SlideShare a Scribd company logo
1 of 6
Download to read offline
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 1 | P a g e Copyright@IDL-2017
Automated E-Pin Generator in Banking
Sector
Mrs. Kavya N 1
, Mr. Girish 2
Department of Information Science & Engineering
1 MTech, Student - NIE, Mysuru, India
2 Guide & Associate Professor - NIE, Mysuru, India
Abstract: For the purpose of saving and
securing money, to get loans, employers to get
wages, to pay bill online, etc., every human
being require a bank account. Either it can be
savings account or checking account, each one
has its own functionalities. In earlier days the
person needs to go for bank for account opening
or any other transactions, but now through
online any functionality can be handled. If a
user can able to access the privileges of bank he
must have an account. So the initial step of
banking is account opening. To open an account
in any bank it undergoes several steps. First the
user walk in to any bank or he can visit to any
bank website then he needs pick up an account
opening application and then has to fill his valid
personal details in the application, mention the
type of account he is going to open and finally
provide nominee for his account. After all these
process a unique account number is provided to
user in a couple of days. Our project is
implemented based on the banking system
which is going to resolve the delay in providing
an account number by the bank that takes a
couple of days to process. To avoid this delay we
are implementing a banking application that
will process the user application day by day with
a short period of time the user will get his bank
account number more efficiently.
INTRODUCTION
The old manual process in banking is not sufficient
for remote application, we are finding technology
to reduce man work and paper to creating personal
account through online with credential verification
done by banking. Here we are applying Identity-
Based Encryption dramatically simplifies the
process of securing sensitive communications, this
encryption securely generate key according to user
or register mail id. A trusted third party, called the
Private Key Generator (PKG), generates the
corresponding private keys. To operate, the PKG
first publishes a master public key, and retains the
corresponding master private key (referred to as
master key). Given the master public key, any party
can compute a public key corresponding to the
identity ID by combining the master public key
with the identity value. To obtain a corresponding
private key, the party authorized to use the identity
ID contacts the PKG, which uses the master private
key to generate the private key for identity ID.
Users encrypt messages (or verify
signatures) with no prior distribution of keys
between individual participants. This is extremely
useful in cases where pre-distribution of
authenticated keys is inconvenient or infeasible due
to technical restraints. However, to decrypt or sign
messages, the authorized user must obtain the
appropriate private key from the PKG. A caveat of
this approach is that the PKG must be highly
trusted, as it is capable of generating any user's
private key and may therefore decrypt (or sign)
messages without authorization. Because any user's
private key can be generated through the use of the
third party's secret, this system has inherent key
escrow. A number of variant systems have been
proposed which remove the escrow including
certificate-based encryption, secure key issuing
cryptography and certificate less cryptography.
One of the major advantages of any
identity-based encryption scheme is that if there are
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 2 | P a g e Copyright@IDL-2017
only a finite number of users, after all users have
been issued with keys the third party's secret can be
destroyed. This can take place because this system
assumes that, once issued; keys are always valid (as
this basic system lacks a method of key
revocation). The majority of derivatives of this
system which have key revocation lose this
advantage.
OBJECTIVES
One of the major advantages of any identity-based
encryption scheme is that if there are only a finite
number of users, after all users have been issued
with keys the third party's secret can be destroyed.
This can take place because this system assumes
that, once issued; keys are always valid (as this
basic system lacks a method of key revocation).
The majority of derivatives of this system which
have key revocation lose this advantage.
Currently if any person needs to create
bank account, he has to enroll in the bank/internet,
details will be verified and then account will be
created. After account creation the PIN and Internet
Banking credentials will be shared through post,
which will take couple of days. In our project we
are introducing automated banking where user can
fill form online to create account. Once in a day
(usually end of the day) concerned officer will
verify the details provided by the user. Once
verification is done, the automated system will
send E-Pin to the registered user through mail
using IBE algorithm which is safe and user will be
happy as the account is created and all the
credentials are shared on the same day. IBE-
Identity based Encryption uses identity as the key
for encryption, in our case we can use email-Id as
the identity and extra safety measures can be taken
by having OTP through registered mobile etc.
which will increase the security of the system.
. A number of variant systems have been
proposed which remove the escrow including
certificate-based encryption, secure key issuing
cryptography and certificate less cryptography.
One of the major advantages of any identity-based
encryption scheme is that if there are only a finite
number of users, after all users have been issued
with keys the third party secret can be destroyed.
