Académique Documents
Professionnel Documents
Culture Documents
ABSTRACT
Security measures at banks can play a critical, contributory role in preventing attacks on
customers. These measures are of paramount importance when considering vulnerabilities and
causation in civil litigation. Banks must meet certain standards in order to ensure a safe and
secure banking environment for their customers. This paper focuses on vulnerabilities and the
increasing wave of criminal activities occurring at Automated Teller Machines (ATMs) where
quick cash is the prime target for criminals rather than at banks themselves. A biometric and
GSM measure as a means of enhancing the security has emerged from the discourse.
CHAPTERONE
INTRODUCTION
1.1
Automated teller machine is a mechanical device that has its roots embedded in the accounts and
records of a banking institution. It is a machine that allows the banks customers carry out
banking
transactions
like,
deposits,
transfers,
balance
enquiries,
and
withdrawal.
Notwithstanding, we lived in a world where people no longer want to encounter long queues for
any reason, they dont not want to wait on queue for too long a time before they are attended to
and this has led to the increasing services being rendered by banks to further improve the
convenience of banking through the means of electronic banking. On this note the advent of
ATM is imperative, although with its own flaws. Crime at ATMs has become a nationwide issue
that faces not only customers, but also bank operators. Security measures at banks can play a
critical, contributory role in preventing attacks on customers. These measures are of paramount
importance when considering vulnerabilities and causation in civil litigation and banks must
meet certain standards in order to ensure a safe and secure banking environment for their
customers. Basically, the ATM scam involves thieves putting a thin, clear, rigid plastic sleeve
into the ATM card slot. When you insert your card, the machine can't read the strip, so it keeps
asking you to re-enter your PIN number. Meanwhile, someone behind you watches as you tap in
your number. Eventually you give up, thinking the machine has swallowed your card and you
walk away. The thieves then remove the plastic sleeve complete with card, and empty your
account. The way to avoid this is to run your finger along the card slot before you put your card
in. The sleeve has a couple of tiny prongs that the thieves need to get the sleeve out of the slot,
and you'll be able to feel them. The primary focus of this work is on developing a biometric
strategy (Fingerprint) and GSM to enhance the security features of the ATM for effective
banking transaction.
1.2
In recent years, in line with global trends, the banking sector has faced rising levels of cash card
fraud resulting in the subsequent illegal withdrawal of funds from customer accounts. The
account-holder is normally held responsible for the loss of funds from their accounts and, as
such, the impact of this fraud could be potentially far-reaching. As a result of this, the banking
sector has to embrace biometrics as the solution to the growing problem of counterfeit ATM
cards and ID theft. Among others include
1. Fraudulent card readers, called skimmers are placed over the authentic reader to transfer
numbers and codes to nearby thieves.
2. Spy cameras are also used by password voyeurs to collect access codes.
3. In cases of card lost, if the loss is not noticed immediately, consumers may loose all
funds in an account.
4. If you forget your pin number, you cannot use the card.
5. The machine can retain your card when the machine malfunctions, when you forget your
secret number or if the card is damaged.
1.3
The aim of this project work is to simulate an embedded fingerprint authentication system, which
is used for ATM security applications. The specific objectives include:
I.
II.
III.
centralized database.
To design a module that will forward 4-digit number to their mobile when the finger print
IV.
reading matches.
To design a module that allows the customer to run his transaction after the system
V.
1.4
This study is on development of a secured ATM System for Nigeria Banks which will be
implemented using the finger print and GSM for securing the ATM System.There is a centralized
database to take care of customers personal and biometric data. The system is designed to query
the database by inputting a user finger print and if it matches with the one in a system it will
generate a 4-digit number that will enable the user to continue with his transactions.
1.5
The current system of passwords and pin numbers needed to access financial services has drawn
a lot of criticism of late due to the increasing incidents of hacking. The system is at the mercy of
hackers, who use the hacked data to draw funds from the victims account. This is where
Biometrics with its foolproof system comes in. some of the reasons for building this system
include:
CHAPTER TWO
LITERATURE REVIEW
2.1
During the 1990s researchers at the Stanford Institute invented ERMA according to Molina
(1990) the Electronic Recording Method of Accounting is a computer processing system. ERMA
began as a project for the bank of America in an effort to computerize the banking industry.
