You are on page 1of 82

SECURED ID CARD GENERATING SYSTEM USING

BARCODE.

(ACASE STUDY OF KANO UNIVERSITY OF SCIENCE AND


TECHNOLOGY WUDIL).

BY

ABUBAKAR MUSA DISO


UG10/COMS/1094

PROJECT REPORT SUBMITTED TO DEPARTMENT OF COMPUTER


SCIENCE, KANO UNIVERSITY OF SCIENCE AND TECHNOLOGY WUDIL,
A PARTIAL FULFILLMENT FOR THE AWARD OF

BSC (HONS) IN COMPUTER SCIENCE

i
CERTIFICATION

This is to certify that, this project is carried out by ABUBAKAR MUSA DISO with registration
number UG10/COMS/1094 of Computer Science Department, Faculty of Computing and
Mathematical Sciences, Kano University of Science and Technology Wudil and is supervised
and meets the requirements governing the award of Degree in Computer Science (Bsc) of Kano
University of Science and Technology Wudil.

________________________ ______________________

Sign DATE

Project Supervisor

________________________ ______________________

Sign DATE

Head of Department

________________________ ______________________

Sign DATE

External Examiner

ii
DEDICATION

This project is dedicated to God Almighty for His protection and guidance over my life, also to
my able parents for all their help, assistance and encouragement.

iii
ACKNOWLEDGEMENT

In the name of Allah, the Most beneficent, the Most merciful, all praise and grateful be to
Almighty God, Lord of the worlds, the most beneficent the Most merciful, Master of the Day of
Judgment, for his powerful blessing, protection and guidance towards the successful completion
of this project.

May his peace and blessing be up on his servant and Messenger Muhammad (S.A.W.) and also
to his companions.

Most sincere thanks to my supervisor Malam Kabiru Dalhatu for his untiring effort which made
this project a success.

I will never forget with the untiring effort of my brothers Lawan Musa Diso and Alh Bashir
Musa Diso Malam for their guiding and counseling. And also wish to express my appreciation to
my uncle Alh. Ado Maje Diso for his assistance and good advice. I was indeed grateful similarly;
to Alh. Umar Maje Diso for his good advice and guidance and also my appreciation goes to all
those who have helped me in one way or the other, towards making my study done successfully.

I wish to extend my gratitude to my godfather Najib Fagge from gidan Malamai and his Top
Management for their good effort towards my study. My appreciation goes to my wife Malama
Juwairiyya Ibrahim Adam for her contribution through the year of my study and my beloved
Anty Allawiyyaand, Anty maryam. May Almighty Allah reward them abundantly.

Finally, I acknowledge the efforts made by friends Sadiq Nasir Bello and Sani Mukhtar Diso and
all those that supported me throughout my study and many others that time will not allowed me
to mention for all their contributions. May Almighty Allah reward them abundantly amen.

iv
ABSTRACT

Secured ID card generating System using barcode is of great importance in the school
Administration. During the last few years many such software were developed for this task. This
project centered on the review of the current system used in kano university of science and
technology wudil, for the students ID card. The software was modeled using data flow diagram
(DFD). Finally, the software model was implemented using Visual Basic .Net Programming
Language.

v
Contents
CHAPTER ONE..........................................................................................................................................1
1.1 INTRODUCTION.............................................................................................................................1
This chapter gives a briefing concerning identity management, statement of problem, aims and
objectives, limitations and definition of some words used.......................................................................1
1.2 STATEMENT OF PROBLEM.................................................................................................2
1.3 AIM AND OBJECTIVES.........................................................................................................3
1.4 SCOPE OF THE STUDY..........................................................................................................3
1.5 LIMITATION OF THE STUDY.................................................................................................4
1.6 JUSTIFICATION OF THE STUDY........................................................................................4
1.8 DEFINITION OF TERMS................................................................................................................5
CHAPTER TWO.........................................................................................................................................7
LITERATURE REVIEW................................................................................................................................7
2.1 INTRODUCTION............................................................................................................................7
This chapter gives a review of relevant literature on the case study. It discusses the objectives of the
case study, the tools that has been utilized for the project, and discusses the benefits of using an
identity in an organization.......................................................................................................................7
2.2 HISTORY OF IDENTITY CARDS.....................................................................................................8
2.3 APPLICATIONS OF IDENTITY CARDS................................................................................................10
2.4 TYPES OF ID CARDS AVAILABLE..................................................................................................12
2.4.2 ID Card Thicknesses...............................................................................................................13
2.4.3 ID Card Sizes...........................................................................................................................13
2.4.4 ID Card Technology................................................................................................................14
2.5 ID CARD PRINTING TECHNOLOGY..............................................................................................14
2.5.1 Direct-to-Card (DTC) Printing.................................................................................................14
2.5.2 Retransfer Printing.................................................................................................................15
2.5.3 Rewritable..............................................................................................................................16
2.6 ID Card Printer Brands...............................................................................................................16
Top Brands.............................................................................................................................................16
2.7 DESIGNING ID CARDS.................................................................................................................19
2.8 Storing Data on ID Cards............................................................................................................23

vi
2.8.1 Contact Smart Cards..............................................................................................................23
2.8.3 Proximity Cards.............................................................................................................................24
2.8.4 Hybrid Cards..........................................................................................................................25
2.8.5 Combi Cards...........................................................................................................................26
2.9 QR CODE ENCODING.................................................................................................................27
Encoding............................................................................................................................................28
CHAPTER THREE...................................................................................................................................32
SYSTEM ANALYSIS AND DESIGN.............................................................................................................32
3.1 INTRODUCTION...............................................................................................................................32
3.2 SYSTEM ANALYSIS......................................................................................................................32
3.3.1 Data Capture Methods..............................................................................................................34
3.3.2 Problems of the Existing System..............................................................................................35
3.3.3 New System Requirements................................................................................................36
3.4 Use Case Diagram...............................................................................................................................37
A Use case diagram visually represents what happens when an actor interact with a system. Hence a use
case diagram captures the functional aspect of a system.........................................................................37
3.5.1 System Block Diagram......................................................................................................39
3.5.2 Database Design................................................................................................................40
3.5.3 Input / Output Design.........................................................................................................40
3.6 DESCRIPTION OF MODULES.......................................................................................................41
CHAPTER FOUR.....................................................................................................................................43
SYSTEM IMPLEMENTATION AND TESTING............................................................................................43
4.1 INTRODUCTION...............................................................................................................................43
4.2 SYSTEM IMPLEMENTATION.......................................................................................................43
4.2.1 Development Tools Utilized...................................................................................................44
4.3 System Testing..........................................................................................................................51
4.4 Installation and Delivery method............................................................................................52
4.5 System Requirements................................................................................................................53
4.6 Training and Evaluation............................................................................................................53
4.7 Conversion Method...................................................................................................................54
4.8 Operations Procedure...............................................................................................................56
CHAPTER FIVE.......................................................................................................................................58

vii
SUMMARY, CONCLUSION AND RECOMMENDATION...............................................................58
5.1 INTRODUCTION...........................................................................................................................58
5.2 SUMMARY..............................................................................................................................58
5.3 CONCLUSION.........................................................................................................................59
5.4 RECOMMENDATION.............................................................................................................59
REFERENCES..........................................................................................................................................61
APPENDIX..................................................................................................................................................63

viii
CHAPTER ONE

1.1 INTRODUCTION

This chapter gives a briefing concerning identity management, statement of

problem, aims and objectives, limitations and definition of some words used.

Identity management (or ID management, or simply IdM) is a broad administrative

area that deals with identifying individuals in a system (such as a country, a

network, or an organization) and controlling access to the resources in that system

by placing restrictions on the established identities of the individuals. One way to

think about identity management is by imagining an enormous blueprint of an

office building. It shows the rooms into which each person who works in the

building can enter. The blueprint also shows what kind of key each person would

need to open the door to get into that room, and what that person can do once he is

there.

Generally, Identity management involves the management and control of

individual members of an established body through the issuing of different forms

of identification. This enables the individuals to be easily recognized on the outside

and also effectively managed on the inside. In most organizations, Plastic Identity

Cards are the usual form of identification. These are produced using ready special

card printers. Most often, the cards are designed in graphic design software like

1
Corel Draw and printed on the card with no security feature.

(http://ezinearticles.com/?The-History-of-Identification-Cards&id=3765530)

This project seeks to investigate, analyze, design and implement a system which

can be used in the effective management of user identities with a case study of

KANO UNIVERSITY OF SCIENCE AND TECHNOLOGY, WUDIL

1.2STATEMENT OF PROBLEM

Most organizations produce identity cards for their staffs or members, who use it at

any point where some identification is needed. Organizations with large number of

members go through tough processes in verifying and adequately managing their

members’ data, which are usually in paper kept in files cabinet and finding an

employee data usually takes hours of search.

Also, there are cases of falsification or creation of fake identity cards which are

usually used to deceive individuals or other organizations. All these can be

curtailed with an effective identity management system and with adequate security

procedures.

2
1.3AIM AND OBJECTIVES

AIM

The main aim of this project is to develop an effective identity management system

which can be used by organizations of any size to effectively manage their

workforce for any category of members.

OBJECTIVES

The specific objectives of this project work are:

1. To investigate, analyze, design and implement an effective Identity

management system, which can manage the Identity data of an organization.

2. To develop a module that will customize identity cards from the data stored

in the system

3. To develop a module that will encode a security feature in the card to detect

fake cards, this can also be extended for more technical uses.

