SlideShare a Scribd company logo
1 of 13
The Future Wallet
JEEVAGAN.V.N
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS
11MCA007
FOR DATA MINING SEMINAR COMPONENT
Submitted to:
Mrs. Sakthi Priya,
MIS
OVERVIEW
 Introduction
 Disadvantages
 Why Money Pad??
 How to use it??
 Technical Implementations
 Fields of Applications
 Conclusion
JEEVAGAN NAGARAJAN 2
Introduction..
 Just as every thing is getting under the shadow of “e” today, we have paper
currency being replaced by electronic money or e-cash.
 The Money Pad introduced here uses the biometrics technology for Finger Print
recognition.
 Thus providing a form of security to the ever-lasting transaction currency of the
future “e-cash”
 The money pad is used by the user by giving his finger print impression on the
scanner and it records the thumb impressions.
JEEVAGAN NAGARAJAN 3
..Disadvantages..
JEEVAGAN NAGARAJAN 4
Credit Card System..
 “Pocket Money” or “Pocket Card”
 Instant clearing of funds in not possible
 Pressure
 Renewal
 Fixed Encryption
 Fraud
 ‘Little Drops Makes an Ocean’
JEEVAGAN NAGARAJAN 5
Smart Card System..
 Easily Lost
 Security
 Slow Adoption
 Possible Risk of Identity Theft
JEEVAGAN NAGARAJAN 6
Where can u get??
 Visit a nearby bank with e-banking facility
 Create an account with some balance(?!)
 Give necessary details along with fingerprints
 User is given bank code & account number along with money pad
JEEVAGAN NAGARAJAN 7
How To Use It??
 Place your finger on the touch sensor & then on the finger print reader
 Enter bank code & account number to enter into e-bank services
 If a finger print match occurs the reader
knows that he is a authorised user and allows for further transactions
 What if the user is unauthorised??
 Then the reader comes to know that the user is unauthorised and a provision
can be made so that the digicash present in the Money Pad is e-mailed back to
the authorised accountholder using the user details present in the Money Pad
JEEVAGAN NAGARAJAN 8
Transaction using Money Pad..
JEEVAGAN NAGARAJAN 9
Finger print
reader
Money pad
Database server
E-
b
o
o
k
Cannot access cash is emailed to
owner’s account
General info. Of users
Info.collected in passed to
the server for
verification
Authorised
Technical Implementation..
 It uses Biometric Technology, where the security is provided
 The accuracy of any Biometric system is measured in two ways:
 False Acceptable Rate – where an imposter is accepted as a match.
 False Rejection Rate – where a legitimate match is denied access.
JEEVAGAN NAGARAJAN 10
Fields of Applications..
 Applicable in e-banks and in any kind of e-transactions.
 The money pad device is capable of carrying digi-cash and it is
useful to perform any kind of e-banking or any kind of e-
transaction.
 To perform remote transaction like e-payments, digi-cash
transfer etc., Useful to carry Digital cash.
 The Money pad provides a secure means to carry digi-cash.
 It is applicable to any kinds of ecommerce transactions.
JEEVAGAN NAGARAJAN 11
Conclusion..
 Instant clearing of funds
 Elimination of payment risk
 Secure transactions using strong encryption
 In future when internet is going to capture the world there is no requirement of any
card or pad just a small device which can recognize the finger print can be attached
at any place throughout the world
JEEVAGAN NAGARAJAN 12
Thanks 2 one & all…
JEEVAGAN NAGARAJAN 13

More Related Content

What's hot

money pad the future wallet
money pad the future walletmoney pad the future wallet
money pad the future wallet
Sabin Tripathi
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
Leelakh Sachdeva
 

What's hot (19)

Moneypad
MoneypadMoneypad
Moneypad
 
money pad the future wallet
money pad the future walletmoney pad the future wallet
money pad the future wallet
 
Money pad ppt
Money pad pptMoney pad ppt
Money pad ppt
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
Money pad,the future wallet
Money pad,the future walletMoney pad,the future wallet
Money pad,the future wallet
 
My blink tech.
My blink tech.My blink tech.
My blink tech.
 
Card payment evolution v1.0
Card payment evolution v1.0Card payment evolution v1.0
Card payment evolution v1.0
 
Blink tech.
Blink tech.Blink tech.
Blink tech.
 
Banking with tech
Banking with techBanking with tech
Banking with tech
 
The opportunities and challenges offered by cardless ATMs - European ATMs 201...
The opportunities and challenges offered by cardless ATMs - European ATMs 201...The opportunities and challenges offered by cardless ATMs - European ATMs 201...
The opportunities and challenges offered by cardless ATMs - European ATMs 201...
 
