Theft prevention ATM model using dormant monitoring for transactions

ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Jog, Vivek V., Arora, Rohan, Jain, Darshan, Bhat, Badal
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1159
container_issue
container_start_page 1156
container_title
container_volume
creator Jog, Vivek V.
Arora, Rohan
Jain, Darshan
Bhat, Badal
description ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a theft perpetrating entity. Our proposed model uses certain factors which would be monitored right from the initiation, to the end of the respective transaction. With the help of these factors, we would declare the status of the transaction before proceeding with cash withdrawal. Such monitoring would assist the transaction with a secure approach to bank upon.
doi_str_mv 10.1109/CICT.2013.6558274
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6558274</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6558274</ieee_id><sourcerecordid>6558274</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-95bcacb7014498971ad4530dc8b48f0bafd7d16cbfd3ab685b4edbd05805bba53</originalsourceid><addsrcrecordid>eNpVj8tKAzEYhSMiKHUeQNzkBTomk_y5LMt4K1TcjOuSTBKNdDIliYJvb4vduDqcD74DB6EbSlpKib7r1_3QdoSyVgCoTvIz1GipKBeSgQQlzv91zS5RU8onIeSgi06xK3Q_fPhQ8T77b59qnBNeDS94mp3f4a8S0zt2c55MqgeWYp3zEYU545pNKmY8KuUaXQSzK7455QK9PT4M_fNy8_q07lebZaQS6lKDHc1oJaGca6UlNY4DI25UlqtArAlOOipGGxwzViiw3DvrCCgC1hpgC3T7txu999t9jpPJP9vTd_YLWV9OGQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Theft prevention ATM model using dormant monitoring for transactions</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jog, Vivek V. ; Arora, Rohan ; Jain, Darshan ; Bhat, Badal</creator><creatorcontrib>Jog, Vivek V. ; Arora, Rohan ; Jain, Darshan ; Bhat, Badal</creatorcontrib><description>ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a theft perpetrating entity. Our proposed model uses certain factors which would be monitored right from the initiation, to the end of the respective transaction. With the help of these factors, we would declare the status of the transaction before proceeding with cash withdrawal. Such monitoring would assist the transaction with a secure approach to bank upon.</description><identifier>ISBN: 9781467357593</identifier><identifier>ISBN: 1467357596</identifier><identifier>EISBN: 9781467357586</identifier><identifier>EISBN: 146735757X</identifier><identifier>EISBN: 1467357588</identifier><identifier>EISBN: 9781467357579</identifier><identifier>DOI: 10.1109/CICT.2013.6558274</identifier><language>eng</language><publisher>IEEE</publisher><subject>ATM ; Cellular phones ; Computers ; Conferences ; Fraudulent ; Identity theft ; Monitoring ; Online banking ; Transactions ; Withdrawal</subject><ispartof>2013 IEEE Conference on Information &amp; Communication Technologies, 2013, p.1156-1159</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6558274$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6558274$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jog, Vivek V.</creatorcontrib><creatorcontrib>Arora, Rohan</creatorcontrib><creatorcontrib>Jain, Darshan</creatorcontrib><creatorcontrib>Bhat, Badal</creatorcontrib><title>Theft prevention ATM model using dormant monitoring for transactions</title><title>2013 IEEE Conference on Information &amp; Communication Technologies</title><addtitle>CICT</addtitle><description>ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a theft perpetrating entity. Our proposed model uses certain factors which would be monitored right from the initiation, to the end of the respective transaction. With the help of these factors, we would declare the status of the transaction before proceeding with cash withdrawal. Such monitoring would assist the transaction with a secure approach to bank upon.