Moreover, as public keys are derived from
identifiers, IBE eliminates the need for a public key
distribution infrastructure. The authenticity of the
public keys is guaranteed implicitly as long as the
transport of the private keys to the corresponding
user is kept secure (Authenticity, Integrity,
Confidentiality).
Automatic mail authentication is highly
recommended for every mail sender to ensure that
your messages are correctly classified.
Authentication by itself is not enough to guarantee
your messages can be delivered, as spammers can
also authenticate mail. Gmail combines user reports
and other signals, with authentication information,
when classifying messages. Similarly, the fact that
a message is unauthenticated isn‟t enough to
classify it as spam, because some senders don‟t
authenticate their mail or because authentication
breaks in some cases.
Our project introducing secured key
generation based on email authentication, you can
use authentication data to verify the source of any
message that you receive. First, the user or new
register person register his information throw bank
website, the registration website requires some
mandatory information throw registered side. After
user registration data will stored successfully into
bank data bases. Here we are used open source
mysql database for storing user information. After
registration Google mail server verified mail and
send message to user mail. This process is
automatically done throw banking side. After new
user registration manager or bank employee may
look all new user profile for verification. Manager
or respected bank employee verified by credential
or information and he may provide access for
successful registration or he may reject the form by
finding faults.
Second the respected bank person finally
verified and approved for new request. Here he
follow..
1. Approved ( If user request can be verified
successfully )
2. Pending ( Still require permission to
approved by higher authorized person in bank)
3. Reject ( Request rejected by invalid
information )
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 3 | P a g e Copyright@IDL-2017
In approved stage, user request is valid
and employee successfully verified by authorized
employee, this stage only activated when all
information from user side can be only valid.
Mainly this stage generate two different key one is
„Public Key‟ and „Private Key‟, Private key
generate by authorization person using identity
based encryption, Private Key generated by new
user mail id using identity based encryption.
Algorithm Used:
Step 1: Public Key Generation PuKG(name,
rand(K))
Step 2: Select Random R(PKG), Calculate a
set(PKG, R)
Step 3: Private Key Generation PrKG(mail id)
Calculate a set int key=(read char(mail))
Concate( key, char mail id ), Continue Step 3 till
end of mail id character
Step 4: Generate Secrete key(PuKG, PrKG)
In pending stage, if bank employee need
higher level authorized person permission to
approver request, he can put new request to
pending stage, after pending stage this request
information sent to higher level for approved new
registration process. After this process again back
to approve stage for verification.
In rejection stage, if new user data is
invalid or he may not specified valid information
then only the respected bank person can be able to
reject this new request. The bank employee may
specify comments for rejecting application, this
comments will transfer to new user mail. If bank
employee needs more information from new user
or he can mention valid data from new user throw
mail only.
METHODOLOGY
System Design:
Design is a creative process; a good design is the
key to effective system. The system “Design” is
defined as “The process of applying various
techniques and principles for the purpose of
defining a process or a system in sufficient detail to
permit its physical realization”. Various design
features are followed to develop the system. The
design specification describes the features of the
system, the components or elements of the system
and their appearance to end-users.
4.1 Fundamental Design Concepts
A set of fundamental design concepts has evolved
over the past three decades. Although the degree of
interest in each concept has varied over the years,
each has stood the test of time. Each provides the
software designer with a foundation from which
more sophisticated design methods can be applied.
The fundamental design concepts provide the
necessary framework for “getting it right”. The
fundamental design concepts such as abstraction,
refinement, modularity, software architecture,
control hierarchy, structural partitioning, data
structure, software procedure and information
hiding are applied in this project to getting it right
as per the specification.
4.1.1 Input Design
The input Design is the process of converting the
user-oriented inputs in to the computer based
format. The goal of designing input data is to make
the automation as easy and free from errors as
possible. Providing a good input design for the
application easy data input and selection features
are adopted. The input design requirements such as
user friendliness, consistent format and interactive
dialogue for giving the right message and help for
the user at right time are also considered for the
development of the project. Input design is a part of
overall system design, which requires very careful
attention. Often the collection of input data is the
most expensive part of the system, which needs to
be route through number of modules. It is the point
where the user ready to send the data to the
destination machine along with known IP address;
if the IP address is unknown then it may prone to
error.
4.1.2 Output Design
A quality output is one, which meets the
requirements of the end user and presents the
information clearly. In any system results of
processing are communicated to the users and to
