SlideShare a Scribd company logo
Low Cost Enhanced 3D Secure Authentication Service
For ATM and POS
Presented By –
Md. Shafiuddin Russel
Network and Security Specialist,
Bank Alfalah Ltd.
MSc. Eng. System Security, BUP
CISA, CEH
Ph: 01714073692
Email: engrussel@gmail.com
Our Team Name
Eagles IdeaEagles Idea
Project Objective
The objectives of our Project are:
Analysis the present Practices for ATM and POS Authentication.
Exploring the limitation.
Propose a new Technique.Propose a new Technique.
Prototype Development and live demo presentation.
Back Ground Analysis
It was Standard Chartered Bank (SCB) which introduced ATMs in
Bangladesh. The first booth was set up at Dhaka's Banani in 1993.
Now ATM And POS Machines are being popular in our country.
Bangladesh Central Bank has taken initiative to reduce the use of printedBangladesh Central Bank has taken initiative to reduce the use of printed
money and encouraging the financial institute on secure plastic currency.
According to the survey, the total number of credit and debit cards in the
country’s banking system stood at 80,85,834 as of August 31, 2013
while the banks set up a total of 22,224 POS and 14,000 ATM machine
around the country. The number of credit and debit card, and POS
terminals presumed to have increased much after the survey period.
NPS Statistic
Source : https://www.bb.org.bd/fnansys/paymentsys/natpayswitch.php
Jul-16, 734790
Mar-
Apr-15, 455518
NPSB Comparative Number of Transactions
Aug-
16, 865890
Mar-
15, 366410
 News: bdnews24.com, Date: 14/02/2016, url: http://goo.gl/kgxKOa
“Skimming devices were planted in six ATM booths of three banks to steal card
information and create duplicates, Bangladesh Bank investigators have found ”
 News: BD Business News, Date: 23/02/2016 url:http://goo.gl/zOXJQy
Some Fraud Scenario
“Four people including a foreigner allegedly involved in an ATM skimming scam
have been arrested in Bangladesh capital Dhaka ”
 News: bdnews24.com, Date: 18/05/2016 url:http://goo.gl/BwCNhQ
“After the arrest of a Chinese citizen over an ATM fraud, Prime Bank has said
two other foreigners, apparently Chinese, drew over Tk 500,000 from two other
booths in Dhaka ”
Number of frauds are parallely
increasing with number of
Learning:
increasing with number of
Transaction!
Internet of Things (IoT): number of connected devices worldwide from
2012 to 2020 (in billions)
https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
Where our System will work
N.B: The internet of things (IoT) is the internetworking of physical devices
Limitation of Present System
Core Reason of Fraud:
1. Cards pin are Static
2. Magnetic Strip are Easy to Copy.
3. EMV Chip are Expensive. Magnetic Strip Card3. EMV Chip are Expensive.
4. NPS Not yet Support EMV.
5. All POS are not Support Online Pin.
6. Lack of Awareness.
Magnetic Strip Card
Chip Card
And 99% card fraud Incident
either done by Insider or During
Learning
either done by Insider or During
Authentication Process!
How to Overcome
Dynamic OTP
#A dynamic OTP is some thing which change dynamically and varies
from customer to customer ,transaction to transaction and have a life
time.
But Still There are some
Problems are allies
•In Enterprise, Insider (Sys Admin) or malware can compromise the OTP
System.
•The Payment Card Industry Data Security Standard (PCI DSS) practices are•The Payment Card Industry Data Security Standard (PCI DSS) practices are
not usually Maintain in the enterprise.
•RSA token is very Expensive and difficult to maintain for enormous
customer.
Our Proposed Mitigation Tech./System
1. Out Source the Authentication Process.
2. A common hub that support ATM, POS ,Web or any other platform.
3. Maintaining the PCIDSS standards.
4. Reducing the cost by no service no pay model.
5. Use different channel like SMS/ E-mail for sending OTP.
6. A complete Audit Trail.
•No OTP sent for ATM or POS Transaction.
•OTP are randomly generate from a seed.
• Administrator have the option to change
the seed or he can regenerate OTP if he
know the algorithm.know the algorithm.
Our System Limitation
1. We have to depend on unstable and non secure TCP/IP.
2. Network structure of Bangladesh are not so stable.
3. Enterprise stack holders mind sight are not yet ready for out sourcing
the authentication process.the authentication process.
4. No concrete law for settle the arbitration.
EndEnd
Magnetic Strip Card Architecture

More Related Content

What's hot

An Introduction to Open Banking (PSD2)
An Introduction to Open Banking (PSD2)An Introduction to Open Banking (PSD2)
An Introduction to Open Banking (PSD2)
Paul Ark (Polapat Arkkrapridi)
 
Mobile financial services overview policy and current scenario
Mobile financial services overview policy and current scenarioMobile financial services overview policy and current scenario
Mobile financial services overview policy and current scenario
Dr Lendy Spires
 
