Abstract: This Invention will introduce the concept of physical browsing and development of a system that will allow users to use their mobile phones to securely withdraw cash from ATM machines. Initially the ATM module gets the password from the user mobile and it matches with the initial password. If it matches, then An ATM module allows the use entering the Amount. Otherwise ATM module will informs the bank that wrong user trying to access the bank. If the users entered the amount, ATM module sends this amount to the authority user mobile and waits for the ACK message from the Authority mobile. If the ACK message is OK, then Process will be successfully completed. Otherwise it will informs the bank and also users Mobile that wrong user trying to Access the bank.
CARD LESS TECHNOLOGY IN ATM(USING MOBILE)
FIELD OF INVENTION
ATM Technology
The Architecture
BACKGROUND OF INVENTION
Secure cash transaction is of serious concern in growing use of cash cards and internet transactions. Cash withdrawal cards, chip and pin facility is one of the facilities which have increasingly been used for business and social activities. However, there has been limited research focus on security and flexibility.
SUMMARY OF INVENTION
These problems are overcome by the present Invention, which provides the concept of physical browsing and development of a system that will allow users to use their mobile phones to securely withdraw cash from ATM machines.
The latest revolution seems to happen with respect to mobile banking an attempt to leverage on the synergies of mobile banking technology in telecom and information technology in the banking services
Initially the ATM module gets the password from the user mobile and it matches with the initial password. If it matches, then
An ATM module allows the use entering the Amount. Otherwise ATM module will informs the bank that wrong user trying to access the bank.
If the users entered the amount, ATM module sends this amount to the authority user mobile and waits for the ACK message from the Authority mobile. If the ACK message is OK, then Process will be successfully completed. Otherwise it will informs the bank and also users Mobile that wrong user trying to Access the bank.
BRIEF EXPLANATION OF THE DRAWINGS.
In order that the Invention may be more readily understood, embodiments thereof will now be described, by the way of example, with reference to the accompanying Drawings in which:
FIG. 1 is a Schematic representation that shows us the clear picture of Secure And Easy process of Cash withdraw
FIG. 2 is a schematic overview of the Architecture of a Cardless ATM Technology that the process of network in which it is used before Accessing ATM Machine through SMS technology.
DETAILED DESCRIPTION
The growth and development of mobile technology has had positive effects on society. It is for a fact that having a mobile phone now a days is a sort of a necessity and it is an inevitable truth that mobile industry is taking everyone by a storm. From the very basic thing of making a call to texting, and now internet access for just a touch of your finger tips. There has been a growing use of Mobile technology in different environments. A typical example includes in the education sector, Army, Banking sector etc.
Secure cash transaction is of serious concern in growing use of cash cards and internet transactions. Cash withdrawal cards, chip and pin facility is one of the facilities which have increasingly been used for business and social activities. However, there has been limited research focus on security and flexibility. The advent of mobile banking technology has definitely brought flexibility in the ease of banking transactions, but at the same time has increased the risk of banking frauds. Various mobile banking applications have been introduced by international and local banks throughout the world Customers are definitely feeling more comfortable completing transactions through their mobile handsets.
Hence, from the hypothesis above, it can be deduced that there are many other application that can be realized - time and technology permitting. To achieve Various functionality and make good use of mobile devices so that people can keep them and utilized their potentials.
The latest revolution seems to happen with respect to mobile banking an attempt to leverage on the synergies of mobile banking technology in telecom and information technology in the banking services. Today, Banks have welcomed wireless and mobile technology into their boardroom to offer their customers the freedom of paying bills, planning payments while stuck in traffic jams, to receive updates on the various marketing efforts while present at a party to provide more personal and intimate relationships.
Some of the other features where mobile banking has lent its hand are Fund Transfer & Bill Payment where the customers have the freedom of maintaining account through mobile. Mobile banking has also welcomed other financial services like share trading. The latest Information technology revolution enables sophisticated Enquiry Based banking services for Credit/Debit Alerts. Some of the other outcomes of the Revolution in the banking industry are Minimum Balance Alerts, Account Balance Enquiry, Account Statement Enquiry, Cheque Status Enquiry, Cheque Book Requests and Bill Payment Alerts.
We provide a secure communication network for an ATM user to access a remote server.
The use of mobile handheld devices is expanding rapidly both within the business and individual context.
These devices are now essential tools that offer competitive business advantages in today's growing world of ubiquitous computing environment. The technology advancement has made it possible to embed more facilities in mobile phones. While they provide benefits, they also pose new risks on security either by the information they contain or information that they can access remotely.FIG. 1 is a Schematic representation that shows us the clear picture of Secure And Easy process of Cash withdraw.
First, the Required User wants to send the ATM ID No to the Bank through SMS in which in turn the Bank immediately Response with an Randomly Generated One-Time Password of Maximum of 4 Digits with mixture of Alphanumeric & Symbols. This portion covers before entering of any ATM machine.
