Enrollment to Authentication Client and Station Overview UIDAI Sanjay Jain Jagadish.

Slides:



Advertisements
Similar presentations
Installation & User Guide
Advertisements

RFID Access Control System March, 2003 Softrónica.
The Complete Visitor Management System
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Web Plus Overview Division of Cancer Prevention and Control National Center for Chronic Disease Prevention and Health Promotion CDC Registry Plus Training.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Version: Release date: 2 nd May, Introduction The 2.0 version of the Aadhaar Enrolment Client, which is also referred to as ECMP, i.e.
Version: Release date: 2 nd May, The 2.0 version of the Aadhaar Enrolment Client, which is now referred to as ECMP, i.e. Enrolment Client.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Aadhaar Enabled Payment System(AEPS) for Accounts in India Post
Mobile Device must be registered with web application for authentication If date/time of device is changed it requires online authentication Internet.
Graduate System for Management of Admissions, Alumni & Records Tracking (Grad SMAART) January 8, 2007 Office of Graduate Studies.
Microsoft Passport Waldemar Swiercz.
Introduction   Business Scenario Finacle CBS Process Overview Step by Step Process Demonstration Summary.
Jeevan Pramaan (Digital Life Certificate for Pensioner)
PMI Inventory Tracker™
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
OSS RETAILS PVT LTD WITH PAY POINT INDIA NETWORK PVT LTD
Systems Analysis Chapter 8 P 94 to P 101
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
EPayment ePayment Introduction It is the process of electronic transfer of bill data between booking and payment office Department of Post collects.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
ViciDocs for BPO Companies Creating Info repositories from documents.
Creating Unique IDs for 1.2 Billion Residents of India Unique ID Authority of India Identity Management – A National Perspective.
Introduction to Aadhaar. 2 What it is: A number (12 digits) For every individual Enables identification, and is for every resident Will collect and record.
Explain the purpose of an operating system
1 Training Program on. 2 Objectives of the Programme Explain the usage of the different functions of the child enrolment client lite -CEL Explain the.
Windows Server ® 2008 R2 Remote Desktop Services Infrastructure Planning and Design Published: November 2009.
1 NTTC/NTC ERO Training 2011 Tax Year 2007 ERO TRAINING ELECTRONIC RETURN ORIGINATOR (ERO) (Transmitter in Tax-Wise)
Windows Server ® 2008 R2 Remote Desktop Services Infrastructure Planning and Design Published: July 2008 Updated: February 2011.
Forms Training. Tested Formatted The Template Library.
Artwork Production Workflow And Approval Management For Ad Agency Networks And Design Agencies Future ready online application with user friendly features.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Biometrics Authentication Technology
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
AADHAR TECHNOLOGY Gurneet Kaur, Nitin Mangal. What is Aadhar?  Unique Identification Number linked to a person’s demographic and biometric information.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 1 4 th November, Module 1 4 th November, 2010 Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain.
Use of Aadhaar Card to facilitate the process of Job and Admission Applications. Use of Aadhaar Card to enforce Pollution Checks on vehicles. Use.
OGS Procurement Services Group 2007 State Purchasing Forum IT Procurement.
Unique Identification Authority of India Aadhaar Authentication Feb’
Process Orientation for Enrolment Agencies UID Authority of India August, 2010.
Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain the UIDAI Eco-system Interpret the benefits of Aadhaar.
Installation and Configuration of Aadhaar Enrolment Client
Module 1 Version:1.3_ Release date:
Objectives In this module you will learn about: The hierarchy of organizations in the enrolment process The enrolment process flow The First Mile.
J EEVAN P RAMAAN P ATRA / D IGITAL L IFE C ERTIFICATE (DLC)
Session 3 -2 Session 3 FAA Access to CPS Online – Designed for Efficiency.
Welcome We will wait a few minutes for participants to log on and call in. –Call in: –Pass code: *6 to mute your line #6 to.
Transfer of digitized enrolment data from the enrolment station to the CIDR of the UIDAI. Currently through memory sticks via India Post. At a later stage:
Technology and User Support Breakout Session SVRS Conference for Wisconsin County Clerks May 4, 2005 – May 5, 2005.
A National e-Authentication Service
Using Technology to provide an innovative sustainable model for delivery of Cashless Health Insurance                              r r r r r y y g s s.
ELECTRONIC RETURN ORIGINATOR (ERO) (Transmitter in Tax-Wise)
ESign Aashutosh.
Authentication.
NAME:NASHTE AJAYKUMAR KALYAN
ICT meeting Business needs
Tenant Access Portal Trainer: Krissy Gray. Tenant Access Portal Trainer: Krissy Gray.
Fun gym Cambridge Nationals R001.
Fun gym Cambridge Nationals R001.
Aadhaar Authentication - Introduction
Technical Capabilities
SEZ and Port, Mundra (APSEZ) Visitor Entry Process
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

Enrollment to Authentication Client and Station Overview UIDAI Sanjay Jain Jagadish

Agenda Overview Aaadhaar Enrollment Station – Sneak Preview Unveiling the Aaadhaar Enrollment Client Software Aaadhar Authentication Overview Questions

Model Enrollment Station Objectives Objective – Create a test bed to evolve best practices. – Output- Model Enrollment Station Specifications. – Evolve designs for various enrollment requirements. – Evolve Efficiency Improvements- Standardizing Components Layout, Ergonomics, Environmental Conditions Power Requirements. – Improving Mobility – Through a exclusively designed Kit Optimized Packaging leading to Ready to Ship branded casing- Ready for Unpack Or In Box Operation Improvements to suite different requirements.

