SlideShare a Scribd company logo
INFORMATION SYSTEM
MANAGEMENT.
“UID : THE NUMBER OF LIFE”
Mr. N. Nilekani
What is UID :
Unique Identification Authority of India (UIDAI) : (AADHAAR)
 Coverage and support to national programs
 Technology and national security
 Identity databases linked in
 Securing individual’s rights
Biometric solutions
 Biometric devices
Finger print scanner Face camera iris scanner
“All devices STQC certified for the use in AADHAR project”
Biometric storage and retrieval
 BSP
 ABIS
 MSDKs
 Multimodal de-duplication
 Verification subsystem
Application - architecture
Entities and Roles:
 Registrars
 Enrolment Agency
 Enrolment Application
 Authentication Application
 Administrative Application
 Analytics and Reporting
Application
 Information Portal
 Contact Centre Interface
Security - architecture
 Authentication User
Agency
 Contact Centre
 UBCC
Strategies goals and mission
Goals:
• Specifications
• Innovation
• Assistance
Strategy:
• Collaboration
• Rapid adoption
• Biometric Laboratory
Features of the UIDAI Model
 The Aadhaar will only provide identity
 A pro-poor approach
 Enrolment of residents with proper verification
 A partnership model
 Online authentication
 Data transparency
Prognostication and attributes
 Balancing privacy and purpose.
 Accounting the marginalized people and providing identity.
 Game changer to business world in India.
"With technological development, as the paper work reduces, the cost
of technology also goes down and capability goes up. Once you make
everything electronic, the prices drop. It is when more number of
people make use of technology," Mr. N. Nilekani.
Presented by-
Apoorva Gaurav
THANK
YOU !!

More Related Content

Viewers also liked

Data Mining
Data MiningData Mining
Data Mining
Garima Singh
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
guested622e3
 
Acn Experiment No 6
Acn Experiment No 6Acn Experiment No 6
Acn Experiment No 6
Garima Singh
 
Evolution and the bible, do they meet bil
Evolution and the bible, do they meet bilEvolution and the bible, do they meet bil
Evolution and the bible, do they meet bil
Josué Turpo
 
SlideShare Team
SlideShare TeamSlideShare Team
SlideShare Team
Garima Singh
 
Acn Experiment No 4
Acn Experiment No 4Acn Experiment No 4
Acn Experiment No 4
Garima Singh
 
Travelers Corner in Belize
Travelers Corner in BelizeTravelers Corner in Belize
Travelers Corner in Belize
Travelers_Corner
 
Acn Experiment No 5
Acn Experiment No 5Acn Experiment No 5
Acn Experiment No 5
Garima Singh
 
Foodservice Rewards Overview
Foodservice Rewards OverviewFoodservice Rewards Overview
Foodservice Rewards Overview
Lisa Snider
 
Foodservice Rewards overview blog 3.7.2014
Foodservice Rewards overview blog 3.7.2014Foodservice Rewards overview blog 3.7.2014
Foodservice Rewards overview blog 3.7.2014
Lisa Snider
 
Modified Rabin Karp
Modified Rabin KarpModified Rabin Karp
Modified Rabin Karp
Garima Singh
 
Complier File
Complier FileComplier File
Complier File
Garima Singh
 
Drupal Association Supporter Update Q1 2017
Drupal Association Supporter Update Q1 2017Drupal Association Supporter Update Q1 2017
Drupal Association Supporter Update Q1 2017
Docker, Inc
 
Synopsis Seminar Brain Finger Printing
Synopsis Seminar Brain Finger PrintingSynopsis Seminar Brain Finger Printing
Synopsis Seminar Brain Finger Printing
Garima Singh
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
Garima Singh
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
Garima Singh
 

Viewers also liked (17)

Data Mining
Data MiningData Mining
Data Mining
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
Acn Experiment No 6
Acn Experiment No 6Acn Experiment No 6
Acn Experiment No 6
 
Evolution and the bible, do they meet bil
Evolution and the bible, do they meet bilEvolution and the bible, do they meet bil
Evolution and the bible, do they meet bil
 
