SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Journal for Research| Volume 02| Issue 02 | April 2016
ISSN: 2395-7549
All rights reserved by www.journalforresearch.org 81
QR based Card-less ATM Transactions
Meenu Jacob Nikhil Mathew
Department Computer Science & Engineering Department Computer Science & Engineering
Amal Jyothi College of Engineering Kanjirappally, Kerala, Amal Jyothi College of Engineering Kanjirappally, Kerala,
India India
Rose Merin Jose Seba Siby
Department Computer Science & Engineering Department Computer Science & Engineering
Amal Jyothi College of Engineering Kanjirappally, Kerala, Amal Jyothi College of Engineering Kanjirappally, Kerala,
India India
Prof. Neethu C Sekhar
Department Computer Science & Engineering
Amal Jyothi College of Engineering Kanjirappally, Kerala, India
Abstract
In the present scenario ATM transaction are carried out with the help of ATM cards which have to be physically swiped at the
ATM machine. The present cash withdrawal system involves swiping the ATM card at an ATM Machine and then input a four
digit pin into the terminal for verification. This method is susceptible to many types of attacks such as shoulder surfing, replay
attack and ATM card skimming. In this paper, we are proposing a system in which a QR code is used as an alternative to the
physical ATM card based authentication. This system can be incorporated in smartphones and other wearable device thereby
eliminating the need for carrying ATM cards. QR codes are generated in the wearable device as well as the ATM machine to
carry out User Authorization. An eight-digit long pin is generated to make the system more secure than present one. A
background server is used to generate unique 8 digit pins for each transaction. This background server also manages transactions
and links them to a user’s bank account when a transaction is underway. This scheme protects the user from shoulder surfing or
observation attacks, replay attacks and partial observation attacks.
Keywords: ATM, credit card, ATM card, security, QR code, PIN security, attacker, cyber criminal’s
_______________________________________________________________________________________________________
I. INTRODUCTION
ATM transactions have become a basic activity in a person’s daily life. Several factors such as queue length, distractions, length
of time for the interaction, urgency, physical hindrance memorization of PINs, co-located user display, speed of interaction, and
the environment are all the problems faced by card users [1][2]. As the card system is ageing, the fraudsters are finding more
methods to attack this system.
These cards contain magnetic strip which stores the information about the PIN and authentication details. Now-a-days, it is
easy to clone the magnetic strip [4] with cheap card readers to avail the information. Uses of chips embedded in the cards are
more secure but there is still the presence of a physical card entity.
II. EXISTING SYSTEM
The existing system is based on physical entities i.e. magnetic cards that are read at an ATM terminal in order to identify and
authenticate a user. A four-digit pin is used as a level of authentication, this pin is known only by the user and the bank. The
credit card, being a physical entity can easily [3] be stolen, and the number of combinations for the pin are limited [5], and if the
attacker can acquire the user’s ATM pin, then the user’s bank account is compromised. The pin can be acquired using shoulder
surfing, card skimming, replay attacks or by analysing the users pattern (how he thinks).
III. PROPOSED SYSTEM
The purpose of our system is to make ATM transactions more secure and lucid. Here we are using QR codes for authentication
and an eight-digit long PIN for securing it.
QR based Card-less ATM Transactions
(J4R/ Volume 02 / Issue 02 / 016)
All rights reserved by www.journalforresearch.org 82
Fig. 1: System flow diagram
The server coordinates the functions and data in the wearable device, ATM machines and the user data stored in the database
of the banks.
SERVER:
The server authenticates the user and the ATM. It generates the transaction id and validity of the current transaction when it
receives the request id from the client on initiation of a transaction. The transaction id is generated using a SHA-512 hashing
algorithm and hence is unique as one of the components used in the generation of the transaction id is the timestamp of the
moment that the transaction was initiated on the client. This unique transaction id is logged to the database and also sent to client
terminal for creation of the ATM QR code.
Fig. 3.1: System Overview
When an Android sends a scanned transaction id the system links the ownerless transaction identified from the QR code
containing the transaction id, to the user that scanned the QR code. This transaction is now linked to a user.
