You are on page 1of 13

Timed File Viewing

In this project we are going to send file to the user with one time password. First user has to register in our site. That all details are stored in the database. After that Admin will send the file with expired date and time to the user with password to the email Id. When the user clicks on that link, the site will open the pop-up window with password. We have to enter the password. Once the user click the button , the user can access the file. When the user opens the file, the timer will starts running, the file will open until the timer reaches to ³0´. After that file will be deleted. While viewing the file, the user has only read permission. The user does not have the permission to copy, paste and download the file. After completing the time, the users will logout automatically. In this project we have three modules, they are User Registration Administrator Access User Access

User Registration:
In the first module, the user has to be registered in our site. He has to give the details of first name, lastname and email id. While user clicks the submit button all the details will be stored in the database.

Administrator Access:
In the second module, the administrator will enter into the database. He will set the password to the user. He will send the file to the user with password and site link. Administrator will set time limit to each file. When the user login to the site, automatically log file will be created with the details.

The advantage of waterfall development is that it allows for departmentalization and managerial control. Often considered the classic approach to the systems development life cycle. He has the permission only to view the file. He doesn¶t have permission to copy. The user can view the file until the timer expires. the waterfall model describes a development method that is linear and sequential. installation. Waterfall development has distinct goals for each phase of development. and ends up at operation and maintenance. testing. troubleshooting. implementation. user will access the site. Once an application is in the testing stage.User Access: In the third module. through design. he will get the window to enter the password and when he click on the button he can view the file what he want. it is very difficult to go back and change something that was not well-thought out in the concept stage. without any overlapping or iterative steps. the development proceeds to the next phase and there is no turning back. When user clicks on the link. After that the file will be deleted automatically and user will be logout. paste and even downloading also. Each phase of development proceeds in strict order. When the file was opened. Once a phase of development is completed. Development moves from concept. The disadvantage of waterfall development is that it does not allow for much reflection or revision. the timer will start. . Software Development Life Cycle(SDLC): Waterfall Model: The waterfall model is a popular version of the systems development life cycle model for software engineering.

In the Requirement analysis and definition phase all requirements are pointed down. the designing is mainly implemented towards the development of the project requirements. At third stage. In the integration and system testing phase as the name suggests all unit tasks that have been performed in the former stage are integrated to produce a complete system. . Later these requirements are defined and discussed with system users to specify system configuration. The next phase is ³System and software design´ where the actual design of the project takes place. It is then tested as a complete system to find out the final deliverable to the client. The designing includes both software and hardware systems and full system architecture is drawn. Programs are completed in units and tested accordingly to verify it coincide with the requirements.

It is also helpful to think of PHP in terms of what it can do for you. However. Java and Perl with a couple of unique PHP-specific features thrown in.The final phase operation and maintenance is usually bit longer than the other phases but not always this is the case. Technologies: In this project we are using the PHP and MYSQL. PHP will allow you to: y y Reduce the time to create large websites.e. Check out PHP HotScriptsfor examples of the great things that are possible with PHP. y Allow creation of shopping carts for e-commerce websites. shopping cart items. etc). username. . this session information is temporary and is usually deleted very quickly after the user has left the website that uses sessions. However here the project is run for practical purpose and resolved any problem that arise during the operation. The goal of the language is to allow web developers to write dynamically generated pages quickly. Sessions: A PHP session solves this problem by allowing you to store user information on the server for later use (i. Much of its syntax is borrowed from C. Create a customized user experience for visitors based on information that you have gathered from them. In addition to that the system is also aligned with the newer requirements. y Open up thousands of possibilities for online tools. About PHP: PHP is an HTML-embedded scripting language.

