automated teller machine 1
TRANSCRIPT
-
8/3/2019 Automated Teller Machine 1
1/25
Automated teller machine
INTRODUCTIONS:-
An automated teller machine (ATM) is a machine permitting a
bank's customers to make cash withdrawals and check their account
balances at any time and without the need for a human teller in
public place. Many ATMs also allow people to deposit cash or
cheques, transfer money between their bankaccounts oreven buy
postage stamps.
( Automatic Teller Machine Kiosk)
-
8/3/2019 Automated Teller Machine 1
2/25
Services available through an ATM include:
Make deposits of cash and checks.
Withdraw cash .
Transfer money between accounts.
Obtain account balance
NAMES:-
ATMs are known by a wide variety of names, some of which
being more common in certain countries than others. Some
examples are:
Automated Teller Machine
Automated Banking Machine
ATM Machine sic
Hole-in-the-wall Cash Dispenser
Cash Machine
Robotic Teller
2
-
8/3/2019 Automated Teller Machine 1
3/25
Cashpoint (in the United Kingdom)
Bancomat or Bankomat (particularly in continental Europe)
Geldautomat Germany (Geld = money) Bank machine (in Canada)
MAC machine, or MAC, (for Money Access Center)
(particularly on the East coast in the United States, esp. New Jersey
and Pennsylvania)
HISTORY:-
A mechanical cash dispenser was developed and built by
Luthor George Simjian and installed in 1939 in New York City by
the City Bank of New York, but removed after 6 months due to
lack of customer acceptance.
After that De La Rue developed worlds first electronic
ATM which was installed in Enfield Town in the London Borough
of Enfield, London on June 27, 1967 by Barclays Bank. This
instance of the invention is credited to John
3
-
8/3/2019 Automated Teller Machine 1
4/25
Shepherd-Barron, because he was the chief of the development
group, although various other engineers were awarded patents for
related technologies at the time.
However, the modern networked ATM was in Dollas, Texas, by
Don Witzel in 1968. Wetzel was a department head at anautomated baggage-handling company called Docutel. In 1995 the
Smithsonians National Museum of American History recognized
Docutel and Wetzel as the inventors of the ATM.
In modern ATMs, customers authenticate themselves by using
a plastic card with a magnetic stripe, which encodes the customer's
account number, and by entering a numeric passcode called a PIN
(personal identification number), which may be changed using the
machine. Typically, if the number is entered incorrectly several
times in a row, most ATMs will retain the card as a security
precaution to prevent an unauthorised user from working out the
PIN by pure guesswork.
4
-
8/3/2019 Automated Teller Machine 1
5/25
HARDWARE AND SOFTWARE :-
ATMs contain secure crypto-processors, generally within an
IBM PC compatible host computer in a secure enclosure. The
security of the machine relies mostly on the integrity of the secure
cryptoprocessor: the host software often runs on a commodity
operating system.
In store ATMs typically connect directly to their ATMTransaction Processor via a modem over a dedicated telephone line,
although the move towards Internet connections is under way.
Along with the move to the internet, ATMs are moving away from
custom circut boards (most of which are based on Intel 8086
Architecture) and into full fledged PCs with commercial operatingsystems like Windows 2000 and Linux. A good example of that is
Banrisul, the largest bank in the South of Brazil, which has replaced
the MS-DOS operating systems in its automatic teller machines
5
-
8/3/2019 Automated Teller Machine 1
6/25
with Linux. Also are used RMX 86, OS/2 and Windows 98 bundled
with Java. The newest use Windows XP or Windows XP
embedded.
PARTS OF THE MACHINE:-
AN ATM HAS TWO OUTPUT DEVICES:-
CARD READER: - The card reader captures the accountinformation stored on the magnetic stripe on the back of an
ATM/debit or credit card. The host processor uses this information
to route the transaction to the cardholders bank.
KEYPAD: - The keypad lets the cardholder tell the bank what
kind of transaction is required (cash withdrawal, balance inquiry,
etc.) and for what amount. Also, the bank requires the cardholder's
personal identification number (PIN) for verification. Federal law
requires that the PIN block be sent to the host processor in
encrypted form.
AN ATM FOUR OUTPUT DEVICES:-
SPEAKER: - The speaker provides the cardholder with
auditory feedback when a key is pressed.
6
-
8/3/2019 Automated Teller Machine 1
7/25
RECEIPT PRINTER: - The receipt printer provides the cardholder
with a paper receipt of the transaction.
