Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1. INTRODUCTION
1.1 Purpose 1.1.1 The Software is for the securing ATM transaction while shopping. 1.1.2 It maintains two levels of users: 1.2 Scope It can be used in any bank along with any shop to secure transaction while shopping.This will help to implement this web application in real time system. 1.3 Technologies to be used This project will be an application to be developed in ASP.NET having Ms SQL Server as backend. 1.4 Overview
Administrator Level User Level Login page. User registration details Maintaining all the records of customers. Random pin generation
Database Design (Ms SQL Server) Form Design (asp.net) Coding (vb.net and c#)
Project is related to securing ATM transaction while shopping. The project maintains two levels of users:Administrator Level User Level-Data Entry
Maintaining records of customers Maintaining registered pen drive. Maintaining a Mini statement Maintaining all the transactions that took place till date Maintaining my account details
2. OVERALL DESCRIPTION
2.1 Product Perspective 2.1.1 System Interfaces: None 2.1.2 User Interfaces: 2.1.2.1 Login screen 2.1.2.2 Registration screen 2.1.2.3 Record update screen 2.1.2.4 Mini statement screen 2.1.2.5 My account screen 2.1.3 Hardware: 2.1.3.1Processor: 2.1.3.2 Memory: 2.1.3.3 Network: 2.1.4 Software: 2.1.4.1 Front End: 2.1.4.2 Backend: ASP.NET MY SQL DATABASE 1.0 GHz and above 256 MB RAM Active Internet Connection
3. SPECIFIC REQUIREMENTS
3.1 User Interfaces: 3.1.1 Login screen: i) User name ii)Password iii) Role: Administrator/customer 3.1.2 Registration screen: i) Name ii) Address iii)Date of birth iv)Opening balance v)Pin number vi)Drive serial number 3.1.3 Record update screen i)Patient name ii)Address iii)Phone number
3.2 Hardware: 3.2.1 Processor: 3.2.2 Memory: 3.2.3 Network: 1.0 GHz and above 256 MB RAM Active Internet Connection
3.3 Software: 3.3.1 Front End: 3.3.2 Backend: ASP.NET MY SQL DATABASE
3.4 System Features: 3.4.1 Project is related to ATM security. 3.4.2 The project maintains two levels of users: Administrator Level User Level-Data
3.4.3 Main facilities available in this project are: Random pin generator Sms Portal
3.5 Software System Attributes: 3.5.1 Security: The application will be password protected. The main reason for developing this application is security with the help of a random pin generator function 3.5.2 Maintainability: The application will be designed in maintainable manner. It will be able to incorporate new requirements in individual modules. 3.5.3 Portability: The system will be easily portable on any window based system that has MS-SQL server installed. 3.6 Logical Database Requirements: 3.6.1 Customer Information like name, address,phone number,D.O.B,drive number 3.6.2 User account Information
CHAPTER 1: INTRODUCTION
1.1 Purpose
1.1.1 The Software is for the securing ATM transaction while shopping. 1.1.2 It maintains two levels of users:
1.1.3 The Software includes: Login page. User registration details. Maintaining all the records of customers.
1.2 Scope
It can be used in any bank along with any shop to secure transaction while shopping. This will help to implement this web application in real time system
1.4 Overview
Project is related to securing ATM transaction while shopping. The project maintains two levels of users:
Administrator Level 5
Maintaining records of customers Maintaining registered pen drive. Maintaining a Mini statement Maintaining all the transactions that took place till date Maintaining my account details
Technology Used:
Front End Backend : : ASP.NET MY SQL DATABASE
Software:
Internet Browser Visual studio
3 Feasibility Study
Depending on the results of the initial investigation the survey is now expanded to a more detailed feasibility study. FEASIBILITY STUDY is a test of system proposal according to its workability, impact of the organization, ability to meet needs and effective use of the resources. It focuses on these major questions:
1. What are the users demonstrable needs and how does a candidates systemmeet them?
2. 3. 4.