This helps to prevent two users' data from getting confused with one another when visiting the same webpage. depending on the value associated with it.use_only_cookies. and will only be available when the extension has either been compiled into PHP or dynamically loaded at runtime. Sessions work by creating a unique identification(UID) number for each visitor and storing variables based on this ID. If you require a more permanent storage you will need to find another solution. you need to enable session. This is the same id as the one returned by session_id(). You need to take additional measures to actively protect the integrity of the session. Sessions and Security: The session module cannot guarantee that the information you store in a session is only viewed by the user who created the session. Pre Defined Constants: The constants below are defined by this extension.It is important to ponder if the sessions' temporary storage is applicable to your website. or sessions will not work. reduced convenience for the user. For example. cookies must be enabled unconditionally on the user side. SID (string) Constant containing either the session name and session ID in the form of "name=ID" or empty string if session ID was set in an appropriate session cookie. like a MySQL database. . Assess the importance of the data carried by your sessions and deploy additional protections -this usually comes at a price. if you want to protect users from simple social engineering tactics. In that case.

using the function setcookie. Cookies can also be removed by the user at any time. and a session is not. Expiration: The date when the cookie will expire and be deleted. it will send the cookie too. you can both create and retrieve cookie values. Although cookies have been around for many years and most people do have them enabled. The main difference between a cookie and a session is that a cookie is stored on your computer. Cookies allow the webmaster to store information about the site visitor on their computer to be accessed again the next time they visit. Each time the same computer requests a page with a browser. etc. You will use this name to later retrieve your cookie. One common use of cookies is to store your username and password on your computer so you don't need to login again each time you visit a website. With PHP. Value: The value that is stored in your cookie. If you do not set this expiration date. expiration): 1.Cookies: A cookie is often used to identify a user. there are some who do not. value. In this project we are using the cookies and sessions and some other functions. When you create a cookie. A cookie is a small file that the server embeds on the user's computer. Cookies can also store other things such as your name. so don't forget it! 2. shopping cart contents. Common values are username(string) and last visit(date). so don't use them to store anything too important . then it will be treated as a session cookie and be removed when the browser is restarted. last visit. you must specify three arguments. 3. These arguments are set cookie (name. Name: The name of your cookie.

It shows the major features and how they are related to one another. From a project management point of view. Source code generated and testing is conducted to integrate and validate the software. regardless of whether it is temporary or persistent.How to Delete a Cookie: You can delete a cookie. The data design transforms the information domain model created during analysis in to the data structures that will be required to implement the software. software design is conducted in two steps. System Design: System Design is a solution to how to approach to the creation of a system. Preliminary design is connected with the transformation of requirements into data and software architecture. The architectural design defines the relationship among major structural components into a procedural description of the software. simply by changing its expiration date to a time in the past. This important phase provides the understanding and procedural details necessary for implementing the system recommended in the feasibility study. Detailed design focuses on refinements to the architectural representation that leads to detailed data structure and algorithmic representations of software. Logical Design: The logical design of an information system is analogous to an engineering blue print or conceptual view of an automobile. . an architectural design and a procedural design. The design step produces a data design.

implementation.The outputs. Part of the reason for OAD is its use in developing programs that will have an extended lifetime. a system. OOAD applies object-modeling techniques to analyze the requirements for a context ² for example. or a business unit ² and to design a solution. Most modern object-oriented analysis and design methodologies are use case driven across requirements. testing. integrity and successful recover from failure. . an organization. The objectives of database are accuracy. The impact of data structure on program structure and procedural complexity causes data design to have a profound influence on software quality. a set of system modules. but they¶re also very well suited for systems that will be implemented in the procedural paradigm. The Unified Modeling Language (UML) has become the standard modeling language used in object-oriented analysis and design to graphically illustrate system concepts. UML DIAGRAMS: OBJECT ORIENTED ANALYSIS AND DESIGN: Object-oriented analysis and design (OOAD) is often part of the development of large scale systems and programs often using the Unified Modeling Language (UML). and deployment. privacy and security of data and good overall performance. The concepts of information hiding and data abstraction provide the foundation for an approach to data design. Use cases were invented with object oriented programming. Data Design: Data design is the first of the three design activities that are conducted during software engineering. design. inputs and relationship between the variables are designed in this phase.

