Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
INTRODUCTION
The National Identity Card Processing and Administration system is the only way
locating or geographical area, it is necessary to bear a mark, Mark here does not
really mean facial mark rather an identity. This identity card will bear name, state
of origin, status, all information about an individual or person. This therefore boils
The Question is “what is an identity card? According to Efraim, T., Aronson, E. &
stipulated age of ownership. From the definition, National Identity Card can also
person.”
Every citizen of a country that is of the stipulated age constitution has the right to
apply for insurance of the National Identity card in the state he or she is staying.
The National Identity Card is not issued to people who are not of 18 years of age.
For this reason, there is a need for the maintenance and assessment of records in
1
order to maintain current data concerning an individual. It is also for easy
references, to know the number of labour force, Identification and fraud check and
also good for revenuer allocation of the federal government for proper population
figure.
However, there are different arms in the internal affair ministry which takes the
concerns our area of interest in this project work, Department of National Civil
National Identity Card processing and Administration system is not an easy task,
National Identity Card for one particular person. Scanning through reports for a
file with definite information can be a techniques and time wasting because of the
other words known as update will also be a tug of way for the individual in charge,
it creates weariness and loss of dedication to duties by the staff thereby restricting
2
the powers of the Department of National Civil Registration services following the
constitution of the Federal Republic of Nigeria which states that “No Public
Officer shall put himself in a position where his personal interest conflict with his
- The simplicity of the system is not accrued (i.e. the existing system is very
difficult to use) and it is expensive to maintain and also National identity card
- Also, data link medium is not found and as a result cause a lot of delay
information relay
- The existing system lack on-line data entry which leads to inaccuracy and
incomprehensible
non-authorized person.
3
1.3 PURPOSE OF STUDY
The primary purpose of the study is to critically analyze the activities of National
create a better and lasting identity card system for Nigeria as a whole.
processing and administration system for national Identity card with view of
modifying it into a full computerized system. The study covers the areas of
- Deprive immigrant who are not citizen of the country from obtaining the
4
- Finally, a proper storage system which keeps all vital information ready for
use.
state will provide along lasting processing and administration system on National
Identity card and keeping records of all processing and administration system for
This system safeguard data information in the system reduces workload in the
present system, keep accurate record and reduce time wasted in data processing.
This is limited to the activities involved in National Identity Card Processing and
its administration system and also report generation on the National Identity Card
National Identity card section of the Ijebu North Local Government Area of Ogun
State.
The limitation is based on the facts which the researcher could not lay hands on
5
1.8 DEFINITION OF TERMS
As we go into this work, some words will need precise definition to enable the
Citizen: Under the provision of the amended constitution decree No. 32 of 1974,
citizen is any person who becomes citizen of any country either by birth,
Identity card processing: The procedure involved in processing and identity card.
Identity card assement: The procedure or act of checking Identity card already in
use or to be produced.
Immigration: This is a process whereby people move from the country to another
to settle.
Emigration: This is a process whereby people come from one country to settle.
6
Authentication: This is the process of identifying an individual usually based on a
current subject.
7
CHAPTER TWO
LITERATURE REVIEW
The Question is “what is an identity card? According to Efraim, T., Aronson, E. &
stipulated age of ownership. From the definition, National Identity Card can also
person.”
Identity card as defined cannot be acquired from neither from school nor home.
But, there is a special organization or ministry that takes charge of both processing
tightly identifies the holder whose photograph is placed in the identity card. It also
contains all necessary information needed to know about the holder of the identity
8
card. Furthermore, he emphasized that the essence of such identification is mainly
check fraud of any form. Any fraud is detected and canceled because the identity
cards are made unique. It is not always easy. Forging of identity card, and
outside ones territory. People travel in other to visit people, do business with
people or for changing environment. To this effect, there is every need that he/she
traveling bears a mark of identification, which is the national identity card. The
identity card being and outstanding document, is very official and is only issued
out and controlled by the Government under the auspices of the ministry of
These documents are processed to be very unified and easily maintained. With the
introduction of identity card, the problem associated with identity card processing
system has been totally solved. The computer maintains and access information
9
about identity card holders automatically with little human intervention. Fraud is
EFFECTS AND BENEFITS” Says that identity card represents the image of a
nation.
