ISSN:2229-6093
Aniket Yadav et al ,Int.J.Computer Technology & Applications,Vol 3 (2), 520-524
Unique ID Management
Mrs. Hemangi Kulkarni, Aniket Yadav, Darpan Shah, Pratik Bhandari, Samuya Mahapatra
Department of Computer Engineering, Pune University
Address
hemangikulkarni21@gmail.com
ayadav4003@gmail.com
samuya11@gmail.com
dapu007@gmail.com
pratik.bhandari91@gmail.com
G. H. Raisoni College of Engineering and Management, Pune, India
Abstract— The Unique ID system provides unique identification 2. UIDAI
numbers to Indian residents. UID Number which would not just
help the government to track down individuals, but would make UIDAI is expected to provide a link across diverse
life far easier for citizens as they would not have to submit identities as a citizen, so that once one has it, the Govt. needs
multiple documents each time they want to avail a new public, nothing more from one because it can find the links on its
private and government service. This system will contain own. AADHAAR signifies ‘foundation' or ‘support' and
personal details like name, sex, address, marital status, photo, communicates the fundamental role of UID initiative and its
identification mark and fingerprint biometric. The unique impact.
identification number will be in the formed of 12 digit
alphanumeric number to provide more security. UID system
helps to manage persons needs in his/her life span by using a 2.1 Applications of UIDAI
single UID i.e. the number is used as Driving license number, AADHAAR assurance of uniqueness and centralized
Voter ID card number, registration number in any organization, online identity verification would be the basis of building
bank account number, personal or professional details. This multiple services and applications —
system will create government jobs for computer sector in the
development, implementation and maintenance of the UID
system. It can substitute all other identification issues including
illegal migration, in banking and financial transactions,
fraud, health related matters, in education sector, welfare
Keywords—Unique Identification Numbers, UID, E- sector, in the election process, monitoring efficient law
Government, UIDM, UIDAI and order.
It is easy to count country's population without any
1. INTRODUCTION mistakes and take a action to control population which
gradually increase in excess amount.
This system is to provide a unique ID to each and every
citizen of India while providing him/her a birth certificate.
It will provide support in providing proper identification
Citizens after attaining age of 18 must register at RTO office
to the individuals and this UID will be linked with a
or Collector office or Thasildar office and get a password to
person's Passport Number, Driving License, PAN card,
access the site. ID card will be provided to every user after
Bank Accounts, Voter ID etc. and all this information
registration. Later on they can change their password. Once
will be checked through a database.
they enter the site they can pay their electricity bill and
telephone bill, book railway tickets and airline tickets and pay 2.2 Risks in implementation of UIDAI
their taxes. During elections people can poll online.
Risks that arise from this centralisation include possible
Government officials can verify details about a person from
errors in the collection of information, recording of inaccurate
the database for issuing vehicle license, passport, visa, etc.
data, corruption of data from anonymous sources, and
unauthorised access to or disclosure of personal information.
Unique Identification Authority of India (UIDAI):
The centralised nature of data collection also heightens the
The UIDAI is the government project and name for the
risk of misuse of personal information and therefore
project is “AADHAAR” means “support”.
potentially violates privacy rights. The creation of a
Unique Identification Management (UIDM):
centralised database of personal information, it is imperative
The UIDM that creates unique identification number to
that such a programme not be established without the proper
particular citizen of state/country.
520
ISSN:2229-6093
Aniket Yadav et al ,Int.J.Computer Technology & Applications,Vol 3 (2), 520-524
mechanisms to ensure the security of each individual’s Authentication Process:
privacy rights. In the second process, whenever a person has be identified
As we considered for India ,The population of India is more whether he/she is a genuine one, a fresh biometric scan is
than 5 million,so Network traffic have to be controlled but is it made and then the scanned image is sent to the centralized
very tedious task .also we have to increase the bandwidth server. The server takes the fresh scanned biometric image as
spectrum and connectivity. an input and compares it with all the already stored biometric
records in the database. If a relevant match found is found,
then the person is designated to be a genuine citizen.
3. UIDM
The UIDM system is to develop Unique-id management 3.1.2 Flow chart:
that creates unique identification number to particular citizen The diagram as shown below gives some basic description
of country. As well as management of perspective data,
information of that citizen. Secondary goal is that we provide
some feature in this project which are try to help people to
achieve/reduces their stress of normal life. Basically, The
UIDM system which is handled by moderator, according to
recent work the “Aadhaar” system which is developed for
providing Unique-id. This system not provides different
feature. This system can be accessed by the citizen, and
different people related to governmental activity, so we try to
achieve simple interface, and user friendly system.
3.1 Design and Architecture
We describe the Algorithm, which is used to explain how
the system is going to work, i.e. the process logic behind it,
the flowchart, which represents the pictorial representation of
the process logic and finally the Data Flow Diagram (Context
Level) of the UIDM system.
