Vous êtes sur la page 1sur 30

Introduction

An automated teller machine (ATM), also known as a cash point (which is a trademark of Lloyds TSB), cash machine or sometimes a hole in the wall in British English, is a computerized telecommunications device that provides the clients of a financial institution with access to financial transactions in a public space without the need for a cashier, human clerk or bank teller. ATMs are known by various other names including ATM machine, automated banking machine, and various regional variants derived from trademarks on ATM systems held by particular banks.

need
Security of money, data is the most important issue in the world today. Our project is based on security of ATM. In this project we will simulate an ATM machine where dynamic computer generated password are provided to user transaction. As soon as user enters account number a new dynamic computer generated password will be sent to users mobile phone on the number which is registered at bank. Using that auto generated password user will b able to login into the account. After completing transaction when user logs out of the account, the password will be automatically destroyed. This way we can have a secure ATM transaction.

Aims and Objectives

Literature Surveyed

Project Language

Front End: Microsoft VB.Net 2005 Back End: Microsoft SQL Server 2005

About Visual Studio

The Microsoft Visual Studio development system is a suite of development tools designed to aid software developerswhether they are novices or seasoned professionalsface complex challenges and create innovative solutions. Every day, software developers break through tough problems to create software that makes a difference in the lives of others. Visual Studio's role is to improve the process of development to make the work of achieving those breakthroughs easier and more satisfying.

How Visual Studio improves the process of development:

Productive
Visual Studio-branded tools continually deliver better ways for software developers to do more with less energy wasted on repetition and drudgery. From efficient code editors, IntelliSense, Wizards, and multiple coding languages in one

integrated development environment (IDE) to high-end application life-cycle management (ALM) products in Microsoft Visual Studio Team System. New versions of Visual Studio keep bringing innovative tools to help developers focus on solving problems, not waste time on minutiae.

Integrated

With Visual Studio, software developers benefit from an integrated product experience that spans tools, servers, and services. Visual Studio products work well togethernot just with one another, but also with other Microsoft software, such as Microsoft server products and the Microsoft Office system.

Comprehensive

Visual Studio offers a choice of tools for all phases of software development development, testing, deployment, integration, and managementand for every kind of developerfrom the novice to the skilled professional. Visual Studio is also engineered to support development across all types of devicesPCs, servers, the Web, and mobile devices.

Reliable

Visual Studio is engineered and tested to be consistently dependable, secure, interoperable, and compatible. Visual Studio offers an unmatched combination of security features, scalability, and interoperability. Although Visual Studio always

incorporates forward-thinking features, it is designed to ensure backwardcompatibility wherever possible.

Visual Studio and the Microsoft Application Platform

The Microsoft Application Platform is a portfolio of technology capabilities, core products, and best practice guidance focused on helping IT and development departments partner with the business to maximize opportunity.

As one of the core products of the Microsoft Application Platform, Visual Studio can help you drive the right business efficiencies, customer connections, and value-added services by providing a single, fully integrated development environment for all types of development, including Microsoft Windows, Microsoft Office, Web, and mobile applications. Use Visual Studio development solutions to give your development team powerful ways to:

* Increase productivity and quality through integrated and familiar tools. * Deploy, secure, and support your critical Web applications and infrastructure. * Reduce costs through better visibility of your development process. * Provide better predictability and planning through integrated process and methodology support.

About VB.Net
Visual Basic.Net is an evolution of the Visual Basic language that is engineered for productively building type-safe and object-oriented applications. Visual Basic enables developers to target Windows, Web, and mobile devices.

About SQL Server


Microsoft SQL Server 2005 is a comprehensive, integrated data management and analysis software that enables organizations to reliably manage mission-critical information and confidently run todays increasingly complex business applications. SQL Server 2005 allows companies to gain greater insight from their business information and achieve faster results for a competitive advantage.

Key Capabilities:
High Availability: Ensure business continuity with the highest levels of system availability through technologies that protect your data against costly human errors and minimize disaster recovery downtime.

Performance and Scalability: Deliver an infrastructure that can grow with your business and has a proven record in handling today's large amounts of data and most critical enterprise workloads.

Security: Provide a secure environment to address privacy and compliance requirements with built-in features that protect your data against unauthorized access. Manageability: Manage your infrastructure with automated diagnostics, tuning, and configuration to reduce operational costs while reducing maintenance and easily managing very large amounts of data. Developer Productivity: Build and deploy critical business-ready applications more quickly by improving developer productivity and reducing project life cycle times. Business Intelligence: Gain deeper insight into your business with integrated, comprehensive analysis and reporting for enhanced decision making.

Existing System
The current existing atm system is based on a four pin static password process. When the user inserts his/her atm card, in the machine, he/she needs to enter his/her permanent four pin password registered at the bank. After the password is been accepted, the user logs in and can make transactions. Once the transaction process is over the user can login again any number of times using the same static four pin password registered at the bank. A detailed process is required to change the current static password in case of any uneven circumstances. Recently, new features are being introduced by certain banks to allow additional privileges such as payments of bills, mobile recharges etc. with the use of atm card.

Problem statement
Since the existing system consists of a static four pin password, its confidentiality being confined only to its authenticated user, is at bay.

5.1 Eavesdropping:Password of a user can be spied upon and can be accessed easily by obtaining the card by faulty means.

5.2 Spoofing:There is a possibility that, when a user enters its password during a transaction process, a hacker fakes as the authorized site and prompts the user to re-enter the password due to a system error. When the user complies with the instruction the hacker stores the data and uses it for his future peccadilloes intentions. This leads to a man-in-the-middle attack.

