SlideShare une entreprise Scribd logo
1  sur  17
Communication in
Automatic Teller Machine (ATM)
Knowing in Automatic Teller Machine
(ATM)
A block diagram of an ATM
Hardware
ATM hardware that we often use in our life
Software
VS.
Software
Linux Penguin-OS on ATMs in Brazil
Bank of Philippine running Windows XP OS
State-Chart for One Transaction
Getting
Specifics
Sendingto
Bank
Handling
InvalidPin
Completing
Transaction
Printing
Receipt
Askingifcustomer
wantsanother
Cancelled
Specificsentered
Disapproved
(exceptinvalidPIN)
ApprovedInvalidPIN
Approved
Cancelled
Not
Cancelled
Toomany
InvalidPINs
Disapproved
(exceptinvalidPIN)
OrCancelled
ATM Transaction Processing
Provider
DataCenter
TANDEM CoreBranch
-GPRS
-3G
-ADSL
Encryption
Encryption
Encryption
ATMMachine
Encryption=3DESor AES-256bits
Branch=AES-256bits
ATMMachine=3DES
DisasterRecoverySite
Encryption Encryption
Encryption
NormalConnection
BackupConnection
Branch Transaction Processing
Provider1
DataCenter
TANDEM CoreBranch
Encryption
Encryption
Encryption=3DESor AES-256bits
Branch=AES-256bits
ATMMachine=3DES
DisasterRecoverySite
Encryption Encryption
Encryption
Branch
Provider2
MPLSL2
(Speed512-1024kbps)
MPLSL1
(Speed512-1024kbps)
NormalConnection
BackupConnection
DDN (Digital Data Network)
• Point to point
• Accuracy
• Fast
• Secure
• Backup Connection
• High ROI
• High cost (compare to other technologies)
DDN Applications
DSU/CSU
DSU/CSU
DSU/CSU
DSU/CSU
Router
PC
PC
PC
Mainframe
ATMMachine
Telepresence
DDN LAN
MPLS VPN (Multi Protocol Label
Switching Virtual Private Network)
• Point to point, Point to multi-point
• VPN
• Leverage existing ATM hardware
• Ultra fast forwarding
• IP Traffic Engineering
• Constraint-based Routing
• Controllable tunneling mechanism
• Voice/Video on IP
• QoS constraints
• Cost effective (compare to other technologies)
MPLS
Branch1
Branch6
Branch2
Branch3
Branch4
Branch5
MPLS VPN
MostbankinThailanduse
512-1024kbpslinksspeed.
DDN vs. MPLS
Feature DDN MPLS
Connection Type Point to Point Point to Point, Point to
Multi-Point
Disaster Recovery Link No Yes
VPN Ability No Yes
Price High* Low*
*Compare to other
technologies
3DES (Triple Data Encryption Algorithm)
• Most widely used algorithm
• Pioneered by IBM
• It is symmetric crypto system
• Developed to protect sensitive, unclassified, US
government, Computer data.
• Used to provide authentication of electronic funds transfer
messages.
AES-256bits (Advanced Encryption
Standard)
• Designed simple
• Low memory cost
• High speed algorithm
• The key used to decrypt and encrypt is same
• Cipher text and plain text are same size
• Fast both in Software and Hardware
AES-256bits vs. 3DES**
Feature AES 3DES
Description Advanced
Encryption
Standard
Triple Data
Encryption
Standard
Timeline Official standard
since 2001
Standardized
1997
Type of algorithm Symmetric Symmetric
Key size (bits) 256 168
Speed High Low
Time to crack
(assume a
machine could try
255 key per
second - NIST)
149 trillion years 4.6 billon years
Resource
consumption
Low Medium
**“AES can encrypt data much faster than Triple-
DES, a DES enhancement which essentially
Q&A

Contenu connexe

Tendances

Open Banking - Opening the door to Digital Transformation
Open Banking - Opening the door to Digital Transformation Open Banking - Opening the door to Digital Transformation
Open Banking - Opening the door to Digital Transformation WSO2
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Payment gateway testing
Payment gateway testingPayment gateway testing
Payment gateway testingAtul Pant
 
ATM project presentation
ATM project presentationATM project presentation
ATM project presentationAbdul Rafay
 
The future of banking
The future of bankingThe future of banking
The future of bankingBarbara Biro
 