SlideShare Team
SlideShare TeamSlideShare Team
SlideShare Team
 
Acn Experiment No 4
Acn Experiment No 4Acn Experiment No 4
Acn Experiment No 4
 
Travelers Corner in Belize
Travelers Corner in BelizeTravelers Corner in Belize
Travelers Corner in Belize
 
Acn Experiment No 5
Acn Experiment No 5Acn Experiment No 5
Acn Experiment No 5
 
Animations
AnimationsAnimations
Animations
 
Foodservice Rewards Overview
Foodservice Rewards OverviewFoodservice Rewards Overview
Foodservice Rewards Overview
 
Foodservice Rewards overview blog 3.7.2014
Foodservice Rewards overview blog 3.7.2014Foodservice Rewards overview blog 3.7.2014
Foodservice Rewards overview blog 3.7.2014
 
Modified Rabin Karp
Modified Rabin KarpModified Rabin Karp
Modified Rabin Karp
 
Complier File
Complier FileComplier File
Complier File
 
Drupal Association Supporter Update Q1 2017
Drupal Association Supporter Update Q1 2017Drupal Association Supporter Update Q1 2017
Drupal Association Supporter Update Q1 2017
 
Synopsis Seminar Brain Finger Printing
Synopsis Seminar Brain Finger PrintingSynopsis Seminar Brain Finger Printing
Synopsis Seminar Brain Finger Printing
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
 

Similar to Uid apoorva gaurav

An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.
Mindtree Ltd.
 
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
rpacpc
 
R S Sharma
R S SharmaR S Sharma
R S Sharma
eletseditorial
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
Ivona M
 
Aadhar project
Aadhar project Aadhar project
Aadhar project
Abhilash Chandra Pradhan
 
ICICI Appathon 2017
ICICI Appathon 2017ICICI Appathon 2017
ICICI Appathon 2017
Amit Arora,CPCU
 
Giving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identityGiving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identity
Mindtree Ltd.
 
Mindtree cs government-big data & analytics
Mindtree cs government-big data & analyticsMindtree cs government-big data & analytics
Mindtree cs government-big data & analytics
Mindtree Ltd.
 
A Comprehensive Survey of Identity Document Data Extraction Techniques for Ef...
A Comprehensive Survey of Identity Document Data Extraction Techniques for Ef...A Comprehensive Survey of Identity Document Data Extraction Techniques for Ef...
A Comprehensive Survey of Identity Document Data Extraction Techniques for Ef...
IRJET Journal
 
Application of Artificial Intelligence in Indian Banking Opportunities and Ch...
Application of Artificial Intelligence in Indian Banking Opportunities and Ch...Application of Artificial Intelligence in Indian Banking Opportunities and Ch...
Application of Artificial Intelligence in Indian Banking Opportunities and Ch...
ijtsrd
 
government department
government departmentgovernment department
government department
SikanderGhulamNabi
 
The Aadhaar Verification API _ Simplifying Identity Verification.pdf
The Aadhaar Verification API _ Simplifying Identity Verification.pdfThe Aadhaar Verification API _ Simplifying Identity Verification.pdf
The Aadhaar Verification API _ Simplifying Identity Verification.pdf
Veri5digital
 
Effective testing for a critical component of Government of India's unique id...
Effective testing for a critical component of Government of India's unique id...Effective testing for a critical component of Government of India's unique id...
Effective testing for a critical component of Government of India's unique id...
Mindtree Ltd.
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Dharmik
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
Uid security
Uid securityUid security
Uid security
Fardin Shaikh
 
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECTBRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
Arab Federation for Digital Economy
 
STRATEGIES FOR DEVELOPING & IMPLEMENTING INFORMATION SECURITY POLICIES BASED ...
STRATEGIES FOR DEVELOPING & IMPLEMENTING INFORMATION SECURITY POLICIES BASED ...STRATEGIES FOR DEVELOPING & IMPLEMENTING INFORMATION SECURITY POLICIES BASED ...
STRATEGIES FOR DEVELOPING & IMPLEMENTING INFORMATION SECURITY POLICIES BASED ...
Abdul-Hakeem Ajijola
 
Agile Network India | Systems of Intelligence | Jibendu
Agile Network India | Systems of Intelligence | JibenduAgile Network India | Systems of Intelligence | Jibendu
Agile Network India | Systems of Intelligence | Jibendu
AgileNetwork
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
IJECEIAES
 

Similar to Uid apoorva gaurav (20)

An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.
 
