aftertable(1)edgerghg
TRANSCRIPT
-
7/29/2019 aftertable(1)edgerghg
1/36
SRS DOCUMENT
1. INTRODUCTION
1.1 Purpose
1.1.1 The Software is for the securing ATM transaction while shopping.
1.1.2 It maintains two levels of users:-
Administrator Level
User Level
1.1.3 The Software includes:-
Login page.
User registration details
Maintaining all the records of customers.
Random pin generation
1.2 Scope
It can be used in any bank along with any shop to secure transaction while
shopping.This will help to implement this web application in real time system.
1.3 Technologies to be used
This project will be an application to be developed in ASP.NET having Ms SQL
Server as backend.
Database Design (Ms SQL Server)
Form Design (asp.net)
Coding (vb.net and c#)
1.4 Overview
Project is related to securing ATM transaction while shopping.
The project maintains two levels of users:-
Administrator Level
User Level-Data Entry
1
-
7/29/2019 aftertable(1)edgerghg
2/36
Maintaining records of customers
Maintaining registered pen drive.
Maintaining a Mini statement
Maintaining all the transactions that took place till date
Maintaining my account details
2. OVERALL DESCRIPTION
2.1 Product Perspective
2.1.1 System Interfaces: None2.1.2 User Interfaces:
2.1.2.1 Login screen
2.1.2.2 Registration screen
2.1.2.3 Record update screen
2.1.2.4 Mini statement screen
2.1.2.5 My account screen
2.1.3 Hardware:
2.1.3.1Processor: 1.0 GHz and above
2.1.3.2 Memory: 256 MB RAM
2.1.3.3 Network: Active Internet Connection
2.1.4 Software:
2.1.4.1 Front End: ASP.NET
2.1.4.2 Backend: MY SQL DATABASE
2.1.4.3 Internet Browser
2
-
7/29/2019 aftertable(1)edgerghg
3/36
3. SPECIFIC REQUIREMENTS
3.1 User Interfaces:
3.1.1 Login screen:
i) User name
ii)Password
iii) Role: Administrator/customer
3.1.2 Registration screen:
i) Name
ii) Address
iii)Date of birth
iv)Opening balance
v)Pin number
vi)Drive serial number
3.1.3 Record update screen
i)Patient name
ii)Address
iii)Phone number
3.2 Hardware:
3.2.1 Processor: 1.0 GHz and above
3.2.2 Memory: 256 MB RAM
3.2.3 Network: Active Internet Connection
3.3 Software:
3.3.1 Front End: ASP.NET
3.3.2 Backend: MY SQL DATABASE
3.3.3 Internet Browser
3
-
7/29/2019 aftertable(1)edgerghg
4/36
3.4 System Features:
3.4.1 Project is related to ATM security.
3.4.2 The project maintains two levels of users:-
Administrator Level
User Level-Data
3.4.3 Main facilities available in this project are:-
Random pin generator
Sms Portal
3.5 Software System Attributes:
3.5.1 Security:
The application will be password protected.
The main reason for developing this application is security with the help of
a random pin generator function
3.5.2 Maintainability:
The application will be designed in maintainable manner. It will be able to
incorporate new requirements in individual modules.
3.5.3 Portability:
The system will be easily portable on any window based system that has
MS-SQL server installed.
3.6 Logical Database Requirements:
3.6.1 Customer Information like name, address,phone number,D.O.B,drive
number
3.6.2 User account Information
4
-
7/29/2019 aftertable(1)edgerghg
5/36
CHAPTER 1:
INTRODUCTION
1.1 Purpose
1.1.1 The Software is for the securing ATM transaction while shopping.
1.1.2 It maintains two levels of users:
Administrator Level
User Level
1.1.3 The Software includes:-
Login page.
User registration details.
Maintaining all the records of customers.
Random pin generation.
1.2 Scope
It can be used in any bank along with any shop to secure transaction while shopping. This
will help to implement this web application in real time system
1.3 Technologies to be used:
This project will be an application to be developed in ASP.NET having Ms SQL Server
as backend.
