You are on page 1of 11

EasyFinance

A Project Work Synopsis

Submitted in the partial fulfillment for the award of the degree of

BACHELOR OF ENGINEERING

IN

CSE- INFORMATION SECURITY

Submitted by:

NAME OF THE STUDENT

SAURAV SHEKHAR
19BCS3538

Under the Supervision of:


SHUBHAM GARGRISH

SUPERVISORS NAME
SHUBHAM GARGRISH

CHANDIGARH UNIVERSITY, GHARUAN, MOHALI – 140413


Table of Contents
Title Page i
Abstract ii
List of Figures iii
Timeline / Gantt Chart iv

1. INTRODUCTION* 1
1.1 Problem Definition 1
1.2 Project Overview/Specifications* (page-1 and 3) 2
1.3 Hardware Specification 3
1.4 Software Specification 4

2. LITERATURE SURVEY 5
2.1 Existing System 5
2.2 Proposed System 6

3. System Architecture 7

4. Technology Overview 8

5. Modular Design 9
5.1 Authenticated User Login
5.2 Calling of Web Service
6. Security 10
7. Future Scope 10
8. Conclusion 10

6. PROBLEM FORMULATION

6. TENTATIVE CHAPTER PLAN FOR THE PROPOSED WORK 9


7. REFERENCES 10
8. APPENDICES
List of Figures
Figure Title page

3.1 Pictorial representation of diabetes prediction system 6


1 INTRODUCTION
1.1 PROBLEM DEFINITION:
Financial problems occur for many reasons. Often, they occur after personal or
professional problems. Sometimes while we try to solve these problems, we lose
sight of our financial situation and debts pile up. Financial difficulties may mean the
situation gets out of control, before there is time to find a solution. At such times, the
EasyFinance can provide valuable help to solve financial problems

1.2 PROJECT OVERVIEW/SPECIFICATIONS:


The objective of the EasyFinance is to identify measures to solve your financial
problems.

To do this, a EasyFinance will analyse all the transactions to provide report to user,
in order to understand the source of financial difficulties and their impacts.
EasyFinanace will analyze users debts and routine expenses based on their income.

Their transactions history will allow EasyFinance to recommend possible solutions


so users can keep track of expenses.
EasyFinace help in smooth flow of transaction, keeping all records, generating bills,
and help in audit.

1.3 HARDWARE SPECIFICATIONS:

 RAM – 2 GB or more
 Android Device(4.4 and above).
 Linux

1.4 SOFTWARE SPECIFICATIONS:

 Linux x64
 Database( mySQL/MariaDB)
 Programming(JAVA,PHP,Spring Framework, JSP, HTML,CSS, Bootstrap, JS)
 WebServer(Apache2)
 JavaServer(Tomcat9)
 Encryption and Decryption Algorithm
2 LITERATURE SURVEY

2.1 Existing System


Audit is an important term used in accounting that describes the examination and
verification of a company's financial records

This process is very much time consuming and it involves a lot of manual work to be
carried out. Manuall calculating and managing all transactions records is also error prone and
may not be as accurate.

There are some softwares availabe in market for managing transactions but they have two major
flaw in it:
I) It’s complex
II) Available mostly for windows. And some only support very few platform.

eg. tally is finance managing software but because of it’s complexity most people
don’t use it. This software only supports winodows platform.

“EasyFinance” covers all the platform since it is based on web service and and also works
flawlessly on android devices.

2.2 PROPOSED SYSTEM:


The purpose of this project is to create a system that allows a user to extract their
transaction information at one place. Proposed system aims at developing an Android based
mobile application as well as Web based technology that monitors the expenditures and incomes.

With “EasyFinance” the day to day activities (income and expenditure) of the users
can easily be updated to the remote database and can be fetched on any browser(chrome, firefox..)
as well as through the android device.

Business benefits
The benefits of transaction processing system after its successful implementation:

 Increase efficiency of the transaction process


 Help to reduce revenue losses
 Help to decrease complexity
 Increased security
 Time saving
 Easy to manage
 Increase revenue and more customers can be attained in a small amount of time
 Increase operational process and efficiency
3. System Architecture
System Architecture alludes to the “the overall structure of the software” and the ways in
which that structure provides conceptual integrity for a system. In its simplest form, architecture is
the hierarchical structure of program components, the manner in which these components interact
and the structure of data that are used by the components.

One of the goals of system design is to derive an architectural rendering of a system. This rendering
serves as a framework from which more detailed design activities are conducted.

The Overall System Architecture defines, how the data from the Android mobile application
reaches the remote database server, and how the data it is reflected in MIS (Management
Information System) as a Web Application.
5. Technology Overview
This section elaborates how the Web Service is accessed by the android application to reach
the remote database server.Web Services are platform independent and language independent
since they use standard XML languages.