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
 
R S Sharma
R S SharmaR S Sharma
R S Sharma
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
 
Aadhar project
Aadhar project Aadhar project
Aadhar project
 
ICICI Appathon 2017
ICICI Appathon 2017ICICI Appathon 2017
ICICI Appathon 2017
 
Giving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identityGiving 1.2 billion citizens a unique identity
Giving 1.2 billion citizens a unique identity
 
Mindtree cs government-big data & analytics
Mindtree cs government-big data & analyticsMindtree cs government-big data & analytics
Mindtree cs government-big data & analytics
 
A Comprehensive Survey of Identity Document Data Extraction Techniques for Ef...
A Comprehensive Survey of Identity Document Data Extraction Techniques for Ef...A Comprehensive Survey of Identity Document Data Extraction Techniques for Ef...
A Comprehensive Survey of Identity Document Data Extraction Techniques for Ef...
 
Application of Artificial Intelligence in Indian Banking Opportunities and Ch...
Application of Artificial Intelligence in Indian Banking Opportunities and Ch...Application of Artificial Intelligence in Indian Banking Opportunities and Ch...
Application of Artificial Intelligence in Indian Banking Opportunities and Ch...
 
government department
government departmentgovernment department
government department
 
The Aadhaar Verification API _ Simplifying Identity Verification.pdf
The Aadhaar Verification API _ Simplifying Identity Verification.pdfThe Aadhaar Verification API _ Simplifying Identity Verification.pdf
The Aadhaar Verification API _ Simplifying Identity Verification.pdf
 
Effective testing for a critical component of Government of India's unique id...
Effective testing for a critical component of Government of India's unique id...Effective testing for a critical component of Government of India's unique id...
Effective testing for a critical component of Government of India's unique id...
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Uid security
Uid securityUid security
Uid security
 
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECTBRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
 
STRATEGIES FOR DEVELOPING & IMPLEMENTING INFORMATION SECURITY POLICIES BASED ...
STRATEGIES FOR DEVELOPING & IMPLEMENTING INFORMATION SECURITY POLICIES BASED ...STRATEGIES FOR DEVELOPING & IMPLEMENTING INFORMATION SECURITY POLICIES BASED ...
STRATEGIES FOR DEVELOPING & IMPLEMENTING INFORMATION SECURITY POLICIES BASED ...
 
Agile Network India | Systems of Intelligence | Jibendu
Agile Network India | Systems of Intelligence | JibenduAgile Network India | Systems of Intelligence | Jibendu
Agile Network India | Systems of Intelligence | Jibendu
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Uid apoorva gaurav

  • 1. INFORMATION SYSTEM MANAGEMENT. “UID : THE NUMBER OF LIFE” Mr. N. Nilekani
  • 2. What is UID : Unique Identification Authority of India (UIDAI) : (AADHAAR)  Coverage and support to national programs  Technology and national security  Identity databases linked in  Securing individual’s rights
  • 3. Biometric solutions  Biometric devices Finger print scanner Face camera iris scanner “All devices STQC certified for the use in AADHAR project”
  • 4. Biometric storage and retrieval  BSP  ABIS  MSDKs  Multimodal de-duplication  Verification subsystem
  • 5. Application - architecture Entities and Roles:  Registrars  Enrolment Agency  Enrolment Application  Authentication Application  Administrative Application  Analytics and Reporting Application  Information Portal  Contact Centre Interface
  • 6. Security - architecture  Authentication User Agency  Contact Centre  UBCC
  • 7. Strategies goals and mission Goals: • Specifications • Innovation • Assistance Strategy: • Collaboration • Rapid adoption • Biometric Laboratory
  • 8. Features of the UIDAI Model  The Aadhaar will only provide identity  A pro-poor approach  Enrolment of residents with proper verification  A partnership model  Online authentication  Data transparency
  • 9. Prognostication and attributes  Balancing privacy and purpose.  Accounting the marginalized people and providing identity.  Game changer to business world in India. "With technological development, as the paper work reduces, the cost of technology also goes down and capability goes up. Once you make everything electronic, the prices drop. It is when more number of people make use of technology," Mr. N. Nilekani.