International Journal of Soft Computing And Artificial Intelligence (IJSCAI)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( May, 2024 )
Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 22
Paper Published : 240
No. of Authors : 689
  Journal Paper


Paper Title :
Authenticated And Secure Transaction Service Architecture For Automated Teller Machine

Author :Srivatsan Sridharan, Sridhar Jammalamadaka

Article Citation :Srivatsan Sridharan ,Sridhar Jammalamadaka , (2014 ) " Authenticated And Secure Transaction Service Architecture For Automated Teller Machine " , International Journal of Soft Computing And Artificial Intelligence (IJSCAI) , pp. 73-79, Volume-2,Issue-1

Abstract : Abstract— This work aims at improvising the security and authenticity of the Automated Teller Machine (ATM) using a trusted third party application. This system would in turn benefit all the customers who have a valid ATM card registered officially with their mobile number. This system provides the following facilities of withdrawing currency at any remote terminal, verification of the end users identity using Personal Identification Number and an authentic One-Time- Passkey (Pk) validation through the mobile. The customers, without any insider privileges, can withdraw currency without being detected by any mechanisms of theft of card and eaves dropping of the Password from the card holders within the terminal software are also the major threat yet to be addressed. A basic solution is the ATM systems having a two tier authentication Pk and Random Security Question (RSQ) are being generated and validated from the user’s input from the ATM Terminal with authenticity being ensured and the confidentiality being maintained. In such a system, the correctness burden on the terminal’s code is significantly less as the customers have been given the chance to authorize themselves from their hand- held devices and are allowed to withdraw currency in terminal only after their identity is proved by a series of authentication procedures. In this paper along with the dual tier authentication implementation, the issues arise along with them and the solvencies to these issues related to the generation of the RSQ and Pk independent and unique for each session are addressed.

Type : Research paper

Published : Volume-2,Issue-1


DOIONLINE NO - IJSCAI-IRAJ-DOIONLINE-723   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 60
| Published on 2014-05-15
   
   
IRAJ Other Journals
IJSCAI updates
IJSCAI Volume-11,Issue-2(Nov,2023)
The Conference World

JOURNAL SUPPORTED BY