78229545-money-pad
Post on 26-Aug-2014
114 Views
Preview:
TRANSCRIPT
MONEY PADTHE FUTURE WALLET
NAME:ANKITA GHOSALREGISTRATION NO:0811017059BRANCH:IT-’C’SEMESTER:7th
SUBMITTED BY:
CONTENTS1. INTRODUCTION TO MONEY PAD2. HISTORY OF MONEY PAD3. WHY MONEY PAD IS KNOWN AS FUTURE WALLET?4. DIMENSION OF MONEY PAD CARD5. CHIPS BEING USED6. DESCRIPTION OF CHIP7. TYPICAL CONFIGURATIONS8. MONEY PAD READERS9. SECURITY MECHANISM10.AN OVERVIEW OF FINGER PRINT RECOGNITION11.ADVANTAGES12.DISADVANTAGES
INTRODUCTION TO MONEY PAD
Money Pad is a form of credit card or smart card similar to floppy disk, which is introduced to provide, secure e-cash transactions.It uses the biometrics technology for Finger Print recognition. The card contains a small, built in microcomputer chip and integrated circuit that can store and process a lot of data.
HISTORY OF MONEY PAD
Money Pad is a method developed by Tobias Wong for binding bills (usually of one or two dollar denominations) so that they can be easily carried around, and torn off the pad whenever needed for payment.
Another type of Money Pad is a futuristic wallet that operates like a credit card or smartcard, automatically verifying the user's identity before issuing cash debits thus providing security.
WHY MONEY PAD IS KNOWN AS THE FUTURE WALLET?
Just as every thing is getting under the shadow of "e" today we have paper currency being replaced by electronic money or e-cash.Electronically initiated debits and credits has become the dominant payment modes in today’s world & there is no need to carry cash in wallet. The purpose is served by MONEY PAD, thus referring it as a WALLET.
TECHNICAL BACKGROUND
DIMENSION OF MONEY PAD CARD
85.6mm x 53.98mm x 0.76mm(defined by ISO 7816)
CHIPS BEING USED
Vcc
RST
CLK
AUX1
GND
SWP
I/O
AUX2
•Vcc - gives the biasing voltage to the smart card.•RST- resets the data stored in the smart card.•CLK- provides the clock signals for the operations.•GND – provides ground as usual.•Vpp –provides the programming voltage to the EEPROM.But now it is not used, because the modern cards are capable of generating programming voltage by itself when comes in contact with a reader.•I/P,O/P- is the input output port.•AUX1/2- are auxiliary contacts, used by USB devices.
DESCRIPTION OF CHIP
•256 bytes to 4KB RAM.•8KB to 32KB ROM.•1KB to 32KB EEPROM.•Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional.8-bit to 16-bit CPU. 8051 based designs are common.•The price of a mid-level chip when produced in bulk is less than US$1.
TYPICAL CONFIGURATIONS
MONEY PAD READERS Computer based readers
Connect through USB or COM (Serial) ports
Dedicated terminalsUsually with a small screen, keypad, printer, often alsohave biometric devices such as thumb print scanner.
SECURITY MECHANISMS
•MONEY PAD USES BIOMETRICS TECHNOLOGY AS A SECURITY MEASURE.MECHANISM: Every time the user wants to access the Money Pad
he has to make an impression of his fingers which will be scanned and matched with the one in the hard disk of data base server.
If the finger print matches with the user's he will be allowed to access and use the Pad other wise the
Money Pad is not accessible. Thus it provides a form of security to the ever-lasting
transaction currency of the future "e-cash."
AN OVERVIEW OF FINGER PRINT RECOGNITION
•Fingerprint identification is also known as dactyloscopy or hand print identification.•It is the analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. •These include three basic patterns of fingerprint ridges are the arch, loop, and whorl. •It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies.
ARCH LOOP WHORL
CONTINUED… •Fingerprint sensors
A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.
The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching.
•Pattern Based AlgorithmMatching algorithms are used to compare previously stored templates of
fingerprints against candidate fingerprints for authentication purposes. Pattern based algorithms/Image based algorithms compare the basic
fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint.
This requires that the images be aligned in the same orientation. To do this, the algorithm finds a central point in the fingerprint image and
centers on that. In a pattern-based algorithm, the template contains the type, size, and
orientation of patterns within the aligned fingerprint image.The candidate fingerprint image is graphically compared with the template
to determine the degree to which they match.
CONTINUED… An efficient fingerprint recognition algorithm is a PHASE BASED IMAGE MATCHING, an image matching technique using the phase components in 2D Discrete Fourier Transforms (DFTs) of given images.The technique has been successfully applied to high accuracy image registration tasks for computer vision applications, where estimation of sub-pixel image translationis a major concern.The principle of phase-based image matching is introduced using the Phase-Only Correlation (POC) function(which is sometimes called the “phase-correlation function”)Consider two N1×N2 images, regitered finger print image f(n1, n2) and input finger print image g(n1, n2), where we assume that the index ranges are n1 =−M1 · · ·M1 (M1 > 0) and n2 = −M2 · · ·M2 (M2 > 0)The proposed algorithm consists of the four steps: I. Core detectionII. Rotation and displacement alignmentIII. Common region extraction and IV. Fingerprint matching.
f(n1,n2) g(n1,n2)
Core Detection Core Detection
Do both images have their core?
Displacement alignment using the cores
Rotation Alignment
Common region extraction
Finger Print Matching
Rotation Alignment
Displacement alignment using the cores
Matching score
NOYES
Flow Diagram For The Proposed Algorithm
1.
2.
3.
4.
HOW DOES IT ALL WORK?
Card is inserted in the terminal
Card gets power. OS boots up. Sends ATR (Answer to reset)
ATR negotiations take place to set up data transfer speeds, capability negotiations etc.
Card verifies finger print. Stores a status “Finger Print
Verified”. Responds “OK”
Card allows personal transactions and responds “OK”
Faster and smarter.Portability.Flexibility(no need to carry separate ATM,Debit,Credit card, pan card or cash etc.).Highly secured.(deactivates on illegal use).Reliability (unaffected by electric and magnetic field).
ADVANTAGES
DISADVANTAGES
ExpensiveIt uses fingerprint detection for security purpose. So if a person’s finger gets accidentally cut or injured, the detection technique will fail to match the patterns.
THANK YOUANY QUERIES?
top related