Near Field Communication(NFC) with Proposed Single Card for Multi Account

V.Deepa,M.Tech(CSE)1# B.Ben Sujitha2# P.Nagaraj3#

#Student, Kalasalingam University, vkdeepa94@gmail.com

#Professor, Kalasalingam University, bensujitha@gmail.com

#Professor,Kalasalingam University, nagaraj.p@klu.ac.in

 

Abstract -Today’s bank transaction is noticeably played with the utilization of an ATM card. Each account can be accessed to with the one kind ATM card . It is excessively troublesome,making it impossible to carry many cards and to recall the PIN number.The thought behind this work is that to many ledger in a solitary ATM card, so the client require not convey more cards with them and entanglement of taking care of passwords.For security, we utilize pins secret key with a figure scratch produced amid the card verification time.

 

Key terms: - ATM, Banks, NFC Card and Reader, Card authentication, cipher key, embedding accounts, pin



I. INTRODUCTION

 

At present every customer has an individual ATM card for each and every bank in which he/she maintains associate in nursing account. So handling the cards, their passwords plays a significant role here. So to overcome these difficulties we have tendency to embed more than one bank account in a single  smart card, so that the user can swipe the card and can select the bank from which he/she are interested to carry out a transaction.

Near Field Communication technology (NFC) is used,If the user opens the account from any bank then corresponding user total account histories are added into the corresponding bank. The multiple account histories are addedto the multiple bank. The user can use the single NFC card for borrowing and deposit money from any bank. Experimental results show that the proposed algorithm has satisfied the performance.

II. EXISTING SYSTEM

An automated teller machine (ATM) or cash machine is an electronic device that allows a bank’s customer to make cash withdrawals and check their accounts and balance without the need or human teller. Many ATM’s also allow people to deposit cash or cheque, transfer money between their bank accounts,top up their mobile phones prepaid or even buy postage stamps.In most modern ATMs, the customer identifies him or herself by inserting a plastic card with a magnetic strip or a plastic smart card with a chip that contains his or her account number. The customer then verifies his or her identity by entering a passcode (i.e.) personal identification number (PIN) of four digits. If the number is entered incorrectly several times consecutively (usually three), most ATMs will retain the card as a security precaution to prevent an unauthorized user form discovering the PIN by guesswork and so on. Moreover, there is a limitation in transaction for the other bank customers in using the ATM of any other bank crossing the limit they have to pay transaction fees.

 

 

III.LITERATURE SURVEY

 

A.NFC  Card& Security Basics

 

This Paper gives a overview of basics of smart card and its application and how it is used in various sectors. It also deals with security algorithm during encryption and decryption of data’s.This Paper tells us that why NFC card is preferred for banking system than other type cards.NFC card is type of chip card embedded with computer chip that stores and transacts data between users.NFC cards greatly convenience and security of any transaction.They provide tamper proof storage of user and account identity.Smart cards system have proven to be more reliable than other machine-readable cards.The card is made from PVC,Polyster or Polycarbonate. The card layer are printed first and then laminated in a large press.The next step in construction  is the die cutting.The card consists of several layers to prevent from card danage. Tools used for implementation are Fishbowl-To contain monitor an unauthorized user and IDIOT(Instruction Detection In Our Time).A system that detects intrusions using pattern-matching.

 

B. NFC card based Identity Card and Survey

This paper provides an overview of NFC card based ID cards and their security aspects.It tells us about how cards are manufactured and different types of cards. The use of NFC card technology in the banking sector represents a smart first step to preserving and protecting individual privacy while achieving secure, strong identity verification. The system must protect each individual information at all times, including while the information is being stored and while it is being used.NFC cards are credit card-sized,often made of flexible plastic and are embedded with a micro module containing a single silicon integratedcircuit chip with memory and microprocessor. The chip cards are of three types namely contact cards, contactless cards and multicomponent cards. Tools Used for Implementation are Microprocessor Unit.To execute Programmed Instruction,I/O controller and to manage the flow of data and Read Only Memory(ROM) to store instructions into the chip.

C. Chip-and-PIN: Success and challenges in reducing Fraud from Federal Reserve Bank of Atlanta

 

Traditional Payment cards have evolved in much of the world and now rely on the EMV (Europay, MasterCard, and Visa)global standard usingchip technology.Transaction conducted with EMV chip –embedded cards (smart cards) that uses PIN verification are more secure than transaction conducted using magnetic stripe technology. EMV cards are used globally in which United States stand apart in experience, chip-and-PIN cards have successfully reduced fraud on face-to-face Transactions. However, these cards have less impact on overall fraud levels as fraudsters have shifted their focus to non-chip transactions.