Database Design (Ms SQL Server)
Form Design (asp.net)
Coding (vb.net and c#)
1.4 Overview
Project is related to securing ATM transaction while shopping.
The project maintains two levels of users:-
Administrator Level
5
-
7/29/2019 aftertable(1)edgerghg
6/36
User Level-Data Entry
Maintaining records of customers
Maintaining registered pen drive.
Maintaining a Mini statement
Maintaining all the transactions that took place till date
Maintaining my account details
6
-
7/29/2019 aftertable(1)edgerghg
7/36
CHAPTER 2:
SYSTEM REQUIREMENTS
2.1 User Requirements:
Hardware:
Processor : 1.0 GHz and above
Memory : 256 MB RAM
Network : Active Internet Connection
Technology Used:
Front End : ASP.NET
Backend : MY SQL DATABASE
Software:
Internet Browser
Visual studio
CHAPTER 3:
SYSTEM ANALYSIS AND FEASIBILITY
7
-
7/29/2019 aftertable(1)edgerghg
8/36
3 Feasibility Study
Depending on the results of the initial investigation the survey is now expanded to a
more detailed feasibility study. FEASIBILITY STUDY is a test of system proposal
according to its workability, impact of the organization, ability to meet needs and
effective use of the resources. It focuses on these major questions:
1. What are the users demonstrable needs and how does a candidates systemmeet them?
2. What resources are available for given candidate system?
3. What are the likely impacts of the candidate system on the organization?
4. Whether it is worth to solve the problem?
During feasibility analysis for this project, following primary areas of interest are to
beconsidered. Investigation and generating ideas about a new system does this.
Steps in feasibility analysis
Eight steps involved in the feasibility analysis are:
Form a project team and appoint a project leader.
Prepare system flowcharts.
Enumerate potential proposed system.
Define and identify characteristics of proposed system
Determine and evaluate performance and cost effective of each proposed system.
Weight system performance and cost data.
Select the best-proposed system
Prepare and report final project directive to management.
8
-
7/29/2019 aftertable(1)edgerghg
9/36
3.1 Technical feasibility
A study of resource availability that may affect the ability to achieve an acceptablesystem. This
evaluation determines whether the technology needed for the proposedsystem is available or not.
Can the work for the project be done with current equipment existing software technology &
available personal?
Can the system be upgraded if developed?
If new technology is needed then what can be developed?
This is concerned with specifying equipment and software that will successfully satisfythe user
requirement. The technical needs of the system may include:
Front-end and back-end selection
An important issue for the development of a project is the selection of suitable front-end
and back-end. When we decided to develop the project we went through an extensive
study to determine the most suitable platform that suits the needs of the organization as
well as helps in development of the project.
The aspects of our study included the following factors.
Front-end selection:
It must have a graphical user interface that assists employees that are not from
ITbackground.
Scalability and extensibility.
Flexibility.
Robustness.
According to the organization requirement and the culture.
9
-
7/29/2019 aftertable(1)edgerghg
10/36
Must provide excellent reporting features with good printing support
Platform independent.
Easy to debug and maintain.
Event driven programming facility.
Front end must support some popular back end like Ms Access.
Back-end Selection:
Multiple user support.
Efficient data handling.
Provide inherent features for security.
Efficient data retrieval and maintenance.
Stored procedures.
Popularity.
Operating System compatible.
Easy to install.
Various drivers must be available.
Easy to implant with the Front-end.
3.2 Economical feasibility
10
-
7/29/2019 aftertable(1)edgerghg
11/36
Economic justification is generally the Bottom Line consideration for most systems.
Economic justification includes a broad range of concerns that includes cost benefit
analysis. In this we weight the cost and the benefits associated with the candidate
system and if it suits the basic purpose of the organization i.e. profit making, the project
is making to the analysis and design phase.
The financial and the economic questions during the preliminary investigation areverified to
estimate the following:
The cost to conduct a full system investigation.
The cost of hardware and software for the class of application being considered.
