Preview

Credit Card Security System Using Gsm

Powerful Essays
Open Document
Open Document
16993 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Credit Card Security System Using Gsm
CHAPTER-1 INTRODUCTION 1.1. Introduction In this chapter introduction of the CREDIT CARD SECURITY SYSTEM USING GSM are discussed. It gives overall view of the project design and the related literature and the environment to be considered. Chapter wise organization discuss the main processing done using LPC 2148 microcontroller and then what is the process that can be automated which is within the scope of the work. Then we discuss the implementation aspects. 1.2. Aim of the project The main processes involved in this type of security system are to provide credit card security through sms. in this system by swiping the card using reader, it will give the 16 digit card number & name of the user. The name of user and card card number to be displayed on the LCD. whenever card get swiped, the GSM Modem automatically sends the system generated password of that particular transaction to the user’s mobile. That password is typed through keypad. This system process this data& money is dispatched. By using this system ,we are providing security through password for every transaction of a credit card 1.3. Methodology Due to the rise and rapid growth of technology, use of credit cards for has dramatically increased and it caused an explosion in the credit card fraud. As credit card becomes the most popular mode of money transaction., cases of fraud associated with it are also rising. In real life, fraudulent transactions are scattered with genuine transactions and simple pattern matching techniques are not often sufficient to detect those frauds accurately. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. Many modern techniques based on Artificial Intelligence, Data mining, Fuzzy logic, Machine learning, Sequence Alignment, Genetic Programming, random password degeneration techniques etc., has evolved in detecting various credit


References: [2] security Systems, S. Hay kin, Wiley, New York, 2002. [5] serial Communications, A. Goldsmith, Cambridge Press, 2005.

You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The system stores all the necessary information about the user. A new user is first registered to the system and the corresponding information is burned in the RFID tag. This RFID tag will then be accessible through the system. When a registered user comes to the entry point and puts his/her tag into the reader, the system checks whether he/she is a registered user or an imposter. If the user is registered, then the tab information is matched with the user information stored in system. The door is opened after the successful authentication and is closed automatically after a specific time interval. The check-in information is also stored in the database with the corresponding date and time. A log is also generated by the system according to the check-in information. Finally, this check-in information is stored in a central server along with the basic information of the…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Good Essays

    Use Case

    • 846 Words
    • 4 Pages

    When a customer inserts their ATM card into the card reader of the ATM machine, a session will started to read customer card. If it can’t read the card due numerous reasons, then the system will eject the card and error message will display on screen. If the system successful read the card, it will ask the customer to enter his/her PIN, if the pin match with server database a system main menu will display. The main menu consists of multiple types of transaction such as withdrawal, deposit, transfer, or account balance. In an event of invalid pin was entering, system will ask customer to try again. It will allow customer three times to enter the right pin. If customer did not enter the correct pin for the fourth times, a screen will display to ask customer to talk to bank representative. The system will keep customer ATM card. Otherwise when the customer is through with his/her transactions, the card is ejected from the machine and session ends.…

    • 846 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Paper

    • 408 Words
    • 2 Pages

    Well basically, you can identify who is accessing data and using a two-factor authentication strategy, a physical device that contains their credentials and password, like a debit card and PIN number. A debit card is something you have and a pin is something you know. Most banks the require users to authenticate each computer they want to access their accounts through. If an account is locked, the bank require users to call in to reset their pin then the agent requires more proof of identity.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Credit Card Fraud

    • 729 Words
    • 3 Pages

    The raised letters and numbers on the plastic cards are now rarely used or even read. This then gave rise to “skimming” devices that could be used by some unscrupulous persons to electronically scan and save the information from many customers' cards. Techniques such as "skimming," in which criminals capture card information and personal-identification numbers, have existed for years, often on a small scale. A growing security concern with Skimming devices is the possible release of the user’s personal information or location to unauthorized parties. So, what is now needed is a way to increase the security of payment card use at merchant locations.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    annotated biography

    • 551 Words
    • 2 Pages

    University of Phoenix Library Jenni Bergal, B. W. (2001, Aug 07). IDENTIY CRISIS > TODAY 'S SAVVY CRIMINALS STEAL DATA TO OPEN AND MAX OUT CREDIT CARDS. South Florida Sun - Sentinel Retrieved from http://search.proquest.com/docview/388009277?accountid=458…

    • 551 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cardless Atm

    • 2555 Words
    • 11 Pages

    In this paper, we provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates recommended approaches to prevent these types of frauds. In particular we develop a prototype model for the utilization of biometrics equipped ATM to provide security solution against must of the well-known breaches. To ensure that such security approach will be accepted by the majority of users. And we hope that, this Paper will provide Secure Transactions.…

