You are on page 1of 23

ATM WITH AN EYE

ABSTRACT institutions alike from fraud


and other breaches of security.
There is an urgent need
for improving security in INTRODUCTION
banking region. With the
advent of ATM though banking The rise of technology in
became a lot easier it even India has brought into force
became a lot vulnerable. The many types of equipment that
chances of misuse of this much aim at more customer
hyped insecure baby product satisfaction. ATM is one such
(ATM) are manifold due to the machine which made money
exponential growth of transactions easy for
intelligent criminals day by customers to bank. The other
day. ATM systems today use side of this improvement is the
no more than an access card enhancement of the culprits
and PIN for identity probability to get his
verification. This situation is unauthentic share.
unfortunate since tremendous Traditionally, security is
progress has been made in handled by requiring the
biometric identification combination of a physical
techniques, including finger access card and a PIN or other
printing, facial recognition, and password in order to access a
iris scanning. customers account. This
model invites fraudulent
This paper proposes the attempts through stolen cards,
development of a system that badly-chosen or automatically
integrates Facial recognition assigned PINs, cards with little
and Iris scanning technology or no encryption schemes,
into the identity verification employees with access to non-
process used in ATMs. The encrypted customer account
development of such a system information and other points of
would serve to protect failure.
consumers and financial

www.pediain.com
1
ATM WITH AN EYE

Our paper proposes an checking -- is unique to every


automatic teller machine person, more so than
security model that would fingerprints.
combine a physical access
2. LITERATURE REVIEW
card, a PIN, and electronic
facial recognition. By forcing
For most of the past ten years,
the ATM to match a live image
the majority of ATMs used
of a customers face with an
worldwide ran under
image stored in a bank
IBMs now-defunct OS/2.
database that is associated
However, IBM hasnt issued a
with the account number, the
major update to the
damage to be caused by stolen
operating system in over six
cards and PINs is effectively
years. Movement in the
neutralized. Only when the PIN
banking world is now going in
matches the account and the
live image and stored image
two directions: Windows and
match would a user be
Linux. NCR, a leading world-
considered fully verified.
wide ATM manufacturer,
A system can examine just
recently announced an
the eyes, or the eyes nose and
agreement to use Windows XP
mouth, or ears, nose, mouth
Embedded in its next
and eyebrows, and so on.
generation of personalized
In this paper , we will also ATMs (crmdaily.com.) Windows
look into an automatic teller XP Embedded allows
machine security model OEMs to pick and choose from
providing the customers a the thousands of components
cardless, password-free way to that make up Windows
get their money out of an ATM. XP Professional, including
Just step up to the camera integrated multimedia,
while your eye is scanned. The networking and database
iris -- the colored part of the
eye the camera will be

www.pediain.com 2
ATM WITH AN EYE

management functionality. bulk of transaction processing


This makes the use of off-the- (linux.org.) This model would
shelf facial recognition also work well for the
code more desirable because it proposed system if the ATMs
could easily be compiled for processors were not powerful
the Windows XP enough to quickly
environment and the perform the facial recognition
networking and database tools algorithms.
will already be in place. In terms of the improvement of
For less powerful ATMs, KAL, a security standards, MasterCard
software development is spearheading
company based in an effort to heighten the
Scotland, provides Kalignite encryption used at ATMs. For
CE, which is a modification of the past few decades, many
the Windows CE platform. machines have used the Data
This allows developers that Encryption Standard developed
target older machines to more by IBM in the mid
easily develop complex 1970s that uses a 56-bit key.
user-interaction systems . DES has been shown to be
Many financial institutions are rather easily cracked,
relying on a third choice, however, given proper
Windows NT, because of its computing hardware. In recent
stability and maturity as a years, a Triple DES scheme
platform. has been put forth that uses
On an alternative front, the three such keys, for an
largest bank in the south of effective 168-bit key length.
Brazil, Banrisul, has MasterCard now requires new
installed a custom version of or relocated ATMs to use the
Linux in its set of two thousand Triple DES scheme, and
ATMs, replacing legacy by April, 2005, both Visa and
MS-DOS systems. The ATMs MasterCard will require that
send database requests to any ATM that supports
bank servers which do the