DISPLAY SCREEN: - The display screen prompts the
cardholder through each step of the transaction process. Leased-line
machines commonly use a monochrome or color CRT (cathode ray
tube) display. Dial-up machines commonly use a monochrome or
color LCD.
CASH DISPENSER: - The heart of an ATM is the safe and
cash-dispensing mechanism. The entire bottom portion of most
7
-
8/3/2019 Automated Teller Machine 1
8/25
small ATMs is a safe that contains the cash. The cash-dispensing
mechanism has an electric eye that counts each bill as it exits the
dispenser. The bill count and all of the information pertaining to a particular transaction is recorded in a journal. The journal
information is printed out periodically and a hard copy is
maintained by the machine owner for two years. Whenever a
cardholder has a dispute about a transaction, he or she can ask for a
journal printout showing the transaction, and then contact the hostprocessor. If no one is available to provide the journal printout, the
cardholder needs to notify the bank or institution that issued the
card and fill out a form that will be faxed to the host processor. It is
the host processor's responsibility to resolve the dispute.
Besides the electric eye that counts each bill, the cash-
dispensing mechanism also has a sensor that evaluates the
thickness of each bill. If two bills are struck together, then instead
of being dispensed to the cardholder they are diverted to a reject
bin. The same thing happens with a bill that is excessively worn,
torn, or folded.
The number of reject bills is also recorded so that the
mechanism owner can be aware of the quality of bills that are being
8
-
8/3/2019 Automated Teller Machine 1
9/25
loaded into the machine. A high reject rate would indicate a
problem with the bills or with the dispenser mechanism.
NETWORKING:-
Most ATMs are connected to interbank networks, enabling
people to withdraw money from machines not belonging to the
bank where they have their account. (Deposits can only be made at
machines belonging to the bank that has the account.) This is aconvenience, especially for people who are travelling: it is possible
to make withdrawals in places where one's bank has no branches,
and even to withdraw local currency in a foreign country, often at a
better exchange rate than would be available by changing cash.
9
-
8/3/2019 Automated Teller Machine 1
10/25
HOW DO ATM WORK?
INTRODUCTION: - An ATM is simply a data terminal with two input and four
output devices. Like any other data terminal, the ATM has to connect to, and communicate
through, a host processor. The host processor is analogous to an Internet service provider
(ISP) in that it is the gateway through which all the various ATM networks become available
to the cardholder (the person wanting cash).
10
-
8/3/2019 Automated Teller Machine 1
11/25
Most host processors can support either leased-line or dial-up
machines. Leased-line machines connect directly to the host
processor through a four-wire, point-to-point, and dedicatedtelephone line. Dial-up ATMs connect to the host processor
through a normal phone line using a modem and a toll-free number,
or through an Internet service provider using a local access number
dialed by modem.
Leased-line ATMs are preferred for very high-volume locations
because of their thru-put capability, and dial-up ATMs are
preferred for retail merchant locations where cost is a greater factor
than thru-put. The initial cost for a dial-up machine is less than half
that for a leased-line machine. The monthly operating costs for dial-
up are only a fraction of the costs for leased-line. The host
processor may be owned by a bank or financial institution, or it
may be owned by an independent service provider. Bank-owned
processors normally support only bank-owned machines, whereas
the independent processors support merchant-owned machines.
ATM CHARGES:-
11
-
8/3/2019 Automated Teller Machine 1
12/25
Many banks in the USA charge fees for the use of their ATMs by
non-depositors, for withdrawals over the network by their own
customers, or both; however, in the UK strong public reaction soonpersuaded banks not to do this. There is also now a flourishing
business in the United States of placing ATMs in grocery stores,
malls, and other locations other than banks: some of these machines
have signs advertising "low" fees.
RELIABILITY:-
ATMs are generally reliable, but if they do go
wrong customers will be left without cash until the following
morning or whenever they can get to the bank during opening
hours. Of course not all errors are to the detriment of customers;
there have been cases of machines giving out money without
debiting the account or giving out a higher denomination of note by
mistake. Sometims annoying software errors can occur which can
appear as a dialog box on the screen which is imposible to close.
SECURITY:-
Early ATM security focused on making the ATMs
invulnerable to physical attack; they were effectively safes with
12
-
8/3/2019 Automated Teller Machine 1
13/25
dispenser mechanisms. A number of attacks on ATMs resulted,
with thieves attempting to steal entire ATMs by ram-raiding.