What resources are available for given candidate system? What are the likely impacts of the candidate system on the organization? Whether it is worth to solve the problem?
During feasibility analysis for this project, following primary areas of interest are to beconsidered. Investigation and generating ideas about a new system does this. Steps in feasibility analysis Eight steps involved in the feasibility analysis are:
Form a project team and appoint a project leader. Prepare system flowcharts. Enumerate potential proposed system. Define and identify characteristics of proposed system Determine and evaluate performance and cost effective of each proposed system. Weight system performance and cost data. Select the best-proposed system Prepare and report final project directive to management.
Front-end selection:
It must have a graphical user interface that assists employees that are not from ITbackground. Scalability and extensibility. Flexibility. Robustness. According to the organization requirement and the culture.
Back-end Selection:
Multiple user support. Efficient data handling. Provide inherent features for security. Efficient data retrieval and maintenance. Stored procedures. Popularity. Operating System compatible. Easy to install. Various drivers must be available. Easy to implant with the Front-end.
10
Economic justification is generally the Bottom Line consideration for most systems. Economic justification includes a broad range of concerns that includes cost benefit analysis. In this we weight the cost and the benefits associated with the candidate system and if it suits the basic purpose of the organization i.e. profit making, the project is making to the analysis and design phase. The financial and the economic questions during the preliminary investigation areverified to estimate the following: The cost to conduct a full system investigation. The cost of hardware and software for the class of application being considered. The benefits in the form of reduced cost. The proposed system will give the minute information, as a result the
performance is improved which in turn may be expected to provide increased profits. This feasibility checks whether the system can be developed with the availablefunds. The ATM SECURITY does not require enormous amount ofmoney to be developed. This can be done economically if planned judicially, so itis economically feasible
The system is operationally feasible as it very easy for the End users to operate it. It only needs basic information about Windows platform.
11
Time evaluation is the most important consideration in the development of project. The time schedule required for the developed of this project is very important since more development time effect machine time, cost and cause delay in the development of other systems. A reliableATM SECURITY SYSTEM can be developed in the considerable amount of time. Schedule of my project will be as follows:
FEASIBILITY ANALYSIS MARKET RESEARCH DESIGNING CODING MODULE TESTING SYSTEM TESTING PROJECT SUBMISSION 7TH JANUARY,2012 21ST JANUARY,2012 1ST FEBRUARY,2012 3RD MARCH 2012 15THMARCH,2012 22ND MARCH,2012 25THMARCH,2012
13
This framework is made up of the following parts: The common language runtime(CLR) The base class libraries. Object oriented internet development with ASP.NET Rich client user interface using windows forms RAD for the internet using web forms
14
Fig 4.1 .NET Framework The .NET framework has two main components: the common language runtime and the .Net framework class library. The common language runtime is the foundation of the .NET framework. You can think of the runtime as an agent that manages code at execution time, and removing while also enforcing strict type safely and other forms of code accuracy that ensure security and robustness in fact the concept of code management is a fundamental principle of the runtime.
15
the .NET framework to write your business logic, while still enjoying the superior performance of the industrys best enterprises servers that support runtime hosting.
4.6 ASP.NET
ASP.NET is a set of Microsoft.NET framework technologies used for building web applications and XML Web services. ASP.NET page execute on the server and generate mark up such as HTML, WML or XML that is sent to a desktop or mobile browser. ASP.NET pages use a compiled, event-driven programming model that improves performance and enables the separation of application logic and user interface. Both ASP.NET pages and ASP.NET web services files contain server-side (as opposed to client side logic) written in Visual basic .NET, C#.NET or any .NET compatible language, Web applications and XML Web Services take advantage of the features of the common language runtime, such as type safety, inheritance, language, interoperability, versioning, and integrated security.
4.7 IIS
Microsoft Internet Information S4ervices (IIS; formerly called Server is a set of Internet-based services for servers using Microsoft Windows. It is the worlds second most popular web server in terms of overall websites. As of September 2007 it served 34.94% of all websites and 36.63% of all active websites according to Net craft. The servers currently include FTP, SMTP, NNTOP, and HTTP/HTTPS.
