AADHAAR SECURE TRAVEL IDENTITY A Mini Project report Submitted in partial fulfillment of the requirement For the award of the degree of
BATCHELOR OF TECHNOLOGY IN COMPUTER SCIENCE & INFORMATION TECNOLOGY BY SYED SHOEB ULLAH HT.NO:- 08801A1251 KHURSHEED AHMED HT.NO:-08801A1260 MOHAMMED ABDUL SAUD HT.NO:-08801A1222 Under the esteemed guidance of
Mr. RAJU Asst.Prof.CSITDept.
DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
ARKAY COLLEGE OF ENGINEERING & TECHNOLOGY (Approved by AICTE New Delhi, Affiliated to JNTU, Hyderabad) BODHAN (V), NIZAMABAD (D), 503180. 2010-2011
ARKAY COLLEGE OF ENGINEERING & TECHNOLOGY (Approved by AICTE New Delhi, Affiliated to JNTU, Hyderabad) BODHAN (V), NIZAMABAD (D), 503180.
DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
CERTIFICATE This is to certify that project entailed AADHAAR SECURE TRAVEL
IDENTITY submitted in partial fulfillment of the requirement for the degree in BATCHELOR OF TECHNOLOGY (CSIT), from JAWAHARLAL
NEHRU TECHNOLOGICAL UNIVERSITY Hyderabad ,Andhra Pradesh is record of bonafide work carried out by SYED SHOEB ULLAHHT.NO:08801A1251, KHURSHEED AHMEDHT.NO:-08801A1260, MOHAMMED ABDUL SAUDHT.NO:-08801A1222 and the supervision and guidance of Mr. RAJU (Asst. Prof. CSIT Dept).
Internal Guide
Head of the Department
Mr.RAJUMs.Ambika(HOD) Asst. Prof. CSIT DeptDept of CSIT
External Examiner
ACKNOWLEDGEMENT With great pleasure I want to take this opportunity to express my heartfelt gratitude to all the people who helped in making this project work a grand success. I am grateful to my project guide Mr. RAJU sir for his constant guidance throughout our project work. I would like to thank Ms.AMBIKAmadam , Head of the
Department of CSIT, of being moral support throughout the period of our study in ARKAY COLLEGE. First of all I am highly indebted to Principal, Mr.HAFEEZ UDDIN sir, for giving me the permission to carry out this project. I would like to thank the Teaching & Non - teaching staff of CSIT Department for sharing their knowledge with me. I would like to express my special thanks to my parents and friends for giving their co-operation and support
SYED SHOEB ULLAH HT.NO:- 08801A1251 KHURSHEED AHMED HT.NO:-08801A1260 MOHAMMED ABDUL SAUD HT.NO:-08801A1222
ABSTRACT
AADHAAR SECURE TRAVEL IDENTITY
Aim:
To create a Tool that manages the handling of passport and license using the unique identification associated with each individual.
Objective:
y
Associate each citizen with a unique identification (UID) & pin.
y
Provide
y
Allow crime department to communicate with the airport authority.
y
License Application, Process
passport less access at the ai rport by providing only the UID & pin.
and Issue of License.
Scope: y
Citizen
Registration
y
Secure
passport application
y
Passport application verification
y
Passport
y
Provide crime
y
Apply for License.
y
Provide
y
Provide result.
y
Issue or deny License.
by the police autho rity.
Issue & Denial department to integrate with the airport to stop someone f rom flying.
Test details and scena rio.
(1)
Action Plan:
The application deals with allowing the citizens to register for a unique identity. The ID is supported with a pin. Citizens being issued passpo rt o r those have a passport is then associated with the UID. This helps the citizen to t ravel abroad without having the passpo rt. The UID will provide access to the passport f rom the airport for the airline f rom the centralized server. The details and profile of the citizen with the photo can be viewed as pa rt of secu rity check. The crime department can also use the application to t race or stop any pe rson f rom travelling abroad. The airline gets a notification when the ai rport staff has access to the citizens passpo rt. The crime department can stop or trace either using the UID o r passpo rt number. They could also pass the name of the person and the system can gene rate a list of photo p reviews of people having a passport.