other systems through outputs. It is most important
and direct source information to the user. Efficient
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 4 | P a g e Copyright@IDL-2017
and intelligent output improves the systems
relationship with source and destination machine.
Outputs from computers are required primarily to
get same packet that the user has send instead of
corrupted packet and spoofed packets. They are
also used to provide to permanent copy of these
results for later consultation.
4.2 System Architecture:
Figure : System Architecture
Our proposed work is based on banking
application. While a customer wants to open an
account in any bank, he has to follow some
fundamental rules of each bank. Our application
represents easy way of opening an customer
account and provide unique account number in
short period of time.
IMPLEMENTATION
The implementation stage requires the following
tasks.
• Careful planning.
• Investigation of system and constraints.
• Design of methods to achieve the
changeover.
• Evaluation of the changeover method.
• Correct decisions regarding selection of
the platform
• Appropriate selection of the language for
application development
Implementation phase should perfectly
map the design document in a suitable
programming language in order to achieve the
necessary final and correct product. Often the
product contains flaws and gets ruined due to
incorrect programming language chosen for
implementation. In this project for implementation
purpose Java is chosen as the programming
language.
RESULTS
The following snapshots define the results or
outputs that will get in this project after step by
step execution of all the modules of the system.
Figure : New user registration Form
To enroll an account in any bank user has to fill an
application form by writing on paper or by online
providing valid details about him. The above figure
shoes our application registration form for new
user. When he provides valid details, the
registration request send to bank employee for
verification of information provided by the new
user.
Figure : Form for user to view the process done
by bank Employee
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 5 | P a g e Copyright@IDL-2017
The advantage of the application is the
user can able to view the process happening in the
bank related to his bank account opening. The
above figure shows the user view of the
application.
CONCLUSION
We are concluding in our project, we are
introducing automated banking where user can fill
form online to create account. Once in a day
concerned officer will verify the details provided
by the user. Once verification is done, the
automated system will send E-Pin to the registered
user through mail using IBE algorithm which is
safe and user will be happy as the account is
created and all the credentials are shared on the
same day. IBE-Identity based Encryption uses
identity as the key for encryption, in our case we
can use email-Id as the identity and extra safety
measures can be taken by having OTP through
registered mobile/mail etc. which will increase the
security of the system.
REFERENCES
[1] Peng Xu; Tengfei Jiao; Qianhong Wu; Wei
Wang; Hai Jin “Conditional Identity-Based
Broadcast Proxy Re-Encryption and Its Application
to Cloud Email” IEEE Transactions on Computers,
Year: 2016.
[2] XiaoFang Huang; Qi Tao; BaoDong Qin;
ZhiQin Liu “Multi-Authority Attribute Based
Encryption Scheme with Revocation” - 24th
International Conference on Computer
Communication and Networks (ICCCN) Year:
2015.
[3] Zi-Yik Cheah; Yik-Shu Lee; Thong-Yun The;
Ji-Jian “Simulation of a pairing-based identity-
based identification scheme in IOS” IEEE
International Conference on computer Applications
(ICSIPA) Year: 2015.
[4] Fuchun Guo; Willy Susilo; Duncan Wong;
Vijay Varadharajan “Optimized Identity-Based
Encryption” Transactions on Dependable and
Secure Computing year: 2015, Volume: PP, Issue:
99, Year: 2015.
[5] Zheng Yan; Xueyun Li; Mingjun Wang;
Athanasios Vasilakos “Flexible Data Access
Control based on Trust and Reputation in Cloud
Computing” IEEE Transactions on Cloud
Computing Year: 2014.
[6] Hasan Kadhem; “A novel authentication
scheme based on pre-authentication service
Security and Cryptography (SECRYPT)”, 2013
International Conference on computer application,
Year: 2013
[7] Xiangyang Jiang; Jie Ling; “Simple and
effective one-time password authentication scheme
Instrumentation and Measurement, Sensor Network
and Automation (IMSNA)”, 2nd International
Symposium, Year: 2012
[8] Tan, S. Y., Heng, S. H., Goi, B. M., Chin, J. J.,
Moon, S., "Java Implementation for Identity-Based
Identification", International Journal of Cryptology
Research, 2009, pp.21-32,1(1).
[9] Heng, S. H., Chin, J. J., , "A k-Resilient
Identity-Based Identification Scheme in the
Standard Model",International Journal of
Cryptology Research, 2010, pp.15-25,2(1).
[10] Tan, S. Y., Chin, J. J., Heng, S. H. and Goi, B.
M., "An Improved Efficient Provable Secure
Identity-Based Identification Scheme in the
Standard Model", KSII TRANSACTIONS ON
INTERNET AND INFORMATION SYSTEMS,
April, 2013, pp.910-922,7(4).
[11] Chin, J. J. and Heng, S. H., "Security Upgrade
for a k-Resilient Identity-Based Identification
Scheme in the Standard Model", Malaysian
Journal of Mathematical Sciences, March,
2013,pp.73-85,7(S).
[12] Tea, B. C., Ariffin, M. R. K. and Chin, J. J.,
"An Efficient Identification Scheme in Standard
Model Based on the Diophantine Equation Hard
Problem", Malaysian Journal of Mathematical
Sciences, August, 2013, pp.87-100,7(S).
[13] Chin, J. J., Tan, S. Y., Kam, Y. H. S. and
Leong, C., "Implementation of Identity-Based and
Certificateless Identification Schemes on Android
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 6 | P a g e Copyright@IDL-2017
Platform", Cryptology 2014, 24-26 June, 2014, The Everly, Putrajaya, Malaysia, 57-64,4.