The benefits in the form of reduced cost.
The proposed system will give the minute information, as a result the
performance is improved which in turn may be expected to provide increased
profits.
This feasibility checks whether the system can be developed with the availablefunds. The ATM
SECURITY does not require enormous amount ofmoney to be developed. This can be done
economically if planned judicially, so itis economically feasible
3.3 Operational Feasibility
It is mainly related to human organizations and political aspects. The points to be considered are:
What changes will be brought with the system?
What organization structures are disturbed?
What new skills will be required?
Do the existing staff members have theseskills?
If not, can they be trained in due course of time?
The system is operationally feasible as it very easy for the End users to operate it. It only needs
basic information about Windows platform.
3.4 Schedule feasibility
11
-
7/29/2019 aftertable(1)edgerghg
12/36
Time evaluation is the most important consideration in the development of project. The time
schedule required for the developed of this project is very important since more development
time effect machine time, cost and cause delay in the development of other systems.
A reliableATM SECURITY SYSTEM can be developed in the considerable amount of time.
Schedule of my project will be as follows:
FEASIBILITY ANALYSIS 7TH JANUARY,2012
MARKET RESEARCH 21ST JANUARY,2012
DESIGNING 1ST FEBRUARY,2012
CODING 3RD MARCH 2012
MODULE TESTING 15THMARCH,2012
SYSTEM TESTING 22ND MARCH,2012
PROJECT SUBMISSION 25THMARCH,2012
CHAPTER 4:
PROJECT PLANNING
12
-
7/29/2019 aftertable(1)edgerghg
13/36
FEATURES OF SOFTWARE
4.1 Microsoft Visual Studio
Microsoft Visual Studio is Microsofts flagship software development product for
computer programmers. It centers on an integrated distribution environment which hasprogrammers create stand alone, and web services that run on any platforms supported by
Microsofts .Net Framework (for all versions after 6). Supported platforms include Microsoft
windows, servers and workstations, Pocket PC, Smart Phones and World Wide Web browsers
not the Java Virtual Machine that all other java tools target.
4.2 Visual Studio 2010
The most important language added in this version was the introduction of generics,which are similar in many aspects to C++ templates. This potentially increases the number of
bugs caught at compile- time instead of run- time by encouraging the use of strict type checking
in areas where it was not possible before, C++ also got a similar upgrade with the addition of C+
+/CLI which is slated to replace the use of Managed C++. Other new features of Visual Studio
2005 include the Development Designer which allows application designs to be validated
before deployments, an improved environment for web publishing when combined with
ASP.NET 2.0 and load testing to see application performance under various sorts of user loads.
Visual Studio 2010 also added extensive 64- bit support. While the development environment
itself only available as a 32- bit application, visual C++ 2010. supports compiling for
(x64AMD64 and EM64T) as well as IA- 64 (Itanium). The platforms SDK include 64- bit and
64-bit versions of the libraries.
4.3 NET Framework SDK
The .NET framework is an integral windows component that supports building and
running the next generation of applications and XML web services. The key component of the
.NET frame work are the common language run time and the. NET frame work class library,
which includes ADO.NET, ASP.NET and windows forms. The .NET framework provides a
managed execution environment simplified development and deployment and integration with a
wide variety of programming languages.
13
-
7/29/2019 aftertable(1)edgerghg
14/36
This framework is made up of the following parts:
The common language runtime(CLR)
The base class libraries.
Object oriented internet development with ASP.NET
Rich client user interface using windows forms
RAD for the internet using web forms
4.4 Overview of the .NET Framework
The .NET framework is a new computing platform that simplifies application
development in the highly distributed environment of the internet. The .NET framework is
designed to fulfill following objectives:
To provide a consistent object oriented programming environment whether object code
is stored and executed locally but internet- distributed or executed remotely.
To provide a code execution environment that minimizes software deployment and
versioning conflicts.
To provide a code execution environment that guarantees safe execution of code,
including code created by an unknown or semi trusted third party.
To provide a code execution environment that eliminates the performance problem of
scripted or interpreted environments.