IKAM (2004) also emphasized that every National should attach more importance
to the mode of insurance and assessment of identity card since it will contribute to
a large extent sanitizing the image of countries within or outside their own
country. Identity card holders should at the same time exhibit good and
Proponents of ID envision a world where the identity card replaces username and
password, supports business processes online and offline, and allows services to
They hope that someday we will use one single Identity Card scheme to shop
online, open bank accounts, check into hotels, rent cars, and file our tax
cards supposedly works towards this goal. When the rollout is complete after 10
10
years, so the reasoning, an infrastructure will be there that is attractive to use for
and stabilize. An application field test with early adopters, carried out before the
start of the rollout, shows a tendency. The following types of services might see an
* Services that must allow citizens to exercise their right to access personal
information.
let citizens access their data online, but they have to identify the requestor.
* Companies that are required to record the identities of their clients, such as
verification.
adult entertainment. Currently they use a wide variety of means for age
verification.
11
Such applications could drive the adoption of Identity Card in the beginning, but
the supposed scope of application is much wider than that. Even proposals for
online elections based on the Identity Card functions are being discussed, but they
remain far from implementation attempts yet. Whether there will be a killer
application some day that service providers and users agree on remains to be seen.
raises privacy concerns. Can it be abused to link my data and actions throughout
the Internet to my identity? Will Identity Card force me to let every website know
my birthday? Who can access my data at all and how can I remain in control? Can
The German electronic ID card translates privacy into a set of features. Services
certificates determine the extent to which a service can access Identity Card data
fields and functions. The citizen has to consent to every access. On-card
verification supports use cases like age verification while releasing a minimum
12
2.2 THE IDENTITY CARD FUNCTION
The Identity Card function makes a subset of the identity data on the card
Biometric data (facial image, eye color, body height, and optionally fingerprints)
are restricted to the ePass function and not accessible through the Identity Card
interface. The card serial number and the card holder’s handwritten signature
printed on the surface are not part of the Identity Card data set. With these
exceptions, the Identity Card function works with the same data that are printed on
Besides direct data access, the Identity Card function supports a privacy-
preserving access mode for the date of birth and the registered place of residence.
Instead of returning data from the Identity Card record, the card responds only
with yes or no to a verification request. This way a service can verify for instance
the age of a citizen without learning the date of birth. In addition, the restricted
13
identification feature allows the card to be used as a login token without revealing
personal information.
the server side and returns the result to the service. The Identity Card server may
On the client side, a card reader and a client software package provide interfaces
to the user and to the ID card. Basic card readers leave all control and user
identification number (PIN) entry keypad, protecting the PIN against malware
attacks. The client software mediates the protected communication between the
card and the Identity Card server, displays authorization certificates, and allows
The chip on the ID card verifies the user’s PIN and the authorization certificate of
the Identity Card server and releases information as authorized. The card is an end
14
2.4 CRYPTOGRAPHIC PROTOCOLS
Cryptographic protocols secure the channels between the card and the reader, and
between the card and the Identity Card server. Between the card reader and the
establishes a shared session key and verifies a password in the process. All
functions of the ID card use PACE, but with different passwords. The 6-digit
To authenticate a user with Identity Card, an online service triggers the client
software through a browser plugin and hands over to the Identity Card server to
1. Authentication request: The service requests Identity Card data of the user
3. PIN entry and PACE: After reviewing the service information and
optionally, further restricting the authorization, the user enters her Identity
Card PIN to express consent. This PIN is used locally to execute the PACE
protocol.
15
4. Extended Access Control: Mediated by the client, the Identity Card server
and the ID card authenticate each other and establish a trusted channel.
5. Use of Identity Card function: The Identity Card server reads the subset
After this process, control returns to the service, which uses the authentication
For the citizen, the cryptographic protocols ensure that the ID card releases data
Endpoints of the secure channel are the ID card chip and the Identity Card server.
The card chip itself authenticates the Identity Card server and verifies its
reader with a keypad is used, the Identity Card PIN is protected against malicious
16
For the service provider, chip authentication ensures that the data received
Two design features in the details enhance the citizens’ privacy: chip
authentication keys are not unique, and Identity Card data remain unsigned. If
each ID card were equipped with a unique chip authentication key, a service
provider might gain a unique identifier as a side effect of the protocols. Therefore
a batch of cards shares the same secret chip authentication key, making them
to others that an Identity Card record is authentic, there is no trusted party in the
system that would sign Identity Card data. Only the context of an EAC protocol
run and the secure channel thus established assure the Identity Card server of the
authenticity of Identity Card data. Outside this context, there is no way to verify
The government and the private sector share the implementation and operation of
the Identity Card system. Local administrative agencies register citizens and issue
17
oversee the certification of equipment. Federal agencies also manage the
The private sector supplies equipment and operates Identity Card servers and
infrastructure services. The industry produces the ID cards on behalf of the local
agencies, and supplies the end user equipment. Citizens need a certified card
the client software, called Aus we is App, is available free of charge for Windows,
Linux, and Mac OS. Alternative implementations of the client software may
appear on the market in the future. Service providers may operate their own
Identity Card servers or contract with an Identity Card service provider. Private-
sector companies also operate the certification authorities responsible for the
Identity Card data fields or data verification functions is managed in three steps.