INTERNET BANKING PPT
INTERNET BANKING PPTINTERNET BANKING PPT
INTERNET BANKING PPT
Anchit Rajawat
 
KYC optimization using Block chain Technology
KYC optimization using Block chain TechnologyKYC optimization using Block chain Technology
KYC optimization using Block chain Technology
Shobhita Jain
 
Overview of the UK Open Banking Initiative
Overview of the UK Open Banking InitiativeOverview of the UK Open Banking Initiative
Overview of the UK Open Banking Initiative
Gary Farrow
 
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET Journal
 
BCCB summer Internship project
BCCB summer Internship projectBCCB summer Internship project
BCCB summer Internship project
Yogesh kadu
 
Voice based banking system
Voice based banking systemVoice based banking system
Voice based banking system
Jal Pari
 
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining TechniquesSurvey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
ijsrd.com
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud Detection
IOSR Journals
 
E banking security
E banking securityE banking security
E banking security
Iman Rahmanian
 
PSD2 - The second Payment Services Directive
PSD2 - The second Payment Services DirectivePSD2 - The second Payment Services Directive
PSD2 - The second Payment Services Directive
Emilie Scalla
 
Online banking system
Online banking systemOnline banking system
Online banking system
ROUSHAN RAJ KUMAR
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A Survey
IJMER
 
Account kit and internet banking
Account kit and internet bankingAccount kit and internet banking
Account kit and internet banking
pragya garg
 
MTBiz March 2015
MTBiz March 2015MTBiz March 2015
MTBiz March 2015
Mutual Trust Bank Ltd.
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
VASCO Data Security
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
guestf9788dc7
 
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
Nuzhat Memon
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
IJSRD
 

What's hot (20)

An Introduction to Open Banking (PSD2)
An Introduction to Open Banking (PSD2)An Introduction to Open Banking (PSD2)
An Introduction to Open Banking (PSD2)
 
Mobile financial services overview policy and current scenario
Mobile financial services overview policy and current scenarioMobile financial services overview policy and current scenario
Mobile financial services overview policy and current scenario
 
INTERNET BANKING PPT
INTERNET BANKING PPTINTERNET BANKING PPT
INTERNET BANKING PPT
 
KYC optimization using Block chain Technology
KYC optimization using Block chain TechnologyKYC optimization using Block chain Technology
KYC optimization using Block chain Technology
 
Overview of the UK Open Banking Initiative
Overview of the UK Open Banking InitiativeOverview of the UK Open Banking Initiative
Overview of the UK Open Banking Initiative
 
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
 
BCCB summer Internship project
BCCB summer Internship projectBCCB summer Internship project
BCCB summer Internship project
 
Voice based banking system
Voice based banking systemVoice based banking system
Voice based banking system
 
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining TechniquesSurvey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud Detection
 
E banking security
E banking securityE banking security
E banking security
 
PSD2 - The second Payment Services Directive
PSD2 - The second Payment Services DirectivePSD2 - The second Payment Services Directive
PSD2 - The second Payment Services Directive
 
Online banking system
Online banking systemOnline banking system
Online banking system
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A Survey
 
Account kit and internet banking
Account kit and internet bankingAccount kit and internet banking
Account kit and internet banking
 
MTBiz March 2015
MTBiz March 2015MTBiz March 2015
MTBiz March 2015
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
 

Similar to Low cost 3d authentication service for atm and pos

Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET Journal
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET Journal
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
IRJET Journal
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET Journal
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
IRJET Journal
 
Use of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of BangladeshUse of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of Bangladesh
Masum Hussain
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
dbpublications
 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sector
suhasmcomplex
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
LameesAnees
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
KanchanRaut13
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
IJSRED
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
IRJET Journal
 
D0351022026
D0351022026D0351022026
D0351022026
inventionjournals
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
Ayush G. Kottary
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
 
Epayments system in India and globally iit project
Epayments system in India and globally iit project Epayments system in India and globally iit project
Epayments system in India and globally iit project
abhiROCKS1103
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
IOSR Journals
 
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
IRJET Journal
 
Uniform payment system_for_banking_indus
Uniform payment system_for_banking_indusUniform payment system_for_banking_indus
Uniform payment system_for_banking_indus
themightycissp
 

Similar to Low cost 3d authentication service for atm and pos (20)

Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
Use of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of BangladeshUse of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of Bangladesh
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sector
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
D0351022026
D0351022026D0351022026
D0351022026
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Epayments system in India and globally iit project
Epayments system in India and globally iit project Epayments system in India and globally iit project
Epayments system in India and globally iit project
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
 
Uniform payment system_for_banking_indus
Uniform payment system_for_banking_indusUniform payment system_for_banking_indus
Uniform payment system_for_banking_indus
 

