Preview

Cardless Atm

Powerful Essays
Open Document
Open Document
2555 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cardless Atm
CARDLESS ATM
“You are the Cash card”

ABSTRACT:
Over the past three decades, consumers have been largely depending on and trust the Automatic Teller Machine (ATM) to conveniently meet their banking needs. However, despite the numerous advantages of ATM system, ATM fraud has recently become more widespread.
In this paper, we provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates recommended approaches to prevent these types of frauds. In particular we develop a prototype model for the utilization of biometrics equipped ATM to provide security solution against must of the well-known breaches. To ensure that such security approach will be accepted by the majority of users. And we hope that, this Paper will provide Secure Transactions.
Keyword(s): ATM, ATM Fraud, Biometrics, Fingerprint Verification.

CONTENTS 1. Introduction of ATM. 2. History of ATM. 3. ATM Architecture. 4. Workflow of ATM. 5. Hardware Requirements. 6. Software Requirements. 7. Algorithms used in ATM. -Financial Networks. 8. Type of ATM Impostures. 9. Introduction of Biometrics. 10. Types of Biometrics. 11. Cardless ATM. 11.1 Design Stages. 11.2 Main menu. 11.3 Cardless ATM Workflow -Data Storage - Security 12. Difference between other Cardless ATM Models. 13. Advantages 14. Disadvantages 15. Conclusion. 16. References.
Introduction of ATM: [pic]
Fig: ATM Machine
Automated Teller Machine is known as ATM. A station that allows customers to enter their own transactions using cash cards as identification. The ATM interacts with the customer to gather transaction information sends the transaction information to



References: 1. Net World Alliance, “Timeline: The ATM 's history”, 2003. 2. "ATMs to operate without a card" BBC News. June 12, 2012. 3. M. Bond and P. Zielinski, “Decimalization table attacks for PIN Cracking”, Technical report, Computer Laboratory, University of Cambridge, 2003. 4. B. Luca, S. Bistarelli, S. &A. Vaccarelli, “Biometrics authentication with smartcard”, IIT TR-08/2002, Retrieved October,9, 2009. 5. “Global ATM Market and Forecasts to 2013”, Retrieved May7, 2010. Japan Web Japan, 2005-05-10.

You May Also Find These Documents Helpful

  • Good Essays

    The three main threats that face the banking industry are; Organized crime targeting financial institutions, Assault on Authentication, Malware. There are other threats that financial institutions are facing such as; Increased insider threat, Mobile Banking Attacks, and Telephone based fraud. The banking industry is facing more and more threats each day as they become more and more dependent on electronic media, this includes mobile banking, web based banking, atm machines, and any kind of information system that the bank is using. With the rise in technology and banking adapting to the technology banks become vulnerable and constantly have to keep up to date on all security measures and sometimes even invent new ways of protecting the banks data as well as its customers data.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Use Cases

    • 1184 Words
    • 5 Pages

    In this use case the basic flow of events consists of the following: (1) the use case begins when bank customer inserts their bank card; (2) Use Case: Validate User is performed; (3) The ATM displays the different alternatives that are available on this unit. In this case the Bank Customer always selects “Withdraw Cash”; (4) the ATM prompts for an account; (5) the bank customer selects an account; (6) the ATM prompts for an amount: (7) the bank customer enters an amount;(8) card id, pin, amount and account is sent to Bank as a transaction. The Bank Consortium replies with a go/no go reply telling if the transaction is ok; (9) then money is dispensed; (10) the bank card is returned; (11) the receipt is printed; and finally (12) the use case ends successfully.…

    • 1184 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The task of these machines is to learn what each customer wants to do with their money and, to the extent that it is possible, act on what the customer wants (for example, ATMs can hand out cash). Customers can always know how much money they have in their accounts, and they are confident that the numbers they see in their bank statements and on their computer screens accurately reflect the number of dollars that they can get from the bank on demand. They can be so sure of this that they can accept those numbers in the same way they accept paper banknotes (this is similar to the way people started accepting paper dollars when they had been accepting gold or…

