SlideShare a Scribd company logo
1 of 33
UID
CONTENTS
   Unique Identification Number & Its Purpose
   AADHAAR Project
   Authentication
   UID System
   UID Agencies
   Challenges Involved in Implementation
   UID Numbering Scheme
   Entity IDs
   Domain analysis
   Business rules
   E-R Diagram & Relational Schema
   Risks & Database Threats and Attacks involved in UID Project
    Implementation
UNIQUE IDENTIFICATION NUMBER


   The Unique Identification Authority of India (UIDAI) is an agency
    of the Government of India responsible for implementing the
    AADHAAR scheme, a unique identification project.

   It was established in February 2009, and will own and operate the
    Unique Identification Number database.

   The authority aims to provide a unique id number to all Indians.

   The authority will maintain a database of residents containing
    biometric and other data.
PURPOSE OF UIDAI


   The objective of the project is to determine uniqueness of all
    individuals within the territory of India.

   It will only issue a number which will be delivered to the
    concerned person's address.

   The UIDAI proposes to provide online authentication using
    demographic and biometric data.
AADHHAR NUMBER


   The Unique Identification (AADHAAR) Number, which identifies a
    resident, will give individuals the means to clearly establish their
    identity to public and private agencies across the country.

   AADHAAR Number is provided during the initiation process called
    enrolment where a resident‟s demographic and biometric information
    are collected .

   Uniqueness of the provided data is established through a process
    called de-duplication.
AADHAAR AUTHENTICATION

   AADHAAR “authentication” means the process wherein AADHAAR
    Number, along with other attributes, including biometrics, are
    submitted to the Central Identities Data Repository (CIDR) for its
    verification on the basis of information or data or documents
    available with it.

   UIDAI will provide an online service to support this process.

   AADHAAR authentication service only responds with a “yes/no” and
    no personal identity information is returned as part of the response.
   AADHAAR authentication will provide several ways in which a resident
    can authenticate themselves using the system.

   At a high level, authentication can be „Demographic Authentication‟
    and/or „Biometric Authentication‟.
   But, in all forms of authentication the AADHAAR Number needs to be
    submitted so that this operation is reduced to a 1:1 match.

   During the authentication transaction, the resident‟s record is first
    selected using the AADHAAR Number and then the
    demographic/biometric inputs are matched against the stored data
    which was provided by the resident during enrolment process or during
    subsequent updates.
UID SYSTEM
UID ARCHITECTURE
UID AGENCIES
NUMBERING FORMAT
NUMBERING SCHEME
The Version Number:
o  Some digits may be reserved for specific applications. This is
   an implicit form of a version number embedded into the
   numbering scheme.
o  We recommend the following reservations: 0- numbers (a1 =
   0) could be used as an “escape” for future extensions to the
   length of the number.
  Number Generation:
o  The numbers are generated in a random, non-repeating se-
  quence.
o The algorithm chosen to generate IDs should not be made
  public and should be considered a national secret.
   Lifetime: Individual UID is assigned once, at inception, and
    remain the same for the lifetime of the person, and for a
    specified number of years beyond. At this point there is no
    consideration of reusing numbers.

   Entity ID’s: We expect that entity ID numbers (1- numbers)
    will have different rules for periods of validity and retirement.

   The Checksum: There are several schemes possible .The
    recommend ed scheme is the Verhoeff scheme.
ENTITY ID
     Institutions like Government departments, schools and even companies
      can benefit by using a UID like Identifier – this is called an Entity ID.
     Since the UID will potentially be used as a primary identifier in several
      transactions in the financial, health, food distribution, job creation
      schemes and transactions it is important to assign an entity ID to the
      service delivery organization.
     For instance a financial trans-action to transfer money might take the
      form:
      TransferMoney(From_UID, To_UID, Amount);
     Where the From_UID could be an entity UID of the block level NREGA
      entity and the To_UID can be that of the resident to who the amount is
      being transferred.
     This symme-tric treatment of both to and from fields simplifies the end-to-
      end system.
DOMAIN ANALYSIS
•   The demographic and biometric fields linked to the Aadhaar
    number and stored in the CIDR would consequently, need to
    be regularly updated to ensure that the information it stores is
    both accurate and relevant for authenticating agencies.

