Professional Documents
Culture Documents
BARCODE.
BY
i
CERTIFICATION
This is to certify that, this project is carried out by ABUBAKAR MUSA DISO with registration
number UG10/COMS/1094 of Computer Science Department, Faculty of Computing and
Mathematical Sciences, Kano University of Science and Technology Wudil and is supervised
and meets the requirements governing the award of Degree in Computer Science (Bsc) of Kano
University of Science and Technology Wudil.
________________________ ______________________
Sign DATE
Project Supervisor
________________________ ______________________
Sign DATE
Head of Department
________________________ ______________________
Sign DATE
External Examiner
ii
DEDICATION
This project is dedicated to God Almighty for His protection and guidance over my life, also to
my able parents for all their help, assistance and encouragement.
iii
ACKNOWLEDGEMENT
In the name of Allah, the Most beneficent, the Most merciful, all praise and grateful be to
Almighty God, Lord of the worlds, the most beneficent the Most merciful, Master of the Day of
Judgment, for his powerful blessing, protection and guidance towards the successful completion
of this project.
May his peace and blessing be up on his servant and Messenger Muhammad (S.A.W.) and also
to his companions.
Most sincere thanks to my supervisor Malam Kabiru Dalhatu for his untiring effort which made
this project a success.
I will never forget with the untiring effort of my brothers Lawan Musa Diso and Alh Bashir
Musa Diso Malam for their guiding and counseling. And also wish to express my appreciation to
my uncle Alh. Ado Maje Diso for his assistance and good advice. I was indeed grateful similarly;
to Alh. Umar Maje Diso for his good advice and guidance and also my appreciation goes to all
those who have helped me in one way or the other, towards making my study done successfully.
I wish to extend my gratitude to my godfather Najib Fagge from gidan Malamai and his Top
Management for their good effort towards my study. My appreciation goes to my wife Malama
Juwairiyya Ibrahim Adam for her contribution through the year of my study and my beloved
Anty Allawiyyaand, Anty maryam. May Almighty Allah reward them abundantly.
Finally, I acknowledge the efforts made by friends Sadiq Nasir Bello and Sani Mukhtar Diso and
all those that supported me throughout my study and many others that time will not allowed me
to mention for all their contributions. May Almighty Allah reward them abundantly amen.
iv
ABSTRACT
Secured ID card generating System using barcode is of great importance in the school
Administration. During the last few years many such software were developed for this task. This
project centered on the review of the current system used in kano university of science and
technology wudil, for the students ID card. The software was modeled using data flow diagram
(DFD). Finally, the software model was implemented using Visual Basic .Net Programming
Language.
v
Contents
CHAPTER ONE..........................................................................................................................................1
1.1 INTRODUCTION.............................................................................................................................1
This chapter gives a briefing concerning identity management, statement of problem, aims and
objectives, limitations and definition of some words used.......................................................................1
1.2 STATEMENT OF PROBLEM.................................................................................................2
1.3 AIM AND OBJECTIVES.........................................................................................................3
1.4 SCOPE OF THE STUDY..........................................................................................................3
1.5 LIMITATION OF THE STUDY.................................................................................................4
1.6 JUSTIFICATION OF THE STUDY........................................................................................4
1.8 DEFINITION OF TERMS................................................................................................................5
CHAPTER TWO.........................................................................................................................................7
LITERATURE REVIEW................................................................................................................................7
2.1 INTRODUCTION............................................................................................................................7
This chapter gives a review of relevant literature on the case study. It discusses the objectives of the
case study, the tools that has been utilized for the project, and discusses the benefits of using an
identity in an organization.......................................................................................................................7
2.2 HISTORY OF IDENTITY CARDS.....................................................................................................8
2.3 APPLICATIONS OF IDENTITY CARDS................................................................................................10
2.4 TYPES OF ID CARDS AVAILABLE..................................................................................................12
2.4.2 ID Card Thicknesses...............................................................................................................13
2.4.3 ID Card Sizes...........................................................................................................................13
2.4.4 ID Card Technology................................................................................................................14
2.5 ID CARD PRINTING TECHNOLOGY..............................................................................................14
2.5.1 Direct-to-Card (DTC) Printing.................................................................................................14
2.5.2 Retransfer Printing.................................................................................................................15
2.5.3 Rewritable..............................................................................................................................16
2.6 ID Card Printer Brands...............................................................................................................16
Top Brands.............................................................................................................................................16
2.7 DESIGNING ID CARDS.................................................................................................................19
2.8 Storing Data on ID Cards............................................................................................................23
vi
2.8.1 Contact Smart Cards..............................................................................................................23
2.8.3 Proximity Cards.............................................................................................................................24
2.8.4 Hybrid Cards..........................................................................................................................25
2.8.5 Combi Cards...........................................................................................................................26
2.9 QR CODE ENCODING.................................................................................................................27
Encoding............................................................................................................................................28
CHAPTER THREE...................................................................................................................................32
SYSTEM ANALYSIS AND DESIGN.............................................................................................................32
3.1 INTRODUCTION...............................................................................................................................32
3.2 SYSTEM ANALYSIS......................................................................................................................32
3.3.1 Data Capture Methods..............................................................................................................34
3.3.2 Problems of the Existing System..............................................................................................35
3.3.3 New System Requirements................................................................................................36
3.4 Use Case Diagram...............................................................................................................................37
A Use case diagram visually represents what happens when an actor interact with a system. Hence a use
case diagram captures the functional aspect of a system.........................................................................37
3.5.1 System Block Diagram......................................................................................................39
3.5.2 Database Design................................................................................................................40
3.5.3 Input / Output Design.........................................................................................................40
3.6 DESCRIPTION OF MODULES.......................................................................................................41
CHAPTER FOUR.....................................................................................................................................43
SYSTEM IMPLEMENTATION AND TESTING............................................................................................43
4.1 INTRODUCTION...............................................................................................................................43
4.2 SYSTEM IMPLEMENTATION.......................................................................................................43
4.2.1 Development Tools Utilized...................................................................................................44
4.3 System Testing..........................................................................................................................51
4.4 Installation and Delivery method............................................................................................52
4.5 System Requirements................................................................................................................53
4.6 Training and Evaluation............................................................................................................53
4.7 Conversion Method...................................................................................................................54
4.8 Operations Procedure...............................................................................................................56
CHAPTER FIVE.......................................................................................................................................58
vii
SUMMARY, CONCLUSION AND RECOMMENDATION...............................................................58
5.1 INTRODUCTION...........................................................................................................................58
5.2 SUMMARY..............................................................................................................................58
5.3 CONCLUSION.........................................................................................................................59
5.4 RECOMMENDATION.............................................................................................................59
REFERENCES..........................................................................................................................................61
APPENDIX..................................................................................................................................................63
viii
CHAPTER ONE
1.1 INTRODUCTION
problem, aims and objectives, limitations and definition of some words used.