To make the developer experience consistent across widely types of application, such as
windows based applications and web based applications.
To build all communication on industry standards to ensure that code based on the .NET
framework can integrate with any other code.
14
-
7/29/2019 aftertable(1)edgerghg
15/36
Fig 4.1 .NET Framework
The .NET framework has two main components: the common language runtime and the .Net
framework class library. The common language runtime is the foundation of the .NET
framework. You can think of the runtime as an agent that manages code at execution time, and
removing while also enforcing strict type safely and other forms of code accuracy that ensure
security and robustness in fact the concept of code management is a fundamental principle of the
runtime.
4.5 Common Language Runtime (CLR)
The common language runtime (CLR) is responsible for runt-time services such as
language integration; security enforcement; and memory, process and thread management. In
addition, it has a roll at development time when features such as life cycle management strong
type naming, cross-language exception handling, dynamic binding and so on, reduce the amount
of code that a developer must write to turn the business logic the reusable component. The
runtime can be hosted by high performance, server-side applications, such an s Microsoft
Internet Information Services (IIS) for building web applications with ASP.NE and the next
release of Microsoft SQL Server. This infrastructure enables you to use code managed by
15
-
7/29/2019 aftertable(1)edgerghg
16/36
the .NET framework to write your business logic, while still enjoying the superior performance
of the industrys best enterprises servers that support runtime hosting.
4.6 ASP.NETASP.NET is a set of Microsoft.NET framework technologies used for building web
applications and XML Web services. ASP.NET page execute on the server and generate mark
up such as HTML, WML or XML that is sent to a desktop or mobile browser. ASP.NET pages
use a compiled, event-driven programming model that improves performance and enables the
separation of application logic and user interface. Both ASP.NET pages and ASP.NET web
services files contain server-side (as opposed to client side logic) written in Visual basic .NET,
C#.NET or any .NET compatible language, Web applications and XML Web Services take
advantage of the features of the common language runtime, such as type safety, inheritance,
language, interoperability, versioning, and integrated security.
4.7 IIS
Microsoft Internet Information S4ervices (IIS; formerly called Server is a set of
Internet-based services for servers using Microsoft Windows. It is the worlds second most
popular web server in terms of overall websites. As of September 2007 it served 34.94% of all
websites and 36.63% of all active websites according to Net craft. The servers currently include
FTP, SMTP, NNTOP, and HTTP/HTTPS.
4.8 ADO.NET
ADO.NET provides consistent access to data sources such a Microsoft SQL Server and
XML, as well as to data sources exposed through OLE DB and ODBC. Data sharing consumer
applications can use ADO.NET to connect to these data sources and retrieve, manipulate and
update the data that they contain.
ADO.NET separates data access from data manipulation into discrete components that
can be used separately or in tandem. ADO.NET includes .NET Frame work data providers for
connecting to a database, executing commands and retrieving results. Those results are either
processed directly, placed in and ADO.NET Dataset objects in order to be exposed to the used in
16
-
7/29/2019 aftertable(1)edgerghg
17/36
an ad hoc manner, combined with data from multiple sources or remote between tiers. The
ADO.NET Dataset object can also be used independently of a .NET Framework data provider to
manage data local to the application or sourced from XML.
The ADO.NET classes are found in System.Data.dll and are integrated with the XML
classes found in System.Xml.dll. When compiling code that uses the System. Data, namespace
reference both System.Data.dll and System.Xml.dll.
ADO.NET provided functionality to developers writing managed code similar to the
functionality provided to native component object model (COM) developers by ActiveX Data
Objects (ADO).
4.9 ADO.NET Components
There are two components of ADO.NET that you can use to access and manipulate
data:
.NET Framework data providers.
