National Conference on Research Trends in Computer Science and Technology

In: Computers and Technology

Submitted By ogbuefi
Words 2126
Pages 9
International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X

National Conference on Research Trends in Computer Science and Technology - 2012

Implementation of ATM Security by Using Fingerprint recognition and GSM
PENNAM KRISHNAMURTHY (M.Tech)
Email: ecemurthy@gmail.com

MR. M. MADDHUSUDHAN REDDDY M.TECH
Email: maddhusudhanreddi@gmail.com

Abstract - The main objective of this system is to develop an embedded system, which is used for ATM security applications. In these systems, Bankers will collect the customer finger prints and mobile number while opening the accounts then customer only access ATM machine. The working of these ATM machine is when customer place finger on the finger print module when it access automatically generates every time different 4-digit code as a message to the mobile of the authorized customer through GSM modem connected to the microcontroller. The code received by the customer should be entered by pressing the keys on the touch screen. After entering it checks whether it is a valid one or not and allows the customer further access. Keywords - ATM terminal; ARM9; fingerprint recognition; image enhancement; GSM MODEM.

II. THE CHARACTERISTICS OF THE SYSTEM DESIGN
The embedded ATM client authentication system is based on fingerprint recognition which is designed after analyzed existed ATM system. The S3C2440 chip is used as the core of these embedded system which is associated with the technologies of fingerprint recognition and current high speed network communication. The primary functions are shown as follows: • Fingerprint recognition: The masters' fingerprint information was used as the standards of identification. It must certify the feature of the human fingerprint before using ATM system. • Remote authentication: System can compare current client's…...

Similar Documents

Computer Science

... Page 2 of 3 7. A company stores data about its employees on a computer file. Part of the file is shown below. Employee code 1214 7774 45875 75582 Employee name John, Smith Andrews, James Andrews, Mary George, Joanna Job Title Marketing manager Sales Person Sales Manager Sales Person Gender M M F F Phone number 3542156 7585546 7585546 3588854 Date of birth 17/5/1963 4/12/1974 5/8/1976 6/11/1971 Select the data items from the list: 75582, Gender, “F”, “John, Smith” 8. What are the characteristics of fixed-length records? 9. What are the characteristics of variable-length records ? 10. What are the characteristics of a serial access file? Can it be stored on a magnetic tape? Can it be stored on a magnetic disk? 11. What are the characteristics of a direct access file? Can it be stored on a magnetic disk? Can it be stored on a magnetic tape? 12. What is meant by updating a file? 13. A company keeps details of employees on a computer file. Describe a situation that would lead to inserting a new record. 14. A company keeps details of employees on a computer file. Describe a situation that would lead to amending a record. 15. A company keeps details of employees on a computer file. Describe a situation that would lead to deleting a record. 16. What is meant by the computer term master file? 17. What is meant by the computer term transaction file? 1112-90912 -V1 18. What does to sort a file mean? Level......

Words: 590 - Pages: 3

Computer Science

... Alice's PIN? Question 3 A bank wants to store the account number of its customers (an 8-digit number) in encrypted form on magnetic stripe ATM cards. Discuss the security of the following methods for storing the account number against an attacker who can read the magnetic stripe: (1) store a cryptographic hash of the account number; (2) store the ciphertext of the account number encrypted with the bank's public key using a public-key cryptosystem; (3) store the ciphertext of the account number encrypted with the bank's secret key using a symmetric cryptosystem. Question 4 As soon as Barack took office, he decided to embrace modern technology by communicating with cabinet members over the Internet using a device that supports cryptographic protocols. In a first attempt, Barack exchanges with Tim brief text messages, encrypted with public-key cryptography, to decide the exact amounts of bailout money to give to the largest 10 banks in the country. Let pB and pT be the public keys of Barack and Tim, respectively. A message m sent by Barack to Tim is transmitted as EpT (m) and the reply r from Tim to Barack is transmitted as EpB(r). The attacker can eavesdrop the communication and knows the following information: _ Public keys pB and pT and the encryption algorithm, such that there is exactly one ciphertext for each plaintext. _ The total amount of bailout money authorized by congress is $900B _ The names of the largest 10 banks _ The amount each bank will get is...