1.4 SCOPE OF THE STUDY

The scope of this study covers the following:

1. Record keeping of Student’s data including signature and passport

photograph

3
2. Generation of ID designs using Image and Printing Functions libraries

3. Generation of 2-dimensional bar codes (QR-Codes) for embedding security

data

1.5 LIMITATION OF THE STUDY

Due to technical constraints which include non-accessibility to ID card Printers and

limited development time, the final production output of the system to be

developed will be in the form of JPEG (.jpg) images, which can later be printed

using standard ID card printers.

1.6 JUSTIFICATION OF THE STUDY

The significance of this study is to examine the current system of Identity

management and develop a more effective electronic identity management system.

This is very vital in every organization especially those with large user base. It

makes the processing of new ID cards and replacement of lost ones easier as there

is no need for a redesign, only a one click command generates another card. The

need to reduce fraud through the use of fake ID cards is very paramount, so as to

avoid the denting of the reputation of organizations when individuals create fake

ID cards for fraudulent uses.

4
1.7 BACKGROUND OF STUDY

A study was undertaken to investigate the mode of issuing ID cards and the

difficulties and problems that were encountered in the due process.

Consideration was based specifically on KANO UNIVERSITY OF SCIENCE

AND TECHNOLOGY, WUDIL In the case of investigation, it was discovered that

students have to wait for quite a long time before an id card is issued to them or

before they renew the expired ones.

The current method of issuing ID card in the foundation is very gloomy and it

lacks security features, and as such, innovative ways have to be found to get out of

this situation.

To achieve the improvements required, the concept in KANO UNIVERSITY OF

SCIENCE AND TECHNOLOGY foundation needs to be developed so as to get

things done effectively and efficiently as possible.

1.8 DEFINITION OF TERMS

ID – Identity

JPEG: Joint Picture Expert group.

QR CODE: Quick Response Code.

5
DATABASE: A flexible and powerful tool for storing and retrieving data, relevant

to some aspects of real world.

MANAGEMENT: Organizing and controlling of affairs of an organization, or

record.

SYSTEM: A combination of related parts organized into a complex whole, such as

record of related field.

IDENTITY MANAGEMENT SYSTEM: Asystem that manages and control the

identification of individual members of an established body.

6
CHAPTER TWO

LITERATURE REVIEW

2.1 INTRODUCTION

This chapter gives a review of relevant literature on the case study. It discusses the

objectives of the case study, the tools that has been utilized for the project, and

discusses the benefits of using an identity in an organization.

An identity document (also called a piece of identification or ID, or colloquially as

one's 'papers') is any document which may be used to verify aspects of a person's

personal identity. If issued in the form of a small, mostly standard-sized card, it is

usually called an identity card (IC). In some countries the possession of a

government-produced identity card is compulsory while in others it may be

voluntary. In countries which do not have formal identity documents, informal

ones may in some circumstances be required. In the absence of a formal identity

document, some countries accept driving licenses, international passports as a form

of identification.

This is because majority of countries have the rule that foreign citizens need to

have their passport with valid visa or occasionally a national identity card from

their home country available at any time if they do not have residence permit in the

country.

7
Information present on the document or in a supporting database might include the

bearer's full name, a portrait photo, age, birth date, address, an identification

2.2 HISTORY OF IDENTITY CARDS

Identification tags have become very common in a world today. They are utilized

in all aspects of our daily lives. These identification tags are used for different

reasons depending on the needs of the organization. In general, an identification

tags are worn so that a customer, a patient or a fellow employee can identify you

by name or department. (Computer Science Department)

Identification tags are also worn for security purposes. Security has become a

major issue over the years. Our high tech world has led to many advancement in

production of card identification and utilization. These tags are now be used for

many reasons and they are produced Through the use of computer chips, bar codes

and magnetic strips ID cards and carry a lot of information that are enough in

describing an individual and they can be used to limit in an individual level of

access to certain locations depending on his status. An individual Identification is

becoming more improved and getting better every day. But this was not always the

case.

8
Considering the security situation of our country and the world at large, we are

faced each and every day of our lives with the need this can be done through the

use of ID cards and international passport, such identification need to be well

secured to avoid impersonation. But how often do we think about the identification

of the dead? In this case I am referring to the "Unknown Soldier". Military

cemeteries are full of grave stones that are etched with that extremely sad word,

'Unknown'. The fallen soldier who bravely gave his most precious commodity, his

life, in defense of liberty and freedom forever rests as unidentified.

Back during the American Civil War, identification tags were not issued or

required. However, the thought of identification was undoubtedly on the minds of

the soldiers. Prior to the battle many soldiers would write their name on a piece of

paper and attach it to their shirt or etch their names in a piece of wood, bore a hole

through it and then put it on a string around their neck. In those days soldiers that

fell on the battlefield were buried almost where they fell. Many soldiers did not

want to fall into that 'Unknown' category. (Known identification situations)

Although the government had yet to implement a plan for identification those in

the commercial industry were well ahead of the curve. They offered 'soldier

identification tags' in their magazines and sent their representatives into the field to

sell them. Even though there was a conscious effort by the soldiers to ensure

9
identification; when the war ended in 1865 around 42% of the fallen soldiers were

buried as 'Unknown'.

No official government identification proposal was implemented until 1899. It was

then issued with the round identification disc which was suggested to be worn

around their neck. in 1913 the military finally made it mandatory that all soldiers in

combat wore identification tags. in 1917 the procedure was well put in place. The

subsequent procedure had been in used until 1941 that the round identity disc was

transformed into the oblong ID tags commonly worn by soldiers today. The 'dog

tags', as they have come to be known had come a long way in eliminating the word

'Unknown' from ever being etched on a soldier’s tombstone again

2.3 APPLICATIONS OF IDENTITY CARDS

2.3.1 Employee identification

This type of identification card is used in business organizations, manufacturing

company, hospitals e.t.c the ID card can be used for the following purposes;

 Track time and attendance

 Control building access

 Store employee information

10
 2.3.2 Student Badges 

Student badges or tag is used in some elementary schools, private schools,

universities e.t.c it can be used for the following purpose

 Track time and attendance

 Use as a cafeteria debit card

 Use for library or equipment checkout

2.3.4 Membership Cards 

Membership cards are used in clubs, libraries, casinos, etc. It can be used for the

following purposes:

 Offer membership perks

 Allow access to the facility during set hours

2.3.5 Loyalty/Reward Cards

This is a special type of card that is used for special purposes such as:

 To offer discounts and savings to all or segmented customers

 Encourage customers visit frequently

 Track valuable data to monitor inventory, item popularity, seasonal trends

11
2.3.6 Access Control 

This is a special type of card that can be used by any business or organization for

security purposes such as:

 Allow cardholders to securely access your building

 Easily deactivate access if needed

(http://www.idwholesaler.com/learning-center/articles/)

2.4 TYPES OF ID CARDS AVAILABLE

ID cards come in a variety of materials, thicknesses, and sizes. Below are the

different types of cards available.

2.4.1 ID Card Materials

PVC is the most common material used to make ID cards. PVC is durable, strong,

and can remain structurally-intact for a very long time. Composite cards is

typically made of 60% PVC and 40% PET, offer added durability and warp

resistance, and are perfect for lamination applications.

Earth-friendly bio (PVC) cards are made with 99% PVC that fully biodegrades

within nine months to five years of continual exposure to microorganisms,

minimizing our footprint on the planet. They perform just like standard 100% PVC

12
cards. They maintain their integrity under normal, everyday use; they can get wet,

be stored on a shelf or in a wallet, be printed, or UV-treated.

Rewritable cards feature a rewritable surface on one side and a PVC (dye-

receptive) finish on the other side. These cards can be erased and re-printed up to

200 times. Rewriteable cards are often used for visitor cards. Adhesive back cards

feature a graphics-quality surface that allows you to print cards with high quality

text and graphics. These are then often attached to a proximity card.

(http://www.idwholesaler.com/learning-center/articles/)

2.4.2 ID Card Thicknesses

Card thicknesses can vary from 10 mil to 80 mil, with 30 mil being the most

common. The card thickness accepted by ID card printers varies widely.

2.4.3 ID Card Sizes

ID card printers come in all shapes and sizes. Most card printers are made to print

on standard CR80 size cards, with a number of them also capable of printing on

CR79 and CR100 size cards.

CR79 cards measure 3.303″ x 2.051″ and are slightly smaller than a standard

CR80 size card. CR79 cards typically have an adhesive back and are commonly

used for printing and adhering to a clamshell proximity card.


13
CR80 cards are 3.375″ x 2.125″ (the same size as a credit card) and are the

standard, most commonly used size of PVC card.

CR100 cards are 3.88″ x 2.63″ in size – that’s 42% larger than a standard CR80

card, making them easier to see from a distance and too big to hide in a wallet.

CR100 size cards are often referred to as “oversize” or “military-size” cards.  Card

printers with CR100 size card printing capability are very limited.

2.4.4 ID Card Technology

An ID badge can serve as more than just identification; for example, a card can

allow door access, track time and attendance, and more!

2.5 ID CARD PRINTING TECHNOLOGY

As technology evolves, so does print quality. Today’s card printers have the ability

to print crisp, life-like images. Below are the two printing technologies available:

2.5.1 Direct-to-Card (DTC) Printing 

Direct-to-card technology is currently the most common form of card printing. The

direct-to-card printing process transfers images directly onto PVC cards. Direct-to-

card printers are available in a wide price range, with varying features and

capabilities. DTC is an economical choice for those where print quality is not a

priority as the printer leaves an unprinted, white edge on cards.


14
2.5.2 Retransfer Printing

Retransfer technology is the latest printing technology, and is growing in

popularity. Also known as "reverse transfer," this method applies images onto a

special clear film that is then fused onto the surface of a blank card. Retransfer

printers allows greater flexibility to print on a wider variety of cards, including

proximity cards, smart cards, pre-punched cards, key tag cards, or any type of card

with an uneven surface. Because retransfer printing prints images to a clear film,

its print quality is vibrant. Retransfer is an ideal choice for those requiring high

quality, vibrant images and those with a need for advanced technology. It’s ideal

for high security and large applications, especially when smart cards are used.