ERMA computerized the manual processing of checks and account management and
automatically updated and posted checking accounts. Because of the historical evolution and
peculiarities, engendered taking into account the model of the European structure of a banking
system, a banking system n two levels has been created; the National Bank of Romania, as the
Central Bank, and the Commercial Banks(Vossen,1991). Considering the role and importance
held by the banks as regards the good operation of the economic agents and the requirements of
all the categories of economic agents in the market economy, as well as of the physical persons
beneficiaries of credits, depositors etc.. The computers security system should be sound enough
to maintain privacy of personal information. But still, we can that computerized banking is really
a boom to the customers in accessing and managing their account effectively, anytime and almost
anywhere. (Lewis, 2001). Recent media attention to information privacy issues has shown that
citizens are increasingly concerned about information privacy and their right to it. Governmental
and other organizations have been collecting data about individuals t an increasing and to many,
alarming rate. The ability to gather so much information on individuals is largely because of
advances in information technology (Renon, 1997).
It is important for managers and professionals to understand the issues surrounding personal
information privacy in order to protect the rights of those from and about whom they collect
data. The speed employed by the computerized banking for executing and confirming the
transactions is faster than the traditional speed of the ATM processing. (Bergstrom, 1994).
2.2
OVERVIEW OF ATM
According to Renon, (1997), an automated teller machine or automatic teller machine, also
known as an automated banking machine (ABM), cash machine, cashpoint, cashline, or
colloquially hole in the wall, is an electronic telecommunications device that enables the
customers of a financial institution to perform financial transactions without the need for a
human cashier, clerk or bank teller.
On most modern ATMs, the customer is identified by inserting a plastic ATM card with a
magnetic stripe or a plastic smart card with a chip that contains a unique card number and some
security information such as an expiration date, name and serial number. Authentication is
provided by the customer entering a personal identification number (PIN).Using an ATM,
customers can access their bank deposit or credit accounts in order to make a variety of
transactions such as cash withdrawals, check balances, transfer money, pay bills or credit mobile
phones. If the currency being withdrawn from the ATM is different from that in which the bank
account is denominated the money will be converted at an official exchange rate. Thus, ATMs
often provide the best possible exchange rates for foreign travelers, and are widely used for this
purpose(Renon, 1997). ATMs may be found in stores and shopping malls. Sometimes, they can
be found in bars or restaurants. Other times, at special events, people may set one up so the
guests can use the machine, like at a fundraiser. People need a debit card or credit card in order
to use an ATM. They will also need to have a Personal Identification Number (PIN), which is a
code that lets them get into their account.There are a number of scams with ATMs. In one scam,
con artists look over the victim's shoulder and find their PIN; this is known as shoulder surfing.
In another, they may install a video camera and get PIN numbers from that way. They then make
cards using the PIN number and account number to be able to use that person's account(Renon,
1997)
2.3
OVERVIEW OF BIOMETRICS
security and to handle failure to enroll situations for some users. Such systems are called
multimodal biometric systems.
According to Bergstrom, (1994). A biometric system is essentially a pattern recognition system
which recognizes a user by determining the authenticity of a specific anatomical or behavioral
characteristic possessed by the user. Several important issues must be considered in designing a
practical biometric system. First, a user must be enrolled in the system so that his biometric
template or reference can be captured. This template is securely stored in a central database or a
smart card issued to the user. The template is used for matching when an individual needs to be
identified. Depending on the context, a biometric system can operate either in a verification
(authentication) or an identification mode.
2.4
MODELS OF BIOMETRICS
Iris Recognition
Charp, S.