The citizen uses the aadhaa r scheme to apply for license. The details of the citizen a re picked f rom the registration database. The citizen is p rovided with the test details by the application. The details contain the location, date and time info rmation. The test details a re provided to the citizen on completion of the test. The license issual and denial is recorded.
(2)
LIST OF TABLES Fields_Name
Data Types
Admin Uname Pword
Text Text
Apply_Aadhar Apply_Id C ivilian_Id Adate Idate Status ANO
Number Number Date/Time Date/Time Text Number
Apply_Lisence Apply_ID AADHAR_ID ADATE Idate Status LNO ExpDate
Number Text Date/Time Date/Time Text Number Date/Time
Apply_Passpor t Apply_ID AADHAR_ID Adate Idate Status PNO ExpDate
Number Text Date/Time Date/Time Text Number Date/Time
(3)
Booking
Aadhar Source Destination Booked_Date Journey_Date Fcode F ar e Seat_No Agency_ID
_Id
Text Text Text Date/Time Date/Time Text C urr ency Number Number
C ivilians C ivilian_ID C name Fname
Gender Address DOB Qualification C ontacts Email Uname Pword Rdate AADHAR_ID PPNO LI SENC E_NO Photo
Number Text Text Text Memo Date/Time Text Text Text Text Text Date/Time Text Text Text Text
Flights FC ODE Source
Destination Dept_Time Arrival_Time F ar e AirLines
Text Text Text Date/Time Date/Time C urr ency Text
(4)
Chapter 1 INTRODUCTION
(5)
INTRODUCTION
The application implements a systematic app roach to handle the services to the citizens in a more appropriate manner which also includes the tracing of their usage. The application that is proposed is intended fo r the citizens to avail the a vailable services, government sectors to provide the necessary se rvices, provided the citizen is registered and is issued with a UID card or number. It is also intended fo r investigation teams to track the infor mation of the citizen to check his availed se rvices and their authorization
Purpose
The application implements a systematic approach to handle the services to the citizens in a more appropriate manner which also includes the tracing of their usage. Intended Audience And Reading Suggestions
The application that is proposed is intended for t he citizens to avail the available services, government sectors to provide the necessary services, provided the citiz en is registered and is issued with a UID card or number. It is also intended for investigation teams to track the information of the citizen to check his availed services and their authorization. Product Scope
The application uses the concepts of JAVA like JavaScript, JSP, Servlets and beans to handle the business logic methods and JDBC connectivity. The application is designed using JSP working under multitier architecture. The features of JSP are y
The code that is designed is placed under the server system and hence the client cannot reach it from the remote systems(i.e. the code is secure).
y
The client can only invoke the application through the browser element and hence cannot even change the part of code of the executing web page.
y
Since the client doesn¶t require any additional software¶s client maintenance is zero.
y
Since the application is placed only in server system it becomes easy for up gradations.(in future).
y
It is easy to install JAVA and Tomcat as they are environment independent( LINUX, XP, win 2000 etc).
(6)
1.1 Motivation
Motivation is to implement the multitasking identity module to pupil to access multiple resources all at a time f rom one single destination sou rce. The central authority maintains the register of the departments (service provide r) to which the clients can send request for approval and acceptance. The respective department can view the citizen info rmation befor e granting the services. The AADHAAR id which is p rovided by the civilian can be used to trace his information. The passport helps in booking the required travel schedules by the respective departments which is available at online which helps the use rs get through the enqui ry at air por t. The citizen need not carry the physical passport as the sam e data is available through the application. C itizen need to avail the license, may send a request to the respec tive authority by using AADHAAR id which is available with him, which on ve rification, a license ca n be issued and can be verified by investigation authority. Similarly, a request can be sent to departments of electricity and communication to avail the electrical and telephone connection (in multiple if required ) under single AADHAAR id.