First, the service provider requests approval from the Federal Office of
Identity Card data as requested and the provider complies with all pertinent
regulations. The approval can remain valid for up to 3 years. In a second step, the
18
These certification authorities issue cryptographic authorization certificates to
certificates for online services are short-lived, typically valid for only two days, to
certification authorities also provide Identity Card servers with ID card revocation
The third step occurs when an authorized Identity Card server on behalf of an
approved service requests access to the card. The user is presented with the
authorization certificate and has the option to deselect data fields from the service
authorization. The client software also presents to the user the approved privacy
policy of the service. The authorization certificate includes a hash of the policy.
Therefore, it is preferable that security codes are as small and simple as possible.
and reliability of the layer, the underlying BIOS, and a boot-loader. So security
19
CHAPTER THREE
particular identity card. Computer as we all know is used to store and process a
particular identity card and process data and records. Likewise the computer used
in the identity card section because of aspect of the identity card activities is
carried out with aid of the computer while the rest are carried out manually. The
operate. This is because a high and intensive is needed in order to avoid the risk of
The INPUT made being rigid, does not allow or easy operation in the case of
error. To this effect, there is no room for easy update because of its ancient system
set up. Initially, the input mode is made on paper, it is not on-line. Data update and
Report Generation which aids processing of national identity card are not made
timely therefore delays fast decision. Also, it is always not as accurate as desired
by the management due to a lot of discrepancies during the processing even when
20
there is a need of inspection to know how the service of department works, there
Therefore, the existing system has failed to meet up entirely with the expectation
requested of it before the design started. This is a result of the advancement in the
society which has outgrown the prospects of the existing system design.
During the course of this study, the researcher applied different method of finding
* Interview
used as a case study of several occasion and interviewed the staff and personal
question to the best to their knowledge. The facts and answers incurred from the
discussion made it possible for the researcher to begin the study, some of the
21
* What are the conditions for issuing NATIONAL IDENTITY CARD?
* What are the major rules of the operation and Border patrol section over the
* What are the objectives of the existing National identity card processing
system?
Also, the personnel who were involved in the interview tried to link the researcher
with other zones who were connected with the processing as well as the
researcher addition to her findings visited some libraries and the department of
document for more details concerning this study. To this effect, the fact provided
by the referenced next made it possible for the completion of the study work.
The existing system is one that has been manually operated over the years. So, the
22
* To produce a system that will be accurate in report generation
* To produce a system that will make storage and processing very easy and
accurate.
* To make the management take quick and adequate decision at all time.
* To always process and produce valid and genuine national identity card for
Computer has added immense effort in the monitoring of national identity card
holders in and out of Nigeria. Since we are in the path of information technology
growth, we need the basic capability to install and use advanced computers.
With computer installed in the ministry of internal affairs service (especially the
* Easy data storage, update and retrieved very easy and accurate.
achieved.
23
between various pieces of information. This facilitates the rapid storage,
information.
In future, we will see the rapid introduction of intelligent work stations which are
computers.
The input to the system is made on papers in forms. The forms are filled by the
National Identity applicant and submitted to the clearance officer for clearance
then to the duty clerk who files it and makes it flow. Before a form is issued to the
And until this condition is met, no applicant can be given a right to fill a form in
procurement for a national identity card. Since the input is very rigid, it does not
24
allow for easy correction of data if any mistake is noticed. Also due to the
mistakes and clean up using fluids, it makes input from very unity.
NAME:
ADDRESS:
HEIGHT: SIGN:
The processing analysis is the use of laid down conditions in assessing the
not. This also involved the checking of the validation of the supplied record by the
Applicant.
25
3.5.3 OUTPUT ANALYSIS
The output is the National identity card booklet information which builds up the
national identity card holders records with the Department of national civic
Registration or the ministry of internal affairs and national identity card section.