More Related Content

What's hot

Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
 
Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared ImagesIRJET Journal
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
 
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONIJNSA Journal
 
Digital Locker Requester Api Specification v1 0
Digital Locker Requester Api Specification v1 0Digital Locker Requester Api Specification v1 0
Digital Locker Requester Api Specification v1 0DigiLocker
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPijtsrd
 
Computer Security Test
Computer Security TestComputer Security Test
Computer Security Testkhant14
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuiritySarath K
 
Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3DigiLocker
 
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Techsylvania
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificateAshvini Soni
 
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4DigiLocker
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsShakas Technologies
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure ProtocolVlad Petre
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingIRJET Journal
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Synacts
 

What's hot (20)

Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared Images
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
325 330
325 330325 330
325 330
 
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
 
Digital Locker Requester Api Specification v1 0
Digital Locker Requester Api Specification v1 0Digital Locker Requester Api Specification v1 0
Digital Locker Requester Api Specification v1 0
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTP
 
Computer Security Test
Computer Security TestComputer Security Test
Computer Security Test
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 
Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3
 
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4
 
C045016020
C045016020C045016020
C045016020
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 

Similar to Automated E-Pin Generator in Banking Sector

Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET Journal
 
Providing security to online banking Project Presentation-3.pptx
Providing security to online banking Project Presentation-3.pptxProviding security to online banking Project Presentation-3.pptx
Providing security to online banking Project Presentation-3.pptxSanviSanvi11
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsBayalagmaa Davaanyam
 
A Novel Approach for E-Payment Using Virtual Password System
A Novel Approach for E-Payment Using Virtual Password SystemA Novel Approach for E-Payment Using Virtual Password System
A Novel Approach for E-Payment Using Virtual Password Systemijcisjournal
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingPvrtechnologies Nellore
 
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...IJNSA Journal
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONJournal For Research
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPIRJET Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 

Similar to Automated E-Pin Generator in Banking Sector (20)

Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
 
Providing security to online banking Project Presentation-3.pptx
Providing security to online banking Project Presentation-3.pptxProviding security to online banking Project Presentation-3.pptx
Providing security to online banking Project Presentation-3.pptx
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
 
A Novel Approach for E-Payment Using Virtual Password System
A Novel Approach for E-Payment Using Virtual Password SystemA Novel Approach for E-Payment Using Virtual Password System
A Novel Approach for E-Payment Using Virtual Password System
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
120 i143
120 i143120 i143
120 i143
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 