office building. It shows the rooms into which each person who works in the
building can enter. The blueprint also shows what kind of key each person would
need to open the door to get into that room, and what that person can do once he is
there.
and also effectively managed on the inside. In most organizations, Plastic Identity
Cards are the usual form of identification. These are produced using ready special
card printers. Most often, the cards are designed in graphic design software like
1
Corel Draw and printed on the card with no security feature.
(http://ezinearticles.com/?The-History-of-Identification-Cards&id=3765530)
This project seeks to investigate, analyze, design and implement a system which
can be used in the effective management of user identities with a case study of
1.2STATEMENT OF PROBLEM
Most organizations produce identity cards for their staffs or members, who use it at
any point where some identification is needed. Organizations with large number of
members’ data, which are usually in paper kept in files cabinet and finding an
Also, there are cases of falsification or creation of fake identity cards which are
curtailed with an effective identity management system and with adequate security
procedures.
2
1.3AIM AND OBJECTIVES
AIM
The main aim of this project is to develop an effective identity management system
OBJECTIVES
2. To develop a module that will customize identity cards from the data stored
in the system
3. To develop a module that will encode a security feature in the card to detect
fake cards, this can also be extended for more technical uses.
photograph
3
2. Generation of ID designs using Image and Printing Functions libraries
data
developed will be in the form of JPEG (.jpg) images, which can later be printed
This is very vital in every organization especially those with large user base. It
makes the processing of new ID cards and replacement of lost ones easier as there
is no need for a redesign, only a one click command generates another card. The
need to reduce fraud through the use of fake ID cards is very paramount, so as to
avoid the denting of the reputation of organizations when individuals create fake
4
1.7 BACKGROUND OF STUDY
A study was undertaken to investigate the mode of issuing ID cards and the
students have to wait for quite a long time before an id card is issued to them or
The current method of issuing ID card in the foundation is very gloomy and it
lacks security features, and as such, innovative ways have to be found to get out of
this situation.
ID – Identity
5
DATABASE: A flexible and powerful tool for storing and retrieving data, relevant
record.
6
CHAPTER TWO
LITERATURE REVIEW
2.1 INTRODUCTION
This chapter gives a review of relevant literature on the case study. It discusses the
objectives of the case study, the tools that has been utilized for the project, and
of identification.
This is because majority of countries have the rule that foreign citizens need to
have their passport with valid visa or occasionally a national identity card from
their home country available at any time if they do not have residence permit in the
country.
7
Information present on the document or in a supporting database might include the
Identification tags have become very common in a world today. They are utilized
in all aspects of our daily lives. These identification tags are used for different
tags are worn so that a customer, a patient or a fellow employee can identify you
Identification tags are also worn for security purposes. Security has become a
major issue over the years. Our high tech world has led to many advancement in
production of card identification and utilization. These tags are now be used for
many reasons and they are produced Through the use of computer chips, bar codes
and magnetic strips ID cards and carry a lot of information that are enough in
becoming more improved and getting better every day. But this was not always the
case.
8
Considering the security situation of our country and the world at large, we are
faced each and every day of our lives with the need this can be done through the
secured to avoid impersonation. But how often do we think about the identification
cemeteries are full of grave stones that are etched with that extremely sad word,
'Unknown'. The fallen soldier who bravely gave his most precious commodity, his
Back during the American Civil War, identification tags were not issued or
the soldiers. Prior to the battle many soldiers would write their name on a piece of
paper and attach it to their shirt or etch their names in a piece of wood, bore a hole
through it and then put it on a string around their neck. In those days soldiers that
fell on the battlefield were buried almost where they fell. Many soldiers did not
Although the government had yet to implement a plan for identification those in
the commercial industry were well ahead of the curve. They offered 'soldier
identification tags' in their magazines and sent their representatives into the field to
sell them. Even though there was a conscious effort by the soldiers to ensure
9
identification; when the war ended in 1865 around 42% of the fallen soldiers were
buried as 'Unknown'.