These records are kept for security purposes and for the major purposes of
references when necessary. The sample above shows the national identity card
NAME:
ADDRESS:
NATIONALITY: STATE:
GONOTYPE:
SIGNATURE:
26
3.6 INPUT SPECIFICATION AND DESIGN
The input to the system is flexible and precise. It is also supplied through the
system is flexible and precise. It is also supplied through the keyboard. The input
items include,
SURNAME:
SEX: AGE:
DATE OF BIRTH:
HEITHT:
STATE OF ORIGIN:
L.G.A
CURRENT ADDRESS:
PROFESSION:
MARITAL STATUS:
NEXT OF KIN:
BLOOD GROUP:
GONOTYPE:
Also, there are some spaces reserved for the officers in charge of National identity
SURNAME: OTHERNACES:
27
SEX: MALE: FEMALE:
PROFESSION/OCCUPATION:
MARITAL STATUS:
SINGLE:
MARRIED:
WIDOWED:
DIVORCED:
SPECIAL FEATURES
MAIDEN NAME
SURNAME:
ADDRESS:
APPLICANTS ORIGIN:
28
PLACE: STATE:
ID FORM NUMBER:
PERSONAL NUMBER:
Here, the input is determined by the output. The output is very precise and
Identity Card. Also the output design tries to create room for assessment of records
and data.
….……..….……..…….
……………………..….…….…….
………….………….……….…….
29
HEIGHT: ………………………….….. BLOOD GROUP:
………………….………
……..……….……….
……….……….…………
PROFESSION/OCCUPATION:
………………..……………………………………
……….………………….
...……………..………….
The file design was for the purpose of good storage of received proper data.
Proper management assessment and reliable retrieval of data. The file was grated
30
FILE STRUCTURE
1 SURNAME SN CHARACTER 15
2 OTHERNAME ON CHARACTER 20
3 SEX SE CHARACTER 3
9 HEIGHT HE CHARACTER 3
15 PLACE PL CHARACTER 8
16 STATE ST CHARACTER 8
31
17 L.G.A LGA CHARACTER 10
18 RC RC NUMERIC 8
32
3.9 PROGRAM SPECIFICATION FLOWCHART
problem. The flowchart is a means of visually presenting the flow of data through
information processing, the operations performed within the system, and the
sequence in which they are performed. A Program flowchart plays a vital role in
complicated and lengthy problems. Once the flowchart is drawn, it becomes easy
to write the program in any high level language. The advantages of using a
becomes easy with the help of flowchart. It helps the programmer to put
33
e. Proper Debugging: The flowchart helps in debugging process. Below is
34
35
36
37
38
CHAPTER FOUR
After the analysis of this entire Software System, to ensure a standardized object
oriented in this ramification, Visual Basic (VB) 8.0 and Microsoft Access are used
as our development tools. Our choice of Microsoft Access is due to the fact that it
can be used to set up a query which, when applied to a database typically returns a
set of records that matches your (Structured Query Language) query. It is also
Computer system is made up of different component that are put together to work
* Hardware Requirement
* Software Requirement
For the effective implementation of the new system software, the following
39
* Microsoft Access Database 2007 or higher
In the cause of the design, the software developed needed the following hardware
* Colored Monitor
4.3 IMPLEMENTATION
complete, accurate and specialized implementation of the new system. The new
system designed after a detailed analysis of the existing system. The functional
units of the existing system were included the problem associated with them were
40
4.3.1 WELCOME PAGE
41
4.3.2 FORM PAGE
42
4.3.3 BIOMETRY CAPTURING
43
4.3.4 NATIONAL IDENTIFICATION CARD
44
CHAPTER FIVE
5.1
5.2 RECOMMENDATION
Computer has all times proven its superiority over every other technological
invention. To this effect, I recommend that for further elaboration on this project.
manual
operation.
Card.
45
* The program should be modified to suit all the sections of Department of
5.3 CONCLUSION
The work has been designed and computerized for the National Identity Card
internal affairs. To assess and monitor the procurement of the National Identity
Identity Cards thereby restricting individuals only to one national identity card for
Computer has made work very ready and interesting. The national identity card as
produced in time and adequate measures are taken to maintain proper record and
security pursuits. This work made the staff to have more time to them. Also by
implementing of this work, the huge maintenance of the manual record system
46
REFERENCES
IKAM (2004)
Press.
47
PAUL, C., (1987). Information Processing for BTEC. USA: Kleen
University Press.
BENEFITS”
48