Words: 937 - Pages: 4

National Conference on Research Trends in Computer Science and Technology

...International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology - 2012 Implementation of ATM Security by Using Fingerprint recognition and GSM PENNAM KRISHNAMURTHY (M.Tech) Email: ecemurthy@gmail.com MR. M. MADDHUSUDHAN REDDDY M.TECH Email: maddhusudhanreddi@gmail.com Abstract - The main objective of this system is to develop an embedded system, which is used for ATM security applications. In these systems, Bankers will collect the customer finger prints and mobile number while opening the accounts then customer only access ATM machine. The working of these ATM machine is when customer place finger on the finger print module when it access automatically generates every time different 4-digit code as a message to the mobile of the authorized customer through GSM modem connected to the microcontroller. The code received by the customer should be entered by pressing the keys on the touch screen. After entering it checks whether it is a valid one or not and allows the customer further access. Keywords - ATM terminal; ARM9; fingerprint recognition; image enhancement; GSM MODEM. II. THE CHARACTERISTICS OF THE SYSTEM DESIGN The embedded ATM client authentication system is based on fingerprint recognition which is designed after analyzed existed ATM system. The S3C2440 chip is used as the core of these embedded system which is...

Words: 2126 - Pages: 9

Computer Science

... ________________ attack is to overwhelm a server or network segment to the point it becomes unusable. A successful ________ attack crashes a server or network device or creates so much network congestion that authorized users cannot access network resources.Answer | | | | | Selected Answer: |    denial of service (DoS) | Correct Answer: |    denial of service (DoS) | | | | |  Question 19 0.5 out of 0.5 points | | | Which attack exploits a vulnerability in Domain Name System (DNS) server software?Answer | | | | | Selected Answer: |    Pharming | Correct Answer: |    Pharming | | | | |  Question 20 0.5 out of 0.5 points | | | Which virus primarily infects executable programs?Answer | | | | | Selected Answer: |    File infector virus | Correct Answer: |    File infector virus | | | | | CHAPTER 12  Question 1 0.5 out of 0.5 points | | | _____________ produces standards that affect nearly all aspects of IT. Unlike other organizations that specifically focus on engineering or technical aspects of computing and communication, ______________ primarily addresses standards that support software development and computer system operation.Answer | | | | | Selected Answer: |    American National Standards Institute (ANSI) | Correct Answer: |    American National Standards Institute (ANSI) | | | | |  Question 2 0.5 out of 0.5 points | | | Your organization is about to create its......

Words: 12833 - Pages: 52

Computer Science

...Von Neumann was a founding figure in computer science.[49] Von Neumann's hydrogen bomb work was played out in the realm of computing, where he and Stanislaw Ulam developed simulations on von Neumann's digital computers for the hydrodynamic computations. During this time he contributed to the development of the Monte Carlo method, which allowed solutions to complicated problems to be approximated using random numbers. He was also involved in the design of the later IAS machine. Because using lists of "truly" random numbers was extremely slow, von Neumann developed a form of making pseudorandom numbers, using the middle-square method. Though this method has been criticized as crude, von Neumann was aware of this: he justified it as being faster than any other method at his disposal, and also noted that when it went awry it did so obviously, unlike methods which could be subtly incorrect. While consulting for the Moore School of Electrical Engineering at the University of Pennsylvania on the EDVAC project, von Neumann wrote an incomplete First Draft of a Report on the EDVAC. The paper, whose public distribution nullified the patent claims of EDVAC designers J. Presper Eckert and John William Mauchly, described a computer architecture in which the data and the program are both stored in the computer's memory in the same address space.[50] John von Neumann also consulted for the ENIAC project, when ENIAC was being modified to contain a stored program. Since the modified ENIAC...

Words: 625 - Pages: 3

Computer Science

... baseline will be kept under good maintenance and updated after major software upgrades and operating system updates. Server Certificates Managing the server’s certificates is a delicate but necessary matter, if done thoroughly he server will be more secure. All certificate date ranges will be kept in check to make sure that they are valid, we will also ensure that certificates are used for the right purposes. Service Packs Microsoft is as active at fixing its vulnerabilities as the users themselves are. So an active method of keeping our system safe is by keeping an eye of for hot fixes, patches and services packs that are sent from Microsoft to further fine tune the windows server. References https://www.ontariomd.ca/portal/server.pt/gateway/PTARGS_0_3897_0_0_18/Server_Hardening_Checklist.pdf http://www.sans.org/reading-room/whitepapers/win2k/windows-2000-vulnerabilities-fixes-185 http://www.sans.org/reading-room/whitepapers/win2k/securing-windows-2000-server-189 VALLEY VIEW UNIVERSITY FACULTY OF SCIENCE DEPARTMENT OF INFORMATION TECHNOLOGY AND DEPARTMENT OF COMPUTER SCIENCE INFT 452 / COSC 325: COMPUTER SECURITY / ENTERPRISE INFORMATION SECURITY ASSIGNMENT III STUDENT NAME: DESMOND PAA-OBENG JOHNSON JOELON ERIC STUDENT ID: 211IT02007335 211IT02007305 LECTURER: MR. EBENEZER LARYEA SUBMISSION DATE: 17TH APRIL 2014...