Modern ATM physical security concentrates on
denying the use of the money inside the machine to a thief, by
means of techniques such as dye markers and smoke canisters. This
change in emphasis has meant that ATMs are now frequently found
free-standing in places like shops, rather than mounted into walls.
ATM transactions are usually encrypted with DES
but most transaction processors will require the use of the more
secure Triple DES by 2005.
There are also many "phantom withdrawals" from
ATMs, which banks often claim are the result of fraud by
customers. Phantom withdrawals are considered to be a problem
generated by dishonest insiders by most other observers. Ross
Anderson, a leading cryptography researcher, has been involved in
investigating many cases of phantom withdrawals, and has been
responsible for exposing several errors in bank security.
There have also been a number of incidents of fraud
where criminals have used fake machines or have installed fake
13
-
8/3/2019 Automated Teller Machine 1
14/25
keypads or card readers to existing machines. They have used these
to record customers' PIN numbers and bank accounts and have then
used this information to create fake accounts and steal money fromconsumers.
A bank is always liable when a customer's money is stolen from
an ATM, but there have been complaints that banks have made it
difficult to recover money lost in this way.
GENERAL SECURITY:-
Modern ATM physical security concentrates on denying the
use of the money inside the machine to a thief or a fraud using
some fraud detection techniques. Another trend in ATM security is
the fortified cash dispenser is replaced with nothing more than a
paper-tape printer. The customer request a withdrawal from the
machine which dispenses no money but merely prints a receipt. The
customer then takes the receipt to a sales clerk and exchange.
Some ATM system provides the security that if you withdraw
certain amount per day or you deposit ,a prompt on the screen will
ask you to enter your birthday and month to confirm your identity.
By ensuring that you are the real card holder it can reduce the risk
14
-
8/3/2019 Automated Teller Machine 1
15/25
of the frauds. An additional security measure limits the total
amount of ATM withdrawal to some particular amount. This aims
to reduce the amount of fraud withdrawal.
To provide security, ATM system follows three different
mechanisms
1. Time out
2. Invalid card
3. Stolen card
Time out :- The customer may fail to enter the PIN within the
allowed time limit then the card is returned.
Invalid card :- The card is not recognized and it is returned .
Stolen card :- The card is recognized as a stolen card and is
retained by the machine.
DATABASE SECURITY:-
The ATM keeps all the information about the user and users
account inside the centralized database. Inside the database all the
information are stored in the form of tables (objects) which are
15
-
8/3/2019 Automated Teller Machine 1
16/25
more secured than the general file system. The database also
provides locking mechanisms to maintain safety and security of
data.
NETWORK SECURITY :-
The ATM network system provides the following features.
1. Authentication :- The user is the one it claims to be.
2. Confidentiality :- On authorized users can access the
content of the data.
3. Integrity :- The data is not be altered by the third party
during the transmission.
4. Non-repudiation (refuse to access) :- A user cant deny the
fact that it has accessed a service or data.
ADDITIONAL FEATURES :-
1. Verification of identity :- Security system is able to establish
and verify the claimed identity of any actor in an ATM network.
2. Protection of confidentiality :- Stored and communicate data
are confidential.
16
-
8/3/2019 Automated Teller Machine 1
17/25
3. Strong accountability :- The entity cant deny the
responsibility of its performed action as well as their effects.
4. Alarm reporting :- The security system able to generate alarm
notification about certain selected security related events.
5. Audit :- When violations of security happens the system is
able to analyze the data relevant to security.
6. Security recovery :- The security system is able to recover
from successful or attempted failures of security.
PRECAUTIONS TO TAKE:-
INTRODUCTION:-Many banks recommend that you select your own personal
identification number (PIN
). Visa recommends the following PIN tips:
Treat your ATM card like cash. Always keep your card in a
safe place.
Keep your secret code as secret. Dont use date of birth,
address ,phone number as your PIN.
Don't write down your PIN. If you must write it down, do
not store it in your wallet or purse.
17
-
8/3/2019 Automated Teller Machine 1
18/25
Make your PIN a series of letters or numbers that you can
easily remember, but that cannot easily be associated with you
personally. Take your receipt on every ATM transaction. Dont leave it at or near the ATM counter.
Report a lost or stolen card at once.
ATM users should seek out a machine that is located in a
well-lighted area.
Visa also recommends the following tips for safe ATM usage:
Store your ATM card in your purse or wallet, in an area where
it won't get scratched or bent.
Get your card out BEFORE you approach the ATM. You'll be
more vulnerable to attack if you're standing in front of the ATM,
fumbling through your wallet for your card.
