The Construction Of A POS System Using Biometric Complete Project Material (PDF/DOC)
DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my — for his financial support and moral care towards me.Also to my mentor — for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.
ACKNOWLEDGEMENT
The successful completion of this project work could not have been a reality without the encouragement of my — and other people. My immensely appreciation goes to my humble and able supervisor Mr. — for his kindness in supervising this project. My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. —, and Dr. —. I also recognize the support of some of the staff of — among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. — and the —. Finally, my appreciation goes to my elder sister —, my lovely friends mercy —, —, — and many others who were quite helpful.
ABSTRACT
Several problems are encountered by cardholders at the point of sale (POS) terminal, these include; inadequate security of automated teller machine (ATM) card through theft, not remembering personal identity number (PIN) and the problem of identifying cardholder as the owner of the card, these have caused delay process in transactions and also reduce the integrity of the POS machine. The existing POS machine uses PIN-Card as an authentication process in which the security can be easily breached. This paper proffers a solution to reduce the identified problems by applying a biometric system into POS machine. Fingerprint was introduced at the authentication level of the POS machine. The results showed that the developed system could significantly minimize cardholder fraud at the POS machine if not totally eradicated.
Keywords: Automated Teller Machine (ATM), Biometric system, Point of Sale (POS), fingerprint.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
- PROBLEM STATEMENT
- AIM AND OBJECTIVES OF THE PROJECT
- SIGNIFICANCE OF THE STUDY
- SCOPE OF THE STUDY
- LIMITATION OF THE PROJECT
- DEFINITION OF TERMS
- PROJECT ORGANISATION
CHAPTER TWO
LITERATURE REVIEW
- RELATED WORK
- OVERVIEW OF BIOMETRICS
- BIOMETRIC FUNCTIONALITY
- REVIEW OF FINGER PRINT
- THE HISTORICAL BACKGROUND OF FINGERPRINTS
- FINGERPRINT RECOGNITION
- PATTERNS OF FINGERPRINT
- HISTORICAL BACKGROUND OF BIOMETRICS
CHAPTER THREE
METHODOLOGY
- INTRODUCTION
- RESEARCH DESIGN
- DESIGN CONSIDERATION AND SPECIFICATION
- DESIGN ANALYSIS OF DIFFERENT SECTIONS OF THE SYSTEM
- SOFTWARE DESIGN
- DESIGN PROCESS OF THE FINGERPRINT ATM SYSTEM
- OPERATIONAL PRINCIPLE OF THE DESIGNED SYSTEM
CHAPTER FOUR
- TESTING OF THE BIOMETRIC POS SYSTEM
- RESULT PRESENTATION AND ANALYSIS
CHAPTER FIVE
5.0 CONCLUSION AND RECOMMENDATION
- CONCLUSION
- RECOMMENDATION
- REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
The ATM card and PIN have proven to be inadequate security due to the continuous rising threat of ATM card related frauds in the emerging global cashless economy. For instance in Nigeria, there are various security breaches and ATM card related fraud has risen from 1.6 billion naira (10 million USD) in 2010 to 40 billion naira (250 million USD) in 2013 according to Financial Institutions Training Centre (2014).
Data from the Nigeria Inter-Bank Settlement System (NIBSS) has revealed that the highest number of fraudulent transactions in the banking sector takes place when withdrawing with their ATM card with 43 per cent of electronic banking frauds, followed by internet banking which was responsible for 34 per cent. The NIBSS data showed that three per cent of electronic banking fraud took place on Point of Sales (PoS) terminal while e-commerce was responsible for one per cent of electronic banking fraud and others, 19 per cent.
A Point of Sales (POS) is an electronic banking outlet that enables customers to complete the basic financial transactions using debit or credit cards without the aid of bank representative or teller (Ahsan et al., 2016); it is used in describing the technology a customer employed to make payment for exchange of goods and services (Alimi et al., 2014). This device enables a card owner to have immediate online access to money and information in the customer’s bank account through debit or credit cards. In POS operation, merchants give the total amount to be paid to customer, indicate the amount and may make available an invoice and create a directory for payment by the customer. A customer makes a payment to the merchant in exchange for goods or services using POS. The POS is much more complex than the cash registers due to the fact of its capacity to record, process buyer orders using cards.
Today, in developing nations, the POS systems are common due to the fact that they offer quick and suitable means for businesses (Kabir et al., 2016). These systems have important business activities such as transactions based online process, online business facilities, security, taxes, and various management reports. Hence, with the rise in number of transactions in supermarkets and the competitive environment for business in developing countries, guaranteeing the effective security platform becomes very essential. One of the major problems linked to use of credit and debit cards using POS during transactions is that the people with cards having the PIN code turn into owner of that account, without any other verification means of actual account holder (Bhosale et al., 2014).
There are several authentication methods of POS like passwords, debit cards, and PINs; these are conventional approaches to POS security verification. These approaches are not generally dependable due to the fact that it can be misplaced, work out or stolen by people (Jafri et al., 2009). Passwords and PINs are usually very difficult to remember or might be guessed by someone; cards and the like can be reproduced, forgotten or lost. There is need to reduce the security flaws in the conventional authentication methods of POS in order to have smooth transactions in point-of-sales terminal. For the effective and efficient operations of security systems, accurate and automatic recognition of persons is becoming increasingly important. Among the security of information techniques, biometric system has been identified to be one of the robust techniques (Kangra et al., 2015).
