1. project ON
“Unique Identification Authority of India (UIDAI)”
“AadhaAr Card Registration System”
Submitted for an overview of the project proposal for fulfill the need of the degree
Of
“BACHELOR OF COMPUTER APPLICATION”
(2011-2014)
MAHATMA GANDHI KASHI VIDYAPITH
(VARANASI)
UNDER GUIDANCEOF: SUBMITTEDBY:
2. NILIMA MAURYA PRIYANKA SINGH (ROLL NO: 1201776)
(BCA DEPARTMENT) PRITI MISHRA (ROLLNO: 1201775)
Certificate
This is to certify thatMiss ………………………………………………………………
Of the BCA VI Semester Examination, 2011-2014 has completed this
comprehensive project report on topic
“………………………………………………………………………………………......................................”
As a partial fullfillment of degree of Bachelor of Computer Application of
Mahatma GandhiKashiVidhyaPeethvaranasi, under my supervision.
This mater embodied in this project is a genuine work done by the
student at has not submitted whether to this university or to any other university
or institute for the fulfillment of the requirementof any cause of study.
Date:…………………………… (Signature)
……………………………………
(Designation)
3. ACKNOWLEDGEMENT
Contrary to popular belief, that developing a project is not a solo activity. Many
people collaborate in developing it.
I am thankful to all of them for their help and encouragement in carrying out this
project. We express sincere thanks and gratitude from core of our heart towards,
Director of Sunbeam College for Women, Bhagwanpur, Varanasi. Without whose
guidance and inspiration this projectwill notbe possible.
We sincerely thanks to Mr.DayaShankar, HOD of Bachelor of Computer
Application (BCA) for his guidance and unfailing courtesy during the course of our
studies in College and our synopsiswork as well.
We take this opportunity to acknowledge their contribution to project. It is our
pleasure and privilege to express our deep sense of gratitude and thanks to our
guide Ms.Nilima Maurya, BCA faculty for her positive,supportive,inspiring and
illuminating guidance, untiring effort, timely help and constant encouragement
and making this projecta fruitfulsuccessfullearning experience.
I am thankful to my project partner Priti Mishra for their help and support in the
project and also I would like to thanks to all my classmates for their help and
support.
With immense joy and gratitude I raise my heart in praise and thanks giving to
Parents Almighty for his manifold graces and blessings showered on us all through
this study.
4. DATE……………………… NAME...................................
TABLE OF CONTENTS
1. INTRODUCTION
1.1 Objective
1.2 Definition
1.3 Uses
2. FEASIBILITY STUDY
2.1 Economic Feasibility
2.2 Technical Feasibility
2.3 Operational Feasibility
2.4 Legal Feasibility
2.5 Time Feasibility
3. TECHNOLOGY USED
3.1 Software Requirement
Front-End
Back-End
3.2 Hardware Requirement
4. SYSTEM DESIGN
4.1 Data Flow Diagram
5. 4.2 Entity-RelationShip Diagram
4.3 Modules
4.4 Database Design
5. CODING
6. SCREEN LAYOUTS
7. IMPLEMENTATION
8. CONCLUSION
9. FUTURE ENHANCEMENT
10. BIBLIOGRAPHY
Introduction
About UIDAI Background
Unique Identification project was initially conceived by the Planning commission
as an initiative that would provide identification for each resident across the
country and would be used primarily as the basis for efficient delivery of welfare
services. It would also out as a tool for effective monitoring of various programs
and schemes of the Government. This was set up under the Chairmanship of, Dr.
Arvind Virmani PrincipalAdvisor, and Planning Commission.
A “Strategic vision on the UIDAI Project” was prepared and submitted to this
committee by M/S Wipro Limited.
AadhaarCard Logo
6. PrimeMinister’sCouncil
Prime Minister’s Council on UIDAI Authority-Subsequently, on 02 July 2009, the
Government appointed Shri Nandan Mohan Nilekani as Chairman of the Unique
Identification Authority of India (UIDAI), in the rank and status of a Cabinet
Minister for an initial tenure of five years.
Mr.Nilekani has joined the UIDAI as its Chairman on 23 July 2009.The Prime
Minister’s Council of UIDAI Authority of India was set up on 30 July 2009.The first
meeting of the Prime Minister’s Council of UIDAI.
Authority took place on August 2009.
7. The salient decisionsinthePMsCouncilWEREasfollows:
Need for legislative framework
Broad Endorsement of the strategy
Budgetary support to partners
Setting Biometrics and Demographic Standards.
