SlideShare una empresa de Scribd logo
1 de 21
Visit www.seminarlinks.blogspot.in
to Download
Biometric ATM
Introduction
• Biometrics refers to the automatic identification of a person based on
his physiological/behavioral characteristics.
• Various types of biometric systems are being used for real time
identification most popular are based on face recognition and finger
print matching.
• Most of the ATM in the past have been using ID cards to identify users
but with the wide acceptance of Biometrics a new generation of
Biometrics ATM are being deployed for wide range of applications
worldwide.
• Biometrics based authentication is a potential candidate to replace
password-based authentication.
Current Authentication Systems
Online
Authentication

• User Name
• Password
• One Time Password

Bank
Authentication

• Token-based identification
systems
- Identification Cards
• Signature
Issues in current ATM networks
• ATM Card frauds
• Use of ATM card duplicators

• Card sharing by family and friends
• Inability to trace the wrongful users
• ATM PINs can be shared on phone or recorded using secret cameras
Biometric ATMs solve these issues & offer
• Single/Multi factor Biometric Authentication: Fingerprint, Iris, Face.
• Multifactor Authentication: Card + PIN + Biometrics
• Online or offline Authentication using smart cards
• Card less Authentication

• Biometrics is combination of card or PIN
Why use Biometric ATM ?
• Provides strong authentication
• Can be used instead of a PIN
• Hidden costs of ATM card management like card personalization,
delivery, management, re-issuance, PIN generation, help-desk, and reissuance can be avoided
• Ideal for Indian rural masses
• It is accurate
• Flexible account access allows clients to access their accounts at their
convenience
• Low operational cost of the ATMs will ultimately reduce Total cost
of ownership (TCO).
Applications of Biometric ATM
• Banking & Finance

• Food coupons / Tickets / Canteen ATM
• Membership Verification ATM
• Transaction / Check Deposit ATM
• Self Service ATM
• Retail ATM
Typology of identification methods
Characteristics

Physiological

Face

Fingerprint

Behavioral

Hand

Eye

Voice

Signature

Keystroke
Biometric System
Biometric System
Data Collection

Transmission
Signal Processing
Data Storage
Decision
Biometric System
Various Biometric Systems
HAND

• The three dimensional shape of a person’s hand has several
advantages as an identification device.
• Scanning a hand and producing a result takes 1.2seconds.It requires
little space for data storage about 9 bytes which can fit easily
magnetic strip credit cards.
FINGER PRINT

A fingerprint scanner system has two basic jobs :
• It needs to get an image of your finger.
• It needs to determine whether the pattern of ridges and valleys in this
image matches the pattern of ridges and valleys in pre-scanned
images.
• Only specific characteristics, which are unique to every fingerprint,
are filtered and saved as an encrypted biometric key or mathematical
representation.
• No image of a fingerprint is ever saved, only a series of numbers (a
binary code), which is used for verification. The algorithm cannot be
reconverted to an image, so no one can duplicate your fingerprints.
ATMs of the Future
• Today’s biometric scanners go far beyond basic fingerprint
recognition.
• In Poland and Japan, consumers are already using Hitachi's infrared
scanners that capture the unique pattern of capillaries in the finger
and hand.
• The most secure biometric technology uses a device designed to
perform an iris scan based on more than 2,000 unique measurement
points.
• According to developers, people and pets all over the world will be
connected to a system that uses iris scan identification within the
next decade.
Multibiometrics
INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL
IDENTIFICATION
An automatic personal identification system based on fingerprints or
faces is often not able to meet the system performance requirements.

A MULTIMODEL BIOMETRIC SYSTEM USING FINGERPRINT, FACE AND
SPEECH
This system takes the advantage of the capabilities of each individual
biometric. It can be used to overcome some of the limitations of a
single biometrics.
Pictures

Biometric Reading at ATM Machines Already in use in Brazil

Poland's cooperative BPS bank
It's the first in Europe to install a biometric ATM
allowing customers to withdraw cash simply
with the touch of a fingertip.
Conclusion
• Biometric tokens are the safest means of preventing ATM frauds.
• The main reason for introducing biometric systems is to increase
overall security.
• Biometrics offers greater security and convenience than traditional
methods of personal recognition.
• In some applications, biometrics can replace or supplement the
existing technology. In others, it is the only viable approach.
• The biometric system is only one part of an overall identification or
authentication process, and the other parts of that process will play
an equal role in determining its effectiveness.
Thank You

Más contenido relacionado

Más de Seminar Links

20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
 
Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTSeminar Links
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Seminar Links
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTSeminar Links
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTSeminar Links
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing TechniqueSeminar Links
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Seminar Links
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Seminar Links
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPTSeminar Links
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareSeminar Links
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material pptSeminar Links
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military ApplicationsSeminar Links
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer scienceSeminar Links
 
उपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिउपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिSeminar Links
 
Electronic Paper (e-Paper)
Electronic Paper (e-Paper)Electronic Paper (e-Paper)
Electronic Paper (e-Paper)Seminar Links
 

Más de Seminar Links (20)

20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPT
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPT
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing Technique
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE)
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPT
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry Ransomware
 
Dams PPT
Dams PPTDams PPT
Dams PPT
 
Bio mass Energy
Bio mass EnergyBio mass Energy
Bio mass Energy
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material ppt
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military Applications
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer science
 
उपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिउपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृति
 
Electronic Paper (e-Paper)
Electronic Paper (e-Paper)Electronic Paper (e-Paper)
Electronic Paper (e-Paper)
 
Biosensor ppt
Biosensor pptBiosensor ppt
Biosensor ppt
 
Six-Stroke Engine
Six-Stroke Engine Six-Stroke Engine
Six-Stroke Engine
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Biometric ATM

  • 2. Introduction • Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics. • Various types of biometric systems are being used for real time identification most popular are based on face recognition and finger print matching. • Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics a new generation of Biometrics ATM are being deployed for wide range of applications worldwide. • Biometrics based authentication is a potential candidate to replace password-based authentication.
  • 3. Current Authentication Systems Online Authentication • User Name • Password • One Time Password Bank Authentication • Token-based identification systems - Identification Cards • Signature
  • 4. Issues in current ATM networks • ATM Card frauds • Use of ATM card duplicators • Card sharing by family and friends • Inability to trace the wrongful users • ATM PINs can be shared on phone or recorded using secret cameras
  • 5. Biometric ATMs solve these issues & offer • Single/Multi factor Biometric Authentication: Fingerprint, Iris, Face. • Multifactor Authentication: Card + PIN + Biometrics • Online or offline Authentication using smart cards • Card less Authentication • Biometrics is combination of card or PIN
  • 6. Why use Biometric ATM ? • Provides strong authentication • Can be used instead of a PIN • Hidden costs of ATM card management like card personalization, delivery, management, re-issuance, PIN generation, help-desk, and reissuance can be avoided • Ideal for Indian rural masses • It is accurate • Flexible account access allows clients to access their accounts at their convenience • Low operational cost of the ATMs will ultimately reduce Total cost of ownership (TCO).
  • 7. Applications of Biometric ATM • Banking & Finance • Food coupons / Tickets / Canteen ATM • Membership Verification ATM • Transaction / Check Deposit ATM • Self Service ATM • Retail ATM
  • 8. Typology of identification methods Characteristics Physiological Face Fingerprint Behavioral Hand Eye Voice Signature Keystroke
  • 10. Biometric System Data Collection Transmission Signal Processing Data Storage Decision
  • 12. Various Biometric Systems HAND • The three dimensional shape of a person’s hand has several advantages as an identification device. • Scanning a hand and producing a result takes 1.2seconds.It requires little space for data storage about 9 bytes which can fit easily magnetic strip credit cards.
  • 13.
  • 14. FINGER PRINT A fingerprint scanner system has two basic jobs : • It needs to get an image of your finger. • It needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. • Only specific characteristics, which are unique to every fingerprint, are filtered and saved as an encrypted biometric key or mathematical representation. • No image of a fingerprint is ever saved, only a series of numbers (a binary code), which is used for verification. The algorithm cannot be reconverted to an image, so no one can duplicate your fingerprints.
  • 15.
  • 16. ATMs of the Future • Today’s biometric scanners go far beyond basic fingerprint recognition. • In Poland and Japan, consumers are already using Hitachi's infrared scanners that capture the unique pattern of capillaries in the finger and hand. • The most secure biometric technology uses a device designed to perform an iris scan based on more than 2,000 unique measurement points. • According to developers, people and pets all over the world will be connected to a system that uses iris scan identification within the next decade.
  • 17. Multibiometrics INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL IDENTIFICATION An automatic personal identification system based on fingerprints or faces is often not able to meet the system performance requirements. A MULTIMODEL BIOMETRIC SYSTEM USING FINGERPRINT, FACE AND SPEECH This system takes the advantage of the capabilities of each individual biometric. It can be used to overcome some of the limitations of a single biometrics.
  • 18.
  • 19. Pictures Biometric Reading at ATM Machines Already in use in Brazil Poland's cooperative BPS bank It's the first in Europe to install a biometric ATM allowing customers to withdraw cash simply with the touch of a fingertip.
  • 20. Conclusion • Biometric tokens are the safest means of preventing ATM frauds. • The main reason for introducing biometric systems is to increase overall security. • Biometrics offers greater security and convenience than traditional methods of personal recognition. • In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. • The biometric system is only one part of an overall identification or authentication process, and the other parts of that process will play an equal role in determining its effectiveness.