(1994), With the integration of digital cameras that could acquire images at
increasingly high resolution and the increase of cell phone computing power, mobile phones
have evolved into networked personal image capture devices, which can perform image
processing tasks on the phone itself and use the result as an additional means of user input and a
source of context data (Charp, S. 1994). this image acquisition and processing capability of
mobile phones could be ideally utilized for mobile iris biometric. Recently, iris recognition
technology has been utilized for the security of mobile phones. As a biometric of high reliability
and accuracy, iris recognition provides high level of security for cellular phone based services for
example bank transaction service via mobile phone. One major challenge of the implementation
10
of iris biometric on mobile phone is the iris image quality, since bad image quality will affect the
entire iris recognition process. Previously, the high quality of iris images was achieved through
special hardware design. For example, the Iris Recognition Technology for Mobile Terminals
software once used existing cameras and target handheld devices with dedicated infrared
cameras (Fluaghter, R. 1990)). To provide more convenient mobile iris recognition, an iris
recognition system in cellular phone only by using built-in mega-pixel camera and software
without additional hardware component was developed (Glass, H. 2000)). Considering the
relatively small CPU processing power of cellular phone, in this system, a new pupil and iris
localization algorithm apt for cellular phone platform was proposed based on detecting dark
pupil and corneal specular reflection by changing brightness & contrast value. Results show that
this algorithm can be used for real-time iris localization for iris recognition in cellular phone.
Voice Recognition
11
that encompasses verification and identification through voice signal processing. The speech
features encompass high-level and low level parts. While the high-level features are related to
dialect, speaker style and emotion state that are not always adopted due to difficulty of
extraction, the low-level features are related to spectrum, which are easy to be extracted and are
always applied to ASR
Face Recognition
Klausmeier, J. (1984), Facial recognition is considered to be one of the most tedious among all
scans. Further, difficulty in acquisition of face and cost of equipments make it more complex.
However, some WAP enabled phones like CX 400K and LG-SD1000 manufactured by LG
electronics, have built in camera that can acquire images and can be transmitted over internet.
This it is sent to the credit card company to verify the face received matches with the face in
their database. If it matches, the goods are sent, else the order is rejected. We in our IMAGE
PROCCESSING LAB took two faces with small differences (you see a small dot in the forehead
of second face) and programmed MATLAB to find the difference between the two.
2.5
Fingerprint biometric has been adopted widely for access control in places requiring high level of
security such as laboratories and military bases. By attaching a fingerprint scanner to the mobile
phone, this biometric could also be utilized for phone related security issues.
2.6
Molina, J.K. (1997), whilst Australian businesses and consumers have embraced electronic
technology, there remains a substantial degree of mistrust in the confidentiality of electronically
12
filed and transferred information and the general security of e-commerce systems. These
businesses and consumers remain reticent in committing financial and private information to
electronic systems because of security issues. The issue of security, however, overlays all the
other issues of structure of commercial computer transactions and associated data transfer,
whether the transfer of funds is involved or not. Security must be of paramount importance in
any transactional based computer system. The dichotomy however, is that due to the very nature
of computers and their programming, it must be accepted that total security is not possible. The
best that can be expected is to approach the issues of security procedures, disaster recovery and
crisis management as part of a commercial risk management program in which the amount you
spend on security follows an assessment of the exposure you have to fraud. The best that can be
done is to try and keep up to date and ahead of the threats.
2.7
IMAGE MATCHING
Olea, J. and Prieto, G. (1999), image matching is a fundamental aspect of many problems in
computer vision, including object or scene recognition, solving for 3D structure from multiple
images, stereo correspondence, and motion tracking. This method describes image features that
have many properties that make them suitable for matching differing images of an object or
scene. The features are invariant to image scaling and rotation, and partially invariant to change
in illumination and 3D camera viewpoint. They are well localized in both the spatial and
frequency domains, reducing the probability of disruption by occlusion, clutter, or noise. Large
numbers of features can be extracted from typical images with efficient algorithms. In addition,
the features are highly distinctive, which allows a single feature to be correctly matched with
high probability against a large database of features, providing a basis for object and scene
recognition. The cost of extracting these features is minimized by taking a cascade filtering
13
approach, in which the more expensive operations are applied only at locations that pass an
initial test.
