Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/15667
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAlhassan, J. K.-
dc.contributor.authorOchoche, A.-
dc.contributor.authorEnagi, A. M.-
dc.contributor.authorGaniyu, S.O.-
dc.contributor.authorMuhammad-Bello, B. L.-
dc.date.accessioned2022-12-20T16:56:31Z-
dc.date.available2022-12-20T16:56:31Z-
dc.date.issued2016-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/15667-
dc.description.abstractThe increase of automated teller machine (ATM) frauds has actuated the development of new authentication mechanisms to overcome security problems of personal identification numbers (PIN). As a rule, ATMs give users three tries for authentication to the bank server. In an event where the user fails to authenticate to the bank server, the ATM card will typically be blocked and also confiscated by the ATM. In this research, a model to provide second-level authentication for ATM transactions was proposed and implemented using Visual Studio and MySQL. To operate this system, the user is to insert the ATM card into the machine, provide the PIN and then set the withdrawal limit. Any amount above this limit will request the user to enter the second level authentication code which is sent to the user’s mobile phone by the bank server. The application was tested and found to solve the problem of cards confiscation and stressful existing process of retrieving such cards. It is recommended for implementation by banks and other financial institutions.en_US
dc.description.sponsorshipTetFunden_US
dc.language.isoenen_US
dc.publisher1St International Conference of IEEE Nigeria Computer Chapter In collaboration with Department of Computer Science, University of Ilorin, Ilorin, Nigeriaen_US
dc.subjectauthenticationen_US
dc.subjectsecurityen_US
dc.subjecttransactionen_US
dc.subjectautomated teller machineen_US
dc.titleDevelopment of Second-Level Authentication Process for a Higher Level Security in ATM Transactionsen_US
dc.typeArticleen_US
Appears in Collections:Information and Media Technology



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.