Moving ATM Applications to Smartphones with a Secured PinEntryMethods
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: A personal identification number (pin) is a widely used numeric password. The 4-digit pin numericpassword is being used as authentication in many important applications such as, an ATM. An ATM is a placewhere the shoulder surfing attack is of great concern. There are some existing methods that provide security tothe pin entry. But, those methods use only limited cognitive capabilities of the human adversary. The majordisadvantage that exists here is that human adversaries can be more effective at eavesdropping and assumptionsby training themselves. The proposed method called improved black white (BW) method can be more secure, asit uses bi-colored keys. Another contribution is the authentication service that uses local databases and a hashfunction. The hash function is mainly used to send the pin securely to the server through the public channel. AnATM application is created as an android application, where transactions can be performed in smart phonesusing a virtual money concept.
Authors and Affiliations
Kavitha V , Dr. G. Umarani Srikanth
A Survey Of Sign Based Image Copy Detection Methods
Abstract: The world wide web is filled with billions of images and redundant copies of images can frequently be found on many websites. These duplicates can be exact copies or differ slightly in their visual conten...
Threats and Security using Trust Techniques in Wireless Sensor Networks
Abstract: Wireless Sensor Networks are implementing on large scale in real time environments due to its incredible uses in real life. Wireless Sensor Networks don’t need human interference for its working so theycan plac...
Efficient Refining Of Why-Not Questions on Top-K Queries
Abstract: After decades of effort working on database performance, the quality and the usability of databasesystems have received more attention in recent years. In particular, answering the why-not questions after asear...
Passive Image Forensic Method to Detect Resampling Forgery inDigital Images
Abstract: The digital images are becoming important part in the field of information forensics and security,because of the popularity of image editing tools, digital images can be tampered in a very efficient mannerwitho...
Embedded Fingerprint Matching Mechanism in HIS for Health Care Service
Abstract: As technologies develops, our needs can be increase and also it can be change.The invention of new medical equipment’s in health care services can help both the patients and the doctors in several ways. I...