A CARD BASED SECURITY SYSTEM (A CASE STUDY OF ECO BANK)

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0684
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 32 Pages
  • Format: Microsoft Word
  • Views: 1.7K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

ABSTRACT

This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination of documents after which analysis was made and a computerized procedure recommended. This project will also suggest how to successfully implement the computerized procedure and to overcome the obstacle that would hinder the successful implementation of the system. The new system was designed using Microsoft visual basic 6.0 programming language. This language was chosen because of its easy syntax and features for developing windows based applications.

CHAPTER ONE

1.0 INTRODUCTION AND HISTORICAL BACKGROUND 

The idea of self-service in retail banking developed through independent and simultaneous effort in Japan, Sweden, the United States and the United Kingdom. In the USA, Luther George Sunsjan has been wrongly credited with developing and building the first cash dispenser machine. 

There is no evidence to suggest that Sunsjan worked in this device before 1959 while his 132nd patent was first filled in June 30, 1960 (and granted 26 February, 1963).

The roll out of the machine, called bank graph, was delayed a couple of years. This was particularly due to Sunjlan’s reflection electronics being acquired by universal match cooperation. An experimental Bank graph was installed in New York City in 1961 by the bank of New York, but removed after 6 months due to the lack of customer’s acceptance. The bank graph, however embodied the pre-occupation by its banking in finding alternative means to capture deposits, while the concern of the European and Asian Bank was cash distribution.

The first cash dispensing device used in Tokoyo in 1966. Although little known of this first device, it seems to have been activated with a credit and rather accessing current account balances. This technology has no immediate consequences in the international market 1972. In the UK, IBM (international business machine) 2984 was designed at the required of bank. The 2984 CIT (cash issuing terminal was the first cash poibt, similar in function till today’s machines; cash point is still registered trademark of TSB in the UK. All are online and issued a variable amount which was immediately deducted from the account. A small number of 2984’s were supplied to a US bank. Notable historical model of ATM’s include 10xx and TSB 900 series and NOR 50xx series.

1.1 OBJECTIVE OF THE STUDY

To total aim of this project work is to implement a card – based security for customer’s withdrawer using Eco Bank as a case study.

This project involves the running of the card based machine (ATM) and also explain the reason for the proposed project.

Generally, this project work should be test effectively the system (card–based security) can be compared with the manual based security.

1.2 STATEMENT OF PROBLEM 

One of the major problems in banking industry is account fraud. Appreciation of card based security which is significant different from other security based system as going to reduce the rate of fraud in banking sector.

1.3 SIGNIFICANCE OF THE STUDY

This project work will enhance the security of the customer’s account and transaction. It makes customer to access their bank account in order to make cash withdrawals and check their account balances as well as purchase cell phone prepaid credit without entering into their banking hall.

A CARD BASED SECURITY SYSTEM (A CASE STUDY OF ECO BANK)
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0684
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 32 Pages
  • Format: Microsoft Word
  • Views: 1.7K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0684
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 32 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination... Continue Reading
    ABSTRACT This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination... Continue Reading
    ABSTRACT This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination... Continue Reading
    TABLE OF CONTENT Title page i Approval page ii Dedication iii Acknowledgement iv Table of content v Abstract vi CHAPTER ONE 1.0 Introduction historical background 1.1 Objective of the study 1.2 Statement of the problem 1.3 Significance of the researchers study 1.4 Scope of study 1.5 Limitation of study 1.6 Brief history of case study 1.7... Continue Reading
    TABLE OF CONTENT Title page i Approval page ii Dedication iii Acknowledgementiv Table of content v Abstract vi CHAPTER ONE 1.0Introduction historical background 1.1Objective of the study 1.2Statement of the problem 1.3Significance of the researchers study 1.4Scope of study  1.5Limitation of study 1.6Brief history of case study 1.7Definition of... Continue Reading
    ABSTRACT This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination... Continue Reading
    ABSTRACT This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination... Continue Reading
    ABSTRACT In the up to date electronic planet, authentication of an individual is a vital assignment in numerous territories of everyday existence. Smart Cards are secure compact space gadgets utilized for a few requisitions specifically security identified ones including access to framework's database either connected or disconnected from the... Continue Reading
    ABSTRACT In the up to date electronic planet, authentication of an individual is a vital assignment in numerous territories of everyday existence. Smart Cards are secure compact space gadgets utilized for a few requisitions specifically security identified ones including access to framework\'s database either connected or disconnected from the... Continue Reading
    ABSTRACT In the up to date electronic planet, authentication of an individual is a vital assignment in numerous territories of everyday existence. Smart Cards are secure compact space gadgets utilized for a few requisitions specifically security identified ones including access to framework's database either connected or disconnected from the... Continue Reading
    Call Us
    whatsappWhatsApp Us