    • 796 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The increasing popularity of online shopping, automated teller machines (ATMs), online banking, point-of-sale terminals, telephone bill payments, and many other monetary devices that use the internet created major security issues. The threat of identity theft, stolen banking information, and other personal information was cause for major concern. With these threats looming, the Electronic Fund Transfer Act (EFTA) was created to protect people who were entering a new age of technology. This act protects people while using access devices. According to The Federal Reserve (2008), an “Access device is a card, code, or other means of access to a consumer’s account or a combination used by the consumer to initiate EFTs. Access devised include debit cards, personal…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Even if you are not a Bank of America customer, you have probably used some bank’s ATM system and/or online banking services. The following instructions require you to consider the business processes delivered to you as a consumer of banking services via an ATM and to help you explore the underlying information management requirements of an ATM system.…

    • 657 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Information technology advances in order to keep up with the demands of the modern world. One such way, is the availability to access money from automated tellers and point of sale terminals. “Congress implemented the Electronic Funds Transfer Act in 1978 to establish the basic rights, liabilities and responsibilities of consumers who use electronic funds services and financial institutions who offer those services.” (FDIC, 2006). This law protects an individual consumer’s privacy by ensuring the financial institution protects the digital data it is storing and that it does not disseminate that information to the wrong individual. The financial institution must ensure it receives and authentic information from the consumer and accurately transfer the information into the computer system. “The ETA also identifies error resolution and limits liability for any unauthorized transactions “(FDIC, 2006).…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Credit Card Fraud

    • 729 Words
    • 3 Pages

    Credit Card Fraud is one of the biggest threats to business establishments today. Originally, credit cards simply carried raised numbers that were transferred to a carbon copy with a card-swiping machine. The merchant simply accepted any card presented. Spending limits and printed lists of lost/stolen cards were ineffective in preventing fraud and other financial losses. Merchants were required to telephone a transaction authorization center to get pre-approval of the transaction. The volume of telephone traffic grew too great, and more automated authorization systems allowed faster, easier, and verified transactions. Magnetic stripes on the backs of these payment cards started to appear and that allowed computers to be used at both ends of the call.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    One of the most reasons for people not using mobile banking is the security concern. So how to improve security on people’s mobile devices has become a very important thing. They can make an external device for their mobile banking. The external device can insert into the headphone jack on smartphone. After the connection, customer should slide their card, and then system will be prompted to enter some personal authentication information, and then will send a message for their smartphone to get the verification code before use the mobile banking to do their account activities. Customer can get this external device for free if…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    ➢ Augmented security: The reliable rejection of imposters, who might attempt to gain access either by stealing or forging cards or by guessing or fraudulently obtaining passwords, becomes possible.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    ATM transactions are a risk for "micro-structuring" which is the same as structuring, except that it is done at a much smaller level. Instead of taking $18,000 and breaking it into two deposits, the micro-structurer might break it into 20 deposits of approximately $900 each. This level of structuring makes it extremely difficult to detect.…

    • 530 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A requirements document specifies the purpose of the ATM system and what it must do. Requirements Document A local bank intends to install a new automated teller machine (ATM) to allow users (i.e., bank customers) to perform basic transactions Each user can have only one account at the bank. ATM users…

    • 2544 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Palm Vein Technology

    • 256 Words
    • 2 Pages

    a challenge. To help deal with this growing problem, Fujitsu has developed a unique biometric security technology that puts access in the palm of your hand and no one else's.. In all these applications, the key to securing your assets and data will be in the palm of your hand. The new technology has many potential applications such as an ultra secure system for ATMs and banking transactions, server log in system, an authorization system for front doors, schools, hospital wards, storage areas, and high security areas in airports, and even facilitating library lending, doing away with the age-old library card…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Atm Security

    • 1308 Words
    • 6 Pages

    • Most of the issues affecting ATM security in Africa have to do with card fraud and security breaches…

    • 1308 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    ICT past paper

    • 981 Words
    • 4 Pages

    The number of marks is given in brackets [ ] at the end of each question or part question.…

    • 981 Words
    • 4 Pages
    Powerful Essays

Related Topics