Biometrics relies on the use unique physical traits.

Technology: Technology is the basis for improving on the past and creating the future.Technology is applying scientific knowledge to find answers and fix problems.Technology is using fewer resources to manufacture goods more efficiently. Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are face,fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.


Technology is replacing human workers with mechanical or electronic devices. Technology is applying scientific knowledge to find answers and fix problems. Technology is using fewer resources to manufacture goods more efficiently. Technology is hiring workers from all over the world to manufacture goods.A technological system includes a goal, inputs, processes, outputs, and sometimes feedback.

Technology and science are different because, technology is how people change the world around them to meet their needs or solve practical problems and science is the study of the natural world.Technology is the application of tools, materials and knowledge to solve problems and extend human capabilities.Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technologicalinfrastructure affects the culture, efficiency and relationships of a business. 

Examples of Technology:

  • Tablets.
  • Laptops.
  • Communication Technology Labs.
  • Interactive Whiteboards.
  • Robotics.
  • 3-D Printers.
  • Digital Cameras.
  • Video Cameras.

Main benefits of using technology .

  • Improves engagement. 
  • Improves knowledge retention. 
  • Encourages individual learning.
  • Encourages collaboration. 
  • Students can learn useful life skills through technology. 
  • Benefits for teachers.

Biometric Fingerprint Technology:

Biometric technology may be defined as the automated use of physiological or behavioral characteristics to determine or verify an individual's identity.Biometric technologies are usually thought as im- plementation of pattern recognitionalgorithms, since it is aimed at identifying humans.Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are face,fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometricdata are separate and distinct from personal information.

Biometric security devices measure unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye, or fingerprint patterns. Withbiometrics, it can be extremely difficult for someone to break into a system.Biometric recognition provides a strong link between an individual and a data record. One area where biometrics can provide substantial help is in guarding against attempts to fraudulently establish multiple identities.Josh Ellenbogen and Nitzan Lebovic argued that Biometrics is originated in the identificatory systems of criminal activity developed by Alphonse Bertillon (1853–1914) and developed by Francis Galton's theory of fingerprints and physiognomy.

One of the main advantages associated with biometric technology is high individual identification accuracy. Biometrics relies on the use unique physical traits, such as a fingerprint, an iris pattern, or facial characteristics rendering biometric technology a very accurate technique of authenticating end users.Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals who are under surveillance.Biometrics are unique, measurable, physical characteristics which are used to recognise the identity or verify the claimed identity of an individual. Examples include facial image, fingerprints and iris patterns.

Fingerprint Based ATM:

Fingerprints are the most widely used biometricfeature for an individual identification and verification. We have proposed fingerprint verification of ATM (Automatic Teller Machine) security system using the biometric with hybridization. The fingerprint trait is chosen, because of its characteristics likeavailability, reliability and high accuracy. The fingerprint based biometric system can be implemented easily to secure the ATM machine.

One of the popular and widely practiced biometric systems is fingerprint Fingerprint biometric systems are smaller in size, easy to use and has low power. It is available and deployed globally in law enforcement, such as immigration, banking sectors, forensics, health care and many more. This article reviewed fingerprint biometric systems and the methods used in each proposed system.Application of the fingerprint biometric system in the industries has been accepted widely and used in the Europe and some developed country. Malaysia has also incorporated the use of this system in its administration for controlling the point of entry at the Kuala Lumpur International Airport. Generally, fingerprint biometric systems can be categorized into recognition, security, identification and control systems.

In this system the working of these ATM machine is when the customer places his finger on the fingerprint module whenhe needs to access the ATM to withdraw the cash then the machine processes the fingerprint of the user. With the help of biometrics,it verifies and identifies the fingerprint and gives accurate result that if it is valid or not. In this way we can try to control thecriminal activity of ATM and secure it.

A fingerprint recognition system can be used for both verification and identification to make the system more secure. Inverification, the system compares an input fingerprint to the fingerprint stored in the database of a specific user to determine ifthey are from the same finger (1:1 match). In identification, the system compares an input fingerprint with the prints of all registeredusers in the database to determine if the person is already known under a replica or false identity (1: N match).Fingerprint has distinct feature that do not change for whole life and they are easy to use, cheap and the most suitableminiaturization. So, fingerprint verification is an efficient and secured method that has been the most widely used in comparisonwith other biometric information. There are two key functions offered by a biometric system. One method is identification and the other is verification. In this article, we are concentrating on identifying and verifying a user by fingerprint recognition.

A modern ATM is typically made up of the devices like CPU to control the user interface and devices related to transaction, Magnetic or Chip card reader to identify the customer, PIN Pad, Secure cryptoprocessor generally within a secure cover, Display to be used by the customer for performing the transaction,Function key buttons, Record Printer to provide the customer with a record of their transaction, to store the parts of the machinery requiring restricted access -Vault , Housing for aesthetics, Sensors and Indicators.

Fingerprint technology is the most widely accepted and mature biometric method and is the easiest to deploy and for a higher level of security at your fingertips. It is simple to install and also it takes little time and effort to acquire one’s fingerprint with a fingerprint identification device. Thus, fingerprint recognition is considered among the least intrusive of all biometric verification techniques. Ancient times officials used thumbprints to seal documents thousands of years ago, and law agencies have been using fingerprint identification since the late 1800s. We here carry the same technology on digital platform. Although fingerprint images are initially captured, the images are not stored anywhere in the system. Instead, the fingerprints are converted to templates from which the original fingerprints cannot be recreated; hence no misuse of system is possible.

Advantages of Fingerprint Based ATM:

1)Access and Timekeeping:Most fingerprint scanning systems verify a person's identity to ensure they have permission to access a secure area. Many employers also use fingerprint scanning systems to confirm when an employee arrives or leaves work.This results in more accurate time logs and fewer mistakes.

2)Reliability:Fingerprint scanning systems provide a reliable way to track employees and you don't need to worry about storing extra data, since the system only requires a fingerprint. With a fingerprint-based system, employees don't need to worry about keeping cards or passwords safe. Fingerprint-based systems provide the ability to detect an individual out of millions of fingerprints accurately.

3)Security:Most other security systems have a higher risk of breaches caused by employee error. Someone can take advantage of a badge carelessly left behind to access a forbidden area, or a skilled worker may be locked out of his work area if he left his work badge at home. Fingerprint-based systems provide additional security, since criminals can't easily fake a fingerprint, fingerprints can't get misplaced and employees can't forget to bring their fingerprint to work.


The article presented a prototype design of an ATM access system using finger print technology. The system consists of finger print module, DC motor, LCD display. These are interfaced to the PIC microcontroller. When a user registers his fingerprint to the finger print module, this is fed as input to the microcontroller. The micro controller is programmed in such a way that the input from the user is checked compared with user database and displays the relevant information on the LCD display. When a authorized person is recognized using finger print module the door is accessed using DC motor. Finger-scan technology is being used throughout the world and provides an able solution. In the present days it is being used for computer network access and entry devices for building door locks. Fingerprint readers are being used by banks for ATM authorization and are becoming more common at grocery stores where they are utilized to automatically recognize a registered customer and bill their credit card or debit account. Finger-scanning technology is being used in a novel way at some places where cafeteria purchases are supported by a federal subsidized meal program. The system can be extended using a GSM module. The GSM module sends alert messages to the respective authorities when unauthorized person‟s finger print is detected.