1.2 Problem Definition
As the users are having different identity modules for most of the application and for each process to execute they require a personal identification numbe r as password, so for different processes they have different identities. Ou r main aim is consider ed towards this duplication o r multiple identities for a single user . As the applications a re g raphical and work with data of text fo rmat for inputs and outputs, the use r need to be supported with the gener al system interfaces like keyboard, to provide the input data, mouse to handle the events, monitor to view the outputs and printer devices are required. As the application is web-oriented, it is to be deployed under the serve r system that provides security and publish it in the networ k. The client resides at the remote area invoking the web pages through the browser unit. The administ rator is soul responsible for the serve r maintenance
1.3 Objective of Project y y y y y
Associate each citizen with a unique identification (UID) & pin. Provide passport less access at the airport by p roviding only the UID & pin. Allow crime department to communicate with the airport authority. License Application, Process and Issue of License . The performance of application depends on type of network or connectivity i.e present between serve r and the client.
y
It also depends on the traffic of the users that are currently worki ng on the site of instance.
(7)
In this module, you will learn What is UID (Uni que Identification) number/Aadhaa r The goals of Unique Identification Autho rity of India (UIDAI) The infor mation related to a person, which can be obtained f r om official r ecords like name, 0000000address, date of birth and so on, are referred to as Demographic information. It is the information related to nationality, age, education, religion, employment status, and so on. Demographic information is typically collected while filling application forms for passport, ration card, school admission, etc. 1.4 Limitations of the project
1.5 Organization of documentation
(8)
CHAPTER 2 LITERATURE SURVEY
(9)
2 .LITERATURE SURVEY 2.1 Introduction Java Database Connectivity(JD BC) is a f ront-end tool for connecting to a serve r to ODBC in that respect, However JDBC can connect only Java clients and it uses ODBC for the connectivity. JDBC is essentially a low -level application p rogramming interface. It is called a low-level API since any data manipulation, storage and retrieval has to be done by the program itself. Some tools which provide a highe r -level abstraction or expected shortly. The next question that needs to be answered is why we need JDBC, once we have ODBC on hand. We can use the same OD BC to connect the entire database and ODBC is a proven t echnology. Problem for doing this is ODBC gives a C language API, which uses pointers extensively. Since Java doe s not have any pointers and is object-oriented sun Mic rosystems, inventor of Java developed to suit its needs. Access is a database management system. Databases are an impo rtant part of everyday use. We use them anywhere we use computers, at home, and in the fields of medicine, education, law, business, enginee ring and government. A database is a collection of data and facts that are related to a particula r object or purpose, such as tracking customer orders or maintaining a music collection. If your database is not stored on a computer, or only parts of it a re on the computer, you may be t racking information f rom a variety of sources that you have to coor dinate and organize yourself. In Access, the hear t of the database is the Table. One or more tables comprise a database. In addition to tables, a database can contain other objects such as queries, reports, forms and other components. These objects allow you to view and manipulate the data contained in the database in v ariety of ways.
2.2Existing System The citizen is identified by multiple identity ca rds. The re is no unique identity in India. Passport has to be carried for travel abroad. Crime department cannot talk to the pvt ai rlines to t race or stop travel of a citizen instantly .
(10)
In the existing system we are concerned about the long term procedur es of multiple access but validated to multiple identities In the cu rrent scenario each citizen is p rovided with all identity cards for each services to avail the same by the use r. As the services are not integrated, to a single control, it locks monitoring giving rise to misuse of identity cards. A single user can avail multiple ca rds of the same service ( not in duplicate ) whe re a single identity is required. Ex: Single person can avail multiple voter ids, ration cards f rom multiple a reas. This increases burden on issuing authority. It also makes it complicated to t race the identity of the civilian. 1.TEC HNICAL FEA SIBILITY: Keeping in mind existing system netwo rk , s/w & H/w, already available the audit application gener ated in .NET
provides an