(http://www.idwholesaler.com/learning-center/articles/)

15
2.5.3 Rewritable

Rewrite technology requires special cards that are thermo-sensitive. This material

allows data to become visible or invisible based on the temperature applied to it.

Often used for visitor cards, rewriteable cards can be written to and erased

hundreds of times, allowing you to personalize a single card many times over.

Rewrite thermal printing prints in a single color, typically black or blue and doesn't

require a ribbon.

2.6 ID Card Printer Brands

ID cards have been around for decades. In the beginning, they were created by

manually cutting and pasting information, including instant photos, onto card-sized

pieces of paper, which were then laminated. While the cards served as a basic

means of identification, they were not at all easy to create or durable and certainly

not secure. Today, digital printers make plastic ID card creation easy, fast and

economical to produce. Plastic, or PVC, cards are also durable and can be highly

tamper-proof.

Top Brands

The most reputable card printer brands are: 

Fargo, Evolis, Zebra, Magicard, Nisca, Datacard, Digital ID
EDIsecure, NBSImageMaster.

16
 Founded in 1974 and acquired by HID in 2006

 A leading brand for ID card printing solutions.

 Specialize in identity card issuance systems, including

secure card printer/encoders, materials and software.

 More than 120,000 systems sold in the U.S. and over 80

other countries worldwide.

 A European ID card printer brand.

 Known for their printers’ unique and easily accessible

“clam-shell” design and stylish colors.

 Focused on making it easy for users to fully customize high

quality plastic badges and ID cards on-demand. 

 In addition to card printers, Zebra offers a broad range of

printing solutions, such as bar code printers and RFID

printing and encoding. 

 Merged with Eltron International, Inc, a manufacturer of

plastic ID card printers in 1998.

 First card printer manufacturer to offer a 3 year warranty

 Most Magicard printers feature HoloKote technology, an

anti-counterfeiting visual security feature without the cost of

17
overlaminates.

 Known for quality, reliability and user-friendliness.

 Offer the only printers in the industry that print 24 bit

images

 First manufacturer to offer a modular laminating unit

 Specialize in secure ID and card personalization solutions

 Ideal for high volume production of photo ID cards and

smart cards

 Markets its ID card printers through the well-known brand

name EDIsecure

 Feature some of the best print quality available in desktop

card printing.

 Designed to print large volumes of monochrome cards

quickly, at an affordable price point.

(http://www.idwholesaler.com/learning-center/articles/)

18
2.7 DESIGNING ID CARDS

A typical ID card design is very simple – easy to produce and visually functional. 

There are several software that provides an ability to create very simple ID card

designs using the design tools available. You can just add: the company name,

selecting font type, color and size for it, lines if necessary to separate the card areas

visually, graphics (rectangles), corporate logo, and all cardholder’s data fields

(name, position, photo, etc.)

Such a simple ID card design has both advantages and disadvantages. The benefit

is that one does not need to spend a lot of time to create it and does not have to

possess special skills (the design creation process is straightforward). Still the

disadvantages of simple card design are more essential. The cards with too simple

design looks less professional and may work against the reputation of an

organization, moreover they are easier to forge. ID card represents an

organization’s image, and it is worth to spend some time on its design.

19
Simple ID card design

ID card layout with pre-created

background

(http://www.idwholesaler.com/learning-

center/articles/)

It is recommended to use more complicated and elaborate card designs. Using any

Graphics Design Application, one should be able to create nice 3.37 x 2.13 inches

(most popular CR-80 card format) card template including company logo, name,

and all other required elements or place the order with a design studio to create it.

Then using this template as background for the ID card and placing on it all

necessary data fields and photo related to the card holder.

2.7.1 Photo

When creating an ID card, incorporating the card holder photo, one of the most

important factors is ensuring that the portrait is large enough to be identified

clearly in the circumstances in which the card is to be used.

For "hand held" identification applications like a driver’s license, portraits of

around one inch square are likely to be adequate. However if viewing at a distance,

20
or in poor light is required, then portraits should be as large as practicable: 2 inches

square will work reliably at viewing distances of up to fifteen feet, for example.

Also, it is preferable that the card holder portrait on the photograph is made on the

light background for better visibility.

ID card design with white text backgrounds Ready to print ID card

(http://www.idwholesaler.com/learning-center/articles/)

2.7.2 Card Orientation.

Another design issue is whether to use a "portrait" or "landscape" card

format. "Portrait" orientation in most cases is better for photo ID badges (student

badges, badges of the sales staff in the shops, badges of exhibition and other

different events visitors).

"Landscape" orientation is preferred for cards which are carried in a purse or

pocket (e.g. bank cards). 

21
2.7.3 Data fields. 

It is obvious that well readable card holder information on the ID card is very

important. When you think over which information is necessary to have on your

card and where exactly to place the data fields remember not to have too many

textual data on your card.

To get quality ID card productions, the following should be noted:

 Selecting sufficiently large font for text

 Placing text fields at a proper distance from each other for better readability

and visibility

 Not placing text fields on a dark or color saturated background

 If an elaborated card layout is required, drawing rectangle white

backgrounds for the text fields for better text visibility on the card layout.

 For crisp text and barcodes use black panel, or K panel

 If there is more data than can conveniently fit on one side of a CR-80 card,

or which is not normally required for public display, then creating a double-

sided card design and printing on the reverse of the card, would be the best

option.

22
 The most economic double-sided card would use full color and black resin

on the front, with black resin only on the reverse.

(http://www.akond.net/index.php?issue_id=225)

2.8 Storing Data on ID Cards

Critical visual identification information should be placed clearly on the badge. For

security and privacy reasons, many organizations encode information to their cards

to keep information confidential and secure. This project will employ the use of

QR Codes to store secure data on cards. There are several types of cards available

to store data, the most common types are detailed below:

2.8.1 Contact Smart Cards

Contact smart cards have an embedded integrated circuit chip that contains just

memory, or memory plus a microprocessor. Memory-only chips are functionally

similar to a small floppy disk. They are less expensive than microprocessor chips,

but they also offer less security and should therefore not be used to store sensitive

or valuable information. Chips that contain both memory and a microprocessor are

also similar to a small floppy disk, except they contain an "intelligent" controller

used to securely add, delete, change, and update information contained in memory.

Sophisticated microprocessor chips have state-of-the-art security features built in

to protect the contents of memory from unauthorized access. Contact smart cards

23
must be inserted into a reader to read and store information in the chip. This type

of e-card is used in a wide variety of applications including network security, meal

plans, loyalty, electronic cash, government IDs, campus IDs, e-commerce, health

cards, and many more.

 2.8.2 Contactless Smart Cards

Contactless smart cards are similar to contact smart cards, except contactless cards

do not have to be inserted into a card acceptor device. Instead, contactless smart

cards contain an embedded antenna for reading and writing information contained

in the chip's memory. They need only be passed within range of a radio frequency

acceptor to read and store information in the chip. The range of operation is

typically from about 2.5" to 3.9" (63.5 mm to 99.06 mm) depending on the

acceptor. Contactless smart cards are used in many of the same applications as

contact smart cards, especially where the added convenience and speed of not

having to insert the card into a reader is desirable. There is a growing acceptance

of this type of card for both physical and logical access control applications.

24
Student identification, electronic passport, vending, parking, and tolls are common

applications for contactless cards.

2.8.3 Proximity Cards

Proximity cards (aka, prox cards, access cards) communicate through an antenna

similar to contactless smart cards except that they are read-only devices that

generally have a greater range of operation. The range of operation for prox cards

is typically from 2.5" to 20" (63.5 mm to 508 mm) depending on the reader. Small

amounts of information can be read with prox cards, such as an identification code

that is usually verified by a remote computer; however, it is not possible to write

information back to the card.

Prox cards are available from several sources in both ISO thickness cards from

0.027" to 0.033" (0.6858 mm to 0.8382 mm) and "clamshell" cards from 0.060" to

over 0.070" thick (1.524 mm to over 1.778 mm). Prox cards continue to grow in

popularity because of the convenience they offer in security, identification, and

access control applications, especially door access where fast, hands-free operation

is preferred.

25
2.8.4 Hybrid Cards

Hybrid cards offer a unique solution for updating your existing badging system.

Hybrid card is the term given to cards that contain two or more embedded chip

technologies, such as a contactless smart chip, a contact smart chip, and/or a

proximity chip—all in a single card.

The contactless chip is typically used for applications demanding fast transaction

times, such as mass transit. The contact chip can be used in applications requiring

higher levels of security. The individual electronic components are not connected

to each other even though they share space in a single card.

2.8.5 Combi Cards

26
The combi card—also known as a dual-interface card—has one smart chip

embedded in the card that can be accessed through either contact with a reader or

an embedded antenna. This form of smart card is growing in popularity because it

provides ease-of-use and high security in a single card product. Mass transit is one

of the more popular applications for the combi card; a contact-type acceptor can be

used to place a cash value in the chip's memory and the contactless interface can be

used to deduct a fare from the card.(http://www.idwholesaler.com/learning-

center/articles/)

2.9 QR CODE ENCODING

A QR code (abbreviated from Quick Response code) is a type

of matrix barcode (or two-dimensional code) first designed for the

automotive industry. More recently, the system has become popular

outside of the industry due to its fast readability and comparatively large storage

capacity. The code consists of black modules arranged in a square pattern on a


27
white background. The information encoded can be made up of any kind of data

(e.g., binary, alphanumeric, or Kanji symbols). Created

by Toyota subsidiary Denso Wave in 1994 to track vehicles during the

manufacturing process, the QR code is one of the most popular types of two-

dimensional barcodes. It was designed to allow its contents to be decoded at high

speed.