then issued with the round identification disc which was suggested to be worn
around their neck. in 1913 the military finally made it mandatory that all soldiers in
combat wore identification tags. in 1917 the procedure was well put in place. The
subsequent procedure had been in used until 1941 that the round identity disc was
transformed into the oblong ID tags commonly worn by soldiers today. The 'dog
tags', as they have come to be known had come a long way in eliminating the word
company, hospitals e.t.c the ID card can be used for the following purposes;
10
2.3.2 Student Badges
Membership cards are used in clubs, libraries, casinos, etc. It can be used for the
following purposes:
This is a special type of card that is used for special purposes such as:
11
2.3.6 Access Control
This is a special type of card that can be used by any business or organization for
(http://www.idwholesaler.com/learning-center/articles/)
ID cards come in a variety of materials, thicknesses, and sizes. Below are the
PVC is the most common material used to make ID cards. PVC is durable, strong,
and can remain structurally-intact for a very long time. Composite cards is
typically made of 60% PVC and 40% PET, offer added durability and warp
Earth-friendly bio (PVC) cards are made with 99% PVC that fully biodegrades
minimizing our footprint on the planet. They perform just like standard 100% PVC
12
cards. They maintain their integrity under normal, everyday use; they can get wet,
receptive) finish on the other side. These cards can be erased and re-printed up to
200 times. Rewriteable cards are often used for visitor cards. Adhesive back cards
feature a graphics-quality surface that allows you to print cards with high quality
text and graphics. These are then often attached to a proximity card.
(http://www.idwholesaler.com/learning-center/articles/)
Card thicknesses can vary from 10 mil to 80 mil, with 30 mil being the most
ID card printers come in all shapes and sizes. Most card printers are made to print
on standard CR80 size cards, with a number of them also capable of printing on
CR79 cards measure 3.303″ x 2.051″ and are slightly smaller than a standard
CR80 size card. CR79 cards typically have an adhesive back and are commonly
CR100 cards are 3.88″ x 2.63″ in size – that’s 42% larger than a standard CR80
card, making them easier to see from a distance and too big to hide in a wallet.
CR100 size cards are often referred to as “oversize” or “military-size” cards. Card
printers with CR100 size card printing capability are very limited.
An ID badge can serve as more than just identification; for example, a card can
As technology evolves, so does print quality. Today’s card printers have the ability
to print crisp, life-like images. Below are the two printing technologies available:
Direct-to-card technology is currently the most common form of card printing. The
direct-to-card printing process transfers images directly onto PVC cards. Direct-to-
card printers are available in a wide price range, with varying features and
capabilities. DTC is an economical choice for those where print quality is not a
popularity. Also known as "reverse transfer," this method applies images onto a
special clear film that is then fused onto the surface of a blank card. Retransfer
proximity cards, smart cards, pre-punched cards, key tag cards, or any type of card
with an uneven surface. Because retransfer printing prints images to a clear film,
its print quality is vibrant. Retransfer is an ideal choice for those requiring high
quality, vibrant images and those with a need for advanced technology. It’s ideal
for high security and large applications, especially when smart cards are used.
(http://www.idwholesaler.com/learning-center/articles/)
15
2.5.3 Rewritable
Rewrite technology requires special cards that are thermo-sensitive. This material
allows data to become visible or invisible based on the temperature applied to it.
Often used for visitor cards, rewriteable cards can be written to and erased
hundreds of times, allowing you to personalize a single card many times over.
Rewrite thermal printing prints in a single color, typically black or blue and doesn't
require a ribbon.
ID cards have been around for decades. In the beginning, they were created by
manually cutting and pasting information, including instant photos, onto card-sized
pieces of paper, which were then laminated. While the cards served as a basic
means of identification, they were not at all easy to create or durable and certainly
not secure. Today, digital printers make plastic ID card creation easy, fast and
economical to produce. Plastic, or PVC, cards are also durable and can be highly
tamper-proof.
Top Brands
Fargo, Evolis, Zebra, Magicard, Nisca, Datacard, Digital ID
EDIsecure, NBSImageMaster.
16
Founded in 1974 and acquired by HID in 2006
17
overlaminates.
images
smart cards
name EDIsecure
card printing.
(http://www.idwholesaler.com/learning-center/articles/)
18
2.7 DESIGNING ID CARDS
There are several software that provides an ability to create very simple ID card
designs using the design tools available. You can just add: the company name,
selecting font type, color and size for it, lines if necessary to separate the card areas
visually, graphics (rectangles), corporate logo, and all cardholder’s data fields
Such a simple ID card design has both advantages and disadvantages. The benefit
is that one does not need to spend a lot of time to create it and does not have to
possess special skills (the design creation process is straightforward). Still the
disadvantages of simple card design are more essential. The cards with too simple
design looks less professional and may work against the reputation of an
19
Simple ID card design
background
(http://www.idwholesaler.com/learning-
center/articles/)
It is recommended to use more complicated and elaborate card designs. Using any
Graphics Design Application, one should be able to create nice 3.37 x 2.13 inches
(most popular CR-80 card format) card template including company logo, name,
and all other required elements or place the order with a design studio to create it.
Then using this template as background for the ID card and placing on it all
2.7.1 Photo
When creating an ID card, incorporating the card holder photo, one of the most
around one inch square are likely to be adequate. However if viewing at a distance,
20
or in poor light is required, then portraits should be as large as practicable: 2 inches
square will work reliably at viewing distances of up to fifteen feet, for example.
Also, it is preferable that the card holder portrait on the photograph is made on the
(http://www.idwholesaler.com/learning-center/articles/)
badges, badges of the sales staff in the shops, badges of exhibition and other
21
2.7.3 Data fields.
It is obvious that well readable card holder information on the ID card is very
important. When you think over which information is necessary to have on your
card and where exactly to place the data fields remember not to have too many
Placing text fields at a proper distance from each other for better readability
and visibility
backgrounds for the text fields for better text visibility on the card layout.
If there is more data than can conveniently fit on one side of a CR-80 card,
or which is not normally required for public display, then creating a double-
sided card design and printing on the reverse of the card, would be the best
option.