•   The data fields held in the CIDR include mandatory
    demographic and biometric fields which are central to identity
    management, as well as additional, optional fields available
    for ease in communicating with the Resident, and for enabling
    better service delivery.
The UIDAI intends to set up modes through which residents can request
for data updates.


Registrar enrolment centres:


•   Most Registrars for the Aadhaar number intend to retain long-term enrolment
    centres .

•   These centres would have the enrolment client and devices required for
    carrying out enrolments, which can also be used for updation purposes.

•   These centres would also carry out processes such as document verification
    and handling, as well as verifying Introducer details, which are required for
    the complete updation solution.
National level common updation agency:

•   The UIDAI can work with the Registrars such as the National
    Securities Depository Limited (NSDL) where Residents can update
    their records not just through theUIDAI, but also other service
    agencies.

•   The networks of these agencies would be used for recording

     information update requests.
BUSINESS RULES

   At the start of the process, the Resident arrives at the centre with
    his/her Aadhaar letter or his/her Aadhaar number.

   He/she fills up an updation request form detailing the specific
    demographic/biometric information that needs to be updated.

   If the information being updated requires supporting documentation,
    the resident may first have to get documents verified from the
    Verifying Official.

   The Resident then provides the Operator at the centre with the
    verified documents, or with the Introducer who verifies that the
    updated information is accurate.
   The Operator performing the updation checks the Resident‟s
    Aadhaar letter.

   When the Resident provides the updated information, the operator
    verifies the information matches any documentary
    evidence/introducer provided.

   The Operator enters the Resident‟s information into the software
    client updating the demographic or biometric information as required.

   Both Operator and Resident verify the accuracy of the data that is
    entered.

   The Operator then captures the Resident‟s biometrics to confirm
    his/her authenticity as well as the Resident's sign-off on the update.
   The updated information is transferred to the CIDR .

   Once it reaches the database, the information is updated in the
    CIDR, and the information on the update is then communicated to
    the Resident.
ER DIAGRAM
TABLES

   CIDR(Uid,Cname,Fname,DoB,Address,Eye color,D mark)

   ENROLLMENT_AGENCY(E_id,E_name,)

   REGISTRAR(R_code,R_name,P_name,R_addr,R_      phno)

   OPERATOR(O_id,O_name,Quali,O_addr,O_phno,certif_no,O_gende
    r)

   UIDAI_ADMIN(A_code,A_name,A_gender,A_addr,A_phno,A_email)

   CITIZEN(C_id,C_name,C_addr,C_phno,C_dob,C_gender)

   BANK(Uid,Branch,Acc_no,Acc_bal,CreditCard)
RELATIONAL SCHEMA

   CIDR

Uid        Cname    Fname   DoB     DoE    Eye      Dmark
                                           color


   REGISTRAR
Reg         Rname      Pname      R_addr   R_phno
Code


   ENROLLMENT_AGENCY

E_id        E_name     O_name     Quali    O_Addr   Cert_no
   UIDAI_ADMIN

A_code     A_name       A_gender    A_addr   A_phno     A_email



   BANK

Uid            Branch      Acc_no        Acc_bal      CreditCard



   CITIZEN

C_id          Cname     C_addr      C_phno    C_dob      C_gender
CHALLENGES IN INDIA IDENTITY CARD
RISKS INVOLVED

   Adoption risk
       A critical mass is required for the participation of service providers
   Political risk
       Support from state and local governments is critical
   Enrollment risk
       Enough touch points in rural areas and enrolling 60,000 newborns every
        day
   Risk of scale
       Administration and storage of ~1B records
   Technology risk
       Authentication, de-duplication and data obsolescence
   Privacy and security risk
       Biometric data security
   Sustainability risk
       Maintaining the initial momentum over a longer term
RISKS IN VARIOUS STAGES

   Collection
    Data leakage Scenarios across various Registrars and Enrollment agencies:
    • Intentional or unintentional compromises
    • Logical or physical security compromise
    • Third party attacks


