scholarly journals Point of Sale (POS) Network with Embedded Fingerprint Biometric Authentication

Author(s):  
Hussah Adnan Alzame ◽  
Muneerah Alshabanah ◽  
Mutasem K. Alsmadi

The steady growth in electronic transactions has promoted the Automated Teller Machine (ATM) thereby making it the main transaction channel for carrying out financial transactions. Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. However, this has also increased the amount of fraudulent activities carried out on Automated Teller Machines (ATMs) thereby calling for efficient security mechanisms and increasing the demand for fast and accurate user identification and authentication in ATMs. In this paper, an embedded fingerprint biometric authentication scheme for Point of Sale (POS) network as additional security option to the ATM card is proposed. A fingerprint biometric technique was fused with personal identification numbers (PIN's) for authentication to upgrade the security level. The proposed idea will solve the problems that may face the customers such as theft, counterfeiting, oblivion or loss the card. Therefore, the customer will be identified once putting his finger on the reader (based on finger scanning) and the system recognizes the customer without requiring keys or cards of support. We have distributed a questioner to 586 responders, the obtained results show the importance of fingerprint biometric authentication for POS network as additional security option to the ATM card.

2019 ◽  
Vol 5 (2) ◽  
pp. 19-28
Author(s):  
Mubarak Adetunji Ojewale ◽  
Patrick Meumeu Yomsi

One thing can be said to be common to all forms of debit card fraud – authentication bypass. This implies that a secure debit card transaction system can only be guaranteed by a safe and reliable authentication system. Many approaches have been adopted to ensure a secure authentication system, but often, these approaches are either focused on the Automated Teller Machines (ATM)/Point of Sales (POS) terminals or Online/e-commerce transactions, thus not providing full security on both fronts. In this work, we address this problem by adopting a multi-factor debit card system that uses a combination of the traditional Personal Identification Number code (PIN) and the mobile-phone delivered One-Time Password (OTP) with a biometric authentication option (fingerprint). We demonstrate that this approach ensures the security of both online and terminal transactions. The fingerprint option makes it easy to use by people who find memorizing PINs difficult.


Information advancement is a snappy creating fragment now day by day. Step by step new manifestations are happening in market. In fiscal part especially the monetary division there are such an enormous number of new advancements are happening in cash related operations.ATM is a noteworthy improvement for banking portion. The supernatural occurrences of present day advancement have made it functional for bank customers to interface with an electronic monetary office as Automated Teller Machine (ATM) instead of with an individual for cash trades. Electronic banking is one of the most modern organizations offered by for all intents and purposes all banks to their customers. Electronic banking incorporates among others, Automated Teller Machine (ATM), Point-Of-Sale (POS), and Telephone banking, and so on. The amazing cost of setting up and working full-organization branch work environments has driven starting late to a sharp augmentation in obliged organization workplaces, for instance, Automated Teller Machines (ATMs) [19],[21],[23]


Author(s):  
Samera Uga Otor ◽  
Beatrice Obianiberi Akumba ◽  
Joseph Sunday Idikwu ◽  
Iorwuese Peter Achika

Unstructured Supplementary Services Data (USSD) is a menu driven, real time communication technology used for value added services. It is adopted by banks for financial transactions due to its ease of operation. However existing USSD are used by fraudster to commit identity theft through Subscriber Identification Module (SIM) swap, phone theft and kidnap, in other to access funds in the bank. One of the reasons this is made possible is because existing USSD platforms use Automated Teller Machine (ATM) Personal Identification Number (PIN) as second level authenticator and this compromises the ATM channel and violets one of the stated guidelines for USSD operation in Nigeria. More so, the PIN is entered bare on the platform and so can easily be stolen by shoulder surfing. Therefore, in this paper we developed and simulated an improved USSD security model for banking operations in Nigeria. The security of existing USSD platform was enhanced using answer to a secret question as another level of authentication. This was with the view to minimise identity theft. This secret question is registered in the bank during account opening for new customers while existing customers will have to update their details in the banks data base before registering for USSD services. This is done the same way customers verify their ATM PIN in the bank. Hence the answer is known by the customer alone. The model was implemented using php on XAMPP platform and simulated using hubtel USSD mocker. Results showed that security of the proposed system was enhanced through another level of authentication provided by the answer to the security question.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 657
Author(s):  
Damodar Magdum ◽  
Tejaswini Patil ◽  
Dr Maloji Suman ◽  
Dr T.B. Mohite Patil

In this paper, we discuss process of design and development of talking ATM for visually impaired people. Automated Teller Machine (ATM) has become vital part of our life to perform financial transactions without intervention of human banker. ATM facilitates cash withdrawal, balance check, mini statement and fund transfer. But, these banking services using ATM cannot be directly used by some set of people of society such as people with low vision, visually impaired, illiterate as lack of accessing ATM through screens. Even they can be defrauded at ATM centers. To digitally include these set of people, talking ATMs are evolved. Talking ATM provides accessibility to ATM services by providing audio component. Many ATMs employ headphone jack that facilitates user to do transaction with security. The audio information is generated either using pre-recorded speech corpus or through speech synthesis engine. The paper summarizes how ATM works, need, proposed solution of talking ATM for visually impaired users, design and development talking ATM using concatenated Text To Speech.  