UIDAI Structure contours Approved.
Flexibility in Personnel and other issues.
Choose Deploy and Repatriate officers.
Government Accommodations Eligibility
Broad-banding of posts.
Hiring of professionals from Market
Setting up of Global Advisory Councils of P/Os
Interns & Sabbatical Global Procurement.
On 25 June 2009, the Cabinet also created and approved the position of the
Chairperson of the UIDAI, and appointed Mr.Nandan Nilekani as the first
Chairperson in the rank & status of a Cabinet Minister Mr. Ram Sewak
Sharma hasbeen appointed the Director General.
Head quarter’s Organization
The UIDAI is headquartered in Delhi with Shri Nandan Nilekani as the
Chairman and Shri Vijay S. Madan as the Director General and Mission
Director.
8. AboutAadhaarCard
Aadhaar is a 12 digit individual identification number issued by the UIDAI
identification number issued by the UIDAI on behalf of the Government of India.
This number will serve as a proof of identity and address, anywhere in India.
Each Aadhaar number will be unique to an individual on the basis of
demographic and biometric information and will remain valid for life. Aadhaar
number will help you provide access to service like banking, mobile, phone
connections & other Govt. and non-Govt services in due course.
Three KeyCharacteristics of AadhaAr Number are:
Permanency (Aadhaarno.remain sameduring lifetimeofa resident)
Uniqueness(oneresident hasone ID & two residentshave same ID)
Global (sameidentifiercanbe usedacross applicationanddomains)
Objective:-
Online UIDAI Aadhaar Registration System-is complete end to end solution to cover all
aspectsof online individualregistration process.
The basic Objective of developing this project is:-
Provide complete website solution, including individual person registration, providing
themAadhaarCard.CompleteWeb based administration.
An individualcan register and login into the systemany time.
An individual can get complete information of Aadhaar Card, its importance, they can
CheckAadhaarstatus,updateAadhaardata.
Individual will get unique identity due to its new technology i.e. biometric and
demographicfeatures.
Any Stateof person can register in their own statelanguages.
An individualcan search anything aboutUIDAI Aadhaarcard and itsregistration System.
They can contact and ask their queries if they have. They can also call on toll free
number.
DESCRIPTION
Aadhaar is the national identification number assigned to residents of India. It is auto-
generated random number, without any classification based on caste, creed, religion or
geography. It is a 12 digits unique identification number, which will be unique to an
individual and remains valid for life. Aadhaar will serve as a proof of identity and address,
across India.
9. Uses
Aadhaarwillbe used as identification proof for services like banking,ration card,
passport,mobilephoneconnectionsetc.
Services providewill no longerhaveto repeatedly performknow yourcustomer(KYC)
checks.
Aadhaarwillbe easily verified online in a cost-effectiveway.
Residentswill be enrolled with properverification of their demographic&biometric
information.This will help eliminate the large numberof duplicateand fakeidentities in
governmentand privatedatabases.
Aadhaarwillgive migrantsmobility of identity
Aadhaarwillfacilitate entry of poorand underprivileged residentsinto the formal
banking systemand theopportunity to availservicesprovided by the governmentand
the privatesector.
2. TECHNOLOGY USED
2.1 SOFTWARE REQUIREMENT
10. FRONT –END
1. JavaScript (JS) - JavaScript (JS) is an interpreted computer programming language. As part of
web browsers, implementations allow client-side scripts to interact with the user, control the browser,
communicate asynchronously, and alter the document content that is displayed. The key design
principles within JavaScript are taken from the self and Scheme programming languages. JavaScript is a
prototype-based scripting language with dynamic typing and has first-class functions. The application of
JavaScript to uses outside of web pages—for example, in PDF documents, site-specific browsers, and
desktop widgets—isalso significant.
It is a multi-paradigm language,supporting oriented,imperative,and functionalprogramming styles.
2. PHP (Hypertext Preprocessor)-PHP is a general-purpose scripting language that is
especially suited to server-side web development where PHP generally runs on a web server. PHP code is
interpreted by a web server with a PHP processor module, which generates the resulting web page: PHP
commands can be embedded directly into an HTML source document rather than calling an external file
to process data. It has also evolved to include a command-line interface capability and can be used in
standalone graphical applications. Any PHP code in a requested file is executed by the PHP runtime,
usually to create dynamicweb pagecontentordynamicimagesused on websitesorelsewhere.