22
The most economic double-sided card would use full color and black resin
(http://www.akond.net/index.php?issue_id=225)
Critical visual identification information should be placed clearly on the badge. For
security and privacy reasons, many organizations encode information to their cards
to keep information confidential and secure. This project will employ the use of
QR Codes to store secure data on cards. There are several types of cards available
Contact smart cards have an embedded integrated circuit chip that contains just
similar to a small floppy disk. They are less expensive than microprocessor chips,
but they also offer less security and should therefore not be used to store sensitive
or valuable information. Chips that contain both memory and a microprocessor are
also similar to a small floppy disk, except they contain an "intelligent" controller
used to securely add, delete, change, and update information contained in memory.
to protect the contents of memory from unauthorized access. Contact smart cards
23
must be inserted into a reader to read and store information in the chip. This type
plans, loyalty, electronic cash, government IDs, campus IDs, e-commerce, health
Contactless smart cards are similar to contact smart cards, except contactless cards
do not have to be inserted into a card acceptor device. Instead, contactless smart
cards contain an embedded antenna for reading and writing information contained
in the chip's memory. They need only be passed within range of a radio frequency
acceptor to read and store information in the chip. The range of operation is
typically from about 2.5" to 3.9" (63.5 mm to 99.06 mm) depending on the
acceptor. Contactless smart cards are used in many of the same applications as
contact smart cards, especially where the added convenience and speed of not
having to insert the card into a reader is desirable. There is a growing acceptance
of this type of card for both physical and logical access control applications.
24
Student identification, electronic passport, vending, parking, and tolls are common
Proximity cards (aka, prox cards, access cards) communicate through an antenna
similar to contactless smart cards except that they are read-only devices that
generally have a greater range of operation. The range of operation for prox cards
is typically from 2.5" to 20" (63.5 mm to 508 mm) depending on the reader. Small
amounts of information can be read with prox cards, such as an identification code
Prox cards are available from several sources in both ISO thickness cards from
0.027" to 0.033" (0.6858 mm to 0.8382 mm) and "clamshell" cards from 0.060" to
over 0.070" thick (1.524 mm to over 1.778 mm). Prox cards continue to grow in
access control applications, especially door access where fast, hands-free operation
is preferred.
25
2.8.4 Hybrid Cards
Hybrid cards offer a unique solution for updating your existing badging system.
Hybrid card is the term given to cards that contain two or more embedded chip
The contactless chip is typically used for applications demanding fast transaction
times, such as mass transit. The contact chip can be used in applications requiring
higher levels of security. The individual electronic components are not connected
26
The combi card—also known as a dual-interface card—has one smart chip
embedded in the card that can be accessed through either contact with a reader or
provides ease-of-use and high security in a single card product. Mass transit is one
of the more popular applications for the combi card; a contact-type acceptor can be
used to place a cash value in the chip's memory and the contactless interface can be
center/articles/)
outside of the industry due to its fast readability and comparatively large storage
manufacturing process, the QR code is one of the most popular types of two-
speed.
The technology has seen frequent use in Japan; the United Kingdom is the seventh-
largest consumer of QR codes in the world. The amount of data that can be stored
in the QR code depends on the character set, version and error correction level.
The maximum values for version 40 with error correction capacity level L are:
bytes.
Encoding
The format information records two things: the error correction level and the mask
pattern used for the symbol. Masking is used to break up patterns in the data area
that might confuse a scanner, such as large blank areas or misleading features that
look like the locator marks. The mask patterns are defined on a 6×6 grid that is
28
dark areas of the mask are inverted. The format information is protected from
errors with a BCH code, and two complete copies are included in each QR symbol.
The message data is placed from right to left in a zigzag pattern. In larger symbols,
this is complicated by the presence of the alignment patterns and the use of
(http://en.wikipedia.org/wiki/QR_code)
WORK FLOW
Most organizations produce identity cards for their staffs or members, who use it at
any point where some identification is needed. Organizations with large number of
members’ data, which are usually in paper kept in files cabinet and finding an
Also, there are cases of falsification or creation of fake identity cards which are
curtailed with an effective identity management system and with adequate security
procedures.
29
The main aim of this project is to develop an effective identity management system
REFERENCE
1. (WILLIAMS, 2007)
SUMMARY
Kano University Of Science and Technology wudil, Kano as case study. In the
course of investigating the current system, the staffs of the foundation were
production and verification of Identity Cards. The problems associated with the
30
current system were noted and used as requirement in the development of the new
system.
The new system was designed using Microsoft Visual Studio 2010 (Visual
Basic.Net) and Microsoft Access for the database management. The new system is
Objects, Card generation and verification modules. The new system uses the md5
cryptographic hash function to encrypt the primary key for each student’s record
and the key is used in encoding the QR Code if selected as an object. The final
design can be generated for preview with live data from the database or the actual
card design can be generated and saved to a specified location on the Computer’s
31
CHAPTER THREE
3.1 INTRODUCTION
This chapter discusses in detail the system analysis and design method and show
the various techniques used to obtain information to have a better system design.
Hence, this chapter deals with the systematic approach for providing answers to
question that gives rise to the research work under study. It involves the analysis of
the full description of the existing system, which should lead to full specification
of user requirement.
Systems are created to solve problems. One can think of the systems approach as
an organized way of dealing with a problem. In this dynamic world, the subject
System Analysis and Design mainly deals with the software development
activities.
systems analysis and systems design. In System Analysis, more emphasis is given
deciding whether the proposed system is desirable or not and whether the existing
32
system needs improvements. Thus, system analysis is the process of investigating a
The system that is currently in use in the foundation is manual and as such it lacks
security features and ways have to be found to get out of this situation. Now a day
world has changed from manual system to computer base system or information
technology, so I decided to convert the manual system into automated system with
security features and come up with project that comprises student information
system, card generation module and card verification module with barcode and QR
code.
