SlideShare a Scribd company logo
12/6/2016
Our Propose Solutions for Banks
M – View
With increasing transaction volumes, the concern for transaction integrity at ATMs also rises.
Banks are always concerned with suspect transactions that require
dispute resolution. Similarly, investigation of fraudulent transactions is
also a critical part of the Alternate Delivery Channel business.
Banks’ require a robust mechanism to trace journals, capture images
during transactions, and do multi-dimensional searches to reach the disputed or fraudulent.
M-View is a configurable and flexible product which can integrate with multiple cameras to take
event or transaction based pictures and places them in a central repository at a designated server.
In parallel, m-View also transports the Electronic Journal from
all ATMs to the same central repository.
On the server side, users can perform multi-dimensional
searches inside the EJ and images to investigate transaction
disputes and frauds.
The pictures captured by M-View can be tagged with ATM
journal entries to further facilitate in investigating transaction
dispute cases.
M-View is a multi-vendor application and can be used on any ATM brand in your network running
on MS Windows platform.
The combination of Electronic Journal or any maintained log with the pictures obtained through
M-View forms the most compelling evidence for resolving suspect transactions.
Business Goal
 Reduce investigation time for dispute settlement
activities
 Analysis and investigation for disputes, black lists &
plain transactions
 Reliable transaction monitoring
 Strong reporting engine enabling analysis and planning
Key Features
 Lightweight and robust database for all transactions
 Camera and ATM hardware independent.
 Variety of search criteria for on-the-fly finely-tuned
results
 Able to take event or transaction based pictures
 Integrated Electronic Journal (EJ)
 Synchronized storage and access of EJ and pictures
 Convenient back-up mechanism from the ATM and
server
 Up to date, detailed, and accurate status monitoring dashboard
 Separate dashboard for branches to view their own local ATM
 Easy to use and intuitive web-based server component
 Smart issue tracking
Differentiating Factors
 EJ and Pictures available in real time for entire network. Access them securely anytime,
anywhere.
 One-click sharing of searched transaction results.
 Decide and set your picture points during transaction at will.
 Dashboard to view camera issues, if any, in the ATM and network
 Can integrate with incident management system to escalate calls for fixing camera
issues and report automatically when fixed
 Maximum synchronization of data to ensure availability at ATM and Server
M - Access
Deploying images, videos, audio files to ATMs is a
cumbersome process faced by many ATM operators. In most
situations, field engineering is engaged to visit each ATM and update the files. Without a
centralized tool that can securely access each ATM or SST on the network, this activity
consumes hours and days, and is susceptible to errors and inconsistency.
M-Access allows ATMs to be updated remotely from a central location. All files that need to be
downloaded at the ATM can now be packaged at the central office, and deployed to the entire
network through few click strokes. All of this activity is performed securely and done through
appropriate and traceable user authentication.
Why M-Access?
 No need to send engineers to each ATM to update files
 Save cost and time
 Deploy and change files with the swiftness you want
 Send different messages and campaigns to an ATM or groups of ATMs
Key Features
 Easy to use and manage.
 Download a single or multiple files to ATMs from a single location.
 Define groups of ATMs and send different files to each group. For example, if Basant
festival is taking place in Lahore, the bank can flexibly customize ATM screens for
Lahore only.
 Use drag and drop to move ATMs to another group
 Secure access through user/password combination
 Logs ensure that all activities are recorded for audit
 Scheduling for transferring the files to ATMs. (Note: In case of failure Application will
resend the files).
 Importing of Data from Excel to database
 Report of uploading and downloading data.
M - Recover
“A significant number of ATM errors can be
automatically fixed without an engineer visit or even a remote login”
Increasing competition in the financial industry now requires much higher service levels from