     Integrity and accountability of Registrars and enrollment agencies



       Reliance on multiple vendors increases vulnerabilities
RISKS IN VARIOUS STAGES ( CONT..)
   Transmission

       Need for secured communication channels: VPN, SSL-
       VPN, MPLS clouds



        Encryption of the data: strong encryption required for
        securing biometrics


        Key Management: departmental interactions,
        coordination


        Non-Repudiation: attack vectors like a man-in-the-
        middle attack
RISKS IN VARIOUS STAGES ( CONT..)
   Storage

        Management of roughly 10,000 TB of sensitive information spread
        across the country, in addition to storage in CIDR



        Accountability of users : data base administrators, network
        administrators, application owners, third party employees



        Accountability and assurance of people working with registrars
        and sub-registrars
DATABASE THREATS & ATTACKS
                   Spoofing


                   Tampering


              Trojan horse attacks



                Masquerade attack



             Overriding Yes /No response
CONCLUSION


   Unique Identification System will be beneficiary to the citizens as it is
    a unique number which contains basic information of every person.

   After the ID will be issued there is no need to carry driving license,
    voter cards, pan card, etc for any govt. or private work.

   But to some extent it is harmful to the general public as all the data
    related to them is stored on computers and can be misused by
    hackers if the multiple security strategies will not be adopted.
   The UID authority in specific should make sure that they have the
    highest standards of integrity, openness, transparency and process
    in all stages of UID System.



   The UID project should not become compulsory until there is an
    established judicial overview to ensure that the privacy rights of
    citizens are not unlawfully violated.
Thank you

More Related Content

What's hot

Automatic number plate recognition
Automatic number plate recognitionAutomatic number plate recognition
Automatic number plate recognitionSaifullah Malik
 
Fingerprint based voting machine ppt
Fingerprint based voting machine pptFingerprint based voting machine ppt
Fingerprint based voting machine pptitzmemidhu
 
Ppt of e voting
Ppt of e votingPpt of e voting
Ppt of e votingSmriti Rai
 
Aam aadmi ka adhikar (AADHAR)
Aam aadmi ka adhikar (AADHAR)Aam aadmi ka adhikar (AADHAR)
Aam aadmi ka adhikar (AADHAR)Sandeep Patel
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1Ankit Gupta
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance systemeskkarthik
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition Systemprashantdahake
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technologyshams tabrez
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance systemNaomi Kulkarni
 
IRJET- IoT based Smart Cradle System for Baby Monitoring
IRJET- IoT based Smart Cradle System for Baby MonitoringIRJET- IoT based Smart Cradle System for Baby Monitoring
IRJET- IoT based Smart Cradle System for Baby MonitoringIRJET Journal
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Electronic voting machine
Electronic voting machineElectronic voting machine
Electronic voting machineShusomm
 

What's hot (20)

Automatic number plate recognition
Automatic number plate recognitionAutomatic number plate recognition
Automatic number plate recognition
 
Fingerprint based voting machine ppt
Fingerprint based voting machine pptFingerprint based voting machine ppt
Fingerprint based voting machine ppt
 
Ppt of e voting
Ppt of e votingPpt of e voting
Ppt of e voting
 
Aam aadmi ka adhikar (AADHAR)
Aam aadmi ka adhikar (AADHAR)Aam aadmi ka adhikar (AADHAR)
Aam aadmi ka adhikar (AADHAR)
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance system
 
ATM
ATMATM
ATM
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
License Plate recognition
License Plate recognitionLicense Plate recognition
License Plate recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
face recognition
face recognitionface recognition
face recognition
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition System
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
IRJET- IoT based Smart Cradle System for Baby Monitoring
IRJET- IoT based Smart Cradle System for Baby MonitoringIRJET- IoT based Smart Cradle System for Baby Monitoring
IRJET- IoT based Smart Cradle System for Baby Monitoring
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Electronic voting machine
Electronic voting machineElectronic voting machine
Electronic voting machine
 

Viewers also liked

Aesop change data propagation
Aesop change data propagationAesop change data propagation
Aesop change data propagationRegunath B
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome themsaipriyadonthula
 
Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Regunath B
 
E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres Regunath B
 
Facebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsFacebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsRegunath B
 
