ATM Analysis Model: Evaluating Consistency and Security Features
VerifiedAdded on 2021/11/19
|7
|742
|171
Project
AI Summary
This project analyzes the consistency and security of an ATM system model, focusing on the impact of introducing Chip and PIN technology. The student explores the ATM's user interface, the role of the banking system in PIN verification, and proposes modifications to enhance security. The analysis includes diagrams illustrating the revised ATM structure, valid customer identification, and invalid PIN scenarios. The project highlights the advantages of using a one-time token in place of the validated encryption key, decreasing the coupling between the bank system and the ATM, and enhancing overall security without disrupting the transactional flow. The student references relevant research to support the analysis, demonstrating an understanding of ATM security enhancements and error handling.

Running head: ATM ANALYSIS MODEL CONSISTENCY
ATM Analysis Model Consistency
Name of the Student
Name of the University
Author Note
ATM Analysis Model Consistency
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Running head: ATM ANALYSIS MODEL CONSISTENCY
Table of Contents
ATM Structure...........................................................................................................................3
Identify Valid Customer.............................................................................................................5
Invalid Pin..................................................................................................................................6
References..................................................................................................................................7
Table of Contents
ATM Structure...........................................................................................................................3
Identify Valid Customer.............................................................................................................5
Invalid Pin..................................................................................................................................6
References..................................................................................................................................7

Running head: ATM ANALYSIS MODEL CONSISTENCY
ATM Structure
The user interface of the available ATM system has the functions cardErrorMsg() and
PIN_ErrorMsg() those are being handled by the UserInetrface of the ATM system model.
The banking system is responsible for evaluating the PIN verification function in the system.
In this model, PIN verification is handled by the banking system. Considering the present
model, modification can be made through introducing Chip and PIN where the PIN security
verification can be delivered on the card itself. Since, the modification is adequate, it will
have very less impact on the overall model of the ATM system that can be demonstrated in
the following figure:
Figure 1: Revised ATM Structure
(Source: Created by Author in Astah*)
ATM Structure
The user interface of the available ATM system has the functions cardErrorMsg() and
PIN_ErrorMsg() those are being handled by the UserInetrface of the ATM system model.
The banking system is responsible for evaluating the PIN verification function in the system.
In this model, PIN verification is handled by the banking system. Considering the present
model, modification can be made through introducing Chip and PIN where the PIN security
verification can be delivered on the card itself. Since, the modification is adequate, it will
have very less impact on the overall model of the ATM system that can be demonstrated in
the following figure:
Figure 1: Revised ATM Structure
(Source: Created by Author in Astah*)
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Running head: ATM ANALYSIS MODEL CONSISTENCY
In manner to capture the better performance of the system, the CHIP rename is being
used in place of the PIN object as demonstrated in the above diagram. Moreover, two new
functions are being added in the object the includes generateOTT() and validatePIN().
Thereafter, attachOTT() is being used as the replacement of the function attachPIN(). The rest
of the functions are there as those were and the UserInterface have the following functions:
1. getPIN()
2. getAccount()
3. getAmount()
4. selectTransaction()
5. PIN_ErrorMsg()
6. identifyCustomer()
7. generateOTT()
8. validatePIN()
On the other hand, the BankSystem retains its verifyCustomer() function. Another
approach being adopted is the usage of one time token in the place of the validated encryption
key that is a difference in this newly developed system.
In manner to capture the better performance of the system, the CHIP rename is being
used in place of the PIN object as demonstrated in the above diagram. Moreover, two new
functions are being added in the object the includes generateOTT() and validatePIN().
Thereafter, attachOTT() is being used as the replacement of the function attachPIN(). The rest
of the functions are there as those were and the UserInterface have the following functions:
1. getPIN()
2. getAccount()
3. getAmount()
4. selectTransaction()
5. PIN_ErrorMsg()
6. identifyCustomer()
7. generateOTT()
8. validatePIN()
On the other hand, the BankSystem retains its verifyCustomer() function. Another
approach being adopted is the usage of one time token in the place of the validated encryption
key that is a difference in this newly developed system.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Running head: ATM ANALYSIS MODEL CONSISTENCY
Identify Valid Customer
Figure 2: Identify Valid Customer
(Source: Created by Author using Astah*)
The made modifications are not vital that lead to very small modifications in the ATM
system structure diagram and same minor changes can be experienced in the Invalid PIN and
Valid Customer structures (King, 2012). The attempt is being driven for analysing the impact
of the necessary modifications and thereafter complying it with the necessary problems or
errors in the system. The problematic scenario was the validation of the Pin from the Bank
system side and hence, the proposed modification allows the system to retain the PIN within
the card of the customer (Swathi, Joshi & Kumar, 2018). The validation is made there
through validating the one time generated token as a replacement of the PIN.
Identify Valid Customer
Figure 2: Identify Valid Customer
(Source: Created by Author using Astah*)
The made modifications are not vital that lead to very small modifications in the ATM
system structure diagram and same minor changes can be experienced in the Invalid PIN and
Valid Customer structures (King, 2012). The attempt is being driven for analysing the impact
of the necessary modifications and thereafter complying it with the necessary problems or
errors in the system. The problematic scenario was the validation of the Pin from the Bank
system side and hence, the proposed modification allows the system to retain the PIN within
the card of the customer (Swathi, Joshi & Kumar, 2018). The validation is made there
through validating the one time generated token as a replacement of the PIN.