banks to stay in the game. At the same time, consumers are more intelligent and choose to
withdraw cash at ATMs with the highest uptime.
In several countries, regulatory authorities place stringent expectations for an institution’s
communication network’s reliability and ATM uptime. Sometimes even penalties are imposed.
What most ATM operators are not aware of is that a significant number of ATM errors can be
automatically fixed without human intervention or even a remote log-in.
M-Recover gives the bank the ability to recover an ATM from errors or out-of-service situations
automatically. It keeps in perspective that any negative financial impact does not occur.
M-Recover is an intelligent, configurable, real-time terminal based solution which helps the ATM
recover from errors on the fly.
M-Recover not only reduces ATM downtime but also reduces the number of custodian visits to
perform supervisory functions. M-Recover is available on Agilis® Empower platform.
Why M-Recover?
 maximize ATM availability and uptime
 minimize time consuming & costly engineer and custodian visits to the site
 Attract more customers to ATMs, increase ATM profitability, and customer satisfaction.
Key Features
 Customizable and configurable
 Efficient mechanism to avoid financial risk
 Easy to integrate
 minimize manual intervention and remote assistance
 Real time event alerts
 Reports
Anti-Skimming Solution
Diebold Anti-Skimming Prevention:
The detection technology adopted is an Optical Infrared (IR) sensor and LEDs.
The rationale behind the choice of the IR technology was based on the objectives of successful
skimmer detection, as per the following:
• Detect any skimmer material (plastic, metal, ceramic)
• Detect any dimension of the skimmer (detects even thin skimmers)
• Resistant to environmental factors (rain, dew, condensation)
• Unaffected by electromagnetic noise (cell phones, environment)
• Unaffected by the color of the skimmer
Only the IR Optical technology is capable to meet all the above detection objectives.
Some actions will be taken according to three different layers of prevention methods:
1) Direct Detection - Object detected (sensor blocked)
• An object placed on the MCRW bezel and blocking the sensor:
• After 15 seconds will be considered as a probable fraud attempt and the system will lock
the shutter and log the “shutter locked” event
• After 15 minutes (configurable, from 15 minutes to 30 minutes, with 5 minute intervals),
the system will send an alarm notification to the bank's application and/or to an external
alarm system connected to an optional relay in the ATM.
• If the object is removed (sensor unblocked for 1-2 seconds), the system will:
• Unlock the shutter
• Log “shutter unlocked” event
• Report fraud removed
• Reset the alarm timer
2) Movement Detection - Card hits the entrance / movement not detected
• During a card insertion the user hand movement is expected to be detected by the sensor.
• If no movement is detected during the card insertion, ASP will consider that probably a
skimmer is blocking the beam reflection, and the system will:
• Lock the shutter
• Log the “ASD Card Insertion Denied” event
• Report the fraud attempt alert after 5-10 consecutive attempts to insert the card without
motion detected (the configuration of tentative numbers may range from 5 to 10,
incremented by 1).
• If a movement is detected by the sensor, the system will:
• Unlock the shutter
• Report fraud removed, if a fraud attempt alert was previously reported
• Reset the count of consecutive card insertions without motion detection
3) Hand Detection – the Card is inside the reader / hand not detected
• This additional protection is based on the fact that a skimming attack is successful not
only capturing the card data but also the PIN code.
• If the card is already inside the card reader, but during the insertion the detected
movement was not due to a hand, the system will:
• Return “card read error” to the ATM application, so that the cardholder will not be
prompted to enter the PIN.
• Log the “ASD Card Read Error” event
• Report the fraud attempt alert and lock the shutter after 5-10 consecutive card insertions
with no hand detected (the configuration of tentative numbers may range from 5 to 10,
incremented by 1).
• If a movement is detected, the system will:
• Return the card data
• Report fraud removed and unlock the shutter, if a fraud attempt alert was previously
reported
• Reset the tentative card insertions counter