Hadoop at aadhaar
Hadoop at aadhaarHadoop at aadhaar
Hadoop at aadhaarRegunath B
 
Building tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsBuilding tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsRegunath B
 
Building the Flipkart phantom
Building the Flipkart phantomBuilding the Flipkart phantom
Building the Flipkart phantomRegunath B
 
Oss as a competitive advantage
Oss as a competitive advantageOss as a competitive advantage
Oss as a competitive advantageRegunath B
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 

Viewers also liked (13)

Aesop change data propagation
Aesop change data propagationAesop change data propagation
Aesop change data propagation
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
 
Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3
 
Srikanth Nadhamuni
Srikanth NadhamuniSrikanth Nadhamuni
Srikanth Nadhamuni
 
Aadhaar
AadhaarAadhaar
Aadhaar
 
E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres
 
What database
What databaseWhat database
What database
 
Facebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsFacebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streams
 
Hadoop at aadhaar
Hadoop at aadhaarHadoop at aadhaar
Hadoop at aadhaar
 
Building tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsBuilding tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systems
 
Building the Flipkart phantom
Building the Flipkart phantomBuilding the Flipkart phantom
Building the Flipkart phantom
 
Oss as a competitive advantage
Oss as a competitive advantageOss as a competitive advantage
Oss as a competitive advantage
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 

Similar to Uid

Aadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideasAadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideasShrikant Karwa
 
An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.Mindtree Ltd.
 
Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsHp kushal
 
Optimizing agency efficiency for Aadhaar enrolments
Optimizing agency efficiency for Aadhaar enrolmentsOptimizing agency efficiency for Aadhaar enrolments
Optimizing agency efficiency for Aadhaar enrolmentsVinay Kumar
 
Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019Abhishek Ranjan
 
zAadhaar Powerpoint - December 20 - Skylar MG Joyner
zAadhaar Powerpoint - December 20 - Skylar MG JoynerzAadhaar Powerpoint - December 20 - Skylar MG Joyner
zAadhaar Powerpoint - December 20 - Skylar MG JoynerSkylar Joyner, MSW, PHR, PMP
 
CHECKU: comply with KYC / AML, automate identity verification
CHECKU: comply with KYC / AML, automate identity verificationCHECKU: comply with KYC / AML, automate identity verification
CHECKU: comply with KYC / AML, automate identity verificationSIMKOMAT
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET Journal
 
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptxakhil48267
 
15155678396230.pdf
15155678396230.pdf15155678396230.pdf
15155678396230.pdfKabeela.life
 
Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0Lauren Tobin
 
Developing strategic architecture for ‘AADHAAR’ to provide self-sustained...
Developing strategic architecture for ‘AADHAAR’ to provide self-sustained...Developing strategic architecture for ‘AADHAAR’ to provide self-sustained...
Developing strategic architecture for ‘AADHAAR’ to provide self-sustained...National Management Olympiad
 
Cleartech Infosys Capabilities
Cleartech Infosys CapabilitiesCleartech Infosys Capabilities
Cleartech Infosys Capabilitiescleartech
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...apidays
 

Similar to Uid (20)

Aadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideasAadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideas
 
R S Sharma
R S SharmaR S Sharma
R S Sharma
 
An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.
 
Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millions
 
Aadhaar
AadhaarAadhaar
Aadhaar
 
Optimizing agency efficiency for Aadhaar enrolments
Optimizing agency efficiency for Aadhaar enrolmentsOptimizing agency efficiency for Aadhaar enrolments
Optimizing agency efficiency for Aadhaar enrolments
 
Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019
 
zAadhaar Powerpoint - December 20 - Skylar MG Joyner
zAadhaar Powerpoint - December 20 - Skylar MG JoynerzAadhaar Powerpoint - December 20 - Skylar MG Joyner
zAadhaar Powerpoint - December 20 - Skylar MG Joyner
 
CHECKU: comply with KYC / AML, automate identity verification
CHECKU: comply with KYC / AML, automate identity verificationCHECKU: comply with KYC / AML, automate identity verification
CHECKU: comply with KYC / AML, automate identity verification
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
 
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx
 
15155678396230.pdf
15155678396230.pdf15155678396230.pdf
15155678396230.pdf
 
Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0
 
Developing strategic architecture for ‘AADHAAR’ to provide self-sustained...
Developing strategic architecture for ‘AADHAAR’ to provide self-sustained...Developing strategic architecture for ‘AADHAAR’ to provide self-sustained...
Developing strategic architecture for ‘AADHAAR’ to provide self-sustained...
 
