Construction Of A POS System Using Biometric

DEDICATION

This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my — for his financial support and moral care towards me.Also to my mentor — for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.

ACKNOWLEDGEMENT

The successful completion of this project work could not have been a reality without the encouragement of my — and other people. My immensely appreciation goes to my humble and able supervisor Mr. — for his kindness in supervising this project. My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. —, and Dr. —. I also recognize the support of some of the staff of — among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. — and the —. Finally, my appreciation goes to my elder sister —, my lovely friends mercy —, —, — and many others who were quite helpful.

ABSTRACT

Several problems are encountered by cardholders at the point of sale (POS) terminal, these include; inadequate security of automated teller machine (ATM) card through theft, not remembering personal identity number (PIN) and the problem of identifying cardholder as the owner of the card, these have caused delay process in transactions and also reduce the integrity of the POS machine. The existing POS machine uses PIN-Card as an authentication process in which the security can be easily breached. This paper proffers a solution to reduce the identified problems by applying a biometric system into POS machine. Fingerprint was introduced at the authentication level of the POS machine. The results showed that the developed system could significantly minimize cardholder fraud at the POS machine if not totally eradicated.

Keywords: Automated Teller Machine (ATM), Biometric system, Point of Sale (POS), fingerprint.

TABLE OF CONTENTS

COVER PAGE

TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWLEDGEMENT

ABSTRACT

CHAPTER ONE

INTRODUCTION

1.1      BACKGROUND OF THE PROJECT

  • PROBLEM STATEMENT
  • AIM AND OBJECTIVES OF THE PROJECT
  • SIGNIFICANCE OF THE STUDY
  • SCOPE OF THE STUDY
  • LIMITATION OF THE PROJECT
  • DEFINITION OF TERMS
  • PROJECT ORGANISATION

CHAPTER TWO

LITERATURE REVIEW

  • RELATED WORK
  • OVERVIEW OF BIOMETRICS
  • BIOMETRIC FUNCTIONALITY
  • REVIEW OF FINGER PRINT
  • THE HISTORICAL BACKGROUND OF FINGERPRINTS
  • FINGERPRINT RECOGNITION
  • PATTERNS OF FINGERPRINT
  • HISTORICAL BACKGROUND OF BIOMETRICS

 

CHAPTER THREE

METHODOLOGY

  • INTRODUCTION
  • RESEARCH DESIGN
  • DESIGN CONSIDERATION AND SPECIFICATION
  • DESIGN ANALYSIS OF DIFFERENT SECTIONS OF THE SYSTEM
  • SOFTWARE DESIGN
  • DESIGN PROCESS OF THE FINGERPRINT ATM SYSTEM
  • OPERATIONAL PRINCIPLE OF THE DESIGNED SYSTEM

CHAPTER FOUR

  • TESTING OF THE BIOMETRIC POS SYSTEM
  • RESULT PRESENTATION AND ANALYSIS

 CHAPTER FIVE

5.0      CONCLUSION AND RECOMMENDATION

  • CONCLUSION
  • RECOMMENDATION
  • REFERENCES

CHAPTER ONE

1.0                                                        INTRODUCTION

1.1                                           BACKGROUND OF THE STUDY

The ATM card and PIN have proven to be inadequate security due to the continuous rising threat of ATM card related frauds in the emerging global cashless economy. For instance in Nigeria, there are various security breaches and ATM card related fraud has risen from 1.6 billion naira (10 million USD) in 2010 to 40 billion naira (250 million USD) in 2013 according to Financial Institutions Training Centre (2014).

Data from the Nigeria Inter-Bank Settlement System (NIBSS) has revealed that the highest number of fraudulent transactions in the banking sector takes place when withdrawing with their ATM card with 43 per cent of electronic banking frauds, followed by internet banking which was responsible for 34 per cent. The NIBSS data showed that three per cent of electronic banking fraud took place on Point of Sales (PoS) terminal while e-commerce was responsible for one per cent of electronic banking fraud and others, 19 per cent.

