Bhavani - Bhoj Reddy College

Embed Size (px)

Citation preview

  • 8/2/2019 Bhavani - Bhoj Reddy College

    1/20

    BHOJ REDDY ENGINEERING

    COLLEGE FOR WOMEN

    ( Affiliated to JNTU , Hyderabad)

    TOPICAn ATM with an eye

    The Future Technology

    By

    D. Kusuma Sree Bhavani

    P. Kusuma Sai Lakshmi

    (ECE Department )

  • 8/2/2019 Bhavani - Bhoj Reddy College

    2/20

    WHAT IS TECHNOLOGY

    Technology is the technical means,

    people efficiently use to improve theirsurrounding.

    It is also the knowledge of using the toolsand machines to do tasks.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    3/20

    AUTOMATED TELLER MACHINE

    An automated teller machine (ATM) is a

    computerized telecommunicationsdevice that provides the customers of afinancial institution with access tofinancial transactions in a public spacewithout the need for a human clerk orbank teller.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    4/20

    4

    AN ATM WITH AN EYE

    There is an urgent need for improving

    security in banking region. With theadvent of ATM though banking became alot easier it even became a lot vulnerable.

    The chances of misuse of this muchhyped 'insecure' baby product (ATM) aremanifold due to the exponential growth of

    'intelligent' criminals day by day.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    5/20

    AN ATM WITH AN EYETHE FUTURE,S TECHNOLOGY

    ATM systems today use no morethan access card and PIN foridentity verification.

    This situation is unfortunate sincetremendous progress has beenmade in biometric identificationtechniques,including finger

    printing, facial recognition, andiris scanning.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    6/20

    6

    WHERE IT USEThe

    development of

    such a systemwould serve toprotectconsumers andfinancialinstitutionsalike from fraudand otherbreaches ofsecurity.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    7/20

    7

    HOW IT WORKS The progress has been made in

    biometric identificationtechniques, including fingerprinting, retina scanning, andfacial recognition.

    This paper proposes thedevelopment of a system thatintegrates facial recognition

    technology into the identityverification process used inATMs.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    8/20

    HOW IT WORK

    A camera based in cash machine willdetect the pattern in second. andcompare it with one store in a central

    computer.Or encode on to the cash card.

    A sensar system examines the randomlyformed features of the iris of the eye .as unique as a fingerprint.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    9/20

    15/03/11 9

    FUNCTION

  • 8/2/2019 Bhavani - Bhoj Reddy College

    10/20

    10

    AN ATM WITH EYE:THE BEST TECHNOLOGY

  • 8/2/2019 Bhavani - Bhoj Reddy College

    11/20

    11

    PROTECTING YOUR PRIVACY

    E-mail, the Internet, automated teller

    machines (ATM), computer banking.

    long distance carriers, even credit cardsmake our lives more efficient.

    keeping our private information confidential.

    Electronic transactions can leave youvulnerable to fraud and other crimes.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    12/20

    A WORD ON PASSWORDS

    Whether you are on the Internet or anonline banking program, you are often

    required to use a password.

    The worst passwords to use are theones that come to mind first - name,

    spouse's name, maiden name, pets,children's name, even street addresses,etc.

    The best passwords, mix numbers withupper and lowercase letters. Apassword that is not found in thedictionary is even better.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    13/20

    13

    How you protect your password Changing your password regularly.

    Memorizing your password.If you do write down the password, keep it athome or hidden at work. Don't rewrite yourpassword on a post-it note and stick it on

    your monitor or hard drive.

    Web site remember a password for you, don'tuse it. Anyone who uses your machine will

    have automatic access to information that is

    password protected.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    14/20

    14

    Protect Your Personal

    Identification Number (PIN) The PIN is one method used by banks and phonecompanies to protect your account fromunauthorized access. A PIN is a confidential codeissued to the cardholder to permit access to thataccount. Your PIN should be memorized, securedand not given to anyone, not even family membersor bank employees. The fewer people who haveaccess to your PIN, the better.

    Never write your PIN on ATM or long distancecalling cards. Don't write your PIN on a piece ofpaper and place it in your wallet. If your wallet andcare are lost or stolen, someone will have

    everything they need to remove funds from youraccount, make unauthorized debit purchases, or runup your long distance phone bill.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    15/20

    15

    Protect Your ATM Cards

    An ATM card should be treated as thoughtit were cash. Avoid providing card andaccount information to anyone over thetelephone.

    When making a cash withdrawal at anATM, immediately remove the case assoon as the machine releases it. Put thecase in your pocket and wait until you are in

    a secure location before counting it. Neveruse an ATM in an isolated area or wherepeople are loitering.

    Be sure to take your receipt to record transactionsand match them against monthly statements.Dishonest people can use your receipt to get youraccount number. Never leave the receipt at thesite.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    16/20

    16

    TROUBLE SHOOTINGEYE automatically discover

    SNMP enabled devices, application

    servers and applications.

    EYE has up-to-date and accurateend-to-end visibility on whats

    happening on your infrastructure

  • 8/2/2019 Bhavani - Bhoj Reddy College

    17/20

    15/03/11 17

    NETWORK OF TROUBLE SHOOTING

  • 8/2/2019 Bhavani - Bhoj Reddy College

    18/20

    LOSSES FROM CARD SKIMMING

  • 8/2/2019 Bhavani - Bhoj Reddy College

    19/20

    CONCLUSION

    We thus develop an ATM model that is

    more reliable in providing security by usingfacial recognition software.

    By keeping the time elapsed in the

    verification process to a negligible amount

    we even try to maintain the efficiency of

    this ATM system to a greater degree.

  • 8/2/2019 Bhavani - Bhoj Reddy College

    20/20