Vous êtes sur la page 1sur 20

SECURITY SYSTEM FOR ATM BY USING FINGERPRINT AND GSM

by
Suketha

under guidence of Mr. Santosh Hiremath

Introduction
Now-a-days, in the self-service banking system has got extensive popularization with the characteristic offering highquality 24 hours service for customer. However, the financial crime case rises repeatedly in recent years, a lot of criminals tamper with the ATM terminal and steal user's credit card and password by illegal means. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer.

Traditional ATM systems authenticate generally by using the credit card and the password, the method has some defects

The original password authentication method combined with the biometric identification technology verify the clients identity better and achieve the purpose that use of ATM machines improve the safety effectively.
Gives 2 way security authentication process with the help of fingerprint system sends dynamically generated PIN or code to customer mobile number.

THE CHARACTERISTICS OF THE SYSTEM DESIGN


The embedded ATM client authentication system is based on fingerprint recognition. The S3C2440 chip is used as core of embedded system. The fingerprint is the easiest something you are characteristic to capture and process. The primary functions are shown as follows: Fingerprint recognition: Remote authentication: Message alarming: Two discriminate analysis method:

HARDWARE DESIGN AND SOFTWARE DESIGN


The design of entire system consisted of two part which are hardware and software. Hardware Design There are some modules consisted of the system as follows: 1. LCD module: The OMAP5910 is used in this module as a LCD controller. 2. keyboard module: It can be used for inputting passwords. 3. SRAM and FLASH: Their functions are storing the code and the information of fingerprint. 4. Fingerprint recognition module: AT77CI04B be used as a fingerprint recognition. 5. Ethernet switch controller: which can connect police network and remote fingerprint data server

The block diagram of hardware

Software Design:
2 modes: 1.Admin mode 2.User mode

The overall flow chart of software

WORKING PHASES OF THE SYSTEM


The proposed system design involves two phases namely: registration phase and verification phase. 1) Registration phase- the objective of this process is to create the profile of the user. This process is carried out by the administrator of the system. The process consists of the following two steps: Sample Capture- the users fingerprint sample is captured by placing a finger on a fingerprint reader. Conversion and Encryption- the individual measurements and data points are converted to a mathematical algorithm and encrypted

2.Identification and verification process- once the individual has been enrolled in a system he/she can start the use of biometric technology to have access to his account via the ATM machine to authorize transaction.

Identification- The user provides a biometric sample and the system looks at all user templates in the database. Verification- it is one to one match requiring the user provides identification such as PIN and valid ATM card in addition to the biometric sample

FINGERPRINT RECOGNITION PROCESS


These include patterns, which are aggregate characteristics of ridges, and minutia points.

Patterns The three basic patterns of fingerprint ridges are the arch, loop, and whorl:

Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side.

Arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.

Whorl: Ridges form circularly around a central point on the finger

Fingerprint processing has three primary functions: enroll, search, and verify. Enrollment: acquires a fingerprint image from the sensor and saves it . Search compares a raw candidate image to a list of previously enrolled templates. Verification validates a users identity by comparing a raw candidate image to a previously enrolled template via real-time algorithms

The design of fingerprint recognition algorithm


The fingerprint recognition algorithm is composed of two main technologies: image processing technology matching algorithm technology

GSM
Global System for Mobile Communications ( GSM: originally from Group Special Mobile) is the most popular standard for mobile phones in the world. GSM uses a variation of Time Division Multiple Access(TDMA) GSM is the most widely used in digital wireless telephone technologies It operates at either the 900 MHz or 1,800 MHz frequency band.

CONCLUSION
The Implementation of ATM security by using fingerprint recognition and GSM MODEM took advantages of the stability and reliability of fingerprint characteristics The system also contains the original verifying methods which was inputting owner's password which is send by the controller. The security features were enhanced largely for the stability and reliability of owner recognition. The whole system was build on the technology of embedded system which makes the system more safe, reliable and easy to use.

REFERENCES
[1] S.S, Das and J. Debbarma, Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian e-banking System, International Journal of Information and Communication Technology Research, vol.1, no. 5, pp.197-203, 2011. [2] P.KRISHNAMURTHY, MR. M. M REDDDY, 2012. Implementation of ATM Security by Using Fingerprint Recognition and GSM

THANK YOU

Vous aimerez peut-être aussi