SlideShare uma empresa Scribd logo
1 de 19
By
ALFRED KILAMA
&
EDIGAR ABITEKANIZA
Main Supervisor
Mr. ALEX TUMWESIGYE
Co-Supervisor
Ms. SARA NANTAGYA
HIGH PROTECTION ATM SYSTEM WITH
FINGERPRINT IDENTIFICATION TECHNOLOGY
Introduction/Background
Problem Statement
Justification
Objectives
Methodology
Project scope
Key Results
Analysis of Results
Work done
Conclusion
Outline
AutomatedTeller Machine (ATM)
Introduction
Personal trait that can be used to identify an individual or
verify the claimed identity of an individual
Fields of Biometrics
Fingerprint
Iris
Retina
Face
Voice
Signature recognition
Intro-Biometrics
Enrollment and verification process of fingerprint
Intro-Fingerprint Authentication
AutomatedTeller Machine (ATM) fraud
Recent occurrences of ATM fraud include techniques such as shoulder
surfing and card skimming
Problem Statement
Justification
ATM Fraud has been in existence since the invention of ATMs
This is becoming more rampant in Uganda of late
http://www.novinite.com/view_news.php?id=146182
Main Objective
To Design a more secure ATM system
Specific Objectives
System Requirements analysis
To develop an ATM Simulator
To configure the fingerprint scanner to capture and store fingerprints
To design a database for storing fingerprint templates, PIN, account number
and holders name
System integration and testing
Objectives
MILESTONE ACTIVITIES DELIVERABLE
MS 1. Requirements Specification A1.1Visit STANBIC BANK Makerere
Branch
A1.2 Understanding system’s
requirements
Status Report
Use case diagram, activity diagram
and sequence diagram for use case
model
MS 2.Research on the available tools
and libraries
A2.1Acquiring necessary software and
hardware
Guiding Material , IDEs, Libraries for
Fingerprint identification and
verification
MS 3. System Design and
implementation
A3.1 Design of an ATM Simulator
A3.2 fingerprint scanner configuration
A3.3 Database development
Working prototype of the ATM
simulator and fingerprint database
MS 4.Testing A4.1 Unit testing
A4.2 System testing
A4.3 Documentation
Working prototypes and user manual
MS 5. System Integration A5.1 Integration of components
A5.2 Documentation
High protection ATM System with
fingerprint identification and user
manual
Methodology
System Flow Diagram
Project scope
 Simulation of the ATM and finger print module
 The existing ATM system will not be altered in the
implementation of this system
Key Results
.
USB Fingerprint Scanner
Analysis Of Results
 Safety of bank customers’ money
 Processing time will increase
 Its costly to setup
Areas of Improvement
 “Finger-Pin”
 Assign numbers to fingers
 Use the fingers in the PIN sequence for
verification
Challenges Faced
Finding the Futronic scanner in Uganda store.
Financial institutions considered their systems security
information confidential
Work Done
Demo……………………..
Conclusion
Much as the system may be costly to the financial
institutions and the time to make a transaction on an ATM
may increase, safety of people’s money should be
considered a first priority.
References
1. Cronin, Mary J. (1997). Banking and Finance on the
Internet
2. http://www.novinite.com/view_news.php?id=146182
3. http://www.bankinfosecurity.com/
.

Mais conteúdo relacionado

Mais procurados (20)

Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Security
SecuritySecurity
Security
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Atm security
Atm securityAtm security
Atm security
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 

Semelhante a High protection ATM system with fingerprint identification technology

SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
project_report
project_reportproject_report
project_reportEjaz Navas
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET Journal
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...IRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 

Semelhante a High protection ATM system with fingerprint identification technology (20)

C132733
C132733C132733
C132733
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
N044057478
N044057478N044057478
N044057478
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
D0351022026
D0351022026D0351022026
D0351022026
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
project_report
project_reportproject_report
project_report
 
A011140104
A011140104A011140104
A011140104
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 
Tounchpoint VAS Linkin
Tounchpoint VAS LinkinTounchpoint VAS Linkin
Tounchpoint VAS Linkin
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 

