Você está na página 1de 22

SEMINAR ON ATM

BY, SOUMYA RANJAN PALLAI REGD.NO:0701218400 7TH SEMESTER

INTRODUCTION
An automatic teller machine (ATM) is an electronic device

which allows a bank's customers to make cash withdrawals and check their account balances at any time without the need for a human teller.
Many ATMs also allow people to deposit cash or cheques,

transfer money between their bank accounts .


Customers authenticate themselves by using a plastic card

with a magnetic stripe, which encodes the customer's account number, and by entering a numeric passcode called a PIN (personal identification number).

The world's first ATM was installed in Enfield Town in the London

Borough of Enfield, London on June 27, 1967 by Barclays Bank.


Typically, if the number is entered incorrectly several times in a row,

most ATMs will retain the card as a security precaution to prevent an unauthorised user from working out the PIN by pure guesswork
ATMs are moving away from custom circuit boards (most of which are

based on Intel 8086 architecture) into full fledged PCss with commercial operating systems like windows and linux,bundled with Java.

Networking
Most ATMs are connected to interbank networks, enabling

people to withdraw money from machines not belonging to the bank where they have their account.
Deposits can only be made at machines belonging to the

bank that has the account.


It is possible to make withdrawals in places where one's

bank has no branches, and even to withdraw local currency in a foreign country.

How Do ATMs Work?


An ATM is simply a data terminal with two input and four

output devices.
Like any other data terminal, the ATM has to connect to,

and communicate through, a host processor.


The host processor is analogous to an ISP.
Most host processors can support either leased-line or

dial-up machines.
Leased-line machines connect directly to the host

processor through a four-wire, point-to-point, dedicated telephone line.

Dial-up ATMs connect to the host processor through a

normal phone line using a modem and a toll-free number, or through an Internet service provider using a local access number dialed by modem
Leased-line ATMs are preferred for very high-volume

locations because of their thru-put capability.


dial-up ATMs are preferred for retail merchant locations

where cost is a greater factor than thru-put.


The initial cost for a dial-up machine is less than half that

for a leased-line machine. The monthly operating costs for dial-up are only a fraction of the costs for leased-line.

Parts of the Machine


An ATM has two input devices: CARD READER - The card reader captures the account information stored on the magnetic stripe on the back of an ATM/debit or credit card. The host processor uses this information to route the transaction to the cardholder's bank.
KEYPAD - The keypad lets the cardholder tell the bank

what kind of transaction is required (cash withdrawal, balance inquiry, etc.) and for what amount. Also, the bank requires the cardholder's personal identification number (PIN) for verification. The PIN block is sent to the host processor in encrypted form.

An ATM has four output devices: SPEAKER- The speaker provides the cardholder with auditory feedback when a key is pressed.
DISPLAY SCREEN- The display screen prompts the

cardholder through each step of the transaction process.


RECEIPT PRINTER- The receipt printer provides the

cardholder with a paper receipt of the transaction.


CASH DISPENSER- The entire bottom portion of most

small ATMs is a safe that contains the cash.

Sensing Bills
The cash-dispensing mechanism has an electric eye that

counts each bill as it exits the dispenser.


The bill count and all of the information pertaining to a

particular transaction is recorded in a journal.


The journal information is printed out periodically and a

hard copy is maintained by the machine owner for two years.


If the customer has a dispute about a transaction, he or she

can ask for a journal printout showing the transaction, and then contact the host processor.

The cash-dispensing mechanism also has a sensor that

evaluates the thickness of each bill.


If two bills are stuck together, then instead of being

dispensed to the cardholder they are diverted to a reject bin.


The same thing happens with a bill that is excessively

worn, torn, or folded.

Settlement Funds
When a cardholder wants to do an ATM transaction, he or she provides the necessary information by means of the card reader and keypad. The ATM forwards this information to the host processor, which routes the transaction request to the cardholder's bank or the institution that issued the card.

If the cardholder is requesting cash, the host processor causes an electronic funds transfer to take place from the customer's bank account to the host processor's account.

Once the funds are transferred to the host processor's

bank account, the processor sends an approval code to the ATM authorizing the machine to dispense the cash.
The processor then ACHs the cardholder's funds into the

merchant's bank account, usually the next bank business day.


In this way, the merchant is reimbursed for all funds

dispensed by the ATM.


So when you request cash, the money moves electronically

from your account to the host's account to the merchant's account.

ATM Security
Early ATM security focused on making the ATMs

invulnerable to physical attack; they were effectively safes with dispenser mechanisms.
ATMs are now frequently found free-standing in places like

shops, rather than mounted into walls.


Modern ATM physical security concentrates on denying

the use of the money inside the machine to a thief, by means of techniques such as dye markers and smoke canisters.

ATM transactions are usually encrypted with DES but

most transaction processors will require the use of the more secure Triple DES by 2005.
There are also many "phantom withdrawals" from ATMs,

which banks often claim are the result of fraud by customers.


Some frauds also record customers' PIN numbers and

bank account details in order to gain unauthorised access to their accounts

Você também pode gostar