www.pediain.com
3
ATM WITH AN EYE

their cards must use Triple environment would all be


DES. ATM manufacturers are controlled within certain
now developing newer narrow limits, making hugely
models that support Triple DES robust software
natively; such redesigns may unnecessary .One leading
make them more facial recognition algorithm
amenable to also including class is called
snapshot cameras and facial image template based. This
recognition software, more method attempts to capture
so than they would be in global features of facial
regards to retrofitting pre- images into facial templates.
existing machines . Neural networks, among other
There are hundreds of methods, are often used
proposed and actual to construct these templates
implementations of facial for later matching use. An
recognition technology from all alternative method, called
manner of vendors for all geometry-based, is to explicitly
manner of uses. However, examine the individual
for the model proposed in this features of a face and the
paper, we are interested only geometrical relationship
in the process of facial between those features
verification matching a live (Gross.) What must be taken
image to a predefined image into
to verify a claim of
identity not in the process of account, though, are certain
facial evaluation matching a key factors that may change
live image to any image across live images:
in a database. Further, the illumination, expression, and
environmental conditions pose (profile.)
under which the verification A study was recently
takes place the lighting, the conducted of leading
imaging system, the image recognition algorithms, notably
profile, and the processing one

www.pediain.com
4
ATM WITH AN EYE

developed by two researchers scream profile, or squinted


at MIT, Baback Moghaddam eyes, dropped the recognition
and Alex Pentland, and rates significantly. Lastly,
one a commercial product matching profile changes
from Identix called FaceIt. The worked reasonably well when
MIT program is based on the initial training image(s)
Principal Feature Analysis, an were frontal, which allowed 70-
adaptation of template based 80% success rates for up to 45
recognition. FaceIts degrees of profile
approach uses geometry- change however, 70-80%
based local feature analysis. success isnt amenable to
Both algorithms have to be keeping ATM users content
initialized by providing the with the system.
locations of the eyes in the The natural conclusion to
database image, from which draw, then, is to take a frontal
they can create an internal image for the bank
representation of the database, and to provide a
normalized face. It is this prompt to the user, verbal or
representation to which future otherwise, to face the
live images will be compared . camera directly when the ATM
In the study, it was found that verification process is to begin,
both programs handled so as to avoid the
changes in illumination need to account for profile
well. This is important because changes. With this and other
ATM use occurs day and night, accommodations,
with or without recognition rates for
artificial illumination. Likewise, verification can rise above
the programs allowed general 90%. Also worth noting is that
expression changes FaceIts local feature analysis
while maintaining matching method handled variations in
success. However, extreme the test cases slightly
expressions, such as a better than the PGA system
used by the MIT researchers .

www.pediain.com
5
ATM WITH AN EYE

Another paper shows more analysis facial verification


advantages in using local program that can be used on a
feature analysis systems. variety of platforms,
For internal representations of including embedded
faces, LFA stores them processors, and to determine
topographically; that is, it behavior protocols for the
maintains feature relationships match
explicitly. Template based / non-match cases.
systems, such as PGA, do
not. The advantages of LFA are 3. OUR METHODOLOGY
that analysis can be done on
varying levels of object The first and most important
grouping, and that analysis step of this project will be to
methods can be independent locate a powerful
of the topography. In other open-source facial recognition
words, a system can examine program that uses local
just the eyes, or the eyes nose feature analysis and that is
and mouth, or ears, targeted at facial verification.
nose, mouth and eyebrows, This program should be
and so on, and that as better compilable on multiple
analysis algorithms are systems, including Linux and
developed, they can fit within Windows variants, and should
the data framework provided be customizable to the
by LFA extent of allowing for
The conclusion to be drawn for variations in processing power
this project, then, is that facial of the machines onto which it
verification would be deployed.
software is currently up to the We will then need to
task of providing high match familiarize ourselves with the
rates for use in ATM internal workings of the
transactions. What remains is program so that we can learn
to find an appropriate open- its strengths and limitations.
source local feature Simple testing of this