4.8 ADO.NET
ADO.NET provides consistent access to data sources such a Microsoft SQL Server and XML, as well as to data sources exposed through OLE DB and ODBC. Data sharing consumer applications can use ADO.NET to connect to these data sources and retrieve, manipulate and update the data that they contain. ADO.NET separates data access from data manipulation into discrete components that can be used separately or in tandem. ADO.NET includes .NET Frame work data providers for connecting to a database, executing commands and retrieving results. Those results are either processed directly, placed in and ADO.NET Dataset objects in order to be exposed to the used in
16
an ad hoc manner, combined with data from multiple sources or remote between tiers. The ADO.NET Dataset object can also be used independently of a .NET Framework data provider to manage data local to the application or sourced from XML. The ADO.NET classes are found in System.Data.dll and are integrated with the XML classes found in System.Xml.dll. When compiling code that uses the System. Data, namespace reference both System.Data.dll and System.Xml.dll. ADO.NET provided functionality to developers writing managed code similar to the functionality provided to native component object model (COM) developers by ActiveX Data Objects (ADO).
17
18
CHAPTER 6:
19
20
and random code generator will be used to generate the code which is to be sent for the safer authentication.
21
Random pin Generator is a function which produces a unique random pin every time for a new transaction for each and every user. This uses the technique of encryption of alphabets and digits. The digits are ENCRYPTED from 0 to 9 and the alphabets are ENCRYPTED from A to Z. Here we take an empty string Rendompass and then this string takes the value of the new password generated each time. Every time the password is generated this password is updated and pen drives serial number is selected with the help of select command along with the users mobile number so that this transaction password can be send successfully. Here we use a function of .net Rnd.next and a loop to each time generate a new password of 6 digits which could either be a numeric or alphanumeric. This random pin will be send to the user with the help of a SMS portal to users mobile number. With the help of this Random pin generated each time we would be able to make our transactions very secure and we will be able to prevent all the threats , frauds happening in our daily life due to the lost or stolen or misplaced cards. Now a days stolen cards are easily accessed during shopping just swap and can any signature can fulfill the purpose. This low cost effective technique will be prove to be beneficial both to the bank authority and customers .In this modern world sending SMS are very cheap and provide ease of communication so this web application can be implemented in Real Time Systems too.
User Requirements:
22
Hardware:
Processor Memory Network : : : 1.0 GHz and above 256 MB RAM Active Internet Connection
Technology Used:
Front End Backend : : ASP.NET MY SQL DATABASE
Software:
Internet Browser Visual studio
MethodologyAdopted:
1. One and the main modifications made in this very project is the usage of a Pen Drive
instead of an ATM card as per the technology. 2. We insert a Pen Drive to the system, this shall lead us to a Login Interface.
3. This Login Interface requires us to fill in details, the username and the password. On
filling these up, the system enters our account. 4. On the other hand as the user enters the account the random pin generator generates a random pin. This pin is sent to the users mobile phone number in a SMS. 5. To complete the transaction the user now needs to enter this pin. 6. If the pin matches the correct pin the transaction is completed, otherwise an error message shall appear.
CHAPTER 7:
23
RECOMMENDATIONS
As we have applied SMS portal in our web application in future as we see the number of users increasing on using this web application then there may be a chance of having a heavy traffic on the server due to which it may delay in sending a SMS to the registered user because of which a user may back out to use the proposed application. To prevent this heavy traffic on SMS server we can implement the idea of biometric usage in which in future for every card user we can have the record of every distinct users finger print and use it as an alternative to authenticate the transaction instead of SMS which will be 100% secure of any financial transaction taking place regarding that card. This delaying of reaching SMS can surely cause the downfall of this web application so on the basis of that to prevent it we can use the best of biometric usage in this web application.
