Presentation on theme: "MONEY PAD THE FUTURE WALLET NAME : ANKITA GHOSAL REGISTRATION NO : 0811017059 BRANCH : IT-C SEMESTER : 7th SUBMITTED BY:"— Presentation transcript:
MONEY PAD THE FUTURE WALLET NAME : ANKITA GHOSAL REGISTRATION NO : 0811017059 BRANCH : IT-C SEMESTER : 7th SUBMITTED BY:
CONTENTS 1.INTRODUCTION TO MONEY PAD 2.HISTORY OF MONEY PAD 3.WHY MONEY PAD IS KNOWN AS FUTURE WALLET? 4.DIMENSION OF MONEY PAD CARD 5.CHIPS BEING USED 6.DESCRIPTION OF CHIP 7.TYPICAL CONFIGURATIONS 8.MONEY PAD READERS 9.SECURITY MECHANISM 10.AN OVERVIEW OF FINGER PRINT RECOGNITION 11.ADVANTAGES 12.DISADVANTAGES
Money Pad is a form of credit card or smart card similar to floppy disk, which is introduced to provide, secure e-cash transactions. It uses the biometrics technology for Finger Print recognition. The card contains a small, built in microcomputer chip and integrated circuit that can store and process a lot of data.
Money Pad is a method developed by Tobias Wong for binding bills (usually of one or two dollar denominations) so that they can be easily carried around, and torn off the pad whenever needed for payment. Another type of Money Pad is a futuristic wallet that operates like a credit card or smartcard, automatically verifying the user's identity before issuing cash debits thus providing security.
Just as every thing is getting under the shadow of "e" today we have paper currency being replaced by electronic money or e-cash. Electronically initiated debits and credits has become the dominant payment modes in todays world & there is no need to carry cash in wallet. The purpose is served by MONEY PAD, thus referring it as a WALLET.
85.6mm x 53.98mm x 0.76mm(defined by ISO 7816)
Vcc RST CLK AUX1 GND SWP I/O AUX2
Vcc - gives the biasing voltage to the smart card. RST- resets the data stored in the smart card. CLK- provides the clock signals for the operations. GND – provides ground as usual. Vpp –provides the programming voltage to the EEPROM.But now it is not used, because the modern cards are capable of generating programming voltage by itself when comes in contact with a reader. I/P,O/P- is the input output port. AUX1/2- are auxiliary contacts, used by USB devices.
256 bytes to 4KB RAM. 8KB to 32KB ROM. 1KB to 32KB EEPROM. Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional. 8-bit to 16-bit CPU. 8051 based designs are common. The price of a mid-level chip when produced in bulk is less than US$1.
Computer based readers Connect through USB or COM (Serial) ports Dedicated terminals Usually with a small screen, keypad, printer, often also have biometric devices such as thumb print scanner.
MONEY PAD USES BIOMETRICS TECHNOLOGY AS A SECURITY MEASURE. MECHANISM: Every time the user wants to access the Money Pad he has to make an impression of his fingers which will be scanned and matched with the one in the hard disk of data base server. If the finger print matches with the user's he will be allowed to access and use the Pad other wise the Money Pad is not accessible. Thus it provides a form of security to the ever-lasting transaction currency of the future "e-cash."
Fingerprint identification is also known as dactyloscopy or hand print identification. It is the analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include three basic patterns of fingerprint ridges are the arch, loop, and whorl. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies. ARCHLOOPWHORL
Fingerprint sensors A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. Pattern Based Algorithm Matching algorithms are used to compare previously stored templates of fingerprints against candidate fingerprints for authentication purposes. Pattern based algorithms/Image based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that the images be aligned in the same orientation. To do this, the algorithm finds a central point in the fingerprint image and centers on that. In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.
An efficient fingerprint recognition algorithm is a PHASE BASED IMAGE MATCHING, an image matching technique using the phase components in 2D Discrete Fourier Transforms (DFTs) of given images. The technique has been successfully applied to high accuracy image registration tasks for computer vision applications, where estimation of sub-pixel image translation is a major concern. The principle of phase-based image matching is introduced using the Phase-Only Correlation (POC) function(which is sometimes called the phase-correlation function) Consider two N1×N2 images, regitered finger print image f(n1, n2) and input finger print image g(n1, n2), where we assume that the index ranges are n1 = M1 · · ·M1 (M1 > 0) and n2 = M2 · · ·M2 (M2 > 0) The proposed algorithm consists of the four steps: I.Core detection II.Rotation and displacement alignment III.Common region extraction and IV.Fingerprint matching.
f(n1,n2)g(n1,n2) Core Detection Do both images have their core? Displacement alignment using the cores Rotation Alignment Common region extraction Finger Print Matching Rotation Alignment Displacement alignment using the cores Matching score NOYES Flow Diagram For The Proposed Algorithm 1. 2. 3. 4.
Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Card verifies finger print. Stores a status Finger Print Verified. Responds OK Card allows personal transactions and responds OK
Faster and smarter. Portability. Flexibility(no need to carry separate ATM,Debit,Credit card, pan card or cash etc.). Highly secured.(deactivates on illegal use). Reliability (unaffected by electric and magnetic field).
Expensive It uses fingerprint detection for security purpose. So if a persons finger gets accidentally cut or injured, the detection technique will fail to match the patterns.