Words: 2126 - Pages: 9

Computer Science

... and other documents that were gleaned from the federal court cases. This was an attempt to monitor the NEDA’s efforts procurement of components that could or may be needed for creation of a nuclear weapon program. Once the stuxnet had penetrated into the system, it had the ability to destroy or degrade the software on which it was operating. The worm covertly tries to identify and exploit some or all of the equipment’s that controls a nation’s critical infrastructure. According to the perspective of many technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society. According to the perspective of many technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society (Theohary, Rollins & Paul, 1). The virus did not affect the functioning of a windows computer performance because it was designed to affect some specific models of programmable logic controllers. Some of the targeted computers were those that were made by Siemens and used in many automated systems like chemical plants, nuclear power plants, refineries and many others. If the computer that has been infected by the virus did not have a PLC software then the software did not have any effect. However if the target software was available, it would...

Words: 1594 - Pages: 7

Organizational Culture of National University of Science and Technology (Nust)

... avoidance in the national culture is aiding the sustainability of the organization. Based on the literature reviewed, although there are short term benefits in the employment of theory X style of management but in the long run there will be an increase in the demand of knowledge workers. The report provides recommendations on what actions NUST can take to improve the situation. 2 ORGANIZATION’S BACKGROUND National University of Sciences and Technology (NUST) is one of the fastest growing institutes in Pakistan. It came into existence in 1981 as a public university. Its purpose was to merge several isolated military training institutes as one. Till 1991 only military cadets were inducted to receive trainings; but later NUST emerged as an institute opened to civilians as well. It received its charter in 1993.Currently it has nine schools and six colleges. Its main campus is situated at H-12 Islamabad. Its military oriented campuses are located in in Karachi, Rawalpindi and Risalpur. NUST offers degree programs in the fields of engineering, technology, business, medicine, and arts. The centralized control of NUST is with retired military officers. NUST has a tall bureaucratic organizational structure. It has a well-disciplined, organized and systematic environment. Most of its value system is deeply influenced by military. 3 RESEARCH METHODOLOGY Qualitative research tools were used to gather data because of the exploratory nature of the study. Eleven in depth interviews......

Words: 3483 - Pages: 14

Computer Science and Technology

...-allocation of resources 11 Several points need to be emphasized • Circuit switching takes place at physical layer • Before starting communication, the stations must make a reservation for the resources to be used during the communication • Data transferred btw the two stations are not packetized • There is no addressing involved during data transfer. The switches route the data based on their occupied band (FDM) or time slot (TDM) 9 Example As a trivial example, let us use a circuit-switched network to connect eight telephones in a small area. Communication is through 4-kHz voice channels. We assume that each link uses FDM to connect a maximum of two voice channels. The bandwidth of each link is then 8 kHz. Figure below shows the situation. Telephone 1 is connected to telephone 7; 2 to 5; 3 to 8; and 4 to 6. Of course the situation may change when new connections are made. The switch controls the connections. 13 14 Issues of circuit switched network • Efficiency: e.g. in computer networks, a computer can be connected to another computer even if there is no activity for a long time; so resources are dedicated and other connections are deprived • Delay: is minimal. – Due to time needed to create the connection, transfer data, and disconnect the circuit 15 Delay in a circuit-switched network 16 Packet Switched Network 17 Overview of Packet Switched Network • For data connections, much of the time the line is idle; circuit-switching...

Words: 1432 - Pages: 6

Database Revision Questions for Computer Science and Technology

...Review Questions 24 I Chapter 1 Databases and Database Users 1.1. Define the following terms: data, database, DBMS, database system, database catalog, Program-data independence, user view, DBA, end user, canned transaction, deductive Database system, persistent object, meta-data, transaction-processing application. 1.2. What three main types of actions involve databases! Briefly discuss each. 1.3. Discuss the main characteristics of the database approach and how it differs from traditional file systems. 1.4. What are the responsibilities of the DBA and the database designers? 1.5. What are the different types of database end users? Discuss the main activities of each. 1.6. Discuss the capabilities that should be provided by a DBMS. Exercises 1.7. Identify some informal queries and update operations that you would expect to apply to the database shown in Figure 1.2. 1.8. What is the difference between controlled and uncontrolled redundancy? Illustrate with examples. 1.9. Name all the relationships among the records of the database shown in Figure 1.2. 1.10. Give some additional views that may be needed by other user groups for the database Shown in Figure 1.2. 1.11. Cite some examples of integrity constraints that you think should hold on the Database shown in Figure 1.2. Chapter 2 Database System Concepts and Architecture Review Questions 2.1. Define the following terms: data model, database schema, database state, internal Schema, conceptual schema, external schema, data...

Words: 803 - Pages: 4

An Evolution of Computer Science Research

...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus...