The server then receives the transaction details from the android application that the user enters. A PIN-template is generated
and sent to the Android app which will act as an extra layer of security. The PIN template will consist of eight or more digits in
which four of them are positions for the user’s ATM pin and the rest are generated and positioned randomly in the template [1].
The client then sends an authentication request when the user enters the pin template completed with the user’s private ATM pin
into the terminal. The server then sends the transaction details to the client and the appropriate action is taken at the client
terminal, e.g. Withdrawal of money, mini statements etc.
The transaction id is marked as used in the server immediately after the transaction completes or after a timeout so that it
cannot be misused by an attacker.
ATM Machine:
The ATM machine generated a request id when a transaction is initiated. The request code, the ATM machine’s identification
and the current time are sent to the server to generate a transaction id. The client receives the transaction id from the server and
renders it as a QR code. This is scanned by the Android client.
The ATM client the scans the QR generated by the phone, verify the entered pin template and complete the transaction.
QR based Card-less ATM Transactions
(J4R/ Volume 02 / Issue 02 / 016)
All rights reserved by www.journalforresearch.org 83
Bank:
The bank manages the user details on a central server, the details of the user, ie. The user’s bank account no and debit card no are
linked to their email id, making Android login easier to implement. It also stores the details of the ATM machine located at each
location and provides real time monitoring of the ATM Machines’ status. The Server is linked to the Bank Database which
contains the actual account database.
Android Application:
The android application provides the platform for the user to interact with the system. The users have to login in the app. This
application consists both a QR generator and a QR scanner. The user when enters the ATM he scans the QR code on the ATM
screen. This links the transaction id to this user. The pin template is shown on the app. Then the user enters the transaction
details and the amount to be withdrawn. After this the app will generate a QR which have to be scanned by the ATM. A final
stage of verification, i.e. Entering the pin template completed with the user’s pin into the ATM client. The cash can be only be
withdrawn if the final authentication is successful.
IV. SYSTEM PROTOCOL
The interactions and message passed is explained as follows:
1) Step 1: The user enters the ATM along with his personal mobile device. He touches the ATM screen to initiate the
transaction.
2) Step 2: A transaction request is send to the server along with the parameters such as the location of the ATM and the
corresponding request id generated by the ATM.
3) Step 3: A transaction id and PIN template is generated and sent back to the ATM client.
4) Step 4: The ATM client generates a QR code using this transaction id.
5) Step 5: The QR generated will be scanned by the android device.
6) Step 6: The Server links the transaction id with the user that scanned the QR.
7) Step 7: The user inputs his transaction details into his device, at the same time he receives a pin template from the server.
8) Step 8: A QR code will be generated in the android application which have to be scanned by the scanner embedded in the
ATM machine. The ATM terminal gets the transaction details from the user’s device.
9) Step 9: The user enters the pin template completed with the user’s personal pin. This completes the Authentication.
10) Step 10: After the authentication, the amount can be withdrawn from the ATM.
V. CONCLUSION
The system is designed in such a way that it can be more resistant to attacks such as card-skimming, observation attacks, replay
attacks and relay attacks. This system is more efficient and secure than the existing ATM system. No malpractices can be done in
the case of this system.
VI. FUTURE SCOPE
Modifications and new features can be added to this project. A biometric authentication be used instead of one QR scanning.
REFERENCES
[1] SEPIA:Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices. Rasib Khan, Ragib Hasan, and Jinfang Xu SECRETLab,
Department of Computer and Information Sciences.
[2] “Secure mobile-based financial transactions,” S. N. White , Feb 2013, US Patent 8,374,916
[3] “Understanding credit card frauds,” T. P. Bhatla, V. Prabhu, and A. Dua Cards business review, vol. 1, no. 6, 2003.
[4] “Cloning credit cards: A combined pre-play and downgrade attack on emv contactless.” M. Roland and J. Langer, in Proceedings of The 7th
USENIX
Workshop on Offensive Technologies, 2013.
[5] R. Anderson, “Why cryptosystems fail,” in Proceedings of the 1st ACM Conference on Computer and Communications Security. ACM, 1993

