scholarly journals Enhanced Secure ATM authentication using NFC Technology and Iris Verification

2021 ◽  
Vol 22 (2) ◽  
pp. 273-282
Author(s):  
Smita S Agrawal ◽  
Parita Oza ◽  
Mahima Biswas ◽  
Neer Choksi
Keyword(s):  

In today's world technology has advanced to such an extent that it is interchangeable with connection and convenience. ATM was one of the major breakthroughs, and over the time it has provided better convenience in fulfilling one’s banking needs. Although, there are certain predicaments that such ATM transactions are susceptible too. The conventional PIN based authentication that is presently accustomed in all ATM apparatus is liable to shoulder surfing, hassle in remembering the multiple PIN and the rest. The physical card brings along setbacks in particular, wearing out of the magnetic strip attributable to frequent usage, losing or getting it stolen. Aside from these there are other unlawful activities that are carried upon. The objective of this paper is to present a solution to the above stated problems. In contrast to standard architecture, the proposed solution incorporates NFC enabled smartphones as a substitute for physical card and iris based authentication for PIN.

2016 ◽  
Vol 2 (4) ◽  
Author(s):  
PANKAJ ,

Most of the safety primeval square measure supported mathematical issues. This analysis goals to check existing parole and to style a brand new improved graphical parole pattern. Captcha as a graphical parole. during this paper, we tend to discuss a brand new security primeval supported exhausting computer science issues, a innovative of graphical parole systems created on dominant of Captcha technology, what we are saying Captcha as graphical passwords (CaRP). CaRP is each a Captcha and a graphical parole pattern. With the mix of CAPTCHA and graphical parole  addresses a like on-line estimation attacks, relay attacks, combination of with dual-view technology, and shoulder-surfing attacks. If the parole is in search nominative then CaRP parole are often found solely risk by automatic on-line estimation attack.


Sign in / Sign up

Export Citation Format

Share Document