General manager | NMO 2019
General manager | NMO 2019General manager | NMO 2019
General manager | NMO 2019
 
Fintech
FintechFintech
Fintech
 
Cleartech Infosys Capabilities
Cleartech Infosys CapabilitiesCleartech Infosys Capabilities
Cleartech Infosys Capabilities
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
 

More from Tech_MX

Virtual base class
Virtual base classVirtual base class
Virtual base classTech_MX
 
Theory of estimation
Theory of estimationTheory of estimation
Theory of estimationTech_MX
 
Templates in C++
Templates in C++Templates in C++
Templates in C++Tech_MX
 
String & its application
String & its applicationString & its application
String & its applicationTech_MX
 
Statistical quality__control_2
Statistical  quality__control_2Statistical  quality__control_2
Statistical quality__control_2Tech_MX
 
Stack data structure
Stack data structureStack data structure
Stack data structureTech_MX
 
Stack Data Structure & It's Application
Stack Data Structure & It's Application Stack Data Structure & It's Application
Stack Data Structure & It's Application Tech_MX
 
Spanning trees & applications
Spanning trees & applicationsSpanning trees & applications
Spanning trees & applicationsTech_MX
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2Tech_MX
 
Set data structure
Set data structure Set data structure
Set data structure Tech_MX
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating SystemTech_MX
 
Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Tech_MX
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pcTech_MX
 
More on Lex
More on LexMore on Lex
More on LexTech_MX
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbmsTech_MX
 
Merging files (Data Structure)
Merging files (Data Structure)Merging files (Data Structure)
Merging files (Data Structure)Tech_MX
 
Memory dbms
Memory dbmsMemory dbms
Memory dbmsTech_MX
 

More from Tech_MX (20)

Virtual base class
Virtual base classVirtual base class
Virtual base class
 
Theory of estimation
Theory of estimationTheory of estimation
Theory of estimation
 
Templates in C++
Templates in C++Templates in C++
Templates in C++
 
String & its application
String & its applicationString & its application
String & its application
 
Statistical quality__control_2
Statistical  quality__control_2Statistical  quality__control_2
Statistical quality__control_2
 
Stack data structure
Stack data structureStack data structure
Stack data structure
 
Stack Data Structure & It's Application
Stack Data Structure & It's Application Stack Data Structure & It's Application
Stack Data Structure & It's Application
 
Spss
SpssSpss
Spss
 
Spanning trees & applications
Spanning trees & applicationsSpanning trees & applications
Spanning trees & applications
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2
 
Set data structure
Set data structure Set data structure
Set data structure
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating System
 
Parsing
ParsingParsing
Parsing
 
Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pc
 
More on Lex
More on LexMore on Lex
More on Lex
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbms
 
Merging files (Data Structure)
Merging files (Data Structure)Merging files (Data Structure)
Merging files (Data Structure)
 