3. HTML (Hyper text Markup Language)-HTML is the main markup language for creating
web pages and other information that can be displayed in a web browser. The purpose of a web browser
is to read HTML documents and compose them into visible or audible web pages. The browser does not
display the HTML tags, but uses the tags to interpret the content of the page. An HTML Application (HTA;
file extension ".hta") is a Microsoft Windows application that uses HTML and Dynamic HTML in a
browser to provide the application's graphical interface. A regular HTML file is confined to the security
model of the web browser's security, communicating only to web servers and manipulating only
webpageobjectsand sitecookies.
BACK-END
1. MySQL- MySQL, pronounced either "My S-Q-L" or "My Sequel," is an open source
relational database management system. It is based on the structure query language (SQL),
which is used for adding, removing, and modifying information in the database. Standard SQL
commands, such as ADD, DROP, INSERT, and UPDATE can be used with MySQL.
MySQL can be used for a variety of applications, but is most commonly found on Web servers. A
website that uses MySQL may include Web pages that access information from a database.
These pages are often referred to as "dynamic," meaning the content of each page is generated
from a database as the page loads. Websites that use dynamic Web pages are often referred to as
database-driven websites.
Many database-driven websites that use MySQL also use a Web scripting language like PHP to
access information from the database. MySQL commands can be incorporated into the PHP
code, allowing part or all of a Web page to be generated from database information. Because
11. both MySQL and PHP are both open source (meaning they are free to download and use), the
PHP/MySQL combination has become a popular choice for database-driven websites.
2.2 HARDWARE REQUIREMENT
TYPE
Work Station/Node
SOFTWARE
Windows XP,
MS Office
HARDWARE
1. RAM-256(minimum)/512(recommended)
MB
2. HDD-nGB depending upon the requirement
to storedata minimumof 25GB.
DatabaseServer 1. OS – Win 2003
Enterprise Server
2. SQL Server2005
1.HDD– Min 10 GB, Recommended 25 GB
2.RAM– Min 2 GB, Recommended 4GB
3.Processor- PentiumDualXenon Processor
Application Server 1. OS – Win 2003
Enterprise Server
2. IIS – Internet
Information
Server
1.HDD – Min 5 GB, Recommended 10 GB
2.RAM– Min 2 GB, Recommended 4GB
3.Processor- PentiumDualXenon Processor
12. FEASIBILITYSTUDY
A Feasibility study is carried out to select the best system that meets performance
requirements.The main aim of the feasibility study cativity is to determine whether it would be
financially and technically feasible to develop the product.The feasibility study activity involves
the analysis of the problem and collection of all relevant information relating to the product
such as the different data items which would be input to the system,the processing required to
the system,the processing required to be carried out on these data,the output data required to
be produced by the system as well as various constraints on the behaviour of the system.
Feasibility studies aim to objectively and rationally uncover the strengths and weakness of an
existing business or proposed venture,opportunities and threats present in the environment,the
resources required to carry through,and ultimately the prospects for success.In its simplest
terms,the two criteria to judge feasibility are cost required and value to be attained.
A well-designed feasibility study should provide a historical background of the business or
project,a description of the product or services,accounting statements,details of the operations
and management,marketing research and policies,financial data,legal requirements and tax
obligations.
A feasibility study evaluates the project’s potential for success;therefore,perceived objectivity is
an important factor in the credibility of the study for potential investers and lending institutions.
1.Technical Feasibility-This is concerned with specifying equipment and software that will
successfully satisfy the user requirement.The technical needs of the system may vary
considerably,but might include:
The facility to produce outputs in agiven time.
Response time under certain conditions.
Ability to process a certain volume of transaction at aparticular speed.
Facility to communication data to distant locations.
In examining technical feasibility,configuration of the system is given more importance than the
actual make of hardware.In our project we have used HTML for creating webpages, Javascript
for validation,PHP for making dynamic page and Database for connectivity.
2. Economic Feasibility-Economic analysis is the most frequently used technique for
evaluating the effectiveness of propose system.More commonly known as Cost/Benefits
analysis,the procedure is to determine the benefits and savings that are expected from a
proposed system and compare them with costs. If benefits outweigh costs, a decision is taken
to design and implement the system. Otherwise, further justification or alternative in the
13. proposed system will have to be made if it is to have a chance of being approved. This is an
outgoing effort that improves in accuracy at each phase of the system life cycle.
In my project we have created a website which is free of cost. Anyone can do registration of
aadhar card which is free of cost.
3.Operational Feasibility-Operational feasibility is a measure of how well a proposed
system solves the problems, and takes advantages of the opportunities identified during scope
definition and how it satisfies the requirements identified in the requirements analysis phase of
system development.
To ensure success, desired operational outcomes must be imported during design and
development. These include such design-dependent parameters such as
reliability,maintainability,supportability,usability,productability,sustainability,affor-dability and
others.
4.Legal Feasibility- Legal feasibility is a determination of whether the proposed project is
legal, i.e, it fulfill the requirement of acts or not. It determines whether the proposed system
conflicts with legal requirements, e.g. a data processing system must comply with the local Data
Protection Acts.
In our project we have explained about all the legal formalities which are required for the
registration of aadhar card.
5.Time Feasibility- A project will fail if it takes too long to be completed before it is useful.
Typically this means estimating how long the system will take to develop,and if it can be
completed in a given time period using some methods like payback period.Schedule feasibility is
a measure of how reasonable the project timetable is.
Our project will take minimum time to register and it will show aadhaar status.The people who
have already register are allow login to the form.
14. MODULES
UIDAI
(Unique Identification Authority of India) The authority will issue Aadhaar and set
standards for enrolment and authentication, to be universally followed. Initially,
UIDAI will design, develop and deploy the Aadhaar Application with the help of service
providers. Subsequently, the entire operation will be expanded and operated by an
external service providers. The UIDAI is also responsible for recruiting Registrars,
approving enrolment agencies and providing a list of introducers among others.
Registrars
These are public and private organizations that are currently engaged in providing
service to the residents and which operate on behalf of the UIDAI to provide UIDAI
services to their constitutions. Registrars may collect documentation such as proof of
resident and, proof of identity from residents and store the documents. Registrar may
also receive demographics data and photograph of the resident. Registrar may store
biometric data such as fingerprint, and iris image in a secure manner.
Sub-registrar
These are departments or entities that report to specific Registrar. For instance, the line
departments of the state government such as the Rural Development and Panchayat Raj
(RDPR) department would be sub-registrars to the state government Registrar.
Enrolment Agency
An Agency contracted by the Registrar, subject to certification by the UIDAI, to perform
their duties. Enrolment agencies provide operators and supervisors for the enrolment
stations on the fields, and also create the necessary conditions for the optical enrolment
of residents.
Enrolment agencies must collect demographic data prior to an enrolment drive. They
must notify residents and UIDAI, of the enrolment schedule in advance. Enrolment
agency may be empanelled by the UIDAI for the assistance of the Registrars. The
Registrars will be free to engage any other enrolment agencies se well.
15. Introducer
An introducer is a well known person authorized by the UIDAI or by a Registrar to
introduce individuals for enrolment. An introducer provides an assurance that the
individual applying for an Aadhaar is indeed a resident, and to the best of his/her
personal knowledge who they say they are.
Resident
A resident is defined as a natural person, usually residing in India. Residents are expected
to truthfully provide information and documentation to meet the KYR norms, or be
introduced by an introducer. They are expected to provide biometric information to the
UIDAI.
Authenticator
An Authenticator is an agency that uses the UIDAI System to authenticates a resident.
Authenticators may use demographic data and/or biometric data in addition to the
resident’s Aadhaar. Authenticators must register with the UIDAI and provide an
estimated usage. Authenticator must use the appropriate for Authentication that
provides him/her with the necessary assurance for the transaction.
16. IMPLEMENTATION
Implementation includes all those activies that takes place to convert from the old system to
the new one. The new system may be completely new, replacing an existing manual or
automated system or it may be major modification to an existing system.
Implementation is the part of the process where software engineers actually program the code
for the project. Software testing is an integral and important phase of the software
development process. This part of the process ensures that defects are recognized as soon as
possible.
In our project we created a Static homepage of UIDAI Aadhaar card in which we have given
an introduction of aadhaar card and briefly described about its features. We have also described
about the background of UIDAI. We have described about the uses of aadhar card its
importance. We have also given steps for the enrollment of aadhar card. We have also provided
the facility of checking the status of aadhar card. We have also explained about the use of
biometric aadhar card. We have designed the login form for the people who have already
registered and given the option for the individual to create new password if anyone has
forgotten the password.
We have given the search engine in our website so that anyone can search about the aadhar
card and get information related to aadhar card. We have created our website by the help of
17. html we have given all the entries in database table.We have given the database connectivity
and dynamic webpages with the help of php and javascript for validation.
CONCLUSION
In our project we have created a dynamic webpages. We have given all the details of the UIDAI
Aadhaar card. We can fill registration form only if we have already registered .If we have
registered then we can login by going to the login form and fill registration form/correction
form. If we have filled the registration form then we can check the status of Aadhaar.
At last we have generated an Aadhaar card which will be shown in our status form. We have
created a database table and used PHP for database connectivity. The details shown in
Aadhaar card is taken from the database.
18. FUTUREENHANCEMENT
In our project we have mentioned about the Biometric captures in Aadhaar card but we
haven’t implemented it in our project.The one of the important and new concept used in
Aadhaar card is the biometric capture used in it which make it different from other
cards.
We need Biometric devices to capture Biometric data of individuals.You can take
following data.
Facial image
Iris –both eyes
Fingerprints of all fingers
Left hand four finger slap
Right hand four finger slap
Capture of both the thumbs
19. Biometric capture provides an individuals a unique identity all over India and eliminate
from the data duplication and fake identities.
Through the process of Aadhaar authentication, the resident can authorize UIDAI to
release their KYC data to a service provider, either in person or online. Only upon
successful authentication of the resident, the UIDAI will provide the name of the
resident, address, date of birth, gender and photograph to the service provide.
“The UIDAI expects its e-KYC serviceto enhancecustomer
convenienceand greatly increasebusinessefficiency acrosssectors
that requireproof of identity and addressto open customer,
accounts,” said Vijay Shankar Madan,DG,and UIDAI.
We generate printout of Aadhaar Card with complete detail including photograph and
signature.
BIBLIOGRAPHY
WEBSITES
Following websites are referring to create this project reports.
http://www.google.com
http://www.uidai.gov.in
http://www.en.wikipedia.org/wiki/aadhar
http://www.aadharcarduid.com/aadhar-card-application-form
http://www.portal.uidai.gov.in
http://www.india.gov.in/update
http://www.myaadharcard.in
http://www.governancenow.com
20. http://www.iwwh.in/
http://www.w3schools.com
http://www.htmlgoodies.com
http://html.net/tutorials/javascript/lesson2.php
http://www.php.net/manual/en/reserved.variables.server.php
http://www.javascript.com/
http://www.cs.brown.edu/courses/bridge/1998/res/javascript/javascript-tutorial.html
http://www.learn-javascript-tutorial.com/
BOOKS
Following books and eBooks are used to complete this project reports.
HTML5 Black Book: Covers CSS3,Javascript,XML,XHTML,Ajax, PHP and Jquery
Learning PHP, Mysql, JavaScript and CSS by Robin Nixon
ResponsiveWeb Design withHTML5 and CSS3 (Community ExperienceDistilled)
PHP: The Complete Reference Steven Holzner (Author)
21.
22. DATAFLOWDIAGRAM
A Data Flow Diagram (DFD) is a graphical representation of the "flow" of data through an
information system, modeling its process aspects. Often they are a preliminary step used to
create an overview of the system which can later be elaborated. DFDs can also be used for the
visualization of data processing (structured design).
A DFD shows what kinds of information will be input to and output from the system, where the
data will come from and go to, and where the data will be stored. It does not show information
about the timing of processes, or information about whether processes will operate in sequence
or in parallel (which is shown on a flowchart).
Process: People, procedure or device that use or produced
data.The physicalcomponentisnotidentifies.
Dataflow: Data move in a specific direction from and origin to
a destination theformof a document.
Source or destination: External source or destinationsof
data interact with the system. The terms source and sink are
interchangeablewith origin and destination.
Data Store: Here data are store or referenced by a process in
the system.
Data Store: Data at Rest
23. ENTITYRELATIONSHIPDIAGRAM
An ER model is an abstract way of describing a database. In the case of a relational database, which
stores data in tables, some of the data in these tables point to data in other tables - for instance, your
entry in the database could point to several entries for each of the phone numbers that are yours. The ER
model would say that you are an entity, and each phone number is an entity, and the relationship
between you and the phone numbers is 'has a phone number'. Diagrams created to design these entities
and relationshipsarecalled entity–relationship diagramsorER diagrams.
Component of E-R Diagram:
Rectangle: It representsentity sets.
Ellipses: It representsattributessets
Diamonds: Itrepresentsrelationshipssets
Lines: It link attributeto entity set and entity set to relationship sets
24. STREET
NAME
HOST
ASA KEY API VERS
GENERATE
AADHAR CARD
HEIGHT
EYE COLOR
DATE OF EXPIRYSEX
DATE OF
BIRTH
NAME
CARD NUMBER
REQUEST
FOR
Key Attributes: An attribute that identifies an entity; an entity
identifier