Presentation is loading. Please wait.

Presentation is loading. Please wait.

MONEY PAD THE FUTURE WALLET

Similar presentations


Presentation on theme: "MONEY PAD THE FUTURE WALLET"— Presentation transcript:

1 MONEY PAD THE FUTURE WALLET
SUBMITTED BY: NAME:ANKITA GHOSAL REGISTRATION NO: BRANCH:IT-’C’ SEMESTER:7th

2 CONTENTS INTRODUCTION TO MONEY PAD HISTORY OF MONEY PAD
WHY MONEY PAD IS KNOWN AS FUTURE WALLET? DIMENSION OF MONEY PAD CARD CHIPS BEING USED DESCRIPTION OF CHIP TYPICAL CONFIGURATIONS MONEY PAD READERS SECURITY MECHANISM AN OVERVIEW OF FINGER PRINT RECOGNITION ADVANTAGES DISADVANTAGES

3 INTRODUCTION TO MONEY PAD
Money Pad is a form of credit card or smart card similar to floppy disk, which is introduced to provide, secure e-cash transactions. It uses the biometrics technology for Finger Print recognition. The card contains a small, built in microcomputer chip and integrated circuit that can store and process a lot of data.

4 HISTORY OF MONEY PAD Money Pad is a method developed by Tobias Wong for binding bills (usually of one or two dollar denominations) so that they can be easily carried around, and torn off the pad whenever needed for payment. Another type of Money Pad is a futuristic wallet that operates like a credit card or smartcard, automatically verifying the user's identity before issuing cash debits thus providing security.

5 WHY MONEY PAD IS KNOWN AS
THE FUTURE WALLET? Just as every thing is getting under the shadow of "e" today we have paper currency being replaced by electronic money or e-cash. Electronically initiated debits and credits has become the dominant payment modes in today’s world & there is no need to carry cash in wallet. The purpose is served by MONEY PAD, thus referring it as a WALLET.

6 TECHNICAL BACKGROUND

7 DIMENSION OF MONEY PAD CARD
85.6mm x 53.98mm x 0.76mm(defined by ISO 7816)

8 CHIPS BEING USED Vcc RST CLK AUX1 GND SWP I/O AUX2

9 DESCRIPTION OF CHIP Vcc - gives the biasing voltage to the smart card.
RST- resets the data stored in the smart card. CLK- provides the clock signals for the operations. GND – provides ground as usual. Vpp –provides the programming voltage to the EEPROM.But now it is not used, because the modern cards are capable of generating programming voltage by itself when comes in contact with a reader. I/P,O/P- is the input output port. AUX1/2- are auxiliary contacts, used by USB devices.

10 TYPICAL CONFIGURATIONS
256 bytes to 4KB RAM. 8KB to 32KB ROM. 1KB to 32KB EEPROM. Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional. 8-bit to 16-bit CPU based designs are common. The price of a mid-level chip when produced in bulk is less than US$1.

11 MONEY PAD READERS Computer based readers
Connect through USB or COM (Serial) ports Dedicated terminals Usually with a small screen, keypad, printer, often also have biometric devices such as thumb print scanner.

12 SECURITY MECHANISMS MONEY PAD USES BIOMETRICS TECHNOLOGY AS A SECURITY MEASURE. MECHANISM: Every time the user wants to access the Money Pad he has to make an impression of his fingers which will be scanned and matched with the one in the hard disk of data base server. If the finger print matches with the user's he will be allowed to access and use the Pad other wise the Money Pad is not accessible. Thus it provides a form of security to the ever-lasting transaction currency of the future "e-cash."

13 AN OVERVIEW OF FINGER PRINT RECOGNITION
Fingerprint identification is also known as dactyloscopy or hand print identification. It is the analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include three basic patterns of fingerprint ridges are the arch, loop, and whorl. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies. ARCH LOOP WHORL

14 CONTINUED… Fingerprint sensors
A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. Pattern Based Algorithm Matching algorithms are used to compare previously stored templates of fingerprints against candidate fingerprints for authentication purposes. Pattern based algorithms/Image based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that the images be aligned in the same orientation. To do this, the algorithm finds a central point in the fingerprint image and centers on that. In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.

15 CONTINUED… An efficient fingerprint recognition algorithm is a PHASE BASED IMAGE MATCHING, an image matching technique using the phase components in 2D Discrete Fourier Transforms (DFTs) of given images. The technique has been successfully applied to high accuracy image registration tasks for computer vision applications, where estimation of sub-pixel image translation is a major concern. The principle of phase-based image matching is introduced using the Phase-Only Correlation (POC) function(which is sometimes called the “phase-correlation function”) Consider two N1×N2 images, regitered finger print image f(n1, n2) and input finger print image g(n1, n2), where we assume that the index ranges are n1 = −M1 · · ·M1 (M1 > 0) and n2 = −M2 · · ·M2 (M2 > 0) The proposed algorithm consists of the four steps: Core detection Rotation and displacement alignment Common region extraction and Fingerprint matching.

16 Do both images have their core? YES NO
f(n1,n2) g(n1,n2) 1. 2. 3. 4. Core Detection Core Detection Do both images have their core? YES NO Displacement alignment using the cores Rotation Alignment Rotation Alignment Displacement alignment using the cores Common region extraction Finger Print Matching Matching score Flow Diagram For The Proposed Algorithm

17 HOW DOES IT ALL WORK? Card is inserted in the terminal
Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Card verifies finger print. Stores a status “Finger Print Verified”. Responds “OK” Card allows personal transactions and responds “OK”

18 ADVANTAGES Faster and smarter. Portability.
Flexibility(no need to carry separate ATM,Debit,Credit card, pan card or cash etc.). Highly secured.(deactivates on illegal use). Reliability (unaffected by electric and magnetic field).

19 DISADVANTAGES Expensive
It uses fingerprint detection for security purpose. So if a person’s finger gets accidentally cut or injured, the detection technique will fail to match the patterns.

20 THANK YOU ANY QUERIES?


Download ppt "MONEY PAD THE FUTURE WALLET"

Similar presentations


Ads by Google