Fingerprint Based Atm

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

DECLARATION

We declare that;

o This project is our own original work of ,this project is not a reproduction of any other
published or presented work from any other source, local or international. o The
results presented herein were obtained from experiments, research or trials that we have
undertaken ourselves
o That this is the first time that these results are being presented to the Young Scientists
Kenya exhibition for judgement.

Presenter One

Name : Joe Simiyu Form: three

Admission No.: 2110695

Signature __________________ Date__________________

Presenter two

Name: Feroze Simekha Form: three

Admission No.: 2110951

Signature __________________ Date__________________

Name of Patron : Sir Joshua Muholo

Signature __________________________________ Date______________________

i
ACKNOWLEDGEMENT
We would like to thank the Almighty for this opportunity. We are also greatly indebted to the
school administration for this gesture of support in developing our idea and also giving us
opportunity to venture into our passion. We also sincerely send our gratitude to the science and
innovation department for helping us acquire necessary materials and doing essential research
pertaining our project .We also won’t forget to express sincere gratitude to the Young Scientist
Kenya for giving us opportunity to nurture our ideas which helps in development of our nation
and making a big step in growth of our country. We would also like to thank our mentor
(_______________) for the guidance and facilitation he offered us. Last but not least we would
like to express our sincere appreciation to our dedicated school principal, our patrons Mr. Joshua
Muholo and Mr. Simeon Ogutu to whom under their close guidance we managed to come this
far. Also to our fellow students from the science and innovation club for their impeccable advice.
We would also like to acknowledge the Ministry of Education for setting up such a resilient
forum for development of our nation through STEM.

ii
Contents
DECLARATION...............................................................................................................................................i
ACKNOWLEDGEMENT..................................................................................................................................ii
ABSTRACT...................................................................................................................................................iv
1.0 CHAPTER ONE: INTRODUCTION.............................................................................................................1
1.1 BACKGROUND INFORMATION.....................................................................................................1
1.2 PROBLEM STATEMENT................................................................................................................2
1.3 JUSTIFICATION OF STUDY..................................................................................................................3

iii
ABSTRACT

iv
1.0 CHAPTER ONE: INTRODUCTION
The Fingerprint based ATM system is a biometrics based authentication system for transaction
activities and processes in Automated Teller machines in banks, for deposition and withdrawal of
liquid cash with ease access control.

1.1 BACKGROUND INFORMATION


The history of automated teller machines can be traced back to the 1960s, when self-service gas
stations, supermarkets, automated public-transportation ticketing, and candy dispensers were
revolutionized on a larger scale and the urge for automated cash telecommunications grew was
demystified. By the end of the 1960s, however, times were changing, and a broader segment of
the population–more comfortable with the idea of self-service and more willing to trust
unfamiliar technologies–was willing to give automated banking a try.

In 1967, a Scottish inventor named John Shepherd-Barron was sitting in the bathtub when he had
a flash of genius: If vending machines could dispense chocolate bars, why couldn’t they dispense
cash? Barclays, a London bank, loved the idea, and Shepherd-Barron’s first ATM was installed
in a branch on Enfield High Street not long afterward. Unlike modern ATMs, Shepherd-Barron’s
did not use plastic cards. Instead, it used paper vouchers printed with radioactive ink so that the
machine could read them. The customer entered an identification code and took her cash–a
maximum of £10 at a time.

The first automated banking machine in the U.S. was devised by a Dallas engineer and former
professional baseball player named Donald Wetzel. Wetzel’s machine used plastic cards like the
ones we use today. (Instead of radioactive ink, the cards stored account information in magnetic
strips.) In September 1969, a Chemical Bank branch on Long Island installed the first of
Wetzel’s machines.

Now with 3.2 million ATM machines worldwide, ATM is the most reliable means of customers
to interact with their respective banks remotely through telecommunications. However, this
procedure has served a major impediment to most bank and teller customers due to a lot of cyber
fraud cases, theft of ATM cards, and mobility of the ATM cards hindering access control. Thus
leading to an inefficient method of dispensing liquid cash to most customers. The fact that ATM
machines can be targeted by criminals, robbers and hackers makes it an assailable method. One
of the elemental disadvantages of ATM machines is that they are both physically and
electronically vulnerable. This makes them an easy target for cyber criminals. Malware can be
used to access people’s cash. Skimming devices and small cameras can be fitted onto Automated
Teller Machines. Referring to a case back in 2021 where Isaleb Anofils, 32, of Vero Beach,
Florida, and Donyell Garland, 32, of Tallahassee, Florida, were each sentenced respectively, to
48 months in federal prison after pleading guilty to conspiracy to commit bank fraud, multiple
counts of bank fraud, and aggravated identity theft. Court records reflect that Anofils and
Garland conspired to defraud multiple federally insured financial institutions. The defendants
used a combination of a cell phone spoofing app and various Internet websites to obtain
personally identifiable information of victims. Anofils and Garland then used that information to
conduct 285 fraudulent ATM transactions at Tallahassee-area financial institutions. In total,

1
Anofils and Garland stole or attempted to steal over $151,000 from 47 different banking
customers. (ATM Fraud Duo Sentenced To 48 Months In Prison For Conspiracy, 2021)

Taking the wide spectrum of this problem, the Fingerprint based ATM system lies as the only
viable option for the sector by incorporation of biometrics and Internet of Things (IoT) to bring
about a timely and well secured way of performing ATM transactions.