2.8
Nowadays, shopping through the internet has become very popular and surely, a WAP enabled
mobile phone provides the facilities to consumers to shop online. Credit cards continue to be an
efficient tool for online money transactions. But, on the other hand, credit card's number can be
stolen on its way to its destination and can be misused by hackers. Thus, e-Business through a
mobile phone becomes insecure. Also anti-fraud Software, like those provided by Artic Soft and
ISC, created a back door entry and were largely involved in data spoofing. In addition to this,
many user and companies were prone to the attack of many viruses and Trojan horses. With so
much of problems faced, the service provide turned their attention towards biometrics to prevent
data spoofing and to provide secure e-Transactions
2.9
Sands, W. (1997), there are mainly two kinds of iris recognition attendance management system
on the market. One is on-line iris recognition attendance management sys-tem and the other is
off-line iris recognition attendance management system. On-line system always needs to connect
with a PC or workstation and all the iris recognition templates of people to be verified must be
stored in a database in the PC or workstation. Thereby, matching iris recognition needs the
support of the background PC. This kind of attendance management system is easy to paralyze in
case of malfunctions of iris recognition attendance machines, trans-mission line or PC. Once
several systems connect to form a network, burden of PC and the response time of the system
will be added.
14
By contraries, an off-line iris recognition attendance management system can finish all the
process including capturing the image of iris recognition, extracting minutiae, storing and
matching. All the operating of matching iris recognition needs no sup-port of PC and the burden
of PC is lightened. The same systems can connect to form a 485 network and finally connect to
the center PC of management sys-tem. So off-line systems are widely used in many occasions.
The shortcomings of this system are that there must be a managing PC nearly and it is difficult to
lay the transmission lines where topography is bad. With the development of wireless techniques
such as RFID, GPS, Wi-Fi, Bluetooth etc, many companies manufacture wireless modules. So
we can adopt the wireless techniques to solve the above-mentioned questions. There are mainly
two kinds of iris recognition attendance management system on the market. One is on-line iris
recognition attendance management sys-tem and the other is off-line iris recognition attendance
management system. On-line system always needs to connect with a PC or workstation and all
the iris recognition templates of people to be verified must be stored in a database in the PC or
workstation. Thereby, matching iris recognition needs the support of the background PC. This
kind of attendance management system is easy to paralyze in case of malfunctions of iris
recognition attendance machines, trans-mission line or PC. Once several systems connect to form
a network, burden of PC and the response time of the system will be added.
2.10
15
features found within the patterns. It is also necessary to know the structure and properties of
human skin in order to successfully employ some of the imaging technologies.The three basic
patterns of fingerprint ridges are the arch, loop, and whorl:
Arch: The ridges enter from one side of the finger, rise in the center forming an arc, and
then exit the other side of the finger.
Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same
side.
Scientists have found that family members often share the same general fingerprint patterns,
leading to the belief that these patterns are inherited.
2.11
16
biometric systems. The reader will learn how to avoid common pitfalls,ensure the system meets
user and operator expectations, and deliver the required ROI.Frost & Sullivan intends this paper
to be approachable, informative, andunderstandable to senior executives that want to know more
about what it takesto deploy biometrics in their organizations and reap the benefits of
theirinvestment. It is not a technical cookbook, but rather is a basis for asking questionsand
evaluating design choices to ensure that each fingerprint biometric deploymentproduces the
expected returns from the first day of deployment.
2.12
FINGERPRINT
BIOMETRICS
AS
SOLUTION
TO
IDENTITY
MMANAGEMENT CHALLENGES
In his own rendering Wise, S. and Kingsbury, G. (2000)stated that, fingerprint biometrics
identifies a user in a non-repudiated way. It can enhanceuser convenience, reduce (or even
eliminate) credential management costsand provide user-specific provisioning. Biometric
transactions are auditable andnon-repudiated. As a result of these benefits, many organizations
are adoptingfingerprint biometrics for identity management.A fingerprint is uniqueand copies
can be detected and prevented. This is in sharpcontrast to user IDs and passwords, which can be
easily replicated and usedinstantaneously by sophisticated electronic programs to gain access to
valuableenterprise assets. Combining a credential (i.e., a badge or other token) with apassword is
much more secure. The credential can be perfectly identified with someelectronic means to
detect presence and authenticity.
