You are on page 1of 10

Introduction to the ATM system: Automated Teller Machine enables the clients of a bank to have access to their account

without going to the bank. This is achieved only by development the application using online concepts. When the product is implemented, the user who uses this product will be able to see all the information and services provided by the ATM, when he enters the necessary option and arguments. The product also provides services like request for cheques, deposit cash and other advanced requirement of the user. The data is stored in the database and is retrieved whenever necessary. The implementation needs ATM machine hardware to operate or similar simulated conditions can also be used to successfully use the developed product. To develop this ATM system the entire operation has been divided into the following step: 1. verification process 2. language, service and account selection 3. Banking services 4. Transactions 5. Special services The program is designed in such a way that the user has to card and pin number. Once verified, he is provided a menu and he/she had to enter the option provided in the menu. For example, when the user wants to view the list of payment history than he/she had to enter the option for payment history provided in the main menu. When the option is entered alone with the respective argument, then the payment history is displayed on the screen. The user also must be given option to browse through the pages like previous page, next page, etc. The user may experience a delay in retrieving or viewing the data, when there are many users logged on to the same bank branch system. 1.2. Need for the ATM system: Millions of times per day around the globe people are instantly withdrawing money at automatic teller machines (ATMs). Given the fast-pace of the world today, it is not surprising that the demand for access to quick cash is so immense. The power of ATMs

would not be possible without secure connections. The final act of ATM dispending cash is the result of an amazingly fast burst of the customer never sees, but a trust is being done in a confidential manner. PROJECT DESCRIPTION 3.1 Need For The Software: Now a days every one very busy in their work. So they feel that the job must be easier so the system is used to reduce their work which is done in the ATM system. Instead of keeping lots of paper into a record or file and it may be missed somewhere so, this system help to keep the record of the customer it also keeps the details of he customer. It is also easy to access. 3.2 Problem description : The system mainly used by the bank clients. When a client comes to ATM centre to update and delete their account. It reduces the time consumption and lot of paperwork. For any single operation it involves numerous references and updating also takes subsequent changes in other places.

4. SYSTEM STUDY AND ANALYSIS 4.1. Existing System: v The existing system is manual system. v The manual system is prone to error.

v This system involves a lot of manual entries with the application to perform a desired task. v v v v Usage of papers and records in the process leads to less efficiently less productivity. Increase lots of mistakes while writing in paper. Time delay between the user and customer is reduced. For this reason the new system in invented.

4.2. Proposed System: The system customer transactions, satisfies the requirements of the existing system in full-fledged manner. Through this system, customer can make fast transactions and view the last transactions easily. 4.3. System Analysis: Understand the problem before the system to create analysis model there is a tendency to rush to a solution, even before the problem is understood. Develop prototypes that enables user to understand how human/machine interaction will occur. Since the perception of the quality of software is often based on the perception of the friendliness of the interface prototyping is highly recommended. Record the origin of and the reason for every requirement. This is the first step-in establishing traceability back to the customer. Use multiple views of requirements building data, functional and behavioral models provide the software engineer with three different views. This reduces the likelihood that something will be missed and increases the likelihood that inconsistency will be recognized. Rank requirements. Tight deadlines may preclude the implementation of every software requirements to be delivered in the first increment must be identified. Work to eliminate ambiguity because most requirements are described in a natural language, the opportunity for ambiguity abounds. 4.4. System planning: v Analysis principles are applied and a model of the software to be build called a planning (prototype) is constructed for customer and developer assessment. v The close-ended approach is often called throwaway prototyping using this approach a prototype serves solely as a rough demonstration of requirements it is then discarded and the software is engineered using a different paradigm.

v An open-ended approach, called evolutionary prototyping uses the prototype as the first part of an analysis activity that will be continued into design and construction the prototype of the software is the first evolution of the finished system. 4.5. Feasibility Study: Technology: This system is technically feasible, because the system activated by computers and recent technology. We use client / server technology which is powerful and very user friendly. Finance: It is financially feasible. There is no need of spending over money. Mainly this system constructed by existing devices only. Since we use visual studio dot net as a front-end it was most power-full, small and portable across platforms and operating systems both at the source and at the binary level. This project reduces the number of workers wage also. Time: This system really time-to-market beat the competition. Because the system developed with in a time span and worked based on time event. The time taken to access the account is very less and avoids unnecessary waiting that was in the traditional system. Although it uses less time but its performance is very well. Resources: This system will use the well known resources. Where there is no need of any special kind of resource. It uses only the required databases, tables only.

