Preview

AADHAR AS IN MIS

Better Essays
Open Document
Open Document
1038 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
AADHAR AS IN MIS
MIS ASSIGNMENT AADHAR AS IN MIS

Submitted By, Dhiya Ann Mathew S2 mba

INTRODUCTION

The UIDAI has been setup by the Government of India with a mandate to issue a unique identification number to all the residents in the country. A key requirement of the Aadhaar is to minimize/eliminate duplicate identity to improve the efficacy of the service delivery. Biometrics features are selected to be the primary mechanism for ensuring uniqueness.

No country has undertaken to build a national registry at the scale and accuracy as UIDAI initiative. Nature and diversity of India's working population adds another challenge to achieving uniqueness through biometrics features. Like other technology fields such as telecommunication, we do not have experience like developed countries to leverage for designing UIDAI's biometric systems. For example, the largest existing biometrics database in the world is one order smaller in magnitude than India's needs.

Therefore, it is necessary to create a UIDAI Biometrics Centre of Competence (UBCC) that focuses on the unique challenges of UIDAI.

The Unique Identification Authority of India (UIDAI), is an agency of the Government of India responsible for implementing the AADHAARscheme, a unique identification project. It was established in February 2009, and will own and operate the Unique Identification Number database.[1] The authority aims to provide a unique id number to all Indians, but not smart cards.[2] The authority will

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Aliahmed

    • 660 Words
    • 3 Pages

    identification and the verification of identity claims. It brings together the promise of other biometric systems, which…

    • 660 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Access Control

    • 661 Words
    • 3 Pages

    The components of a biometric device usually include an input device, a database containing potential matches, and a control program to determine the action based on authentication results. Different configurations exist for various applications, however essentially the core components vary very slightly.…

    • 661 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Systems

    • 491 Words
    • 2 Pages

    are the most reliable but most people hate the idea of a laser shooting into…

    • 491 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The design has two main objectives. The first objective is to increase the level of security when identifying users and to reduce the rate of match and non-match occurrences. The second objective is to integrate the three biometrics and set the threshold that decides a match or a non-match.…

    • 553 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Abstract: Nowadays almost everyone is using smart phones. They are becoming an essential tool in human being’s everyday life. They are not only used for mere communication such as calling or sending text messages; however, they are also used in applications such as for accessing internet, receiving and sending emails and storing documents. As a result of this, not only phone numbers and addresses are stored in the mobile device but also financial information and business details which definitely should be kept private. And if the device is being stolen, each and every information is in the hands of the new owner. That’s why; the biggest challenge is the security. When it is necessary to confirm the user identity on systems to perform a given operation, the term User Authentication is used. Traditionally, people prove their identity by providing passwords. The average person today has about 25 password protected accounts (according to Microsoft study), more passwords than they can reasonably be expected to remember. People compensate by using the same password for multiple accounts, and by choosing passwords that are easy to remember. But, unfortunately easy to remember means easy to guess. Other user select difficult passwords but then write them down where unauthorized eyes can find them. That’s why, identity based on what you know (login and password) and what you have (ID cards) can be easily stolen. As we want trust (security), the notion what you are is a new opportunity to user authentication. Biometric Authentication is answer for that. Biometric is a characteristic of human being that distinguishes one person from another. For example, finger prints, retina, face recognition, etc. This can be used for identification or verification of identity. Keywords: FAR, FRR, ROC, EER, FTE, FTC. B.…

    • 2535 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Share on linkedin Share on facebook Share on twitter Share on email 156 INTRODUCTION The National Identity Management Commission (NIMC) was established by Act No. 23 of 2007 primarily to foster the orderly development of an identity sector…

    • 2143 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Jain, A.K., Hong, L. and Pankanti S. "Biometric Identification," Communications of the ACM, Vol. 43, No.2, pp. 90 – 98, February 2000.…

    • 1900 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Fast Haar Transform

    • 13040 Words
    • 53 Pages

    In many real-world applications, uni-modal biometric systems often face significant limitations due to sensitivity to noise, interclass variability, data quality, non universality, and other factors. Attempting to improve the performance of individual matchers in such situations may not prove to be highly effective. Multi-biometric systems seek to alleviate some of these problems by providing multiple pieces of evidence of the same identity. These systems help achieve an increase in performance that may not be possible using a single-biometric indicator.…

    • 13040 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    Support Consultant

    • 1263 Words
    • 6 Pages

    Project Description: Unique identification project was initially conceived by the planning Commission as an initiative that would provide identification for each resident across the country and would be used primarily as the basis for efficient delivery of welfare services. It would also act as a tool for effective monitoring of various programs and schemes of the Government.…

    • 1263 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aadhar Card Case Study

    • 855 Words
    • 4 Pages

    Then, the user needs to select. As to how he or she may download the e-Aadhar. There are two options to choose from. One is the Enrolment Id and the other is the Aadhar number.…

    • 855 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    poop

    • 1058 Words
    • 5 Pages

    Submitted by: ddee428 3/8/2013 When a Password Just Isn’t Enough: the Use of Fingerprint Readers to Secure Information WHEN A PASSWORD JUST ISN’T ENOUGH: THE USE OF FINGERPRINT READERS TO SECURE INFORMATION Executive Summary…………………………………………â…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Apartment - title

    • 10765 Words
    • 44 Pages

    According to Harbron (1988), one way of attaining security of a certain area is by means of biometrics. Jain et. al. (1999) identified that biometric system can operate verification and identification mode. It is very important to make our place secured in many aspects to prevent from encroachment issues.…

    • 10765 Words
    • 44 Pages
    Powerful Essays