17
SECTION THREE
METHODOLOGY AND SYSTEM ANALYSIS
3.1
METHODOLOGY
The project methodology can be simply defined as the set of procedure that is followed from the
beginning to the completion of the software development process. The nature of the
methodology is dependent on a number of factors, including the software development
environment, the organizations practices, the nature or type of the software being developed, the
requirements of the users, the qualification and training of the software development team, the
available hardware software resources, the availability of existing design modules, and even the
budget and the time schedule. There are two broad categories of design methodologies used the
systematic and the formal types. As the name imply, the formal type makes extensive use of
mathematical notations for the object transformations and for checking consistencies. The
systematic type is less mathematical and it consists of the procedural component, which
prescribes what action or task to perform and the representation component, which prescribes
how the software structure should be represented.The research methodology is an orderly
manner or steps in which a close and careful study is carried out to find out what type of data is
maintained, its organization, storage and retrieval. The methods adopted for this software
engineering design are;
a. The structured systems analysis and design methodology (SSADM)
18
3.1.1
Structured Systems Analysis and Design Method (SSADM) is a systems approach to the analysis
and design of information systems. SSADM is a model by which an Information system design
can be arrived at. SSADM is one particular implementation which builds on the work of different
schools of structured analysis and development methods. The three most important techniques
that are used in SSADM are:
Stages of SSADM
SSADM involves the application of a sequence of analysis, documentation and design tasks
(Goodland &Riha, 1999). It has the following steps.
a.
Feasibility Study
This is a form of investigation into the goals and implications of state management company in
order to determine whether or not the given project is feasible or not, if the project is technically
possible, financially and socially justifiable, and acceptable to the organization. The project of
this stage is a formal feasibility study document. .
b.
This involves investigation and fact recording to understand the existing system i.e. the
operations of the ATM system and to identify the basic information requirements. This involves
19
knowing how the system operates, problems of the system and volumes of work done by the
system and operating cost. This involves interviewing employees, circulating questionnaires,
observations and reviewing existing documentation about the system under review.
c.
This is done using the outputs of the previous stage to develop a set of business system options.
This stage describes possible new systems in terms of functionality and implementation issues.
This involves developing alternative new system solutions.
d.
Requirements specification
Detailed functional and non-functional requirements are identified and new techniques are
introduced to define the required processing and data structure.
e.
This describes the costs, benefits, and constraints of implementing the specification.
f.
Logical design
This defines how data is processed by theATM System and describes user dialogs. The logical
design specifies the main methods of interaction in terms of menu structures and command
structures. These are the main interfaces with which the user will interact with the system.
g.
Physical design
20
This involves developing user interface structures and implementing logical processes. This is
the final state where all the logical specifications of the system are converted to descriptions of
the system in terms of real hardware and software. The logical data structure is converted into a
physical architecture in terms of database structures.
3.1.2
Object-oriented Analysis and Design (OOAD) software engineering approach models the ATM
System as a group of interacting objects. Each object represents some entity of interest in the
system being modeled, and is characterized by its class, its state (data elements), and its
behavior. The steps to undergo are;
Object-oriented Analysis
Object-oriented analysis (OOA) looks at the problem domain, with the aim of producing a
conceptual model of the information that exists in the area being analyzed. The sources for the
analysis can be a written requirements statement, a formal vision document, and interviews with
stakeholders or other interested parties.
a. Object-oriented Design
The result of object-oriented analysis is used in object-oriented design. This involves a
description of what the system is functionally required to do, in the form of a conceptual model.
These models are as a set of use cases, one or more UML class diagrams, and a number of
interaction diagrams.
b. Object-oriented Implementation
21
This step is involved with defining classes, creating objects, calling operations, implanting
inheritance and association.
3.1.3
Prototyping
Determine basic requirements including the input and output information desired. Details, such
as security, can typically be ignored.
b.
Review
The customers, including end-users, examine the prototype and provide feedback on additions or
changes.
d.
22
Using the feedback both the specifications and the prototype can be improved. Negotiation about
what is within the scope of the contract/product may be necessary. If changes are introduces,
then, repeating developing initial prototype and review may be needed
3.2
INFORMATIONGATHERING
23
whether to perform another transaction, if no the customer will choose whether to collect receipt
for the transaction. When the machine beeps at you, take your card, cash and receipt (if
applicable). You can use the receipt to record the transaction in your check register or passbook.