 

D.Benefits of Smart cards versus Magnetic Stripe Cards

Smart cards have significant benefits versus magnetic stripe cards for healthcare applications. Smart cards are highly secured one

and are used worldwide in applications where the security and privacy of information are critical requirements.Smart cards embedded with microprocessors can encrypt and securely store information, protecting the patient’spersonal health information. Smart cards use secure chip technologyand are designed and manufactured with features thathelps to prevent counter attacks Tools used for Implementation is Digital     Signature . To determine the card was issued by valid organization.

IV. PROPOSED SYSTEM

 

The idea behind this universal NFC card is that the customers can use a single NFC card to operate different bank accountsinstead of having individual card for each bank account and maintaining their pin’s, carrying the cards safely which is atedious process at the present scenario. The technology behind the product of the service is that adding all the user bank accounts to a single NFC card.

 

A. Secure Internet Banking uses OTP (One Time Password) and Bank Processing

 

In this the user shows his/her NFC card in the NFC card reader, then its request for authentication on the server side. Afterthe user is authenticated, then it displays the list of allbanks that the user is having the account. The OTP is received to the user smart phones via SMS where the mobile number is already registered in the bank. The short-time password solution is in use at in a software-based security systems. The OTP is entered in the ATM machine to continue the processing.Now the user can select the bank from which he/she is willing to perform the transaction.After selecting the bank the request is sent to the corresponding bank through a network and links it to the bank's serverfor accessing the database of the user or customer so that the transaction is processed.The coding and decoding of Information is done using specialized security software. The short-time password solution isin use at in software-based Security systems, the coding and decoding of information is done using specialized security software.

 

 

 

 

 

 

 

 

 

 


           
fig:process of Secure Internet Banking

 

 

V. Advantages of NFC card over magnetic cards

 

 

  Feature

 

NFC Card

 

Magnetic      Card

 

Reduction in fraud

Accuracy

Positive identification

Security

 

yes  

 

yes

yes

 

yes

 

 

 

No

 

No

No

 

No

 

 

VI.  FUTURE ENHANCEMENT

 

Since  more  than  one bank accounts are being added, the existing PIN security is not sufficient enough , so we can  embed a Biometric scans in the smart card I. e. multi- component card. So that the user holds the smart card such that the finger rests on the Biometricscans reader while he swipes the card and the image is authenticated at the real time. No one other than the user and his/her nominees can use the card. Only if the thumb impression matches the next step is processed otherwise the transaction will not be allowed until the user is authenticated.

 

VII.  CONCLUSION

 

Thus the user can manage his/her multiple accounts in various banks with the help of this single NFC card which provides easy access  and   reduces  the   complexity of managing more than one ATM card and their passwords. This also leads to lessening the transaction charges that were levied on the users/customers for action and decrease in the production transaction off NFC cards for each every account the user has. By implementing this the ATM fraud, i.e.skimming, etc. can be avoided.

 

REFERENCES

 

[1]       Chip-and-PIN: Success and challenges in reducing Fraud fromFederal Reserve Bank of Atlanta”-Douglas King, Jan 2012

[2]       “Examining Smart-Card Security under the Threat of Power AnalysisAttacks”-Thomas S.Messaerges member IEEE, EzzatA.Dabbishmember IEEE, and Robert H.Sloan senior member IEEE vol.51, No. 5,NOV 2001

[3]       ”Secure Internet Banking Application”-Alain Hiltgen, ThorstenKramp IEEE,VOL.52,Jan 2002.

[4]       Fingerprint Verification Using Smart Cards for Access Contol Systems,Raul Sanchez-Reilllo, IEEE AESS Systems Magazine , September2002

[5]       “Benefits Of Smart cards versus Magnetic Stripe Cards for healthcare Application”-Smart card Alliance 2011,IEEE,VOL.53,NO.3,April 2008

[6]       “On the design of an Embedded Biometric Smart Card Reader” Byuing-Sooim, Member, IEEE, Sung-Chul Lee and Duck-Jin Chung, Member,IEEE, VOL. 54, NO. 2, MAY 2008