Stand directly in front of the ATM keypad when typing in your
PIN. This prevents anyone waiting to use the machine from seeing
your personal information.
After your transaction, take your receipt, card and money
away. Do not stand in front of the machine and count your money.
If you are using a drive-up ATM, get your vehicle as close to
the machine as possible to prevent anyone from coming up to your
18
-
8/3/2019 Automated Teller Machine 1
19/25
window. Also make sure that your doors are locked before you
drive up to the machine.
Do not leave your car running while using a walk-up ATM.Take your keys with you and lock the doors before your
transaction.
If someone or something makes you uncomfortable, cancel
your transaction and leave the machine immediately. Follow up
with your bank to make sure the transaction was cancelled and alertthe bank to any suspicious people.
Many retail merchants close their store at night. It is
strongly recommended that they pull the money out of the machine
when they close, just like they do with their cash registers, and
leave the door to the security compartment wide open like they do
with an empty cash-register drawer. This makes it obvious to any
would-be thief that this is not payday.
For safety reasons, ATM users should seek out a machine
that is located in a well-lighted public place. Federal law requires
that only the last four digits of the cardholder's account number be
printed on the transaction receipt so that when a receipt is left at the
machine location, the account number is secure. However, the entry
19
-
8/3/2019 Automated Teller Machine 1
20/25
of your four-digit personal identification number (PIN) on the
keypad should still be obscured from observation, which can be
done by positioning your hand and body in such a way that the PINentry cannot be recorded by store cameras or store employees. The
cardholder's PIN is not recorded in the journal, but the account
number is. If you protect your PIN, you protect your account.
SOME ATM MANUFACTURERS:-
Diebold
IBM
NCR
Tidel
Triton
Wincor Nixdorf
20
http://www.diebold.com/http://www.ncr.com/http://www.tritonatm.com/http://www.wincor-nixdorf.com/http://www.ncr.com/http://www.tritonatm.com/http://www.wincor-nixdorf.com/http://www.diebold.com/ -
8/3/2019 Automated Teller Machine 1
21/25
Your ATM PIN should be a number that
you could easily remember, but that would
not be readily available to thieves.
NEW INNOVATIONS:-
Several companies are advertising ATMs for the
blind. These machines would be located at kiosks rather than
bank drive-thrus. For several years, the keypads at ATMs were
equipped with braille for the blind or visually impaired.
21
-
8/3/2019 Automated Teller Machine 1
22/25
New innovations in this technology will include machines
that verbally prompt the customers for their card, their PIN and the
type of transaction they would like to make.
An ATM is simply a data terminal with two input and
four output devices. Like any other data terminal, the ATM
has to connect to, and communicate through, a host processor.
The host processor is analogous to an Internet Service Provider
(ISP) in that it is the gateway through which all the various
ATM networks become available to the cardholder ( the person
wanting the cash).
Most host processors can support either leased-line or
dial-up mechanism. Leased-line mechanism connects directlyto the host processor through a four-wire, point-to-point, and
dedicated telephone line. Dial-up ATMs connect to the host
processor through a normal phone line using a modem and a toll-
free number, or through an Internet Service Provider using a
local access number dialed by modem.
Leased-line is preferred for very high-volume locations
because of their thru-put capability, and dial-up ATMs are
22
-
8/3/2019 Automated Teller Machine 1
23/25
preferred for retail merchant locations where cost is a greater
factor than thru-put. The initial cost for a dial-up machine is
less than half that for a leased line machine. The monthly
operating costs for dial-up are only a fraction of the costs
for leased-line.
The host processor may be owned by a bank or financial
institution, or it may be owned by an independent service
provider. Bank-owned processors normally support onl
bank-owned machines, whereas the independent processors
support merchant-owned machines.
CONCLUSION:-
ATM is now introduced so many bank in almost all in the
Globe. The commercial purpose of ATM is now demanding
23
-
8/3/2019 Automated Teller Machine 1
24/25
all among like students, service man, business man and so
general people. Now it also preferred for blind man. Users
are saving from danger like stealing money etc.
Due to its advantages is more than its disadvantage, the
popularity is now increased. From the above thesis, the
advanced future of ATM is almost bright.
REFERECES:-
1. http://www.google.com
2. http://www.wikipedia.com
3. http://www.ibm.com
24
http://www.google.com/http://www.wikipedia.com/http://www.ibm.com/http://www.google.com/http://www.wikipedia.com/http://www.ibm.com/ -
8/3/2019 Automated Teller Machine 1
25/25