An ATM With Third Eye The Future’s Technological Innovation
-
Upload
eldad-lieberman -
Category
Business
-
view
788 -
download
2
Transcript of An ATM With Third Eye The Future’s Technological Innovation
An ATM With Third Eye The Future’s
Technological Innovation
1
Outline ATM
ATM WITH AN EYE
ON THE MOST CUSTOMER IS
WHERE IT IS USE
WORKING
TECHNIQUES
HOW IT WORK
PROTECTION
CONCLUSION
REFERENCES
2
3
Automated Teller Machine
An automated teller machine (ATM) is : Computerize telecommunications
Made money transactions easy for customers to bank. Device that provides the customers of a financial
transactions in a public space without the need for a human
clerk or bank teller. Security requiring combination Physical access card+
Password(PIN)
4
Physical Access Card(ATM Card)
1. Card Provider Name : Name of Card Provider like bank or financial institute; for E.g.. ICICI Bank, SBI Bank etc.
2. Card Number : 16 Digit Number. It divided into 4 parts with 4 number.
3. 3D Hologram : Contain 3D Hologram to represent whether it is Visa card or Maestro.
4. Valid From : It contains valid from date, i.e. Contains the card activation date.
5. Valid Thru : It contains valid thru date, i.e. Contains last date for the use of card.
6. Brand Logo : Contains Brand Logo, whether it is Visa or Master.
FIGURE-1
8. Magnetic Strip : Contains Magnetic Strip have special identification
9. Verification Number : Contains Three digit verification number.
10. Signature Panel : Contains
Signature Panel, i.e. Card Holder Signature.
FIGURE-2
5
Password Whether you are on the internet or an online banking
program, you are often required to use a password.
The worst passwords to use are the ones that come to
mind first name, spouse's name, maiden name, pets,
children's name, even street addresses, etc.
The best passwords mix numbers with upper and
lowercase letters. A password that is not found in the
dictionary is even better.
6
Personal Identification Number
PIN is one method used by banks and phone companies
to protect your account from unauthorized access
PIN is a confidential code issued to the cardholder to
permit access to that account
PIN should be memorized, secured and not given to
anyone, not even family members or bank employees
7
The chances of misuse of this much hyped 'insecure'
baby product (ATM) are manifold due to the exponential
growth of 'intelligent' criminals day by day.
There is an urgent need for improving security in
banking region. With the advent of ATM though banking
became a lot easier it even became a lot vulnerable.
Provide a cordless, password-free way to get their money
out of an ATM
An ATM With An Eye
8
9
How It Work
A camera based in ash machine will Detect the pattern in second Compare it with one store in a central
computer. Or encode on to the cash card.A sensor system examines the randomly
Formed features of the iris of the eye as unique as a fingerprint.
Where It Used
The development of such a system would serve to protect consumers financial institutions alike from fraud other breaches of security.
FIGURE-3
10
Camera Installation On ATMMachine
FIGURE-4 11
Portrait camera
Camera SnapshotsCash slot(Dispenser) camera
FIGURE-5
12
Iris code generation
FIGURE-6 13
Steps Of Iris Working
14
How you Protect Your Password
Changing your password regularly Memorizing your password. If you do write down the password, keep it at home or
hidden at work. Don't rewrite your password on a
post-it note and stick it on your monitor or hard drive. Web site remember a password for you, don't use it.
Anyone who uses your machine will have automatic
access to information that is password protected.
15
16
Protect Your ATM Cards An ATM card should be treated as thought it were cash.
Avoid providing card and account information to anyone over
the telephone.
When making a cash withdrawal at an ATM, immediately
remove the case as soon as the machine releases it.
Put the case in your pocket and wait until you are in a secure
location before counting it.
Never use an ATM in an isolated area or never leave up
receipt
Be sure to take your receipt to record transactions and match
them against monthly statements.
thanks17