Digital Bank: What and How
Digital Bank: What and HowDigital Bank: What and How
Digital Bank: What and HowIvano Digital
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
E-Banking System: Opportunities and Challenges – A Study
E-Banking System: Opportunities and Challenges – A StudyE-Banking System: Opportunities and Challenges – A Study
E-Banking System: Opportunities and Challenges – A StudyRHIMRJ Journal
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway SystemMannu Khani
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital PaymentsSantosh Potadar
 
How do at ms work.ppt
How do at ms work.pptHow do at ms work.ppt
How do at ms work.pptNaveen Sihag
 
Digital banking
Digital banking Digital banking
Digital banking VIPIN KP
 

Tendances (20)

IBM Payments Gateway
IBM Payments GatewayIBM Payments Gateway
IBM Payments Gateway
 
Open Banking - Opening the door to Digital Transformation
Open Banking - Opening the door to Digital Transformation Open Banking - Opening the door to Digital Transformation
Open Banking - Opening the door to Digital Transformation
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Payment gateway testing
Payment gateway testingPayment gateway testing
Payment gateway testing
 
Ppt final
Ppt finalPpt final
Ppt final
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
ATM
ATMATM
ATM
 
ATM project presentation
ATM project presentationATM project presentation
ATM project presentation
 
Blockchain
BlockchainBlockchain
Blockchain
 
The future of banking
The future of bankingThe future of banking
The future of banking
 
Digital Bank: What and How
Digital Bank: What and HowDigital Bank: What and How
Digital Bank: What and How
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
E-Banking System: Opportunities and Challenges – A Study
E-Banking System: Opportunities and Challenges – A StudyE-Banking System: Opportunities and Challenges – A Study
E-Banking System: Opportunities and Challenges – A Study
 
Atm transaction
Atm transactionAtm transaction
Atm transaction
 
E wallet
E walletE wallet
E wallet
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway System
 
E cash payment
E cash paymentE cash payment
E cash payment
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital Payments
 
How do at ms work.ppt
How do at ms work.pptHow do at ms work.ppt
How do at ms work.ppt
 
Digital banking
Digital banking Digital banking
Digital banking
 

Similaire à Communication in automatic teller machine (atm)

Shopshifting Warning about potential payment system abuse
Shopshifting Warning about potential payment system abuseShopshifting Warning about potential payment system abuse
Shopshifting Warning about potential payment system abuseAndrey Apuhtin
 
Defcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-posDefcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-posPriyanka Aash
 
Derbycon 2017: Hunting Lateral Movement For Fun & Profit
Derbycon 2017: Hunting Lateral Movement For Fun & ProfitDerbycon 2017: Hunting Lateral Movement For Fun & Profit
Derbycon 2017: Hunting Lateral Movement For Fun & ProfitMauricio Velazco
 
Атаки на мобильные сети
Атаки на мобильные сетиАтаки на мобильные сети
Атаки на мобильные сетиEkaterina Melnik
 
Mobile Network Attack Evolution
Mobile Network Attack EvolutionMobile Network Attack Evolution
Mobile Network Attack EvolutionPositive Hack Days
 
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...TUESDAY Business Network
 
Derived Unique Token per Transaction
Derived Unique Token per TransactionDerived Unique Token per Transaction
Derived Unique Token per TransactionPriyanka Aash
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machineVidya Sagar
 
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Olga Kochetova
 
Revisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’sRevisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’sOlga Kochetova
 
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)Nate Lawson
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionmalvvv
 
Akka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesAkka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesYan Cui
 
Botnet Detection And Countermeasures
Botnet Detection And CountermeasuresBotnet Detection And Countermeasures
Botnet Detection And CountermeasuresSynerzip
 
Versa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionVersa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionRoberto C. Mayer
 
CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming
 CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming  CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming
CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming Anand Bhojan
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineDiotima Gupta
 
Akka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesAkka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesYan Cui
 

Similaire à Communication in automatic teller machine (atm) (20)

Shopshifting Warning about potential payment system abuse
Shopshifting Warning about potential payment system abuseShopshifting Warning about potential payment system abuse
Shopshifting Warning about potential payment system abuse
 
ATM
ATMATM
ATM
 
Defcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-posDefcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-pos
 
Derbycon 2017: Hunting Lateral Movement For Fun & Profit
Derbycon 2017: Hunting Lateral Movement For Fun & ProfitDerbycon 2017: Hunting Lateral Movement For Fun & Profit
Derbycon 2017: Hunting Lateral Movement For Fun & Profit
 
Атаки на мобильные сети
Атаки на мобильные сетиАтаки на мобильные сети
Атаки на мобильные сети
 