Moreover, majority of the web services use Hypertext Transport Protocol (HTTP) for
transmitting the messages.

The most interesting features of a web service is that they are self describing. This means that
once a web service is located we can ask it to describe itself and tell what operations it supports
and how to invoke it. This is handled by the Web Service Description Language (WSDL).
A web service invocation involves sending of messages between a client and a server.

For example, SOAP (Simple Object Access Protocol) specifies the format in which the requests
are sent to the server and how the server should format the responses. The data from the
android application has been sent as HTTP request to the Web service. To perform this,
the android mobile device needs the GPRS or Wi-Fi
connectivity.

Thus using the Web service the data reaches the remote database server.
5 Modular Design

The proposed system is divided into five distinct modules which are described as follows,

5.1 Authenticated User Login


The user can login with their unique user name and password. User authentication is a security
process that covers all of the human-to-computer interactions that require the user to register and
log in.

When a user registers for an account, “EasyFinance” creates a unique ID and key that will allow
them to access their account later on. Generally, a username and password are used as the ID and
key, but the credentials can include other forms of keys as well

Essentially, the user authentication process is what provides users repeat access to their own
accounts while attempting to block any unauthenticated users from gaining access. This means
that User A can log in to their own account, while User B would be denied access. Conversely,
User B could access their own account, while User A would be unable to.

To put it simply, user authentication has three tasks:


 Manage the connection between the human (user) and the website’s server (computer).

 Verify users’ identities.

 Approve (or decline) the authentication so the system can move to authorizing the user.

The process is fairly simple; users input their credentials on the website’s login form. That
information is then sent to the authentication server where the information is compared with all
the user credentials on file.

5.2 Calling of Web Service


After submitting the details from the mobile device the data are parameterized and passed to a Web
service. To perform this mobile device needs the Wi-Fi or GPRS connectivity.

Thus the data from the mobile device reaches the Web service. The Web Service receives the
parameters that are sent from the mobile device and it moves the data to the remote server. Thus the
data from the mobile device reaches the remote database
6. Security:
User data is encrypted with military-grade encryption algorithms — 256-bit AES, to be
specific.

User data is protected by firewalls which operate under stringent financial and international
security standards, including payment card industry compliance (PCI DSS Level 1) and ISO
27001 certification, placing information security under explicit management control.

7. Future Scope
In Future my plan is to include AI in “EasyFinance” which can provide two functionalities:

I) Can detect user-error

II) Can predict profit or lose

8. Conclusion:
“EasyFinance” is a simple as well as powerful tool to manage all the transactions. It works on
modern technology and provides data encryption.

Using username and password, any authorized user can accesss their account detail from
anywhere and can also update the data in remote database(mariadb) .

EasyFinance provides all kind of reports and transaction summary that user might need, some
of them are listed below:

I) Daily Report

II) Monthly Report

III) Annual Report

IV) User-Centric Report

V) Total overview of organization and overall bussiness report.


9. References
[1] “Mobile Phone Based Attendance System”, by Shraddha S.

Chawhan1, Mangesh P. Girhale2, Gunjan Mankar3, IOSR

Journal of Computer Engineering (IOSR-JCE) e-ISSN:

2278-0661, p- ISSN: 2278-8727Volume 10, Issue 3 (Mar. -

Apr. 2013), PP 48-50 www.iosrjournals.org.

[2] “Portable Lab: Implementation of Mobile remote laboratory

for Android platform”, an IEEE paper by Macro Andre

Guerra, Claudia Mariline Francisco, RuiNeves Madeira,

Portugal.

[3] “Remote Access of Building Management System on

Windows Mobile Devices”- an IEEE paper by

OndrejKrejcar, Department of measurement and control,

VSB Technical Institute of Ostrava, Czech Republic


10.TENTATIVE CHAPTER PLAN FOR THE PROPOSED WORK

CHAPTER 1: INTRODUCTION

This chapter will cover the overview of problem definition, software and hardware
requirements details regarding proposed project.

CHAPTER 2: LITERATURE REVIEW


This chapter includes The findings of the researchers will be highlighted which will become basis of
current implementation. It will provide introduction to the concepts which are necessary to
understand the proposed system and will highlight the faults in existing system.

CHAPTER 3: System Architecture


This chapter discusses about the system Architecture

CHAPTER 4: Technology Overview

This chapter will cover the technology used in “EasyFinance”.

CHAPTER 5: Modular
This chapter will cover the technical details of the proposed approach.

CHAPTER 6: Security
This chapter discuss about what encryption technique used in “EasyFinance”.

CHAPTER 7: Future Scope


This chapter is all about how AI in our future verison help to solve numerous human-error and
can predict the financial state of any bussiness in given time.
CHAPTER 8: Conclusion

CHAPTER 9: Reference

You might also like