Automated E-Pin Generator in Banking Sector

  • 1. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 1 | P a g e Copyright@IDL-2017 Automated E-Pin Generator in Banking Sector Mrs. Kavya N 1 , Mr. Girish 2 Department of Information Science & Engineering 1 MTech, Student - NIE, Mysuru, India 2 Guide & Associate Professor - NIE, Mysuru, India Abstract: For the purpose of saving and securing money, to get loans, employers to get wages, to pay bill online, etc., every human being require a bank account. Either it can be savings account or checking account, each one has its own functionalities. In earlier days the person needs to go for bank for account opening or any other transactions, but now through online any functionality can be handled. If a user can able to access the privileges of bank he must have an account. So the initial step of banking is account opening. To open an account in any bank it undergoes several steps. First the user walk in to any bank or he can visit to any bank website then he needs pick up an account opening application and then has to fill his valid personal details in the application, mention the type of account he is going to open and finally provide nominee for his account. After all these process a unique account number is provided to user in a couple of days. Our project is implemented based on the banking system which is going to resolve the delay in providing an account number by the bank that takes a couple of days to process. To avoid this delay we are implementing a banking application that will process the user application day by day with a short period of time the user will get his bank account number more efficiently. INTRODUCTION The old manual process in banking is not sufficient for remote application, we are finding technology to reduce man work and paper to creating personal account through online with credential verification done by banking. Here we are applying Identity- Based Encryption dramatically simplifies the process of securing sensitive communications, this encryption securely generate key according to user or register mail id. A trusted third party, called the Private Key Generator (PKG), generates the corresponding private keys. To operate, the PKG first publishes a master public key, and retains the corresponding master private key (referred to as master key). Given the master public key, any party can compute a public key corresponding to the identity ID by combining the master public key with the identity value. To obtain a corresponding private key, the party authorized to use the identity ID contacts the PKG, which uses the master private key to generate the private key for identity ID. Users encrypt messages (or verify signatures) with no prior distribution of keys between individual participants. This is extremely useful in cases where pre-distribution of authenticated keys is inconvenient or infeasible due to technical restraints. However, to decrypt or sign messages, the authorized user must obtain the appropriate private key from the PKG. A caveat of this approach is that the PKG must be highly trusted, as it is capable of generating any user's private key and may therefore decrypt (or sign) messages without authorization. Because any user's private key can be generated through the use of the third party's secret, this system has inherent key escrow. A number of variant systems have been proposed which remove the escrow including certificate-based encryption, secure key issuing cryptography and certificate less cryptography. One of the major advantages of any identity-based encryption scheme is that if there are
  • 2. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 2 | P a g e Copyright@IDL-2017 only a finite number of users, after all users have been issued with keys the third party's secret can be destroyed. This can take place because this system assumes that, once issued; keys are always valid (as this basic system lacks a method of key revocation). The majority of derivatives of this system which have key revocation lose this advantage. OBJECTIVES One of the major advantages of any identity-based encryption scheme is that if there are only a finite number of users, after all users have been issued with keys the third party's secret can be destroyed. This can take place because this system assumes that, once issued; keys are always valid (as this basic system lacks a method of key revocation). The majority of derivatives of this system which have key revocation lose this advantage. Currently if any person needs to create bank account, he has to enroll in the bank/internet, details will be verified and then account will be created. After account creation the PIN and Internet Banking credentials will be shared through post, which will take couple of days. In our project we are introducing automated banking where user can fill form online to create account. Once in a day (usually end of the day) concerned officer will verify the details provided by the user. Once verification is done, the automated system will send E-Pin to the registered user through mail using IBE algorithm which is safe and user will be happy as the account is created and all the credentials are shared on the same day. IBE- Identity based Encryption uses identity as the key for encryption, in our case we can use email-Id as the identity and extra safety measures can be taken by having OTP through registered mobile etc. which will increase the security of the system. . A number of variant systems have been proposed which remove the escrow including certificate-based encryption, secure key issuing cryptography and certificate less cryptography. One of the major advantages of any identity-based encryption scheme is that if there are only a finite number of users, after all users have been issued with keys the third party secret can be