0% found this document useful (0 votes)
207 views14 pages

A.T.M.: A Hole in The Wall

The document discusses automated teller machines (ATMs), including their history, components, functionality, and security features. Key points include: - ATMs allow customers to access their bank accounts to withdraw cash, check balances, and perform other transactions without a human bank teller. - Common ATM components include a card reader, PIN pad, display screen, function keys, record printer, and vault for storing cash. - ATM security involves physical protection of the machine as well as encryption of customer information during transactions to prevent fraud.

Uploaded by

ashishkumarak
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
207 views14 pages

A.T.M.: A Hole in The Wall

The document discusses automated teller machines (ATMs), including their history, components, functionality, and security features. Key points include: - ATMs allow customers to access their bank accounts to withdraw cash, check balances, and perform other transactions without a human bank teller. - Common ATM components include a card reader, PIN pad, display screen, function keys, record printer, and vault for storing cash. - ATM security involves physical protection of the machine as well as encryption of customer information during transactions to prevent fraud.

Uploaded by

ashishkumarak
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 14

A.T.M.

: A Hole In the Wall

LIST OF FIGURES
FIGURE No. 1. 2. 3. 4. DESCRIPTION A typical ATM card ATM card with magnetic stripe A smart card with a chip Block diagram of an ATM
PAGE No.

2 2 3 5

A.T.M : A HOLE IN THE WALL 3610117

CONTENTS
List of Figures
i

Page No.
1. What is an A.T.M. 2. What we can do at an A.T.M. 3. How to use A.T.M. 4. Plastic A.T.M. card with Magnetic Stripe 5. Plastic Smartcard with a chip 6. Benefits of A.T.M. card 7. Working of the A.T.M. 8. Hardware used in A.T.M. machine 8.1 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 CPU Magnetic or chip card reader Pin pad Secured cryptoprocessor Display Function key or touch screen Record printer Vault Housing 6-8 1 1 1 2 3 3 4 4-6

9. A.T.M. Security 9.1 9.2 9.3 Physical Transactional Secracy Customer Identity Integrity

Page | 3

A.T.M : A HOLE IN THE WALL 3610117

9.4 9.5

Customer Security A.T.M. Safety PIN software

Page | 4

A.T.M : A HOLE IN THE WALL 3610117

1. WHAT IS AN A.T.M.
An automated teller machine (ATM), also known as a Cash Point (which is a trademark of Lloyds TSB), Cash Machine or sometimes a Hole in the Wall in British English, is a computerised telecommunications device that provides the clients of a financial institution with access to financial transactions in a public space without the need for a cashier, human clerk or bank teller. ATMs are known by various other names including ATM Machine, automatic banking machine, and various regional variants derived from trademarks on ATM systems held by particular banks. Invented by IBM, the first ATM was introduced in December 1972 at Lloyds Bank in the UK. However, There is a Plaque on Barclays Bank in Enfield Town, North london stating that the first ATM (In the world) was installed there on the 27th June 1967.

2. WHAT WE CAN DO AT AN A.T.M.?


Using an ATM, customers can access their bank accounts in order to make cash withdrawals, credit card cash advances, and check their account balances as well as purchase prepaid cellphone credit. If the currency being withdrawn from the ATM is different from that which the bank account is denominated in (e.g.: Withdrawing Japanese Yen from a bank account containing US Dollars), the money will be converted at a wholesale exchange rate. Thus, ATMs often provide the best possible exchange rate for foreign travellers and are heavily used for this purpose as well.

3. HOW TO USE A.T.M.?


On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smart card with a chip, that contains a unique card number and some security information such as an expiration date or CVVC (CVV). Authentication is provided by the customer entering a personal identification number (PIN). A personal identification number (PIN, pronounced "pin") is a secret numeric password shared between a user and a system that can be used to authenticate the user to the system.

Page | 5

A.T.M : A HOLE IN THE WALL 3610117

Fig.1 A Typical ATM Card

4. PLASTIC ATM CARD WITH MAGNETIC STRIPE


A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called swipe card or magstripe, is read by physical contact and swiping past a magnetic reading head. Invented by IBM in 1960 under a contract with the US government for a security system, a number of International Organization for Standardization standards, ISO/IEC 7810, ISO/IEC 7811, ISO/IEC 7812, ISO/IEC 7813, ISO 8583, and ISO/IEC 4909, now define the physical properties of the card, including size, flexibility, location of the magstripe, magnetic characteristics, and data formats. They also provide the standards for financial cards, including the allocation of card number ranges to different card issuing institutions.

Fig.2 ATM Card with Magnetic Stripe

Page | 6

A.T.M : A HOLE IN THE WALL 3610117

The black stripe which is marked as 1 in the figure is called magnetic stripe.

Page | 7

A.T.M : A HOLE IN THE WALL 3610117

5. PLASTIC SMARTCARD WITH A CHIP


A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card with embedded integrated circuits. A smart card or microprocessor cards contain volatile memory and microprocessor components. The card is made of plastic, generally polyvinyl chloride, but sometimes acrylonitrile butadiene styrene or polycarbonate . Smart cards may also provide strong security authentication for single sign-on (SSO) within large organizations.

