Sunteți pe pagina 1din 15

BIOMETRIC ATM

Abstract Review

of literature Introduction Drawbacks of existing ATMS What is Biometric Authentication in ATMS Working of Biometric ATM Technical specification Advantages Limitations Problems with Biometric ATMS Future ATMS Conclusion References

Biometric ATMS

are the effective way of preventing card usage and channel to expand banks reach to rural and illiterate
Proposed

model provides high authentication which protects the service user from unauthorized access
The

user has to authenticate with biometric identification(thumb /fingerprint/iris ) along with PIN and selection of banks branch.
Mainly

designed for rural farmers and semi-literate people.

Reduces

complexity and authentication is within yourself

Saves

time and reduces pollution caused by the excess use of plastic

cards

DRAWBACKS OF EXISTING ATMS: Person having debit/credit card or any other card becomes the owner of the account without any other identification
Existing Card Bank After

system requires more time to process cards.

if lost high possibility of misuse require more time to regenerate cards and costly

2/3 years or after repeated transactions card will be unable to operate


Harmful

to environment

Identification

is the process by which identity of user is

established
Authentication

is a process by which service confirms the claim of user to use a specific identity by use of specific credentials
Biometrics

are very reliable today

The

difference between a system that looks at a hand geometry and says this is doctor hunk(identification) versus a man who says I doctor hunk present my hand to prove who I am?(authentication)

Biometrics

is biological authentication based on some physical characteristics of human

body
There

are two categories of biometric identifiers which include physiological and behavioral characteristics
Physiological

are related to shape of the body fingerprint, face recognition,DNA, palm print, hand geometry, iris recognition
Behavioral

include behavior of person, typing of rhythm,gait,digital signature

More

traditional means of access control include token based identification systems such as drivers license or passport knowledge based identification such as password or PIN
Authentication

with biometrics has advantage that it cannot be lost,stolen,forged or lent

If

we use this password or PIN it provides full authentication

The

sensor used in the block diagram takes the sample of the user and preprocesses the taken sample
The

features are extracted and template is generated and is given to the matcher user database contains a sample of users biometric characteristics.

The

Both

the samples are compared in the matcher and during authentication has to produce the same with PIN then it will generate VID(virtual account identification)
This

is sent in encrypted form through network to server

On

server side the users current sample is decrypted and compared with the one stored in database

During

every authentication there is a slight change in matching biometric characteristics


Physical

characteristics of user may change due to number of reasons The sample taken may not be the same because it may be dirty, can have cuts and other marks
An

approximate can be accepted

Therefore

using registration process multiple samples of user are created and average is stored in database

Strong

authentication

Ideal

for Indian rural masses

Complaints

regarding stolen cards, regenerating new cards maintaining cards will be eliminated
Hidden

costs of ATM card management like card personalisation,delivery,help desk etc can be avoided
Users

have high authentication to change PIN code for security Biometric system replaced card system with physiological characteristics
Flexible

account access allows service users to access their accounts conveniently

This

method is costlier and requires more instrument to installed in ATMs


Due

to biometric only account holder(nominee) can access the account

Due

to multiple authentication it is time consuming and required fast and efficient technology to manage
If

service user is unable to input correct information within 4 chances the account will be blocked
If

such block more than 4 in 3 months then his account will be blocked and he has to reidentify his account in home bank

Biometrics

techniques are relatively new, and some people find their use intrusive. Hand geometry, fingerprint and face recognition (which can be done from a camera across the room) are not quite enveloping, but people have real concerns about peering (hard to watch) into a laser beam or strictly a finger into a slot.
Biometrics

recognition devices are costly, although as the devices become more popular, their cost goes down.
All

biometrics readers use sampling and establish a threshold for when a match is close enough to accept. The device has to sample the biometric, measure often hundreds of key point, and compare that set of measurements with a template. There is normal variability
Although

equipments are improving, there are still false reading / recognition.

Today's ATMs operating on the basis of card system and PIN, where as for better security biometric authentication is growing demand. According to security experts, fingerprints can easily be lifted and replicated. The most secure biometric technology uses a device designed to perform an iris scan based on more than 2,000 unique measurement points. According to developers, people and pets all over the world will be connected to a system that uses iris scan identification within the next decades. In future solar power and biometric with PIN based ATMs will be launched by banks especially

Proposed conceptual model is designed for ATM users for various transactions like withdrawing cash, balance enquiry etc. Point of Sales (POS) machines will also use biometric authentication. This system requires biometric authentication (finger print, iris recognition) which is always with user, PIN code and selection of bank branch, which then creates virtual account (V-ID) it helps for identification and authentication of service user. This is card less e-banking technique for ATMs, which reduces efforts of handling, operating and various risks associated with cards. The same and simplified procedure will be helpful for Internet, Mobile and POS transactions. Due to unique method of authentication it reduces cost, time, efforts of both banks as well as service users

[1] Kahate Atul (2004), Cryptography and Network Security, User Authentication Mechanism, pp. 303- 304, III rd Edition, McGrawHill Publications [2]Krause Micki, Tipton Harold F., Handbook of Information Security Management (Imprint: Auerbach Publications) (Publisher: CRC Press LLC), ISBN: 0849399475, http://www.ccert.edu.cn/education/cissp/hism/ewtoc.html, data access on 13-Dec-2011, 3.50 pm [3] Laudon Kenneth, Traver Carol Guercio, E-Commerce (2005), Second Edition , pp. 237-239, Pearson Education (Singapore), Pvt. Ltd. [9] ONeil Erin, Back to the future at your local ATM, [4] 11] S.C. Bihari, e-Banking, When Convenience Banking can Become Inconvenience, pp. 52-55, First Edition, Skylark Publication, New Delhi [12] S.C. Bihari, e-Banking, When Convenience Banking can Become Inconvenience, pp. 85-91, First Edition, Skylark Publication, New Delhi

S-ar putea să vă placă și