Words: 15250 - Pages: 61

Technology Trend

...Technology Trends Proposal Part 1 Carolyn Ervin HCS/483 June 22, 2015 Linda Mesko Telemedicine Introduction Telemedicine is an extensive time that Health IT can surround structures for automatically transmitting health information improve, and or sustain a client’s health record. Hein (2009),”This structure will include: remote monitoring the clients’ life and death signs; store-and-forward technology for images and documents; send exchange of data, protect messaging; recommend treatment via video conference and diagnose; and can remind or alert the patients and the doctor.” Summary There are several services and products that are connected with creating the diverse of telemedicine that can involve information technology vendors, pharmacies, medical device manufacture’s, hospitals, and nursing homes. However, which there is a shortage of healthcare professionals, bigger occurrence of chronic conditions, and high healthcare cost, telemedicine can be a better order with having delivery of healthcare (Hein, 2009). Telemedicine do play a very essential part in giving solutions with these provocation. However, telemedicine creates a greater use for the now healthcare professionals to remotely diagnose, watch and to recommend any treatment for clients within the area (Hein, 2009).  But, telemedicine do have a limit on the clients’ exposure to any and all infections because it limit and eliminate for the client to even go visit a physician, and a hospital. With...

Words: 393 - Pages: 2

Computer Science

... transactions, and encrypting or erasing data files and criminal records (Go, 2008). The last category that the author would like to cover is crimes associated with the prevalence of computers. This is basically a sub-set of computer crime that relies on the relatively new computer and information industry (Taylor, Fritsch, Liederbach, & Holt, Digital Crime and Digital Terrorism, Second Edition, 2011). These crimes include intellectual property theft, component theft, counterfeiting, identity theft, and corporate offenses. This category of crimes is committed simply due to the presence of computers. These types of crimes are occurring as a result of modern advancements of technology and widespread use of computers. Some examples include software piracy, copyright violation of computer programs, manufacturing counterfeit computer equipment and other peripherals such as modems and hard disks and selling of original computer equipment, peripherals and programs at far reduced prices in a black market (Go, 2008). Now that the author has identified the main categories of cyber-crime, he would like to point out what he believes to be the most prevalent type of cyber-crime that we face today. According to a 2010 article addressing cyber-crimes, identity theft was said to be the most prevalent. Identity theft falls under the “Crimes Associated with the Prevalence of Computers” umbrella. In America alone there are almost 9 million victims of identity theft every year. The......

Words: 1361 - Pages: 6

Technology Conference Registration Case

...Public Class Form1 Private Sub btnPricing_Click(sender As Object, e As EventArgs) Handles btnPricing.Click ' The btnPricing event handler calculates the estimated cost for ' each attendee to attend the conference. ' Declaration Section Dim decAttendeeCost As Decimal Dim decPrice As Decimal Dim decNumAttend As Decimal If IsNumeric(txtNumAttend.Text) Then decNumAttend = Convert.ToDecimal(txtNumAttend.Text) Else ' Display error message if input is nonnumeric MsgBox("Please enter a number between 1 and 16 in the text box.", , "Input Error") txtNumAttend.Clear() txtNumAttend.Focus() lblPrice.Text = "$000.00" End If ' Is the input between 1 and 16 If decNumAttend < 1 Then MsgBox("Please enter a number between 1 and 16 in the text box.", , "Input Error") txtNumAttend.Clear() txtNumAttend.Focus() lblPrice.Text = "$000.00" ElseIf decNumAttend > 16 Then MsgBox("Please enter a number between 1 and 16 in the text box.", , "Input Error") txtNumAttend.Clear() txtNumAttend.Focus() lblPrice.Text = "$000.00" End If ' Is a radio button selected If radPrevAttend1.Checked = False And radPrevAttend2.Checked = False Then MsgBox("Has an attendee previously...

Words: 406 - Pages: 2

Computer Science

... the society positively.  * In common life also, an individual gets benefited with computer technology. When airports, hospitals, banks, departmental stores have been computerized, people get quick service due to the computer system.  * Computers have created new fields of employment. These employments are in the field of designing, manufacturing, teaching, etc.   Harmful or Negative Impact of Computer in Our Society * Due to any reasons, if the data stored in the computer is lost, the person responsible for handling the computer will have to tolerate a lot.  * People do not use their mind for common arithmetic, which gradually results in loss of their numerical ability.  * Today, any person who does not have the knowledge of computer is considered the second class citizens.  * People have fear that growing children may lose their common sense abilities like numerical ability due to total dependence on computers.  * Due to the computerization workload for the employees reduces many times. As a result, many organization may require to remove some of its employees. It produces the dissatisfaction and lack of security among the employees. Due to this, employees do not corporate the organization. As a result, the output can be disastrous.  * As a result of introduction of new technology in an organization, the organization may need to spend a tremendous amount on the training of its employees.  Positive and Negative Impact of Computer in Society Almost a...

Words: 2409 - Pages: 10