Upload
sathishranjini
View
216
Download
0
Embed Size (px)
Citation preview
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
1/19
ByA L FRE D KI L A M A
&EDI GAR ABITEKANIZA
M ain Supervisor
M r. AL EX TU M WESI GYE
Co-Supervisor
M s. SARA NAN TAGYA
HIGH PROTECTION ATM SYSTEM WITHFINGERPRINT IDENTIFICATION TECHNOLOGY
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
2/19
Introduction/Background
Problem Statement
Justification
Objectives
Methodology
Project scope
Key Results
Analysis of Results
Work doneConclusion
Outline
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
3/19
Automated Teller Machine (ATM)
Introduction
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
4/19
Personal trait that can be used to identify an individual orverify the claimed identity of an individual
Fields of BiometricsFingerprintIrisRetinaFace
VoiceSignature recognition
Intro-Biometrics
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
5/19
Enrollment and verification process of fingerprint
Intro-Fingerprint Authentication
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
6/19
Automated Teller Machine (ATM) fraud
Recent occurrences of ATM fraud include techniques such as shouldersurfing and card skimming
Problem Statement
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
7/19
Justification
ATM Fraud has been in existence since the invention of ATMs
This is becoming more rampant in Uganda of late
http://www.novinite.com/view_news.php?id=146182
http://www.novinite.com/view_news.php?id=146182http://www.novinite.com/view_news.php?id=1461828/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
8/19
Main Objective
To Design a more secure ATM system
Specific Objectives
System Requirements analysis
To develop an ATM Simulator
To configure the fingerprint scanner to capture and store fingerprints
To design a database for storing fingerprint templates, PIN, account numberand holders name
System integration and testing
Objectives
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
9/19
MILESTONE ACTIVITIES DELIVERABLE
MS 1. Requirements Specification
A1.1 Visit STANBIC BANK MakerereBranchA1.2 Understanding systemsrequirements
Status ReportUse case diagram, activity diagramand sequence diagram for use casemodel
MS 2.Research on the available toolsand libraries
A2.1 Acquiring necessary software andhardware
Guiding Material , IDEs, Libraries forFingerprint identification and
verification
MS 3. System Design andimplementation
A3.1 Design of an ATM SimulatorA3.2 fingerprint scanner configurationA3.3 Database development
Working prototype of the ATMsimulator and fingerprint database
MS 4. Testing A4.1 Unit testingA4.2 System testingA4.3 Documentation
Working prototypes and user manual
MS 5. System Integration A5.1 Integration of componentsA5.2 Documentation
High protection ATM System withfingerprint identification and usermanual
Methodology
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
10/19
System Flow Diagram
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
11/19
Project scopeSimulation of the ATM and finger print module
The existing ATM system will not be altered in theimplementation of this system
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
12/19
Key Results.
USB Fingerprint Scanner
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
13/19
Analysis Of Results
Safety of bank customers money
Processing time will increase
Its costly to setup
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
14/19
Areas of Improvement
Finger -Pin
Assign numbers to fingers
Use the fingers in the PIN sequence forverification
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
15/19
Challenges Faced
Finding the Futronic scanner in Uganda store.
Financial institutions considered their systems securityinformation confidential
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
16/19
Work Done
Demo..
http://e/High%20protection%20ATM%20with%20fingerprint/FreeFingerprintVerificationSDK/samples/CSharp/CSharpSample.slnhttp://e/High%20protection%20ATM%20with%20fingerprint/FreeFingerprintVerificationSDK/samples/CSharp/CSharpSample.sln8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
17/19
Conclusion
Much as the system may be costly to the financial
institutions and the time to make a transaction on an ATMmay increase, safety of peoples money should beconsidered a first priority.
8/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
18/19
References
1. Cronin, Mary J. (1997). Banking and Finance on the
Internet 2. http://www.novinite.com/view_news.php?id=146182
3. http://www.bankinfosecurity.com/
http://www.novinite.com/view_news.php?id=146182http://www.bankinfosecurity.com/http://www.bankinfosecurity.com/http://www.bankinfosecurity.com/http://www.bankinfosecurity.com/http://www.bankinfosecurity.com/http://www.bankinfosecurity.com/http://www.bankinfosecurity.com/http://www.bankinfosecurity.com/http://www.bankinfosecurity.com/http://www.novinite.com/view_news.php?id=146182http://www.novinite.com/view_news.php?id=146182http://www.novinite.com/view_news.php?id=146182http://www.novinite.com/view_news.php?id=146182http://www.novinite.com/view_news.php?id=146182http://www.novinite.com/view_news.php?id=146182http://www.novinite.com/view_news.php?id=146182http://www.novinite.com/view_news.php?id=146182http://www.novinite.com/view_news.php?id=146182http://www.novinite.com/view_news.php?id=146182http://www.novinite.com/view_news.php?id=1461828/10/2019 Highprotectionatm Slides 130604063813 Phpapp01
19/19
.