3.4
With the current upsurge and nefarious activities of Automated Teller Machine (ATM) ranging
from ATM card theft, skimming, pin theft, card reader techniques, pin pad techniques, force
withdrawals and lot more, fraudster is threatening electronic payment system in the nations
banking sector, users are threatening massive dumping of the cards if the unwholesome act is not
checked. In summary:
They are not safe since they are located outside the bankhall.
If one forgets the pin number he or she will not be able to withdraw money from their
accounts.
If one makes mistakes three times in entering the pin number the card will be swallowed
down the machine and it takes time to retrieve it.
3.7
24
Password and PINs have been the most frequently used authentication method. Their use
involves controlling access to a building or a room, securing access to computers, network, the
applications on the personal computers and many more. In some higher security applications,
handheld tokens such as key fobs and smart cards have been deployed. Due to some problems
related to these methods, the suitability and reliability of these authentication technologies have
been questioned especially in this modern world with modern applications. Biometrics offer
some benefits compare to these authentication technologies.
Increased Security
Increased Convenience
One major reason passwords are sometimes kept simple is because they can be easily forgotten.
To increase security, many computer users are mandated to manage several passwords and this
25
increases the tendency to forget them. Card and tokens can be stolen and forgotten as well even
though attaching them to keyholders or chains can reduce the risk. Because biometric
technologies are based on something you are, it makes them almost impossible to forgot or
manage. This characteristic allows biometrics to offer much convenience than other systems
which are based on having to keep possession of cards or remembering several passwords.
Biometrics can greatly simplify the whole process involved in authentication which reduces the
burden on user as well as the system administrator (For PC applications where biometrics
replaces multiple passwords).Biometric authentication also allows for the association of higher
levels of rights and privileges with a successful authentication. Information of high sensitivity
can be made more readily available on a network which is biometrically protected than one
which is password protected. This can increase convenience as a user can access otherwise
protected data without any need of human intervention.
Increased Accountability
Traditional authentication methods such as tokens, passwords and PINs can be shared thereby
increasing the possibility of unaccountable access, even though it might be authorized. Many
organizations share common passwords among administrators for the purpose of facilitating
system administration. Unluckily, because there is uncertainty as to who at a particular point in
time is using the shared password or token, accountability of any action is greatly reduced. Also,
the user of a shared password or token may not be authorized and sharing makes it even hard to
verify, the security (especially confidentiality and integrity) of the system is also
reduced.Increase in security awareness in organizations and the applications being used has led
to the need for strong and reliable auditing and reporting. Deploying biometrics to secure access
26
to computers and other facilities eliminates occurrence such as buddy-punching and therefore
provides a great level of certainty as to who accessed what computer at what point in time.
START
3.9
FLOWCHART
OFATM
THECARD
EXISTING SYSTEM
INSERT
NO
IS PIN CORRECT
?
YES
SELECT TRANSACTION
ANOTHER TRANSACTION
?
?
YES
NO
END
27
3.10
HOME
ATM
NEW PIN
BANKER LOGIN
USERNAME
FINGERPRINT SCAN
PASSWORD
ADD NEW ACCOUNT
DEPOSIT
SMS PORT
28
CHAPTER FOUR
SYSTEM DESIGN
4.1
There is a module that enables the banker/system administrator to take customers details
4.2
SYSTEM SPECIFICATION
This section shows the requirement of the system and what it is supposed to contain for effective
design.
29
4.2.1
4.2.2
It is the specification for the user interface which is also path of the software that the user
interacts with, whether it is for input or output purposes.
4.2.2.1
30
Register
Exit
Place your finger print
C. Account deposit form: this form enables one to deposit money to the system. The
fields here are:
Account number
Amount
Deposit
Exit
D. Banker login form: this form enables the administrator/banker to login to the system.
The fields here are:
Username
Password
Login
Exit
E. Form port: this form handles the Sms sending information in the system. The fields
here are:
Enter your port number
Update
Close
4.2.2.2 Output Form specification
The output form here is the form that shows the details of the input processed by the biometric
atm authentication system. The output form is the transaction page that displays after the system
authentication. The fields here are:
4.2.3
Withdrawal
Balance enquiry
Mtn top up
Ministatement
Cancel
Database Specification
31
There is a database named atm to handle all the details of the finger print ATMsystem. The
database is designed with Microsoft access and incorporated into visual basic 6.0 platform. It has
four tables, we are going to look at the four tables. They includes:
a.