www.pediain.com
6
ATM WITH AN EYE

program will also need to will be necessary, of course,


occur so that we could because we will not have
evaluate its effectiveness. access to an actual ATM or its
Several software.
sample images will be taken of Both pieces of software will be
several individuals to be used compiled and run on a
as test cases one Windows XP and a Linux
each for account images, system. Once they are both
and several each for live functioning properly, they will
images, each of which would be tweaked as much as
vary pose, lighting conditions, possible to increase
and expressions. performance (decreasing the
Once a final program is time spent matching) and to
chosen, we will develop a decrease memory footprint.
simple ATM black box Following that, the black boxes
program. This program will will be broken into two
server as the theoretical ATM components a server
with which the facial and a client to be used in a
recognition software will two-machine network. The
interact. It will take in a name client code will act as a user
and password, and then interface, passing all input
look in a folder for an image data to the server code, which
that is associated with that will handle the calls to the
name. It will then take in an facial recognition software,
image from a separate folder further reducing the memory
of live images and use the footprint and processor
facial recognition program load required on the client end.
to generate a match level In this sense, the thin client
between the two. Finally it will architecture of many
use the match level to ATMs will be emulated.
decide whether or not to allow We will then investigate the
access, at which point it will process of using the black box
terminate. All of this program to control a

www.pediain.com
7
ATM WITH AN EYE

USB camera attached to the for in most cases. Further, a


computer to avoid the use of positive visual match would
the folder of live images. cause the live image to be
Lastly, it may be possible to stored in the database so that
add some sort of DES future transactions would have
encryption to the client end to a broader base from which to
encrypt the input data and compare if the original account
decrypt the output data from image fails to provide a match
the server knowing that thereby decreasing false
this will increase the processor negatives.
load, but better allowing us to When a match is made with
gauge the time it the PIN but not the images, the
takes to process. bank could limit transactions in
a manner agreed upon by the
customer when the account
was opened, and could store
the image of the user for later
ATM SYSTEMS examination by bank officials.
In regards to bank employees
Our ATM system would only gaining access to customer
attempt to match two (and PINs for use in fraudulent
later, a few) discrete images, transactions, this system
searching through a large would likewise reduce that
database of possible matching threat to exposure to the low
candidates would be limit imposed by the bank and
unnecessary. The process agreed to by the customer on
would effectively become an visually unverifiable
exercise in pattern matching, transactions.
which would not require a In the case of credit card
great deal of time. With use at ATMs, such a
appropriate lighting and robust verification system would not
learning software, slight currently be feasible without
variations could be accounted creating an overhaul for the

www.pediain.com
8
ATM WITH AN EYE

entire credit card issuing withdrawn from an account.


industry, but it is possible that The bank accounts were not
positive results (read: (at that time) connected by a
significant fraud reduction) computer network to the ATM.
achieved by this system might Therefore, banks were at first
motivate such an overhaul. very exclusive about who they
The last consideration is gave ATM privileges to. Giving
that consumers may be wary them only to credit card
of the privacy concerns raised holders (credit cards were
by maintaining images of used before ATM cards) with
customers in a bank database, good banking records. In
encrypted or otherwise, due to modern ATMs, customers
possible hacking attempts or authenticate themselves by
employee misuse. However, using a plastic card with a
one could argue that having magnetic stripe, which
the image compromised by a encodes the customer's
third party would have far less account number, and by
dire consequences than the entering a numeric passcode
account information itself. called a PIN (personal
Furthermore, since nearly all identification number), which
ATMs videotape customers in some cases may be changed
engaging in transactions, it is using the machine. Typically, if
no broad leap to realize that the number is entered
banks already build an archive incorrectly several times in a
of their customer images, even row, most ATMs will retain the
if they are not necessarily card as a security precaution
grouped with account to prevent an unauthorised
information. user from working out the PIN
HISTORY by pure guesswork..

The first ATMs were off-line


machines, meaning money
was not automatically

www.pediain.com 9
ATM WITH AN EYE

HARDWARE AND with Linux. Other platforms


SOFTWARE include RMX 86, OS/2 and
Windows 98 bundled with Java.
ATMs contain secure
The newest ATMs use Windows
cryptoprocessors, generally
XP or Windows XP embedded.
within an IBM PC compatible
host computer in a secure RELIABILITY
enclosure. The security of the
ATMs are generally
machine relies mostly on the
reliable, but if they do go
integrity of the secure
wrong customers will be left
cryptoprocessor: the host
without cash until the following
software often runs on a
morning or whenever they can
commodity operating
get to the bank during opening
system.In-store ATMs typically
hours. Of course, not all errors
connect directly to their ATM
are to the detriment of
Transaction Processor via a
customers; there have been
modem over a dedicated
cases of machines giving out
telephone line, although the
money without debiting the
move towards Internet
account, or giving out higher
connections is under way.
value notes as a result of
In addition, ATMs are incorrect denomination of
moving away from custom banknote being loaded in the
circuit boards (most of which money cassettes. Errors that
are based on Intel 8086 can occur may be mechanical
architecture) and into full- (such as card transport
fledged PCs with commodity mechanisms; keypads; hard
operating systems such as disk failures); software (such
Windows 2000 and Linux. An as operating system; device
example of this is Banrisul, the driver; application);
largest bank in the South of communications; or purely
Brazil, which has replaced the down to operator error.
MS-DOS operating systems in
its automatic teller machines

