aadhaar secure travel identity shoeb

24
AADHAAR SECURE TRAVEL IDENTITY A Mini Project report Submitted in partial fulfillment of the requirement For the award of the degree of BATCHELOR OF TECHNOLOGY IN COMPUTER SCIENCE & INFORMATION TECNOLOGY BY SYED SHOEB ULLAH HT.NO:- 08801A1251 KHURSHEED AHMED HT.NO:-08801A1260 MOHAMMED ABDUL SAUD HT.NO:-08801A1222 Under the esteemed guidance of Mr. RAJU Asst.Prof.CSITDept. DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY ARKAY COLLEGE OF ENGINEERING & TECHNOLOGY (Approved by AICTE New Delhi, Affiliated to JNTU, Hyderabad)

Upload: sai-baba

Post on 08-Mar-2015

729 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Aadhaar Secure Travel Identity Shoeb

AADHAAR SECURE TRAVEL IDENTITY

A Mini Project report

Submitted in partial fulfillment of the requirement

For the award of the degree of

BATCHELOR OF TECHNOLOGY

IN

COMPUTER SCIENCE & INFORMATION TECNOLOGY

BY

SYED SHOEB ULLAHHT.NO:- 08801A1251KHURSHEED AHMEDHT.NO:-08801A1260

MOHAMMED ABDUL SAUDHT.NO:-08801A1222

Under the esteemed guidance of

Mr. RAJUAsst.Prof.CSITDept.

DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY

ARKAY COLLEGE OF ENGINEERING & TECHNOLOGY(Approved by AICTE New Delhi, Affiliated to JNTU, Hyderabad)

BODHAN (V), NIZAMABAD (D), 503180.2010-2011

Page 2: Aadhaar Secure Travel Identity Shoeb

ARKAY COLLEGE OF ENGINEERING & TECHNOLOGY(Approved by AICTE New Delhi, Affiliated to JNTU, Hyderabad)

BODHAN (V), NIZAMABAD (D), 503180.

DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY

CERTIFICATE

This is to certify that project entailed “ AADHAAR SECURE TRAVEL IDENTITY” submitted in partial fulfillment of the requirement for the

degree in BATCHELOR OF TECHNOLOGY (CSIT), from JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY Hyderabad ,Andhra Pradesh is record of bonafide work carried out bySYED SHOEB ULLAHHT.NO:- 08801A1251, KHURSHEED AHMEDHT.NO:-08801A1260, MOHAMMED ABDUL SAUDHT.NO:-08801A1222 and the supervision and guidance of Mr. RAJU (Asst. Prof. CSIT Dept).

Internal Guide Head of the DepartmentMr.RAJUMs.Ambika(HOD)

Asst. Prof. CSIT DeptDept of CSIT

External Examiner

Page 3: Aadhaar Secure Travel Identity Shoeb

ACKNOWLEDGEMENT

With great pleasure I want to take this opportunity to express my heartfelt gratitude to all the people who helped in making this project work a grand success.

I am grateful to my project guide Mr. RAJU sir for his constant guidance throughout our project work.

I would like to thank Ms.AMBIKAmadam , Head of the Department of CSIT, of being moral support throughout the period of our study in ARKAY COLLEGE.

First of all I am highly indebted to Principal, Mr.HAFEEZ UDDIN sir, for giving me the permission to carry out this project.

I would like to thank the Teaching & Non- teaching staff of CSIT Department for sharing their knowledge with me.

I would like to express my special thanks to my parents and friends for giving their co-operation and support

SYED SHOEB ULLAHHT.NO:- 08801A1251KHURSHEED AHMEDHT.NO:-08801A1260

MOHAMMED ABDUL SAUDHT.NO:-08801A1222

Page 4: Aadhaar Secure Travel Identity Shoeb

ABSTRACT

AADHAAR SECURE TRAVEL IDENTITY

Aim:

To create a Tool that manages the handling of passport and license using the unique

identification associated with each individual.

Objective:

Associate each citizen with a unique identification (UID) & pin.

Provide passport less access at the airport by providing only the UID & pin.

Allow crime department to communicate with the airport authority.

License Application, Process and Issue of License.

Scope:

Citizen Registration

Secure passport application

Passport application verification by the police authority.

Passport Issue & Denial

Provide crime department to integrate with the airport to stop someone from flying.

Apply for License.

Provide Test details and scenario.

Provide result.

Issue or deny License.

