Biometrics in Atm Machine: RD RD

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

BIOMETRICS IN ATM MACHINE

ABSTRACT SUBMITTED BY-


1)G.PRAVEEN KUMAR(3RD YEAR CSE)
2)H.DHEERAJKHANNA(3RD YEAR CSE)
INTRODUCTION-
Biometrics refers to
metrics related to human characteristics.
Biometrics authentication (or realistic
authentication) is used in computer
science as a form of identification
and access control. It is also used to
identify individuals in groups that are
under surveillance.An ATM expanded as
automated teller machine.An automated
teller machine, also known as
an automatic teller machine), automated
banking, cash machine (British
English), cashpoint, cashline, minibank
or bankomat is an electronic
telecommunications device that enables
the customers of a financial
institution to perform financial
transactions, particularly cash
withdrawal, without the need for a
human cashier, clerk or bank teller.
ATM Transactions in India-
Though the digital
transactions such as online
banking ,mobile wallets have
developed to a certain extent the
ATM too plays an important role.It is
used in various banking
processes(along with cash
withdrawal).Availability of ATM
machines in every nukes and corners
of India have made transactions
easy(Compared to olden
methods),But also has too many risks.

ATM Frauds-
Card swapping
 When a customer visits a
merchant establishment, a
restaurant or a petrol station and
uses his/her debit card for
transaction, the attendant
(fraudster) notes down the ATM PIN
when it is keyed in by the customer.
 Later, while returning the card
to the customer, the attendant
swaps the customer’s card with a
dummy card that is identical to the
customer’s card. Since the customer
is unaware of the swapping, he
secures the dummy card whereas
the fraudster gets both the card and
the PIN which he uses to withdraw
cash till the card is blocked by the
customer(ref-Article by Sandeep
Singh in Hindustan times
 MORPHING OF KEYS
 Also morphing
of keys is also major threat for our
transactions.
 As shown in our
background image the duplicate key
board resembling to key board keys.
 Though there
are cctv cameras installed every
where bypassing them is not difficult
for trained black hats
Aim of our project-

 Addressing the issues given above


is a main concern of us.
 An ATM system architecture is
distributed architecture
 It is connected with different
servers.

Finger print identification-


 The Finger print passwords
are found to be a major
development in latest technologies
 Even the smartphones we use in our
day-to-day life has finger print
security
 Bye passing them is too difficult.
 To leave the intruders in the state of
dilemma and making their job too
complex certain security measures
are need to be upgraded
 Installing a finger print identification
along with current architecture may
leave hackers in a dilemma
Method of verification-
 A small camera is fixed in
ATM machine .The user is prompted
to stand in front of the camera.
 After the user enters the ATM card
the user’s picture is captured in
camera.
 After this the user is prompted to
enter his/her fingerprint.
 As soon as the finger print is
detected then the server is made to
Access the Aadhaar(unique
identification) database and
compares the user data and
Authentication is given.
 The Aadhaar is the unique
identification card given to Indian
citizens
 It has all details of a person along
with his finger print and photo.
 If the Aadhaar is connected with
bank account then the customer
verification is done easily

You might also like