</description><subject>ATM</subject><subject>Cellular phones</subject><subject>Computers</subject><subject>Conferences</subject><subject>Fraudulent</subject><subject>Identity theft</subject><subject>Monitoring</subject><subject>Online banking</subject><subject>Transactions</subject><subject>Withdrawal</subject><isbn>9781467357593</isbn><isbn>1467357596</isbn><isbn>9781467357586</isbn><isbn>146735757X</isbn><isbn>1467357588</isbn><isbn>9781467357579</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVj8tKAzEYhSMiKHUeQNzkBTomk_y5LMt4K1TcjOuSTBKNdDIliYJvb4vduDqcD74DB6EbSlpKib7r1_3QdoSyVgCoTvIz1GipKBeSgQQlzv91zS5RU8onIeSgi06xK3Q_fPhQ8T77b59qnBNeDS94mp3f4a8S0zt2c55MqgeWYp3zEYU545pNKmY8KuUaXQSzK7455QK9PT4M_fNy8_q07lebZaQS6lKDHc1oJaGca6UlNY4DI25UlqtArAlOOipGGxwzViiw3DvrCCgC1hpgC3T7txu999t9jpPJP9vTd_YLWV9OGQ</recordid><startdate>201304</startdate><enddate>201304</enddate><creator>Jog, Vivek V.</creator><creator>Arora, Rohan</creator><creator>Jain, Darshan</creator><creator>Bhat, Badal</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201304</creationdate><title>Theft prevention ATM model using dormant monitoring for transactions</title><author>Jog, Vivek V. ; Arora, Rohan ; Jain, Darshan ; Bhat, Badal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-95bcacb7014498971ad4530dc8b48f0bafd7d16cbfd3ab685b4edbd05805bba53</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>ATM</topic><topic>Cellular phones</topic><topic>Computers</topic><topic>Conferences</topic><topic>Fraudulent</topic><topic>Identity theft</topic><topic>Monitoring</topic><topic>Online banking</topic><topic>Transactions</topic><topic>Withdrawal</topic><toplevel>online_resources</toplevel><creatorcontrib>Jog, Vivek V.</creatorcontrib><creatorcontrib>Arora, Rohan</creatorcontrib><creatorcontrib>Jain, Darshan</creatorcontrib><creatorcontrib>Bhat, Badal</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jog, Vivek V.</au><au>Arora, Rohan</au><au>Jain, Darshan</au><au>Bhat, Badal</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Theft prevention ATM model using dormant monitoring for transactions</atitle><btitle>2013 IEEE Conference on Information &amp; Communication Technologies</btitle><stitle>CICT</stitle><date>2013-04</date><risdate>2013</risdate><spage>1156</spage><epage>1159</epage><pages>1156-1159</pages><isbn>9781467357593</isbn><isbn>1467357596</isbn><eisbn>9781467357586</eisbn><eisbn>146735757X</eisbn><eisbn>1467357588</eisbn><eisbn>9781467357579</eisbn><abstract>ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a theft perpetrating entity. Our proposed model uses certain factors which would be monitored right from the initiation, to the end of the respective transaction. With the help of these factors, we would declare the status of the transaction before proceeding with cash withdrawal. Such monitoring would assist the transaction with a secure approach to bank upon.</abstract><pub>IEEE</pub><doi>10.1109/CICT.2013.6558274</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781467357593
ispartof 2013 IEEE Conference on Information & Communication Technologies, 2013, p.1156-1159
issn
language eng
recordid cdi_ieee_primary_6558274
source IEEE Electronic Library (IEL) Conference Proceedings
subjects ATM
Cellular phones
Computers
Conferences
Fraudulent
Identity theft
Monitoring
Online banking
Transactions
Withdrawal
title Theft prevention ATM model using dormant monitoring for transactions
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T15%3A08%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Theft%20prevention%20ATM%20model%20using%20dormant%20monitoring%20for%20transactions&rft.btitle=2013%20IEEE%20Conference%20on%20Information%20&%20Communication%20Technologies&rft.au=Jog,%20Vivek%20V.&rft.date=2013-04&rft.spage=1156&rft.epage=1159&rft.pages=1156-1159&rft.isbn=9781467357593&rft.isbn_list=1467357596&rft_id=info:doi/10.1109/CICT.2013.6558274&rft_dat=%3Cieee_6IE%3E6558274%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467357586&rft.eisbn_list=146735757X&rft.eisbn_list=1467357588&rft.eisbn_list=9781467357579&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6558274&rfr_iscdi=true