Secure QR code payment
Secure QR code paymentSecure QR code payment
Secure QR code payment
 
E wallet by amin
E wallet by aminE wallet by amin
E wallet by amin
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Presentation on Debit and credit card
Presentation on Debit and credit cardPresentation on Debit and credit card
Presentation on Debit and credit card
 
Digital wallet
Digital walletDigital wallet
Digital wallet
 
Cardless and contactless transactions
Cardless and contactless transactionsCardless and contactless transactions
Cardless and contactless transactions
 

Similar to MONEY PAD

project_report
project_reportproject_report
project_report
Ejaz Navas
 
INTRODUCTION EATZRKSYTDULYFIUGOIHPOJ[P][L\];
INTRODUCTION EATZRKSYTDULYFIUGOIHPOJ[P][L\];INTRODUCTION EATZRKSYTDULYFIUGOIHPOJ[P][L\];
INTRODUCTION EATZRKSYTDULYFIUGOIHPOJ[P][L\];
IrabarutaEmmanuel
 

Similar to MONEY PAD (20)

moneypad.pptx
moneypad.pptxmoneypad.pptx
moneypad.pptx
 
moneypadthefuturewallet-120428154013-phpapp02.pdf
moneypadthefuturewallet-120428154013-phpapp02.pdfmoneypadthefuturewallet-120428154013-phpapp02.pdf
moneypadthefuturewallet-120428154013-phpapp02.pdf
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
project_report
project_reportproject_report
project_report
 
ch7.ppt
ch7.pptch7.ppt
ch7.ppt
 
INTRODUCTION EATZRKSYTDULYFIUGOIHPOJ[P][L\];
INTRODUCTION EATZRKSYTDULYFIUGOIHPOJ[P][L\];INTRODUCTION EATZRKSYTDULYFIUGOIHPOJ[P][L\];
INTRODUCTION EATZRKSYTDULYFIUGOIHPOJ[P][L\];
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
ELECTRONIC PAYMENT SYSTEMS
ELECTRONIC PAYMENT SYSTEMS ELECTRONIC PAYMENT SYSTEMS
ELECTRONIC PAYMENT SYSTEMS
 
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
 
E walllet / Digital Wallet
E walllet / Digital WalletE walllet / Digital Wallet
E walllet / Digital Wallet
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

MONEY PAD

  • 1. The Future Wallet JEEVAGAN.V.N DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS 11MCA007 FOR DATA MINING SEMINAR COMPONENT Submitted to: Mrs. Sakthi Priya, MIS
  • 2. OVERVIEW  Introduction  Disadvantages  Why Money Pad??  How to use it??  Technical Implementations  Fields of Applications  Conclusion JEEVAGAN NAGARAJAN 2
  • 3. Introduction..  Just as every thing is getting under the shadow of “e” today, we have paper currency being replaced by electronic money or e-cash.  The Money Pad introduced here uses the biometrics technology for Finger Print recognition.  Thus providing a form of security to the ever-lasting transaction currency of the future “e-cash”  The money pad is used by the user by giving his finger print impression on the scanner and it records the thumb impressions. JEEVAGAN NAGARAJAN 3
  • 5. Credit Card System..  “Pocket Money” or “Pocket Card”  Instant clearing of funds in not possible  Pressure  Renewal  Fixed Encryption  Fraud  ‘Little Drops Makes an Ocean’ JEEVAGAN NAGARAJAN 5
  • 6. Smart Card System..  Easily Lost  Security  Slow Adoption  Possible Risk of Identity Theft JEEVAGAN NAGARAJAN 6
  • 7. Where can u get??  Visit a nearby bank with e-banking facility  Create an account with some balance(?!)  Give necessary details along with fingerprints  User is given bank code & account number along with money pad JEEVAGAN NAGARAJAN 7
  • 8. How To Use It??  Place your finger on the touch sensor & then on the finger print reader  Enter bank code & account number to enter into e-bank services  If a finger print match occurs the reader knows that he is a authorised user and allows for further transactions  What if the user is unauthorised??  Then the reader comes to know that the user is unauthorised and a provision can be made so that the digicash present in the Money Pad is e-mailed back to the authorised accountholder using the user details present in the Money Pad JEEVAGAN NAGARAJAN 8
  • 9. Transaction using Money Pad.. JEEVAGAN NAGARAJAN 9 Finger print reader Money pad Database server E- b o o k Cannot access cash is emailed to owner’s account General info. Of users Info.collected in passed to the server for verification Authorised
  • 10. Technical Implementation..  It uses Biometric Technology, where the security is provided  The accuracy of any Biometric system is measured in two ways:  False Acceptable Rate – where an imposter is accepted as a match.  False Rejection Rate – where a legitimate match is denied access. JEEVAGAN NAGARAJAN 10
  • 11. Fields of Applications..  Applicable in e-banks and in any kind of e-transactions.  The money pad device is capable of carrying digi-cash and it is useful to perform any kind of e-banking or any kind of e- transaction.  To perform remote transaction like e-payments, digi-cash transfer etc., Useful to carry Digital cash.  The Money pad provides a secure means to carry digi-cash.  It is applicable to any kinds of ecommerce transactions. JEEVAGAN NAGARAJAN 11
  • 12. Conclusion..  Instant clearing of funds  Elimination of payment risk  Secure transactions using strong encryption  In future when internet is going to capture the world there is no requirement of any card or pad just a small device which can recognize the finger print can be attached at any place throughout the world JEEVAGAN NAGARAJAN 12
  • 13. Thanks 2 one & all… JEEVAGAN NAGARAJAN 13