Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SECURITY SYSTEM
(Software Requirement
Specification)
UNIVERSITY
(Declared U/S 3 of UGC Act 1956)
Chennai-600095, Tamil Nadu
Table of Contents
DescriptionPage No.
1.0 Introduction
1.1 Purpose..3
1.2 Scope.3
1.3 Definition, Acronyms and Abbreviations4-5
1.4 References....5
1.5 Technologies to be used.6
1.6 Overview..6-7
2.0 Overall Description
2.1 Product Perspective7
2.2 Software Interface...8
2.3 Hardware Interface..8
2.4 Product Function..8
2.5 User Characteristics9
2.6 Constraints9
2.7 Architecture Design....10
2.8 Use Case Model Description.11
2.9 Class Diagram.....12
2.10Sequence Diagram13
2.11Dataflow Diagram..14
3.0Database Design
3.1Schema..15-19
4.0 Assumptions and Dependencies20
5.0 Specific Requirements
5.1 Use Case Reports21-24
1.1 Purpose
HCSS (Highly confidential Security System) is a web
application used to store users confidential data.
Due to busy life style we cant remember all confidential
data like:
Mail id
Password
Bank account no
Pan no
Driving license no
Some confidential images, text and videos
And many more.
So we can develop highly security web application(new
security algorithm and hardware system) to store all
confidential data in single credentials
It comes under network security system for a
personalized application.
Web application will be highly customizable and flexible
enough to easily deploy.
1.2Scope
To design a HCSS (highly confidential security system)
Based on SSL, Encryption, Multi-Level Security.
To enter the data at first we should have registered
user.
During sign up a set of security question should be
saved like answer to any personal question or image
recognition.
At the time of sign up in any other website question is
prompted to the user, do you want to enter the data
confidentially? (Y/n).
Then the personalized application comes into play.
The particular website links directly to the HCSS
application to save the data.
Hyper
Text
Transfer
Protoco
l.Its a
service
protocol.
HTML
Hyper Text Markup Language.It is the main
markup
language for displaying web pages and other
information that can be displayed in a web
browser..
AJA
X Asynchronous JavaScript and XML. It is a
Web applicationswhich can send data to, and
retrieve data from, a server asynchronously (in
the background) without interfering with the
display and behavior of the existing page.
CS Cascading Style Sheets.It is a style sheet
language used for describing the presentation
semantics (the look and formatting) of a
S
document written in a markup language.
RA
Rational Application Developer is a
D development tool that helps to design web
pagesand also helps to design the diagrams
like ER, Database schema diagrams and to
generate DDL.
1.3 References
Google Search.
IBM TGMC Sample Synopsis
A Simplified AES Algorithm: Presented by Joshua
Holden, Rose-Human Institute of Technology.
A Advanced Encryption Standard Lecture on Computer
and Network Security by Avi kak.
1.6 Overview
Existing System
User can store their important data in the web but its not
safe.
Drawback
Only text can be stored
Proper tabulation is not present for storing data.
Data is not encrypted which can be hack by others.
Reliable connection is not been provided.
Proposed System
256 bit encryption technique is used.
SSL technique is used.
Multilevel security technique is used.
Different Lockers with symmetric key.
Lockers: Documentation, Image, Audio, Video.
Warning mail for incorrect password access will be sent.
Proper storage capacity is provided.
While registering in a new place a question Will prompt to
user whether to save the data in HCSS(Y/n).
Our Plan
To provide a user web based application where the user can
store its confidential data, in the form of text, picture, audio
and video with best possible encryption technique. Different
kinds of lockers will be provided with symmetric key. SSL
technique will be used to make the connection reliable and
maintain its privacy. Multi-Level security will be provided for
confidentiality.Warning mail will be sent to the user mail-ID
for incorrect password access. Proper storage capacity will
be provided for each lockers. And while registering for a new
account in any new website a question Will prompt to user
whether to save its detail in HCSS(Y/n).
2.6 Constraints
Login and password is used for the identification
of users.
Multiple Verification for login.
Multi-level Security for accessing the data.
Only registered users will be authorized to use
the services.
2.7Architecture Design
2.9Class Diagram
2.10Sequence Diagram
2.11Dataflow Diagram
DATATYPE
STRIN
G
STRIN
G
STRIN
G
DAT
E
CHARACTER
SIZ
E
15
15
15
DD/MM/YYYY
1
STRIN
G
STRIN
50
G
STRIN
G
NUMBE
15
R
STRIN
G
STRIN
50
G
STRIN
G
NUMBE
15
R
STRIN
G
NUMBE
15
R
STRIN
G
STRIN
30
15
6
15
6
10
20
DESCRPTION
USER ID
EMAIL ADDRESS
PASSWORD
CONFIRMED PASSWORD
DATE OF BIRTH
FIRST SECURITY QUESTION
SECOND SECURTITY QUESTION
THIRD SECURITY QUESTION
FIRST IMAGE RECOGNIZATION
SENCOND IMAGE RECOGNIZATION
THIRD IMAGE RECOGNIZATION
DATATYPE
STRIN
G
STRIN
G
STRIN
G
STRIN
G
DAT
E
STRIN
G
STRIN
G
STRIN
G
IMAG
E
IMAG
E
IMAG
E
SIZ
E
25
30
12
12
DD/MM/YYYY
25
25
25
1 MB
1 MB
1 MB
DESCRIPTION
USER ID
USER FULL NAME
EMAIL ADDRESS
PASSWORD
CONFIRMED PASSWORD
DATE OF BIRTH
CONTACT NUMBER
STATUS
DATATYPE
STRIN
G
STRIN
G
STRIN
G
STRIN
G
STRIN
G
DAT
E
NUMBE
R
STRIN
G
SIZ
E
25
30
30
12
12
DD/MM/YYYY
10
10
Documentation Locker
DESCRPTION
DATATYPE
SIZ
E
USER ID
STRIN
G
25
Encrypt./Decrypt. PASSWORD
STRIN
G
15
FORMAT
SIZE
5 MB
Picture Locker
DESCRPTION
DATATYPE
SIZ
E
USER ID
STRIN
G
25
Encrypt./Decrypt. PASSWORD
STRIN
G
15
FORMAT
.
JPEG
SIZE
FLOA
T
DESCRPTION
DATATYPE
5 MB
SIZE
USER ID
STRIN
G
25
Encrypt./Decrypt. PASSWORD
STRIN
G
15
FORMAT
MP3
SIZE
FLOA
T
10
MB
Audio Locker
Video Locker
DESCRPTION
DATATYPE
SIZ
E
USER ID
STRIN
G
25
Encrypt./Decrypt. PASSWORD
STRIN
G
15
FORMAT
MP4,
3GPP
SIZE
FLOA
T
20
MB
Dependencies
Unique User Name and Password is required.
Set of 3 security question have to be provided.
3 Image recognition has to be uploaded whom the
user can only identify.
Admin Page:-
Login Page:-
Lockers:-
Thank
you