The above listed inherent limitations of the current existing system have been
analyzed with the aim to develop a system that will reduce the problem identified.
33
System design is the process of planning a new business system or one to replace
or complement an existing system. Analysis specifies what the system should do.
After the proposed system is analyzed and designed, the actual implementation of
system-analysis-design.html)
In carrying out this project, the current methods used in the production of Identity
cards were carefully studied, taking note of areas that have lapses that needs to be
corrected, and an outline was carefully laid out on how to implement the
improvements necessary.
In carrying out a feasibility study on the project study, two data collection
techniques were employed in analyzing the operations of the existing system, these
techniques are:
Observation: The existing ID cards were studied and also currently available
production.
34
Research: A carefully laid out research was carried out to understand the
current trends in ID card production and the specific details that are
Interview: The Staffs of the foundation were asked questions that are critical
Answers given to the above questions formed the basis for creating the
From the systems analysis undertaken, the following observations were made
35
The capture of students’ data for record keeping usually involves paper
The design process of the ID cards involves manual design and data field
files.
The major problems associated with the above observations are as follows:
The current system is prone to fraud as cards can be forged and verification
The design of the new system is aimed at eliminating or reducing to the best
minimum all the problems observed in the current system. In doing this, four (4)
system components are proposed in the new system, these are the Record
36
Template Designer: The template to be used in the generation of the ID
cards will be designed using this component and can be saved for future use.
authenticity.
A Use case diagram visually represents what happens when an actor interact
with a system. Hence a use case diagram captures the functional aspect of a
system.
Login
Add, Edit
Student Record
Generate ID
Account Setting
Admin
Verify ID
37
Login
Generate ID
Staff
Verify ID
The second component of Data Flow analysis is the Data Dictionary. Data flow
diagrams themselves do not fully describe the subject of the investigation. The data
dictionary provides additional information about the system. This is the list of all
the elements that are included in a set of data flow diagrams, describing the
system. The major elements in a system are data flow, data stores and processes.
Data dictionary is very important because, it manages the details in a large system
of elements, documents the features of the system and facilitates analysis of the
details in order to evaluate characteristics and determine where the system changes
should be made.
Notation Description
38
identity card.
Data dictionary
The System block diagram below shows the major components of the system.
39
3.5.2 Database Design
40
3.6 DESCRIPTION OF MODULES
After successful development of the new system, a number of modules were either
manage students’ data. The operations that can be carried out within the
module also provides the ability to import images into the system. The
Card face manager (modface): This module is used to set the options for
the front and back faces of the ID card; it depends on previously created
will be used to display data on the cards. Objects that can be created are
Text, Images and QR Code. The data field, size and coordinates of the
objects are set within this module. Only the QR Code has a fixed size of
41
182px by 182 px. All objects will be confined within this module depends
Faces and Objects created with their properties for the designer to tweak as
desired. It also shows a preview of how the card will look like.
stage.
Code library created using the C# language. It was ported in to the system
and converted to VB.Net. It has the ability to encode and decode Numeric,
signatures of data. It was used to create a unique primary key for each
42
CHAPTER FOUR
4.1 INTRODUCTION
This chapter describes in detail the stages involved in the implementation of this
project. After the initial design has been finalized, the development of the system
will be iterated. Each iteration will include the implementation, evaluation and
testing.
System Implementation comes when the end user of your software is foremost in
your mind. During this phase the documentation and tools the customer uses to
make informed decisions about how to deploy your software securely are created.
To this end, the Implementation phase is when you establish development best
practices to detect and remove security and privacy issues early in the development
cycle.
development life cycle excluding the code itself. In this case, various documents
43
Testing itself is part of the implementation process, as such basic testing
techniques will be considered and the ones that best suit the environment will be
discussed.
The Identity Management System was developed using several technologies which
In April 2010, Microsoft released Visual Basic 2010. Microsoft had planned to use
evolution strategy between Visual Basic and sister language C# to bring both
languages into closer parity with one another. The Visual Basic compiler was
removing the need for the "_" line continuation character. Also, existing support of
44
inline Functions was complemented with support for inline Subs as well as multi-
May 12 2010, the version of Microsoft Access 2010 was released by Microsoft in
Office 2010; Microsoft Office Access 2007 was the prior version.
MS Access stores data in its own format based on the Access Jet Database Engine.
It can also import or link directly to data stored in other applications and databases.
and many other ActiveX components. Visual objects used in forms and reports
45
expose their methods and properties in the VBA programming environment, and
management system.
46
4.2.5 ID card preview
The preview shows the front and back format of the ID card after details is entered
Front preview
47
back and front preview
showing the steps as boxes of various kinds, and their order by connecting them
with arrows. Flow charts are used in analyzing, designing, documenting and
48
Fig.I.1 :Template Designer
49
Fig.I.3 :Students Record Management
50
4.3 System Testing
System testing does not test the software per say but rather the integration of each
module in the system. It also tests to find discrepancies between and its original
is the compatibility of individual modules. There are some special systems tests:
a) Peak Load test: determines whether the system will handle the volume of
activities that occur when the system is at the peak of its processing
demand.
b) Storage test: determines the capacity of the system to store transaction data
c) Performance Time Test: Determines the length of time used by the system
f) Human Factor Test: determines how users will use the system when
Some of the system tests highlighted above were performed alongside some other
irreplaceable usability practice, since it gives direct input on how real users use the
its intended purpose. The Usability testing conducted was intended to measure the
usability, or ease of use, of a specific user interface, and therefore, it was realized
that the interactive nature of the user interface made it easy and fast for the users to
This involves installation of the software on systems and network servers for use.
personnel. The above centers on how such resources will convert resources into
information products.
