An Atm With An Eye The Future'S Technology: Ch. John Williams ECE Department B.Tech IV Year

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 21

AN ATM WITH AN EYE THE FUTURES TECHNOLOGY

Ch. John Williams ECE Department B.Tech IV Year


1

Outline
ATM

ATM WITH AN EYE


ON THE MOST CUSTOMER IS WHERE IT IS USE

WORKING
TECHNIQUES HOW IT WORK FUNCTION PROTECTION CONCLUSION REFERENCES
2

Automated Teller Machine


An automated teller machine (ATM) is :
Computerize telecommunications
Made money transactions easy for customers to bank. Device that provides the customers of a financial transactions in

a public space without the need for a human clerk or bank teller.
Security requiring combination Physical access card+

Password(PIN)

Personal Identification Number (Pin)


PIN is one method used by banks and phone companies to

protect your account from unauthorized access


PIN is a confidential code issued to the cardholder to permit access to that account

PIN should be memorized, secured and not given to anyone,


not even family members or bank employees

An ATM With An Eye


The chances of misuse of this much hyped 'insecure' baby product (ATM) are manifold due to the exponential growth of

'intelligent' criminals day by day.


There is an urgent need for improving security in banking region. With the advent of ATM though banking became a lot easier it even became a lot vulnerable. Provide a cordless, password-free way to get their money out of an ATM

On Most Modern ATM, The Customer Is


Identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique

card number and some security information, such as an


expiration date or cvvc (cvv). Security is provided by : the customer entering A personal identification number (PIN).

Working
By forcing the ATM match a live image of a customers face/eye with an image stored in a bank database (associated

with the account number) when the data matches(account


image and stored image) user be considered fully verified A system can examine just the eyes, or the eyes nose and

mouth, or ears, nose, mouth and eyebrows, and so on.

Techniques
BIOMETRIC IDENTIFICATION TECHNIQUES

Finger Printing Retina Scanning Facial Recognition Iris Recognition

How It Work
A camera based in ash machine will Detect the pattern in second Compare it with one store in a central computer. Or encode on to the cash card. A sensor system examines the randomly Formed features of the iris of the eye as unique as a fingerprint.

Where It Used

FIGURE-3

The development of such a system would

serve to protect consumers


financial institutions alike from fraud other breaches of security.
10

Camera Installation On ATM Machine

FIGURE-4

11

Camera Snapshots
Portrait camera

Cash slot(Dispenser) camera

FIGURE-5

12

Function

15/03/11

13
13

Iris code generation

FIGURE-6

14

Steps Of Iris Working

15

Troubleshooting

FIGURE-6

EYE

automatically

discover

SNMP

enabled

devices,

application servers and applications. EYE has up-to-date and

accurate end-to-end visibility on whats happening on your


infrastructure.
16

Network of troubleshooting

17

Conclusion
We Thus Develop An Atm Model That Is More reliable in providing security by using facial recognition software. By keeping the time elapsed in the verification process to a negligible amount Try to maintain the efficiency of this ATM system

18

REFERENCES
[1] www.nationmaster.com [2] www.google.co.in [3] www.atmeye.net [4] Wikipedia

19

20

21

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy