Preview

AADHAR AS IN MIS

Better Essays
Open Document
Open Document
1038 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
AADHAR AS IN MIS
MIS ASSIGNMENT AADHAR AS IN MIS

Submitted By, Dhiya Ann Mathew S2 mba

INTRODUCTION

The UIDAI has been setup by the Government of India with a mandate to issue a unique identification number to all the residents in the country. A key requirement of the Aadhaar is to minimize/eliminate duplicate identity to improve the efficacy of the service delivery. Biometrics features are selected to be the primary mechanism for ensuring uniqueness.

No country has undertaken to build a national registry at the scale and accuracy as UIDAI initiative. Nature and diversity of India's working population adds another challenge to achieving uniqueness through biometrics features. Like other technology fields such as telecommunication, we do not have experience like developed countries to leverage for designing UIDAI's biometric systems. For example, the largest existing biometrics database in the world is one order smaller in magnitude than India's needs.

Therefore, it is necessary to create a UIDAI Biometrics Centre of Competence (UBCC) that focuses on the unique challenges of UIDAI.

The Unique Identification Authority of India (UIDAI), is an agency of the Government of India responsible for implementing the AADHAARscheme, a unique identification project. It was established in February 2009, and will own and operate the Unique Identification Number database.[1] The authority aims to provide a unique id number to all Indians, but not smart cards.[2] The authority will

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Qr Codes and Nursing

    • 1098 Words
    • 5 Pages

    Originally invented in 1994, by the Denso Wave Corporation in Japan, Quick response codes, or QR codes were intended to for the auto manufacturer Toyota as a means to track vehicles, as well as vehicle parts, during the manufacturing production stages of building their cars. The QR codes were designed to allow Toyota manufactures to identify parts by scanning a two dimensional barcode, or, QR code at high speed. Since its inception in 1994 QR codes have become one of the most popular types of barcode used in Japan. Used primarily through Smart phones, this technology quickly allows consumers to access information contained in the QR code. In recent years the QR barcodes have infiltrated the United States via consumer advertisers and packaging companies. QR codes can be found on direct mail from advertisers, billboards, buses, internet ads, and have even crossed boarders into the healthcare industry (Wikipedia, 2012). Even the Federal Government is adopting the use of QR codes to reduce the risks associated with mistaken personnel identification. The United States Department of Defense has also boosted identification (ID) security of employees by adopting smart ID cards, which are essentially QR codes. Instead of using the traditional ID card with employee photos, the Department of Defense has issued smart ID cards which act much like QR codes, however, they more are more expensive to produce, and require ongoing IT support. Although they are more expensive than a traditional ID card, The Smart ID cards allow for faster verification of personnel, and may ease some of the pressure on security officials who have to use their judgment based on an ID card flashed in their face. With one scan of the QR code, down to the minute, information can be displayed, which includes, authorizations for the employee, or their qualifications and, or credentials. The purpose of this communication is to explain the advantages and disadvantages of participating in a QR code pilot…

    • 1098 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Systems

    • 491 Words
    • 2 Pages

    are the most reliable but most people hate the idea of a laser shooting into…

    • 491 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The design has two main objectives. The first objective is to increase the level of security when identifying users and to reduce the rate of match and non-match occurrences. The second objective is to integrate the three biometrics and set the threshold that decides a match or a non-match.…

    • 553 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Access Control

    • 661 Words
    • 3 Pages

    The components of a biometric device usually include an input device, a database containing potential matches, and a control program to determine the action based on authentication results. Different configurations exist for various applications, however essentially the core components vary very slightly.…

    • 661 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Passport Automation System

    • 2050 Words
    • 9 Pages

    The system provides the online interface to the user where we can fill their form and personal detail with necessary proof. The authority concerned with the issue of passport can use this system to reduce is workload and process it speedy manner. It provides communication platform between administrator and applicant. To transfer the data between passport authority and local police verifying the applicant’s information.…

    • 2050 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    Fast Haar Transform

    • 13040 Words
    • 53 Pages

    In many real-world applications, uni-modal biometric systems often face significant limitations due to sensitivity to noise, interclass variability, data quality, non universality, and other factors. Attempting to improve the performance of individual matchers in such situations may not prove to be highly effective. Multi-biometric systems seek to alleviate some of these problems by providing multiple pieces of evidence of the same identity. These systems help achieve an increase in performance that may not be possible using a single-biometric indicator.…

    • 13040 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    Aadhar Card Case Study

    • 855 Words
    • 4 Pages

    Then, the user needs to select. As to how he or she may download the e-Aadhar. There are two options to choose from. One is the Enrolment Id and the other is the Aadhar number.…

    • 855 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Abstract: Nowadays almost everyone is using smart phones. They are becoming an essential tool in human being’s everyday life. They are not only used for mere communication such as calling or sending text messages; however, they are also used in applications such as for accessing internet, receiving and sending emails and storing documents. As a result of this, not only phone numbers and addresses are stored in the mobile device but also financial information and business details which definitely should be kept private. And if the device is being stolen, each and every information is in the hands of the new owner. That’s why; the biggest challenge is the security. When it is necessary to confirm the user identity on systems to perform a given operation, the term User Authentication is used. Traditionally, people prove their identity by providing passwords. The average person today has about 25 password protected accounts (according to Microsoft study), more passwords than they can reasonably be expected to remember. People compensate by using the same password for multiple accounts, and by choosing passwords that are easy to remember. But, unfortunately easy to remember means easy to guess. Other user select difficult passwords but then write them down where unauthorized eyes can find them. That’s why, identity based on what you know (login and password) and what you have (ID cards) can be easily stolen. As we want trust (security), the notion what you are is a new opportunity to user authentication. Biometric Authentication is answer for that. Biometric is a characteristic of human being that distinguishes one person from another. For example, finger prints, retina, face recognition, etc. This can be used for identification or verification of identity. Keywords: FAR, FRR, ROC, EER, FTE, FTC. B.…

    • 2535 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Share on linkedin Share on facebook Share on twitter Share on email 156 INTRODUCTION The National Identity Management Commission (NIMC) was established by Act No. 23 of 2007 primarily to foster the orderly development of an identity sector…

    • 2143 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Support Consultant

    • 1263 Words
    • 6 Pages

    Project Description: Unique identification project was initially conceived by the planning Commission as an initiative that would provide identification for each resident across the country and would be used primarily as the basis for efficient delivery of welfare services. It would also act as a tool for effective monitoring of various programs and schemes of the Government.…

    • 1263 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    poop

    • 1058 Words
    • 5 Pages

    Submitted by: ddee428 3/8/2013 When a Password Just Isn’t Enough: the Use of Fingerprint Readers to Secure Information WHEN A PASSWORD JUST ISN’T ENOUGH: THE USE OF FINGERPRINT READERS TO SECURE INFORMATION Executive Summary…………………………………………â…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Apartment - title

    • 10765 Words
    • 44 Pages

    According to Harbron (1988), one way of attaining security of a certain area is by means of biometrics. Jain et. al. (1999) identified that biometric system can operate verification and identification mode. It is very important to make our place secured in many aspects to prevent from encroachment issues.…

    • 10765 Words
    • 44 Pages
    Powerful Essays