You are on page 1of 4

automated teller machine (ATM).

“ATM Security The systems employed at these


places must be fast enough and
Using robust too.
Use of the ATM (Automatic Teller
Fingerprint Machine) that provides clients with
the suitable note

Recognition” commerce is facing a brand new


challenge to hold on the valid
identity to the customer. Since, in
standard identification ways with
Shruti Sarode1 Dipa Fande2 ATM, criminal cases are increasing
creating financial losses to
Abstract customers. For resolution the bugs
of early ones, the author styles a
new ATM terminal client
Identification and verification of a
recognition systems. The chip of
person today is a common and
S3C2440 is used for the core of
crucial thing; which include lock
microchip in ARM9, moreover,
system, safe box and vehicle control
Associate in Having improved
or even at accessing bank accounts
enhancement algorithm of
via Automated teller machine, etc
fingerprint image increase the
which is requisite for securing
security that client use the ATM
personal information. The
machine.. This system can be
traditional methods like ID card
employed at any application with
verification or signature does not
enhanced security because of the
issue perfection and reliability.
uniqueness of fingerprints. It is
Rapid development of banking
convenient due to its low power
technology has changed the way
requirement and portability.
banking activities are dealt with.
One banking technology that has
impacted positively and negatively
to banking activities and
transactions is the advent of
a record of their transaction, to store
Introduction the parts of the machinery requiring
restricted access -Vault , Housing
Biometrics is a technology that for aesthetics, Sensors and
helps to make your data extremely Indicators.
secure, unique all the users by way Fingerprint technology is the most
of their personal physical widely accepted and mature
characteristics. Biometric biometric method and is the easiest
information can be used to perfectly to deploy and for a higher level of
identify people by using their security at your fingertips. It is
fingerprint, face, speech, iris,
simple to install and also it takes
handwriting, or hand geometry and
so on. Using biometric identifiers little time and effort to acquire one’s
offers several advantages over fingerprint with a fingerprint
traditional and current methods. identification device. Thus,
Tokens such as magnetic stripe fingerprint recognition is considered
cards, smart cards and physical among the least intrusive of all
keys, can be stolen, lost, replicated, biometric verification techniques.
or left behind; passwords can be
Ancient times officials used
shared, forgotten, hacked or
accidentally observed by a third thumbprints to seal documents
party . There are two key functions thousands of years ago, and law
offered by a biometric system. One agencies have been using fingerprint
technique is identification and the identification since the late
other is verification. In this paper, 1800s.We here carry the same
we are concentrating on identifying technology on digital platform.
and verifying a user by fingerprint
Although fingerprint images are
recognition. A modern ATM is
typically made up of the devices initially captured, the images are not
like CPU to control the user stored anywhere in the system.
interface and devices related to Instead, the fingerprints are
transaction, Magnetic or Chip card converted to templates from which
reader to identify the customer, PIN the original fingerprints cannot be
Pad, Secure crypto-processor
recreated; hence no misuse of
generally within a secure cover,
Display to be used by the customer system is possible.
for performing the transaction,
Function key buttons, Record
Printer to provide the customer with
Crime at ATM
Crime at ATMs has become a
countrywide issue that faces not
only customers, but also bank hands
and this financial crime case rise
frequently in recent years. A lot of
criminals tamper with the ATM
terminal and steal customers’ card
details by unlawful means. Once
user’ bank card is lost and the
password is pinched, the user’
account is exposed to attack.
Traditional ATM systems validate
generally b using a card (credit,
debit, or smart) and a password or
PIN which no doubt has some
defects. The prevailing practises of
user authentication, which involves
the use of either passwords and user
IDs (identifiers), or identification
cards and PINs (personal
identification numbers), suffer from
several boundaries. Biometrics can
be defined as measurable
physiological and behavioural
characteristic that can be captured
and subsequently compared with
another instance at the time of
verification. It is automated methods
of recognizing a person based on a
physiological or behavioural
characteristic

Software Design
1.www.google.com

Reference

You might also like