Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
an atm with an eye
1. AN ATM WITH AN EYE
THE FUTURE’S TECHNOLOGY
MOHD NAZIR SHAKEEL
1
2. Outline
ATM
ATM WITH AN EYE
ON THE MOST CUSTOMER IS
WHERE IT IS USE
WORKING
TECHNIQUES
HOW IT WORK
PROTECTION
CONCLUSION
REFERENCES
2
3. Automated Teller Machine
An automated teller machine (ATM) is :
Computerize telecommunications
Made money transactions easy for customers to bank.
Device that provides the customers of a financial transactions in
a public space without the need for a human clerk or bank teller.
Security requiring combination Physical access card+
Password(PIN)
3
4. 4
Physical Access Card
(ATM Card)
1. Card Provider Name : Name of Card
Provider like bank or financial institute;
for E.g.. ICICI Bank, SBI Bank etc.
2. Card Number : 16 Digit Number. It
divided into 4 parts with 4 number.
3. 3D Hologram : Contain 3D Hologram
to represent whether it is Visa card or
Maestro.
4. Valid From : It contains valid from
date, i.e. Contains the card activation
date.
5. Valid Thru : It contains valid thru
date, i.e. Contains last date for the use of
card.
6. Brand Logo : Contains Brand
FIGURE-1
5. 8. Magnetic Strip : Contains
Magnetic Strip have special
identification
9. Verification Number : Contains
Three digit verification number.
10. Signature Panel : Contains
Signature Panel, i.e. Card Holder
Signature.
FIGURE-2
5
6. Password
Whether you are on the internet or an online banking
program, you are often required to use a password
The worst passwords to use are the ones that come to mind first
name, spouse's name, maiden name, pets, children's name, even
street addresses, etc.
The best passwords mix numbers with upper and lowercase
letters. A password that is not found in the dictionary is even
better.
6
7. Personal Identification Number
(Pin)
PIN is one method used by banks and phone companies to
protect your account from unauthorized access
PIN is a confidential code issued to the cardholder to permit
access to that account
PIN should be memorized, secured and not given to
anyone, not even family members or bank employees
7
8. The chances of misuse of this much hyped 'insecure' baby
product (ATM) are manifold due to the exponential growth of
'intelligent' criminals day by day.
There is an urgent need for improving security in banking
region. With the advent of ATM though banking became a lot
easier it even became a lot vulnerable.
Provide a cordless, password-free way to get their money out of
an ATM
An ATM With An
Eye
8
9. On Most Modern ATM, The
Customer Is
Identified by inserting a plastic ATM card with a magnetic
stripe or a plastic smartcard with a chip, that contains a unique
card number and some security information, such as an
expiration date or cvvc (cvv). Security is provided by : the
customer entering A personal identification number (PIN).
9
10. By forcing the ATM match a live image of a customer’s
face/eye with an image stored in a bank database (associated
with the account number) when the data matches(account
image and stored image) user be considered fully verified
A system can examine just the eyes, or the eyes nose and
mouth, or ears, nose, mouth and eyebrows, and so on.
Working
10
12. How It Work
A camera based in ash machine will
Detect the pattern in second
Compare it with one store in a central computer.
Or encode on to the cash card.
A sensor system examines the randomly
Formed features of the iris of the eye
as unique as a fingerprint.
12
13. Where It Used
The development of such a system would
serve to protect consumers
financial institutions alike from fraud
other breaches of security.
FIGURE-3
13
18. How you protect your password
Changing your password regularly
Memorizing your password.
If you do write down the password, keep it at home or hidden
at work. Don't rewrite your password on a post-it note and
stick it on your monitor or hard drive.
Web site remember a password for you, don't use it. Anyone
who uses your machine will have automatic access to
information that is password protected.
18
19. Protect Your ATM Cards
An ATM card should be treated as thought it were cash.
Avoid providing card and account information to anyone over
the telephone.
When making a cash withdrawal at an ATM, immediately
remove the case as soon as the machine releases it.
Put the case in your pocket and wait until you are in a secure
location before counting it.
Never use an ATM in an isolated area or never leave up
receipt
Be sure to take your receipt to record transactions and match
them against monthly statements.
19
20. Conclusion
We Thus Develop An Atm Model That Is
More reliable in providing security by using facial recognition
software.
By keeping the time elapsed in the verification process to a
negligible amount
Try to maintain the efficiency of this ATM system
20