Admin: this table has the information needed for any admin staff to login. The fields
b.
in it includes:
Id
int(11)
Username
varchar(20) null
Password
varchar(20) null
Account: this table contains all the information about all the registered account. the
c.
d.
32
4.2.4
The program module specification describes the specification of what the program would do to
enhance good design guide during the process. As it concerns this particulars application
package, it describes different activities involved in the program modules. The classifications of
the modules are vividly described under the subsections below.
There are total of seven modules in this system specified according to their functions. They
include:
i.
ii.
Home:this module displays the default page of the system anytime a user click on it.
Add new account: this module allows the system administrator/banker to register/add
iii.
iv.
v.
vi.
vii.
authentication.
Sms port: this module is responsible for forwarding messages (4-digit secret number) to
the customers after putting their account number and fingerprint scanning.
4.3
4.3.1
33
This subsection is responsible for contents in the main menu interface. Based on the fulfillment
of this project application package software, the main menu was designed to have a link to all the
form interfaces within the application. The figure below has a descriptive explanatory diagram of
the sketch of the main menu design. Different information that will enable the user, understand
the procedure as well as a guide for the software.
HOME
Input Data
ATM
NEW PIN
BANKER LOGIN
USERNAME
PASSWORD
DISPLAY REPORT
CPU
DEPOSIT
SMS PORT
DATABASE
Output
34
START
NO
IS USERNAME AND PASSWOR CORRECT ?
YES
DISPLAY ADMINISTRATOR AREA
END
35
36
37
38
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATION
5.1
SUMMARY OF ACHIEVEMENTS
Rapid development of banking technology has changed the way banking activities are dealt with.
One banking technology that has impacted positively and negatively to banking activities and
transactions is the advent of automated teller machine (ATM). With an ATM, a customer is able
to conduct several banking activities such as cash withdrawal, money transfer, paying phone and
electricity bills beyond official hours and physical interaction with bank staff. In a nutshell, ATM
provides customers a quick and convenient way to access their bank accounts and to conduct
financial transactions.
The system will generally perform the following function:
There is a module that enables the banker/system administrator to take customers details
5.2
PROBLEMS ENCOUNTERED
39
There was some constraints encountered during collection of data, poor data collection becomes
apparent due to interviewing of banking organizations and their customers. Many of them were
reluctant to disclose important information and statistical data which otherwise would have been
relevant to this research, due to some banking secrets which breeds some indifferent attitudes
towards that effect.It takes a long time and large commitment of resources to get a good result,
unavailability of text and materials on this topic, made gathering of facts very difficult, some of
the facts were gathered from the internet, which is quite expensive.
5.3
The growth in electronic transactions has resulted in a greater demand for fast and accurate user
identification and authentication. Access codes for buildings, banks accounts and computer
systems often use PIN's for identification and security clearances. Conventional method of
identification based on possession of ID cards or exclusive knowledge like a social security
number or a password are not all together reliable. ID cards can be lost, forged or misplaced;
passwords can be forgotten or compromised, but ones biometric is undeniably connected to its
owner. It cannot be borrowed, stolen or easily forged. Using the proper PIN gains access, but the
user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized
user can often come up with the correct personal codes. Despite warning, many people continue
to choose easily guessed PIN's and passwords - birthdays, phone numbers and social security
numbers. Recent cases of identity theft have heightened the need for methods to prove that
someone is truly who he/she claims to be. Biometric authentication technology using fingerprint
identifier may solve this problem since a persons biometric data is undeniably connected to its
owner, is nontransferable and unique for every individual. Biometrics is not only a fascinating
pattern recognition research problem but, if carefully used, could also be an enabling technology
40
with the potential to make our society safer, reduce fraud and lead to user convenience by
broadly providing the following three functionalities (a) positive identification (b) large scale
identification and (c) screening.
REFERENCES
Bergstrom, R. (1994), ATM attached importance and techniques, London: Pitman
publication ltd.
41