Mallareddy Institute of Engineering & Technology

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

1

MALLAREDDY INSTITUTE OF
ENGINEERING & TECHNOLOGY
COMPUTER SCIENCE ENGINEERING
TECHNICAL SEMINAR ON:
BIOMETRIC ATM
PRESENTED BY
Y.MEGHANA
16W91A05R7
2
Introduction
•Biometrics refers to the automatic identification of a person
based on his physiological /behavioral characteristics.
•Various types of biometric systems are being used for real time
identification most popular are based on face recognition and
finger print matching.
•Most of the ATM in the past has been using ID cards to identify
users but with the wide acceptance of Biometrics a new
generations of Biometrics ATM are being deployed for wide
range of applications worldwide.
•Biometrics based authentication is a potential candidate to
replace password‐based authentication.
3
ISSUES IN CURRENT ATM NETWORKS

 • ATM Card frauds


 • Use of ATM card duplicators
 • Card sharing by family and friends
 • Inability to trace the wrongful users
 • ATM PINs can be shared on phone or recorded using secret cameras
4
Biometric ATMs solve these issues & offer
•Multifactor Authentication:
Card + PIN + Biometrics.
•Online or offline
Authentication using smart
cards.
•Card less Authentication.
•Biometrics is combination of
card or PIN.
•Single/Multi factor Biometric
Authentication: Fingerprint,
Iris, Face.
5
6
7
8
FINGER PRINT

 A fingerprint scanner system has two basic jobs:


 It needs to get an image of your finger.
 It needs to determine whether the pattern of ridges and valleys in
this image matches the pattern of ridges and valleys in
pre‐scanned images.
 Only specific characteristics, which are unique to every fingerprint,
are filtered and saved as an encrypted biometric key or
mathematical representation.
 No image of a fingerprint is ever saved, only a series of numbers (a
binary code), which is used for verification. The algorithm cannot
be reconverted to an image, so no one can duplicate your
fingerprints
9
ATMs of the future :

 Today’s biometric scanners go far beyond basic fingerprint


recognition.
 In Poland and Japan, consumers are already using Hitachi's
infrared scanners that capture the unique pattern of
capillaries in the finger and hand.
 The most secure biometric technology uses a device
designed to perform an iris scan based on more than 2,000
unique measurement points.
 According to developers, people and pets all over the
world will be connected to a system that uses iris scan
identification within the next decade.
10

ADVANTAGES:

 Scalable
 Profitable
 Accurate identification and
accountability.
11

DISADVANTAGES

 Environment and usage can effect


measurments.
 Systems are not 100% accurate.
 Require integration and /or additional
hardware.
12

APPLICATIONS:

 Banking & Finance.


 Food coupons / Tickets / Canteen ATM.
 Membership Verification ATM.
 Transaction / Check Deposit ATM.
 Self Service ATM.
 Retail ATM.
13
14

CONCLUSION:

 Biometric tokens are the safest means of preventing ATM frauds.


 The main reason for introducing biometric systems is to increase overall security.
 Biometrics offers greater security and convenience than traditional methods of personal
recognition.
 In some applications, biometrics can replace or supplement the existing technology. In
others, it is the only viable approach.
 The biometric system is only one part of an overall identification or authentication
process, and the other parts of that process will play an equal role in determining its
effectiveness.
15

THANK YOU

You might also like