Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: A Programmable Logic Controller,
You're currently viewing a stripped down version of our content. View the full version with proper formatting.

project maker

AN ATM WITH AN EYE

[attachment=66624]

Automated teller machine

An automated teller machine (ATM) is a
computerized telecommunications
device that provides the customers of a
financial institution with access to
financial transactions in a public space
without the need for a human clerk or
bank teller.
On most modern ATMs, the customer is
identified by inserting a plastic ATM
card with a magnetic stripe or a plastic
smartcard with a chip, that contains a
unique card number and some security
information, such as an expiration date
or CVVC (CVV). Security is provided by
the customer entering a personal
identification number (PIN).04/07/10 4
An ATM With An Eye



An ATM With An Eye

There is an urgent need for improving
security in banking region. With the
advent of ATM though banking became a
lot easier it even became a lot vulnerable.
 The chances of misuse of this much
hyped 'insecure' baby product (ATM) are
manifold due to the exponential growth of
'intelligent' criminals day by day.


HOW IT WORK

A camera based in cash machine will
detect the pattren in second. and
compare it with one store in a central
computer.
Or encode on to the cash card.
A sensar system examines the randomly
formed features of the iris of the eye .
as unique as a fingerprint


A Word On Passwords

Whether you are on the Internet or an online
banking program, you are often required to use
a password
The worst passwords to use are the ones that
come to mind first -- name, spouse's name,
maiden name, pets, children's name, even
street addresses, etc.
The best passwords mix numbers with upper
and lowercase letters. A password that is not
found in the dictionary is even better04/07/10 12
How you protect your passwo



CONCLUSION

We thus develop an ATM model that is
more reliable in providing security by using
facial recognition software. By keeping the
time elapsed in the verification process
to a negligible amount we even try to
maintain the efficiency of this ATM system to a greater degree.