ATM Card Transaction Process and Security Mechanism
ATM Card Transaction Process and Security Mechanism
1
Index
History
How Do ATMs Work
Parts of the Machine
Transaction Process
ATM Security
Attacks on ATM
2
History
Luther Simjian came up with the idea of creating
a "hole-in-the-wall machine" that would allow
customers to make financial transactions.
In 1939, Luther Simjian patented an early and
3
How Do ATMs Work
An ATM is simply a data terminal with two
input and four output devices.
The ATM has to connect to, and communicate
4
Parts of the Machine
5
Continue:
The ATM itself is a dumb terminal
No banking or account information is stored
inside the ATM system.
In order to access such information ATM must be
able to connect to a banking network.
Leased-line machines connect directly to the host
processor through a point-to-point, dedicated
telephone line.
Dial-up ATMs connect to the host processor
through a normal phone line using a modem and
a toll-free number, or through an Internet service
provider using a local access number dialed by
modem.
6
Continue:
Atomicity : A transaction’s changes to the
state are atomic: either all happen or none
happen. These changes include database
changes, messages, and actions on
transducers.
Durability : Once a transaction completes
7
Transaction Process
8
9
10
ATM Security
ATMs keep your personal identification number
(PIN) and other information safe by using
encryption software such as Triple DES (Data
Encryption Standard).
An ATM card is secured as long as the PIN
11
Attacks on ATM
Physical Attack
◦ ATM Skimming
Logical Attacks
◦ Replay Attack
◦ Attack on Confidentiality
◦ Attack on Integrity
12
ATM Skimming
A device that copies the information on the
back of your ATM card, and a small hidden
video camera, used to capture the PIN
number you enter.
The installation of this device typically takes
13
ATM Skimmer Device
14
Solution to ATM Skimmning
There are no solution to skimming but there
are some preventions you can do.
Always use an ATM machine which in a
crowded place.
You can use a machine which is connected to
15
Logical Attacks
Replay Attack
◦ Here the intruder just copies the message sent from
the ATM and tries to send the same message after
some time.
These are very common type of attack on an ATM
transaction.
These types of attacks are prevented using the Time
Stamping method.
16
Attack on Confidentiality
In these attacks the intruder tries to locate
the ATM card’s number and PIN code which
the cardholder has entered.
These types of attacks are prevented using
17
Attack on Integrity
In this attack it is tried to make changes in
transaction e.g. amount has been changed.
These things are prevented using hashing.
In this the digest of the transaction has been
18
References:
www.howstuffworks.com
www.scribd.com
19