Fayoum University Faculty of Engineering Electrical Engineering Department E-voting system Using Smart Card Under the supervision Of: Dr. Magdy Amer.

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

Building Portals to access Grid Middleware National Technical University of Athens Konstantinos Dolkas, On behalf of Andreas Menychtas.
Categories of I/O Devices
Mobile Agents Mouse House Creative Technologies Mike OBrien.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 7. Systems Software 1 System Software This software is used to provide the.
ASU Real-Time Operating System. Supervised by: Dr. Mohammed Sobh.
What iS RMI? Remote Method Invocation. It is an approach where a method on a remote machine invokes another method on another machine to perform some computation.
Java: History and Introduction (Lecture # 1). History… Java – Based on C and C++ – Developed in 1991 for intelligent consumer electronic devices – Green.
Advanced Java Class Network Programming. Network Protocols Overview Levels of Abstraction –HTTP protocol: spoken by Web Servers and Web Clients –TCP/IP:
1 CS1001 Lecture Overview Java Programming Java Programming Midterm Review Midterm Review.
An 8051 Based Web Server Project by Mason Kidd Advised by Dr. Schertz.
Chapter 13 Physical Architecture Layer Design
1 CS 502: Computing Methods for Digital Libraries Lecture 22 Repositories.
CS CS 5150 Software Engineering Lecture 13 System Architecture and Design 1.
Distributed Information Systems - The Client server model
System Components Hardware overview for Apollo ACS.
Building an Application Server for Home Network based on Android Platform Yi-hsien Liao Supervised by : Dr. Chao-huang Wei Department of Electrical Engineering.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Process-to-Process Delivery:
1 Input/Output. 2 Principles of I/O Hardware Some typical device, network, and data base rates.
Introduction to Java CSIS 3701: Advanced Object Oriented Programming.
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
Introduction to Computers Personal Computing 10. What is a computer? Electronic device Performs instructions in a program Performs four functions –Accepts.
Basic Input Output System
Beyond DHTML So far we have seen and used: CGI programs (using Perl ) and SSI on server side Java Script, VB Script, CSS and DOM on client side. For some.
Computers & Employment By Andrew Attard and Stephen Calleja.
Presentation on Osi & TCP/IP MODEL
Glink: GCOS e-business in an application server architecture Summit 2000, Jim Gallagher.
Java Omar Rana University of South Asia. Course Overview JAVA  C/C++ and JAVA Comparison  OOP in JAVA  Exception Handling  Streams  Graphics User.
Student Learning Environment on the World Wide Web l CGI-programming in Perl for the connection of databases over the Internet. l Web authoring using Frontpage.
E0001 Computers in Engineering1 The System Unit & Memory.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
第十四章 J2EE 入门 Introduction What is J2EE ?
A Comparison of Java RMI, CORBA, and Web Services Technologies for Distributed SIP Applications Mark D. Hanes Stanley C. Ahalt Ashok K. Krishnamurthy Department.
Database Application Security Models Database Application Security Models 1.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
CS 390- Unix Programming Environment CS 390 Unix Programming Environment Topics to be covered: Distributed Computing Fundamentals.
CYBERLAW 2002 Professor Fischer Class Four: Introduction to Internet Technology September 9, 2002.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Prepared By Ahmed Obaid Wassim Salem Supervised.
CS4273: Distributed System Technologies and Programming Lecture 13: Review.
Computer Architecture Lecture10: Input/output devices Piotr Bilski.
Outline Overview Video Format Conversion Connection with An authentication Streaming media Transferring media.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
1 MSCS 237 Overview of web technologies (A specific type of distributed systems)
RL78 Code & Dataflash.
CS CS 5150 Software Engineering Lecture 13 System Architecture and Design 1.
Hwajung Lee.  Interprocess Communication (IPC) is at the heart of distributed computing.  Processes and Threads  Process is the execution of a program.
Department of Industrial Engineering Sharif University of Technology Session# 10.
© Paradigm Publishing, Inc. 4-1 Chapter 4 System Software Chapter 4 System Software.
Java Card Technology Ch08: Working with APDUs
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Java Web Server Presented by- Sapna Bansode-03 Nutan Mote-15 Poonam Mote-16.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
Direct Memory Access (DMA) Department of Computer Engineering, M.S.P.V.L. Polytechnic College, Pavoorchatram. A Presentation On.
Glink for Java: applet, application and an API for integrating access to Bull, IBM, UNIX and Minitel systems with your Java based e-business applications.
Amdahl’s Law & I/O Control Method 1. Amdahl’s Law The overall performance of a system is a result of the interaction of all of its components. System.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
Distributed Computing & Embedded Systems Chapter 4: Remote Method Invocation Dr. Umair Ali Khan.
1. Presentation Agenda  Identify Java Card Technology  Identify Elements of Java Card applications  Communicating with a Java Card Applet  Java Card.
Part II Software When developing software there are several particularities to be aware of: Java is widespread used because of the platform independence.
Distributed Computing
Operating Systems (CS 340 D)
AT91RM9200 Boot strategies This training module describes the boot strategies on the AT91RM9200 including the internal Boot ROM and the U-Boot program.
Process-to-Process Delivery:
Middleware and ORB CS 314 Operating Systems
Chapter 13: I/O Systems.
Middleware and ORB CS 314 Operating Systems
Presentation transcript:

