Presentation on theme: "MONEY PAD THE FUTURE WALLET"— Presentation transcript:
1MONEY PAD THE FUTURE WALLET SUBMITTED BY:NAME:ANKITA GHOSALREGISTRATION NO:BRANCH:IT-’C’SEMESTER:7th
2CONTENTS INTRODUCTION TO MONEY PAD HISTORY OF MONEY PAD WHY MONEY PAD IS KNOWN AS FUTURE WALLET?DIMENSION OF MONEY PAD CARDCHIPS BEING USEDDESCRIPTION OF CHIPTYPICAL CONFIGURATIONSMONEY PAD READERSSECURITY MECHANISMAN OVERVIEW OF FINGER PRINT RECOGNITIONADVANTAGESDISADVANTAGES
3INTRODUCTION TO MONEY PAD Money Pad is a form of credit card or smart card similar to floppy disk, which is introduced to provide, secure e-cash transactions.It uses the biometrics technology for Finger Print recognition.The card contains a small, built in microcomputer chip and integrated circuit that can store and process a lot of data.
4HISTORY OF MONEY PADMoney Pad is a method developed by Tobias Wong for binding bills (usually of one or two dollar denominations) so that they can be easily carried around, and torn off the pad whenever needed for payment.Another type of Money Pad is a futuristic wallet that operates like a credit card or smartcard, automatically verifying the user's identity before issuing cash debits thus providing security.
5WHY MONEY PAD IS KNOWN AS THE FUTURE WALLET?Just as every thing is getting under the shadow of "e" today we have paper currency being replaced by electronic money or e-cash.Electronically initiated debits and credits has become the dominant payment modes in today’s world & there is no need to carry cash in wallet. The purpose is served by MONEY PAD, thus referring it as a WALLET.
9DESCRIPTION OF CHIP Vcc - gives the biasing voltage to the smart card. RST- resets the data stored in the smart card.CLK- provides the clock signals for the operations.GND – provides ground as usual.Vpp –provides the programming voltage to the EEPROM.But now it is not used, because the modern cards are capable of generating programming voltage by itself when comes in contact with a reader.I/P,O/P- is the input output port.AUX1/2- are auxiliary contacts, used by USB devices.
10TYPICAL CONFIGURATIONS 256 bytes to 4KB RAM.8KB to 32KB ROM.1KB to 32KB EEPROM.Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional.8-bit to 16-bit CPU based designs are common.The price of a mid-level chip when produced in bulk is less than US$1.
11MONEY PAD READERS Computer based readers Connect through USB or COM (Serial) portsDedicated terminalsUsually with a small screen, keypad, printer, often also have biometric devices such as thumb print scanner.
12SECURITY MECHANISMSMONEY PAD USES BIOMETRICS TECHNOLOGY AS A SECURITY MEASURE.MECHANISM:Every time the user wants to access the Money Pad he has to make an impression of his fingers which will be scanned and matched with the one in the hard disk of data base server.If the finger print matches with the user's he will be allowed to access and use the Pad other wise the Money Pad is not accessible.Thus it provides a form of security to the ever-lasting transaction currency of the future "e-cash."
13AN OVERVIEW OF FINGER PRINT RECOGNITION Fingerprint identification is also known as dactyloscopy or hand print identification.It is the analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern.These include three basic patterns of fingerprint ridges are the arch, loop, and whorl.It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies.ARCHLOOPWHORL
14CONTINUED… Fingerprint sensors A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching.Pattern Based AlgorithmMatching algorithms are used to compare previously stored templates of fingerprints against candidate fingerprints for authentication purposes.Pattern based algorithms/Image based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint.This requires that the images be aligned in the same orientation.To do this, the algorithm finds a central point in the fingerprint image and centers on that.In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image.The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.
15CONTINUED…An efficient fingerprint recognition algorithm is a PHASE BASED IMAGE MATCHING, an image matching technique using the phase components in 2D Discrete Fourier Transforms (DFTs) of given images.The technique has been successfully applied to high accuracy image registration tasks for computer vision applications, where estimation of sub-pixel image translationis a major concern.The principle of phase-based image matching is introduced using the Phase-Only Correlation (POC) function(which is sometimes called the “phase-correlation function”)Consider two N1×N2 images, regitered finger print image f(n1, n2) and input finger print image g(n1, n2), where we assume that the index ranges are n1 =−M1 · · ·M1 (M1 > 0) and n2 = −M2 · · ·M2 (M2 > 0)The proposed algorithm consists of the four steps:Core detectionRotation and displacement alignmentCommon region extraction andFingerprint matching.
16Do both images have their core? YES NO f(n1,n2)g(n1,n2)184.108.40.206.Core DetectionCore DetectionDo both images have their core?YESNODisplacement alignment using the coresRotation AlignmentRotation AlignmentDisplacement alignment using the coresCommon region extractionFinger Print MatchingMatching scoreFlow Diagram For The Proposed Algorithm
17HOW DOES IT ALL WORK? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset)ATR negotiations take place to set up data transfer speeds, capability negotiations etc.Card verifies finger print. Stores a status “Finger Print Verified”. Responds “OK”Card allows personal transactions and responds “OK”
18ADVANTAGES Faster and smarter. Portability. Flexibility(no need to carry separate ATM,Debit,Credit card, pan card or cash etc.).Highly secured.(deactivates on illegal use).Reliability (unaffected by electric and magnetic field).
19DISADVANTAGES Expensive It uses fingerprint detection for security purpose. So if a person’s finger gets accidentally cut or injured, the detection technique will fail to match the patterns.