• Tidak ada hasil yang ditemukan

Biometric authentication system as securyty enhancement for automatted teller machine: ATM security analysis - Binus e-Thesis

N/A
N/A
Protected

Academic year: 2019

Membagikan "Biometric authentication system as securyty enhancement for automatted teller machine: ATM security analysis - Binus e-Thesis"

Copied!
7
0
0

Teks penuh

(1)

BINUS INTERNATIONAL

UNIVERSITAS BINA NUSANTARA

Major Information System Sarjana Komputer Thesis Semester [Even] year 2007

BIOMETRIC AUTHENTICATION SYSTEM AS

SECURITY ENHANCEMENT FOR AUTOMATED TELLER

MACHINE

Willy (0700676554)

Abstract

ATM nowadays has only ATM card and PIN (Personal Identification Number) as the security. To some people, the security of ATM is not secure enough. The objective of our thesis is to enhance the security of the ATM through the usage of biometric authentication system. With the enhancement of biometric authentication, it will be secure to do transaction within the ATM. One of the considerations of using biometric authentication is because every people have unique traits.

First, we are doing analysis to the current system. We have analyzed how the ATM works including the movement of data from the ATM to the bank server. We also analyze how the touch screen works including multiple point reading. With the information from the previous analysis, we develop the touch screen program which inherits the multiple points reading as the security for doing transaction in the ATM. The procedure compares a biometric reading against a corresponding reading stored in that person’s user record. If the two reading match closely, then the system will authenticate the person. By enhancing biometric authentication system in ATM, the system will become more secure and more reliable.

(2)

Preface

First we want to praise God because without his kindness and blessing, we could not complete this thesis titled “Biometric Authentication System as Security Enhancement for Automated Teller Machine” in time.

• Thank you to Mr. Lukas as our supervisor that brought the idea for creating this

thesis, giving us guidance and supports for completing this thesis.

• Thanks to my thesis group project, Hendy and Monica, without them this thesis

would not be finished.

• Mr Huibert Andi Wenas as Head Division School of Information System, we

could never thank you enough.

• Thank you for all the teachers that have share their knowledge and guidance to

author that cannot be mentioned one by one, all of the students who help in giving support and advice during completing this thesis.

• Thank you to our friends from NCR who give us valuable information about the

ATM and bank server.

(3)

TABLE OF CONTENT

Title Page ...i

Certificate of Approval... ii

Statement of Examiners ... iii

Abstract ...iv

Preface...v

List of Tables... viii

List of Figures ...ix

CHAPTER 1 ...1

2.1 Theoretical Foundation... 6

2.1.1 Security ... 6

2.1.2 ATM... 8

2.1.3 Biometrics ... 10

2.1.4 Interaction Design ... 20

2.2 Theoretical Framework ... 21

2.2.1 Waterfall Lifecycle Model... 21

2.2.2 Requirement Analysis ... 22

2.2.3 Data Gathering Techniques... 24

2.2.4 Prototype ... 25

2.2.5 Diagram... 25

2.2.5.1 Data Flow Diagram (DFD) ... 26

2.2.5.2 Context Diagram... 27

2.2.5.3 Use Case Diagram... 27

2.2.5.4 Statechart Diagram... 29

CHAPTER 3 ... 31

SYSTEM DESIGN... 31

3.1 How ATM is working ... 31

3.2 Design of the Features (Current Menu) ... 32

3.2.1 Inserting Card... 32

3.2.2 Inserting PIN ... 33

3.2.3 After Login... 34

3.2.4 Other Transaction... 35

(4)

3.2.7 Transfer ... 38

3.3 SWOT Analysis ... 39

3.4 Requirements Statement ... 40

3.5 ATM Hardware ... 42

CHAPTER 4 ... 44

SOLUTION DESIGN ... 44

4.1 Narrative of the Proposed System... 44

4.2 Policy and Procedures ... 45

4.3 Software Used ... 45

4.4 System Design ... 46

4.4.1 Context Diagram... 46

4.4.2 Business Process Narrative for DFD & DFD Level 0 ... 47

4.4.3 Process Diagram ... 53

4.4.4 Use Case... 56

4.5 User Interface Design... 69

4.5.1 ATM Main Window ... 70

4.5.2 HAT Description Window... 71

4.5.3 HAT Enter PIN Window ... 74

4.5.4 HAT Main Window... 79

4.5.5 HAT Image Capture Window... 85

4.5.6 HAT Transaction Limit Window... 97

4.5.7 HAT Summary Window ... 103

4.5.8 HAT Authentication Window... 106

4.6 Cost Benefit Analysis ... 111

4.7 Implementation Procedure ... 111

4.7.1 Hardware Requirement ... 111

4.7.2 Software Requirement ... 112

4.7.3 Personnel Requirement ... 112

Chapter 5 ... 113

Conclusion and Recommendation... 113

5.1 Conclusion ... 113

(5)