Contenu connexe

Tendances

How Credit Card Processing Works
How Credit Card Processing WorksHow Credit Card Processing Works
How Credit Card Processing WorksBusiness.com
 
National payment system architecture
National payment system architectureNational payment system architecture
National payment system architectureAnil Chaurasiya
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
ATM BANKING SYSTEM
ATM BANKING SYSTEMATM BANKING SYSTEM
ATM BANKING SYSTEMsathish sak
 
Introduction To CryptoCurrency
Introduction To CryptoCurrencyIntroduction To CryptoCurrency
Introduction To CryptoCurrencySanjay Kumar
 
Digital banking
Digital banking Digital banking
Digital banking VIPIN KP
 
UPI Technology
UPI TechnologyUPI Technology
UPI Technologyindiastack
 
How an online payment gateway works
How an online payment gateway worksHow an online payment gateway works
How an online payment gateway worksIkajo International
 
Payment Gateway Integration: Growth Strategy for SAAS
Payment Gateway Integration: Growth Strategy for SAASPayment Gateway Integration: Growth Strategy for SAAS
Payment Gateway Integration: Growth Strategy for SAASWayne Akey
 
Indian cashless transaction ppt
Indian  cashless transaction pptIndian  cashless transaction ppt
Indian cashless transaction pptsweetishu
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineDiotima Gupta
 
Crossing Borders – Key Payment Systems Outside the U.S.
Crossing Borders – Key Payment Systems Outside the U.S.Crossing Borders – Key Payment Systems Outside the U.S.
Crossing Borders – Key Payment Systems Outside the U.S.Nasreen Quibria
 
RBI : Payment & Settlement Systems
RBI : Payment & Settlement SystemsRBI : Payment & Settlement Systems
RBI : Payment & Settlement SystemsRahul Deka
 
Unified Payment Interface (UPI)
Unified Payment Interface (UPI)Unified Payment Interface (UPI)
Unified Payment Interface (UPI)Ravindra Dastikop
 
Payments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian OverviewPayments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian OverviewAkshay Kaul
 

Tendances (20)

E cash payment
E cash paymentE cash payment
E cash payment
 
How Credit Card Processing Works
How Credit Card Processing WorksHow Credit Card Processing Works
How Credit Card Processing Works
 
National payment system architecture
National payment system architectureNational payment system architecture
National payment system architecture
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
ATM BANKING SYSTEM
ATM BANKING SYSTEMATM BANKING SYSTEM
ATM BANKING SYSTEM
 
Introduction To CryptoCurrency
Introduction To CryptoCurrencyIntroduction To CryptoCurrency
Introduction To CryptoCurrency
 
Digital banking
Digital banking Digital banking
Digital banking
 
Digital payments
Digital payments Digital payments
Digital payments
 
UPI Technology
UPI TechnologyUPI Technology
UPI Technology
 
How an online payment gateway works
How an online payment gateway worksHow an online payment gateway works
How an online payment gateway works
 
Payment Gateway Integration: Growth Strategy for SAAS
Payment Gateway Integration: Growth Strategy for SAASPayment Gateway Integration: Growth Strategy for SAAS
Payment Gateway Integration: Growth Strategy for SAAS
 
Atm
AtmAtm
Atm
 
9. po s point of sale
9.   po s   point of sale9.   po s   point of sale
9. po s point of sale
 
Indian cashless transaction ppt
Indian  cashless transaction pptIndian  cashless transaction ppt
Indian cashless transaction ppt
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
Crossing Borders – Key Payment Systems Outside the U.S.
Crossing Borders – Key Payment Systems Outside the U.S.Crossing Borders – Key Payment Systems Outside the U.S.
Crossing Borders – Key Payment Systems Outside the U.S.
 