Último

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Último (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

High protection ATM system with fingerprint identification technology

  • 1. By ALFRED KILAMA & EDIGAR ABITEKANIZA Main Supervisor Mr. ALEX TUMWESIGYE Co-Supervisor Ms. SARA NANTAGYA HIGH PROTECTION ATM SYSTEM WITH FINGERPRINT IDENTIFICATION TECHNOLOGY
  • 4. Personal trait that can be used to identify an individual or verify the claimed identity of an individual Fields of Biometrics Fingerprint Iris Retina Face Voice Signature recognition Intro-Biometrics
  • 5. Enrollment and verification process of fingerprint Intro-Fingerprint Authentication
  • 6. AutomatedTeller Machine (ATM) fraud Recent occurrences of ATM fraud include techniques such as shoulder surfing and card skimming Problem Statement
  • 7. Justification ATM Fraud has been in existence since the invention of ATMs This is becoming more rampant in Uganda of late http://www.novinite.com/view_news.php?id=146182
  • 8. Main Objective To Design a more secure ATM system Specific Objectives System Requirements analysis To develop an ATM Simulator To configure the fingerprint scanner to capture and store fingerprints To design a database for storing fingerprint templates, PIN, account number and holders name System integration and testing Objectives
  • 9. MILESTONE ACTIVITIES DELIVERABLE MS 1. Requirements Specification A1.1Visit STANBIC BANK Makerere Branch A1.2 Understanding system’s requirements Status Report Use case diagram, activity diagram and sequence diagram for use case model MS 2.Research on the available tools and libraries A2.1Acquiring necessary software and hardware Guiding Material , IDEs, Libraries for Fingerprint identification and verification MS 3. System Design and implementation A3.1 Design of an ATM Simulator A3.2 fingerprint scanner configuration A3.3 Database development Working prototype of the ATM simulator and fingerprint database MS 4.Testing A4.1 Unit testing A4.2 System testing A4.3 Documentation Working prototypes and user manual MS 5. System Integration A5.1 Integration of components A5.2 Documentation High protection ATM System with fingerprint identification and user manual Methodology
  • 11. Project scope  Simulation of the ATM and finger print module  The existing ATM system will not be altered in the implementation of this system
  • 13. Analysis Of Results  Safety of bank customers’ money  Processing time will increase  Its costly to setup
  • 14. Areas of Improvement  “Finger-Pin”  Assign numbers to fingers  Use the fingers in the PIN sequence for verification
  • 15. Challenges Faced Finding the Futronic scanner in Uganda store. Financial institutions considered their systems security information confidential
  • 17. Conclusion Much as the system may be costly to the financial institutions and the time to make a transaction on an ATM may increase, safety of people’s money should be considered a first priority.
  • 18. References 1. Cronin, Mary J. (1997). Banking and Finance on the Internet 2. http://www.novinite.com/view_news.php?id=146182 3. http://www.bankinfosecurity.com/
  • 19. .

Notas do Editor

  1. Vault: A strong-room or compartment (often made of steel) for safekeeping of valuablesEPP: encryption pin pad-makes it nearly impossible to trace data entered into the ATMCHM: Cash handling mechanism.ATM:is a computerized device that provides the customers of a financial institution with the ability to perform financial transactions without the need for a human clerk or bank teller
  2. Source: Bank info securityCard skimming is when a device called card skimmer is added to the ATM to capture ur card’s info.
  3. ATM Fraud has been in existence since the invention of ATMs. Fingerprint identification technology will reduce ATM fraud since each card holder has a unique fingerprint
  4. This project was carried out at the College of Engineering, Design, Art and Technology (CEDAT). The project is targeting most of the financial institutions which provide ATM services. Most of the research related to this project was carried out at Stanbic Bank Makerere Branch.
  5. This project was carried out at the College of Engineering, Design, Art and Technology (CEDAT). The project is targeting most of the financial institutions which provide ATM services. Most of the research related to this project was carried out at Stanbic Bank Makerere Branch.