Fayoum University Faculty of Engineering Electrical Engineering Department E-voting system Using Smart Card Under the supervision Of: Dr. Magdy Amer

Group names Hassan Fadl Hassan Mohamed Ahmed abd al azeez Mohamed Fatehe Soliman Mohamed Zaki Shehata 4 th year electronics

E-Voting Overview What is E-voting? The Advantage Accuracy Democracy Privacy Verifiability Convenience Flexibility Mobility

Database Server Citizen Pc Checking To Access Reader Citizen Pc Checking To Access Reader E-Voting System Box ballot Web Server

Project idea first glance Architecture of the system –A database system. –A web portal. –A computer with a Java Smart Card based system in each voting center. –A box ballot in each voting center containing all the votes.

Project details physical characteristics dimensions and location of the contacts electronic signals and transmission protocols industrial commands for interchange application identifiers

Smart Card

the primary tasks of a smart card Transferring data. Controlling the execution of commands. Managing files. Managing and executing program code

Why use a Java smart card? High level language Security Hardware independent SCQL Store multiple application after issuing

The Smart Card Memory System 1.Internal memory –RAM –EEPROM (512 byte) –Flash EEPROM 2.External memory –EEPROM (24LC64)

The smart card OS (In concept of layering )

Operating System Layers 1.Physical layer: Employs only the logic values 0 and 1. 2.Data link layer: provides an error-free connection at higher level protocol called (T=0). 3.Application layer: communicate between application on the card and application on the terminal throw APDU.

Smart Card Contact Points

Transmission Protocols

ANSWER TO RESET (ATR) It contains various parameters transmission protocol Max Speed of the card Operating System type Chip Type Memory Size Other information that the host needs to know about the card.

Smart card communication model

Structure of a command APDU Structure of response APDU Command and response APDU cases

Software technique

System Connection

Applet Security

Applet servlet connection techniques There are four techniques : –1 RMI ( Remote Method Invocation) –2 CORBA (Common Object Request Broker Architecture) –3 SOCKET non http – 4 HTTP connection

Citizen Architecture

Judge Architecture

Manager Architecture

Data Base Architecture

With Thanks

System in operation

User interface Simple interface to Egyptian voter He simply enters his serial number to save privacy.comparing this number by the serial on his smart card.the judge responsible for open this page to every voter.

Error handling There are two types of error to be handled –First error

Second error

Correct If he enters his correct serial number. he can choose from candidates

After choosing After choosing. his choice will be sent to database in the table of citizen. every citizen is distinguished by his serial number not by his national number. He will get a confirmation message.

Administrator The administrator is responsible to fill all tables in the database. he first prepares the commissions to certain type of voting.

Fills commissions He fills data of all commissions in all Egypt in two modes

Judge He also sets the judge of every commission and the commission managers

enter candidates He also set the data of all candidates. Every voting these data will be changed These data will be saved in database

commissions manager The commissions manager can control all commissions in Egypt

commissions manager Every commission has a judge to control this commission The database can output all the results of candidates by counting number of serials that have chosen certain candidate. do the same for all candidates then compare them find maximum.