(1)

Page 5: Aadhaar Secure Travel Identity Shoeb

Action Plan:

The application deals with allowing the citizens to register for a unique identity. The ID

is supported with a pin. Citizen’s being issued passport or those have a passport is then associated

with the UID. This helps the citizen to travel abroad without having the passport. The UID will

provide access to the passport from the airport for the airline from the centralized server. The

details and profile of the citizen with the photo can be viewed as part of security check.

The crime department can also use the application to trace or stop any person from travelling

abroad. The airline gets a notification when the airport staff has access to the citizen’s passport. The

crime department can stop or trace either using the UID or passport number. They could also pass

the name of the person and the system can generate a list of photo previews of people having a

passport.

The citizen uses the aadhaar scheme to apply for license. The details of the citizen are picked from

the registration database. The citizen is provided with the test details by the application. The details

contain the location, date and time information. The test details are provided to the citizen on

completion of the test. The license issual and denial is recorded.

(2)

Page 6: Aadhaar Secure Travel Identity Shoeb

LIST OF TABLES

Fields_Name Data Types

Admin

Uname TextPword Text

Apply_Aadhar

Apply_Id NumberCivilian_Id NumberAdate Date/TimeIdate Date/TimeStatus TextANO Number

Apply_Lisence

Apply_ID NumberAADHAR_ID TextADATE Date/TimeIdate Date/TimeStatus TextLNO NumberExpDate Date/Time

Apply_Passport

Apply_ID NumberAADHAR_ID TextAdate Date/TimeIdate Date/TimeStatus TextPNO NumberExpDate Date/Time

(3)

Page 7: Aadhaar Secure Travel Identity Shoeb

Booking

Aadhar_Id TextSource TextDestination TextBooked_Date Date/TimeJourney_Date Date/TimeFcode TextFare CurrencySeat_No NumberAgency_ID Number

Civilians

Civilian_ID NumberCname TextFname TextGender TextAddress MemoDOB Date/TimeQualification TextContacts TextEmail TextUname TextPword TextRdate Date/TimeAADHAR_ID TextPPNO TextLISENCE_NO TextPhoto Text

Flights

FCODE TextSource TextDestination TextDept_Time Date/TimeArrival_Time Date/TimeFare CurrencyAirLines Text

(4)

Page 8: Aadhaar Secure Travel Identity Shoeb

Chapter 1

INTRODUCTION

(5)

Page 9: Aadhaar Secure Travel Identity Shoeb

INTRODUCTION

The application implements a systematic approach to handle the services to the citizens in a more appropriate manner which also includes the tracing of their usage. The application that is proposed is intended for the citizens to avail the available services, government sectors to provide the necessary services, provided the citizen is registered and is issued with a UID card or number. It is also intended for investigation teams to track the information of the citizen to check his availed services and their authorization

Purpose

The application implements a systematic approach to handle the services to the citizens in a more appropriate manner which also includes the tracing of their usage.

Intended Audience And Reading Suggestions

The application that is proposed is intended for the citizens to avail the available services, government sectors to provide the necessary services, provided the citizen is registered and is issued with a UID card or number. It is also intended for investigation teams to track the information of the citizen to check his availed services and their authorization.

Product Scope

The application uses the concepts of JAVA like JavaScript, JSP, Servlets and beans to handle the business logic methods and JDBC connectivity. The application is designed using JSP working under multitier architecture.

The features of JSP are

The code that is designed is placed under the server system and hence the client

cannot reach it from the remote systems(i.e. the code is secure).

The client can only invoke the application through the browser element and hence

cannot even change the part of code of the executing web page.

Since the client doesn’t require any additional software’s client maintenance is zero.

Since the application is placed only in server system it becomes easy for up

gradations.(in future).

It is easy to install JAVA and Tomcat as they are environment independent( LINUX,

XP, win 2000 etc).

(6)

Page 10: Aadhaar Secure Travel Identity Shoeb

1.1 Motivation

Motivation is to implement the multitasking identity module to pupil to access multiple resources all at a time from one single destination source. The central authority maintains the register of the departments (service provider) to which the clients can send request for approval and acceptance. The respective department can view the citizen information before granting the services. The AADHAAR id which is provided by the civilian can be used to trace his information. The passport helps in booking the required travel schedules by the respective departments which is available at online which helps the users get through the enquiry at airport.The citizen need not carry the physical passport as the same data is available through the application.Citizen need to avail the license, may send a request to the respective authority by using AADHAAR id which is available with him, which on verification, a license can be issued and can be verified by investigation authority.Similarly, a request can be sent to departments of electricity and communication to avail the electrical and telephone connection (in multiple if required) under single AADHAAR id.

