You are on page 1of 19

AADHAAR SECURE TRAVEL IDENTITY

A Mini Project report Submitted in partial fulfillment of the requirement For the award of the degree of

BATCHELOR OF TECHNOLOGY IN COMPUTER SCIENCE & INFORMATION TECNOLOGY BY SYED SHOEB ULLAH HT.NO:- 08801A1251 KHURSHEED AHMED HT.NO:-08801A1260 MOHAMMED ABDUL SAUD HT.NO:-08801A1222
Under the esteemed guidance of

Mr. RAJU Asst.Prof.CSITDept.

DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY

ARKAY COLLEGE OF ENGINEERING & TECHNOLOGY (Approved by AICTE New Delhi, Affiliated to JNTU, Hyderabad) BODHAN (V), NIZAMABAD (D), 503180.
2010-2011

ARKAY COLLEGE OF ENGINEERING & TECHNOLOGY (Approved by AICTE New Delhi, Affiliated to JNTU, Hyderabad) BODHAN (V), NIZAMABAD (D), 503180.

DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY

CERTIFICATE
This is to certify that project entailed AADHAAR SECURE TRAVEL

IDENTITY submitted in partial fulfillment of the requirement for the degree in BATCHELOR OF TECHNOLOGY (CSIT), from JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY Hyderabad ,Andhra Pradesh is
record of bonafide work carried out by SYED SHOEB ULLAHHT.NO:08801A1251, KHURSHEED AHMEDHT.NO:-08801A1260 , MOHAMMED ABDUL SAUDHT.NO:-08801A1222 and the supervision and guidance of Mr. RAJU (Asst. Prof. CSIT Dept).

Internal Guide Mr.RAJUMs.Ambika(HOD) Asst. Prof. CSIT DeptDept of CSIT

Head of the Department

External Examiner

ACKNOWLEDGEMENT
With great pleasure I want to take this opportunity to express my heartfelt gratitude to all the people who helped in making this project work a grand success. I am grateful to my project guide Mr. RAJU sir for his constant guidance throughout our project work. I would like to thank Ms.AMBIKAmadam , Head of the

Department of CSIT, of being moral support throughout the period of


our study in ARKAY COLLEGE. First of all I am highly indebted to Principal, Mr.HAFEEZ UDDIN sir, for giving me the permission to carry out this project. I would like to thank the Teaching & Non - teaching staff of CSIT Department for sharing their knowledge with me. I would like to express my special thanks to my parents and friends for giving their co-operation and support

SYED SHOEB ULLAH HT.NO:- 08801A1251 KHURSHEED AHMED HT.NO:-08801A1260 MOHAMMED ABDUL SAUD HT.NO:-08801A1222

ABSTRACT

AADHAAR SECURE TRAVEL IDENTITY

Aim:

To create a Tool that manages the handling of passport and license using the unique identification associated with each individual.

Objective:

y y y y

Associate each citizen with a unique identification (UID) & pin. Provide passport less access at the airport by providing only the UID & pin. Allow crime department to communicate with the airport authority. License Application, Process and Issue of License.

Scope:
y y y y y y y y y

Citizen Registration Secure passport application Passport application verification by the police authority. Passport Issue & Denial Provide crime department to integrate with the airport to stop someone from flying. Apply for License. Provide Test details and scenario. Provide result. Issue or deny License.

(1)

Action Plan: The application deals with allowing the citizens to register for a unique identity. The ID is supported with a pin. Citizen s being issued passport or those have a passport is then associated with the UID. This helps the citizen to travel abroad without having the passport. The UID will provide access to the passport from the airport for the airline from the centralized server. The details and profile of the citizen with the photo can be viewed as part of security check. The crime department can also use the application to trace or s top any person from travelling abroad. The airline gets a notification when the airport staff has access to the citizen s passport. The crime department can stop or trace either using the UID or passport number. They could also pass the name of the person and the system can generate a list of photo previews of people having a passport.

The citizen uses the aadhaar scheme to apply for license. The details of the citizen are picked from the registration database. The citizen is provided with the test details by the application. The details contain the location, date and time information. The test details are provided to the citizen on completion of the test. The license issual and denial is recorded.

(2)

LIST OF TABLES
Fields_Name Data Types

Admin Uname Pword Text Text

Apply_Aadhar Apply_Id Civilian_Id Adate Idate Status ANO Number Number Date/Time Date/Time Text Number

Apply_Lisence Apply_ID AADHAR_ID ADATE Idate Status LNO ExpDate Number Text Date/Time Date/Time Text Number Date/Time

Apply_Passport Apply_ID AADHAR_ID Adate Idate Status PNO ExpDate Number Text Date/Time Date/Time Text Number Date/Time

(3)

Booking Aadhar_Id Source Destination Booked_Date Journey_Date Fcode Fare Seat_No Agency_ID Text Text Text Date/Time Date/Time Text Currency Number Number

Civilians Civilian_ID Cname Fname Gender Address DOB Qualification Contacts Email Uname Pword Rdate AADHAR_ID PPNO LISENCE_NO Photo Number Text Text Text Memo Date/Time Text Text Text Text Text Date/Time Text Text Text Text

Flights FCODE Source Destination Dept_Time Arrival_Time Fare AirLines Text Text Text Date/Time Date/Time Currency Text

(4)

Chapter 1 INTRODUCTION

(5)

INTRODUCTION The application implements a systematic approach to handle the services to the citizens in a more appropriate manner which also includes the tracing of their usage. The application that is proposed is intended for the citizens to avail the available services, government sectors to provide the necessary services, provided the citizen is registered and is issued with a UID card or number. It is also intended for investigation teams to track the information of the citizen to check his availed services and their authorization

Purpose The application implements a systematic approach to handle the services to the citizens in a more appropriate manner which also includes the tracing of their usage. Intended Audience And Reading Suggestions The application that is proposed is intended for the citizens to avail the available services, government sectors to provide the necessary services, provided the citizen is registered and is issued with a UID card or number. It is also intended for investigation teams to track the information of the citizen to check his availed services and their authorization. Product Scope The application uses the concepts of JAVA like JavaScript, JSP, Servlets and beans to handle the business logic methods and JDBC connectivity. The application is designed using JSP working under multitier architecture. The features of JSP are
y

The code that is designed is placed under the server system and hence the client cannot reach it from the remote systems(i.e. the code is secure).

The client can only invoke the application through the browser element and hence cannot even change the part of code of the executing web page.

y y

Since the client doesnt require any additional softwares client maintenance is zero. Since the application is placed only in server system it becomes easy for up gradations.(in future).

y It is easy to install JAVA and Tomcat as they are environment independent( LINUX,
XP, win 2000 etc).

(6)

1.1 Motivation Motivation is to implement the multitasking identity module to pupil to access multiple resources all at a time from one single destination source. The central authority maintains the register of the departments (service provider) to which the clients can send request for approval and acceptance. The respective department can view the citizen information before granting the services. The AADHAAR id which is provided by the civilian can be used to trace his information. The passport helps in booking the required travel schedules by the respective departments which is available at online which helps the users get through the enquiry at airport. The citizen need not carry the physical passport as the same data is available through the application. Citizen need to avail the license, may send a request to the respec tive authority by using AADHAAR id which is available with him, which on verification, a license can be issued and can be verified by investigation authority. Similarly, a request can be sent to departments of electricity and communication to avail the electrical and telephone connection (in multiple if required ) under single AADHAAR id.