Running head: ATM ANALYSIS MODEL CONSISTENCY
Invalid Pin
Figure 3: Invalid Pin
(Source: Created by Author using Astah*)
The introduction of the Chip in the place of the PIN removes the need of the Bank
System for the PIN validation. However, the other changes are not much highlighting for the
rest of the functions (Bagade et al., 2018). The coupling between the Bank system and the
ATM is being decreased due to the introduction of the Chip and PIN cards. The advantageous
factor of this modification emphasizes on the security enhancement without altering the
transactional flow (Bradbury, 2016). The introduced modification is effective enough for
enhancing the security, PIN-based transaction, and error handling inn efficient and faster
way.
Invalid Pin
Figure 3: Invalid Pin
(Source: Created by Author using Astah*)
The introduction of the Chip in the place of the PIN removes the need of the Bank
System for the PIN validation. However, the other changes are not much highlighting for the
rest of the functions (Bagade et al., 2018). The coupling between the Bank system and the
ATM is being decreased due to the introduction of the Chip and PIN cards. The advantageous
factor of this modification emphasizes on the security enhancement without altering the
transactional flow (Bradbury, 2016). The introduced modification is effective enough for
enhancing the security, PIN-based transaction, and error handling inn efficient and faster
way.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Running head: ATM ANALYSIS MODEL CONSISTENCY
References
Bagade, C., Bagade, K., Deshmukh, A., Rede, T., & Kedar, R. M. (2018). Enhancement in
Card Payment system.
Bradbury, D. (2016). Why we need better ATM security. Engineering & Technology, 11(1),
32-35.
King, D. (2012, January). Chip-and-PIN: Success and challenges in reducing fraud. In Retail
Payments Risk Forum.
Swathi, H., Joshi, S., & Kumar, M. K. (2018, February). A Novel ATM Security System
using a User Defined Personal Identification Number With the Aid of GSM
Technology. In 2018 Second International Conference on Advances in Electronics,
Computers and Communications (ICAECC) (pp. 1-5). IEEE.
References
Bagade, C., Bagade, K., Deshmukh, A., Rede, T., & Kedar, R. M. (2018). Enhancement in
Card Payment system.
Bradbury, D. (2016). Why we need better ATM security. Engineering & Technology, 11(1),
32-35.
King, D. (2012, January). Chip-and-PIN: Success and challenges in reducing fraud. In Retail
Payments Risk Forum.
Swathi, H., Joshi, S., & Kumar, M. K. (2018, February). A Novel ATM Security System
using a User Defined Personal Identification Number With the Aid of GSM
Technology. In 2018 Second International Conference on Advances in Electronics,
Computers and Communications (ICAECC) (pp. 1-5). IEEE.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