A Point of Sales (POS) is an electronic banking outlet that enables customers to complete the basic financial transactions using debit or credit cards without the aid of bank representative or teller (Ahsan et al., 2016); it is used in describing the technology a customer employed to make payment for exchange of goods and services (Alimi et al., 2014). This device enables a card owner to have immediate online access to money and information in the customer’s bank account through debit or credit cards. In POS operation, merchants give the total amount to be paid to customer, indicate the amount and may make available an invoice and create a directory for payment by the customer. A customer makes a payment to the merchant in exchange for goods or services using POS. The POS is much more complex than the cash registers due to the fact of its capacity to record, process buyer orders using cards.

Today, in developing nations, the   POS systems are common due to the fact that they offer quick and suitable means for businesses (Kabir et al., 2016). These systems have important business activities such as transactions based online process, online business facilities, security, taxes, and various management reports. Hence, with the rise in number of transactions in supermarkets and the competitive environment for business in developing countries, guaranteeing the effective security platform becomes very essential. One of the major problems linked to use of credit and debit cards using POS during transactions is that the people with cards having the PIN code turn into owner of that account, without any other verification means of actual account holder (Bhosale et al., 2014).

There are several authentication methods of POS like passwords, debit cards, and PINs; these are conventional approaches to POS security verification. These approaches are not generally dependable due to the fact that it can be misplaced, work out or stolen by people (Jafri et al., 2009). Passwords and PINs are usually very difficult to remember or might be guessed by someone; cards and the like can be reproduced, forgotten or lost. There is need to reduce the security flaws in the conventional authentication methods of POS in order to have smooth transactions in point-of-sales terminal. For the effective and efficient operations of security systems, accurate and automatic recognition of persons is becoming increasingly important. Among the security of information techniques, biometric system has been identified to be one of the robust techniques (Kangra et al., 2015).

Biometric involves the identification of an individual using the feature vectors derived from biological or physiological characteristics (Singhal, Gupta, & Garg, 2012). Biometrical technologies include face, iris, hand geometry, fingerprint, palm print, keystroke, gait, hand vein, retina, voice, and signature (Jafri & Arabnia, 2009). Thus, a biometrics which uses either the behavioural or physiological characteristics of an individual to identify such individual is being used to replace such conventional methods of securing POS terminal (Gale & Salankar, 2014).

This paper is based on a biometric (fingerprint) system with POS terminal to minimize the challenges aforementioned. This technique of biometric is quite useful in situations where a large database will need to be searched for recognition while still ensuring there are minimal or no false matches (Daugman, 2009; Gale & Salankar, 2014).

1.2                                                  PROBLEM STATEMENT

Point of sale (POS) machine permit customers executes payments for goods or services at any point in time. Point of sale (POS) machine consists of point of sale software (the commerce platform) and point of sale hardware (the cash register and related pieces that enable transactions).

It is quite unfortunate that users of POS machines usually loss confidence of using the machine due to poor security system from the traditional authentication system (PIN).

Traditional authentication systems (use of PIN) cannot discriminate between an impostor who fraudulently obtains the access privileges (card and PIN) and the genuine user (Khatmode et al., 2014). Therefore, to gain the POS machine user’s confidence, a second level biometric authentication security has to be put in place in conjunction with the already existing personal identification number (PIN). The activities of POS fraudsters in Nigeria have brought about financial hardship and devastation to victims and their families. These activities can also have negative effects on a nation’s economy and has cause the erosion of trust of banking institutions by the banking public. Hence, there is need to urgently tackle this problem. This study was carried out to build a system that will replace the PIN authentication system used in POS with fingerprint authentication system.

1.3                                    AIM AND OBJECTIVES OF THE STUDY

The main aim of this study is to build a biometric based POS machine that uses fingerprint as the POS login system. The objectives of this study are:

  1. To build the a POS machine that will replace the PIN authentication system used in POS with fingerprint authentication system
  2. To build high level of confidence in POS users
  • To increase the security system of the POS usage.

1.4                                           SIGNIFICANCE OF THE STUDY

This study will serve as a means of enlightening the producers of POS machines on how the security of the machine can be improved thereby increasing the confidence of the users.