RBI : Payment & Settlement Systems
RBI : Payment & Settlement SystemsRBI : Payment & Settlement Systems
RBI : Payment & Settlement Systems
 
Unified Payment Interface (UPI)
Unified Payment Interface (UPI)Unified Payment Interface (UPI)
Unified Payment Interface (UPI)
 
Payments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian OverviewPayments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian Overview
 
Payment systems
Payment systemsPayment systems
Payment systems
 

En vedette

Prezentacja miejscowość
Prezentacja miejscowośćPrezentacja miejscowość
Prezentacja miejscowośćwojcickr
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
 
What makes good strategy? By Alex Wood, strategy director, DT
What makes good strategy? By Alex Wood, strategy director, DTWhat makes good strategy? By Alex Wood, strategy director, DT
What makes good strategy? By Alex Wood, strategy director, DTThe Communications Council
 
The 8 natural doctors
The 8 natural doctorsThe 8 natural doctors
The 8 natural doctorsRomaLouise
 
mpld3でInteractiveデータ可視化
mpld3でInteractiveデータ可視化mpld3でInteractiveデータ可視化
mpld3でInteractiveデータ可視化monochrojazz
 
大阪市オープンデータポータルAPI(SPARQL)勉強会
大阪市オープンデータポータルAPI(SPARQL)勉強会大阪市オープンデータポータルAPI(SPARQL)勉強会
大阪市オープンデータポータルAPI(SPARQL)勉強会Kouji Kozaki
 
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINEFUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINEJournal For Research
 
PEMBANGUNAN BANDAR MAMPAN
PEMBANGUNAN BANDAR MAMPAN PEMBANGUNAN BANDAR MAMPAN
PEMBANGUNAN BANDAR MAMPAN Ashikin Mohamed
 
El viaje del salmón de los ríos asturianos
El viaje del salmón de los ríos asturianosEl viaje del salmón de los ríos asturianos
El viaje del salmón de los ríos asturianosanaburduliz
 
Proyecto de investigación marta
Proyecto de investigación martaProyecto de investigación marta
Proyecto de investigación martaMarta Martínez
 

En vedette (14)

Menu final
Menu finalMenu final
Menu final
 
Prezentacja miejscowość
Prezentacja miejscowośćPrezentacja miejscowość
Prezentacja miejscowość
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
What makes good strategy? By Alex Wood, strategy director, DT
What makes good strategy? By Alex Wood, strategy director, DTWhat makes good strategy? By Alex Wood, strategy director, DT
What makes good strategy? By Alex Wood, strategy director, DT
 
Animales del desierto 2
Animales del desierto 2Animales del desierto 2
Animales del desierto 2
 
The 8 natural doctors
The 8 natural doctorsThe 8 natural doctors
The 8 natural doctors
 
Sabias que?...
Sabias que?...Sabias que?...
Sabias que?...
 
Strategic entrepreneurial growth
Strategic entrepreneurial growthStrategic entrepreneurial growth
Strategic entrepreneurial growth
 
mpld3でInteractiveデータ可視化
mpld3でInteractiveデータ可視化mpld3でInteractiveデータ可視化
mpld3でInteractiveデータ可視化
 
大阪市オープンデータポータルAPI(SPARQL)勉強会
大阪市オープンデータポータルAPI(SPARQL)勉強会大阪市オープンデータポータルAPI(SPARQL)勉強会
大阪市オープンデータポータルAPI(SPARQL)勉強会
 
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINEFUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
 
PEMBANGUNAN BANDAR MAMPAN
PEMBANGUNAN BANDAR MAMPAN PEMBANGUNAN BANDAR MAMPAN
PEMBANGUNAN BANDAR MAMPAN
 
El viaje del salmón de los ríos asturianos
El viaje del salmón de los ríos asturianosEl viaje del salmón de los ríos asturianos
El viaje del salmón de los ríos asturianos
 
Proyecto de investigación marta
Proyecto de investigación martaProyecto de investigación marta
Proyecto de investigación marta
 

Similaire à QR BASED CARD-LESS ATM TRANSACTIONS

BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET Journal
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformaticsijtsrd
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric TransactionIRJET Journal
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...IJSRED
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for BankingIRJET Journal
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...IRJET Journal
 

Similaire à QR BASED CARD-LESS ATM TRANSACTIONS (20)

BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
N044057478
N044057478N044057478
N044057478
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
D0351022026
D0351022026D0351022026
D0351022026
 
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
C132733
C132733C132733
C132733
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
40120140501002
4012014050100240120140501002
40120140501002
 
EZ-PASS
EZ-PASSEZ-PASS
EZ-PASS
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 