More Related Content

What's hot

ATM project presentation
ATM project presentationATM project presentation
ATM project presentation
Abdul Rafay
 
ATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional RequirementsATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional Requirements
wajahat Gul
 
Atm machine
Atm machineAtm machine
Atm machine
Varsha Pawar
 
Atm simulation mini project using Python programming language
Atm simulation  mini project using Python programming language Atm simulation  mini project using Python programming language
Atm simulation mini project using Python programming language
Mauryasuraj98
 
54039271 atm-project-report
54039271 atm-project-report54039271 atm-project-report
54039271 atm-project-report
Kalpana Reddy
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
Networking
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
Diotima Gupta
 
How do at ms work.ppt
How do at ms work.pptHow do at ms work.ppt
How do at ms work.ppt
Naveen Sihag
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
PTTS_web
PTTS_webPTTS_web
Project report on (atm MAnagment system)
Project report on (atm MAnagment system)Project report on (atm MAnagment system)
Project report on (atm MAnagment system)
Muhammad Umer Lari
 
Atm software ppt
Atm software pptAtm software ppt
Atm software ppt
ParmarAnisha
 
Finger print recognized atm system
Finger print recognized atm systemFinger print recognized atm system
Finger print recognized atm system
Pvrtechnologies Nellore
 
Seminar
SeminarSeminar
Seminar
Hina Saxena
 
AUTOMATED TELLER MACHINE
AUTOMATED TELLER MACHINEAUTOMATED TELLER MACHINE
AUTOMATED TELLER MACHINE
prapti borthakur
 
ATM Security Services
ATM Security ServicesATM Security Services
ATM Security Services
Rami Muleys
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
Atm machine
Atm machineAtm machine
Atm machine
RanjithMsc
 
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
EuronetGDCLearning
 
GoodVision Video Insights Presentation 2018
GoodVision Video Insights Presentation 2018GoodVision Video Insights Presentation 2018
GoodVision Video Insights Presentation 2018
Daniel ?tofan
 

What's hot (20)

ATM project presentation
ATM project presentationATM project presentation
ATM project presentation
 
ATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional RequirementsATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional Requirements
 
Atm machine
Atm machineAtm machine
Atm machine
 
Atm simulation mini project using Python programming language
Atm simulation  mini project using Python programming language Atm simulation  mini project using Python programming language
Atm simulation mini project using Python programming language
 
54039271 atm-project-report
54039271 atm-project-report54039271 atm-project-report
54039271 atm-project-report
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
How do at ms work.ppt
How do at ms work.pptHow do at ms work.ppt
How do at ms work.ppt
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
PTTS_web
PTTS_webPTTS_web
PTTS_web
 
Project report on (atm MAnagment system)
Project report on (atm MAnagment system)Project report on (atm MAnagment system)
Project report on (atm MAnagment system)
 
Atm software ppt
Atm software pptAtm software ppt
Atm software ppt
 
Finger print recognized atm system
Finger print recognized atm systemFinger print recognized atm system
Finger print recognized atm system
 
Seminar
SeminarSeminar
Seminar
 
AUTOMATED TELLER MACHINE
AUTOMATED TELLER MACHINEAUTOMATED TELLER MACHINE
AUTOMATED TELLER MACHINE
 
ATM Security Services
ATM Security ServicesATM Security Services
ATM Security Services
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Atm machine
Atm machineAtm machine
Atm machine
 
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
 
GoodVision Video Insights Presentation 2018
GoodVision Video Insights Presentation 2018GoodVision Video Insights Presentation 2018
GoodVision Video Insights Presentation 2018
 

Viewers also liked

Discovery Insights Personal Profile- Candace Vela
Discovery Insights Personal Profile- Candace VelaDiscovery Insights Personal Profile- Candace Vela
Discovery Insights Personal Profile- Candace VelaCandace Vela, MBA
 
Obrasarquitectonicastrascendentales 161221133441
Obrasarquitectonicastrascendentales 161221133441Obrasarquitectonicastrascendentales 161221133441
Obrasarquitectonicastrascendentales 161221133441
denisse jaramillo
 
Bezspoluchnykove skladne rechennya
Bezspoluchnykove skladne rechennyaBezspoluchnykove skladne rechennya
Bezspoluchnykove skladne rechennya
Svitlana ZHyvolup
 
Viaje a Humahuaca
Viaje a HumahuacaViaje a Humahuaca
Viaje a Humahuaca
antonella ontiveros
 
plantas medicinales
plantas medicinales plantas medicinales
plantas medicinales
d-2017
 
