of in this system.
  • 5. Procedure of that SystemProcedure of that System This software is similar to the Old ATM Machine SystemThis software is similar to the Old ATM Machine System but difference is, in this system we entered first ATMbut difference is, in this system we entered first ATM Card ID then second PIN Number and third isCard ID then second PIN Number and third is UNIQUE CODE.UNIQUE CODE. Following are the step byFollowing are the step by procedure of that system,procedure of that system, 1.1. We entered ATM Card in a Card Reader on the ATMWe entered ATM Card in a Card Reader on the ATM Machine. Card Reader verify the ID number.Machine. Card Reader verify the ID number. 2.2. And also entered PIN number, these PIN numberAnd also entered PIN number, these PIN number and Card ID by ATM Machine is sends to the bankand Card ID by ATM Machine is sends to the bank server and Website through internet.server and Website through internet. 3.3. Server and Website verify this information, and thenServer and Website verify this information, and then it match between original information to the gatheredit match between original information to the gathered information, if it is match account is open else it isinformation, if it is match account is open else it is exit.exit. 4.4. After verifying process website or bank server isAfter verifying process website or bank server is sends one specific Code on customer Cell phonesends one specific Code on customer Cell phone
  • 6. Procedure of that SystemProcedure of that System 5.5. Customer Accept this code and put on the ATMCustomer Accept this code and put on the ATM Machine.Machine. 6.6. When customer press enter then another window isWhen customer press enter then another window is open, it is Account module.open, it is Account module. 7.7. Customer enter amount, and then ATM System isCustomer enter amount, and then ATM System is verify funds, Deduct funds and then Provide cashverify funds, Deduct funds and then Provide cash and also receipt.and also receipt. 8.8. Customer accept cash and Reject the card in a cardCustomer accept cash and Reject the card in a card reader.reader. This is a quality of Software.This is a quality of Software.
  • 7. ModulesModules 1.1. Login ModuleLogin Module 2.2. Information ModuleInformation Module 3.3. Account ModuleAccount Module 4.4. Record ModuleRecord Module
  • 8. Hardware RequirementsHardware Requirements Processor : Pentium IV 3.0 MHzProcessor : Pentium IV 3.0 MHz Memory size : 512 MB RAMMemory size : 512 MB RAM StorageStorage : 40 GB Hard Disk: 40 GB Hard Disk DisplayDisplay :: VGA Color MonitorVGA Color Monitor 600 x 800 Pixel Resolution600 x 800 Pixel Resolution High Color (16 Bit)High Color (16 Bit) Key BoardKey Board :: Any with minimum requiredAny with minimum required keyskeys MouseMouse :: AnyAny MobileMobile :: Any MobileAny Mobile
  • 9. Software RequirementsSoftware Requirements Operating System : Windows 2003, AnyOperating System : Windows 2003, Any Server Operating SystemServer Operating System Front-End Tool : Java Swing,Front-End Tool : Java Swing, J2MEJ2ME Back-End Tool : Ms-AccessBack-End Tool : Ms-Access WebsiteWebsite : www. .com: www. .com
  • 10. Features ScopeFeatures Scope 1.1. Long Time History ModuleLong Time History Module Also Your Own Advised..Also Your Own Advised..