Welcome

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

WELCOM

1
Govt Polytechnic College Punalur

Guided by Amal dev V


Jeseena A Roll no:17
Department of Computer Engineering S5 CT

2
One Touch Multi-banking
Transaction ATM System

3
CONTENT

• Introduction

• Biometric machine with fake detection

• Fingerprint along with GSM technology for OTP

• Biometric based fingerprint authentications systems in ATM

• Smart ATM pin recovery and secured ATM transactions based on fingerprint identification

• Secure-pin-authentication-as-a-service for ATM using mobile and wearable devices:-

• Architecture

• Working of fingerprint module

• Design and implementation of anti-theft ATM machine using embedded systems

• Applications

• Advantages

• Conclusion
4
INTRODUCTION

• An ATM is a machine that enables bank account holders to complete


transaction at any time without human intervention.

• In an ATM system customer authenticate themselves by using a plastic


card on which magnetic stripe is mounted known as ATM card,each
account has distinct PINs

• In traditional ATM system occasionally we forget PINs or chance to get


confused or losing PIN to someone other.

• So the ATM card have number of drawbacks like breaking card, losing
card, stolen card, losing PIN, forgot PINs, etc. due to such issues there
are maximum chances of frauds .

5
• To overcome the bugs in traditional ATM system, introducing
a new ATM terminal customer recognition system, “One
touch Multi-banking Transaction system using Biometric
and GSM Authentication” .
• Biometric based fingerprint authentication technique is one of
the most secure systems, unauthorized accesses are restricted,
as this makes fingerprint a unique identification for everyone.
• This system also assures a secure GSM (OTP-One time
Password) based transaction.
• Here the proposed system has no risk overhead in managing
multiple account transactions and achieves high security as
compare to the traditional ATM system

6
A Self-Banking Biometric Machine with Fake Detection
• In this seminar two most stable physiological biometrics as a means of
identification of an individual has made the system more reliable.
• The OTP concept added in the system using GSM modem further
enhances the security.
• The growing direct attacks of thieves has motivated us to focus our prime
concern on the security over money transaction.
• The accuracy of biometrics in identification is increasing its usage
extensively.
• The method proposed in this paper focuses on how the money
transaction in an ATM machine will be secured by providing personal
identification by analyzing biometrics like fingerprints patterns which are
known for their steadiness and diversity. Use of biometrics provides a
paperless banking environment along with the smart ATM access.

7
Fingerprint Along with GSM Technology for OTP

• In this system the samples of the fingerprint along with the registered mobile number of the
customer needs to be collected and saved in the database by the banker if the customer is to
access the ATM.
• The actual operation of the system begins when the customer is to access the ATM to make
a money transaction.
• The fingerprint samples will be captured and matched. The system will distinguish between
the real Genuine person and fake samples by comparing it with the samples saved in the
database during enrollment.

• After finding valid samples the system generates a 3 digit code which is received by the
customer on his/her registered mobile number.
• This process is carried out using a GSM modem

• The entered OTP will be checked, after the OTP is found valid the customer is allowed to
make further transactions otherwise the account is blocked.

8
Biometric based fingerprint authentications
systems in ATM
• Access control has been a great concern in this Information and Communication Technology
(ICT) .
• The need to control access to certain information and resources has been taken seriously by the
ICT community.
• no single security method, algorithm, key or procedure is entirely secure. Hence, a combination
of multiple security compliments is mandatory to provide a high level of protection against
fraud and other threats.

• We combines two security components which are the magnetic stripe card and fingerprint
recognition.

• It looks into the vulnerabilities of magnetic-stripe cards authentication combined with Personal
Identification Numbers (PIN) or passwords widely used on Automated Teller Machines (ATMs)
today.
• As a result, a framework for user identification and authentication in ATMs using PIN
fingerprints and magnetic stripe cards as opposed to the PIN and magnetic stripe cards
authentication method.