www.pediain.com 10
ATM WITH AN EYE

SECURITY when you're alone, leave the


Early ATM security area.
focused on making the ATMs
invulnerable to physical attack; Keep you PINconfidential.
they were effectively safes Memorize your Personal
with dispenser mechanisms. Identification Number (PIN);
ATMs are placed not only near don't write it on your card or
banks, but also in locations leave it in your wallet or purse.
such as malls, grocery stores, Keep your number to yourself.
and restaurants. The other Never provide your PIN over
side of this improvement is the the telephone, even if a caller
enhancement of the culprits identifies himself as a bank
probability to get his employee or police officer.
unauthentic share. Neither person would call you
ATMs are a quick and to obtain your number.
convenient way to get cash.
They are also public and Conduct transactions in
visible, so it pays to be careful private. Stay squarely in front
when you're making of the ATM when completing
transactions. Follow these your transaction so people
general tips for your personal waiting behind you won't have
safety. an opportunity to see your PIN
being entered or to view any
Stay alert. If an ATM is account information. Similarly,
housed in an enclosed area, fill out your deposit/withdrawal
shut the entry door completely slips privately.
behind you. If you drive up to
an ATM, keep your car doors Dont flash your cash. If you
locked and an eye on your must count your money, do it
surroundings. If you feel at the ATM, and place your
uneasy or sense something cash into your wallet or purse
may be wrong while you're at before stepping away. Avoid
an ATM, particularly at night or making excessively large

www.pediain.com 11
ATM WITH AN EYE

withdrawals. If you think you're station for more personal


being followed as you leave safety information.
the ATM, go to a public area
FACIAL RECOGNITION
near other people and, if
necessary, ask for help.

The main issues faced in


Save receipt. Your ATM
developing such a model are
receipts provide a record of
keeping the time elapsed in
your transactions that you can
the verification process to a
later reconcile with your
negligible amount, allowing for
monthly bank statement. If
an appropriate level of
you notice any discrepancies
variation in a customers face
on your statement, contact
when compared to the
your bank as soon as possible.
database image, and that
Leaving receipts at an ATM can
credit cards which can be used
also let others know how much
at ATMs to withdraw funds are
money you've withdrawn and
generally issued by institutions
how much you have in your
that do not have in-person
account.
contact with the customer, and
hence no opportunity to
Guard your card. Don't lend
acquire a photo.
your card or provide your PIN
Because the system would
to others, or discuss your bank
only attempt to match two
account with friendly
(and later, a few) discrete
strangers. If your card is lost or
images, searching through a
stolen, contact your bank
large database of possible
immediately.
matching candidates would be
unnecessary. The process
Immediately report any would effectively become an
crime to the police. Contact exercise in pattern matching,
the Department Of Public which would not require a
Security or your local police great deal of time. With

www.pediain.com
12
ATM WITH AN EYE

appropriate lighting and robust In the case of credit card


learning software, slight use at ATMs, such a
variations could be accounted verification system would not
for in most cases. Further, a currently be feasible without
positive visual match would creating an overhaul for the
cause the live image to be entire credit card issuing
stored in the database so that industry, but it is possible that
future transactions would have positive results (read:
a broader base from which to significant fraud reduction)
compare if the original account achieved by this system might
image fails to provide a match motivate such an overhaul.
thereby decreasing false
negatives. The last consideration is that
consumers may be wary of the
When a match is made with privacy concerns raised by
the PIN but not the images, the maintaining images of
bank could limit transactions in customers in a bank database,
a manner agreed upon by the encrypted or otherwise, due to
customer when the account possible hacking attempts or
was opened, and could store employee misuse. However,
the image of the user for later one could argue that having
examination by bank officials. the image compromised by a
In regards to bank employees third party would have far less
gaining access to customer dire consequences than the
PINs for use in fraudulent account information itself.
transactions, this system Furthermore, since nearly all
would likewise reduce that ATMs videotape customers
threat to exposure to the low engaging in transactions, it is
limit imposed by the bank and no broad leap to realize that
agreed to by the customer on banks already build an archive
visually unverifiable of their customer images, even
transactions. if they are not necessarily

