Authentication require two or more factors: “something only the user knows”, “something only the user has” and “something only the user is”. The factors must be validated by the other party for validation to occur. In debit cards authentication mechanisms which can be easily cracked using different mechanisms. According to US attorney report at least 7,000 fake identities are used to obtain more than 25,000 credit cards and documented $200 million in losses, but the figure could rise. The present authentication mechanisms use mechanism where we enter our PIN in pos (point of sale) devices where it is vulnerable in case if we have any skimmer devices installed in any one of the component.
Sometimes we have to enter OTP (one time password) in card reader, but it’s vulnerable in case of lost or theft of both mobile and card together. In proposed method, GSM mobile service is used provide the security. Lost Debit Card ATM Card Management System When the Debit card is used, Server will request user to enter a password in his/her mobile phone. If the password valid, Server precedes the transaction, if not so, denies it. The proposed solution effectively prevents clone cards and relay attacks on Debit cards using mobile phone authentication through the flash message service. The proposed solution effectively prevents clone cards and relay attacks on Debit cards using mobile phone authentication through the flash message service. This methodology can be implemented with the current system.
This module is used to create a user registrationsform.After registering application form the users able to enter into process. To register the form following details should be given by the user, the details that should be filled by the user is their personal details and the required details by the bank i.e. the card number, pin code, secret password, account type account branch etc. Then only the users allowed entering the server. Once they activate their account, they are allowed to access their user id.
The particular server will certainly monitor the complete User’s data inside their data source along with verify all of them if expected. Additionally the server will certainly shop the complete User’s data inside their data source. Additionally the server has to establish the connection to be able to get in touch with the users. The particular server will certainly bring up to date the each and every users activities with it is data source. The particular server will certainly authenticate each and every individual previous to many people admittance the application. So that the server will certainly stop the unauthorized individual coming from being able to view the application.
In this module, we track the location of the user access. Every time we monitor the location of the system that they are accessing. The user will frequently use the same location to access the location. So that we can monitor the User usage. This will increase the security level. Also the server stores this information in the database.
ACCESS TIME TAKEN AND AVERAGE AMOUNT
Here we will monitor the access information of the users. The server will monitor the user’s access information along with the time taken to access the ATM. So that based on the Time of usage and amount withdrawn by the users will be stored in the database. So that we may able to retrieve the usage time and amount withdrawn by the users.
SEQUENCE OF USAGE
We also track the usage sequence of each and every user. So that we may able to track the users access details. The system will recognize the users usage sequence. For an example if the users are login into their account and they check their balance and then proceed to withdraw the cash from their respective account.
OTP GENERATION AND SECURITY
The server will check the above mentioned details and generate an One Time Password if these details are varies. This One Time Password will be send to the users mobile number. So that the user is requested to enter their One Time Password and that will be verified by the Server, then only they are allowed to access to the system. To generate the One Time Password, we are using a Secure Random Number Generation algorithm. To generate the SMS to User mobile number we are using JSMS. Jar file which is used to send the SMS from the Server system to external device will transmit the SMS to the Concerned User‟s Mobile Number. In very rare cases we handle a difficulty about the coverage of mobile network is nil, so at that time we use security question as an alternative to access the ATM.
Machine learning is a field of study that involves the development of algorithms that allow computers to learn from data…
Machine learning is a rapidly growing field that has the potential to revolutionize the way we approach complex problems and…
Machine learning has become an integral part of our lives, and it has made a significant impact on various industries.…