52
4.5 System Requirements
Hardware Requirement:
Scanner
Software Requirement:
(Windows Vista, windows 7 or later) and must have installed Microsoft .Net
This is an on-going process that starts with the orientation of operating Staff and
student or people that will use the software. It allows users to understand how to go
about using the software for easy understanding and effective usage of the
software.
53
4.7 Conversion Method
Conversion to the new system can be done in one of the following methods:
a. Parallel system: this is a method where the old system is operated alongside
the new system. This offers greatest security because, the old system can
take over if errors are found in the new system or if usage problems occur.
Though it provides security, it also doubles operating costs and new system
the new one. Here, the organization fully relies on the new system and this
forces user to make the new system work. There are immediate benefits
from new methods and controls. On the other hand, there is no system to
fall back on if difficulties arise with the new system. This shows that it
c. Pilot System: this is the working version of the system implemented in one
part of the organisation. Based on feedback, changes are made and the
implementation. The weak side of this method is that it may give the
impression that the new system is unreliable and not error free.
54
d. Phase-In: this is to gradually implement the system across all users. It
allows some users to take advantage of the system early. It also allows
training and installation without formally going into those stages. A long
Phase-In causes user problems whether the project goes well or not.
The Parallel conversion method will be used. This is the process of transferring
operations from one computer system to another, during which both systems are
run together for a period of time to ensure that they are producing identical
attention to the steps before the actual conversion, namely the construction of a
Low Risk
While a parallel conversion minimizes the risk of major flaws in the new system
causing irreparable harm to the business; it also means the cost of running two
systems over the period must be incurred. Because running two versions of the
55
same system on the computer could place an unreasonable demand on computing
resources, this may be possible only if the old system is largely manual.
computing is required. After starting the application, which will normally be from
the start menu or by clicking the application’s icon on the desktop, a Multi-
Document Window will be displayed. The user should then go to the operations
menu to select the designed Operation. Any pattern of operation is possible but
STEP 1: Launch the students’ data management form and enter all the necessary
STEP 2: Launch the Template management form, and create or update a template
as desired setting all the necessary options, of which template name and orientation
are compulsory
STEP 3: Launch the Card faces management form and set the backgrounds for the
STEP 4: Launch the Template Designer to design and preview the card design at
any stage, during which you can launch the Objects management form, with which
56
Objects (Text, Image or QR Code) can be create or updated. All designs must be
within 322 pixels (width) by 205 pixels (height), which is the size of standard
CR80 Card.
STEP 5: After completing the design of the cards, proceed to the Card generation
form to preview the card design with live data and generate the cards based on
specific data criteria. The QR Code encoding, if selected is done and inserted into
STEP 6: For verification, the Verification for will be loaded and the scanned ID
57
CHAPTER FIVE
5.1 INTRODUCTION
This chapter deals with summary of the research work, conclusion as well as
5.2 SUMMARY
Kano University Of Science and Technology wudil, Kano as case study. In the
course of investigating the current system, the staffs of the foundation were
production and verification of Identity Cards. The problems associated with the
current system were noted and used as requirement in the development of the new
system.
The new system was designed using Microsoft Visual Studio 2010 (Visual
Basic.Net) and Microsoft Access for the database management. The new system is
Objects, Card generation and verification modules. The new system uses the md5
58
cryptographic hash function to encrypt the primary key for each student’s record
and the key is used in encoding the QR Code if selected as an object. The final
design can be generated for preview with live data from the database or the actual
card design can be generated and saved to a specified location on the Computer’s
5.3 CONCLUSION
This project was able to investigate the current state of identity management using
Kano University Of Science and Technology wudil, Kano as case study, analyze
the problems associated with the current system and develop a new system that can
be used to manage students’ data, design card templates and also generate cards
based on the templates designed and the data parameter specified. It can also be
used to verify the authenticity of generated cards. The system can be deployed by
any institution.
5.4 RECOMMENDATION
The new system has been developed to manage students’ data, design card
templates and also generate the cards with encoded QR code data and barcode.
Although the new system is sufficient for the purpose intended, it can be extended
59
Extending the database to be able to accommodate any type of membership
More features can be deployed to utilize the encoded data; these features can
60
REFERENCES
1982.
http://ezinearticles.com/?The-History-of-Identification-Card&id=3765530.
http://msdn.microsoft.com/en-us/library/bb208930(v=office.12).aspx
61
11.Robert Vieira (2006) Beginning SQL Server™ 2005 Programming. Wiley
Publishing, Inc., Indianapolis, Indiana USA
12.Identity document, Wikipedia Encyclopedia
(http://en.wikipedia.org/w/index.php?title=identity_document)
codes-and-barcodes.html.
14.Barcode scanners(http://www.nationalbarcode.com/articles/use-of-barcode-
scanners.html.
15.Williams (2007)
62
APPENDIX
ImportsSystem.Security.Cryptography
ImportsSystem.Text
ImportsSystem.Data.OleDb
ImportsSystem.Windows.Forms.MessageBoxButtons
ImportsSystem.Windows.Forms
PublicClassstdinfo
DimxpicPassAsNewBitmap(200, 200)
DimxpicSignAsNewBitmap(220, 135)
DimstrPassAsString
DimstrSignAsString
' Convert the input string to a byte array and compute the hash.
