0% found this document useful (0 votes)
26 views20 pages

An ATM With An EYE

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views20 pages

An ATM With An EYE

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 20

AN ATM WITH AN EYE

THE FUTURE,S TECHNOLOGY

www.pptseminars.com
What is technology
Efficiently technology is the
technical means people use to
improve their surrounding. It is
also the knowledge of using the
tools and machines to do tasks.
Automated teller machine
An automated teller machine (ATM) is a
computerized telecommunications
device that provides the customers of a
financial institution with access to
financial transactions in a public space
without the need for a human clerk or
bank teller.
On most modern ATMs, the customer is
identified by inserting a plastic ATM
card with a magnetic stripe or a plastic
smartcard with a chip, that contains a
unique card number and some security
information, such as an expiration date
or CVVC (CVV). Security is provided by
the customer entering a personal
identification number (PIN).
An ATM With An Eye
There is an urgent need for improving
security in banking region. With the
advent of ATM though banking became a
lot easier it even became a lot vulnerable.
 The chances of misuse of this much
hyped 'insecure' baby product (ATM) are
manifold due to the exponential growth of
'intelligent' criminals day by day.

15/03/11 4
WHERE IT USE
The
development
of such a
system would
serve to
protect
consumers
and financial
institutions
alike from
fraud and
other
breaches of
15/03/11 5

security.
How It Works
 The progress has been made in
biometric identification
techniques, including finger
printing, retina scanning, and
facial recognition
 This paper proposes the
development of a system that
integrates facial recognition
technology into the identity
verification process used in ATMs
15/03/11 6
HOW IT WORK
A camera based in cash machine will
detect the pattren in second. and
compare it with one store in a central
computer.
Or encode on to the cash card.
A sensar system examines the randomly
formed features of the iris of the eye .
as unique as a fingerprint.
FUNCTION

15/03/11 8
AN ATM WITH EYE:THE BEST TECHNOLOGY

15/03/11 9
Protecting Your Privacy: Keeping an
Eye on Your Private Information.
E-mail, the Internet, automated teller
machines (ATM), computer banking.
long distance carriers, even credit cards
make our lives more efficient.
keeping our private information confidential.
Electronic transactions can leave you
vulnerable to fraud and other crimes.

15/03/11 10
A Word On Passwords
Whether you are on the Internet or an online
banking program, you are often required to use
a password

The worst passwords to use are the ones that


come to mind first -- name, spouse's name,
maiden name, pets, children's name, even
street addresses, etc.

The best passwords mix numbers with upper


and lowercase letters. A password that is not
found in the dictionary is even better

15/03/11 11
How you protect your password
• Changing your password regularly
• Memorizing your password.
If you do write down the password, keep it at
home or hidden at work. Don't rewrite your
password on a post-it note and stick it on your
monitor or hard drive.
• Web site remember a password for you, don't
use it. Anyone who uses your machine will have
automatic access to information that is password
protected.

15/03/11 12
Protect Your Personal
Identification Number (PIN)
• The PIN is one method used by banks and phone
companies to protect your account from
unauthorized access. A PIN is a confidential code
issued to the cardholder to permit access to that
account. Your PIN should be memorized, secured
and not given to anyone, not even family members
or bank employees. The fewer people who have
access to your PIN, the better.
• Never write your PIN on ATM or long distance
calling cards. Don't write your PIN on a piece of
paper and place it in your wallet. If your wallet and
care are lost or stolen, someone will have
everything they need to remove funds from your
account, make unauthorized debit purchases, or run
up your long distance phone bill.
15/03/11 13
Protect Your ATM Cards
 An ATM card should be treated as thought
it were cash. Avoid providing card and
account information to anyone over the
telephone.
 When making a cash withdrawal at an
ATM, immediately remove the case as
soon as the machine releases it. Put the
case in your pocket and wait until you are in
a secure location before counting it. Never
use an ATM in an isolated area or where
people are loitering.
 Be sure to take your receipt to record transactions
and match them against monthly statements.
Dishonest people can use your receipt to get your
account number. Never leave the receipt at the
site.
15/03/11 14
Troubleshooting
EYE automatically discover
SNMP enabled devices,
application servers
and applications.
EYE has up-to-date and
accurate end-to-end
visibility on what’s
15/03/11 happening on your 15

infrastructure.
Network of troublesshooting

15/03/11 16
Losses from card skimming
CONCLUSION

We thus develop an ATM model that is


more reliable in providing security by using
facial recognition software. By keeping the
time elapsed in the verification process
to a negligible amount we even try to
maintain the efficiency of this ATM system
to a greater degree.
www.pptseminars.com

www.pptseminars.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy