Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

ATM

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

ABSTRACT

The continuous usage of services such as the ATM will rely quite heavily on public
perception and confidence that it is safe to use it for everyday transactions that include cash
withdrawals, payment of bills, prepaid phone top up, and a host of other transactions which at
the moment can only be carried out by bank ATM technology allows customers carry out the
transactions using an ATM card, which could be a debit or a credit card. An ATM machine
authenticates the card by reading and verifying the magnetic strip, card number, expiration
date, and an already provided or pre-selected PIN number. Like with most technological
advances, there is always a flaw which criminal-minded individuals identify and exploit to
perpetuate fraud. a model for user enrollment and authentication, using three basic methods,
based on: what user knows (a Fingerprint), what user has (A Iris) and OTP. user Biometrics
can be applied to uniquely identify an individual, based on his/her physical or physiological
or behavioral traits, features or attributes, There is still the issue of fingerprint spoofing or
cloning (fake biometrics), but it is certainly easier to clone a card number, as it is currently
practiced. Authentication is now introduced that ensures that even with the correct pin
information and in possession of another person's ATM card, a fraudster will not be able to
withdraw any money since the biometric features of every individual is unique.
EXISTING SYSTEM:

Typical ATMs have two input devices (a card reader and keypad) and four output
devices (display screen, cash dispenser, receipt printer, and speaker). Not visible to the client
is a communications mechanism that links the ATM directly to an ATM host network. The
ATM functions much like a PC; it comes with an operating system and specific application
software for the user interface and communications. Whereas most ATMs use magnetic strip
cards and personal identification numbers (PINs) to identify account holders, easy to trace the
number. It cans more security so that the biometric is only the process to validate the valid
users.

The potential for identity theft is a major disadvantage related to automatic teller
machines. Fraudulent card readers, called skimmers, are placed over the authentic reader to
transfer numbers and codes to nearby thieves. Spy cameras are also used by password
voyeurs to collect access codes. Lost access cards are another potential for fraud. The Federal
Trade Commission states that people are not responsible for unauthorized use of a card, if it
is reported immediately. If the loss is not noticed immediately, consumers may lose all funds
in an account, if notice is not given before money transfers are made.

Unlike banks, in which security guards and tellers are present to ensure the person
performing a transaction receives privacy, there is no such guarantee when using an ATM.
People may try to spy on users as delicate information appears on the screen, without the user
being aware.

Unlike banks, in which security guards and tellers are present to ensure the person
performing a transaction receives privacy, there is no such guarantee when using an ATM.
People may try to spy on users as delicate information appears on the screen, without the user
being aware.
DISADVANTAGES

 Easy to trace the numbers.

 No security

 Lost access cards

 Password voyeurs can use Spy cameras.

 Lack of security guards and tellers

PROPOSED SYSTEM:

Biometric systems use points of measurable uniqueness to determine identities. This


technology can act as the front end to a system that requires precise identification of those
requesting access before the system may be used. This concept is essentially what password
systems attempt to achieve; knowing a password provides access to a system or location.
There is, however, one fundamental difference between access systems using passwords and
those using biometric methods.

These range from fingerprint pattern recognition. The premise behind using such
identifiers is that they are unique, generally not subject to change, and cannot be stolen, lost
or forgotten.5 this is not to say that biometric identifiers are infallible. They do, however,
represent a useful method of linking identity to specific system users.

ADVANTAGES

 More secure authentication

 Uniqueness in identity information

 Cannot be lost

 Cannot be theft
 Maintain secure & privacy of customer transactions

You might also like