3.1.1 Algorithm:
Security mechanism in UID project - if there is no physical
Identity card or electronic smart card, then how will UID
system validate its citizens. For implementing this, two
different processes have to followed, the first one being the
recording process and the second one - the authentication
process.
Recording Process:
In the first process, the UIDM builds up a centralized
database consisting of UID, biometric record and various regarding the flow of the system. It will not show the
other details of the person. The UIDM allocates a unique 12 operations performed in detail but just access the operation
digit alpha numeric number (UID) which is randomly and where it goes after the operation has been performed.
generated by the main computer to every citizen. Then a It shows the different conditions like (“if else”) if one
biometric data record is made by scanning the 10 fingerprints condition is not true than where the flow will return and from
of a person. This biometric data is tagged to the person's where will it start again or where will the flow terminate after
unique 12 digit number (UID). The UID tagged to the some operation has been performed.
biometric record of a citizen is later used in the authentication Fig. 1 UIDM System
process.
3.1.3 Data Flow Diagram:
521
ISSN:2229-6093
Aniket Yadav et al ,Int.J.Computer Technology & Applications,Vol 3 (2), 520-524
erosion of fingerprints of people who are involved in heavy
physical labour being affected over a period of time is one
such challenge.
5. IMPLEMENTATION OF UIDM SYSTEM
The system will be having only one User-name and
Password section on the front page, as per the user-name and
password the system will know whether user is
Citizen/Moderator/Administrator/Security official.
Fig. 2 UIDM Data Flow Diagram
3.2 Advantages 5.1 Scenario of UIDM
Manage all the details related to the Bank account, Driving Scenario 1: Citizen
License, Vehicle registration, Voter ID card, Medical records,
Citizen will enter the user-name and password. The Citizen
education and profession, passport, PAN card in one database.
will be guided to its homepage where he/she would be able to
A single unique number is used therefore decreasing
view their profile and avail facilities like Booking
manual labour and increasing efficiency as every detail is
Railway/Airline Tickets, Payment of Electricity/Phone bills.
available on the single click and reducing the efforts in
Citizen will also be able to vote at the time of election. He/She
maintaining different ID databases. The UID will reduce the
will be provided with discussion forum and help section.
duplication, an attempt to make fake documents.
The purpose of this UID system is to provide one unique Scenario 2: Government Security officials
number to all the citizens to increase the security and The security officials will be able to do the same operations
verification process by introducing the Biometric as the regular citizens are able to do. Some security officials
authentication technology, and thus identifying illegal with special rights given to them at the time of generating the
immigrants and terrorists. Unique-ID will be able to see citizens details as in if they want
Along with UID various facility provided in the system, to monitor someone movements or for any security purpose.
like pay their electricity bill and telephone bill, book railway
tickets and airline tickets and pay their taxes. During elections Scenario 3: Moderator
people can poll online. If a person commits crime, his/her Moderator is the person who has been given rights by the
details will be added to the crime database. This will be useful Administrator to look at the whole system and maintain it.
for embassy, employment exchange and CBI officials. They are the one who will appoint other clerks below them.
They themselves will be having there Unique-ID and can
perform all the regular operations as normal Citizen does. If
3.3 Disadvantages there are some technical faults then its there duty to look after
The disadvantage of this system is that the network has to the fault and fix it.
be very quick and crash free which is not possible. As at a
time there will be many citizens who will be working on the Scenario 4:Administrator
system. Administrator is the head of all the system and looks after
Security is the biggest task in this system as each and every the whole system sitting at the top of the tree of Unique-ID
possible security measures will have to be taken. System. He will appoint Moderators and give them the rights
for changes.
4. BIOMETRICS 5.2 Student Unique-ID
Electronic scanning and matching technologies are not 100 As a student crosses age of 18yrs the Unique ID will get
percent error-free. Since biometrics is not an exact science, transferred from the student database to citizen database and
the problem is not only is the underlying data flawed, even the the student will have to authenticate himself/herself on the
biometric technologies have some error rates. At the time of website and start availing the facilities.
purchasing biometric scanning equipments, it is important to
What if Unique ID is Lost?:
include a clause mentioning the calibration requirements.
While biometric data in digital format is the norm for If the UID is lost of any citizen or student he/she will have
modern day authentication process, choosing the right type of to go to the centre and pay the fine and provide their details so
scanning device is more important. While fingerprinting is the that the moderator can search and check the details again and
most straightforward biometric available in market. The issue the existing UID.