Author(s):  
J. Francisco Vargas ◽  
Miguel A. Ferrer

Biometric offers potential for automatic personal identification and verification, differently from other means for personal verification; biometric means are not based on the possession of anything (as cards) or the knowledge of some information (as passwords). There is considerable interest in biometric authentication based on automatic signature verification (ASV) systems because ASV has demonstrated to be superior to many other biometric authentication techniques e.g. finger prints or retinal patterns, which are reliable but much more intrusive and expensive. An ASV system is a system capable of efficiently addressing the task of make a decision whether a signature is genuine or forger. Numerous pattern recognition methods have been applied to signature verification. Among the methods that have been proposed for pattern recognition on ASV, two broad categories can be identified: memory-based and parameter-based methods as a neural network. The Major approaches to ASV systems are the template matching approach, spectrum approach, spectrum analysis approach, neural networks approach, cognitive approach and fractal approach. The proposed article reviews ASV techniques corresponding with approaches that have so far been proposed in the literature. An attempt is made to describe important techniques especially those involving ANNs and assess their performance based on published literature. The paper also discusses possible future areas for research using ASV.


2018 ◽  
Vol 7 (3.3) ◽  
pp. 59
Author(s):  
V Brindha Devi ◽  
S Sindhuja ◽  
S Shanthini ◽  
M Hemalatha

The Automated Teller Machines (ATM) are used for cash withdrawals. Meanwhile as ATM lacks security, thefts occurring in the ATMs are also high. Our proposed system minimizes those break-ins occurring in the ATM’s by instigating a low cost standalone embedded sys-tem using Arduino Microcontroller. This system is proposed for ATM security, comprising of the components namely RGB tag, Global System for Mobile communication (GSM), Global Positioning System (GPS), Virtual Keyboard and camera. Authentication by virtual keyboard thus helps the public to protect their credentials from being captured by malicious bots, key loggers and spyware. Whenever theft occurs, Buzzer makes an alarm, DC Motor turns ON and the door of ATM is closed. The nearby police station and corresponding bank authorities is alerted by the GSM Modem that sends messages along with the location. This will prevent the robberies and the person in-volving in the robbery can be easily caught. In short, it discusses the methods that are used to detect the venture, initiate preemptive measures and forewarn the officials through GSM network. This system thus heightens the safety of ATM users as well as the ATM’s against forthcoming attacks effectively.  


2020 ◽  
pp. 197-200
Author(s):  
Saranya K ◽  
Rajasekar S S ◽  
Nagarajan B

Now a days the security dangers in the online ex-changes, ATM money withdrawals’ have expanded on a substan-tial scale. Individuals in the country zone are as yet ignorant of these dangers are as yet encountering many loses. Individuals unconscious of these dangers don't perceive that sharing their ATM PIN number, yet additionally sharing their credit/debit card number and CCV can likewise prompt the getting to of financial balance without their insight. In this way, in this proposed framework it is said that the credit/debit card number and CCV are being supplanted with dynamically produced QR codes. This QR code that is created can't be reproduced or hacked as effec-tively as the current framework. In the present framework OTP is sent to authenticate our transactions. This OTP is additionally added with Bio-metric confirmation like unique finger-print, iris information. This provides an additionally improved verification amid all the ATM exchanges. The execution on the above framework is basic as all the financial accounts are now linked with Aadhar card. And this can be implementing the QR code scanner alongside unique finger-print scanner and iris scanner in later stages. This never enables the unapproved clients to access or make any installments without the respective of the account holders. This expands the security level and furthermore enables the client to the exchange cash all the more securely. The pro-posed framework improves the security in the exchanges in our everyday life as no ATM withdrawal or Deposit should be possi-ble without the QR code and the Account holder themselves.


2020 ◽  
Vol 17 (9) ◽  
pp. 4473-4481
Author(s):  
M. L. Chayadevi ◽  
Sujith Madhyastha ◽  
K. N. Nisarga ◽  
H. Charitha ◽  
B. Susharan

There are many scenarios in society with thefts and crimes involved in Automated Teller Machines (ATM). These events are increasing day-by-day and which is also increasing the complexities on the crime investigation agencies. In order to deal with these situations, we have proposed an automated security method inside ATMs using image processing techniques which can alert the concerned authorities immediately whenever these types of situations arise. Hybrid method with Viola-Jones algorithm has been used for face recognition along with the Haar-cascade features. In the case of objects such as knife, gun etc. inside an ATM, combination of SVM and random forest algorithms are used for object detection. TensorFlow with machines learning algorithms have been used in the hybrid methodology. Android application has been developed to prevent and alert the crimes and send alert messages to the concerned. Speech alert system is developed to assist blind and physically challenged people.


2019 ◽  
Vol 16 (2) ◽  
Author(s):  
Dian Alan Setiawan

The development of technology and the internet does not always produce positive things. Negative things that are side effects include the crime of skimming (theft of customer data) which is one type of crime in cyberspace. Lately Indonesia is enlivened with breaking ATM news that occurred in various regions in Indonesia. The customers suddenly lose their account balance due to being burglarized by irresponsible people. ATM piercing technique is known as ATM Skimmer Scan technique. ATM machine piercing (Automated Teller Machine) using Skimmer, which is a customer data thieves. The modus operandi of bank breakers is installing skimmer in ATM mouth. After the customer data obtained, the perpetrator just insert into the ATM card. burglars will freely drain the customer's money. Problems that arise is the development of modus operandi crime skimming in the case of bank burglary bank as a form of cybercrime (cybercrime) And Efforts / Legal Steps in Tackling Crime Use of Information Systems and Electronic Transactions. This research is legal research using conceptual approach and statue approach which will review Law Number 11 Year 2008 regarding Information and Electronic Transaction. Based on the method used, it is known that the modus operandi of criminal skimming in ATM bankruptcy as a form of cyber crime and the application of article in Law Number 11 Year 2008 regarding Information and Electronic Transaction as an effort / step in tackling the crime of Information System Use and Electronic Transactions.


Sign in / Sign up

Export Citation Format

Share Document