Biometric involves the identification of an individual using the feature vectors derived from biological or physiological characteristics (Singhal, Gupta, & Garg, 2012). Biometrical technologies include face, iris, hand geometry, fingerprint, palm print, keystroke, gait, hand vein, retina, voice, and signature (Jafri & Arabnia, 2009). Thus, a biometrics which uses either the behavioural or physiological characteristics of an individual to identify such individual is being used to replace such conventional methods of securing POS terminal (Gale & Salankar, 2014).
This paper is based on a biometric (fingerprint) system with POS terminal to minimize the challenges aforementioned. This technique of biometric is quite useful in situations where a large database will need to be searched for recognition while still ensuring there are minimal or no false matches (Daugman, 2009; Gale & Salankar, 2014).
1.2 PROBLEM STATEMENT
Point of sale (POS) machine permit customers executes payments for goods or services at any point in time. Point of sale (POS) machine consists of point of sale software (the commerce platform) and point of sale hardware (the cash register and related pieces that enable transactions).
It is quite unfortunate that users of POS machines usually loss confidence of using the machine due to poor security system from the traditional authentication system (PIN).
Traditional authentication systems (use of PIN) cannot discriminate between an impostor who fraudulently obtains the access privileges (card and PIN) and the genuine user (Khatmode et al., 2014). Therefore, to gain the POS machine user’s confidence, a second level biometric authentication security has to be put in place in conjunction with the already existing personal identification number (PIN). The activities of POS fraudsters in Nigeria have brought about financial hardship and devastation to victims and their families. These activities can also have negative effects on a nation’s economy and has cause the erosion of trust of banking institutions by the banking public. Hence, there is need to urgently tackle this problem. This study was carried out to build a system that will replace the PIN authentication system used in POS with fingerprint authentication system.
1.3 AIM AND OBJECTIVES OF THE STUDY
The main aim of this study is to build a biometric based POS machine that uses fingerprint as the POS login system. The objectives of this study are:
- To build the a POS machine that will replace the PIN authentication system used in POS with fingerprint authentication system
- To build high level of confidence in POS users
- To increase the security system of the POS usage.
1.4 SIGNIFICANCE OF THE STUDY
This study will serve as a means of enlightening the producers of POS machines on how the security of the machine can be improved thereby increasing the confidence of the users.
It will also help the student to understand the importance of fingerprint in security system.
The significance of this research work is that it will enable the researcher to understand in full what fingerprint is all about and the various way of improving POS security system.
1.5 SCOPE OF THE STUDY
The scope of this study covers the building of a POS machine that uses fingerprint as the authentication system. The security for POS terminals system consists of two parts which are hardware and software. The hardware is designed by the rule of embedded system and the aspect of software consists of several parts.
1.6 LIMITATION OF THE STUDY
Although fingerprint biometric technology has many benefits, it also has some limiting factors.
- First, these devices capture not only an image of the finger, but also a picture of the dirt, greases, and contamination found on the finger. Therefore, in certain areas, there are chances of being rejected by the system if for example a worker has a mark or some other contaminants on his finger.
- Secondly, today’s scanners still cannot recognize if the fingerprint is on a real finger or an artificial one, therefore, it is possible to trick the scanner by using a gelatin print mold over a real finger.
- A third disadvantage of these devices is the extent of the damage when somebody does manage to steal the identity information. Thus, if someone’s fingerprint data is compromised, it may not only compromise network security but also their bank account, car, etc. Moreover, even though these devices work well with an enrolled database, it may not be the case if used in a national database for the airline industry. It would require the whole industry to have the same technology to enroll their employees and submit the enrollment into a common database. The more the enrollment database grew, the more the opportunity for duplications and errors will increase.
1.7 OPERATIONAL DEFINITION OF TERMS
- Biometrics: is physiological or behavioral characteristics unique to individuals, this Include Fingerprint, hand geometry, handwriting, iris, retinal, vein and voice.
- Biometric Verification: is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.
- Scanner a device for examining, reading, or monitoring something in particular.
- Fingerprint sensor: is an electronic device used to capture a digital image of the fingerprint pattern.
- Rapid Application Development: is a concept that products can be developed faster and of higher quality.
- Authentication is the process of determining whether someone or something is, in fact, who or what it declared to be.
1.8 PROJECT ORGANISATION
The work is organized as follows: chapter one discuses the introductory part of the work, chapter two presents the literature review of the study, chapter three describes the methods applied, chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendations.
PROJECT DESCRIPTION
Format = Microsoft word
Chapters = 1-5 chapters
Price: N3,000.
For more information contact us through any of the following means:
Mobile No: +2348146561114 or +2347015391124
Email address: engr4project@gmail.com
Whatsapp No: +2348146561114
2.0 LITERATURE REVIEW
2.1 Introduction
The chapter presents a review of related literature that supports the current research on the Construction Of A POS System Using Biometric, systematically identifying documents with relevant analyzed information to help the researcher understand existing knowledge, identify gaps, and outline research strategies, procedures, instruments, and their outcomes…
This Research Work On “Construction Of A POS System Using Biometric” Complete Material Can Be Downloaded Through Whatsapp, Email Or Download Link. Click The Below Button To Proceed:
This study on the Construction Of A POS System Using Biometric is solely for academic research purposes only and should be used as a research guideline or source of ideas. Copying word-for-word or submitting the entire project work to your school is unethical academic behavior and “UniProjects” is not part of it.