SlideShare a Scribd company logo
WELCOME
TO
INFORMATION TECHNOLOGY IN
MANAGEMENT
PRESENTATION ON ATM
1
BY
VINOD KUMAR R BBA
2
• The automated teller machine (ATM) is an automatic banking machine
(ABM) which allows customer to complete basic transactions without any
help of bank representatives.
The basic one allows the customer to only draw cash and receive a report
of the account balance.
Automated teller machine (ATM)
While the vast majority of cash machines run XP, some
of those use a variant of Microsoft's operating system
called Windows Embedded. The software is designed
specifically for appliances and industrial machines,
such as ATMs, cash registers and thermostats
1. It is an electronic device which is used by only bank
customers to process account transactions.
The users access their account through special type of
plastic card that is encoded with user information on a
magnetic strip.
2. The strip contains an identification code that is
transmitted to the bank’s central computer by modem. The
users insert the card into ATMs to access the account and
process their account transactions.
3. The automated teller machine was invented by john
shepherd-Barron in year of 1960.
3
Automated teller machine (ATM)
4
• The automated teller machine consists of mainly two input
devices and four output devices that are:
• Input Devices:
• Card reader
• Keypad
• Output Devices:
• Speaker
• Display Screen
• Receipt Printer
• Cash Depositor
Automated Telling Machine Block Diagram:
5
Automated Telling Machine Block Diagram:
6
• Input Devices:
Card Reader:
• The card reader is an input device that reads data from a card .
• The card reader is part of the identification of your particular account number
and the magnetic strip on the back side of the ATM card is used for connection
with the card reader.
• The card is swiped or pressed on the card reader which captures your account
information i.e. the data from the card is passed on the host processor (server).
• The host processor thus uses this data to get the information from the card
holders.
• Keypad:
• The card is recognized after the machine asks further details like your
personal identification number, withdrawal and your balance enquiry.
• Each card has a unique PIN number so that there is little chance for some else
to withdraw money from your account.
• There are separate laws to protect the PIN code while sending it to host
processor.
• The PIN number is mostly sent in encrypted from. The key board contains 48
keys and is interfaced to the processor.
8
Output Devices:
Speaker:
The speaker provides the audio feedback when the particular
key is pressed.
Display Screen:
The display screen displays the transaction information. Each
steps of withdrawal is shown by the display screen. A CRT
screen or LCD screen is used by most of ATMs.
9
• Receipt Printer:
• The receipt printer print all the details recording your withdrawal, date and time and the
amount of withdrawn and also shows balance of your account in the receipt.
• Cash Dispenser:
• The cash dispenser is a heart of the ATM. This is a central system of the ATM machine
from where the required money is obtained.
• From this portion the user can collect the money. The duty of the cash dispenser is to
count each bill and give the required amount.
• If in some cases the money is folded, it will be moved another section and becomes
the reject bit. All these actions are carried out by high precision sensors. A complete
record of each transaction is kept by the ATM machine with help of an RTC device.
10
• ATM Networking:
• The internet service provider (ISP) also plays an important role in the ATMs. This
provides communication between ATM and host processors. When the transaction
is made, the details are input by the card holder.
• This information is passed on to the host processor by the ATM machine.
• The host processor checks these details with authorized bank. If the details are
matched, the host processor sends the approval code to the ATM machine so that
the cash can be transferred.
11
2 Types of ATM Machines
Most of the host processors can support either leased line or dial up machines
•Leased line ATM machines
•Dial up ATM machines
Leased Line ATM Machines:
The leased line machines connect direct to the host processor through a four wire
point to point dedicated telephone line. These types of machines are preferred in
place. The operating cost of these machines is very high.
Dial Up ATM Machines:
The dial up ATMs connects to the host processor through a normal phone line using
a modem. These require a normal connections their and their initial installation cost
is very less. The operating cost of these machines is low compared with leased line
machines.
12
ATM Security:
The ATM card is secured with PIN number which is kept secret. There is no way to get the PIN
number from your card. It is encrypted by the strong software like Triple data Encryption
Slandered.
Automated Teller Machine Working Principle
13
• The automated teller machine is simply a data terminal with two input
and four output devices. These devices are interfaced to the
processor. The processor is heart of the ATM machine.
• All the ATM machines working around the world are based on
centralized database system.
• The ATM has to connect and communicate with the host processor
(server). The host processor is communicating with the internet
service provider (ISP). It is the gateway through all the ATM networks
available to the card holder.
• When a card holder wants does an ATM transaction, user provides
necessary information through card reader and keypad.
• The ATM forwards this information to the host processor. The host
processor enters the transaction request to the cardholder bank.
14
• If the card holder requests the cash, the host processor takes the cash from the card
holder account.
• Once the funds are transferred from the customer account to host processor bank
account, the processor sends approval code to the ATM and the authorized machine to
dispense the cash.
• This is the way to get the amount on ATMs. The ATM network is fully based on
centralized database environment. This will make life easer and secured the cash

More Related Content

What's hot

Out sources of atm
Out sources of atmOut sources of atm
Out sources of atmDharmik
 