Memory dbms
Memory dbmsMemory dbms
Memory dbms
 
Linkers
LinkersLinkers
Linkers
 

Recently uploaded

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Uid

  • 1. UID
  • 2. CONTENTS  Unique Identification Number & Its Purpose  AADHAAR Project  Authentication  UID System  UID Agencies  Challenges Involved in Implementation  UID Numbering Scheme  Entity IDs  Domain analysis  Business rules  E-R Diagram & Relational Schema  Risks & Database Threats and Attacks involved in UID Project Implementation
  • 3. UNIQUE IDENTIFICATION NUMBER  The Unique Identification Authority of India (UIDAI) is an agency of the Government of India responsible for implementing the AADHAAR scheme, a unique identification project.  It was established in February 2009, and will own and operate the Unique Identification Number database.  The authority aims to provide a unique id number to all Indians.  The authority will maintain a database of residents containing biometric and other data.
  • 4. PURPOSE OF UIDAI  The objective of the project is to determine uniqueness of all individuals within the territory of India.  It will only issue a number which will be delivered to the concerned person's address.  The UIDAI proposes to provide online authentication using demographic and biometric data.
  • 5. AADHHAR NUMBER  The Unique Identification (AADHAAR) Number, which identifies a resident, will give individuals the means to clearly establish their identity to public and private agencies across the country.  AADHAAR Number is provided during the initiation process called enrolment where a resident‟s demographic and biometric information are collected .  Uniqueness of the provided data is established through a process called de-duplication.
  • 6. AADHAAR AUTHENTICATION  AADHAAR “authentication” means the process wherein AADHAAR Number, along with other attributes, including biometrics, are submitted to the Central Identities Data Repository (CIDR) for its verification on the basis of information or data or documents available with it.  UIDAI will provide an online service to support this process.  AADHAAR authentication service only responds with a “yes/no” and no personal identity information is returned as part of the response.
  • 7. AADHAAR authentication will provide several ways in which a resident can authenticate themselves using the system.  At a high level, authentication can be „Demographic Authentication‟ and/or „Biometric Authentication‟.  But, in all forms of authentication the AADHAAR Number needs to be submitted so that this operation is reduced to a 1:1 match.  During the authentication transaction, the resident‟s record is first selected using the AADHAAR Number and then the demographic/biometric inputs are matched against the stored data which was provided by the resident during enrolment process or during subsequent updates.
  • 12. NUMBERING SCHEME The Version Number: o Some digits may be reserved for specific applications. This is an implicit form of a version number embedded into the numbering scheme. o We recommend the following reservations: 0- numbers (a1 = 0) could be used as an “escape” for future extensions to the length of the number. Number Generation: o The numbers are generated in a random, non-repeating se- quence. o The algorithm chosen to generate IDs should not be made public and should be considered a national secret.
  • 13. Lifetime: Individual UID is assigned once, at inception, and remain the same for the lifetime of the person, and for a specified number of years beyond. At this point there is no consideration of reusing numbers.  Entity ID’s: We expect that entity ID numbers (1- numbers) will have different rules for periods of validity and retirement.  The Checksum: There are several schemes possible .The recommend ed scheme is the Verhoeff scheme.
  • 14. ENTITY ID  Institutions like Government departments, schools and even companies can benefit by using a UID like Identifier – this is called an Entity ID.  Since the UID will potentially be used as a primary identifier in several transactions in the financial, health, food distribution, job creation schemes and transactions it is important to assign an entity ID to the service delivery organization.  For instance a financial trans-action to transfer money might take the form: TransferMoney(From_UID, To_UID, Amount);  Where the From_UID could be an entity UID of the block level NREGA entity and the To_UID can be that of the resident to who the amount is being transferred.  This symme-tric treatment of both to and from fields simplifies the end-to- end system.
  • 15. DOMAIN ANALYSIS • The demographic and biometric fields linked to the Aadhaar number and stored in the CIDR would consequently, need to be regularly updated to ensure that the information it stores is both accurate and relevant for authenticating agencies. • The data fields held in the CIDR include mandatory demographic and biometric fields which are central to identity management, as well as additional, optional fields available for ease in communicating with the Resident, and for enabling better service delivery.