The technology has seen frequent use in Japan; the United Kingdom is the seventh-

largest consumer of QR codes in the world. The amount of data that can be stored

in the QR code depends on the character set, version and error correction level.

The maximum values for version 40 with error correction capacity level L are:

Numeric only can contain a maximum of 7,089 characters, Alphanumeric contains

a maximum of 4,296 characters, and Binary (8 bits) contains a maximum of 2,953

bytes.

Encoding

The format information records two things: the error correction level and the mask

pattern used for the symbol. Masking is used to break up patterns in the data area

that might confuse a scanner, such as large blank areas or misleading features that

look like the locator marks. The mask patterns are defined on a 6×6 grid that is

repeated as necessary to cover the whole symbol. Modules corresponding to the

28
dark areas of the mask are inverted. The format information is protected from

errors with a BCH code, and two complete copies are included in each QR symbol.

The message data is placed from right to left in a zigzag pattern. In larger symbols,

this is complicated by the presence of the alignment patterns and the use of

multiple interleaved error-correction blocks.

(http://en.wikipedia.org/wiki/QR_code)

WORK FLOW

Most organizations produce identity cards for their staffs or members, who use it at

any point where some identification is needed. Organizations with large number of

members go through tough processes in verifying and adequately managing their

members’ data, which are usually in paper kept in files cabinet and finding an

employee data usually takes hours of search.

Also, there are cases of falsification or creation of fake identity cards which are

usually used to deceive individuals or other organizations. All these can be

curtailed with an effective identity management system and with adequate security

procedures.

29
The main aim of this project is to develop an effective identity management system

which can be used by organizations of any size to effectively manage their

workforce for any category of members.

REFERENCE

1. (WILLIAMS, 2007)

2. Aggarwal, K.K and Singh, Y. (2008) Software Engineering. New Age

International Publishers Limited.

3. Annu Myllyniemi (2006), Identity Management Systems A Comparison of

Current Solutions. Helsinki University of Technology, Helsinki, Finland.

4. Dunning. J.H. & Bansel, S. (1997), Management Information System,

SUMMARY

This project investigated the management of Identities (Student records) using

Kano University Of Science and Technology wudil, Kano as case study. In the

course of investigating the current system, the staffs of the foundation were

interviewed on the processes involved in the Management of Students’ records,

production and verification of Identity Cards. The problems associated with the

30
current system were noted and used as requirement in the development of the new

system.

The new system was designed using Microsoft Visual Studio 2010 (Visual

Basic.Net) and Microsoft Access for the database management. The new system is

composed of Data management, Template management, Template designer, Faces,

Objects, Card generation and verification modules. The new system uses the md5

cryptographic hash function to encrypt the primary key for each student’s record

and the key is used in encoding the QR Code if selected as an object. The final

design can be generated for preview with live data from the database or the actual

card design can be generated and saved to a specified location on the Computer’s

Hard disk for later printing.

31
CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

3.1 INTRODUCTION

This chapter discusses in detail the system analysis and design method and show

the various techniques used to obtain information to have a better system design.

Hence, this chapter deals with the systematic approach for providing answers to

question that gives rise to the research work under study. It involves the analysis of

the full description of the existing system, which should lead to full specification

of user requirement.

3.2 SYSTEM ANALYSIS

Systems are created to solve problems. One can think of the systems approach as

an organized way of dealing with a problem. In this dynamic world, the subject

System Analysis and Design mainly deals with the software development

activities.

System development can generally be thought of having two major components:

systems analysis and systems design. In System Analysis, more emphasis is given

to understanding the details of an existing system or a proposed one and then

deciding whether the proposed system is desirable or not and whether the existing
32
system needs improvements. Thus, system analysis is the process of investigating a

system, identifying problems, and using the information to recommend

improvements to the system.

3.2.1 ANALYSIS OF THE PRESENT SYSTEM

The system that is currently in use in the foundation is manual and as such it lacks

security features and ways have to be found to get out of this situation. Now a day

world has changed from manual system to computer base system or information

technology, so I decided to convert the manual system into automated system with

security features and come up with project that comprises student information

system, card generation module and card verification module with barcode and QR

code.

The above listed inherent limitations of the current existing system have been

analyzed with the aim to develop a system that will reduce the problem identified.

3.3 SYSTEM DESIGN

33
System design is the process of planning a new business system or one to replace

or complement an existing system. Analysis specifies what the system should do.

Design states how to accomplish the objective.

After the proposed system is analyzed and designed, the actual implementation of

the system occurs. After implementation, working system is available and it

requires timely maintenance. (http://www.freetutes.com/systemanalysis/what-is-

system-analysis-design.html)

In carrying out this project, the current methods used in the production of Identity

cards were carefully studied, taking note of areas that have lapses that needs to be

corrected, and an outline was carefully laid out on how to implement the

improvements necessary.

3.3.1 Data Capture Methods

In carrying out a feasibility study on the project study, two data collection

techniques were employed in analyzing the operations of the existing system, these

techniques are:

 Observation: The existing ID cards were studied and also currently available

software was also studied to understand the processes involved in ID card

production.

34
 Research: A carefully laid out research was carried out to understand the

current trends in ID card production and the specific details that are

necessary for an efficient production process.

 Interview: The Staffs of the foundation were asked questions that are critical

in the production of ID Cards, which include:

- How do you manage Students data?

- What tools do you use in designing your card templates?

- How do you handle Signature and Photographs

- How do you integrate Data fields during production?

- How do you verify the authenticity of ID cards?

Answers given to the above questions formed the basis for creating the

requirements for the new system to be developed.

3.3.2 Problems of the Existing System

From the systems analysis undertaken, the following observations were made

about the existing system:

35
 The capture of students’ data for record keeping usually involves paper

documentation which is difficult to manage and safeguard especially as the

number of students increases.

 The design process of the ID cards involves manual design and data field

placement of each card.

 Verification of cards involves an enormous search through a large pile of

files.

The major problems associated with the above observations are as follows:

 A lot of productive time is wasted in the entire production system

 Staff productivity is weakened due to repetitive work processes

 The current system is prone to fraud as cards can be forged and verification

of cards is not effective.

3.3.3 New System Requirements

The design of the new system is aimed at eliminating or reducing to the best

minimum all the problems observed in the current system. In doing this, four (4)

system components are proposed in the new system, these are the Record

Management, Template Designer, Card Generation and card Verification.

 Record Management: This component will be used for record entry of

students’ information including their passport photograph and signature.

36
 Template Designer: The template to be used in the generation of the ID

cards will be designed using this component and can be saved for future use.

 Card Generation: This component will use previously designed templates to

generate the ID cards based on specified data parameters

 Verification: This component will be used to verify ID cards for

authenticity.

3.4 Use Case Diagram

A Use case diagram visually represents what happens when an actor interact

with a system. Hence a use case diagram captures the functional aspect of a

system.

Login

Add, Edit

Student Record

Generate ID

Account Setting
Admin

Verify ID

37
Login

Generate ID

Staff
Verify ID

Use case diagram

The second component of Data Flow analysis is the Data Dictionary. Data flow

diagrams themselves do not fully describe the subject of the investigation. The data

dictionary provides additional information about the system. This is the list of all

the elements that are included in a set of data flow diagrams, describing the

system. The major elements in a system are data flow, data stores and processes.

Data dictionary is very important because, it manages the details in a large system

of elements, documents the features of the system and facilitates analysis of the

details in order to evaluate characteristics and determine where the system changes

should be made.

Notation Description

Admin The professional that is in

charge of printing or issueing

38
identity card.

QR code A quick response code that

hashes the student details.

Database A collection of related files

Data dictionary

3.5.1 System Block Diagram

The System block diagram below shows the major components of the system.

39
3.5.2 Database Design

3.5.3 Input / Output Design

40
3.6 DESCRIPTION OF MODULES

After successful development of the new system, a number of modules were either

developed or incorporated into the new system. These include:

 Students Information Manager (stdinfo): This module was created to

manage students’ data. The operations that can be carried out within the

module include searching, adding, updating and deleting records. The

module also provides the ability to import images into the system. The

module uses certain .Net framework libraries to manage images, connect to

the database and hash the primary key of each data

 Templates manager (modTemplate): This module provides the ability to

create, update and delete templates. It also connects to the database.

 Card face manager (modface): This module is used to set the options for

the front and back faces of the ID card; it depends on previously created

templates. It also connects to the database

 Objects manager (modObjects): This module is used to create objects that

will be used to display data on the cards. Objects that can be created are

Text, Images and QR Code. The data field, size and coordinates of the

objects are set within this module. Only the QR Code has a fixed size of

41
182px by 182 px. All objects will be confined within this module depends

on previously created templates and card faces.

 Template Designer (TemplateDesigner): This module loads the templates,

Faces and Objects created with their properties for the designer to tweak as

desired. It also shows a preview of how the card will look like.

 Card Generation: This module provides a live preview of a card with

specified data. It also generates the card to a specified location in the

Computer’s Hard disk. The QR Code encoding, if selected is done at this

stage.

 MessagingToolkit QR Code Generator: This is a freely-available QR

Code library created using the C# language. It was ported in to the system

and converted to VB.Net. It has the ability to encode and decode Numeric,

Alphanumeric and Byte data into QR CodesMD5 Cryptographic Hash

function: This is a cryptographic hash function used to create unique digital

signatures of data. It was used to create a unique primary key for each

student record, which is then encoded into the QR Code.