The DataSet
4.10 NET Framework Data Providers
The .NET Framework Data providers are components that have been explicitly
designed for data manipulation and fast, forward-only, read-only access to data. The connection
object provides connectivity to a data source. The command object enables access to database
commands to return data, modify data, run stored procedures and send or retrieve parameter
information. The Data Adapter provides a high-performance stream of data from the data
source. Finally, the Data Adapter provides the bridge between the DataSet object and the data
source. The Data Adapter uses command object to execute SQL commands at the data source to
both load the DataSet with data and reconcile changes made to the data in the DataSet back to
the data source.
17
-
7/29/2019 aftertable(1)edgerghg
18/36
4.11 The DataSet
The ADO.NET DataSet is explicitly designed for data access independent of any data
source. As a result, it can be used with multiple and differing data sources used with XML data
or used to manage data local to the application. The DataSet contains a collection n of one or
more DataTable objects made up to rows and columns of data as well as primary key, foreign
key, constraint and relation information about the data in the DataTable objects.
4.12 Benefits of ADO.NET
ADO.NET offers several advantages over previous versions of ADO and over other
data access components. These benefits fall into the following categories:
1. Interoperability
2. Maintainability
3. Programmability
4. Salability.
4.13 Chosen Database: SQL Server Management Studio
SQL Server Management Studio is a software application first launched with the Microsoft SQL
Server 2005 that is used for configuring, managing, and administering all components within
Microsoft SQL Server. The tool includes both script editors and graphical tools which work with
objects and features of the server. A central feature of SQL Server Management Studio is the
Object Explorer, which allows the user to browse, select, and act upon any of the objects within
the server. It also has an "express" version that can be freely downloaded.
18
-
7/29/2019 aftertable(1)edgerghg
19/36
CHAPTER 5:
PROBLEM STATEMENT
EXISTING SYSTEM
In existing system of ATM card we dont have the proper security for a user as if his or her card
is lost or incase misplaced by any chance he can face a big financial loss within the time he will
get to know about his card. As in anyone can take anyones card and without the registered user
any transaction can take place.
To prevent this security in the present system we will be applying our new idea of securing the
transaction with the help of random pin generator and sms portal. The problem which exists in
the current system has made the many go victim of this credit card or ATM card defaulter for
which in the end either the user or the bank has to pay the amount as it will be too late by the
time it comes in knowledge of registered user about his loss which can be at higher scale too.
This system will prove to be beneficial due to its low cost and more benefits it provides to the
card users as well as bank.This low on cost web application will enhance security to a level
which will raise standards of security in India.
This web application can be implemented into real time system efficiently.
CHAPTER 6:
19
-
7/29/2019 aftertable(1)edgerghg
20/36
DESIGN AND IMPLEMENTATION
Project Planning
Fig 6.1 Project Planning
20
-
7/29/2019 aftertable(1)edgerghg
21/36
Fig 6.2 E-R Diagram
With the help of following these steps we were successfully able to build our web application
(1) The process to be followed to identify an individual through a username and password.
(2) The process will follow in authorizing a transaction through an ATM system will identify.(3) The integration model will develop public portal will be used to send the message to the user
and random code generator will be used to generate the code which is to be sent for the safer
authentication.
21
-
7/29/2019 aftertable(1)edgerghg
22/36
MODULE-Random Pin Generator
Random pin Generator is a function which produces a unique random pin every time fora new transaction for each and every user. This uses the technique of encryption of
alphabets and digits. The digits are ENCRYPTED from 0 to 9 and the alphabets are
ENCRYPTED from A to Z.
Here we take an empty string Rendompass and then this string takes the value of thenew password generated each time. Every time the password is generated this password
is updated and pen drives serial number is selected with the help of select command
along with the users mobile number so that this transaction password can be sendsuccessfully.
Here we use a function of .net Rnd.next and a loop to each time generate a new
password of 6 digits which could either be a numeric or alphanumeric. This random pin
will be send to the user with the help of a SMS portal to users mobile number.
With the help of this Random pin generated each time we would be able to make our
transactions very secure and we will be able to prevent all the threats , frauds happening
in our daily life due to the lost or stolen or misplaced cards. Now a days stolen cards areeasily accessed during shopping just swap and can any signature can fulfill the purpose.