Dim data AsByte() = md5Hasher.ComputeHash(Encoding.Default.GetBytes(input))
EndFunction
63
lstSearch.Items.Add(reader("regnum").ToString&" --- "& reader("surname").ToString&",
"& reader("othername").ToString)
Loop
reader.Close()
con.Close()
EndSub
SubDataMod()
Try
Dim rand AsNewRandom()
DimxrandAsLong
' Dimi As Integer
DimxregnumAsString
xregnum = Replace(Trim(txtregnum.Text), "/", "-")
Dim con AsNewOleDb.OleDbConnection(strcon)
con.Open()
' i = (2 / 0)
IfcmdSave.Text = "Update"Andtxthash.Text<>""Then
64
DimcmdAsNewOleDb.OleDbCommand("update tblstd set regnum = ?, surname = ?, othername = ?,
dept = ?, prg = ?, dur = ?, gsm = ?, email1 = ?, parentname = ?, paddress = ?, caddress =
?, permad = ?, sofo = ?, lga = ?, htwn = ?, stdpass = ?, stdsign = ?, xrand=?, issue1
= ?, lvl = ? where pkey= ?;", con)
strPass = xregnum&"-p.jpg"
strSign = xregnum&"-s.jpg"
xpicPass.Save(Application.StartupPath&"\pix\"&strPass)
xpicSign.Save(Application.StartupPath&"\pix\"&strSign)
Try
cmd.ExecuteNonQuery()
Catch ex AsException
MessageBox.Show(ex.Message)
EndTry
con.Close()
MessageBox.Show("Student Details Updated!")
ElseIfcmdSave.Text = "Save"Then
strPass = xregnum&"-p.jpg"
strSign = xregnum&"-s.jpg"
xpicPass.Save(Application.StartupPath&"\pix\"&strPass)
xpicSign.Save(Application.StartupPath&"\pix\"&strSign)
65
' cmd.Parameters.Add(New OleDbParameter("Balance", Decimal.Parse(txtAmount.Text)))
cmd.Parameters.Add(NewOleDbParameter("regnum", txtregnum.Text))
cmd.Parameters.Add(NewOleDbParameter("surname", txtsname.Text))
cmd.Parameters.Add(NewOleDbParameter("othername", txtoname.Text))
cmd.Parameters.Add(NewOleDbParameter("dept", cbodept.Text))
cmd.Parameters.Add(NewOleDbParameter("prg", cboprg.Text))
cmd.Parameters.Add(NewOleDbParameter("dur", cboprg.Text))
cmd.Parameters.Add(NewOleDbParameter("gsm", txtgsm.Text))
cmd.Parameters.Add(NewOleDbParameter("email1", txtemail.Text))
cmd.Parameters.Add(NewOleDbParameter("pname", txtpname.Text))
cmd.Parameters.Add(NewOleDbParameter("paddress", txtpad.Text))
cmd.Parameters.Add(NewOleDbParameter("caddress", txtcad.Text))
cmd.Parameters.Add(NewOleDbParameter("permad", txtpermad.Text))
cmd.Parameters.Add(NewOleDbParameter("sofo", txtsofo.Text))
cmd.Parameters.Add(NewOleDbParameter("lga", txtlga.Text))
cmd.Parameters.Add(NewOleDbParameter("htwn", txthtwn.Text))
cmd.Parameters.Add(NewOleDbParameter("stdsign", strSign))
cmd.Parameters.Add(NewOleDbParameter("stdpass", strPass))
cmd.Parameters.Add(NewOleDbParameter("issue1", "1"))
cmd.Parameters.Add(NewOleDbParameter("xrand", xrand.ToString))
cmd.Parameters.Add(NewOleDbParameter("lvl", cbolvl.Text))
cmd.Parameters.Add(NewOleDbParameter("pkey", getMd5Hash(xrand.ToString)))
Try
cmd.ExecuteNonQuery()
MessageBox.Show("New Student Regfistration Completed!")
Catch ex AsException
MessageBox.Show(ex.Message)
EndTry
con.Close()
Else
EndIf
Catch ex AsException
MessageBox.Show("Error: "&ex.Message)
EndTry
EndSub
' CallcmdNew_Click(cmdSave, e)
EndSub
cbodept.Items.Clear()
cboprg.Items.Clear()
'cbolvl.Items.Clear()
66
cboprg.Items.Add("Morning")
cboprg.Items.Add("Afternoon")
cboprg.Items.Add("Evening")
cbodept.Items.Add("Quran")
cbodept.Items.Add("Hadith")
cbodept.Items.Add("Fiqh")
picPassport.ImageLocation = Application.StartupPath&"\pix\face.jpg"
picSign.ImageLocation = Application.StartupPath&"\pix\sign.jpg"
EndSub
EndSub
txtregnum.Text = ""
txtsname.Text = ""
txtoname.Text = ""
'cbosch.Text = ""
cbodept.Text = ""
cboprg.Text = ""
cbolvl.Text = ""
txtgsm.Text = ""
txtemail.Text = ""
txtpname.Text = ""
txtpad.Text = ""
txtcad.Text = ""
txtpermad.Text = ""
txtsofo.Text = ""
txtlga.Text = ""
txthtwn.Text = ""
txthash.Text = ""
picPassport.ImageLocation = Application.StartupPath&"\pix\face.jpg"
picSign.ImageLocation = Application.StartupPath&"\pix\sign.jpg"
EndSub
67
DimansAsString
Dim buttons AsSystem.Windows.Forms.MessageBoxButtons =
System.Windows.Forms.MessageBoxButtons.YesNo
' Show message box
ans = MessageBox.Show("Are You Sure you want to delete the Student Data?", "Data
Deletion", buttons).ToString
Ifans = "Yes"Then
Dim con AsNewOleDb.OleDbConnection(strcon)
con.Open()
DimcmdAsNewOleDb.OleDbCommand("delete * from tblstd where pkey = '"&txthash.Text&"';",
con)
cmd.ExecuteNonQuery()
con.Close()
txtregnum.Text = ""
txtsname.Text = ""
txtoname.Text = ""
cbodept.Text = ""
cboprg.Text = ""
cbolvl.Text = ""
txtgsm.Text = ""
txtemail.Text = ""
txtpname.Text = ""
txtpad.Text = ""
txtcad.Text = ""
txtpermad.Text = ""
txtsofo.Text = ""
txtlga.Text = ""
txthtwn.Text = ""
txthash.Text = ""
picPassport.ImageLocation = Application.StartupPath&"\pix\face.jpg"
picSign.ImageLocation = Application.StartupPath&"\pix\sign.jpg"
Else
MessageBox.Show("Deletion Canceled!")