1.2 Problem Definition

As the users are having different identity modules for most of the application and for each process to execute they require a personal identification number as password, so for different processes they have different identities. Our main aim is considered towards this duplication or multiple identities for a single user. As the applications are graphical and work with data of text format for inputs and outputs, the user need to be supported with the general system interfaces like keyboard, to provide the input data, mouse to handle the events, monitor to view the outputs and printer devices are required. As the application is web-oriented, it is to be deployed under the server system that provides security and publish it in the network. The client resides at the remote area invoking the web pages through the browser unit. The administrator is soul responsible for the server maintenance

1.3 Objective of Project

Associate each citizen with a unique identification (UID) & pin. Provide passport less access at the airport by providing only the UID & pin. Allow crime department to communicate with the airport authority. License Application, Process and Issue of License. The performance of application depends on type of network or connectivity i.e

present between server and the client. It also depends on the traffic of the users that are currently working on the site of

instance.

(7)

Page 11: Aadhaar Secure Travel Identity Shoeb

In this module, you will learn

• What is UID (Unique Identification) number/Aadhaar

• The goals of Unique Identification Authority of India (UIDAI)

The information related to a person, which can be obtained from official records like name,0000000address, date of birth and so on,are referred to as ‘Demographic’ information. It is the information related to nationality, age, education, religion, employment status, and so on.Demographic information is typically collected while filling application forms for passport, ration card, school admission, etc.

1.4 Limitations of the project

1.5 Organization of documentation

(8)

Page 12: Aadhaar Secure Travel Identity Shoeb

CHAPTER 2

LITERATURE SURVEY

(9)

Page 13: Aadhaar Secure Travel Identity Shoeb

2 .LITERATURE SURVEY

2.1 Introduction

Java Database Connectivity(JDBC) is a front-end tool for connecting to a server to ODBC in that respect, However JDBC can connect only Java clients and it uses ODBC for the connectivity. JDBC is essentially a low-level application programming interface. It is called a low-level API since any data manipulation, storage and retrieval has to be done by the program itself. Some tools which provide a higher-level abstraction or expected shortly.

The next question that needs to be answered is why we need JDBC, once we have ODBC on hand. We can use the same ODBC to connect the entire database and ODBC is a proven technology. Problem for doing this is ODBC gives a ‘C’ language API, which uses pointers extensively. Since Java does not have any pointers and is object-oriented sun Microsystems, inventor of Java developed to suit its needs.

Access is a database management system. Databases are an important part of everyday use. We use them anywhere we use computers, at home, and in the fields of medicine, education, law, business, engineering and government.

A database is a collection of data and facts that are related to a particular object or purpose, such as tracking customer orders or maintaining a music collection. If your database is not stored on a computer, or only parts of it are on the computer, you may be tracking information from a variety of sources that you have to coordinate and organize yourself.

In Access, the heart of the database is the Table. One or more tables comprise a database. In addition to tables, a database can contain other objects such as queries, reports, forms and other components. These objects allow you to view and manipulate the data contained in the database in variety of ways.

2.2Existing System

• The citizen is identified by multiple identity cards.• There is no unique identity in India.• Passport has to be carried for travel abroad.• Crime department cannot talk to the pvt airlines to trace or stop travel of a

citizen instantly.

(10)

Page 14: Aadhaar Secure Travel Identity Shoeb

In the existing system we are concerned about the long term procedures of multiple access but validated to multiple identities In the current scenario each citizen is provided with all identity cards for each services to avail the same by the user. As the services are not integrated, to a single control, it locks monitoring giving rise to misuse of identity cards. A single user can avail multiple cards of the same service ( not in duplicate ) where a single identity is required.

Ex: Single person can avail multiple voter ids, ration cards from multiple areas. This increases burden on issuing authority. It also makes it complicated to trace the identity of the civilian.

1.TECHNICAL FEASIBILITY:

Keeping in mind existing system network, s/w

& H/w, already available the audit application generated in .NET provides an executable file that requires MSIL that provides compatibility from windows98 without having to load .NET software.

No additional hardware or software is required which makes smart audit technically feasible.

