ATM
ATM
ATM
The continuous usage of services such as the ATM will rely quite heavily on public
perception and confidence that it is safe to use it for everyday transactions that include cash
withdrawals, payment of bills, prepaid phone top up, and a host of other transactions which at
the moment can only be carried out by bank ATM technology allows customers carry out the
transactions using an ATM card, which could be a debit or a credit card. An ATM machine
authenticates the card by reading and verifying the magnetic strip, card number, expiration
date, and an already provided or pre-selected PIN number. Like with most technological
advances, there is always a flaw which criminal-minded individuals identify and exploit to
perpetuate fraud. a model for user enrollment and authentication, using three basic methods,
based on: what user knows (a Fingerprint), what user has (A Iris) and OTP. user Biometrics
can be applied to uniquely identify an individual, based on his/her physical or physiological
or behavioral traits, features or attributes, There is still the issue of fingerprint spoofing or
cloning (fake biometrics), but it is certainly easier to clone a card number, as it is currently
practiced. Authentication is now introduced that ensures that even with the correct pin
information and in possession of another person's ATM card, a fraudster will not be able to
withdraw any money since the biometric features of every individual is unique.
EXISTING SYSTEM:
Typical ATMs have two input devices (a card reader and keypad) and four output
devices (display screen, cash dispenser, receipt printer, and speaker). Not visible to the client
is a communications mechanism that links the ATM directly to an ATM host network. The
ATM functions much like a PC; it comes with an operating system and specific application
software for the user interface and communications. Whereas most ATMs use magnetic strip
cards and personal identification numbers (PINs) to identify account holders, easy to trace the
number. It cans more security so that the biometric is only the process to validate the valid
users.
The potential for identity theft is a major disadvantage related to automatic teller
machines. Fraudulent card readers, called skimmers, are placed over the authentic reader to
transfer numbers and codes to nearby thieves. Spy cameras are also used by password
voyeurs to collect access codes. Lost access cards are another potential for fraud. The Federal
Trade Commission states that people are not responsible for unauthorized use of a card, if it
is reported immediately. If the loss is not noticed immediately, consumers may lose all funds
in an account, if notice is not given before money transfers are made.
Unlike banks, in which security guards and tellers are present to ensure the person
performing a transaction receives privacy, there is no such guarantee when using an ATM.
People may try to spy on users as delicate information appears on the screen, without the user
being aware.
Unlike banks, in which security guards and tellers are present to ensure the person
performing a transaction receives privacy, there is no such guarantee when using an ATM.
People may try to spy on users as delicate information appears on the screen, without the user
being aware.
DISADVANTAGES
No security
PROPOSED SYSTEM:
These range from fingerprint pattern recognition. The premise behind using such
identifiers is that they are unique, generally not subject to change, and cannot be stolen, lost
or forgotten.5 this is not to say that biometric identifiers are infallible. They do, however,
represent a useful method of linking identity to specific system users.
ADVANTAGES
Cannot be lost
Cannot be theft
Maintain secure & privacy of customer transactions