EndIf
EndSub
Dim q AsArray
Dim q1 AsString
68
Ifreader.ReadThen
txtregnum.Text = reader("regnum").ToString
txtsname.Text = reader("surname").ToString
txtoname.Text = reader("othername").ToString
cbodept.Text = reader("dept").ToString
cboprg.Text = reader("prg").ToString
cbolvl.Text = reader("lvl").ToString
txtgsm.Text = reader("gsm").ToString
txtemail.Text = reader("email1").ToString
txtpname.Text = reader("parentname").ToString
txtpad.Text = reader("paddress").ToString
txtcad.Text = reader("caddress").ToString
txtpermad.Text = reader("permad").ToString
txtsofo.Text = reader("sofo").ToString
txtlga.Text = reader("lga").ToString
txthtwn.Text = reader("htwn").ToString
txthash.Text = reader("pkey").ToString
'strPass
' strSign
Try
DimzpicSignAsNewBitmap(Application.StartupPath&"\pix\"& reader("stdsign").ToString)
DimzpicPassAsNewBitmap(Application.StartupPath&"\pix\"& reader("stdpass").ToString)
EndSub
69
PrivateSub cmdBrowseSign_Click_1(ByVal sender AsSystem.Object, ByVal e
AsSystem.EventArgs) HandlescmdBrowseSign.Click
CallcmdBrowseSign_Click(sender, e)
EndSub
EndSub
EndSub
EndClass
ImportsSystem.Data.OleDb
ImportsSystem.Security.Cryptography
ImportsSystem.Text
ImportsMessagingToolkit.QRCode.Codec
ImportsMessagingToolkit.QRCode.Codec.Data
ImportsMessagingToolkit.QRCode.Codec.Util
ImportsSystem.Windows.Forms.MessageBoxButtons
ImportsSystem.Windows.Forms
ImportsSystem.Drawing.Imaging
PublicClassForm2
DimxpicPassAsNewBitmap(200, 200)
DimxpicSignAsNewBitmap(220, 135)
DimstrPassAsString
DimstrSignAsString
Dim y, z AsString
Dim y1, z1 AsBitmap
Subqr()
DimqrcodeAsKeepAutomation.Barcode.Bean.BarCode = NewKeepAutomation.Barcode.Bean.BarCode
qrcode.Symbology = KeepAutomation.Barcode.Symbology.QRCode
70
'QR Code data mode, supporting AlphaNumeric, Auto, Byte, Customer, Kanji, Numeric
qrcode.QRCodeDataMode = KeepAutomation.Barcode.QRCodeDataMode.Auto
'Set QR Code valid input: All ASCII characters, including 0-9, A-Z, a-z, special
characters. Length: variable.
qrcode.CodeToEncode = "9f5845da0da4f7ffb03f2d81b9d30e05"
EndSub
71
PrivateSub Button6_Click(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)
Dim barcode AsKeepAutomation.Barcode.Bean.BarCode =
NewKeepAutomation.Barcode.Bean.BarCode
EndSub
EndSub
EndSub
EndSub
Ifreader.ReadThen
lblreg.Text = reader("regnum").ToString
lblname.Text = reader("surname").ToString
lbloname.Text = reader("othername").ToString
lbldept.Text = reader("dept").ToString
lblprog.Text = reader("prg").ToString
'cbolvl.Text = reader("lvl").ToString
lblphone.Text = reader("gsm").ToString
Try
DimzpicSignAsNewBitmap(Application.StartupPath&"\pix\"& reader("stdsign").ToString)
DimzpicPassAsNewBitmap(Application.StartupPath&"\pix\"& reader("stdpass").ToString)
72
'txtemail.Text = reader("email1").ToString
'txtpname.Text = reader("parentname").ToString
'txtpad.Text = reader("paddress").ToString
'txtcad.Text = reader("caddress").ToString
'txtpermad.Text = reader("permad").ToString
'txtsofo.Text = reader("sofo").ToString
'txtlga.Text = reader("lga").ToString
'txthtwn.Text = reader("htwn").ToString
'txthash.Text = reader("pkey").ToString
'strPass
' strSign
y = reader("regnum").ToString
z = reader("pkey").ToString
Else
MessageBox.Show("Not Found")
EndIf
reader.Close()
con.Close()
GroupBox1.Visible = True
Callbarc()
Callqr()
Callprev()
EndSub
Subbarc()
EndSub
Subprev()
preview.lblreg.Text = Me.lblreg.Text
preview.lblname.Text = Me.lblname.Text
preview.lbloname.Text = Me.lbloname.Text
preview.lbldept.Text = Me.lbldept.Text
preview.lblprog.Text = Me.lblprog.Text
73
preview.lblphone.Text = Me.lblphone.Text
preview.picpassport.Image = Me.picpassport.Image
preview.picsign.Image = Me.picsign.Image
preview.picbar.Image = y1
preview.picqr.Image = z1
EndSub
EndSub
lblreg.Text = ""
lblname.Text = ""
lbloname.Text = ""
lbldept.Text = ""
lblprog.Text = ""
lblphone.Text = ""
txtsearch.Text = ""
EndSub
EndClass
74