0% found this document useful (0 votes)
67 views2 pages

Chapter 3-Methodology/Proposed Solution 3.1 Block Diagram

The document describes a proposed system for securing ATM transactions using user image verification and one-time passwords (OTPs). The system would work as follows: 1) A user scans their card and logs in but cannot withdraw money until completing additional authentication. 2) To withdraw money, the user must enter an OTP sent to their registered mobile number after requesting a withdrawal. 3) The system would capture the user's image and verify it matches before completing the transaction. If the image does not match, transaction details would be sent to registered phones. This two-factor authentication system adds security over traditional ATMs by requiring something the user possesses (card and OTP) and something they are (verified image
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views2 pages

Chapter 3-Methodology/Proposed Solution 3.1 Block Diagram

The document describes a proposed system for securing ATM transactions using user image verification and one-time passwords (OTPs). The system would work as follows: 1) A user scans their card and logs in but cannot withdraw money until completing additional authentication. 2) To withdraw money, the user must enter an OTP sent to their registered mobile number after requesting a withdrawal. 3) The system would capture the user's image and verify it matches before completing the transaction. If the image does not match, transaction details would be sent to registered phones. This two-factor authentication system adds security over traditional ATMs by requiring something the user possesses (card and OTP) and something they are (verified image
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Chapter No.

3 :Methodology/Proposed Solution

Chapter 3- Methodology/Proposed Solution

3.1 Block Diagram

Figure3.1: Block Diagram proposed system

Our project proposes a secured ATM (Any time Money) system using a user
image security. Usual ATM systems do not contain the OTP feature for money
withdrawal. If an attacker manages to get hold of ATM card and the pin number he may
easily use it to withdraw money frequently. So our proposed system supports the ATM
user image verification system along with an OTP system.

The user may scan his card and login to the system .But after user is through
with this authentication he may view details but firstly user is verified then asked to
enter OTP as soon as he clicks money withdrawal option. At this stage the system
generates and sends a Onetime password OTP to the registered mobile number to that
particular user. The password is generated ad sent to the user mobile phone. He now
needs to enter the OTP in the system in order to withdraw money. If user is not and the
image of fraud user is saved and fraud alert message send to register mobile number.
6
Chapter No.3 :Methodology/Proposed Solution

The system is nothing but the advancement of the current working ATM system.
There is no change in the methodology/working of the current system, it only consist of
the incrimination of module of this proposed system.

Thus our system provides a totally secure way to perform ATM transactions with two
level security structure. The user needs to start the system in visual studio. We have
used SQL queries for saving, retrieving or fetching data from Database. We are used
c#.net programming algorithms for connection string and connecting front end and back
end.

The system is nothing but the advancement of the current working ATM system. There
is no change in the methodology/working of the current system, it only consist of the
incrimination of module of this proposed system. Registration is the first step of our
proposed system as shown in the above block diagram. The module consist of
registration of the users along with the original account holder who is already registered
so that this user can get access of your ATM account after successful registration.

The next module consist of the process after the card is swiped and the pin is entered .it
keep the transaction on hold before showing the further option to the user until it get
conformation from the account holder. After getting confirmation from account holder
or user as the described in the previous module that the transaction will be on hold. This
module will mean while send a message to theregistered mobile no. asking for
conformation of giving the access. if he allows it will continue else it will be cancelled.

Camera activation consist of activating the service of the camera which is already
placed in the current machine as well. In this the camera will capture the user and image
will be verified. If user is verified the transaction will be continue if user is not verified
the image of the user will be sent to the registered no. Location tracing next step in
which the contamination of the previous module where if the image is not verified the
image of the user along with the location of the ATM will save in system and also sent
to the two registered mobile no. After successful verification of user further process
occur. The image and ATM location if the user allows from any one of registered
mobile no. the transaction will be successfully otherwise transaction will be cancelled.

You might also like