This low cost effective technique will be prove to be beneficial both to the bank
authority and customers .In this modern world sending SMS are very cheap and provide
ease of communication so this web application can be implemented in Real TimeSystems too.
User Requirements:
22
-
7/29/2019 aftertable(1)edgerghg
23/36
Hardware:
Processor : 1.0 GHz and above
Memory : 256 MB RAM
Network : Active Internet Connection
Technology Used:
Front End : ASP.NET
Backend : MY SQL DATABASE
Software:
Internet Browser
Visual studio
MethodologyAdopted:
1. One and the main modifications made in this very project is the usage of a Pen Drive
instead of an ATM card as per the technology.
2. We insert a Pen Drive to the system, this shall lead us to a Login Interface.
3. This Login Interface requires us to fill in details, the username and the password. On
filling these up, the system enters our account.
4. On the other hand as the user enters the account the random pin generator generates a
random pin. This pin is sent to the users mobile phone number in a SMS.
5. To complete the transaction the user now needs to enter this pin.
6. If the pin matches the correct pin the transaction is completed, otherwise an error
message shall appear.
CHAPTER 7:
23
-
7/29/2019 aftertable(1)edgerghg
24/36
RECOMMENDATIONS
As we have applied SMS portal in our web application in future as we see the number of users
increasing on using this web application then there may be a chance of having a heavy traffic on
the server due to which it may delay in sending a SMS to the registered user because of which a
user may back out to use the proposed application. To prevent this heavy traffic on SMS server
we can implement the idea of biometric usage in which in future for every card user we can have
the record of every distinct users finger print and use it as an alternative to authenticate the
transaction instead of SMS which will be 100% secure of any financial transaction taking place
regarding that card.
This delaying of reaching SMS can surely cause the downfall of this web application so on the
basis of that to prevent it we can use the best of biometric usage in this web application.
CHAPTER 8:
SYSTEM TESTING
The testing and implementation they are important and final phases. All the process that has been
done is just a trail or by assumption. All the required hardware & software is prepared for the
testing so that some errors or some modifications may be required for further proceeding.
24
-
7/29/2019 aftertable(1)edgerghg
25/36
8.1 SYSTEM TESTING
Testing is vital to the success of the system. System testing makes a logical assumption that if all
parts of the system are correct. The goal will be successfully achieved. There are four steps with
in, they are,
Unit Testing
Integration Testing
Validation testing
Output Testing
8.1.1 UNIT TESTING
In this testing, the smaller part of the project is tested first that is modules and the sub functions
present in the project. It seems to be working satisfactorily with out the errors and that shows the
unit testing is successful.
8.1.2 INTEGRATION TESTING
The integration testing is a part that the software makes all functions behaviors and process
required. The errors which are uncovered are integrated testing, are corrected during this phase.
The collection of the functions are tested and found with errors are rectified .So that the result
can be easily obtained in a successful manner.
8.1.3 VALIDATION TESTING
The validation part is very much essential for each every application projects so that each data can be
validated in a good manner. In some cases the records are created according to the key of the
corresponding table to which it has been referenced for data constraint for good secured database.
While testing the system by using test data errors are again uncovered and corrected by using above
25
-
7/29/2019 aftertable(1)edgerghg
26/36
testing steps and corrections are also noted for future use. If there is any error then it is allowed for
testing from the beginning.
8.1.4 OUTPUT TESTING
The output is major required part of the development of the project. The output is tested for required
format, if it does not acquire such format then the testing is done or any screen modification is alone
for the further operations. The output testing is mainly for the two things they are,
On screen format
Print format
The screen is found to be correct as the format designed according to the user needs
for the hard copy also; the output comes out as specified by the user. Hence output testing
doesnt result in any correction in the system.
8.2 SYSTEM IMPLEMENTATION
Training the operating staff
Installing hardware
Installing terminals
Installing telecommunication network before system is up and running.