24
8.1 SYSTEM TESTING Testing is vital to the success of the system. System testing makes a logical assumption that if all parts of the system are correct. The goal will be successfully achieved. There are four steps with in, they are, Unit Testing Integration Testing Validation testing Output Testing
8.1.1 UNIT TESTING In this testing, the smaller part of the project is tested first that is modules and the sub functions present in the project. It seems to be working satisfactorily with out the errors and that shows the unit testing is successful. 8.1.2 INTEGRATION TESTING The integration testing is a part that the software makes all functions behaviors and process required. The errors which are uncovered are integrated testing, are corrected during this phase. The collection of the functions are tested and found with errors are rectified .So that the result can be easily obtained in a successful manner.
8.1.3 VALIDATION TESTING The validation part is very much essential for each every application projects so that each data can be validated in a good manner. In some cases the records are created according to the key of the corresponding table to which it has been referenced for data constraint for good secured database. While testing the system by using test data errors are again uncovered and corrected by using above
25
testing steps and corrections are also noted for future use. If there is any error then it is allowed for testing from the beginning. 8.1.4 OUTPUT TESTING The output is major required part of the development of the project. The output is tested for required format, if it does not acquire such format then the testing is done or any screen modification is alone for the further operations. The output testing is mainly for the two things they are, On screen format Print format The screen is found to be correct as the format designed according to the user needs for the hard copy also; the output comes out as specified by the user. Hence output testing doesnt result in any correction in the system.
8.2 SYSTEM IMPLEMENTATION Training the operating staff Installing hardware Installing terminals Installing telecommunication network before system is up and running.
In the implementation phase, the project reached its fruition. After the development phase of the SDLC is complete, the system is implemented. The software, which was designed in design and programmed in development phase of the SDLC, was installed on all the PCs that require it. The personas using the program was trained during this phase of the SDLC. Moreover, both the hardware and software are tested. Although we found and fixed many problems, almost invariably, the users helped us to uncover problems that we were unable to simulate. These were the main activities performed by us in the course of the project, which lead to its proper completion.
26
27
28
29
30
ADVANTAGES
It is fast, efficient and reliable
31
Avoids data redundancy and inconsistency Very user-friendly Easy accessibility of data Number of personnel required is considerably less Provides more security and integrity to data
updations can result in the wrong and out of date storage of data in the database.Registration module software assures accuracy and timeliness.
Leverage on one core payroll engine to manage your regional payroll activities. The Payroll Module supports multi-country, taking into account pre-determined statutory compliance for each individual country. This way, companies can manage payroll and compensation with one payroll engine that utilizes country-specific localizations. Even non-permanent staff can be included in the payroll system.
Consistent and accurate reports on payroll and a comprehensive audit trail of all progress and updates.
Automate payroll calculation and printing of paychecks Eliminate tax penalties for inaccurate returns or late payments Improve payroll accuracy with automatic tax and deduction calculations Improve organization with consolidation of payroll records and reports Reduce time spent calculating and completing government payroll forms Improve management reports by tracking labor paid by job, cost center, or
account
33
Better Control
Control is in your hands. On-going validation procedures automatically result in higher quality input, and errors can be detected and corrected immediately.
34
Added Flexibility
Because you use your source documents, screen input is customized by order or by company. You'll experience fewer time restraints since registration is entered in batches and balanced daily if desired.
Because up-to-date registration and personnel information is always available online, you'll save the time of looking up information on separate paper reports.
You'll reduce the time required to do a registration since it's no longer necessary to pre-sort input documents, accumulate control totals or prepare d. Data transmission takes only minutes and can be set up to send payroll data automatically even when you are not present.
Cost savings
Computerized accounting programs reduce staff time doing accounts and reduce audit expenses as records are neat, up-to-date and accurate.
Confidentiality
Company access by company Id , trade licenses by license number and banking details by bank code .
Withdrawal Processing
A computerized registration system has direct-registering capability, which saves money spent on live checks and reconciliation. Additionally, paycheck and pay stub generation occurs quickly, regardless of volume.
Up-to-date information
35
The accounting records are automatically updated and so account balances will always be up-todate.
36