www.pediain.com
13
ATM WITH AN EYE

grouped with account could easily be compiled for


information. the Windows XP environment
and the networking and
SOFTWARE SPECIFICATION database tools will already be
in place.
For most of the past ten
years, the majority of ATMs Many financial institutions
used worldwide ran under are relying on Windows NT,
IBMs now-defunct OS/2. because of its stability and
However, IBM hasnt issued a maturity as a platform.The
major update to the operating ATMs send database requests
system in over six years. to bank servers which do the
Movement in the banking bulk of transaction processing
world is now going in two (linux.org.) This model would
directions: Windows and Linux. also work well for the proposed
NCR, a leading world-wide ATM system if the ATMs processors
manufacturer, recently were not powerful enough to
announced an agreement to quickly perform the facial
use Windows XP Embedded in recognition algorithms.
its next generation of
personalized ATMs SECURITY
(crmdaily.com.) Windows XP
Embedded allows OEMs to pick In terms of the
and choose from the improvement of security
thousands of components that standards, MasterCard is
make up Windows XP spearheading an effort to
Professional, including heighten the encryption used
integrated multimedia, at ATMs. For the past few
networking and database decades, many machines have
management functionality. used the Data Encryption
This makes the use of off-the- Standard developed by IBM in
shelf facial recognition code the mid 1970s that uses a 56-
more desirable because it bit key. DES has been shown

www.pediain.com
14
ATM WITH AN EYE

to be rather easily cracked, verification matching a live


however, given proper image to a predefined image
computing hardware. In recent to verify a claim of identity
years, a Triple DES scheme not in the process of facial
has been put forth that uses evaluation matching a live
three such keys, for an image to any image in a
effective 168-bit key length. database. Further, the
ATM manufacturers are now environmental conditions
developing newer models that under which the verification
support Triple DES natively; takes place the lighting, the
such redesigns may make imaging system, the image
them more amenable to also profile, and the processing
including snapshot cameras environment would all be
and facial recognition controlled within certain
software, more so than they narrow limits, making hugely
would be in regards to robust software
retrofitting pre-existing unnecessary .One leading
machines . facial recognition algorithm
class is called image template
based. This method attempts
to capture global features of
FACIALRECOGNITION facial images into facial
TECHNIQUE: templates. What must be
taken into account, though,
There are hundreds of are certain key factors that
proposed and actual may change across live
implementations of facial images: illumination,
recognition technology from all expression, and pose (profile.)
manner of vendors for all
manner of uses. However, for
the model proposed in this
paper, we are interested only The natural conclusion to
in the process of facial draw, then, is to take a frontal

www.pediain.com
15
ATM WITH AN EYE

image for the bank database,


and to provide a prompt to the The first and most
user, verbal or otherwise, to important step of this project
face the camera directly when will be to locate a powerful
the ATM verification process is open-source facial recognition
to begin, so as to avoid the program that uses local
need to account for profile feature analysis and that is
changes. With this and other targeted at facial verification.
accommodations, recognition This program should be
rates for verification can rise compilable on multiple
above 90%. A system can systems, including Linux and
examine just the eyes, or the Windows variants, and should
eyes nose and mouth, or ears, be customizable to the extent
nose, mouth and eyebrows, of allowing for variations in
and so on processing power of the
. machines onto which it would
The conclusion to be drawn be deployed.
for this project, then, is that
facial verification software is We will then need to
currently up to the task of familiarize ourselves with the
providing high match rates for internal workings of the
use in ATM transactions. What program so that we can learn
remains is to find an its strengths and limitations.
appropriate open-source local Simple testing of this program
feature analysis facial will also need to occur so that
verification program that can we could evaluate its
be used on a variety of effectiveness. Several sample
platforms, including embedded images will be taken of several
processors, and to determine individuals to be used as test
behavior protocols for the cases one each for account
match / non-match cases. images, and several each for
live images, each of which
OUR METHODOLOGY