Plus de Journal For Research

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Journal For Research
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Journal For Research
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Journal For Research
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016Journal For Research
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...Journal For Research
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014Journal For Research
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...Journal For Research
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...Journal For Research
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012Journal For Research
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...Journal For Research
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008Journal For Research
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002Journal For Research
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001Journal For Research
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021Journal For Research
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...Journal For Research
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023Journal For Research
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024Journal For Research
 

Plus de Journal For Research (20)

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
 

Dernier

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Dernier (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

QR BASED CARD-LESS ATM TRANSACTIONS

  • 1. Journal for Research| Volume 02| Issue 02 | April 2016 ISSN: 2395-7549 All rights reserved by www.journalforresearch.org 81 QR based Card-less ATM Transactions Meenu Jacob Nikhil Mathew Department Computer Science & Engineering Department Computer Science & Engineering Amal Jyothi College of Engineering Kanjirappally, Kerala, Amal Jyothi College of Engineering Kanjirappally, Kerala, India India Rose Merin Jose Seba Siby Department Computer Science & Engineering Department Computer Science & Engineering Amal Jyothi College of Engineering Kanjirappally, Kerala, Amal Jyothi College of Engineering Kanjirappally, Kerala, India India Prof. Neethu C Sekhar Department Computer Science & Engineering Amal Jyothi College of Engineering Kanjirappally, Kerala, India Abstract In the present scenario ATM transaction are carried out with the help of ATM cards which have to be physically swiped at the ATM machine. The present cash withdrawal system involves swiping the ATM card at an ATM Machine and then input a four digit pin into the terminal for verification. This method is susceptible to many types of attacks such as shoulder surfing, replay attack and ATM card skimming. In this paper, we are proposing a system in which a QR code is used as an alternative to the physical ATM card based authentication. This system can be incorporated in smartphones and other wearable device thereby eliminating the need for carrying ATM cards. QR codes are generated in the wearable device as well as the ATM machine to carry out User Authorization. An eight-digit long pin is generated to make the system more secure than present one. A background server is used to generate unique 8 digit pins for each transaction. This background server also manages transactions and links them to a user’s bank account when a transaction is underway. This scheme protects the user from shoulder surfing or observation attacks, replay attacks and partial observation attacks. Keywords: ATM, credit card, ATM card, security, QR code, PIN security, attacker, cyber criminal’s _______________________________________________________________________________________________________ I. INTRODUCTION ATM transactions have become a basic activity in a person’s daily life. Several factors such as queue length, distractions, length of time for the interaction, urgency, physical hindrance memorization of PINs, co-located user display, speed of interaction, and the environment are all the problems faced by card users [1][2]. As the card system is ageing, the fraudsters are finding more methods to attack this system. These cards contain magnetic strip which stores the information about the PIN and authentication details. Now-a-days, it is easy to clone the magnetic strip [4] with cheap card readers to avail the information. Uses of chips embedded in the cards are more secure but there is still the presence of a physical card entity. II. EXISTING SYSTEM The existing system is based on physical entities i.e. magnetic cards that are read at an ATM terminal in order to identify and authenticate a user. A four-digit pin is used as a level of authentication, this pin is known only by the user and the bank. The credit card, being a physical entity can easily [3] be stolen, and the number of combinations for the pin are limited [5], and if the attacker can acquire the user’s ATM pin, then the user’s bank account is compromised. The pin can be acquired using shoulder surfing, card skimming, replay attacks or by analysing the users pattern (how he thinks). III. PROPOSED SYSTEM The purpose of our system is to make ATM transactions more secure and lucid. Here we are using QR codes for authentication and an eight-digit long PIN for securing it.
