4. Steal user's credit card and password
by illegal means
ATM Fraud has been existence
Since the invention of ATM
Use of ATM Card duplicators
Card Sharing by family and friends
Inability to trace the wrongful users
ATM PINs can be share on phone or
recorded
4
6. In conventional ATMs – PIN is needed
PIN comes in an envelope which contains 2
sheets of paper and between this sheets secret
code is marked
RBI report says – 25000 new accounts are
opened daily
On yearly basis, a lot of paper is required – leads
to cutting of trees
6
7. ‣Anybody holding the card with PIN number
known can operate
‣No need to be the original owner of the card
‣In Biometric only the original card holder
can operate
7
14. With GSM, systems for mobilecommunication
reached a global scale. In the western world, it
seems everyone has their own mobile phone, and
GSM has taken more and more of the market.
GSM allows users to roam seamlessly between
networks, and separate the user identity from the
phone equipment. In addition the GSM system
provides the functional basis for the 3rd
generation mobile system.
15. Using Hybrid Compression Encryption(HCE)
System.
This technique compress the SMS to reduce its
length.
Encrypts it using RSA Algorithm.
A signature is added.
Myagmar, Gupta UIUC 2001 15