In the implementation phase, the project reached its fruition. After the development phase of the
SDLC is complete, the system is implemented. The software, which was designed in design and
programmed in development phase of the SDLC, was installed on all the PCs that require it. The
personas using the program was trained during this phase of the SDLC. Moreover, both the
hardware and software are tested. Although we found and fixed many problems, almost
invariably, the users helped us to uncover problems that we were unable to simulate. These were
the main activities performed by us in the course of the project, which lead to its proper
completion.
26
-
7/29/2019 aftertable(1)edgerghg
27/36
8.3 POST IMPLEMENTATON REVEIW
When computer based systems are built therefore we must develop mechanism for evaluating
controlling and making modifications, maintenance issued to improve the case with which the
changes can be accommodated and reduce the amount of expended on its maintenance activity
occurs because it is unreasonable to assume that software testing will uncover all latest errors in
a large software system. The final event in the post implementation flow is review that
revalidates all elements of the system configuration and ensures correctness, after the software
maintenance, software reviews is being conducted for future maintenance effort and provides
feedback, which is important to effectively management of software organization.
CHAPTER 9:
RESULTS AND DISCUSSIONS
27
-
7/29/2019 aftertable(1)edgerghg
28/36
Fig 9.1 Admin Login screen
Fig 9.2 ICICI Bank Timer
Fig 9.3 User Registration Form
28
-
7/29/2019 aftertable(1)edgerghg
29/36
Fig 9.4 Account Type Form
Fig 9.5 Withdraw Form
29
-
7/29/2019 aftertable(1)edgerghg
30/36
Fig 9.6 Generation of Ministatement
Fig 9.7 Balance Enquiry Form
30
-
7/29/2019 aftertable(1)edgerghg
31/36
Fig 9.8 Generation of Random Pin
CHAPTER 10:
CONCLUSION
Here we have applied all the tools in improvising the ATM card security as we aimed to develop
with this security. Our project being designed to increase the security of credit card defaults havebeen implemented to prevent the misuse of them in future. Our research has shown us how being
a little carefree can lead misuse of it to a highly financial loss. We have applied our aim and
research to do the best to the prevention of all. In recommending for future usage at high scale
level implement of better technologies in our project will help more better and faster results.
This technology will surely bring results when implemented in Real time applications as it
would prove to be more reliable and cost effective as it will include a random pin generator
along with an SMS application.
ADVANTAGES
It is fast, efficient and reliable
31
-
7/29/2019 aftertable(1)edgerghg
32/36
Avoids data redundancy and inconsistency
Very user-friendly
Easy accessibility of data
Number of personnel required is considerably less
Provides more security and integrity to data
10.1 ATM Security Module Lets You:
Managing the Database Accurately and Efficiently
Whether your organization is a small business, a non-profit organization, or a multinational
corporation, you must have an accurate and timely way to manage the database of the company,
and generate the proper reports fulfilling all the requirements. This, more often than not, means
the implementation of registration module software into your accounting system. Without
registration software, the detailed elements involved with this task could quickly become
overwhelming.
Automating Tasks with Registration Module Software
Once the initial information is inputted into the system, registration module software can
automatically update figures and log them in the appropriate sections. These actions make
registration a much simpler and quicker process than if trying to perform these duties manually.
Minimizing Errors and Saving Time
The two biggest advantages to using registration module software are undoubtedly speed and
accuracy. The administration of this can be complex and prone to errors. Timely and accurate
company, trade and banking registrationare critical to any business of any size. Delays in such
32
-
7/29/2019 aftertable(1)edgerghg
33/36
updations can result in the wrong and out of date storage of data in the database.Registration
module software assures accuracy and timeliness.
Manage Regional Enrolments
Leverage on one core payroll engine to manage your regional payroll activities. The Payroll
Module supports multi-country, taking into account pre-determined statutory compliance for
each individual country. This way, companies can manage payroll and compensation with one
payroll engine that utilizes country-specific localizations. Even non-permanent staff can be
included in the payroll system.