Vidminyuvannya chyslivnykiv
Vidminyuvannya chyslivnykivVidminyuvannya chyslivnykiv
Vidminyuvannya chyslivnykiv
Svitlana ZHyvolup
 
Myakyi znak
Myakyi znakMyakyi znak
Myakyi znak
Svitlana ZHyvolup
 
Роdvoyennya ta podovzhennya prуholosnуkh
Роdvoyennya ta podovzhennya prуholosnуkhРоdvoyennya ta podovzhennya prуholosnуkh
Роdvoyennya ta podovzhennya prуholosnуkh
Svitlana ZHyvolup
 
Sunny Vinayak Nimhan Corporator PMC Pune
Sunny Vinayak Nimhan Corporator PMC PuneSunny Vinayak Nimhan Corporator PMC Pune
Sunny Vinayak Nimhan Corporator PMC Pune
Sunny Nimhan
 

Viewers also liked (9)

Discovery Insights Personal Profile- Candace Vela
Discovery Insights Personal Profile- Candace VelaDiscovery Insights Personal Profile- Candace Vela
Discovery Insights Personal Profile- Candace Vela
 
Obrasarquitectonicastrascendentales 161221133441
Obrasarquitectonicastrascendentales 161221133441Obrasarquitectonicastrascendentales 161221133441
Obrasarquitectonicastrascendentales 161221133441
 
Bezspoluchnykove skladne rechennya
Bezspoluchnykove skladne rechennyaBezspoluchnykove skladne rechennya
Bezspoluchnykove skladne rechennya
 
Viaje a Humahuaca
Viaje a HumahuacaViaje a Humahuaca
Viaje a Humahuaca
 
plantas medicinales
plantas medicinales plantas medicinales
plantas medicinales
 
Vidminyuvannya chyslivnykiv
Vidminyuvannya chyslivnykivVidminyuvannya chyslivnykiv
Vidminyuvannya chyslivnykiv
 
Myakyi znak
Myakyi znakMyakyi znak
Myakyi znak
 
Роdvoyennya ta podovzhennya prуholosnуkh
Роdvoyennya ta podovzhennya prуholosnуkhРоdvoyennya ta podovzhennya prуholosnуkh
Роdvoyennya ta podovzhennya prуholosnуkh
 
Sunny Vinayak Nimhan Corporator PMC Pune
Sunny Vinayak Nimhan Corporator PMC PuneSunny Vinayak Nimhan Corporator PMC Pune
Sunny Vinayak Nimhan Corporator PMC Pune
 

Similar to Tounchpoint VAS Linkin

A secured-&-effective-system-for-remote-monitoring-of-large-network-of-hetero...
A secured-&-effective-system-for-remote-monitoring-of-large-network-of-hetero...A secured-&-effective-system-for-remote-monitoring-of-large-network-of-hetero...
A secured-&-effective-system-for-remote-monitoring-of-large-network-of-hetero...
R Systems International
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
IJRES Journal
 
ATM BLock Diagram and its design uses development.pptx
ATM BLock Diagram and its design uses development.pptxATM BLock Diagram and its design uses development.pptx
ATM BLock Diagram and its design uses development.pptx
keerthi975
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
Kirthika C
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
KanchanRaut13
 
Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdf
NEERAJRAJPUT81
 
C132733
C132733C132733
C132733
IJRES Journal
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
IRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
 
ATM Banking
ATM BankingATM Banking
ATM Banking
Arnav Sameer
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
IRJET Journal
 
N044057478
N044057478N044057478
N044057478
IJERA Editor
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET Journal
 
PM processing 03 2015(eng)
PM processing 03 2015(eng)PM processing 03 2015(eng)
PM processing 03 2015(eng)
Vadim Andreev
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET Journal
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET Journal
 
OIES : M2M integrated with Field Service Management
OIES : M2M integrated with Field Service ManagementOIES : M2M integrated with Field Service Management
OIES : M2M integrated with Field Service Management
Francisco Maroto
 

Similar to Tounchpoint VAS Linkin (20)