ATM CARD With a ATM card, you can access and carry out most of your personal banking transactions24-hours a day, 365 days a year. With an ATM card, you can perform a wide range of transactions through Automatic Teller Machines (ATM) at any time that is convenient to you, day or night Features Deposit cash or cheques into your accounts;Transfer Funds between your own accounts;Check your balance.Change your PIN.View transactional history.Order statements/cheque books.Send in other instructions to the bank via the mail deposit system.Make payments to other same bank customers. ATM card also be used against your foreign currency accounts. With this card, you canwithdraw cash from your accounts at 500,000 ATMs worldwide. Daily Transaction Limit To cap your potential risk exposure in the event of card loss, there is daily cash withdrawallimit of BDT 20,000 for regular Savings and Current accounts and BDT 50,000 for Power Vantage accounts. The minimum amount you can withdraw is BDT 500 per transaction.You can transfer up to BDT 100,000 per day between accounts and banks flexibility. Report a lost card

You have to report if your ATM card is stolen or lost to the bank to block the card.

HOW DOES ATM WORK ATM (Automated Teller Machine) is a computer. It has a small display and something similar to a keyboard (even if it doesn't look like one). It runs a program that is usually written by the bank. The program could do anythingbut banks usually follow a pattern.Most banks start by asking for the language. They then ask you to insert your card.This card has a magnetic strip on the back that it reads information about your bank account (sort of like a diskette on a PC). It uses this informationto look up your information and decide what to do next. Usually this is tohave you enter your password. After that, it's up to the program to decidewhat to do next. As for the equipment, banks usually buy the ATM as a single piece but it isactually made up of components. There are several different computer types but let's discuss this as if it were a PC. There would be several PCIslots. ATM Security All PIN encryption activity should take place on an Encrypting PIN pad (EPP) or PIN Encryption Device (PED) to prevent the compromise of a PIN in the clear at a terminal.

ATM PIN encryption should be triple DBS and DSS compliant. PIN blocks should never be stored in ATM log files. Personal Account Number (PAN) should be truncated and protected in ATM logs. Secure remote access controls must be established for all ATMs. Anti virus and Malware detection systems should be installed,, updated and tested frequently. Insist upon a vendor's written result of each test ATM Advantages Its very safety to use and carry.Its very safety because only user and bank can known its PINnumber.If a user lost his card a hiker can t hike his money. Any time means, 24 hours a day, 365 days a year we canwithdraw cash from our accounts.Use this ATM card it can helps us to waste our time. Ability to connect LAN to WAN 1.1 Problem Statement: The goal of this design is provide an interface which allows the controllingauthority to remotely configure the system and to be accessible by a widerange of people. The interaction provides direct manipulation and naturallanguage interfaces. Input will be in the form of a graphical user interface.O u t p u t w i l l b e f r o m h i g h r e s o l u t i o n g r a p h i c s , a n d p r i n t e d f o r m s . T h e representation of infor mation will be textual with iconic augmentation. B e c a

use of safety and privacy concerns the system wil l b e p u t i n f i x e d locations inside enclosures which will limit the interaction to one person at atime.The primary goal of developing such software is to develop software sothat consumer can access a banks computer and carry out their own financialtransactions without the mediation of a bank employee. Who is the application for? A number of companies provide ATM products. Consequently, only avendor or a large financial company could possibly justify the cost and effortof building ATM software. A small vendor would need some special featuret o d i f f e r e n t i a t e i t s e l f f r o m t h e c r o w d a n d a t t r a c t a t t e n t i o n . T h o u g h t h i s software fully implement the functionally of the ATM that is available in the 3

market today, but largely it includes all the essential features that an ATMsoftware must have. What problem will it solve? The ATM software is intended to serve both bank and customer. For the bank, ATM software increases automation and reduces manual handling of routine paperwork. For the customer the ATM is ubiquitous and alwaysavailable, handling routine transactions whenever and whenever the customer desires. Where will it be used?

ATM software has become essential to financial institutions. Customerstake it for granted that a bank will have an ATM machine. ATM machines area v a i l a b l e a t m a n y s t o r e s , s p o r t i n g e v e n t s , c o l l e g e s a n d o t h e r l o c a t i o n s throughout the world. How will it work? We will adopt a three -tier architecture to separate the user interfacefrom programming language, and programming language from the database.In reality the architecture is ntier architecture, because there can be anynumber of programming language communicating with each other. 1.3 Scope: Any software development effort is a financial institutions. From aneconomic perspective, it is desirable to minimize the investment, maximize 4 the revenue, and realize revenue as soon as possible. The domains of the software are the financial institutions. Customer takes it for granted that a bank will have an ATM machine. ATM machine are available at many stores,sporting events, colleges and other locations throughout the world. 1.4 Platform Specification: 1.4.1 Hardware: CPU (to control the user interface and transaction devices)

Magnetic and/or Chip card reader (to identify the customer) A Key-Board to provide input for the system Display (used by the customer for performing the transaction) 1.4.2 Software: WindowsXP. Application tool Java Development Kit. 1.4.3 Implementation Language: JAVA 2

You might also like