42
CHAPTER FOUR

SYSTEM IMPLEMENTATION AND TESTING

4.1 INTRODUCTION

System implementation is the delivery of the proposed system into production.

This chapter describes in detail the stages involved in the implementation of this

project. After the initial design has been finalized, the development of the system

will be iterated. Each iteration will include the implementation, evaluation and

testing.

4.2 SYSTEM IMPLEMENTATION

System Implementation comes when the end user of your software is foremost in

your mind. During this phase the documentation and tools the customer uses to

make informed decisions about how to deploy your software securely are created.

To this end, the Implementation phase is when you establish development best

practices to detect and remove security and privacy issues early in the development

cycle.

Documentation is basically any document involved in the entire system

development life cycle excluding the code itself. In this case, various documents

are involved but only the basic ones will be discussed.

43
Testing itself is part of the implementation process, as such basic testing

techniques will be considered and the ones that best suit the environment will be

discussed.

4.2.1 Development Tools Utilized

The Identity Management System was developed using several technologies which

are technically sufficient to build a reliable and well-maintained platform. Below

are the tools that were utilized:

4.2.2 Microsoft Visual Basic.NET (2010)

Visual Basic .NET (VB.NET) is an object-oriented computer programming

language that can be viewed as an evolution of the classic Visual Basic (VB),

which is implemented on the .NET Framework. Microsoft currently supplies two

major implementations of Visual Basic: Microsoft Visual Studio 2010, which

is commercial software and Visual Basic Express 2010, which is free of charge.

In April 2010, Microsoft released Visual Basic 2010. Microsoft had planned to use

the Dynamic Language Runtime (DLR) for that release but shifted to a co-

evolution strategy between Visual Basic and sister language C# to bring both

languages into closer parity with one another. The Visual Basic compiler was

improved to infer line continuation in a set of common contexts, in many cases

removing the need for the "_" line continuation character. Also, existing support of
44
inline Functions was complemented with support for inline Subs as well as multi-

line versions of both Sub and Function lambdas.

4.2.3 Microsoft Access 2010

Microsoft Office Access, previously known as Microsoft Access, is a relational

database management system from Microsoft that combines the

relational Microsoft Jet Database Engine with a graphical user interface and

software-development tools. It is a member of the Microsoft Office suite of

applications, included in the Professional and higher editions or sold separately. In

May 12 2010, the version of Microsoft Access 2010 was released by Microsoft in

Office 2010; Microsoft Office Access 2007 was the prior version.

MS Access stores data in its own format based on the Access Jet Database Engine.

It can also import or link directly to data stored in other applications and databases.

Software developers and data architects can use Microsoft Access to

develop application software, and "power users" can use it to build simple

applications. Like other Office applications, Access is supported by Visual Basic

for Applications, an object-oriented programming language that can reference a

variety of objects including DAO (Data Access Objects), ActiveX Data Objects,

and many other ActiveX components. Visual objects used in forms and reports

45
expose their methods and properties in the VBA programming environment, and

VBA code modules may declare and call Windows operating-system functions.

4.2.4 Students information management system

The students’ information management contains the form for registration of

students’ details. Below is the sample snapshot of the student information

management system.

The students’ information management

46
4.2.5 ID card preview

The preview shows the front and back format of the ID card after details is entered

and verified. Below is the sample of the ID card preview format.

Front preview

47
back and front preview

4.2.4 Flow chart

Flow chart is a type of diagram that represents an algorithm, workflow or process,

showing the steps as boxes of various kinds, and their order by connecting them

with arrows. Flow charts are used in analyzing, designing, documenting and

managing a process or program of various fields.

48
Fig.I.1 :Template Designer

Fig I.2 :Cards Generation

49
Fig.I.3 :Students Record Management

50
4.3 System Testing

System testing does not test the software per say but rather the integration of each

module in the system. It also tests to find discrepancies between and its original

objective, current specifications and systems documentation. The primary concern

is the compatibility of individual modules. There are some special systems tests:

a) Peak Load test: determines whether the system will handle the volume of

activities that occur when the system is at the peak of its processing

demand.

b) Storage test: determines the capacity of the system to store transaction data

on a disk or in other files.

c) Performance Time Test: Determines the length of time used by the system

to process transaction data.

d) Recovery Test: determines the ability of user to recover data or restart

system after failure.

e) Procedure Test: determines clarity of documentation on operation and uses

of system by having users do exactly what manual request.

f) Human Factor Test: determines how users will use the system when

processing data or preparing reports.

Some of the system tests highlighted above were performed alongside some other

forms of tests such as:


51
Usability testing: This is a technique used in user-centered interaction design to

evaluate a product by testing it on users. This can be seen as an

irreplaceable usability practice, since it gives direct input on how real users use the

system. This is in contrast with usability inspection methods where experts use

different methods to evaluate a user interface without involving users.

Usability testing focuses on measuring a human-made product's capacity to meet

its intended purpose. The Usability testing conducted was intended to measure the

usability, or ease of use, of a specific user interface, and therefore, it was realized

that the interactive nature of the user interface made it easy and fast for the users to

adapt with the system.

4.4 Installation and Delivery method

This involves installation of the software on systems and network servers for use.

Before installation is done, the system specification must be considered. This

includes hardware, network and personnel specifications. Determining the

specification specifies the types of compatible hardware resources, network and

personnel. The above centers on how such resources will convert resources into

information products.

The system developed will be delivered in the normal conventional Installation

format and can be installed like any other application.

52
4.5 System Requirements

Hardware Requirement:

The minimum hardware requirement for the system is as follows:

 PC with at least 2 Ghz CPU, 1 GB RAM, 40 GB HDD

 Scanner

Software Requirement:

The new system works only on Windows family of operating system

(Windows Vista, windows 7 or later) and must have installed Microsoft .Net

Framework 3.5 or higher.

4.6 Training and Evaluation

This is an on-going process that starts with the orientation of operating Staff and

student or people that will use the software. It allows users to understand how to go

about using the software for easy understanding and effective usage of the

software.

Usually a training manual is drafted to guide the training sessions in the

organization or institutions where the system will be used.

53
4.7 Conversion Method

Conversion deals with changeover of organizational operations to the new system.

Conversion to the new system can be done in one of the following methods:

a. Parallel system: this is a method where the old system is operated alongside

the new system. This offers greatest security because, the old system can

take over if errors are found in the new system or if usage problems occur.

Though it provides security, it also doubles operating costs and new system

may not get a fair try.

b. Direct conversion: In this form of conversion, the old system is replaced by

the new one. Here, the organization fully relies on the new system and this

forces user to make the new system work. There are immediate benefits

from new methods and controls. On the other hand, there is no system to

fall back on if difficulties arise with the new system. This shows that it

requires the most careful planning.

c. Pilot System: this is the working version of the system implemented in one

part of the organisation. Based on feedback, changes are made and the

system is installed in the rest of the organisation by one of the other

methods. This method provides experience and live test before

implementation. The weak side of this method is that it may give the

impression that the new system is unreliable and not error free.

54
d. Phase-In: this is to gradually implement the system across all users. It

allows some users to take advantage of the system early. It also allows

training and installation without formally going into those stages. A long

Phase-In causes user problems whether the project goes well or not.

4.7.1 Conversion Method Used

The Parallel conversion method will be used. This is the process of transferring

operations from one computer system to another, during which both systems are

run together for a period of time to ensure that they are producing identical

results. The parallel adoption process cannot be represented without paying

attention to the steps before the actual conversion, namely the construction of a

conversion scenario and the identification and testing of all the requirements.

4.7.2 Reasons for Choosing the Parallel Method:

The parallel conversion method is chosen because of the following reasons:

 Low Risk

 Sense of User Security

 Ability to compare results with old system

While a parallel conversion minimizes the risk of major flaws in the new system

causing irreparable harm to the business; it also means the cost of running two

systems over the period must be incurred. Because running two versions of the

55
same system on the computer could place an unreasonable demand on computing

resources, this may be possible only if the old system is largely manual.

4.8 Operations Procedure

To effectively utilize this system, an operator with a working knowledge of

computing is required. After starting the application, which will normally be from

the start menu or by clicking the application’s icon on the desktop, a Multi-

Document Window will be displayed. The user should then go to the operations

menu to select the designed Operation. Any pattern of operation is possible but

below is the most desired pattern:

STEP 1: Launch the students’ data management form and enter all the necessary

data including passport photograph and signature

STEP 2: Launch the Template management form, and create or update a template

as desired setting all the necessary options, of which template name and orientation

are compulsory

STEP 3: Launch the Card faces management form and set the backgrounds for the

Front and back faces of a desired template

STEP 4: Launch the Template Designer to design and preview the card design at

any stage, during which you can launch the Objects management form, with which

56
Objects (Text, Image or QR Code) can be create or updated. All designs must be

within 322 pixels (width) by 205 pixels (height), which is the size of standard

CR80 Card.

STEP 5: After completing the design of the cards, proceed to the Card generation

form to preview the card design with live data and generate the cards based on

specific data criteria. The QR Code encoding, if selected is done and inserted into

the card at this stage.

STEP 6: For verification, the Verification for will be loaded and the scanned ID

card, to verify is loaded into the application, if verification is successful the

students Photograph will be displayed with some personal information.

57
CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

5.1 INTRODUCTION

This chapter deals with summary of the research work, conclusion as well as

recommendations made by the researcher for the successful implementation of the

newly design ID card system.

5.2 SUMMARY

This project investigated the management of Identities (Student records) using

Kano University Of Science and Technology wudil, Kano as case study. In the

course of investigating the current system, the staffs of the foundation were

interviewed on the processes involved in the Management of Students’ records,

production and verification of Identity Cards. The problems associated with the

current system were noted and used as requirement in the development of the new

system.