  • 2. QR based Card-less ATM Transactions (J4R/ Volume 02 / Issue 02 / 016) All rights reserved by www.journalforresearch.org 82 Fig. 1: System flow diagram The server coordinates the functions and data in the wearable device, ATM machines and the user data stored in the database of the banks. SERVER: The server authenticates the user and the ATM. It generates the transaction id and validity of the current transaction when it receives the request id from the client on initiation of a transaction. The transaction id is generated using a SHA-512 hashing algorithm and hence is unique as one of the components used in the generation of the transaction id is the timestamp of the moment that the transaction was initiated on the client. This unique transaction id is logged to the database and also sent to client terminal for creation of the ATM QR code. Fig. 3.1: System Overview When an Android sends a scanned transaction id the system links the ownerless transaction identified from the QR code containing the transaction id, to the user that scanned the QR code. This transaction is now linked to a user. The server then receives the transaction details from the android application that the user enters. A PIN-template is generated and sent to the Android app which will act as an extra layer of security. The PIN template will consist of eight or more digits in which four of them are positions for the user’s ATM pin and the rest are generated and positioned randomly in the template [1]. The client then sends an authentication request when the user enters the pin template completed with the user’s private ATM pin into the terminal. The server then sends the transaction details to the client and the appropriate action is taken at the client terminal, e.g. Withdrawal of money, mini statements etc. The transaction id is marked as used in the server immediately after the transaction completes or after a timeout so that it cannot be misused by an attacker. ATM Machine: The ATM machine generated a request id when a transaction is initiated. The request code, the ATM machine’s identification and the current time are sent to the server to generate a transaction id. The client receives the transaction id from the server and renders it as a QR code. This is scanned by the Android client. The ATM client the scans the QR generated by the phone, verify the entered pin template and complete the transaction.
  • 3. QR based Card-less ATM Transactions (J4R/ Volume 02 / Issue 02 / 016) All rights reserved by www.journalforresearch.org 83 Bank: The bank manages the user details on a central server, the details of the user, ie. The user’s bank account no and debit card no are linked to their email id, making Android login easier to implement. It also stores the details of the ATM machine located at each location and provides real time monitoring of the ATM Machines’ status. The Server is linked to the Bank Database which contains the actual account database. Android Application: The android application provides the platform for the user to interact with the system. The users have to login in the app. This application consists both a QR generator and a QR scanner. The user when enters the ATM he scans the QR code on the ATM screen. This links the transaction id to this user. The pin template is shown on the app. Then the user enters the transaction details and the amount to be withdrawn. After this the app will generate a QR which have to be scanned by the ATM. A final stage of verification, i.e. Entering the pin template completed with the user’s pin into the ATM client. The cash can be only be withdrawn if the final authentication is successful. IV. SYSTEM PROTOCOL The interactions and message passed is explained as follows: 1) Step 1: The user enters the ATM along with his personal mobile device. He touches the ATM screen to initiate the transaction. 2) Step 2: A transaction request is send to the server along with the parameters such as the location of the ATM and the corresponding request id generated by the ATM. 3) Step 3: A transaction id and PIN template is generated and sent back to the ATM client. 4) Step 4: The ATM client generates a QR code using this transaction id. 5) Step 5: The QR generated will be scanned by the android device. 6) Step 6: The Server links the transaction id with the user that scanned the QR. 7) Step 7: The user inputs his transaction details into his device, at the same time he receives a pin template from the server. 8) Step 8: A QR code will be generated in the android application which have to be scanned by the scanner embedded in the ATM machine. The ATM terminal gets the transaction details from the user’s device. 9) Step 9: The user enters the pin template completed with the user’s personal pin. This completes the Authentication. 10) Step 10: After the authentication, the amount can be withdrawn from the ATM. V. CONCLUSION The system is designed in such a way that it can be more resistant to attacks such as card-skimming, observation attacks, replay attacks and relay attacks. This system is more efficient and secure than the existing ATM system. No malpractices can be done in the case of this system. VI. FUTURE SCOPE Modifications and new features can be added to this project. A biometric authentication be used instead of one QR scanning. REFERENCES [1] SEPIA:Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices. Rasib Khan, Ragib Hasan, and Jinfang Xu SECRETLab, Department of Computer and Information Sciences. [2] “Secure mobile-based financial transactions,” S. N. White , Feb 2013, US Patent 8,374,916 [3] “Understanding credit card frauds,” T. P. Bhatla, V. Prabhu, and A. Dua Cards business review, vol. 1, no. 6, 2003. [4] “Cloning credit cards: A combined pre-play and downgrade attack on emv contactless.” M. Roland and J. Langer, in Proceedings of The 7th USENIX Workshop on Offensive Technologies, 2013. [5] R. Anderson, “Why cryptosystems fail,” in Proceedings of the 1st ACM Conference on Computer and Communications Security. ACM, 1993