Eldad Lieberman started out a company known as elyi systems and supplied hundreds of business's with the capability to have ATM'S to enable customers to get cash to buy things.
An ATM With Third Eye The Future’s Technological Innovation
1. An ATM With Third Eye
The Future’s
Technological Innovation
1
2. Outline
ATM
ATM WITH AN EYE
ON THE MOST CUSTOMER IS
WHERE IT IS USE
WORKING
TECHNIQUES
HOW IT WORK
PROTECTION
CONCLUSION
REFERENCES
2
3. 3
Automated Teller
Machine
An automated teller machine (ATM) is :
Computerize telecommunications
Made money transactions easy for customers to bank.
Device that provides the customers of a financial
transactions in a public space without the need for a human
clerk or bank teller.
Security requiring combination Physical access card+
Password(PIN)
4. 4
Physical Access Card
(ATM Card)
1. Card Provider Name : Name of Card
Provider like bank or financial institute;
for E.g.. ICICI Bank, SBI Bank etc.
2. Card Number : 16 Digit Number. It
divided into 4 parts with 4 number.
3. 3D Hologram : Contain 3D Hologram to
represent whether it is Visa card or
Maestro.
4. Valid From : It contains valid from date,
i.e. Contains the card activation date.
5. Valid Thru : It contains valid thru date, i.e.
Contains last date for the use of card.
6. Brand Logo : Contains Brand Logo,
whether it is Visa or Master.
FIGURE-1
5. 8. Magnetic Strip : Contains
Magnetic Strip have special
identification
9. Verification Number : Contains
Three digit verification number.
10. Signature Panel : Contains
Signature Panel, i.e. Card Holder
Signature.
FIGURE-2
5
6. Password
Whether you are on the internet or an online banking
program, you are often required to use a password.
The worst passwords to use are the ones that come to
mind first name, spouse's name, maiden name, pets,
children's name, even street addresses, etc.
The best passwords mix numbers with upper and
lowercase letters. A password that is not found in the
dictionary is even better.
6
7. Personal Identification
Number
PIN is one method used by banks and phone companies
to protect your account from unauthorized access
PIN is a confidential code issued to the cardholder to
permit access to that account
PIN should be memorized, secured and not given to
anyone, not even family members or bank employees
7
8. The chances of misuse of this much hyped 'insecure'
baby product (ATM) are manifold due to the exponential
growth of 'intelligent' criminals day by day.
There is an urgent need for improving security in
banking region. With the advent of ATM though banking
became a lot easier it even became a lot vulnerable.
Provide a cordless, password-free way to get their money
out of an ATM
An ATM With An
Eye
8
9. 9
How It Work
A camera based in ash machine will
Detect the pattern in second
Compare it with one store in a central
computer.
Or encode on to the cash card.
A sensor system examines the randomly
Formed features of the iris of the eye
as unique as a fingerprint.
10. Where It Used
The development of such a system would
serve to protect consumers
financial institutions alike from fraud
other breaches of security.
FIGURE-3
10
15. How you Protect Your
Password
Changing your password regularly
Memorizing your password.
If you do write down the password, keep it at home or
hidden at work. Don't rewrite your password on a
post-it note and stick it on your monitor or hard drive.
Web site remember a password for you, don't use it.
Anyone who uses your machine will have automatic
access to information that is password protected.
15
16. 16
Protect Your ATM Cards
An ATM card should be treated as thought it were cash.
Avoid providing card and account information to anyone over
the telephone.
When making a cash withdrawal at an ATM, immediately
remove the case as soon as the machine releases it.
Put the case in your pocket and wait until you are in a secure
location before counting it.
Never use an ATM in an isolated area or never leave up
receipt
Be sure to take your receipt to record transactions and match
them against monthly statements.