5.3 Brute-force attack:Using the brute force if we try to crack the current static four pin password it can be done in 9999 attempts, thus weakening the security.

Proposed system

In the proposed system we will simulate an ATM machine where an 8-pin dynamic computer password is being generated and provided to user for every single transaction process. As soon as user enters account number a new dynamic computer generated password will be sent to users mobile phone on the number which is registered at bank. Using that auto generated password user will b able to login into the account. After completing transaction when user logs out of the account, the password will be automatically destroyed. This way we can have a secure ATM transaction. 6.2 Advantages of the proposed system over the old existing system: Since the old system consists of four pin static password eavesdropping is a major issue there. This issue is very efficiently solved in the new system since it uses dynamic generation of passwords Problem of spoofing is eradicated since the dynamic passwords are valid only for a single transaction process.

In simple systems, using brute force we can crack the password in 9999 attempts whereas in the proposed system the same will required 99999999 attempts which is extremely difficult.

7. Scope of system
We have to implement both ATM client and server and simulate the basic transactions of the Automated teller machine. ATM simulator and server project will be divide into two phases. First phase will concentrate on develop the back-end server, the centralization of all of the transactions. Second phase will be developed the front-end ATM. In addition, we have to simulate both the interface and hardware of an ATM. To use ATM, customer place their card into card reader and the customer only need to input the PIN number. The session is started when customer place their cart into card reader and finish when customer press reject button on ATM to get the ATM card back. ATM Client should be able to support both console and graphical interface. In order work, the project should have the reusability, follow the OO principal and keep in mind: close for modification but open for extension.

7.2 The client side consists of following module:7.2.1 Starts Session To start using an ATM, the customer inserts their card. They only need to enter a Personal Identification Number (PIN) for verification after receiving the dynamic password on the registered mobile number. 7.2.2 Check Balance Get the balance of an account. The user can also get a balance of all accounts linked to the card. 7.2.3 Withdraw Cash A customer can withdraw cash from an account. An exchange is required if the currency withdrawn isnt the same as the account

being withdrawn from. If the customer has multiple accounts, the customer is able to choose which account to withdraw from. 7.2.4 Issue Demand Draft The customer can issue a demand draft from with help of atm machine.

7.2.5 Book fixed deposit The current account can be converted into fixed deposit account with the help of atm machine. 7.2.6 Request new chequebook a new cheque book can be issued by the user. 7.2.7 Request cheque status the current status of an issued cheque can be viewed via this module. 7.2.8 Mini statement a printed statement slip is received after every transaction. 7.2.9 Money transfer money can be transferred from one account to another with the help of our atm system. 7.2.10 Recurring deposit activation a recurring deposit. Account can be activated using atm. 7.2.11 Bill payments bills can be paid through atm system. 7.2.12 Finish Session When the customer is finished using the ATM, they can choose to finish their session. The ATM will return their card.

7.3 The admin side consists of the following module


7.3.1

Register account a new acc/user is being registered by the admin at the back
end. 7.3.2

Update account all the transactions of the user are being updated and saved
by the admin. 7.2.3

Delete account account can be deleted on request.


7.3.4 View fixed deposit log the admin keeps the track of the fixed deposit account and on request create new fixed deposit for the user. 7.3.5 View cheque book request - checks any new requests for cheque book. 7.3.6 View Cheque status checks the current status of an issued check. 7.3.7 Bill details processes the payments of bills requested by the user.

Methodology
We are implementing a classical waterfall model to to model our atm simulator

8.2 overview of a waterfall model:

The waterfall model usually includes the following processes:


Problem definatin Feaseability study Requirenments anaysis Design Programming and module testing Integration and system testing Delivery Maintainance

8.3 system development


Preliminary investigation
Feasibility study Main aim : to understand the problem and determine the issues involved and how to tackle them. Technical feasibility: to investigate whether the technology exists to implement the proposed system, or wether it is a practical proposition.

Economic feasibility: if the prosposed system is cost effective or not. that is if benefits do not outweight costs,tis not worth going ahead. Opeartional feasibility: determines if current work practices and
procedures are adequately supported by the new supported by the new system; how change affects the working life of workers.

Requirements specification
A requirement may range from high-level abstract statement of a service or a system constrain to a detailed mathematical function. In this module the basic requirements of the system must be understood such as information domain, function, behavioral requirements of the system. Functional requirements Describe functionality or system services. Depend on the type of software, expected users and type of system where the software is used. The maybe high-level statements on what the system should do. Functional system requirements should describe the system in detail. Non functional requirements These define system properties and constrains.

Maybe more critical then functional requirements as in if they are not met, renders the system useless.

Functional - Transfer money from one account to another - Deposit money into specific account - Withdraw money from an account - Exchange money as an extra step to deal with foreign currency. - Check account balance Non-Functional - Graphic user interface friendly - Database system management

9. Analysis

Minimum Hardware Requirement

Minimum Software Requirement

10. Design details

ATM Client state diagram

Database relationship diagram

11 implementation plan for next semester


We are implementing the first three stages of our model i.e. requirement gather phase n design and analysis phase this semester.

The next stages of coding testing and maintenance will be implemented in the next semester.

12. reference

Vous aimerez peut-être aussi