522
ISSN:2229-6093
Aniket Yadav et al ,Int.J.Computer Technology & Applications,Vol 3 (2), 520-524
What if any change in UID?: submit it to registrar to be at a later stage. This stage
If there are any changes in the details then the changes can is an internal process and will not be shown
be done at the centres, provided the person will have to go to anywhere in the Interface.
the centre, prove his/her identities and ask for the changes to
be done. 3. After the verification by the online registration the
data form is given to the admin. Admin generates or
allots a UID no for the user who register validate and
acknowledges.
6. COMPARISON BETWEEN THE UIDM SYSTEM AND UIDAI
SYSTEM 4. a) The Admin has its own registration no., and a
The system implemented by the government as if for password so that no other person can access it (for
now doesn’t allow the id to be used for Paying bills and security reasons) b) Admin has a database of its own
booking tickets. It even doesn’t allow to vote on the basis of so as to store his/her details as well. c) After login the
the Id provided,still one needs voter Id card to vote. It cannot Admin has four options: Create View, Delete, and
be used for getting a sim card or in any banking sector. All the Update.
Facilities will be provided only after a large section of
population gets Unique-id and at the rate at which the 5. Creation step: In creating account the UID allotted is
Government are working it will take many years to give entered details are added and submitted to the
Unique-id to each and every citizen. database with the help of a submit button in the
According to unique-id system of government any interface.
Citizen of Indian nationality can have a Unique-id and every 6. Update/Delete step: In updating account the UID
child from 5 to 15 years will need to have retinal scan done at allotted is entered details are updated/deleted and
some interval of time as they are bound to change between submitted to the database with the help of an
this 10 years time. The child details will be in accordance with Ok/Delete button in the interface along with an
parents/Guardians and only after 18 years he/she will have the acknowledgement.
Unique-Id.
This task seems to be fast in a way that at a time the child 7. The user account, say after creation/updating/deletion
will also have the Unique-id along with parents and then will is acknowledged and the user is made aware of it.
get their own at the age of 18 but the task is to tedious as
every time the citizen will have to bring the child for retinal 8. The format of the UID number or the UID is
scan and then again for fingerprints. In order to make the generated on a pattern which looks like this:
things easy we will give the Ids to the students when they will Country, State, District, Region.
be in 11th where they will have chosen theirs field and also the
average age will be above 15 so no need for repeated retinal 9. The Internal process of this is that the user details are
scan. The students will be provided with their Unique-id at the fetched from a database with UID No. acting as a
time of registration in school but their Ids will be blocked till primary key in all respective table as an attribute and
they turn 18.In this way a time will come when every new also act as a foreign key in other table
batch will have their Unique-id ready.
The children between the age of 5 to 15 despite of having
their details attached with the parents will have their own id
CONCLUSIONS
from school and other institutions so there is no point in
providing them the Ids or getting their details. Unique Identification System will be beneficiary to the
citizens as it is a unique number which contains basic
information of every person. After the ID will be issued there
is no need to carry driving license, voter cards, pan card, etc.
8. TESTING OF UIDM for any government or private work. For example, for opening
We analyze the performance of UIDM system with a new account one has to show his/her Unique ID only. But to
respective to following testing phases. some extent it is harmful to the general public as all the data
related to them is stored on computers and can be misused by
1. The basic process of UID follows as if the user is hackers if the multiple security strategies will not be adopted.
already registered with UID system, then he/she Causal Productions has used its best efforts to ensure that the
simply enters his/her UID No. & logins to view templates have the same appearance.
his/her account details. The user is restricted to The role of this system envisions is to issue a unique
Update/delete or create any account. identification number (UID) that can be verified and
authenticated in an online, cost-effective manner, and that is
2. If the user is new to UID system, he/she has to first robust enough to eliminate duplicate and fake identities.
fill the key form manually regarding all the
information of his/her respective different fields and
523
ISSN:2229-6093
Aniket Yadav et al ,Int.J.Computer Technology & Applications,Vol 3 (2), 520-524
ACKNOWLEDGMENT
Our thanks to Mrs. Hemangi Kulkarni who has contributed
towards development of this Research Paper on Unique
Identification System.
REFERENCES
[1] 'Unique Identifiers: a brief introduction' by Brian Green and Mark
Bide (February 1999)
[2] 'Unique Identification Number: Panacea for India’s Problems?' by
Harsh Varshan Pant, Nihar Ranjan Pande, Jeetendra Pande published in
International Journal of Technology and Applied Science, Vol. 2, pp.12-
15, 2011 ISSN: 2230-9004
[3] 'Unique Identification System' by Alankrit Patnaik and Deepak Gupta
published in International Journal of Computer Applications (0975 –
8887) Volume 7– No.5, September 2010
[4] 'Unique Identification Number And E-governance Security' by
Subash Chander published in International Journal of Computing and
Business Research (IJCBR) Volume 1, N. 1 December – 2010
524