Professional Documents
Culture Documents
Team Name
TechnoBrates
Team Members
Adamya Kant
Amit Kumar Jain
Deepshikha Jhamb
Mukul Gupta
Project Guide
Dr. Anil Choudhary
1
Index and Tables
1) Introduction: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1) Overview of project: . . . . . . . . . . . . . . . . . . . . 3
1.2) Objective of project: . . . . . . . . . . . . . . . . . . . . 3
1.3) Scope: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4) Abbreviations: . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.5) Technologies: . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.6) Users: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.7) References: . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2) Overall Description: . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1) Detailed Description of project: . . . . . . . . . . . . 8
2.2) Hardware Interface: . . . . . . . . . . . . . . . . . . . . .11
2.3) Software Interface: . . . . . . . . . . . . . . . . . . . . . 12
2.4) Communication Interface: . . . . . . . . . . . . . . . .12
2.5) Functional Requirements: . . . . . . . . . . . . . . . . 13
2.6) Use-Case Model Survey: . . . . . . . . . . . . . . . . .14
2.7) Architecture diagram: . . . . . . . . . . . . . . . . . . . 16
2.8) Database design: . . . . . . . . . . . . . . . . . . . . . . . 17
2.9) Assumptions and Dependencies: . . . . . . . . . . .17
3) Specific Requirements: . . . . . . . . . . . . . . . . . . . . . . . 18
3.1) Use-Case Reports: . . . . . . . . . . . . . . . . . . . . . .18
3.2) Flow charts: . . . . . . . . . . . . . . . . . . . . . . . . . . .35
3.3) Supplementary Requirements: . . . . . . . . . . . . 38
3.4) Legal and Privacy Issues: . . . . . . . . . . . . . . . . 39
2
1) Introduction:
3
• Activities like updations, creations done in the system by
the system users will be maintained in the form of logs
for auditing and maintaining the integrity of the system.
• Capture, View and edit all user transactions, including
email, chats, and services calls in a single system.
1.4) Abbreviations:
4
Verification-It is basically Biometric Verification which uses a one-
to-one (1:1) matching scheme. The user is required to state who he or
she is (e.g. by entering an UID). A fingerprint sample is taken from
the user and compared to his or her fingerprint previously stored in the
smart card. If the fingerprints match, the user is "verified" and is
granted access.
1.5) Technologies:
5
application independent standard. A SCOSTA compliant
operating system will also be compliant to the ISO7816-4, -8 and -9
standards.
7
1.6) Users: The potential users of the system will be:
• Government Agent
• Administrator:
State level Administrators
Central Administrators
1.7) References:
• IEEE SRS Format
• Sample SRS available on TGMC website.
• Unified Modelling Language User Guide, 2 n d Edition by
Grady Booch, James Rumbaugh, Ivar Jacobson.
2) Overall Description:
a) Registration Process
b) Unique ID Generation
c) Card generation & Delivery
d) Updations and Maintenance
a) Registration Process:
8
date for further processing. Application no. will be
in the format- CCCCCCSSSSSS , where CCCCCC is
centre code and SSSSSS is serial number.
• Cyber user will go to nearest registration centre
with necessary documents for biometric enrolment,
photograph capturing and for signature. Registration
centres are generally local bodies.
• Cyber user can check his application status any time
on website.
• Non-cyber user will go to nearest centre, where
government agent will fill all his information and
capture his biometrics.
• Multiple fingerprints will be taken for biometric
enrolment.
b) Unique ID Generation:
10
2.2) Hardware Interface:
11
Administrator Side:
12
2.5) Functional Requirements:
The functional requirements of the project will be:
13
2.6) UML Model Survey:
14
Use case diagrams model the functionality of the system using use
cases and actors.
15
III. Administrator:
16
2.8) Database Design:
System
Actor
UID
Administrator User Agent
Password
17
3) Specific Requirements:
Non cyber users (Users that do not have access to the internet) will have
to go to registration centre in order to apply for UID. Government agent
in the office will fill up his/her form and will collect the biometric
samples and other related documents. They will be given an application
number for future reference.
The information for UID of people residing in the rural remote areas
(villages where less than 20 families reside and people of such are
deprived even of the basic facilities) will be collected by Personnals in
the offline mode and will be given to the government agent to be
uploaded in the Database.
18
Pre –condition: Cyber users must have access to the internet and the non
cyber user need to go to the nearby registration centre.
Description: After the request for UID, the users will be asked to provide
their details through the registration form available on the website/with
the government agent. They will be required to fill the following fields in
the registration form-
• First Name
• Middle Name
• Last Name
• Father’s Name
• Date of Birth
• Permanent Address
• Password for online account
• Gender
• District
• State
• Code of nearest registration centre.
In addition to the above fields all users need to provide the Photograph
and Biometric sample (fingerprint in this case) at the registration centre in
the presence of the Government agent.
The cyber users will fill the form online on website and an application
number will be generated for them and will be allotted a time slot (date,
registration centre and time) to provide their biometric information and
prove their authenticity.
The non cyber users need to go at the nearest registration centre to fill up
the form (government agent will fill up their form) and will provide their
biometric information at the same time. No time slot will generated for
them. After the successful completion of application they will be given an
application number for future reference.
In the case of people residing in the remote located areas the Personnal
will go to their place and will fill their whole information in form in
offline mode and will capture their biometric information on the spot
only. This offline information will be uploaded in the database.
19
Pre-condition: User has already requested for UID.
20
Name of Use case: Go to centre.
21
Name of the use case: Capture fingerprint
22
unique physical characteristics called minutiae, which include certain
visible aspects of fingerprints such as ridges, ridge endings, and
bifurcations (forks in ridges). Minutiae are mostly found in and around
the core of a fingerprint, located about half-way between the fingertip and
the first joint of the finger.
23
The process of enrollment takes at least two samples captured
from the same finger before that finger is considered
registered. When a finger is scanned for matching, the
fingerprint reader captures an image, and that image is
converted it to a template and compared to the registered
fingerprint in a template form. The fingerprint will be enrolled
if and only if it does not match any other fingerprint in the
database.
24
• Card Collection Subsystem
25
teach him how to use the card. He will also tell him the
precautions to be taken while using the card.
26
• User Account Subsystem
27
Name of use case: Update Profile.
28
In the verification process the biometric image is again
captured. The unique characteristics are extracted from
biometric image to create the user’s “live” biometric template.
This new template is then compared with template previously
stored and numeric matching score is generated, based on the
duplication between live and stored template. On the basis of
this score the user is verified. If this score equates or exceeds
the threshold value (specified by the system designer) then the
user is verified otherwise the user verification fails.
In this case the user’s UID and live biometric image will be
taken and this live template will be matched to the template
stored corresponding to the UID. If it matches then the user is
verified.
29
• Request Processing Subsystem
30
mentioned things. If the form is approved then also the user
will be informed.
31
• Card Generation Subsystem
32
Name of the use case: Access database
33
make it tamper proof like freezing of memory locations, three
pass authentication etc.
34
• Maintenance of the system
Pre-condition: None
35
then user is informed through e-mail or personnals.
If not, then continuation of process is there.
36
II.) For User Agent:
37
III.) For Administrator:
38
Tie the existing Web site into existing enterprise
systems – Any existing Web site that relies on the
manual duplication of data from another system is one
that can be improved. Most of the business data in the
world today exists in enterprise servers that can be
connected to the Web servers to make this process far
more effective.