The new system was designed using Microsoft Visual Studio 2010 (Visual

Basic.Net) and Microsoft Access for the database management. The new system is

composed of Data management, Template management, Template designer, Faces,

Objects, Card generation and verification modules. The new system uses the md5
58
cryptographic hash function to encrypt the primary key for each student’s record

and the key is used in encoding the QR Code if selected as an object. The final

design can be generated for preview with live data from the database or the actual

card design can be generated and saved to a specified location on the Computer’s

Hard disk for later printing.

5.3 CONCLUSION

This project was able to investigate the current state of identity management using

Kano University Of Science and Technology wudil, Kano as case study, analyze

the problems associated with the current system and develop a new system that can

be used to manage students’ data, design card templates and also generate cards

based on the templates designed and the data parameter specified. It can also be

used to verify the authenticity of generated cards. The system can be deployed by

any institution.

5.4 RECOMMENDATION

The new system has been developed to manage students’ data, design card

templates and also generate the cards with encoded QR code data and barcode.

Although the new system is sufficient for the purpose intended, it can be extended

for more beneficial purposes, which can include:

59
 Extending the database to be able to accommodate any type of membership

profiles and not just students

 Making the Template Designer more interactive and able to respond to

mouse click and drag/drop events

 Implementing a structured objects property management using the

PropertyGrid tool available with the Microsoft Visual Studio environment.

 More features can be deployed to utilize the encoded data; these features can

include access control to Halls, offices and Examination halls.

60
REFERENCES

1. Aggarwal, K.K and Singh, Y. (2008) Software Engineering. New Age

International Publishers Limited.

2. Annu Myllyniemi (2006), Identity Management Systems A Comparison of

Current Solutions. Helsinki University of Technology, Helsinki, Finland.

3. Dunning. J.H. & Bansel, S. (1997), Management Information System, 14 (4,)

29 – 32. Retrived on February 23, from business source premier database.

4. Denning, D. Cryptography and Data Security. Reading, MA: Addison- Wesley,

1982.

5. Williams, K. (2010). The History of Identification Cards. From

http://ezinearticles.com/?The-History-of-Identification-Card&id=3765530.

6. William Stallings, (2005, November 16) Cryptography and network security

principles and practices, fourth edition: Printice Hall.

7. Access Queries (2007), Microsoft Software Development Network (MSDN)

http://msdn.microsoft.com/en-us/library/bb208930(v=office.12).aspx

8. ID Card design, AKOND.net(htt://www.akond.net/index.php?issue_id=225)

9. Lucey Terry, (August 1998) Management information system, ninth edition,

published by Book power (formerly ELST)

10.Thearon Willis, (2005) Beginning Visual Basic Database.

61
11.Robert Vieira (2006) Beginning SQL Server™ 2005 Programming. Wiley
Publishing, Inc., Indianapolis, Indiana USA
12.Identity document, Wikipedia Encyclopedia

(http://en.wikipedia.org/w/index.php?title=identity_document)

13.Mobile QR Codes & Barcodes,(2014) http://www.mobile-qr-codes.org/qr-

codes-and-barcodes.html.

14.Barcode scanners(http://www.nationalbarcode.com/articles/use-of-barcode-

scanners.html.

15.Williams (2007)

62
APPENDIX

ImportsSystem.Security.Cryptography
ImportsSystem.Text
ImportsSystem.Data.OleDb
ImportsSystem.Windows.Forms.MessageBoxButtons
ImportsSystem.Windows.Forms
PublicClassstdinfo
DimxpicPassAsNewBitmap(200, 200)
DimxpicSignAsNewBitmap(220, 135)
DimstrPassAsString
DimstrSignAsString

FunctiongetMd5Hash(ByVal input AsString) AsString


' Create a new instance of the MD5 object.
Dim md5Hasher AsMD5 = MD5.Create()

' Convert the input string to a byte array and compute the hash.
Dim data AsByte() = md5Hasher.ComputeHash(Encoding.Default.GetBytes(input))

' Create a new Stringbuilder to collect the bytes


' and create a string.
DimsBuilderAsNewStringBuilder()

' Loop through each byte of the hashed data


' and format each one as a hexadecimal string.
DimiAsInteger
Fori = 0 Todata.Length - 1
sBuilder.Append(data(i).ToString("x2"))
Nexti

' Return the hexadecimal string.


ReturnsBuilder.ToString()

EndFunction

PrivateSubtxtSearch_TextChanged(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


HandlestxtSearch.TextChanged
'grpSearch.Visible = True
IftxtSearch.Text = ""Then
lstSearch.Items.Clear()
Exit Sub
EndIf

Dim con AsNewOleDb.OleDbConnection(strcon)


con.Open()

DimcmdAsNewOleDb.OleDbCommand("select regnum, surname, othername from tblstd where regnum


like '%"&txtSearch.Text&"%' or surname like '%"&txtSearch.Text&"%' or othername like
'%"&txtSearch.Text&"%';", con)

Dim reader AsOleDbDataReader = cmd.ExecuteReader()


lstSearch.Items.Clear()
DoWhilereader.Read

63
lstSearch.Items.Add(reader("regnum").ToString&" --- "& reader("surname").ToString&",
"& reader("othername").ToString)
Loop
reader.Close()
con.Close()

EndSub

PrivateSubcmdBrowsePass_Click(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


BrowseDialog.ShowDialog()
'BrowseDialog.SupportMultiDottedExtensions = True
BrowseDialog.DefaultExt = ".jpg"' Default file extension
BrowseDialog.Filter = "JPG (.jpg)|*.jpg|PNG (.png)|*.png|GIF (.gif)|*.gif"' Filter files
by extension
txtPass.Text = BrowseDialog.FileName
IftxtPass.Text<>""Then
DimypicPassAsNewBitmap(txtPass.Text)

Using gr AsGraphics = Graphics.FromImage(xpicPass)


gr.DrawImage(ypicPass, 0, 0, 200, 200)
EndUsing
picPassport.Image = xpicPass
EndIf
EndSub

PrivateSubcmdBrowseSign_Click(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


BrowseDialog.ShowDialog()
BrowseDialog.DefaultExt = ".jpg"' Default file extension
BrowseDialog.Filter = "JPG (.jpg)|*.jpg|PNG (.png)|*.png|GIF (.gif)|*.gif"' Filter files
by extension
txtSign.Text = BrowseDialog.FileName
IftxtSign.Text<>""Then
DimypicSignAsNewBitmap(txtSign.Text)

Using gr AsGraphics = Graphics.FromImage(xpicSign)


gr.DrawImage(ypicSign, 0, 0, 220, 135)
EndUsing
picSign.Image = xpicSign
EndIf
EndSub

SubDataMod()

Try
Dim rand AsNewRandom()
DimxrandAsLong
' Dimi As Integer

xrand = rand.Next(1000001, 9999999)

DimxregnumAsString
xregnum = Replace(Trim(txtregnum.Text), "/", "-")
Dim con AsNewOleDb.OleDbConnection(strcon)
con.Open()
' i = (2 / 0)
IfcmdSave.Text = "Update"Andtxthash.Text<>""Then

64
DimcmdAsNewOleDb.OleDbCommand("update tblstd set regnum = ?, surname = ?, othername = ?,
dept = ?, prg = ?, dur = ?, gsm = ?, email1 = ?, parentname = ?, paddress = ?, caddress =
?, permad = ?, sofo = ?, lga = ?, htwn = ?, stdpass = ?, stdsign = ?, xrand=?, issue1
= ?, lvl = ? where pkey= ?;", con)

strPass = xregnum&"-p.jpg"
strSign = xregnum&"-s.jpg"
xpicPass.Save(Application.StartupPath&"\pix\"&strPass)
xpicSign.Save(Application.StartupPath&"\pix\"&strSign)

' cmd.Parameters.Add(New OleDbParameter("Balance", Decimal.Parse(txtAmount.Text)))


cmd.Parameters.Add(NewOleDbParameter("regnum", txtregnum.Text))
cmd.Parameters.Add(NewOleDbParameter("surname", txtsname.Text))
cmd.Parameters.Add(NewOleDbParameter("othername", txtoname.Text))
cmd.Parameters.Add(NewOleDbParameter("dept", cbodept.Text))
cmd.Parameters.Add(NewOleDbParameter("prg", cboprg.Text))
cmd.Parameters.Add(NewOleDbParameter("dur", cboprg.Text))
cmd.Parameters.Add(NewOleDbParameter("gsm", txtgsm.Text))
cmd.Parameters.Add(NewOleDbParameter("email1", txtemail.Text))
cmd.Parameters.Add(NewOleDbParameter("pname", txtpname.Text))
cmd.Parameters.Add(NewOleDbParameter("paddress", txtpad.Text))
cmd.Parameters.Add(NewOleDbParameter("caddress", txtcad.Text))
cmd.Parameters.Add(NewOleDbParameter("permad", txtpermad.Text))
cmd.Parameters.Add(NewOleDbParameter("sofo", txtsofo.Text))
cmd.Parameters.Add(NewOleDbParameter("lga", txtlga.Text))
cmd.Parameters.Add(NewOleDbParameter("htwn", txthtwn.Text))
cmd.Parameters.Add(NewOleDbParameter("stdpass", strPass))
cmd.Parameters.Add(NewOleDbParameter("stdsign", strSign))
cmd.Parameters.Add(NewOleDbParameter("xrand", xrand.ToString))
cmd.Parameters.Add(NewOleDbParameter("issue1", "1"))
cmd.Parameters.Add(NewOleDbParameter("lvl", cbolvl.Text))
cmd.Parameters.Add(NewOleDbParameter("pkey", txthash.Text))

