AADHAR TECHNOLOGY Gurneet Kaur, Nitin Mangal. What is Aadhar?  Unique Identification Number linked to a person’s demographic and biometric information.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Pearson Access for SAC’s
1 Presented by July-2013, IIM Indore. 2  The Unique Identification (AADHAAR) is a 12 digit Number, which identifies a resident, will give individuals.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
Digital India.
Jeevan Pramaan (Digital Life Certificate for Pensioner)
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Setting up a National Warehouse of Official Statistics in India P C Mohanan Deputy Director general National Statistical Organisation Ministry of Statistics.
Database Systems: Design, Implementation, and Management Ninth Edition
Chapter 10: Authentication Guide to Computer Network Security.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Creating Unique IDs for 1.2 Billion Residents of India Unique ID Authority of India Identity Management – A National Perspective.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
Chapter 16 IT Controls, Asset Protection, and Security.
Database Design - Lecture 1
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
The confidential information contained in this document is the sole propriety of Morpho. It must not be copied or disclosed without prior written consent.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
Hands-On Microsoft Windows Server 2008
Introduction to Aadhaar. 2 What it is: A number (12 digits) For every individual Enables identification, and is for every resident Will collect and record.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Database Application Security Models Database Application Security Models 1.
PIV 1 Ketan Mehta May 5, 2005.
1 Training Program on. 2 Objectives of the Programme Explain the usage of the different functions of the child enrolment client lite -CEL Explain the.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
Technology as enabler for electronic benefit transfer – Case of Micro ATM, BC, Aadhaar Authentication System November 29,
Chapter 12 Integrated Information Systems for Chronic Care: A Model Linking Acute and Long Term Care.
Biometrics Authentication Technology
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
1 X.509-style PKI Revolves around the distribution and management of digital identity certificates Invented in 1978 to facilitate message encryption In.
Academic Year 2014 Spring Academic Year 2014 Spring.
Using Public Key Cryptography Key management and public key infrastructures.
Module 1 4 th November, Module 1 4 th November, 2010 Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Use of Aadhaar Card to facilitate the process of Job and Admission Applications. Use of Aadhaar Card to enforce Pollution Checks on vehicles. Use.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Unique Identification Authority of India Aadhaar Authentication Feb’
Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain the UIDAI Eco-system Interpret the benefits of Aadhaar.
Enrollment to Authentication Client and Station Overview UIDAI Sanjay Jain Jagadish.
The Aadhaar project Unique Identity and Its Positive Externalities for Inclusiveness 16 th January 2013 UIDAI
Module 1 Version:1.3_ Release date:
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Document Verification in AADHAAR
Transfer of digitized enrolment data from the enrolment station to the CIDR of the UIDAI. Currently through memory sticks via India Post. At a later stage:
Jordan Population and Housing Census 2015
NATIONAL ACADEMIC DEPOSITORY
Using Technology to provide an innovative sustainable model for delivery of Cashless Health Insurance                              r r r r r y y g s s.
Segmap Solutions Mapping segments.
ESign Aashutosh.
Authentication.
Unique Identification Number Project
NATIONAL ACADEMIC DEPOSITORY
Fun gym Cambridge Nationals R001.
Fun gym Cambridge Nationals R001.
Basic Knowledge of UIDAI and Aadhaar
Data Quality By Suparna Kansakar.
Legal Framework for Civil Registration, Vital Statistics
Autonomous Aggregate Data Analytics in Untrusted Cloud
Aadhaar Authentication - Introduction
Beneficiary Identification System (BIS)
Presentation transcript:

AADHAR TECHNOLOGY Gurneet Kaur, Nitin Mangal

What is Aadhar?  Unique Identification Number linked to a person’s demographic and biometric information.  Mission is full enrolment of all Indian residents, with special focus on poor and under privileged.  One of the main aim is to improve service delivery to the poor.

What problem Aadhar solves?  Existing identity databases are laden with problems of fraud and duplicate entries.  Aadhar will prevent this by ensuring proper information verification.  Suitable measures will be taken to include people lacking identification documents.

Aadhar Architecture

Entities & Roles  UIDAI  Will develop Aadhar database initially  Will provide standards to be followed  Registrars  Operate to provide enrolment services  Eg. Dept in state govt, banks, telephone companies  Enrolment agency  Provide necessary conditions for enrolment of residents  Collect demographic data prior to enrolment drive

Entities & Roles  Introducer  Authorized by UIDAI or Registrar  Mechanism introduce to allow for missing documents  Typically officials, school teachers, aanganwadi folks  Resident  Indian national who wishes to obtain UIDAI

Features  Enrolment on proper verification  Demographic and biometric information  Central ID Repository (CIDR)  A central UID database will be maintained  Leverage existing infrastructure  Partner with agencies to act as ‘Registrars’ who will issue Aadhar after connecting with CIDR

Features (contd)  Online authentication  Provide way for agencies to compare data with CIDR  Resident privacy  All transactions with CIDR result only in ‘Yes’ or ‘No’  Security  Aadhar database will use latest security features

Network Security  Sensitive data flows over the network between the registrars and the UIDAI  Data encrypted using the public key provided by the registrar.  Registrar maintains the pair securely.

De-Duplication  Comparison using biometric data (iris and ten fingerprints) – only one chance to enter database.  Enormous computing power needed – large “grid” of networked computers will be used.  Complex algorithms to quickly compare biometrics have been procured from specialist vendors.

Application hosted in CIDR  Enrolment – serves client enrolment request  Authentication – identity authentication services  Fraud Detection – misrepresentation of information  Administrative – user management, role, access  Analytics and Reporting – statistics, aggregate level  Information – information about the system  Contact Center – query the database  Logistics – data, printing

UBCC  UIDAI Biometric Centre of Competence  To design biometric systems that enables India to achieve uniqueness in the national registry  UBCC will specify initial biometric systems and enhance features at regular intervals  Constantly innovate to push the state of the art in biometrics to achieve UIDAI’s objectives.