Fig. 3 A Smartcard with a chip

6. BENEFITS OF A.T.M. CARD


An ATM card (also known as a bank card, client card, key card or cash card) is a card issued by a bank, credit union or building society that can be used at an ATM for deposits, withdrawals, account information, and other types of transactions, often through interbank networks.

Page | 8

A.T.M : A HOLE IN THE WALL 3610117

Some ATM cards can also be used:


at a branch, as identification for in-person transactions at merchants, for EFTPOS (point of sale) purchases

ATM cards are typically about 86 54 mm, i.e. ISO/IEC 7810 ID-1 size. Unlike a debit card, in-store purchases or refunds with an ATM card can generally be made in person only, as they require authentication through a personal identification number or PIN. In other words, ATM cards cannot be used at merchants that only accept credit cards.

7. WORKING OF THE A.T.M.


ATMs are connected directly to their host or ATM Controller via either ADSL , dial-up modem over a telephone line or via a leased line. An ATMC (ATM Controller) is a system used in financial institutions to route financial transactions between ATMs, core banking systems and other banks. An ATMC is sometimes referred to as an "EFTPOS Switch." A message may enter an ATMC from an ATM, another ATMC or a third party. When receiving a message, the ATMC will examine the message, validate the PIN block if present, and then route the message according to the leading digits of the account number referenced. This routing may be to a core banking system to check the available balances and to authorise the transaction, or to another bank's ATMC. For example, if a customer of Bank A used their card at an ATM belonging to Bank B, the message would be forwarded to Bank B's ATMC. The ATMC would examine the message, and based upon the account number determine that the appropriate ATMC to contact would be Bank A. It would then forward the message to Bank A's ATMC for authorisation.

8. HARDWARE USED IN A.T.M. MACHINE


8.1 CPU

A CPU is used to control the user interface and transaction devices. A CPU has an operating system and some application programs installed in
Page | 9

A.T.M : A HOLE IN THE WALL 3610117

it. Operating system used is mainly Microsoft XP professional Microsoft XP embedded.

Fig.4

Block

Diagram

of

an

ATM

8.2

Magnetic or Chip Card Reader


Page | 10

A.T.M : A HOLE IN THE WALL 3610117

Magnetic or Chip card reader is used to read the data on magnetic stripe or chip card that is placed on plastic ATM card. The magnetic stripe stores data in the form of bits and polarity of tiny magnetic particles decides which bit stores 1 and which bit stores 0.

8.3

Pin Pad

Pin pad is used to type the Personal Identification Number. Pin pad is similar in layout to a keypad Touch tone or Calculator

often manufactured as part of a secure enclosure.

8.4

Secured Crypto processor


A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.

8.5

Display
Display is used by the customer for performing the transaction .

8.6

Function key or Touchscreen


These are used to select the various aspects of the transaction. Function key buttons are usually close to the display.

8.7

Record Printer
Page | 11

A.T.M : A HOLE IN THE WALL 3610117

It is used to provide the customer with a record of their transaction.

8.8

Vault
Vault is used to store the parts of the machinery that requires restricted access.

8.9

Housing
Housing is used for aesthetics and to attach signage to.

9. A.T.M. SECURITY

9.1

Physical Security
Early ATM security focused on making the ATMs invulnerable to physical attack; they were effectively safes with dispenser mechanisms. A number of attacks on ATMs resulted, with thieves attempting to steal entire ATMs by ram-raiding. Since late 1990s, criminal groups operating in Japan improved ram-raiding by stealing and using a truck loaded with a heavy construction machinery to effectively demolish or uproot an entire ATM and any housing to steal its cash.

9.2

Transactional Secracy
The security of ATM transactions relies mostly on the integrity of the secure cryptoprocessor: the ATM often uses commodity components that are not considered to be trusted systems.
Page | 12

A.T.M : A HOLE IN THE WALL 3610117

Encryption of personal information , required by law in many jurisdictions , is used to prevent fraud. Sensitive data in ATM transactions are usually encrypted.

9.3

Customer Identity Integrity


There have also been a number of incidents of fraud by Man-inthe-middle attacks, where criminals have attached fake keypads or card readers to existing machines. These have then been used to record customers' PINs and bank card information in order to gain unauthorized access to their accounts. Various ATM manufacturers have put in place countermeasures to protect the equipment they manufacture from these threats.

9.4

Customer Security
Many efforts to promote security have been made. On- premises ATMs are often located inside the bank's lobby which may be accessible 24 hours a day. These lobbies have extensive CCTV coverage, an emergency telephone and a security guard on the premises. Bank lobbies that are not guarded 24 hours a day may also have secure doors that can only be opened from outside by swiping your bank card against a wall-mounted scanner, allowing the bank to identify who enters the building. Most ATMs will also display on-screen safety warnings and may also be fitted with convex mirrors above the display allowing the user to see what is happening behind them.

9.5

ATM Safety PIN Software

Page | 13

A.T.M : A HOLE IN THE WALL 3610117

ATM Safety PIN software is a software application that would allow users of automated teller machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal identification number (PIN) in reverse order. If you should ever be forced by a robber to withdraw money from an ATM, you can notify the police by entering your PIN in reverse. For example if your PIN is 1234 then you would put in 4321. The ATM recognizes that your PIN is backwards from the ATM card you placed in the machine. The machine will still give you the money you requested, but unknown to the robber, the police will be immediately dispatched to help you.

Page | 14

You might also like