executable file that requires MSI L that provides compatibility f rom windows98 without having to load .NET softwa re. No additional hardwa re or software is required which makes sma rt audit technically feasible. 2.OPERATIONAL FEA SIBI LITY: The application sma rt audit does not require additional manual involvement o r labor towards maintenance of the system. Cost for training is minimized d ue to the use r f riendliness of the developed application. Recurring expenditur es on consumables and materials a re minimized. 3.EC ONOMI C FEA SIBILITY: The system is economically feasible keeping in mind: Lesser investment towards t raining. One time investment towards development. Minimizing recurring expenditure towards t raining, facilities offe red and
consumables The system as a whole is economically feasible over a period of time. The enhancement towards the implementation of the t raining task is exagerated
(11)
2.3 Disadvantages of existing system
y
y y
Single
person can avail multiple vote r ids, ration cards increasing bu rden on issuing authority L ack of tracking of multiple issued cards Services a re individual functioning ent ities as they a re not integ rated
2.4 Proposed system
y
y
y
y
proposed a rchitecture the civilian is suggested to register himself to a central authority where a unique identity is provided to the use r All the public services ar e handled by the central authority making it easy to t rack the availed citizens list Each citizen is given with a unique id that is to be submitted fo r availing the respective services A digital copy of issued service is given to citizen which resembles his uniqueness for that service
Advantages y y y
y
Associate each citizen with a unique identification (UID) & Pin It provides passport less access to airport by providing only the UID & Pin The citizen can purchase vehicle using his license ( digital) by p roviding his identity of uniqueness Also allows c rime department to communicate with the different authorities
(12)
CHAPTER
3
ANALYSIS
(13)
3.ANALYSIS 3.1 Introduction
The Unique I dentification numbe r (Aadhaar) was conceived by the Indian government as a means for residents to clearly and uniquely ve rify their id entity anywhere in the country. The mandate for the UIDAI includes defining the usage of the numbe r across critical applications and se rvices1. The Public Distribution System is one such application, and the UIDAI has accordingly laid out the potential rol e Aadhaar can play within the PDS. The UIDAI recognizes that implementing the Right to Food is a priority today fo r the Indian government. The functioning of the PDS the mainstay of Indias food p rograms is critical to the implementation of Right to Fo od in India, and is the focus of this note. The Aadhaar linked mechanisms that a re outlined here however, can be adapted to other programs at a later date. Aadhaar is best translated to mean a foundation, and the numbe r would play precisely this role in the PDS. The number would be a foundation, ove r which the government can build more effective PDS p rocesses, and ensure that the pr ogram helps fulfill the b road and admirable vision of Indias p roposed national food secu rity act. Perhaps the greatest value of Aadhaar for the PDS stems f rom how it can b e easily integrated into the existing inf rast ructure. Aadhaa r presents governments with a highly flexible solution states can c hoose to implement Aadhaar within the PDS in stages, beginning with Aadhaa r based identification, and p rogressing towards Aadhaa r -based authentication and an Aadhaar-enabled Management Information System (MI S). The eventual natu re of an Aadhaar-linked appr oach in PDS would depend on the particula r benefits the government hopes to gain. Using Aadhaar solely for identification would enable clea r ta rgeting of PDS beneficiaries, the inclusion of ma rginal g roups, and expanded coverage of the poor through the elimination of fakes and duplicates. Implementing Aadhaa r -based authentication across PDS would enable the government to guarantee food delivery to the poor. In addition to powerfully streamlining PDS p rocesses, an Aadhaar -enabled MI S would make possible a more transparent, flexible system, and enable the government to fulfill the object ive of food security in times of crises. Aadhaar would thus be a tool albeit, a powerful one in fulfilling. 3.2 Software requirement specifications TECHNICAL ARCHITECTURE
The major software requirements are listed in this phase of documentation whe re the basic requi rements are listed
Software Requirement O
perating System
:
Any Graphical User Interface
Language
:
J2EE
Front
End
:
JSP, Beans & Servlets
Server
:
Tomcat
Web
(14)
Internal line connection
3.2.2 Software Requirements y y y y
Operating System : WINDOWS 2000 or higher Language Specification : JAVA (JSP & JDBC) Web Serve r :Tomcat Database Specification : Ms-Access/ Sql
3.2.3 Hardware requirements y y y
Processor
RAM Ha rd Disk
: : :
P4
or Higher 512 Mb 8Gb
As the application is deployed in the server machine and the users or clients are at remote areas, there needs to exist an hardware interface connecting the server and the client. Hence they require hardware interface containing cables, hubs, switches, etc to put all t he users under a single network.
(15)
THE THR EE TIER
ARCHITECTUR E FIGUR E