1.2 PROBLEM STATEMENT


Taking into consideration that the integration of ATM machines has built an ever-lasting
recognition in most developing countries it follows that the following challenges accompany the
procedure during its implementation:

i. FRAUD AND CYBER CRIME CASES

Since the advancement of this new set of technology in the banking sector and its revolution,
many hackers and criminals take to advantage the factor that ATM machines are both physically
and electronically vulnerable. The hackers tend to access the personal identification number of
most individuals through use of cookies when browsing and small cameras fitted in ATM
machines. This as a result leads to loss of money by many individuals across the globe, making
the use of ATM machines quite unreliable and insecure for use by credit card users.

The implementation of biometrics in this sector makes the procedure well secured from such
reported fraud cases which stands as one of the prime reasons as to why we came up with the
Fingerprint based ATM system, since biometric data is unique in every human being’s bio
profile. This gives it an added advantage compared to other security measures put in place.

ii. LOST AND FOUND CREDIT CARDS

Looking into this larger perspective, many users are mandated to carry with them their credit
cards in order for them have access control to ATM services. This has however made the process
inconvenient since the various users must carry the ATM cards. In most reported cases some of
the users end up losing their ATM cards which leads to another long process of obtaining another
credit card. And also individuals with malicious intentions may tend to use the credit card as
threats to data integrity, creating a security concern to the user and the banking firm.

This is where the Fingerprint based ATM system comes into utilization since the user doesn’t
need to have a credit card to perform ATM transactions; his/her biometric data is stored in
databases where he/she will only be obliged to go through a two-step verification process to
perform the transaction.

2
1.3 JUSTIFICATION OF STUDY
With the revelation of Automated Teller Machines back in 1967, many outcomes have justified
alongside its discovery. As an efficient way for banks to dispense cash to their customers. The
first ATM system was that of Barclays in London, in 1967; it accepted cheques with machine-
readable encoding, rather than cards, and matched the PIN to the cheque 1972, Lloyds
Bank issued the first bank card to feature an information-encoding magnetic strip, using a
Personal Identification Number(PIN) for security.[8] James Goodfellow, the inventor who
patented the first personal identification number, was awarded an OBE in the 2006 Queen's
Birthday Honors’.[9][10]
In 1973, Mohamed M. Atalla invented the first PIN-based hardware security module (HSM),
[11]
dubbed the "Atalla Box," a security system that encrypted PIN and ATM messages and
protected offline devices with an un-guessable PIN-generating key. [12] In 1972, Atalla filed U.S.
Patent 3,938,091 for his PIN verification system, which included an encoded card reader and
described a system that utilized encryption techniques to assure telephone link security while
entering personal ID information that was transmitted to a remote location for verification.
Despite this countless and splendiferous discovery yet, the neck of this fraud cases being
reported has not been countered.
The number of ATMs and payment terminals in the world is growing rapidly. The global ATM
market is expected to exceed one million dollars by 2030. Modern financial organizations, trying
to maximize the opportunities and geography of service provision, install ATMs and payment
terminals not only in the premises of bank branches, but also in various places of mass stay of
users. Often ATMs are located outside the respective premises and are used at any time of the
day or night, so their security is the priority task for financial institutions which brings the
subject and debate of user data integrity and authenticity of the user’s credit card.

ATMs are complex devices consisting of a safe and a service area. The service area contains the
system unit and is almost unprotected from intruders because its plastic door closes with a
regular lock, which is easy to break into. Safes are usually made of steel and other strong
materials. To make the decision to dispense money, the ATM contacts the processing center. The
security of the data is important. Often criminals are interested in the computer, network
equipment, card reader and dispenser built into the ATM. Attacks on these elements allow card
data to be intercepted. Automated teller machine vulnerabilities include lack of network security,
system and device configuration. Insufficient protection of peripheral devices can cause an ATM
to become infected with malware.

In 2013, M. AjayKumar and N. B Kumar came up with the Anti-theft ATM machine using
vibrator sensor where any sort of physical damage to the ATM machine is detected and the door
locks automatically and the information is sent to the nearby police post or relevant authorities
through Internet of things technology. (Ajaykumar, 2013)

In 2017, R. Padmavathi and K.M Mohammed improved the norm reality of smart card
integration in ATM systems by coming up with a digitalized Aadhar enabled ration distribution
using smart card where users can be able to log in and gain access control to multiple accounts at

3
a given time within a specified block radius, enabling bank admins to control the frequent fraud
cases reported at a given time.

4
5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy