ATM WITH AN EYE PRESENTED BY G. SATHISHKUMAR 3RD YEAR, EEE, RMK ENGG

Slides:



Advertisements
Similar presentations
Chapter 3: Introduction to Data Communications and Networking
Advertisements

An ATM with an eye.
CONNECTING REMOTE PC WITHOUT ANY SOFTWARE USING CHROME WEB BROWSER WITH ITS ADD-ON/EXTENSION FOR REMOTE ACCESS HASSLE FREE ACCESS USING A COMMON GMAIL.
BIOMETRIC VOTING SYSTEM
Eighth Edition by William Stallings
Biometric Onno W. Purbo Biometric Measurable physiological and / or behavioural characteristics that can be utilised to verify the identity.
Information Technology Foundations-BIT 112 TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
Improving ATM Security via Facial Recognition CPSC510 James Maxlow November 25 th, 2002.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
1 Broadband Integrated Services Digital Network (B-ISDN) Carey Williamson University of Calgary.
Data and Computer Communications
COE 341: Data & Computer Communications (T061) Dr. Marwan Abu-Amara Chapter 1: Data Communications & Networking Overview.
1 Broadband Integrated Services Digital Network (B-ISDN) Carey Williamson University of Calgary.
Learning Outcomes  Know the basic components of a network  Know data transmission methods, including types of signals, modulation, demodulation, and.
Data and Computer Communications
Viewer Software Viewer software is a remote viewer software for control the DVR. -This software supports the multiple functions of the network. -It can.
Karthiknathan Srinivasan Sanchit Aggarwal
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
Networking Technologies
Networking Basics Lesson 1 Introduction to Networks.
KARTIK DABBIRU Roll # EE
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Network Hardware (I) Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute.
Period 4 Araceli Campos Priscilla Moro Andrea Alejandre Bridgette Hernandez.
Huda AL-Omair_ networks61 Wide Area Network. Huda AL-Omair_ networks62 What is a WAN? Wide area network or WAN is a computer network covering a wide geographical.
Infrastructure in Teleradiology CONTENT 1. Introduction 2. Overview of Data Communication 3. Local Area Network 4. Wide Area Network 5. Emerging Technology.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BROADBAND ISDN Presented by Supreeti Mitra EI
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Access Control Via Face Recognition. Group Members  Thilanka Priyankara  Vimalaharan Paskarasundaram  Manosha Silva  Dinusha Perera.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
1 Information Systems CS-507 Lecture Types of Controls Access Controls – Controlling who can access the system. Input Controls – Controls over how.
Wide Area Networks. Wide Area Networks WAN Bridging of any distance Usually for covering of a country or a continent Topology normally is irregular due.
William Stallings Data and Computer Communications
Biometric Technologies
3/25: Telecom & Networking, pt. 2 Network services –ISDN, DSL, Cable modems, etc. –Which to use? ATM E-Commerce & E-Business technologies EDI: Electronic.
Welcome Topic : Security.
WELCOME.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Access Control / Authenticity Michael Sheppard 11/10/10.
Physical security By Ola Abd el-latif Abbass Hassan.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Computer Applications I I dentify alternative input devices and techniques.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 1 – Data Communications, Data Networks, and.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Data and Computer Communications Eighth Edition by William Stallings Chapter 1 – Data Communications, Data Networks, and the Internet.
Data Communications Chapter 1 – Data Communications, Data Networks, and the Internet.
LOGIN by UserId (GujcetNo.), Password and PIN No..
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Authentication and Account Management
Authentication Schemes for Session Passwords using Color and Images
ATM-Asynchronous Transfer Mode
Wireless ATM & Congestion Control
Speaker : Che-Wei Chang
FACE RECOGNITION TECHNOLOGY
Easy Steps to Send Money in Quick Pay
Introduction to Computers
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Services Provided by Network Operating Systems
Two Way Authentication
حاسوب 99 الفصل الصيفي 2016/2017 الفصل الدراسي الأول 2017/2018م الجزء الأول من مادة حاسوب 99 M1 - IT منسق المساق : الدكتور مازن سالم الزيود.
Seminar Presentation on Biometrics
أساسيات تقنية المعلومات
ANEEL ABBASI MUHAMMAD ADNAN MOIZ SHAH MUHAMMAD KHAYAM GROUP MEMBERS.
Presentation Outlines
Synchronous Optical Network (SONET)
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara
Presentation transcript:

ATM WITH AN EYE PRESENTED BY G. SATHISHKUMAR 3RD YEAR, EEE, RMK ENGG ATM WITH AN EYE     PRESENTED BY G.SATHISHKUMAR 3RD YEAR, EEE, RMK ENGG. COLLEGE.

INTRODUCTION

What is an ATM? ATM stands for asynchronous transfer mode It is a data link protocol. ATM is the 1st technique to provide a common format for brusts of high speed data

Asynchronous mode Asynchronous means the recurrence of the cells containing information from an individual user. This technique of choice for evolving B-ISDN(Broad Integrated Service Digital Network)for LAN & MAN.

ATM with an eye It belongs to biometrics. The techniques are finger printing &retina scanning

Parts of ATM Facial recognition program. Linux &windows system. Password. Card

Structure PIN ATM CARD IMAGE

working

Parts of execution Account Live access

Use of softwares Linux Windows xp

CONCLUSION