Recently uploaded

SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
Massimo Artizzu
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.
AnkitaPandya11
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
Karya Keeper
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
YousufSait3
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
sjcobrien
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
NishanthaBulumulla1
 

Recently uploaded (20)

SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
 

Low cost 3d authentication service for atm and pos

  • 1. Low Cost Enhanced 3D Secure Authentication Service For ATM and POS
  • 2. Presented By – Md. Shafiuddin Russel Network and Security Specialist, Bank Alfalah Ltd. MSc. Eng. System Security, BUP CISA, CEH Ph: 01714073692 Email: engrussel@gmail.com
  • 3. Our Team Name Eagles IdeaEagles Idea
  • 4. Project Objective The objectives of our Project are: Analysis the present Practices for ATM and POS Authentication. Exploring the limitation. Propose a new Technique.Propose a new Technique. Prototype Development and live demo presentation.
  • 5. Back Ground Analysis It was Standard Chartered Bank (SCB) which introduced ATMs in Bangladesh. The first booth was set up at Dhaka's Banani in 1993. Now ATM And POS Machines are being popular in our country. Bangladesh Central Bank has taken initiative to reduce the use of printedBangladesh Central Bank has taken initiative to reduce the use of printed money and encouraging the financial institute on secure plastic currency. According to the survey, the total number of credit and debit cards in the country’s banking system stood at 80,85,834 as of August 31, 2013 while the banks set up a total of 22,224 POS and 14,000 ATM machine around the country. The number of credit and debit card, and POS terminals presumed to have increased much after the survey period.
  • 6. NPS Statistic Source : https://www.bb.org.bd/fnansys/paymentsys/natpayswitch.php
  • 7. Jul-16, 734790 Mar- Apr-15, 455518 NPSB Comparative Number of Transactions Aug- 16, 865890 Mar- 15, 366410
  • 8.  News: bdnews24.com, Date: 14/02/2016, url: http://goo.gl/kgxKOa “Skimming devices were planted in six ATM booths of three banks to steal card information and create duplicates, Bangladesh Bank investigators have found ”  News: BD Business News, Date: 23/02/2016 url:http://goo.gl/zOXJQy Some Fraud Scenario “Four people including a foreigner allegedly involved in an ATM skimming scam have been arrested in Bangladesh capital Dhaka ”  News: bdnews24.com, Date: 18/05/2016 url:http://goo.gl/BwCNhQ “After the arrest of a Chinese citizen over an ATM fraud, Prime Bank has said two other foreigners, apparently Chinese, drew over Tk 500,000 from two other booths in Dhaka ”
  • 9. Number of frauds are parallely increasing with number of Learning: increasing with number of Transaction!
  • 10. Internet of Things (IoT): number of connected devices worldwide from 2012 to 2020 (in billions) https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
  • 11. Where our System will work N.B: The internet of things (IoT) is the internetworking of physical devices
  • 12. Limitation of Present System Core Reason of Fraud: 1. Cards pin are Static 2. Magnetic Strip are Easy to Copy. 3. EMV Chip are Expensive. Magnetic Strip Card3. EMV Chip are Expensive. 4. NPS Not yet Support EMV. 5. All POS are not Support Online Pin. 6. Lack of Awareness. Magnetic Strip Card Chip Card
  • 13. And 99% card fraud Incident either done by Insider or During Learning either done by Insider or During Authentication Process!
  • 14. How to Overcome Dynamic OTP #A dynamic OTP is some thing which change dynamically and varies from customer to customer ,transaction to transaction and have a life time.
  • 15. But Still There are some Problems are allies •In Enterprise, Insider (Sys Admin) or malware can compromise the OTP System. •The Payment Card Industry Data Security Standard (PCI DSS) practices are•The Payment Card Industry Data Security Standard (PCI DSS) practices are not usually Maintain in the enterprise. •RSA token is very Expensive and difficult to maintain for enormous customer.
  • 16. Our Proposed Mitigation Tech./System 1. Out Source the Authentication Process. 2. A common hub that support ATM, POS ,Web or any other platform. 3. Maintaining the PCIDSS standards. 4. Reducing the cost by no service no pay model. 5. Use different channel like SMS/ E-mail for sending OTP. 6. A complete Audit Trail.
  • 17. •No OTP sent for ATM or POS Transaction. •OTP are randomly generate from a seed. • Administrator have the option to change the seed or he can regenerate OTP if he know the algorithm.know the algorithm.
  • 18.
  • 19.
  • 20.
  • 21. Our System Limitation 1. We have to depend on unstable and non secure TCP/IP. 2. Network structure of Bangladesh are not so stable. 3. Enterprise stack holders mind sight are not yet ready for out sourcing the authentication process.the authentication process. 4. No concrete law for settle the arbitration.
  • 23. Magnetic Strip Card Architecture