9
Smart ATM Pin Recovery and Secured ATM
Transactions Based on Fingerprint Identification:-

• In this system, we propose the Secure-PIN- Authentication,


OTP-based authentication service for ATMs using Mobile
devices.
• In existing ATM system, most often only PIN is used to verify
authentic user which is not secured enough as it is very easy to
copy.
• Sometimes thieves have a very strong way to steal account
information, that’s why biometric verification system can be a
firm solution.
• So we provide a more secured method using biometric
features and message authentication technique..
10
• In this method, PIN verification is combined with fingerprint recognition,
to identify a customer during ATM transaction.

• To assure the security while doing transaction through swipe machine,


the client will confirm the transaction by an approval message through
GSM technology.

• location will be identified through GPS. If any illegitimate person tries to


use the card it will automatically be blocked by the system and detail
information will be sent to the customer through the message.

• Hence, the proposed method will provide more security by identifying


and reducing the frauds

11
Secure-PIN-Authentication-as-a-Service for ATM
Using Mobile and Wearable Devices:-
• we propose the Secure-PIN Authentication-as-a-Service a cloud-based
PIN-authentication service for using personal mobile or wearable devices.

• Credit card fraud is a common problem in today’s world. Financial


institutions have registered major loses till today due to users being
exposed of their credit card information.

• In ATM card skimming and video recording with hidden cameras while
users perform PIN-based authentication is one of the common threats for
common users.

• Researchers have struggled to come up with secure solutions for secure
PIN authentication.

12
• we propose Secure-PIN-Authentication), a secure PIN authentication
protocol for ATM

• Our approach protects the user from attacks, and resistant to


intermediate transaction attacks.

• System ensures minimal task overhead on the user’s device with


maximal computation offloaded to the cloud.

• We have implemented a proof-of-concept prototype to perform


experimental analysis and a usability study for the architecture.

13
ARCHITECTURE
• The working of system starts with reading input from user as a fingerprint of user.
It will be read by fingerprint scanner. The input will be verified from the data
stored in the database and gets validated.

• The architecture of proposed system is divided into three dierent working modules,

• A) Working of Fingerprint Module

• B) Function of web Services

• C) Working of GSM module.

• The databases are stored on cloud. Web services give access to all the bank
accounts of user.

14
15
WORKING OF FINGERPRINT

• Once the fingerprint is validated the system requests web


services for the account details of the user.

• The details of all the bank accounts of user are displayed for
the further transaction.

• The following table gives the detailed information of


fingerprint Scanner devices

16
17
Design and Implementation of Anti-theft ATM Machine
using Embedded Systems
• In proposed anti-theft ATM system, comprising of the modules namely,
authentication of shutter lock, web enabled control, sensors and camera control.

• Implementation of the system is obtained with the use of machine to machine


communication technology which allows both wireless and wired system to
communicate.

• It implements embedded web server based on ARM11 processor, Using Machine


to Machine communication technology implementation of the system is done.

• This technology is recent attraction for security purpose using embedded systems
to obtain ATM security.

• .

18
APPLICATIONS

• It is basically a system a system developed for the


Automatic Teller Machine for secure card-less one touch
transactions.

• It can also be a used in any authorized users access.

• This system gives us two levels of security which helps


in data security and confidentiality

19
ADVANTAGES

• All the bank accounts are managed in a single finger touch thus
no need to carry multiple cards and remember their passwords.

• The problems like fraud, unlawful entry, cards getting stolen


forgetting the PINs are prevented.

• The system is using biometric instead of PIN for validation.


Thus the transactions get more secure.

• It suspends the fraud calls related to the ATM card verification


and all.

20
Conclusion

• The above proposed system replaces the traditional ATM


transaction system.
• It has overcome various drawbacks of the traditional system
starting with manufacturing of cards, handling the cards like
carrying them, theft of cards, forgetting the pin, fraud calls
related to ATM card or any other.
• This system provides high security through its two layers of
authentication; therefore making all the transactions possible
in just single touch.

21
I hope you are understood my topic very well….so if any doubts…please freely ask to me……

THANKS………

22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy