16-06-2014, 12:54 PM
AN ATM WITH AN EYE
AN ATM WITH AN EYE.pdf (Size: 797.71 KB / Downloads: 90)
What is technology
EFFICIENTLY TECHNOLOGY IS
THETECHNICAL MEANS
PEOPLE USE TO IMPROVE
THEIR SURROUNDING. IT IS
ALSO THE KNOWLEDGE OF
USING THE TOOLS AND
MACHINES TO DO TASKS.
An ATM With An Eye
There is an urgent need for improving
security in banking region. With the
advent of ATM though banking became a
lot easier it even became a lot vulnerable.
The chances of misuse of this much
hyped 'insecure' baby product (ATM) are
manifold due to the exponential growth of
'intelligent' criminals day by day.
HOW IT WORK
A camera based in cash machine will
detect the pattren in second. and
compare it with one store in a central
computer.
Or encode on to the cash card.
A sensar system examines the randomly
formed features of the iris of the eye .
as unique as a fingerprint.
How It Works
The progress has been made in
biometric identification
techniques, including finger
printing, retina scanning, and
facial recognition
This paper proposes the
development of a system that
integrates facial recognition
technology into the identity
verification process used in ATMs
A Word On Passwords
Whether you are on the Internet or an online
banking program, you are often required to use
a password
The worst passwords to use are the ones that
come to mind first -- name, spouse's name,
maiden name, pets, children's name, even
street addresses, etc.
The best passwords mix numbers with upper
and lowercase letters. A password that is not
found in the dictionary is even better
How you protect your password
• Changing your password regularly
• Memorizing your password.
If you do write down the password, keep it at
home or hidden at work. Don't rewrite your
password on a post-it note and stick it on your
monitor or hard drive.
• Web site remember a password for you, don't
use it. Anyone who uses your machine will have
automatic access to information that is password
protected.
CONCLUSION
We thus develop an ATM model that is
more reliable in providing security by using
facial recognition software. By keeping the
time elapsed in the verification process
to a negligible amount we even try to
maintain the efficiency to a greater degree.