  • 16. The UIDAI intends to set up modes through which residents can request for data updates. Registrar enrolment centres: • Most Registrars for the Aadhaar number intend to retain long-term enrolment centres . • These centres would have the enrolment client and devices required for carrying out enrolments, which can also be used for updation purposes. • These centres would also carry out processes such as document verification and handling, as well as verifying Introducer details, which are required for the complete updation solution.
  • 17. National level common updation agency: • The UIDAI can work with the Registrars such as the National Securities Depository Limited (NSDL) where Residents can update their records not just through theUIDAI, but also other service agencies. • The networks of these agencies would be used for recording information update requests.
  • 18. BUSINESS RULES  At the start of the process, the Resident arrives at the centre with his/her Aadhaar letter or his/her Aadhaar number.  He/she fills up an updation request form detailing the specific demographic/biometric information that needs to be updated.  If the information being updated requires supporting documentation, the resident may first have to get documents verified from the Verifying Official.  The Resident then provides the Operator at the centre with the verified documents, or with the Introducer who verifies that the updated information is accurate.
  • 19. The Operator performing the updation checks the Resident‟s Aadhaar letter.  When the Resident provides the updated information, the operator verifies the information matches any documentary evidence/introducer provided.  The Operator enters the Resident‟s information into the software client updating the demographic or biometric information as required.  Both Operator and Resident verify the accuracy of the data that is entered.  The Operator then captures the Resident‟s biometrics to confirm his/her authenticity as well as the Resident's sign-off on the update.
  • 20. The updated information is transferred to the CIDR .  Once it reaches the database, the information is updated in the CIDR, and the information on the update is then communicated to the Resident.
  • 22. TABLES  CIDR(Uid,Cname,Fname,DoB,Address,Eye color,D mark)  ENROLLMENT_AGENCY(E_id,E_name,)  REGISTRAR(R_code,R_name,P_name,R_addr,R_ phno)  OPERATOR(O_id,O_name,Quali,O_addr,O_phno,certif_no,O_gende r)  UIDAI_ADMIN(A_code,A_name,A_gender,A_addr,A_phno,A_email)  CITIZEN(C_id,C_name,C_addr,C_phno,C_dob,C_gender)  BANK(Uid,Branch,Acc_no,Acc_bal,CreditCard)
  • 23. RELATIONAL SCHEMA  CIDR Uid Cname Fname DoB DoE Eye Dmark color  REGISTRAR Reg Rname Pname R_addr R_phno Code  ENROLLMENT_AGENCY E_id E_name O_name Quali O_Addr Cert_no
  • 24. UIDAI_ADMIN A_code A_name A_gender A_addr A_phno A_email  BANK Uid Branch Acc_no Acc_bal CreditCard  CITIZEN C_id Cname C_addr C_phno C_dob C_gender
  • 25. CHALLENGES IN INDIA IDENTITY CARD
  • 26. RISKS INVOLVED  Adoption risk  A critical mass is required for the participation of service providers  Political risk  Support from state and local governments is critical  Enrollment risk  Enough touch points in rural areas and enrolling 60,000 newborns every day  Risk of scale  Administration and storage of ~1B records  Technology risk  Authentication, de-duplication and data obsolescence  Privacy and security risk  Biometric data security  Sustainability risk  Maintaining the initial momentum over a longer term
  • 27. RISKS IN VARIOUS STAGES  Collection Data leakage Scenarios across various Registrars and Enrollment agencies: • Intentional or unintentional compromises • Logical or physical security compromise • Third party attacks Integrity and accountability of Registrars and enrollment agencies Reliance on multiple vendors increases vulnerabilities
  • 28. RISKS IN VARIOUS STAGES ( CONT..)  Transmission Need for secured communication channels: VPN, SSL- VPN, MPLS clouds Encryption of the data: strong encryption required for securing biometrics Key Management: departmental interactions, coordination Non-Repudiation: attack vectors like a man-in-the- middle attack
  • 29. RISKS IN VARIOUS STAGES ( CONT..)  Storage Management of roughly 10,000 TB of sensitive information spread across the country, in addition to storage in CIDR Accountability of users : data base administrators, network administrators, application owners, third party employees Accountability and assurance of people working with registrars and sub-registrars
  • 30. DATABASE THREATS & ATTACKS Spoofing Tampering Trojan horse attacks Masquerade attack Overriding Yes /No response
  • 31. CONCLUSION  Unique Identification System will be beneficiary to the citizens as it is a unique number which contains basic information of every person.  After the ID will be issued there is no need to carry driving license, voter cards, pan card, etc for any govt. or private work.  But to some extent it is harmful to the general public as all the data related to them is stored on computers and can be misused by hackers if the multiple security strategies will not be adopted.
  • 32. The UID authority in specific should make sure that they have the highest standards of integrity, openness, transparency and process in all stages of UID System.  The UID project should not become compulsory until there is an established judicial overview to ensure that the privacy rights of citizens are not unlawfully violated.