Collaboration between objects involves them sending messages to each other. ³sending a message´ is the same as ³invoking a method´. such as concurrency. The behavior of the system is achieved through collaboration between these objects. That can include a detailed user interface mock-up document. The model of a system can be divided into multiple domains each of which are separately analyzed. The implementation constraints are decided during the object-oriented design (OOD) process. and represent separate business. An analysis model will not take into account implementation constraints. or conceptual areas of interest. The exact semantics of message sending between objects varies depending on what kind of system is being modeled. or inheritance. Object-oriented design takes the conceptual model that is the result of object-oriented analysis. distribution. and adds implementation .Object Oriented Systems An object-oriented system is composed of objects. UML diagrams can be used to illustrate the statements. persistence. The source of the analysis is a written requirement statements. and/or written use cases. ³sending a message´ might involve sending data via a socket. using concepts and relationships between concepts.  Object Oriented Analysis: Object-Oriented Analysis (OOA) aims to model the problem domain. and the state of the system is the combined state of all the objects in it. the problem we want to solve by developing an object-oriented (OO) system.  Object-Oriented Design: Object-Oriented Design (OOD) is an activity where the designers are looking for logical solutions to solve a problem. Any other documentation that is needed to describe what is to be built is also included in the result of the analysis. In some systems. The result of object-oriented analysis is a description of what is to be built. using objects. In other systems. often expressed as a conceptual model. technological. nor how the system will be built.

methodology. different processes or objects that live simultaneously. After success in the marketplace. in the order in which they occur. It is the first object-oriented design methodology to employ use cases to drive software design. The interfaces and their Implementations for stable concepts can be made available as reusable services. A sequence diagram shows. implement environment-specific or situation specific logic or algorithms. It also uses other design products similar to those used by OMT. The result of the object-oriented design is a detail description how the system can be built.  Sequence Diagram: The Message Sequence Chart technique has been incorporated into the Unified Modeling Language (UML) diagram under the name of Sequence Diagram. as parallel vertical lines. .constraints imposed by the environment. Object-oriented software engineering (OOSE) is an object modeling language and methodology OOSE was developed by Ivar Jacobson in 1992 while at Objectory AB. concepts and notation from OOSE have been incorporated into UML. This allows the specification of simple runtime scenarios in a graphical manner. as well as architectural assumptions chosen as basis of design. other tool vendors also supported OOSE. After Rational bought Objectory AB. the OOSE notation. The OOSE tools have been replaced by tools supporting UML and RUP. and tools became superseded. as horizontal arrows. the messages exchanged between them. using objects. As one of the primary sources of the Unified Modeling Language (UML). The concepts in the conceptual model are mapped to concrete classes. the programming language and the chosen tools. The methodology part of OOSE has since evolved into the Rational Unified Process (RUP). to abstract interfaces in APIs and to roles that the objects take in various situations.OOSE has been largely replaced by the UML notation and by the RUP methodology. and. Concepts identified as unstable in object-oriented analysis will form basis for policy classes that make decisions. The tool Objectory was created by the team at Objectory AB to implement the OOSE methodology.

x Sequence Diagram with added support for modeling variations to the standard flow of events. either from the object itself. Solid arrows with full heads are synchronous calls. an X is drawn on top of the lifeline.x diagram on the right describes the sequences of messages of a (simple) Restaurant System. the Patron sends message 'pay' to the Cashier. Half arrows indicate asynchronous method calls.0 Sequence Diagram supports similar notation to the UML 1. This definition is true as of UML 2. In order to display interaction. Activation boxes. and the dashed line ceases to be drawn below it (this is not the case in the first example though). or method call boxes. These are horizontal arrows with the message name written above them. It should be the result of a message. and finally paying for the food.For instance.x. Objects calling methods on themselves use messages and add new activation boxes on top of any others to indicate a further level of processing. drinking wine then eating the food. . If the lifeline is that of an object. The UML 2. or another. the UML 1. considerably different from UML 1. When an object is destroyed (removed from memory). Note that leaving the instance name blank can represent anonymous and unnamed instances. it is underlined (if not it is a role). The dotted lines extending downwards indicate the timeline. A message sent from outside the diagram can be represented by a message originating from a filled-in circle. time flows from top to bottom. solid arrows with stick heads are asynchronous calls and dashed arrows with stick heads are return messages. The arrows represent messages (stimuli) from an actor or object to other objects. messages are used. For example. are opaque rectangles drawn on top of lifelines to represent that processes are being performed in response to the message. This diagram represents a Patron ordering food and wine.

Use case Visitor: Enter into site Go to Register Page Enter the user name Visitor Enter the email-id Click the submit Logout from the site Use case Administrator: Enter into database Administrator Send password and file to visitor Set time limit Create auto log file when user login .

Enter into email id Click on the link It opens window Visitor Enter password View the file Timer will starts File Deleted If time expires .