2.OPERATIONAL FEASIBILITY:

The application smart audit does not require additional manual involvement or labor towards maintenance of the system. Cost for training is minimized due to the user friendliness of the developed application.

Recurring expenditures on consumables and materials are minimized.

3.ECONOMIC FEASIBILITY:

The system is economically feasible keeping in mind:

Lesser investment towards training. One time investment towards development. Minimizing recurring expenditure towards training, facilities offered and

consumables The system as a whole is economically feasible over a period of time. The enhancement towards the implementation of the training task is exagerated

(11)

Page 15: Aadhaar Secure Travel Identity Shoeb

2.3 Disadvantages of existing system

Single person can avail multiple voter ids, ration cards increasing burden on issuing authority

Lack of tracking of multiple issued cards Services are individual functioning entities as they are not integrated

2.4 Proposed system

proposed architecture the civilian is suggested to register himself to a central authority where a unique identity is provided to the user

All the public services are handled by the central authority making it easy to track the availed citizens list

Each citizen is given with a unique id that is to be submitted for availing the respective services

A digital copy of issued service is given to citizen which resembles his uniqueness for that service

Advantages

Associate each citizen with a unique identification (UID) & Pin It provides passport less access to airport by providing only the UID & Pin The citizen can purchase vehicle using his license (digital) by providing his

identity of uniqueness Also allows crime department to communicate with the different authorities

(12)

Page 16: Aadhaar Secure Travel Identity Shoeb

CHAPTER 3

ANALYSIS

(13)

Page 17: Aadhaar Secure Travel Identity Shoeb

3.ANALYSIS

3.1 Introduction

The Unique Identification number (Aadhaar) was conceived by the Indian government as a means for residents to clearly and uniquely verify their identity anywhere in the country. The mandate for the UIDAI includes defining the usage of the number across critical applications and services1. The Public Distribution System is one such application, and the UIDAI has accordingly laid out the potential role Aadhaar can play within the PDS. The UIDAI recognizes that implementing the Right to Food is a priority today for the Indian government. The functioning of the PDS – the mainstay of India’s food programs – is critical to the implementation of Right to Food in India, and is the focus of this note. The Aadhaar-linked mechanisms that are outlined here however, can be adapted to other programs at a later date. Aadhaar is best translated to mean a ‘foundation’, and the number would play precisely this role in the PDS. The number would be a foundation, over which the government can build more effective PDS processes, and ensure that the program helps fulfill the broad and admirable vision of India’s proposed national food security act. Perhaps the greatest value of Aadhaar for the PDS stems from how it can be easily integrated into the existing infrastructure. Aadhaar presents governments with a highly flexible solution – states can choose to implement Aadhaar within the PDS in stages, beginning with Aadhaar-based identification, and progressing towards Aadhaar-based authentication and an Aadhaar-enabled Management Information System (MIS). The eventual nature of an Aadhaar-linked approach in PDS would depend on the particular benefits the government hopes to gain. Using Aadhaar solely for identification would enable clear targeting of PDS beneficiaries, the inclusion of marginal groups, and expanded coverage of the poor through the elimination of fakes and duplicates. Implementing Aadhaar-based authentication across PDS would enable the government to guarantee food delivery to the poor. In addition to powerfully streamlining PDS processes, an Aadhaar-enabled MIS would make possible a more transparent, flexible system, and enable the government to fulfill the objective of food security in times of crises. Aadhaar would thus be a tool – albeit, a powerful one – in fulfilling.

3.2 Software requirement specifications

TECHNICAL ARCHITECTURE

The major software requirements are listed in this phase of documentation where the basic requirements are listed

Software Requirement

Operating System : Any Graphical User Interface

Language : J2EE

Front End : JSP, Beans & Servlets

Web Server : Tomcat

(14)

Page 18: Aadhaar Secure Travel Identity Shoeb

Internal line connection

3.2.2 Software Requirements

Operating System : WINDOWS 2000 or higher Language Specification : JAVA (JSP & JDBC) Web Server :Tomcat Database Specification : Ms-Access/Sql

3.2.3 Hardware requirements

Processor : P4 or Higher RAM : 512 Mb Hard Disk : 8Gb

As the application is deployed in the server machine and the users or clients are at remote areas, there needs to exist an hardware interface connecting the server and the client. Hence they require hardware interface containing cables, hubs, switches, etc to put all the users under a single network.

(15)

Page 19: Aadhaar Secure Travel Identity Shoeb

THE THREE TIER ARCHITECTURE FIGURE