an atm with an eye2 (1).pptx

Upload: hacker4a4

Post on 04-Apr-2018

248 views

Category:

Documents


3 download

TRANSCRIPT

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    1/18

    Guided by

    B. Satya srideviAssistant professor,

    Aditya engineering college.Presented byB.Prakruthi ( 09A91A0456)

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    2/18

    CONTENTS Introduction

    what is ATM

    ATM with an eye

    Where it use Function

    How you protect your password

    Protect Your Personal Identification Number (PIN)

    Protect your ATM cards

    Troubleshooting Network troubleshooting

    Losses from card skimming

    conclusion

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    3/18

    Introduction

    The rise of technology in India has brought into forcemany types of equipments.

    ATM is one such machine which made money

    transactions easy for customers to bank.

    .

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    4/18

    Cont

    This paper proposes the development of a system thatintegrates biometric identification techniques, including

    finger printing, retina scanning, and facial recognition.

    technology into the identity verification process used in

    ATMs

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    5/18

    What is an ATM

    An automated teller machine(ATM) is a computerizedtelecommunications devices that provides the customers

    of a financial institutions with access to financial

    transactions in a public space without the need for a

    human clerk or bank teller.

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    6/18

    ATM with an eye

    There is an urgent need for improving security in banking

    region. With the advent of ATM though banking became a lot

    easier it even became a lot vulnerable.

    The chances of misuse of this much hyped 'insecure' baby

    product (ATM) are manifold due to the exponential growth of

    'intelligent' criminals day by day.

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    7/18

    15/03/11 7

    WHERE IT USE

    The development ofsuch a system would

    serve to protectconsumers and financialinstitutions alike fromfraud and otherbreaches of security.

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    8/18

    Function A camera based in cash

    machine will detect thepattern in second.

    A sensor systemexamines the randomly

    formed features of theiris of the eye as uniqueas a fingerprint

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    9/18

    15/03/11 9

    AN ATM WITH EYE:THE BEST TECHNOLOGY

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    10/18

    How you protect your password

    Changing your password regularly

    Memorizing your password. Don't rewrite your

    password on a post-it note and stick it on yourmonitor or hard drive.

    Web site remember a password for you, don't use it.

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    11/18

    Protect Your Personal

    Identification Number (PIN) The PIN is one method used by banks and phone

    companies to protect your account from

    unauthorized access.

    Never write your PIN on ATM or long distance calling

    cards.

    Don't write your PIN on a piece of paper and place it

    in your wallet.

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    12/18

    Protect your ATM cards Dont tell information about the account to any one over

    the telephone.

    When making cash withdraw at an ATM, immediately

    remove the case as soon as the machine releases it.

    Never use an ATM in an isolated area or where the peopleare loitering.

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    13/18

    Troubleshooting

    EYE automaticeeeeeeeeeeeeellydiscover

    SNMP enabled devictes,

    application end-to-end

    visibility on whats happening

    onnd applications.

    EYE automatically

    discover SNMP enableddevices, application

    servers and applications.

    EYE has up-to-date and

    acurate end-to-end

    visibility on whats

    happening on your

    infrastrcture.

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    14/18

    15/03/11 14

    Network of troublesshooting

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    15/18

    Losses from card skimming

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    16/18

    conclusion We thus develop an ATM model that is more reliable in

    providing security by using facial recognition software.

    By keeping the time elapsed in the verification process to

    a negligible amount we even try to maintain the

    efficiency of this ATM system to a greater degree.

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    17/18

    QUERIES???

  • 7/29/2019 AN ATM WITH AN EYE2 (1).pptx

    18/18