    • 2555 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Security. A security system tracks transaction data in real time, looking for fraudulent events. If any fraudulent events are discovered, the system alerts the in-store security staff in the affected store by sending them a shot text message via cell phone.…

    • 1383 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Gsm Based Control System

    • 8961 Words
    • 36 Pages

    the mobile keypad and then it is decoded through a decoder and sent to the intermediate…

    • 8961 Words
    • 36 Pages
    Powerful Essays
  • Good Essays

    For an example, Malaysia government department also is one of the public sector apply this technology in their operation. This department is belong to federal government and the function development and managing the public service human resource. Government was looking the way to improve their access control system and combine the system with the internal human resource system. Furthermore, they also found the old access system which is card-based access system used for check in in previous year have such defects. For instance, by using the card base system may threaten the security of the system if the staff misplace the…

    • 891 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Mobile Security

    • 3398 Words
    • 14 Pages

    could be great solution. These solutions make cheaper and flexible strong authentication for user as well as for the service provider and reduces worry of carrying extra hardware for identification only. In this paper we have used mobile phone as security token and proposed an authentication model for strong digital identification. To increase…

    • 3398 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Sms Based Home Security

    • 1024 Words
    • 5 Pages

    There are eight input devices attached to microcontroller, the input devices can be extended to 32 depending upon the need. But currently it has only eight inputs. The inputs can generated from from rad switches, IR transmitter and receiver or other magic switches. For security these should be implemented in such a way that these should be hidden. When any of the door is opened, coresponding switch is operated, microcontroller is contineously monitoring all eight switches, on finding the changed in status of the input from door, the microcontroller turns ON the security alarm for a few second. On the same time a SMS is sent to the remote mobile about the latest…

    • 1024 Words
    • 5 Pages
    Good Essays
  • Better Essays

    In day to day life credit cards are used for purchasing goods and services by the help of virtual card for online transaction or physical card for offline transaction. In physical transaction, Credit cards will insert into payment machine at merchant shop to purchase goods. Tracing fraudulent transactions in this mode may not be possible because the attacker already steal the credit card. The credit card company may go in financial loss if loss of credit card is not realized by credit card holder. In online payment mode, attackers need only little information for doing fraudulent transaction (secure code, card number, expiration date etc.). In this purchase method, mainly transactions will be done through the Internet or telephone. Small transactions are generally undergo less verification, and are less likely to be checked by either the card issuer or the merchant. Card issuers must take more precaution against fraud detection and financial losses. Credit card fraud cases are increasing every year. In 2008, number of fraudulent through credit card had increased by 30 percent because of various ambiguities in issuing and managing credit cards. Credit card fraudulent is approximately 1.2% of the total transaction amount, although it is not small amount as compare to total transaction amount which is in trillions of dollars in 2007[ 2-4] . Hidden Markov Model will be helpful to find out the fraudulent transaction by using spending profiles of user. It works on the user spending profiles which can be divided into major three types such as 1) Lower profile; 2) Middle profile; and 3) Higher profile. For every credit card, the spending profile is different, so it can figure out an inconsistency of user profile and try to find fraudulent transaction. It keeps record of spending profile of the card holder by both way, either offline or online. Thus analysis of purchased commodities of cardholder will be a useful tool in fraud detection system…

    • 12677 Words
    • 51 Pages
    Better Essays
  • Satisfactory Essays

    Transaction Terminal Pos

    • 543 Words
    • 3 Pages

    Visontek 94 POS terminal with in-built finger print scanner is specially designed to address NREGA, Microfinance and PDS Segments with biometric authentication for beneficiary transactions. It is based on CCD finger print sensor with proprietary and precise algorithms which support ANSI 378 and ISO 19794 template formats for both enrollment and verification. The 94 POS comes with seamless connectivity options like GSM/GPRS, CDMA and Ethernet. Visiontek 94 POS comes with ISO 7811 for Magnetic stripe reader and ISO 7816 supported Smart Card Reader and Optional Contactless Card Reader. The fingerprint sensor is conveniently placed for user access. A built-in battery and high gain antenna make the 94POS ideal for outdoor field use.…

    • 543 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Interactive Session

    • 470 Words
    • 2 Pages

    Information systems support the credit card profiling strategy by using the data that credit card companies already collected and recorded for multiple purposes. First they use them to target future promotions for additional products more accurately. Second, the data help card issuers’ guard against credit card fraud by identifying purchases that appear unusual compared to a cardholder’s normal purchase history. The credit companies also flag users who frequently charge more than their credit limit. Lastly, these records are used by law enforcement agencies to track down criminals.…

    • 470 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Simulation Supermarket

    • 986 Words
    • 4 Pages

    * The non –acceptability of credit/debit card has created huge problems for many customers regarding the payment .installation of card reading at every tills can avoid this problem…

    • 986 Words
    • 4 Pages
    Powerful Essays