Try
cmd.ExecuteNonQuery()
Catch ex AsException
MessageBox.Show(ex.Message)
EndTry
con.Close()
MessageBox.Show("Student Details Updated!")
ElseIfcmdSave.Text = "Save"Then

strPass = xregnum&"-p.jpg"
strSign = xregnum&"-s.jpg"
xpicPass.Save(Application.StartupPath&"\pix\"&strPass)
xpicSign.Save(Application.StartupPath&"\pix\"&strSign)

DimcmdAsNewOleDb.OleDbCommand("insert into tblstd(regnum, surname, othername, dept, prg,


dur, gsm, email1, parentname, paddress, caddress, permad, sofo, lga, htwn, stdsign,
stdpass, issue1, xrand, lvl, pkey ) VALUES(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?);",
con)

65
' cmd.Parameters.Add(New OleDbParameter("Balance", Decimal.Parse(txtAmount.Text)))
cmd.Parameters.Add(NewOleDbParameter("regnum", txtregnum.Text))
cmd.Parameters.Add(NewOleDbParameter("surname", txtsname.Text))
cmd.Parameters.Add(NewOleDbParameter("othername", txtoname.Text))
cmd.Parameters.Add(NewOleDbParameter("dept", cbodept.Text))
cmd.Parameters.Add(NewOleDbParameter("prg", cboprg.Text))
cmd.Parameters.Add(NewOleDbParameter("dur", cboprg.Text))
cmd.Parameters.Add(NewOleDbParameter("gsm", txtgsm.Text))
cmd.Parameters.Add(NewOleDbParameter("email1", txtemail.Text))
cmd.Parameters.Add(NewOleDbParameter("pname", txtpname.Text))
cmd.Parameters.Add(NewOleDbParameter("paddress", txtpad.Text))
cmd.Parameters.Add(NewOleDbParameter("caddress", txtcad.Text))
cmd.Parameters.Add(NewOleDbParameter("permad", txtpermad.Text))
cmd.Parameters.Add(NewOleDbParameter("sofo", txtsofo.Text))
cmd.Parameters.Add(NewOleDbParameter("lga", txtlga.Text))
cmd.Parameters.Add(NewOleDbParameter("htwn", txthtwn.Text))
cmd.Parameters.Add(NewOleDbParameter("stdsign", strSign))
cmd.Parameters.Add(NewOleDbParameter("stdpass", strPass))
cmd.Parameters.Add(NewOleDbParameter("issue1", "1"))
cmd.Parameters.Add(NewOleDbParameter("xrand", xrand.ToString))
cmd.Parameters.Add(NewOleDbParameter("lvl", cbolvl.Text))
cmd.Parameters.Add(NewOleDbParameter("pkey", getMd5Hash(xrand.ToString)))

Try
cmd.ExecuteNonQuery()
MessageBox.Show("New Student Regfistration Completed!")
Catch ex AsException
MessageBox.Show(ex.Message)
EndTry
con.Close()
Else

EndIf
Catch ex AsException
MessageBox.Show("Error: "&ex.Message)
EndTry

EndSub

PrivateSubcmdSave_Click(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


HandlescmdSave.Click
DataMod()

' CallcmdNew_Click(cmdSave, e)
EndSub

PrivateSubstdinfo_Load(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


HandlesMyBase.Load
strcon = "Provider = Microsoft.Jet.OLEDB.4.0; Data Source = "&Application.StartupPath&"\
sysdb.mdb; Persist Security Info = False"

cbodept.Items.Clear()

cboprg.Items.Clear()
'cbolvl.Items.Clear()

66
cboprg.Items.Add("Morning")
cboprg.Items.Add("Afternoon")
cboprg.Items.Add("Evening")

cbodept.Items.Add("Quran")
cbodept.Items.Add("Hadith")
cbodept.Items.Add("Fiqh")

picPassport.ImageLocation = Application.StartupPath&"\pix\face.jpg"

picSign.ImageLocation = Application.StartupPath&"\pix\sign.jpg"

EndSub

PrivateSublstSearch_Click(ByVal sender AsObject, ByVal e AsSystem.EventArgs)

EndSub

PrivateSubcmdNew_Click(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


HandlescmdNew.Click
IfcmdNew.Text = "New Student"Then
cmdSave.Text = "Save"
cmdNew.Text = "clear"
grpnew.Enabled = True
Else
cmdSave.Text = "Update"
cmdNew.Text = "New Student"
grpnew.Enabled = False
EndIf

txtregnum.Text = ""
txtsname.Text = ""
txtoname.Text = ""
'cbosch.Text = ""
cbodept.Text = ""
cboprg.Text = ""
cbolvl.Text = ""
txtgsm.Text = ""
txtemail.Text = ""
txtpname.Text = ""
txtpad.Text = ""
txtcad.Text = ""
txtpermad.Text = ""
txtsofo.Text = ""
txtlga.Text = ""
txthtwn.Text = ""
txthash.Text = ""
picPassport.ImageLocation = Application.StartupPath&"\pix\face.jpg"

picSign.ImageLocation = Application.StartupPath&"\pix\sign.jpg"
EndSub

PrivateSubcmdDelete_Click(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


HandlescmdDelete.Click

67
DimansAsString
Dim buttons AsSystem.Windows.Forms.MessageBoxButtons =
System.Windows.Forms.MessageBoxButtons.YesNo
' Show message box
ans = MessageBox.Show("Are You Sure you want to delete the Student Data?", "Data
Deletion", buttons).ToString
Ifans = "Yes"Then
Dim con AsNewOleDb.OleDbConnection(strcon)
con.Open()
DimcmdAsNewOleDb.OleDbCommand("delete * from tblstd where pkey = '"&txthash.Text&"';",
con)
cmd.ExecuteNonQuery()
con.Close()

txtregnum.Text = ""
txtsname.Text = ""
txtoname.Text = ""
cbodept.Text = ""
cboprg.Text = ""
cbolvl.Text = ""
txtgsm.Text = ""
txtemail.Text = ""
txtpname.Text = ""
txtpad.Text = ""
txtcad.Text = ""
txtpermad.Text = ""
txtsofo.Text = ""
txtlga.Text = ""
txthtwn.Text = ""
txthash.Text = ""
picPassport.ImageLocation = Application.StartupPath&"\pix\face.jpg"

picSign.ImageLocation = Application.StartupPath&"\pix\sign.jpg"
Else
MessageBox.Show("Deletion Canceled!")
EndIf

EndSub

PrivateSub lstSearch_Click1(ByVal sender AsObject, ByVal e AsSystem.EventArgs)


HandleslstSearch.Click
'grpnew.Enabled = True
grpnew.Enabled = True

Dim q AsArray
Dim q1 AsString

q = Split(lstSearch.Text, " --- ")


q1 = Trim(q(0))
Dim con AsNewOleDb.OleDbConnection(strcon)
con.Open()

DimcmdAsNewOleDb.OleDbCommand("select * from tblstd where regnum = '"& q1 &"'", con)

Dim reader AsOleDbDataReader = cmd.ExecuteReader()

68
Ifreader.ReadThen
txtregnum.Text = reader("regnum").ToString
txtsname.Text = reader("surname").ToString
txtoname.Text = reader("othername").ToString
cbodept.Text = reader("dept").ToString
cboprg.Text = reader("prg").ToString
cbolvl.Text = reader("lvl").ToString
txtgsm.Text = reader("gsm").ToString
txtemail.Text = reader("email1").ToString
txtpname.Text = reader("parentname").ToString
txtpad.Text = reader("paddress").ToString
txtcad.Text = reader("caddress").ToString
txtpermad.Text = reader("permad").ToString
txtsofo.Text = reader("sofo").ToString
txtlga.Text = reader("lga").ToString
txthtwn.Text = reader("htwn").ToString
txthash.Text = reader("pkey").ToString
'strPass
' strSign

Try
DimzpicSignAsNewBitmap(Application.StartupPath&"\pix\"& reader("stdsign").ToString)

Using gr AsGraphics = Graphics.FromImage(xpicSign)


gr.DrawImage(zpicSign, 0, 0, 220, 135)
EndUsing
picSign.Image = xpicSign

DimzpicPassAsNewBitmap(Application.StartupPath&"\pix\"& reader("stdpass").ToString)

Using gr AsGraphics = Graphics.FromImage(xpicPass)


gr.DrawImage(zpicPass, 0, 0, 200, 200)
EndUsing
picPassport.Image = xpicPass
Catch ex AsException
MessageBox.Show("An error has occured, Please try again!")
EndTry
Else
MessageBox.Show("Not Found")
EndIf
reader.Close()
con.Close()
EndSub

PrivateSubtxthash_TextChanged(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


Handlestxthash.TextChanged

EndSub

PrivateSub cmdBrowsePass_Click_1(ByVal sender AsSystem.Object, ByVal e


AsSystem.EventArgs) HandlescmdBrowsePass.Click
CallcmdBrowsePass_Click(sender, e)
EndSub

69
PrivateSub cmdBrowseSign_Click_1(ByVal sender AsSystem.Object, ByVal e
AsSystem.EventArgs) HandlescmdBrowseSign.Click
CallcmdBrowseSign_Click(sender, e)
EndSub

PrivateSubcbolvl_SelectedIndexChanged(ByVal sender AsSystem.Object, ByVal e


AsSystem.EventArgs) Handlescbolvl.SelectedIndexChanged

EndSub

PrivateSublstSearch_SelectedIndexChanged(ByVal sender AsSystem.Object, ByVal e


AsSystem.EventArgs) HandleslstSearch.SelectedIndexChanged

EndSub
EndClass

ImportsSystem.Data.OleDb
ImportsSystem.Security.Cryptography
ImportsSystem.Text
ImportsMessagingToolkit.QRCode.Codec
ImportsMessagingToolkit.QRCode.Codec.Data
ImportsMessagingToolkit.QRCode.Codec.Util
ImportsSystem.Windows.Forms.MessageBoxButtons
ImportsSystem.Windows.Forms
ImportsSystem.Drawing.Imaging