Credit cards ppt
Credit cards pptCredit cards ppt
Credit cards ppt
sukhpal0015
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)amanjit9306
 
e payment system ppt
e payment system ppte payment system ppt
e payment system ppt
minisharma35
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machinestejinderubs
 
Mobile Banking
Mobile BankingMobile Banking
Mobile Banking
Sanjoy Suthar
 
Home banking final
Home banking finalHome banking final
Home banking final
mahesh patil
 
Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)Krishna Kumar
 
E Banking
E BankingE Banking
E Banking
cssangoram
 
E banking
E bankingE banking
E banking
JPEAGLES
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
Networking
 
Digital payments
Digital payments Digital payments
Digital payments
Umashanker Sahu
 
Digital payments Presentations
Digital payments PresentationsDigital payments Presentations
Digital payments Presentations
TRIPLE S PORTFOLIO
 
debit cards
debit cardsdebit cards
debit cards
Preeti Agarwal
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)rahul kundu
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment SystemMohammad Waqas
 

What's hot (20)

Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
Out sources of atm
Out sources of atmOut sources of atm
Out sources of atm
 
Atm.ppt
Atm.pptAtm.ppt
Atm.ppt
 
Credit cards ppt
Credit cards pptCredit cards ppt
Credit cards ppt
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
e payment system ppt
e payment system ppte payment system ppt
e payment system ppt
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
Mobile Banking
Mobile BankingMobile Banking
Mobile Banking
 
Home banking final
Home banking finalHome banking final
Home banking final
 
Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)
 
E Banking
E BankingE Banking
E Banking
 
E banking
E bankingE banking
E banking
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
 
Digital payments
Digital payments Digital payments
Digital payments
 
Digital payments Presentations
Digital payments PresentationsDigital payments Presentations
Digital payments Presentations
 
Atm transaction
Atm transactionAtm transaction
Atm transaction
 
Smart cards
Smart cards Smart cards
Smart cards
 
debit cards
debit cardsdebit cards
debit cards
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment System
 

Similar to Presentation On ATM Technology

Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Siya Agarwal
 
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Divyaprathapraju Divyaprathapraju
 
13828523.ppt
13828523.ppt13828523.ppt
13828523.ppt
Prashantmittal33
 
13362741.ppt
13362741.ppt13362741.ppt
13362741.ppt
Prashantmittal33
 
Concepts of Digital Banking
Concepts of Digital BankingConcepts of Digital Banking
Concepts of Digital Banking
AbinayaS31
 
A T M.ppt
A T M.pptA T M.ppt
A T M.ppt
SarojKumar864774
 
ATM
ATMATM
ATM Banking
ATM BankingATM Banking
ATM Banking
Arnav Sameer
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machine
Vidya Sagar
 
How do at ms work.ppt
How do at ms work.pptHow do at ms work.ppt
How do at ms work.pptNaveen Sihag
 
atmc-200505115106 (2).pptx
atmc-200505115106 (2).pptxatmc-200505115106 (2).pptx
atmc-200505115106 (2).pptx
NEERAJRAJPUT81
 
atmc-200505115106 (1).pdf
atmc-200505115106 (1).pdfatmc-200505115106 (1).pdf
atmc-200505115106 (1).pdf
MANISHKUMAR165449
 
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...EuronetGDCLearning
 
205 fmbounit 5b
205 fmbounit 5b205 fmbounit 5b
205 fmbounit 5b
ASM's IBMR- Chinchwad
 
Atm Research
Atm Research Atm Research
Atm Research
محمود فرغلي
 
Proposal
ProposalProposal
Proposal
PaaAcquah
 
ATM BLock Diagram and its design uses development.pptx
ATM BLock Diagram and its design uses development.pptxATM BLock Diagram and its design uses development.pptx
ATM BLock Diagram and its design uses development.pptx
keerthi975
 

Similar to Presentation On ATM Technology (20)

Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
 
Atm security
Atm securityAtm security
Atm security
 
13828523.ppt
13828523.ppt13828523.ppt
13828523.ppt
 
Atm machine
Atm machineAtm machine
Atm machine
 
13362741.ppt
13362741.ppt13362741.ppt
13362741.ppt
 
Concepts of Digital Banking
Concepts of Digital BankingConcepts of Digital Banking
Concepts of Digital Banking
 
A T M.ppt
A T M.pptA T M.ppt
A T M.ppt
 
ATM
ATMATM
ATM
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machine
 
How do at ms work.ppt
How do at ms work.pptHow do at ms work.ppt
How do at ms work.ppt
 
Atm
AtmAtm
Atm
 
atmc-200505115106 (2).pptx
atmc-200505115106 (2).pptxatmc-200505115106 (2).pptx
atmc-200505115106 (2).pptx
 
atmc-200505115106 (1).pdf
atmc-200505115106 (1).pdfatmc-200505115106 (1).pdf
atmc-200505115106 (1).pdf
 
