Académique Documents
Professionnel Documents
Culture Documents
by
Suketha
Introduction
Now-a-days, in the self-service banking system has got extensive popularization with the characteristic offering highquality 24 hours service for customer. However, the financial crime case rises repeatedly in recent years, a lot of criminals tamper with the ATM terminal and steal user's credit card and password by illegal means. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer.
Traditional ATM systems authenticate generally by using the credit card and the password, the method has some defects
The original password authentication method combined with the biometric identification technology verify the clients identity better and achieve the purpose that use of ATM machines improve the safety effectively.
Gives 2 way security authentication process with the help of fingerprint system sends dynamically generated PIN or code to customer mobile number.
The embedded ATM client authentication system is based on fingerprint recognition. The S3C2440 chip is used as core of embedded system. The fingerprint is the easiest something you are characteristic to capture and process. The primary functions are shown as follows: Fingerprint recognition: Remote authentication: Message alarming: Two discriminate analysis method:
Software Design:
2 modes: 1.Admin mode 2.User mode
2.Identification and verification process- once the individual has been enrolled in a system he/she can start the use of biometric technology to have access to his account via the ATM machine to authorize transaction.
Identification- The user provides a biometric sample and the system looks at all user templates in the database. Verification- it is one to one match requiring the user provides identification such as PIN and valid ATM card in addition to the biometric sample
Patterns The three basic patterns of fingerprint ridges are the arch, loop, and whorl:
Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side.
Arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.
Fingerprint processing has three primary functions: enroll, search, and verify. Enrollment: acquires a fingerprint image from the sensor and saves it . Search compares a raw candidate image to a list of previously enrolled templates. Verification validates a users identity by comparing a raw candidate image to a previously enrolled template via real-time algorithms
GSM
Global System for Mobile Communications ( GSM: originally from Group Special Mobile) is the most popular standard for mobile phones in the world. GSM uses a variation of Time Division Multiple Access(TDMA) GSM is the most widely used in digital wireless telephone technologies It operates at either the 900 MHz or 1,800 MHz frequency band.
CONCLUSION
The Implementation of ATM security by using fingerprint recognition and GSM MODEM took advantages of the stability and reliability of fingerprint characteristics The system also contains the original verifying methods which was inputting owner's password which is send by the controller. The security features were enhanced largely for the stability and reliability of owner recognition. The whole system was build on the technology of embedded system which makes the system more safe, reliable and easy to use.
REFERENCES
[1] S.S, Das and J. Debbarma, Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian e-banking System, International Journal of Information and Communication Technology Research, vol.1, no. 5, pp.197-203, 2011. [2] P.KRISHNAMURTHY, MR. M. M REDDDY, 2012. Implementation of ATM Security by Using Fingerprint Recognition and GSM
THANK YOU