A secured-&-effective-system-for-remote-monitoring-of-large-network-of-hetero...
A secured-&-effective-system-for-remote-monitoring-of-large-network-of-hetero...A secured-&-effective-system-for-remote-monitoring-of-large-network-of-hetero...
A secured-&-effective-system-for-remote-monitoring-of-large-network-of-hetero...
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
ATM BLock Diagram and its design uses development.pptx
ATM BLock Diagram and its design uses development.pptxATM BLock Diagram and its design uses development.pptx
ATM BLock Diagram and its design uses development.pptx
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdf
 
C132733
C132733C132733
C132733
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
N044057478
N044057478N044057478
N044057478
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
PM processing 03 2015(eng)
PM processing 03 2015(eng)PM processing 03 2015(eng)
PM processing 03 2015(eng)
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
OIES : M2M integrated with Field Service Management
OIES : M2M integrated with Field Service ManagementOIES : M2M integrated with Field Service Management
OIES : M2M integrated with Field Service Management
 

Tounchpoint VAS Linkin

  • 2. M – View With increasing transaction volumes, the concern for transaction integrity at ATMs also rises. Banks are always concerned with suspect transactions that require dispute resolution. Similarly, investigation of fraudulent transactions is also a critical part of the Alternate Delivery Channel business. Banks’ require a robust mechanism to trace journals, capture images during transactions, and do multi-dimensional searches to reach the disputed or fraudulent. M-View is a configurable and flexible product which can integrate with multiple cameras to take event or transaction based pictures and places them in a central repository at a designated server. In parallel, m-View also transports the Electronic Journal from all ATMs to the same central repository. On the server side, users can perform multi-dimensional searches inside the EJ and images to investigate transaction disputes and frauds. The pictures captured by M-View can be tagged with ATM journal entries to further facilitate in investigating transaction dispute cases. M-View is a multi-vendor application and can be used on any ATM brand in your network running on MS Windows platform. The combination of Electronic Journal or any maintained log with the pictures obtained through M-View forms the most compelling evidence for resolving suspect transactions. Business Goal  Reduce investigation time for dispute settlement activities  Analysis and investigation for disputes, black lists & plain transactions  Reliable transaction monitoring  Strong reporting engine enabling analysis and planning
  • 3. Key Features  Lightweight and robust database for all transactions  Camera and ATM hardware independent.  Variety of search criteria for on-the-fly finely-tuned results  Able to take event or transaction based pictures  Integrated Electronic Journal (EJ)  Synchronized storage and access of EJ and pictures  Convenient back-up mechanism from the ATM and server  Up to date, detailed, and accurate status monitoring dashboard  Separate dashboard for branches to view their own local ATM  Easy to use and intuitive web-based server component  Smart issue tracking Differentiating Factors  EJ and Pictures available in real time for entire network. Access them securely anytime, anywhere.  One-click sharing of searched transaction results.  Decide and set your picture points during transaction at will.  Dashboard to view camera issues, if any, in the ATM and network  Can integrate with incident management system to escalate calls for fixing camera issues and report automatically when fixed  Maximum synchronization of data to ensure availability at ATM and Server
  • 4. M - Access Deploying images, videos, audio files to ATMs is a cumbersome process faced by many ATM operators. In most situations, field engineering is engaged to visit each ATM and update the files. Without a centralized tool that can securely access each ATM or SST on the network, this activity consumes hours and days, and is susceptible to errors and inconsistency. M-Access allows ATMs to be updated remotely from a central location. All files that need to be downloaded at the ATM can now be packaged at the central office, and deployed to the entire network through few click strokes. All of this activity is performed securely and done through appropriate and traceable user authentication. Why M-Access?  No need to send engineers to each ATM to update files  Save cost and time  Deploy and change files with the swiftness you want  Send different messages and campaigns to an ATM or groups of ATMs Key Features  Easy to use and manage.  Download a single or multiple files to ATMs from a single location.  Define groups of ATMs and send different files to each group. For example, if Basant festival is taking place in Lahore, the bank can flexibly customize ATM screens for Lahore only.  Use drag and drop to move ATMs to another group  Secure access through user/password combination  Logs ensure that all activities are recorded for audit  Scheduling for transferring the files to ATMs. (Note: In case of failure Application will resend the files).  Importing of Data from Excel to database  Report of uploading and downloading data.