It will also help the student to understand the importance of fingerprint in security system.

The significance of this research work is that it will enable the researcher to understand in full what fingerprint is all about and the various way of improving POS security system.

1.5                                                   SCOPE OF THE STUDY

The scope of this study covers the building of a POS machine that uses fingerprint as the authentication system. The security for POS terminals system consists of two parts which are hardware and software. The hardware is designed by the rule of embedded system and the aspect of software consists of several parts.

1.6                                             LIMITATION OF THE STUDY

Although fingerprint biometric technology has many benefits, it also has some limiting factors.

  • First, these devices capture not only an image of the finger, but also a picture of the dirt, greases, and contamination found on the finger. Therefore, in certain areas, there are chances of being rejected by the system if for example a worker has a mark or some other contaminants on his finger.
  • Secondly, today’s scanners still cannot recognize if the fingerprint is on a real finger or an artificial one, therefore, it is possible to trick the scanner by using a gelatin print mold over a real finger.
  • A third disadvantage of these devices is the extent of the damage when somebody does manage to steal the identity information. Thus, if someone’s fingerprint data is compromised, it may not only compromise network security but also their bank account, car, etc. Moreover, even though these devices work well with an enrolled database, it may not be the case if used in a national database for the airline industry. It would require the whole industry to have the same technology to enroll their employees and submit the enrollment into a common database. The more the enrollment database grew, the more the opportunity for duplications and errors will increase.

1.7                              OPERATIONAL DEFINITION OF TERMS

  • Biometrics: is physiological or behavioral characteristics unique to individuals, this Include Fingerprint, hand geometry, handwriting, iris, retinal, vein and voice.
  • Biometric Verification: is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.
  • Scanner a device for examining, reading, or monitoring something in particular.
  • Fingerprint sensor: is an electronic device used to capture a digital image of the fingerprint pattern.
  • Rapid Application Development: is a concept that products can be developed faster and of higher quality.
  • Authentication is the process of determining whether someone or something is, in fact, who or what it declared to be.

1.8                                                         PROJECT ORGANISATION

The work is organized as follows: chapter one discuses the introductory part of the work,   chapter two presents the literature review of the study,  chapter three describes the methods applied, chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendations.


PROJECT DESCRIPTION

Format = Microsoft word

Chapters = 1-5 chapters

Price: N3,000.

 

For more information contact us through any of the following means:

Mobile No: +2348146561114 or +2347015391124

Email address: engr4project@gmail.com

Whatsapp No: +2348146561114

APA

Construction Of A POS System Using Biometric. (n.d.). UniTopics. https://www.unitopics.com/project/material/construction-of-a-pos-system-using-biometric/

MLA

“Construction Of A POS System Using Biometric.” UniTopics, https://www.unitopics.com/project/material/construction-of-a-pos-system-using-biometric/. Accessed 22 November 2024.

Chicago

“Construction Of A POS System Using Biometric.” UniTopics, Accessed November 22, 2024. https://www.unitopics.com/project/material/construction-of-a-pos-system-using-biometric/

WORK DETAILS

Here’s a typical structure for Construction Of A POS System Using Biometric research projects:

  • The title page of Construction Of A POS System Using Biometric should include the project title, your name, institution, and date.
  • The abstract of Construction Of A POS System Using Biometric should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
  • The introduction of Construction Of A POS System Using Biometric should provide the background information, outline the research problem, and state the objectives and significance of the study.
  • Review existing research related to Construction Of A POS System Using Biometric, identifying gaps the study aims to fill.
  • The methodology section of Construction Of A POS System Using Biometric should describe the research design, data collection methods, and analytical techniques used.
  • Present the findings of the Construction Of A POS System Using Biometric research study using tables, charts, and graphs to illustrate key points.
  • Interpret Construction Of A POS System Using Biometric results, discussing their implications, limitations, and potential areas for future research.
  • Summarize the main findings of the Construction Of A POS System Using Biometric study and restate its significance.
  • List all the sources you cited in Construction Of A POS System Using Biometric project, following a specific citation style (e.g., APA, MLA, Chicago).
WORK DETAILS