destroyed. Moreover, as public keys are derived from identifiers, IBE eliminates the need for a public key distribution infrastructure. The authenticity of the public keys is guaranteed implicitly as long as the transport of the private keys to the corresponding user is kept secure (Authenticity, Integrity, Confidentiality). Automatic mail authentication is highly recommended for every mail sender to ensure that your messages are correctly classified. Authentication by itself is not enough to guarantee your messages can be delivered, as spammers can also authenticate mail. Gmail combines user reports and other signals, with authentication information, when classifying messages. Similarly, the fact that a message is unauthenticated isn‟t enough to classify it as spam, because some senders don‟t authenticate their mail or because authentication breaks in some cases. Our project introducing secured key generation based on email authentication, you can use authentication data to verify the source of any message that you receive. First, the user or new register person register his information throw bank website, the registration website requires some mandatory information throw registered side. After user registration data will stored successfully into bank data bases. Here we are used open source mysql database for storing user information. After registration Google mail server verified mail and send message to user mail. This process is automatically done throw banking side. After new user registration manager or bank employee may look all new user profile for verification. Manager or respected bank employee verified by credential or information and he may provide access for successful registration or he may reject the form by finding faults. Second the respected bank person finally verified and approved for new request. Here he follow.. 1. Approved ( If user request can be verified successfully ) 2. Pending ( Still require permission to approved by higher authorized person in bank) 3. Reject ( Request rejected by invalid information )
  • 3. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 3 | P a g e Copyright@IDL-2017 In approved stage, user request is valid and employee successfully verified by authorized employee, this stage only activated when all information from user side can be only valid. Mainly this stage generate two different key one is „Public Key‟ and „Private Key‟, Private key generate by authorization person using identity based encryption, Private Key generated by new user mail id using identity based encryption. Algorithm Used: Step 1: Public Key Generation PuKG(name, rand(K)) Step 2: Select Random R(PKG), Calculate a set(PKG, R) Step 3: Private Key Generation PrKG(mail id) Calculate a set int key=(read char(mail)) Concate( key, char mail id ), Continue Step 3 till end of mail id character Step 4: Generate Secrete key(PuKG, PrKG) In pending stage, if bank employee need higher level authorized person permission to approver request, he can put new request to pending stage, after pending stage this request information sent to higher level for approved new registration process. After this process again back to approve stage for verification. In rejection stage, if new user data is invalid or he may not specified valid information then only the respected bank person can be able to reject this new request. The bank employee may specify comments for rejecting application, this comments will transfer to new user mail. If bank employee needs more information from new user or he can mention valid data from new user throw mail only. METHODOLOGY System Design: Design is a creative process; a good design is the key to effective system. The system “Design” is defined as “The process of applying various techniques and principles for the purpose of defining a process or a system in sufficient detail to permit its physical realization”. Various design features are followed to develop the system. The design specification describes the features of the system, the components or elements of the system and their appearance to end-users. 4.1 Fundamental Design Concepts A set of fundamental design concepts has evolved over the past three decades. Although the degree of interest in each concept has varied over the years, each has stood the test of time. Each provides the software designer with a foundation from which more sophisticated design methods can be applied. The fundamental design concepts provide the necessary framework for “getting it right”. The fundamental design concepts such as abstraction, refinement, modularity, software architecture, control hierarchy, structural partitioning, data structure, software procedure and information hiding are applied in this project to getting it right as per the specification. 4.1.1 Input Design The input Design is the process of converting the user-oriented inputs in to the computer based format. The goal of designing input data is to make the automation as easy and free from errors as possible. Providing a good input design for the application easy data input and selection features are adopted. The input design requirements such as user friendliness, consistent format and interactive dialogue for giving the right message and help for the user at right time are also considered for the development of the project. Input design is a part of overall system design, which requires very careful attention. Often the collection of input data is the most expensive part of the system, which needs to be route through number of modules. It is the point where the user ready to send the data to the destination machine along with known IP address; if the IP address is unknown then it may prone to error. 4.1.2 Output Design A quality output is one, which meets the requirements of the end user and presents the information clearly. In any system results of processing are communicated to the users and to other systems through outputs. It is most important and direct source information to the user. Efficient