Next portion covers the Secure Accessing of our Account in which by Default it will Shows Bank Ads and if you Press any button a New Screen will Appear which will be Asking for Language Setting as English or Hindi so select as your wish then it enter into Secure part where it will ask for your One-Time Password And your ATM PIN No. so type the given One-Time Password within 5 min (as default) in same ATM Center for Avoid Denied Access message and it can be changed by the interest of the bank. Now type your PIN No then next Click Continued Button. This Leads the Bank to sends an Alert with reply option to Authenticate (this procedure allows a User to use his /her Account in remote Access). Then it will takes to normal procedure as it will ask for "Saving Account", "Balance Enquiry", "Current Account".., then after selection of your mode it will ask for the Amount you need as you type and click continued. So that almost the process is over. If any User's phone is lost just instant he can use his/her Bank's ATM machine or Directly contacting the Bank to Block the Misuse of Transaction
Most mobile phones are equipped with various network interfaces such as WLAN, Bluetooth, GSM,GPRS or UMTS. The framework is designed be meet the characteristics of MANETs and context-awareness in such a way that the user will be able to choose the network that provides high data transfer rates, secure data transaction and is cost effective. The Fig 2 shows the process of network which is used before Accessing ATM Machine through SMS technology. The main components of Cardless ATM technology consists of four parts in which they have two sections they are Before processing and After processing . I before processing Section contains two parts namely, Bank Server and Mobile Phone, here in Bank Server it contain One-Time Password Generator in which it Directly connects with Bank System so that the One-Time Password gets registered to particular Mobile for the Authentication for Each transaction the One-time Password changes to user to user, the user must reply for the Bank Message in his mobile phone Instant However because the Secure application is more susceptible to security threats, the design incorporates other security measures such as the message gets automatically erased after reading by the user from his mobile phones, say 30 sec from the inbox of your mobile phone (Self Destruction of SMS Message Software) in which
Bank also can set a password to view that Message
That is determining who is allowed to enter your network of transaction of Secure Cash withdraw from an ATM and hiding information from hackers who may try to intercept information during transmission.
The Secure Application deals with information transfer and financial transactions. Hence, the security elements considered during the design and implementation stage consist of making sure that the with the latest technology This process will be achieved through the use of software wrappers that will enable selection and identification of available communication channels based on the location of the device in an ad-hoc manner.
Another option will be to make use of WLAN provided by the banking system. In which authentication process can be verified before allowing access to the network itself. In this case security will be better monitored and control, it is more preferable if the user will not pay for any network usage or traffic.
We claim,
1. We provide a secure communication network for an ATM user to access a remote server.
2. This invention will introduce the concept of physical browsing and development of a system that will allow users to use their mobile phones to securely withdraw cash from ATM machines Directly or remote ATM machines.
3. The method of claim 2, further allows to do cardless ATM technology where card is not necessary in transaction and shopping any more.
4. This Secure Application deals with information transfer and financial transactions safe and secure.
5. The information can't be traced by hackers who may try to intercept information during transmission.
6. The method of claim 4, uses the SMS Technology in Mobile phones for secure withdraw of cash from ATM machines.
7. The method of claim 5, subscribes as Unauthorized person can't steal Bank information as it gets deleted and can be used only one transaction for each One-Time Password.
8. For the remote Access of ATM machines the Authorized person can have full" control over each step of Transaction in that ATM machine remotely, and can change PIN No in mobile phones after Transaction.
9. The method of claim 8, Suprises the authorized person which He / She can stop the Transaction in between if Other person in the other end has a change in amount of Transaction.
10. The method of claim 2, allows us to Avoid bouncing of check, hacking of our Account and use of cards as it may have change to bend which leads to problem in withdraw of money from ATM machines.
| # | Name | Date |
|---|---|---|
| 1 | 1298-che-2010 form-2 10-05-2010.pdf | 2010-05-10 |
| 1 | 1298-CHE-2010 ABSTRACT 10-05-2011.pdf | 2011-05-10 |
| 2 | 1298-che-2010 form-1 10-05-2010.pdf | 2010-05-10 |
| 2 | 1298-CHE-2010 CLAIMS 10-05-2011.pdf | 2011-05-10 |
| 3 | 1298-che-2010 drawings 10-05-2010.pdf | 2010-05-10 |
| 3 | 1298-CHE-2010 CORRESPONDENCE OTHERS 10-05-2011.pdf | 2011-05-10 |
| 4 | 1298-che-2010 description(provisional) 10-05-2010.pdf | 2010-05-10 |
| 4 | 1298-CHE-2010 DESCRIPITON (COMPLETE) 10-05-2011.pdf | 2011-05-10 |
| 5 | 1298-CHE-2010 FORM -2 10-05-2011.pdf | 2011-05-10 |
| 5 | 1298-CHE-2010 DRAWINGS 10-05-2011.pdf | 2011-05-10 |
| 6 | 1298-CHE-2010 DRAWINGS 10-05-2011.pdf | 2011-05-10 |
| 6 | 1298-CHE-2010 FORM -2 10-05-2011.pdf | 2011-05-10 |
| 7 | 1298-che-2010 description(provisional) 10-05-2010.pdf | 2010-05-10 |
| 7 | 1298-CHE-2010 DESCRIPITON (COMPLETE) 10-05-2011.pdf | 2011-05-10 |
| 8 | 1298-che-2010 drawings 10-05-2010.pdf | 2010-05-10 |
| 8 | 1298-CHE-2010 CORRESPONDENCE OTHERS 10-05-2011.pdf | 2011-05-10 |
| 9 | 1298-che-2010 form-1 10-05-2010.pdf | 2010-05-10 |
| 9 | 1298-CHE-2010 CLAIMS 10-05-2011.pdf | 2011-05-10 |
| 10 | 1298-CHE-2010 ABSTRACT 10-05-2011.pdf | 2011-05-10 |
| 10 | 1298-che-2010 form-2 10-05-2010.pdf | 2010-05-10 |