www.pediain.com
16
ATM WITH AN EYE

would vary pose, lighting functioning properly, they will


conditions, and expressions. be tweaked as much as
possible to increase
performance (decreasing the
Once a final program is time spent matching) and to
chosen, we will develop a decrease memory footprint.
simple ATM black box
program. This program will Following that, the black
server as the theoretical ATM boxes will be broken into two
with which the facial components a server and a
recognition software will client to be used in a two-
interact. It will take in a name machine network. The client
and password, and then look in code will act as a user
a folder for an image that is interface, passing all input
associated with that name. It data to the server code, which
will then take in an image from will handle the calls to the
a separate folder of live facial recognition software,
images and use the facial further reducing the memory
recognition program to footprint and processor load
generate a match level required on the client end. In
between the two. Finally it will this sense, the thin client
use the match level to decide architecture of many ATMs will
whether or not to allow be emulated.
access, at which point it will
terminate. All of this will be We will then investigate the
necessary, of course, because process of using the black box
we will not have access to an program to control a USB
actual ATM or its software. camera attached to the
computer to avoid the use of
Both pieces of software will the folder of live images.
be compiled and run on a Lastly, it may be possible to
Windows XP and a Linux add some sort of DES
system. Once they are both encryption to the client end to

www.pediain.com
17
ATM WITH AN EYE

encrypt the input data and remember their personal


decrypt the output data from identification number or
the server knowing that this password and scratch it on the
will increase the processor back of their cards or
load, but better allowing us to somewhere that a potential
gauge the time it takes to thief can find, no more fear of
process. having an account cleaned out
if the card is lost or stolen.
IRIS RECOGNITION:
HOW THE SYSTEM WORKS.
Inspite of all these
security features, a new When a customer puts in
technology has been a bankcard, a stereo camera
developed. Bank United of locates the face, finds the eye
Texas became the first in the and takes a digital image of
United States to offer iris the iris at a distance of up to
recognition technology at three feet. The resulting
automatic teller machines, computerized "iris code" is
providing the customers a compared with one the
cardless, password-free way to customer will initially provide
get their money out of an ATM. the bank. The ATM won't work
There's no card to show, if the two codes don't match.
there's no fingers to ink, no The entire process takes less
customer inconvenience or than two seconds.
discomfort. It's just a
The system works
photograph of a Bank United
equally well with customers
customer's eyes. Just step up
wearing glasses or contact
to the camera while your eye
lenses and at night. No special
is scanned. The iris -- the
lighting is needed. The camera
colored part of the eye the
also does not use any kind of
camera will be checking -- is
beam. Instead, a special lens
unique to every person, more
has been developed that will
so than fingerprints. And, for
not only blow up the image of
the customers who can't

www.pediain.com 18
ATM WITH AN EYE

the iris, but provide more When the system is fully


detail when it does. Iris scans operational, a bank customer
are much more accurate than will have an iris record made
other high-tech ID systems for comparison when an
available that scan voices, account is opened. The bank
faces and fingerprints. will have the option of
identifying either the left or
Scientists have identified
right eye or both. It requires no
250 features unique to each
intervention by the customer.
person's iris -- compared with
They will simply get a letter
about 40 for fingerprints -- and
telling them they no longer
it remains constant through a
have to use the PIN number.
person's life, unlike a voice or
And, scam artists beware, a
a face. Fingerprint and hand
picture of the card holder
patterns can be changed
won't pass muster. The first
through alteration or injury.
thing the camera will check is
The iris is the best part of the
whether the eye is pulsating. If
eye to use as a identifier
we don't see blood flowing
because there are no known
through your eye, you're either
diseases of the iris and eye
dead or it's a picture.
surgery is not performed on
the iris. Iris identification is the
most secure, robust and stable
firstdata.com
form of identification known to
Retail ATM Program
man. It is far safer, faster,
Triton RL5000 Model
more secure and accurate than
The Triton RL5000 model
DNA testing. Even identical
automatic teller machine
twins do not have identical
(ATM)
irises. The iris remains the
brings a superior level of
same from 18 months after
performance, reliability and
birth until five minutes after
customization options to the
death.
embedded PC ATM industry.