  • 4. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 4 | P a g e Copyright@IDL-2017 and intelligent output improves the systems relationship with source and destination machine. Outputs from computers are required primarily to get same packet that the user has send instead of corrupted packet and spoofed packets. They are also used to provide to permanent copy of these results for later consultation. 4.2 System Architecture: Figure : System Architecture Our proposed work is based on banking application. While a customer wants to open an account in any bank, he has to follow some fundamental rules of each bank. Our application represents easy way of opening an customer account and provide unique account number in short period of time. IMPLEMENTATION The implementation stage requires the following tasks. • Careful planning. • Investigation of system and constraints. • Design of methods to achieve the changeover. • Evaluation of the changeover method. • Correct decisions regarding selection of the platform • Appropriate selection of the language for application development Implementation phase should perfectly map the design document in a suitable programming language in order to achieve the necessary final and correct product. Often the product contains flaws and gets ruined due to incorrect programming language chosen for implementation. In this project for implementation purpose Java is chosen as the programming language. RESULTS The following snapshots define the results or outputs that will get in this project after step by step execution of all the modules of the system. Figure : New user registration Form To enroll an account in any bank user has to fill an application form by writing on paper or by online providing valid details about him. The above figure shoes our application registration form for new user. When he provides valid details, the registration request send to bank employee for verification of information provided by the new user. Figure : Form for user to view the process done by bank Employee
  • 5. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 5 | P a g e Copyright@IDL-2017 The advantage of the application is the user can able to view the process happening in the bank related to his bank account opening. The above figure shows the user view of the application. CONCLUSION We are concluding in our project, we are introducing automated banking where user can fill form online to create account. Once in a day concerned officer will verify the details provided by the user. Once verification is done, the automated system will send E-Pin to the registered user through mail using IBE algorithm which is safe and user will be happy as the account is created and all the credentials are shared on the same day. IBE-Identity based Encryption uses identity as the key for encryption, in our case we can use email-Id as the identity and extra safety measures can be taken by having OTP through registered mobile/mail etc. which will increase the security of the system. REFERENCES [1] Peng Xu; Tengfei Jiao; Qianhong Wu; Wei Wang; Hai Jin “Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email” IEEE Transactions on Computers, Year: 2016. [2] XiaoFang Huang; Qi Tao; BaoDong Qin; ZhiQin Liu “Multi-Authority Attribute Based Encryption Scheme with Revocation” - 24th International Conference on Computer Communication and Networks (ICCCN) Year: 2015. [3] Zi-Yik Cheah; Yik-Shu Lee; Thong-Yun The; Ji-Jian “Simulation of a pairing-based identity- based identification scheme in IOS” IEEE International Conference on computer Applications (ICSIPA) Year: 2015. [4] Fuchun Guo; Willy Susilo; Duncan Wong; Vijay Varadharajan “Optimized Identity-Based Encryption” Transactions on Dependable and Secure Computing year: 2015, Volume: PP, Issue: 99, Year: 2015. [5] Zheng Yan; Xueyun Li; Mingjun Wang; Athanasios Vasilakos “Flexible Data Access Control based on Trust and Reputation in Cloud Computing” IEEE Transactions on Cloud Computing Year: 2014. [6] Hasan Kadhem; “A novel authentication scheme based on pre-authentication service Security and Cryptography (SECRYPT)”, 2013 International Conference on computer application, Year: 2013 [7] Xiangyang Jiang; Jie Ling; “Simple and effective one-time password authentication scheme Instrumentation and Measurement, Sensor Network and Automation (IMSNA)”, 2nd International Symposium, Year: 2012 [8] Tan, S. Y., Heng, S. H., Goi, B. M., Chin, J. J., Moon, S., "Java Implementation for Identity-Based Identification", International Journal of Cryptology Research, 2009, pp.21-32,1(1). [9] Heng, S. H., Chin, J. J., , "A k-Resilient Identity-Based Identification Scheme in the Standard Model",International Journal of Cryptology Research, 2010, pp.15-25,2(1). [10] Tan, S. Y., Chin, J. J., Heng, S. H. and Goi, B. M., "An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model", KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, April, 2013, pp.910-922,7(4). [11] Chin, J. J. and Heng, S. H., "Security Upgrade for a k-Resilient Identity-Based Identification Scheme in the Standard Model", Malaysian Journal of Mathematical Sciences, March, 2013,pp.73-85,7(S). [12] Tea, B. C., Ariffin, M. R. K. and Chin, J. J., "An Efficient Identification Scheme in Standard Model Based on the Diophantine Equation Hard Problem", Malaysian Journal of Mathematical Sciences, August, 2013, pp.87-100,7(S). [13] Chin, J. J., Tan, S. Y., Kam, Y. H. S. and Leong, C., "Implementation of Identity-Based and Certificateless Identification Schemes on Android
  • 6. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 6 | P a g e Copyright@IDL-2017 Platform", Cryptology 2014, 24-26 June, 2014, The Everly, Putrajaya, Malaysia, 57-64,4.