INTRODUCTION:
Automated
teller machine
also known as an automated
banking machine (ABM),
is a computerized telecommunications device that enables the clients of a financial institution to perform financial transactions without the need
for a cashier, human clerk or bank teller. Using an ATM,
customers can access their bank accounts in order
to make cash withdrawals, debit
card cash advances, and check their account balances as well as purchase
pre-paid mobile phone credit. Thus, ATMs often
provide one of the best possible official exchange rates for foreign travelers,
and are also widely used for this purpose.
ARCHITECTURE:
An
ATM is typically made up of the following devices:
·
CPU (to
control the user interface and transaction devices)
·
Magnetic and/or Chip card reader
(to identify the customer)
· PIN Pad (similar in layout to a Touch tone or Calculator keypad),
often manufactured as part of a secure enclosure.
·
Secure crypto processor, generally
within a secure enclosure.
·
Display (used by the customer for
performing the transaction)
·
Function key buttons
(usually close to the display) or a Touchscreen
(used to select the various aspects of the transaction)
·
Record Printer (to provide the customer
with a record of their transaction)
·
Vault (to store
the parts of the machinery requiring restricted
access)
·
Housing (for aesthetics and
to attach signage to)
·
Sensors and Indicators
WORKING SYSTEM:
The customer is
identified by inserting a plastic ATM card with
a magnetic stripe or a
plastic smart
card with a chip that
contains a unique card number and some security information such as an
expiration date or CVVC (CVV).
Authentication is provided by the customer entering a personal identification number (PIN).
SECURITY ISSUES
RELATED TO ATM:
Card skimming or card cloning involves the installation of a
magnetic card reader over the real ATM's card slot and the use of a wireless
surveillance camera or a modified digital camera or a false PIN keypad to
observe the user's PIN.
Trapping the card inside of the ATM's card reader which
is referred to as a Lebanese loop. When the customer gets frustrated by not getting the
card back and walks away from the machine, the criminal is able to remove the
card and withdraw cash from the customer's account, using the card and it’s
PIN.
IRIS TECHNOLOGY:
In
order to avoid the above stated security issues in ATM the “Pin-less” ATM card
is introduced. The secret
code used to get money from an ATM is about to get more secure with a code that
we will never forget. Within a couple of months, the banks are ready to
introduce "pin-less" ATM's. ATM lets you get your cash with the blink
of your eye. A new technology called Iris Recognition records your eye for
identification.
IRIS
PATTERN:
An
iris pattern is highly distinctive. Ten times more unique than a fingerprint.
Because it is so distinctive, we can tell with absolute accuracy that you are
who you say you are. We can proudly say that
“Thieves
can steal your number not your IRIS”.
IRIS
ART OF WORKING:
The
key to your ATM account is the personal identification number or pin. A thief
with a high powered video camera, hidden from view, can record you putting the
number in, unless you cover your hand. With iris recognition, a video camera
safely records an image of your iris. That's the colored part of your
eye.Computer uses a complex formula to turn light and dark flecks of the iris
into digital code.IRIS TECHNOLOGY creates, effectively, a human bar code and
that human bar code becomes identity inside the ban.The person iris code is
compared with the bank's copy. As the person look at the yellow light, it will
take his picture. It's finished and the screen recognizes the correct person
.This technology is not only fraud proof; it's foolproof because you can't
forget it like a PIN number.
Iris Recognition ATM's Help Keep
an Eye on Crime.