List of Tables

Table 1. Software used... 45

Table 2. Fully Developed Description for Log In... 57

Table 3. Fully Developed Description for Enroll HAT ... 59

Table 4. Fully Developed Description for Update HAT Transaction Limit ... 63

Table 5. Fully Developed Description for Update All HAT Data ... 65

Table 6. Fully Developed Description for Authenticate Customer ... 67

Table 7. Event Action for HAT Description Window... 73

Table 8. Event Action for HAT Enter PIN Window ... 77

Table 9. Event Action for HAT Main Window... 83

Table 10. Event Action for HAT Image Capture Window... 94

Table 11. Event Action for HAT Transaction Limit Window... 101

Table 12. Event Action for HAT Summary Window ... 105

Table 13. Event Action for HAT Authentication Window... 110

Table 14. Intangible Cost List... 111

Table 15. Intangible Benefit List ... 111

(6)

List of Figures

Figure 1.ATM hardware ... 9

Figure 2. Waterfall Lifecycle Model... 22

Figure 3. Elements of a DFD... 26

Figure 4. Elements of a use case diagram... 28

Figure 5. Elements of a statechart diagram... 29

Figure 6. ATM Network ... 31

Figure 7. Inserting Card Page ... 32

Figure 8. Inserting PIN Page ... 33

Figure 9. After Login Page ... 34

Figure 10. Other transaction Page... 35

Figure 11. Other transaction Page... 36

Figure 12. Payment Page ... 37

Figure 13. Transfer Page ... 38

Figure 14. Internal View of an ATM ... 42

Figure 15. Context Diagram of HAT System ... 46

Figure 16. DFD level 0 for Log In... 47

Figure 17. DFD level 0 for Enroll... 48

Figure 18. DFD level 0 for Update HAT Transaction Limit ... 49

Figure 19. DFD level 0 for Update HAT Image Capture ... 50

Figure 20. DFD level 0 for Update All ... 51

Figure 21. DFD level 0 for Authenticate Customer... 52

Figure 22. Process model for doing Transfer to the same bank account ... 53

Figure 23. Process model for doing Withdraw money from the ATM... 54

Figure 24. Process model for enrollment of HAT ... 54

Figure 25. Process model for updating image of HAT... 54

Figure 26. Process model for updating limit of HAT ... 55

Figure 27. Process model for updating all (updating both the image and limit) ... 55

Figure 28. Use Case Diagram of HAT System... 56

Figure 29. ATM Transaction Window... 70

Figure 30. ATM Other Transaction Window ... 70

Figure 31. HAT Description Window ... 71

Figure 32. HAT Description Window with Instruction message ... 71

Figure 33. Statechart Diagram of HAT Description Window... 73

Figure 34. HAT Enter PIN Window ... 74

Figure 35. HAT Enter PIN Window with Incorrect PIN enter message ... 75

Figure 36. Statechart Diagram of HAT Enter PIN Window... 77

Figure 37. ATM Main Window 1 ... 79

Figure 38. ATM Main Window 2 ... 80

Figure 39. Statechart Diagram of HAT Main Window ... 82

Figure 40. HAT Image Capture Window 1 ... 85

Figure 41. HAT Image Capture Window 2 ... 86

Figure 42. HAT Image Capture Window 3 ... 86

(7)

Figure 44. HAT Image Capture Window 5 ... 87

Figure 45. HAT Image Capture Window 6 ... 88

Figure 46. HAT Image Capture Window 7 ... 89

Figure 47. Statechart Diagram of HAT Image Capture Window... 93

Figure 48. Statechart Diagram of HAT Image Capture Window... 97

Figure 49. Statechart Diagram of HAT Transaction Limit Window ... 100

Figure 50. HAT Summary Window... 103

Figure 51. Statechart Diagram of HAT Summary Window ... 105

Figure 52. Confirmation Transfer Window ... 106

Figure 53. HAT Authentication Window ... 107

Figure 54. Access Granted Window... 107

Figure 55. Access Rejected Window ... 108

Referensi

Dokumen terkait

acara ini dilakukan untuk menunjukkan rasa persaudaraan mereka dikalangan pengemudi becak// selain itu. mereka juga ingin mengajak para pengemudi becak di jogjakarta

pendidikan aqidah, metode, lingkungan serta evaluasi yang terdiri dari. evaluasi koknitif

Tabel 13 menunjukkan indikator keunggulan kompetitif dan dampak kebijakan pemerintah terhadap usahatani beras di Desa Kondangjaya pada tahun 2010 dengan penghapusan biaya

Untuk menganalisis kinerja keuangan pada perusahaan pertambangan. selama

Geografi mempunyai kajian ilmu yang sangat luas sehingga ilmu geografi memerlukan ilmu pendukung yang erat kaitannya dengan geografi. Kajian geografi mempelajari bumi secara

MasyarakaI juga banyak memanfaatkan tumbuhan sebagai tumbuhan hias sebanyak 18, sebagai hrmbuhan aromatik sebanyak 6 spesies, sebagai panghasil pangan yaitu sebanyak 97

Increasing listening ability using picture is the way to support the teacher in solving the student problem in memorizing the English word and the writer tries to improve

Berdasarkan hasil penelitian dan hasil analisis data yang telah dilakukan, dapat diperoleh simpulan sebagai berikut: (1) Ada perbedaan pengaruh yang signifikan latihan passing