Station Overview Requirements of a Enrollment Station – Appropriately lit room – A Table( minimum of 2’x3’) – Regulated Power supply(minimum of 4 power outlets) – Seating for resident and officer and assistant. – Seating for Waiting residents.

Enrollment Set up Overview Components of Enrollment station – PC (laptop, Desktop), – Camera for Face photograph. – Fingerprint Slab scanner – Iris Camera – Laserjet Printer – Additional Monitor – Light source for Face. – White Screen for backdrop. – A Carry Case (Preferable)

Enrollment Devices Layout - I Officer Resident

Enrollment Devices Layout -II Officer Resident

Enrollment Kit Highlights Suitcase for Carry all sensitive equipments. Rugged case Optimized layout for inbox operation.

Future Work

Enrollment Kit- Preview

Enrollment Client Overview

Aadhaar Enrolment Client Software Product Overview 14

Enrolment Client Software A packaged software product provided by UIDAI – currently in version 1.1 A fully productized approach – Fully version controlled – Features mapped to various releases – Bug fixes and patch releases – Automatic Updates – Supported by technical support team UIDAI will release new versions regularly for continuous update of new features – Features defined by UIDAI – Features requested by users 15

Product Lifecycle 16 Product Features, Issues, etc. Registrar Users UIDAI Team Other Users EA Users Release 1Release 2Release 3 Product management team creates release plan which continuously updated Version Tree Bug fixes released as patches and reconciled to main version branch on a continuous basis

Enrolment Process CIDR Enrolment Service Biometric De-duplication UID Assignment Letter Delivery & Verification Biometric De-duplication UID Assignment Registrar Logistics Partner (India Post) Customer Contact Center Information/ Issue resolution (Option A) Enrolment Data to CIDR (Option B) Enrolment Data to CIDR Aadhaar letter or Rejection letter Aadhaar Number And rejection data Enrolment Agency Enrolment Processing Automatic Synch (software/data) Data Capture

Enrolment Client Features User Authentication – Role based user authentication and authorization – Application specific login. Users must be pre-registered with CIDR Pre-Enrolment Support – Capability to upload pre-existing electronic demographic data to enrolment client – Database that may be used for this purpose include PDS, NREGA, RSBY, Passport etc. Demographic data capture – Textual data entry of the resident based on supportive documents like Proof of Identification/Address (POI/POA) Basic Transliteration – Conversion of demographic data from English to any Indian official language supported – Language to be converted into is selected as a process of client configuration Pin code to Region Code mapping – Supports client with master data file to enable correct mapping from pin code to state, district & Village/Town/City 18

Enrolment Client Features Local Data Validation – Data validation based on business rules on date of birth, address & relationship Biometric data capture & quality check – Integration with biometric devices to capture Face, IRIS, and Fingerprint – Vendor neutral quality check to meet quality criteria set by UIDAI Enrolment Receipt and Acknowledgement Form – Provide resident an enrolment receipt with an enrolment receipt number, date/time & details of data capture – Provide operator a copy of the acknowledgement form signed by resident Secure data storage and data upload – Secure transfer of data from enrolment client to CIDR through an offline device like memory stick/ optical storage Automatic Sync with Server – Auto delete of enrolment data at client through online communication with CIDR – Automatic master data and software updates 19

Aadhaar Authentication Overview Product Overview 20

Aadhaar Authentication Overview

AADAAR Authentication

Authentication(Auth) is a service provided by UIDAI. Authentication Service establishes identity of residents. (authenticates) Enrollment is a prerequisite for Authenticating residents. i.e. Auth Service authenticates only enrolled residents. AADAAR Auth Service is online service..

Authentication Authentication is a service offered by UID. Authentication service will be used by various Authenticators. Authentication Systems will be implemented according to UIDAI specifications by – Authenticators. – Terminal device vendors.

Authentication Flow Requests a Service from service provider Needs to Verify Identify Requests for Auth Information Resident provides UID # and other auth information Authenticator Requests for Auth Services from UIDAI UIDAI Verifies the information Provided and replies with Verification Requested Service is delivered post authentication

Authentication-Technology View

Components of Auth Station Finger Print Scanner laptop Mobile phone with Finger Print Scanner POS Terminal

Authentication API Protocl Auth is a Stateless service over HTTPS with mutual SSL authentication Encryption of data at the time of capture Auth Combination of allowed along with UID are – Biometric – Demographic – As well as PIN/DPIN

Devices used for Authentication Public Devices Not Registered with UID Uses software based security methods recommended by UIDAI Examples: Personal computers Shared computers Devices on secure networks Public Devices Not Registered with UID Uses software based security methods recommended by UIDAI Examples: Personal computers Shared computers Devices on secure networks Managed Devices Registered with UID Managed with keys from UID and AUA. Implements UIDAI terminal security specs Examples: Mobiles Registered POS Terminals PC/mobiles Managed Devices Registered with UID Managed with keys from UID and AUA. Implements UIDAI terminal security specs Examples: Mobiles Registered POS Terminals PC/mobiles

Authentication using Public Devices UID will provide Auth Client Library for packaging and encrypting auth data block. Digitally signed UIDAI public key will be provided. Data block is encrypted using session key using AES-128 algorithm. Session key is encrypted with UID public key. For public devices, use of OTP recommended.

Next Steps Questions. Look out for AADHAAR Auth specification, UID developer Website Partner with UID to develop Applications and participate in Pilots.

Thank You