1.2 Problem Definition As the users are having different identity modules for most of the application and for each process to execute they require a personal identification number as password, so for different processes they have different identities. Our main aim is considered towards this duplication or multiple identities for a single user . As the applications are graphical and work with data of text format for inputs and outputs, the user need to be supported with the general system interfaces like keyboard, to provide the input data, mouse to handle the events, monitor to view the outputs and printer devices are re quired. As the application is web-oriented, it is to be deployed under the server system that provides security and publish it in the network. The client resides at the remote area invoking the web pages through the browser unit. The administrator is soul responsible for the server maintenance

1.3 Objective of Project y y y y y y Associate each citizen with a unique identification (UID) & pin. Provide passport less access at the airport by providing only the UID & pin. Allow crime department to communicate with the airport authority. License Application, Process and Issue of License . The performance of application depends on type of network or connectivity i.e present between server and the client. It also depends on the traffic of the users that are currently worki ng on the site of instance.

(7)

In this module, you will learn What is UID (Unique Identification) number/Aadha ar The goals of Unique Identification Authority of India (UIDAI) The information related to a person, which can be obtained from official records like name, 0000000address, date of birth and so on, are referred to as Demographic information. It is the information related to nationality, age, education, religion, employment status, and so on. Demographic information is typically collected while filling application forms for passport, ration card, school admission, etc. 1.4 Limitations of the project

1.5 Organization of documentation

(8)

CHAPTER 2 LITERATURE SURVEY

(9)

2 .LITERATURE SURVEY 2.1 Introduction


Java Database Connectivity(JDBC) is a front-end tool for connecting to a server to ODBC in that respect, However JDBC can connect only Java clients and it uses ODBC for the connectivity. JDBC is essentially a low-level application programming interface. It is called a low-level API since any data manipulation, storage and retrieval has to be done by the program itself. Some tools which provide a higher -level abstraction or expected shortly. The next question that needs to be answered is why we need JDBC, once we have ODBC on hand. We can use the same ODBC to connect the entire database and ODBC is a proven technology. Problem for doing this is ODBC gives a C language API, which uses pointers extensively. Since Java does not have any pointers and is object-oriented sun Microsystems, inventor of Java developed to suit its needs. Access is a database management system. Databases are an important part of everyday use. We use them anywhere we use computers, at home, and in the fields of medicine, education, law, business, engineering and government. A database is a collection of data and facts that are related to a particular object or purpose, such as tracking customer orders or maintaining a music collection. If your database is not stored on a computer, or only parts of it are on the computer, you may be tracking information from a variety of sources that you have to coordinate and organize yourself. In Access, the heart of the database is the Table. One or more tables comprise a database. In addition to tables, a database can contain other objects such as queries, reports, forms and other components. These objects allow you to view and manipulate the data contained in the database in variety of ways.

2.2Existing System

The citizen is identified by multiple identity cards. There is no unique identity in India. Passport has to be carried for travel abroad. Crime department cannot talk to the pvt airlines to trace or stop travel of a citizen instantly .

(10)

In the existing system we are concerned about the long term procedures of multiple access but validated to multiple identities In the current scenario each citizen is provided with all identity cards for each services to avail the same by the user. As the services are not integrated, to a single control, it locks monitoring giving rise to misuse of identity cards. A single user can avail multiple cards of the same service ( not in duplicate ) where a single identity is required. Ex: Single person can avail multiple voter ids, ration cards from multiple areas. This increases burden on issuing authority. It also makes it complicated to trace the identity of the civilian. 1.TECHNICAL FEASIBILITY: Keeping in mind existing system network, s/w & H/w, already available the audit application generated in .NET provides an executable file that requires MSIL that provides compatibility from windows98 without having to load .NET software. No additional h ardware or software is required which makes smart audit technically feasible. 2.OPERATIONAL FEASIBILITY: The application smart audit does not require additional manual involvement or labor towards maintenance of the system. Cost for training is minimized d ue to the user friendliness of the developed application. Recurring expenditures on consumables and materials are minimized. 3.ECONOMIC FEASIBILITY: The system is economically feasible keeping in mind:

 Lesser investment towards training.  One time investment towards development.  Minimizing recurring expenditure towards training, facilities offered and consumables  The system as a whole is economically feasible over a period of time.  The enhancement towards the implementation of the training task is e xagerated

(11)

2.3 Disadvantages of existing system y y y Single person can avail multiple voter ids, ration cards increasing burden on issuing authority Lack of tracking of multiple issued cards Services are individual functioning entities as they are not integrated

2.4 Proposed system

y y y y

proposed architecture the civilian is suggested to register himself to a central authority where a unique identity is provided to the user All the public services are handled by the central authority making it easy to track the availed citizens list Each citizen is given with a unique id that is to be submitted for availing the respective services A digital copy of issued service is given to citizen which resembles his uniqueness for that service

Advantages y y y y Associate each citizen with a unique identification (UID) & Pin It provides passport less access to airport by providing only the UID & Pin The citizen can purchase vehicle using his license (digital) by providing his identity of uniqueness Also allows crime department to communicate with the different authorities

(12)

CHAPTER 3 ANALYSIS

(13)

3.ANALYSIS
3.1 Introduction The Unique Identification number (Aadhaar) was conceived by the Indian government as a means for residents to clearly and uniquely verify their id entity anywhere in the country. The mandate for the UIDAI includes defining the usage of the number across critical applications and services1. The Public Distribution System is one such application, and the UIDAI has accordingly laid out the potential rol e Aadhaar can play within the PDS. The UIDAI recognizes that implementing the Right to Food is a priority today for the Indian government. The functioning of the PDS the mainstay of India s food programs is critical to the implementation of Right to Fo od in India, and is the focus of this note. The Aadhaar linked mechanisms that are outlined here however, can be adapted to other programs at a later date. Aadhaar is best translated to mean a foundation , and the number would play precisely this role in the PDS. The number would be a foundation, over which the government can build more effective PDS processes, and ensure that the program helps fulfill the broad and admirable vision of India s proposed national food security act. Perhaps the greatest value of Aadhaar for the PDS stems from how it can be easily integrated into the existing infrastructure. Aadhaar presents governments with a highly flexible solution states can choose to implement Aadhaar within the PDS in stages, beginning with Aadhaar based identification, and progressing towards Aadhaar -based authentication and an Aadhaar-enabled Management Information System (MIS). The eventual nature of an Aadhaar-linked approach in PDS would depend on the particular benefits the government hopes to gain. Using Aadhaar solely for identification would enable clear targeting of PDS beneficiaries, the inclusion of marginal groups, and expanded coverage of the poor through the elimination of fakes and duplicates. Implementing Aadhaar -based authentication across PDS would enable the government to guarantee food delivery to the poor. In addition to powerfully streamlining PDS processes, an Aadhaar -enabled MIS would make possible a more transparent, flexible system, and enable the government to fulfill the object ive of food security in times of crises. Aadhaar would thus be a tool albeit, a powerful one in fulfilling. 3.2 Software requirement specifications TECHNICAL ARCHITECTURE The major software requirements are listed in this phase of documentation where the basic requirements are listed

Software Requirement
Operating System Language Front End Web Server

: : : :

Any Graphical User Interface J2EE JSP, Beans & Servlets Tomcat

(14)

Internal line connection

3.2.2 Software Requirements y y y y Operating System : WINDOWS 2000 or higher Language Specification : JAVA (JSP & JDBC) Web Server :Tomcat Database Specification : Ms-Access/Sql

3.2.3 Hardware requirements y y y Processor : RAM : Hard Disk : P4 or Higher 512 Mb 8Gb

As the application is deployed in the server machine and the users or clients are at remote areas, there needs to exist an hardware interface connecting the server and the client. Hence they require hardware interface containing cables, hubs, switches, etc to put all the users under a single network.

(15)

THE THREE TIER ARCHITECTURE FIGURE