450 likes | 1.41k Views
MONEY PAD THE FUTURE WALLET. SUBMITTED BY:. NAME : ANKITA GHOSAL REGISTRATION NO : 0811017059 BRANCH : IT-’C’ SEMESTER : 7th. CONTENTS. INTRODUCTION TO MONEY PAD HISTORY OF MONEY PAD WHY MONEY PAD IS KNOWN AS FUTURE WALLET? DIMENSION OF MONEY PAD CARD CHIPS BEING USED
E N D
MONEY PADTHE FUTURE WALLET SUBMITTED BY: NAME:ANKITA GHOSAL REGISTRATION NO:0811017059 BRANCH:IT-’C’ SEMESTER:7th
CONTENTS INTRODUCTION TO MONEY PAD HISTORY OF MONEY PAD WHY MONEY PAD IS KNOWN AS FUTURE WALLET? DIMENSION OF MONEY PAD CARD CHIPS BEING USED DESCRIPTION OF CHIP TYPICAL CONFIGURATIONS MONEY PAD READERS SECURITY MECHANISM AN OVERVIEW OF FINGER PRINT RECOGNITION ADVANTAGES DISADVANTAGES
INTRODUCTION TO MONEY PAD • Money Pad is a form of credit card or smart card similar to floppy disk, which is introduced to provide, secure e-cash transactions. • It uses the biometrics technology for Finger Print recognition. • The card contains a small, built in microcomputer chip and integrated circuit that can store and process a lot of data.
HISTORY OF MONEY PAD • Money Pad is a method developed by Tobias Wong for binding bills (usually of one or two dollar denominations) so that they can be easily carried around, and torn off the pad whenever needed for payment. • Another type of Money Pad is a futuristic wallet that operates like a credit card or smartcard, automatically verifying the user's identity before issuing cash debits thus providing security.
WHY MONEY PAD IS KNOWN AS THE FUTURE WALLET? • Just as every thing is getting under the shadow of "e" today we have paper currency being replaced by electronic money or e-cash. • Electronically initiated debits and credits has become the dominant payment modesin today’s world & there is no need to carry cash in wallet. The purpose is served by MONEY PAD, thus referring it as a WALLET.
DIMENSION OF MONEY PAD CARD 85.6mm x 53.98mm x 0.76mm(defined by ISO 7816)
CHIPS BEING USED Vcc RST CLK AUX1 GND SWP I/O AUX2
DESCRIPTION OF CHIP • Vcc - gives the biasing voltage to the smart card. • RST- resets the data stored in the smart card. • CLK- provides the clock signals for the operations. • GND – provides ground as usual. • Vpp –provides the programming voltage to the EEPROM.But now it is not used, because the modern cards are capable of generating programming voltage by itself when comes in contact with a reader. • I/P,O/P- is the input output port. • AUX1/2- are auxiliary contacts, used by USB devices.
TYPICAL CONFIGURATIONS • 256 bytes to 4KB RAM. • 8KB to 32KB ROM. • 1KB to 32KB EEPROM. • Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional. • 8-bit to 16-bit CPU. 8051 based designs are common. • The price of a mid-level chip when produced in bulk is less than US$1.
MONEY PAD READERS • Computer based readers Connect through USB or COM (Serial) ports • Dedicated terminals Usually with a small screen, keypad, printer, often alsohave biometric devices such as thumb print scanner.
SECURITY MECHANISMS • MONEY PAD USES BIOMETRICS TECHNOLOGY AS A SECURITY MEASURE. • MECHANISM: • Every time the user wants to access the Money Pad he has to make an impression of his fingers which will be scanned and matched with the one in the hard disk of data base server. • If the finger print matches with the user's he will be allowed to access and use the Pad other wise the Money Pad is not accessible. • Thus it provides a form of security to the ever-lasting transaction currency of the future "e-cash."
AN OVERVIEW OF FINGER PRINT RECOGNITION • Fingerprint identification is also known as dactyloscopy or hand print identification. • It is the analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. • These include three basic patterns of fingerprint ridges are the arch, loop, and whorl. • It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies. ARCH LOOP WHORL
CONTINUED… • Fingerprint sensors • A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. • The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. • Pattern Based Algorithm • Matching algorithms are used to compare previously stored templates of fingerprints against candidate fingerprints for authentication purposes. • Pattern based algorithms/Image based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. • This requires that the images be aligned in the same orientation. • To do this, the algorithm finds a central point in the fingerprint image and centers on that. • In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. • The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.
CONTINUED… • An efficient fingerprint recognition algorithm is a PHASE BASED IMAGE MATCHING, an image matching technique using the phase components in 2D Discrete Fourier Transforms (DFTs) of given images. • The technique has been successfully applied to high accuracy image registration tasks for computer vision applications, where estimation of sub-pixel image translation • is a major concern. • The principle of phase-based image matching is introduced using the Phase-Only Correlation (POC) function(which is sometimes called the “phase-correlation function”) • Consider two N1×N2 images, regitered finger print image f(n1, n2) and input finger print image g(n1, n2), where we assume that the index ranges are n1 = • −M1 · · ·M1 (M1 > 0) and n2 = −M2 · · ·M2 (M2 > 0) • The proposed algorithm consists of the four steps: • Core detection • Rotation and displacement alignment • Common region extraction and • Fingerprint matching.
f(n1,n2) g(n1,n2) 1. 2. 3. 4. Core Detection Core Detection Do both images have their core? YES NO Displacement alignment using the cores Rotation Alignment Rotation Alignment Displacement alignment using the cores Common region extraction Finger Print Matching Matching score Flow Diagram For The Proposed Algorithm
HOW DOES IT ALL WORK? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Card verifies finger print. Stores a status “Finger Print Verified”. Responds “OK” Card allows personal transactions and responds “OK”
ADVANTAGES • Faster and smarter. • Portability. • Flexibility(no need to carry separate ATM,Debit,Credit card, pan card or cash etc.). • Highly secured.(deactivates on illegal use). • Reliability (unaffected by electric and magnetic field).
DISADVANTAGES • Expensive • It uses fingerprint detection for security purpose. So if a person’s finger gets accidentally cut or injured, the detection technique will fail to match the patterns.
THANK YOU ANY QUERIES?