Mobile Network Attack Evolution
Mobile Network Attack EvolutionMobile Network Attack Evolution
Mobile Network Attack Evolution
 
Teller pass slides
Teller pass slidesTeller pass slides
Teller pass slides
 
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
 
Derived Unique Token per Transaction
Derived Unique Token per TransactionDerived Unique Token per Transaction
Derived Unique Token per Transaction
 
Automated teller machine
Automated teller machineAutomated teller machine
Automated teller machine
 
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
 
Revisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’sRevisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’s
 
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)
Don't Tell Joanna the Virtualized Rootkit is Dead (Blackhat 2007)
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
 
Akka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesAkka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile games
 
Botnet Detection And Countermeasures
Botnet Detection And CountermeasuresBotnet Detection And Countermeasures
Botnet Detection And Countermeasures
 
Versa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introductionVersa cloud slide-deck-02-technical-introduction
Versa cloud slide-deck-02-technical-introduction
 
CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming
 CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming  CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming
CloudHide: Towards Latency Hiding Techniques for Thin-client Cloud Gaming
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
Akka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile gamesAkka for realtime multiplayer mobile games
Akka for realtime multiplayer mobile games
 

Dernier

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Dernier (20)

LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 

Communication in automatic teller machine (atm)

  • 2. Knowing in Automatic Teller Machine (ATM) A block diagram of an ATM
  • 3. Hardware ATM hardware that we often use in our life
  • 5. Software Linux Penguin-OS on ATMs in Brazil Bank of Philippine running Windows XP OS
  • 6. State-Chart for One Transaction Getting Specifics Sendingto Bank Handling InvalidPin Completing Transaction Printing Receipt Askingifcustomer wantsanother Cancelled Specificsentered Disapproved (exceptinvalidPIN) ApprovedInvalidPIN Approved Cancelled Not Cancelled Toomany InvalidPINs Disapproved (exceptinvalidPIN) OrCancelled
  • 7. ATM Transaction Processing Provider DataCenter TANDEM CoreBranch -GPRS -3G -ADSL Encryption Encryption Encryption ATMMachine Encryption=3DESor AES-256bits Branch=AES-256bits ATMMachine=3DES DisasterRecoverySite Encryption Encryption Encryption NormalConnection BackupConnection
  • 8. Branch Transaction Processing Provider1 DataCenter TANDEM CoreBranch Encryption Encryption Encryption=3DESor AES-256bits Branch=AES-256bits ATMMachine=3DES DisasterRecoverySite Encryption Encryption Encryption Branch Provider2 MPLSL2 (Speed512-1024kbps) MPLSL1 (Speed512-1024kbps) NormalConnection BackupConnection
  • 9. DDN (Digital Data Network) • Point to point • Accuracy • Fast • Secure • Backup Connection • High ROI • High cost (compare to other technologies)
  • 11. MPLS VPN (Multi Protocol Label Switching Virtual Private Network) • Point to point, Point to multi-point • VPN • Leverage existing ATM hardware • Ultra fast forwarding • IP Traffic Engineering • Constraint-based Routing • Controllable tunneling mechanism • Voice/Video on IP • QoS constraints • Cost effective (compare to other technologies)
  • 13. DDN vs. MPLS Feature DDN MPLS Connection Type Point to Point Point to Point, Point to Multi-Point Disaster Recovery Link No Yes VPN Ability No Yes Price High* Low* *Compare to other technologies
  • 14. 3DES (Triple Data Encryption Algorithm) • Most widely used algorithm • Pioneered by IBM • It is symmetric crypto system • Developed to protect sensitive, unclassified, US government, Computer data. • Used to provide authentication of electronic funds transfer messages.
  • 15. AES-256bits (Advanced Encryption Standard) • Designed simple • Low memory cost • High speed algorithm • The key used to decrypt and encrypt is same • Cipher text and plain text are same size • Fast both in Software and Hardware
  • 16. AES-256bits vs. 3DES** Feature AES 3DES Description Advanced Encryption Standard Triple Data Encryption Standard Timeline Official standard since 2001 Standardized 1997 Type of algorithm Symmetric Symmetric Key size (bits) 256 168 Speed High Low Time to crack (assume a machine could try 255 key per second - NIST) 149 trillion years 4.6 billon years Resource consumption Low Medium **“AES can encrypt data much faster than Triple- DES, a DES enhancement which essentially
  • 17. Q&A