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
 
205 fmbounit 5b
205 fmbounit 5b205 fmbounit 5b
205 fmbounit 5b
 
Atm Research
Atm Research Atm Research
Atm Research
 
Proposal
ProposalProposal
Proposal
 
ATM BLock Diagram and its design uses development.pptx
ATM BLock Diagram and its design uses development.pptxATM BLock Diagram and its design uses development.pptx
ATM BLock Diagram and its design uses development.pptx
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Presentation On ATM Technology

  • 2. 2 • The automated teller machine (ATM) is an automatic banking machine (ABM) which allows customer to complete basic transactions without any help of bank representatives. The basic one allows the customer to only draw cash and receive a report of the account balance. Automated teller machine (ATM) While the vast majority of cash machines run XP, some of those use a variant of Microsoft's operating system called Windows Embedded. The software is designed specifically for appliances and industrial machines, such as ATMs, cash registers and thermostats
  • 3. 1. It is an electronic device which is used by only bank customers to process account transactions. The users access their account through special type of plastic card that is encoded with user information on a magnetic strip. 2. The strip contains an identification code that is transmitted to the bank’s central computer by modem. The users insert the card into ATMs to access the account and process their account transactions. 3. The automated teller machine was invented by john shepherd-Barron in year of 1960. 3 Automated teller machine (ATM)
  • 4. 4 • The automated teller machine consists of mainly two input devices and four output devices that are: • Input Devices: • Card reader • Keypad • Output Devices: • Speaker • Display Screen • Receipt Printer • Cash Depositor Automated Telling Machine Block Diagram:
  • 6. 6 • Input Devices: Card Reader: • The card reader is an input device that reads data from a card . • The card reader is part of the identification of your particular account number and the magnetic strip on the back side of the ATM card is used for connection with the card reader. • The card is swiped or pressed on the card reader which captures your account information i.e. the data from the card is passed on the host processor (server). • The host processor thus uses this data to get the information from the card holders.
  • 7. • Keypad: • The card is recognized after the machine asks further details like your personal identification number, withdrawal and your balance enquiry. • Each card has a unique PIN number so that there is little chance for some else to withdraw money from your account. • There are separate laws to protect the PIN code while sending it to host processor. • The PIN number is mostly sent in encrypted from. The key board contains 48 keys and is interfaced to the processor.
  • 8. 8 Output Devices: Speaker: The speaker provides the audio feedback when the particular key is pressed. Display Screen: The display screen displays the transaction information. Each steps of withdrawal is shown by the display screen. A CRT screen or LCD screen is used by most of ATMs.
  • 9. 9 • Receipt Printer: • The receipt printer print all the details recording your withdrawal, date and time and the amount of withdrawn and also shows balance of your account in the receipt. • Cash Dispenser: • The cash dispenser is a heart of the ATM. This is a central system of the ATM machine from where the required money is obtained. • From this portion the user can collect the money. The duty of the cash dispenser is to count each bill and give the required amount. • If in some cases the money is folded, it will be moved another section and becomes the reject bit. All these actions are carried out by high precision sensors. A complete record of each transaction is kept by the ATM machine with help of an RTC device.
  • 10. 10 • ATM Networking: • The internet service provider (ISP) also plays an important role in the ATMs. This provides communication between ATM and host processors. When the transaction is made, the details are input by the card holder. • This information is passed on to the host processor by the ATM machine. • The host processor checks these details with authorized bank. If the details are matched, the host processor sends the approval code to the ATM machine so that the cash can be transferred.
  • 11. 11 2 Types of ATM Machines Most of the host processors can support either leased line or dial up machines •Leased line ATM machines •Dial up ATM machines Leased Line ATM Machines: The leased line machines connect direct to the host processor through a four wire point to point dedicated telephone line. These types of machines are preferred in place. The operating cost of these machines is very high. Dial Up ATM Machines: The dial up ATMs connects to the host processor through a normal phone line using a modem. These require a normal connections their and their initial installation cost is very less. The operating cost of these machines is low compared with leased line machines.
  • 12. 12 ATM Security: The ATM card is secured with PIN number which is kept secret. There is no way to get the PIN number from your card. It is encrypted by the strong software like Triple data Encryption Slandered. Automated Teller Machine Working Principle
  • 13. 13 • The automated teller machine is simply a data terminal with two input and four output devices. These devices are interfaced to the processor. The processor is heart of the ATM machine. • All the ATM machines working around the world are based on centralized database system. • The ATM has to connect and communicate with the host processor (server). The host processor is communicating with the internet service provider (ISP). It is the gateway through all the ATM networks available to the card holder. • When a card holder wants does an ATM transaction, user provides necessary information through card reader and keypad. • The ATM forwards this information to the host processor. The host processor enters the transaction request to the cardholder bank.
  • 14. 14 • If the card holder requests the cash, the host processor takes the cash from the card holder account. • Once the funds are transferred from the customer account to host processor bank account, the processor sends approval code to the ATM and the authorized machine to dispense the cash. • This is the way to get the amount on ATMs. The ATM network is fully based on centralized database environment. This will make life easer and secured the cash