www.pediain.com 19
ATM WITH AN EYE

This durable ATM solution installation, comprehensive


allows merchants to offer their training, technical support,
customers the convenience of service and reporting features.
an on-site ATM, which may RL5000
lead to increased customer firstdata.com
traffic, increased sales volume 301-333
and an additional revenue Retail ATM Program
source. From small specialty Triton RL5000 Model
stores to larger petroleum and Features
convenience stores, the JJMonitor
Triton RL5000 ATM is easily - 10.4" VGA color screen
configured to meet the needs JJAdvertising Potential
of merchants of all sizes. - Decals and signage
The Triton RL5000 ATM - Couponing
features the user-friendly - Display graphics
Microsoft Windows CE 5.0 JJPrinter
operating system and has a - 80mm thermal printer with
large capacity for storing graphics capabilities
journal records or downloading JJKeypad
graphics for improved - Encrypting PIN Pad (EPP)
marketing efforts. The - PCI compliant
prominent JJCommunications
10.4" LCD display and sleek - Standard dial
profile make the ATM an JJSmall Footprint
eye-catching component of JJBacklit Topper
any merchant location. - Mid-topper standard
Many other on-site ATM increases visibility
programs can be expensive JJCard Reader
and - Dip standard
difficult to implement, while JJADA Compliant
the Triton RL5000 ATM offered - Americans with Disabilities
by First Data is a complete Act
ATM solution that includes

www.pediain.com
20
ATM WITH AN EYE

(ADA) compliant and audio Relative humidity: 20% to 80%


compliant non-condensing
JJTechnical Specs Power consumption: 2.0A @
- RISC microprocessor 115 VAC at 60 Hz;
- Microsoft WIndows CE 5.0 1.0A @ 230 VAC at 50 Hz
- 128 MB flash memory, A Global Leader in
expandable Electronic Commerce
- 128 MB RAM First Data powers the global
- Multilingual capabilities economy by making it easy,
- Cassette options available fast and secure for people and
JJSecurity businesses around the
- Electronic lock standard world to buy goods and
Benefits services using virtually any
JJSupplementary revenue form
source (potential profit of payment. Serving millions of
from ATM surcharge and/or merchant locations and
interchange) thousands of card issuers, we
JJHigher sales volume from have the expertise and
more in-store purchases insight to help you accelerate
JJIncreased store traffic your business. Put our
JJSuperior customer intelligence to work for you.
convenience For more information, contact
JJImproved customer loyalty your
Dimensions First Data Sales Representative
Height: 64.9" (with mid-topper) or visit firstdata.com.
Width: 16.9" 2009 First Data Corporation.
Depth: 25.6" All rights reserved. All
Weight: 245 lbs. trademarks, service
Color: Bayou Bronze marks and trade names
Operating Environment referenced in this material are
Temperature range: 10 to the property of their
40C / 50 to 104F respective owners.

www.pediain.com
21
ATM WITH AN EYE

CONCLUSION: Bone, Mike, Wayman, Dr.


James L., and Blackburn,
We thus develop an ATM Duane. Evaluating
model that is more reliable in FacialRecognition Technology
providing security by using for Drug Control Applications.
facial recognition software. By ONDCP International
keeping the time elapsed in Counterdrug Technology
the verification process to a Symposium: Facial Recognition
negligible amount we even try Vendor Test. Department of
to maintain the efficiency of Defense Counterdrug
this ATM system to a greater Technology Development
degree. One could argue that Program Office, June 2001.
having the image
compromised by a third party Gross, Ralph, Shi, Jianbo, and
would have far less dire Cohn, Jeffrey F. Quo vadis
consequences than the Face Recognition.
account information itself. ThirdWorkshop on Empirical
Furthermore, since nearly all Evaluation Methods in
ATMs videotape customers Computer Vision. Kauai:
engaging in transactions, it is December 2001.
no broad leap to realize that
banks already build an archive Penev, Penio S., and Atick,
of their customer images, even Joseph J. Local Feature
if they are not necessarily Analysis: A General
grouped with account StatisticalTheory for Object
information. Representation. Network:
Computation in Neural
BIBILOGRAPHY: Systems, Vol. 7, No. 3, pp.
477-500, 1996.
All, Anne. Triple DES dare
you. ATM Marketplace.com. Wrolstad, Jay. NCR To Deploy
19 Apr. 2002. New Microsoft OS in ATMs.

www.pediain.com
22
ATM WITH AN EYE

CRMDailyDotCom. 29Nov.
2001

www.pediain.com 23

You might also like