Synchronize with Global System
Ability to interface with Enterprise Resource Planning System (ERP), in addition to the
traditional input methods. This can be done via MS Excel files. For Bonus and Variable Bonus
projections, there is a hypothetical worksheet modelling. This tool allows the extraction and
manipulation of raw data with queries while filters create scenarios and build projections. Upon
approval by management, results are ported to the employees payroll.
Monitor Performance andSecurity
Consistent and accurate reports on payroll and a comprehensive audit trail of all progress and
updates.
Automate payroll calculation and printing of paychecks
Eliminate tax penalties for inaccurate returns or late payments
Improve payroll accuracy with automatic tax and deduction calculations
Improve organization with consolidation of payroll records and reports
Reduce time spent calculating and completing government payroll forms
Improve management reports by tracking labor paid by job, cost center, or
account
33
-
7/29/2019 aftertable(1)edgerghg
34/36
CHAPTER 11:
FUTURE SCOPE AND ESTIMATED COST
In future we can implement this project for the higher scale and we can see easier ways to
provide security to cardholders by various methods. To use few methods can be used instead of
sms system we can apply biometric safety system which uses the finger print of an authorized
person which will genuinely end all the transaction frauds. Our project may go slow on higher
traffic using sms portal where the number of users increase they might have to wait longer for
sms to be received. T or prevent this in future we can come with more different ideas which
should be highly confidential. With more brains and time on our project we are sure we can
make it better for the use in market.
My SQL: Rs. 700/-
Conveyance charges for research travel: Rs. 1200/-
SMS portal: Rs 1000/-
Following are some of the benefits:-
Better Control
Control is in your hands. On-going validation procedures automatically result in higher quality
input, and errors can be detected and corrected immediately.
34
-
7/29/2019 aftertable(1)edgerghg
35/36
Added Flexibility
Because you use your source documents, screen input is customized by order or by company.
You'll experience fewer time restraints since registration is entered in batches and balanced daily
if desired.
Registration Information at your Fingertips
Because up-to-date registration and personnel information is always available online, you'll save
the time of looking up information on separate paper reports.
Time and Labor Savings
You'll reduce the time required to do a registration since it's no longer necessary to pre-sort input
documents, accumulate control totals or prepare d. Data transmission takes only minutes and can
be set up to send payroll data automatically even when you are not present.
Cost savings
Computerized accounting programs reduce staff time doing accounts and reduce audit expenses
as records are neat, up-to-date and accurate.
Confidentiality
Company access by company Id , trade licenses by license number and banking details by bank
code .
Withdrawal Processing
A computerized registration system has direct-registering capability, which saves money spent
on live checks and reconciliation. Additionally, paycheck and pay stub generation occurs
quickly, regardless of volume.
Up-to-date information
35
-
7/29/2019 aftertable(1)edgerghg
36/36
The accounting records are automatically updated and so account balances will always be up-to-
date.
CHAPTER 12:
REFERENCES
http://www.1000projects.com/new/java/major/46.html
http://en.wikipedia.org/wiki/Microsoft_SQL_Server
http://www.asp.net/sql-server/videos
http://dotnetkicks.com/mvc/Multi_tenant_ASP_NET_Foundation
http://www.asp.net/mvc/tutorials#Overview
http://en.wikipedia.org/wiki
http://www.asp.net/sql-server/videos
http://www.1000projects.com/new/java/major/46.htmlhttp://en.wikipedia.org/wiki/Microsoft_SQL_Serverhttp://www.asp.net/sql-server/videoshttp://dotnetkicks.com/mvc/Multi_tenant_ASP_NET_Foundationhttp://www.asp.net/mvc/tutorials#Overviewhttp://en.wikipedia.org/wikihttp://www.asp.net/sql-server/videoshttp://www.1000projects.com/new/java/major/46.htmlhttp://en.wikipedia.org/wiki/Microsoft_SQL_Serverhttp://www.asp.net/sql-server/videoshttp://dotnetkicks.com/mvc/Multi_tenant_ASP_NET_Foundationhttp://www.asp.net/mvc/tutorials#Overviewhttp://en.wikipedia.org/wikihttp://www.asp.net/sql-server/videos