  • 5. M - Recover “A significant number of ATM errors can be automatically fixed without an engineer visit or even a remote login” Increasing competition in the financial industry now requires much higher service levels from banks to stay in the game. At the same time, consumers are more intelligent and choose to withdraw cash at ATMs with the highest uptime. In several countries, regulatory authorities place stringent expectations for an institution’s communication network’s reliability and ATM uptime. Sometimes even penalties are imposed. What most ATM operators are not aware of is that a significant number of ATM errors can be automatically fixed without human intervention or even a remote log-in. M-Recover gives the bank the ability to recover an ATM from errors or out-of-service situations automatically. It keeps in perspective that any negative financial impact does not occur. M-Recover is an intelligent, configurable, real-time terminal based solution which helps the ATM recover from errors on the fly. M-Recover not only reduces ATM downtime but also reduces the number of custodian visits to perform supervisory functions. M-Recover is available on Agilis® Empower platform. Why M-Recover?  maximize ATM availability and uptime  minimize time consuming & costly engineer and custodian visits to the site  Attract more customers to ATMs, increase ATM profitability, and customer satisfaction. Key Features  Customizable and configurable  Efficient mechanism to avoid financial risk  Easy to integrate  minimize manual intervention and remote assistance  Real time event alerts  Reports
  • 6. Anti-Skimming Solution Diebold Anti-Skimming Prevention: The detection technology adopted is an Optical Infrared (IR) sensor and LEDs. The rationale behind the choice of the IR technology was based on the objectives of successful skimmer detection, as per the following: • Detect any skimmer material (plastic, metal, ceramic) • Detect any dimension of the skimmer (detects even thin skimmers) • Resistant to environmental factors (rain, dew, condensation) • Unaffected by electromagnetic noise (cell phones, environment) • Unaffected by the color of the skimmer Only the IR Optical technology is capable to meet all the above detection objectives. Some actions will be taken according to three different layers of prevention methods: 1) Direct Detection - Object detected (sensor blocked) • An object placed on the MCRW bezel and blocking the sensor: • After 15 seconds will be considered as a probable fraud attempt and the system will lock the shutter and log the “shutter locked” event • After 15 minutes (configurable, from 15 minutes to 30 minutes, with 5 minute intervals), the system will send an alarm notification to the bank's application and/or to an external alarm system connected to an optional relay in the ATM. • If the object is removed (sensor unblocked for 1-2 seconds), the system will: • Unlock the shutter • Log “shutter unlocked” event • Report fraud removed • Reset the alarm timer 2) Movement Detection - Card hits the entrance / movement not detected • During a card insertion the user hand movement is expected to be detected by the sensor. • If no movement is detected during the card insertion, ASP will consider that probably a skimmer is blocking the beam reflection, and the system will: • Lock the shutter • Log the “ASD Card Insertion Denied” event • Report the fraud attempt alert after 5-10 consecutive attempts to insert the card without motion detected (the configuration of tentative numbers may range from 5 to 10, incremented by 1). • If a movement is detected by the sensor, the system will: • Unlock the shutter
  • 7. • Report fraud removed, if a fraud attempt alert was previously reported • Reset the count of consecutive card insertions without motion detection 3) Hand Detection – the Card is inside the reader / hand not detected • This additional protection is based on the fact that a skimming attack is successful not only capturing the card data but also the PIN code. • If the card is already inside the card reader, but during the insertion the detected movement was not due to a hand, the system will: • Return “card read error” to the ATM application, so that the cardholder will not be prompted to enter the PIN. • Log the “ASD Card Read Error” event • Report the fraud attempt alert and lock the shutter after 5-10 consecutive card insertions with no hand detected (the configuration of tentative numbers may range from 5 to 10, incremented by 1). • If a movement is detected, the system will: • Return the card data • Report fraud removed and unlock the shutter, if a fraud attempt alert was previously reported • Reset the tentative card insertions counter