PublicClassForm2
DimxpicPassAsNewBitmap(200, 200)
DimxpicSignAsNewBitmap(220, 135)
DimstrPassAsString
DimstrSignAsString
Dim y, z AsString
Dim y1, z1 AsBitmap

PrivateSub Form2_Load(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


HandlesMyBase.Load
strcon = "Provider = Microsoft.Jet.OLEDB.4.0; Data Source = "&Application.StartupPath&"\
sysdb.mdb; Persist Security Info = False"
'picPassport.ImageLocation = Application.StartupPath& "\pix\face.jpg"

'picSign.ImageLocation = Application.StartupPath& "\pix\sign.jpg"


EndSub

Subqr()

DimqrcodeAsKeepAutomation.Barcode.Bean.BarCode = NewKeepAutomation.Barcode.Bean.BarCode
qrcode.Symbology = KeepAutomation.Barcode.Symbology.QRCode

'QR Code Version options, V1-V40 supported.


qrcode.QRCodeVersion = KeepAutomation.Barcode.QRCodeVersion.V10
'QR Code Version Error Correction Level, 4 modes (H, L, M, Q) supported.
qrcode.QRCodeECL = KeepAutomation.Barcode.QRCodeECL.H

70
'QR Code data mode, supporting AlphaNumeric, Auto, Byte, Customer, Kanji, Numeric
qrcode.QRCodeDataMode = KeepAutomation.Barcode.QRCodeDataMode.Auto
'Set QR Code valid input: All ASCII characters, including 0-9, A-Z, a-z, special
characters. Length: variable.
qrcode.CodeToEncode = "9f5845da0da4f7ffb03f2d81b9d30e05"

'QR Code unit of measure: pixel, cm and inch


qrcode.BarcodeUnit = KeepAutomation.Barcode.BarcodeUnit.Pixel
'QR Code image resolution in dpi
qrcode.DPI = 72

'QR Code Size-related Settings


'QR Code bar module width (X dimention)
qrcode.X = 2
'QR Code bar module height (Y dimention), Y=X
qrcode.Y = 2
'Image margin size, minimum value is 4X on all four sides according to
specification.C://qrcode_4_vb.png
qrcode.LeftMargin = 8
qrcode.RightMargin = 8
qrcode.TopMargin = 8
qrcode.BottomMargin = 8
'Generate Data Matrix in Png, Jpeg, Gif, Bmp, Tiff image formats.
qrcode.ImageFormat = Drawing.Imaging.ImageFormat.Png
qrcode.generateBarcodeToImageFile("C:\Users\mulkee\Desktop\semi//qrcode_4_vb.png")
z1 = qrcode.generateBarcodeToBitmap()
EndSub

PrivateSub Button3_Click(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


Dim x AsGraphics
Dim barcode AsKeepAutomation.Barcode.Bean.BarCode =
NewKeepAutomation.Barcode.Bean.BarCode
barcode.Symbology = KeepAutomation.Barcode.Symbology.Code128Auto
barcode.CodeToEncode = "9f5845da0da4f7ffb03f2d81b9d30e05"
barcode.X = 1
barcode.Y = 60
barcode.BottomMargin = 10
barcode.LeftMargin = 10
barcode.RightMargin = 10
barcode.TopMargin = 10
barcode.DisplayText = True
barcode.ChecksumEnabled = True
barcode.DisplayChecksum = True
barcode.Orientation = KeepAutomation.Barcode.Orientation.Degree0
barcode.BarcodeUnit = KeepAutomation.Barcode.BarcodeUnit.Pixel
barcode.DPI = 72
barcode.TextFont = NewFont("Arial", 10.0F, FontStyle.Regular)
barcode.ImageFormat = System.Drawing.Imaging.ImageFormat.Jpeg
barcode.generateBarcodeToImageFile("C:\Users\mulkee\Desktop\semi//barcode-code128-
vb.jpeg")

EndSub

PrivateSub Button4_Click(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


' printform()
EndSub

71
PrivateSub Button6_Click(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)
Dim barcode AsKeepAutomation.Barcode.Bean.BarCode =
NewKeepAutomation.Barcode.Bean.BarCode

EndSub

PrivateSub Button5_Click(ByVal sender AsSystem.Object, ByVal e


AsSystem.Drawing.Printing.PrintEventArgs)

EndSub

PrivateSub Button1_Click_1(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)

EndSub

PrivateSub Button2_Click_1(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)

EndSub

PrivateSub Button1_Click_2(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


Handles Button1.Click
Dim con AsNewOleDb.OleDbConnection(strcon)
con.Open()

DimcmdAsNewOleDb.OleDbCommand("select * from tblstd where regnum


='"&Me.txtsearch.Text&"'", con)
'Dim cmd As New OleDbCommand("SELECT * FROM Client WHERE SPN='" &Me.QSPNTextBox.Text&
"'", con)
Dim reader AsOleDbDataReader = cmd.ExecuteReader()

Ifreader.ReadThen
lblreg.Text = reader("regnum").ToString
lblname.Text = reader("surname").ToString
lbloname.Text = reader("othername").ToString
lbldept.Text = reader("dept").ToString
lblprog.Text = reader("prg").ToString
'cbolvl.Text = reader("lvl").ToString
lblphone.Text = reader("gsm").ToString
Try
DimzpicSignAsNewBitmap(Application.StartupPath&"\pix\"& reader("stdsign").ToString)

Using gr AsGraphics = Graphics.FromImage(xpicSign)


gr.DrawImage(zpicSign, 0, 0, 220, 135)
EndUsing
picsign.Image = xpicSign

DimzpicPassAsNewBitmap(Application.StartupPath&"\pix\"& reader("stdpass").ToString)

Using gr AsGraphics = Graphics.FromImage(xpicPass)


gr.DrawImage(zpicPass, 0, 0, 200, 200)
EndUsing
picpassport.Image = xpicPass
Catch ex AsException
MessageBox.Show("An error has occured, Please try again!")
EndTry

72
'txtemail.Text = reader("email1").ToString
'txtpname.Text = reader("parentname").ToString
'txtpad.Text = reader("paddress").ToString
'txtcad.Text = reader("caddress").ToString
'txtpermad.Text = reader("permad").ToString
'txtsofo.Text = reader("sofo").ToString
'txtlga.Text = reader("lga").ToString
'txthtwn.Text = reader("htwn").ToString
'txthash.Text = reader("pkey").ToString
'strPass
' strSign
y = reader("regnum").ToString
z = reader("pkey").ToString

Else
MessageBox.Show("Not Found")
EndIf
reader.Close()
con.Close()
GroupBox1.Visible = True
Callbarc()
Callqr()
Callprev()

EndSub
Subbarc()

Dim barcode AsKeepAutomation.Barcode.Bean.BarCode =


NewKeepAutomation.Barcode.Bean.BarCode
barcode.Symbology = KeepAutomation.Barcode.Symbology.Code128Auto
barcode.CodeToEncode = y
barcode.X = 1
barcode.Y = 60
barcode.BottomMargin = 10
barcode.LeftMargin = 10
barcode.RightMargin = 10
barcode.TopMargin = 10
barcode.DisplayText = True
barcode.ChecksumEnabled = True
barcode.DisplayChecksum = True
barcode.Orientation = KeepAutomation.Barcode.Orientation.Degree0
barcode.BarcodeUnit = KeepAutomation.Barcode.BarcodeUnit.Pixel
barcode.DPI = 72
barcode.TextFont = NewFont("Arial", 10.0F, FontStyle.Regular)
barcode.ImageFormat = System.Drawing.Imaging.ImageFormat.Jpeg
' barcode.generateBarcodeToImageFile("C:\Users\mulkee\Desktop\semi//barcode-code128-
vb.jpeg")
y1 = barcode.generateBarcodeToBitmap()

EndSub
Subprev()
preview.lblreg.Text = Me.lblreg.Text
preview.lblname.Text = Me.lblname.Text
preview.lbloname.Text = Me.lbloname.Text
preview.lbldept.Text = Me.lbldept.Text
preview.lblprog.Text = Me.lblprog.Text

73
preview.lblphone.Text = Me.lblphone.Text
preview.picpassport.Image = Me.picpassport.Image
preview.picsign.Image = Me.picsign.Image
preview.picbar.Image = y1
preview.picqr.Image = z1
EndSub

PrivateSub Button2_Click_2(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


'PrintForm1.Print()
DimbmsAsBitmap = NewBitmap(Width, Height, PixelFormat.Format32bppArgb)
DimgfsAsGraphics = Graphics.FromImage(bms)
gfs.CopyFromScreen(preview.Location.X, preview.Location.Y, 0, 0, preview.Size,
CopyPixelOperation.SourceCopy)
bms.Save("C:\Users\mulkee\Desktop\semi\i.jpg", ImageFormat.Jpeg)
MsgBox("Saved")
EndSub

PrivateSub GroupBox1_Enter(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


Handles GroupBox1.Enter

EndSub

PrivateSub Button3_Click_1(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)


Handles Button3.Click
picpassport.ImageLocation = Application.StartupPath&"\pix\face.jpg"
picsign.ImageLocation = Application.StartupPath&"\pix\sign.jpg"

lblreg.Text = ""
lblname.Text = ""
lbloname.Text = ""
lbldept.Text = ""
lblprog.Text = ""
lblphone.Text = ""
txtsearch.Text = ""

EndSub
EndClass

74

You might also like