aftertable(1)edgerghg

Upload: amar-chauhan

Post on 04-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 aftertable(1)edgerghg

    1/36

    SRS DOCUMENT

    1. INTRODUCTION

    1.1 Purpose

    1.1.1 The Software is for the securing ATM transaction while shopping.

    1.1.2 It maintains two levels of users:-

    Administrator Level

    User Level

    1.1.3 The Software includes:-

    Login page.

    User registration details

    Maintaining all the records of customers.

    Random pin generation

    1.2 Scope

    It can be used in any bank along with any shop to secure transaction while

    shopping.This will help to implement this web application in real time system.

    1.3 Technologies to be used

    This project will be an application to be developed in ASP.NET having Ms SQL

    Server as backend.

    Database Design (Ms SQL Server)

    Form Design (asp.net)

    Coding (vb.net and c#)

    1.4 Overview

    Project is related to securing ATM transaction while shopping.

    The project maintains two levels of users:-

    Administrator Level

    User Level-Data Entry

    1

  • 7/29/2019 aftertable(1)edgerghg

    2/36

    Maintaining records of customers

    Maintaining registered pen drive.

    Maintaining a Mini statement

    Maintaining all the transactions that took place till date

    Maintaining my account details

    2. OVERALL DESCRIPTION

    2.1 Product Perspective

    2.1.1 System Interfaces: None2.1.2 User Interfaces:

    2.1.2.1 Login screen

    2.1.2.2 Registration screen

    2.1.2.3 Record update screen

    2.1.2.4 Mini statement screen

    2.1.2.5 My account screen

    2.1.3 Hardware:

    2.1.3.1Processor: 1.0 GHz and above

    2.1.3.2 Memory: 256 MB RAM

    2.1.3.3 Network: Active Internet Connection

    2.1.4 Software:

    2.1.4.1 Front End: ASP.NET

    2.1.4.2 Backend: MY SQL DATABASE

    2.1.4.3 Internet Browser

    2

  • 7/29/2019 aftertable(1)edgerghg

    3/36

    3. SPECIFIC REQUIREMENTS

    3.1 User Interfaces:

    3.1.1 Login screen:

    i) User name

    ii)Password

    iii) Role: Administrator/customer

    3.1.2 Registration screen:

    i) Name

    ii) Address

    iii)Date of birth

    iv)Opening balance

    v)Pin number

    vi)Drive serial number

    3.1.3 Record update screen

    i)Patient name

    ii)Address

    iii)Phone number

    3.2 Hardware:

    3.2.1 Processor: 1.0 GHz and above

    3.2.2 Memory: 256 MB RAM

    3.2.3 Network: Active Internet Connection

    3.3 Software:

    3.3.1 Front End: ASP.NET

    3.3.2 Backend: MY SQL DATABASE

    3.3.3 Internet Browser

    3

  • 7/29/2019 aftertable(1)edgerghg

    4/36

    3.4 System Features:

    3.4.1 Project is related to ATM security.

    3.4.2 The project maintains two levels of users:-

    Administrator Level

    User Level-Data

    3.4.3 Main facilities available in this project are:-

    Random pin generator

    Sms Portal

    3.5 Software System Attributes:

    3.5.1 Security:

    The application will be password protected.

    The main reason for developing this application is security with the help of

    a random pin generator function

    3.5.2 Maintainability:

    The application will be designed in maintainable manner. It will be able to

    incorporate new requirements in individual modules.

    3.5.3 Portability:

    The system will be easily portable on any window based system that has

    MS-SQL server installed.

    3.6 Logical Database Requirements:

    3.6.1 Customer Information like name, address,phone number,D.O.B,drive

    number

    3.6.2 User account Information

    4

  • 7/29/2019 aftertable(1)edgerghg

    5/36

    CHAPTER 1:

    INTRODUCTION

    1.1 Purpose

    1.1.1 The Software is for the securing ATM transaction while shopping.

    1.1.2 It maintains two levels of users:

    Administrator Level

    User Level

    1.1.3 The Software includes:-

    Login page.

    User registration details.

    Maintaining all the records of customers.

    Random pin generation.

    1.2 Scope

    It can be used in any bank along with any shop to secure transaction while shopping. This

    will help to implement this web application in real time system

    1.3 Technologies to be used:

    This project will be an application to be developed in ASP.NET having Ms SQL Server

    as backend.

    Database Design (Ms SQL Server)

    Form Design (asp.net)

    Coding (vb.net and c#)

    1.4 Overview

    Project is related to securing ATM transaction while shopping.

    The project maintains two levels of users:-

    Administrator Level

    5

  • 7/29/2019 aftertable(1)edgerghg

    6/36

    User Level-Data Entry

    Maintaining records of customers

    Maintaining registered pen drive.

    Maintaining a Mini statement

    Maintaining all the transactions that took place till date

    Maintaining my account details

    6

  • 7/29/2019 aftertable(1)edgerghg

    7/36

    CHAPTER 2:

    SYSTEM REQUIREMENTS

    2.1 User Requirements:

    Hardware:

    Processor : 1.0 GHz and above

    Memory : 256 MB RAM

    Network : Active Internet Connection

    Technology Used:

    Front End : ASP.NET

    Backend : MY SQL DATABASE

    Software:

    Internet Browser

    Visual studio

    CHAPTER 3:

    SYSTEM ANALYSIS AND FEASIBILITY

    7

  • 7/29/2019 aftertable(1)edgerghg

    8/36

    3 Feasibility Study

    Depending on the results of the initial investigation the survey is now expanded to a

    more detailed feasibility study. FEASIBILITY STUDY is a test of system proposal

    according to its workability, impact of the organization, ability to meet needs and

    effective use of the resources. It focuses on these major questions:

    1. What are the users demonstrable needs and how does a candidates systemmeet them?

    2. What resources are available for given candidate system?

    3. What are the likely impacts of the candidate system on the organization?

    4. Whether it is worth to solve the problem?

    During feasibility analysis for this project, following primary areas of interest are to

    beconsidered. Investigation and generating ideas about a new system does this.

    Steps in feasibility analysis

    Eight steps involved in the feasibility analysis are:

    Form a project team and appoint a project leader.

    Prepare system flowcharts.

    Enumerate potential proposed system.

    Define and identify characteristics of proposed system

    Determine and evaluate performance and cost effective of each proposed system.

    Weight system performance and cost data.

    Select the best-proposed system

    Prepare and report final project directive to management.

    8

  • 7/29/2019 aftertable(1)edgerghg

    9/36

    3.1 Technical feasibility

    A study of resource availability that may affect the ability to achieve an acceptablesystem. This

    evaluation determines whether the technology needed for the proposedsystem is available or not.

    Can the work for the project be done with current equipment existing software technology &

    available personal?

    Can the system be upgraded if developed?

    If new technology is needed then what can be developed?

    This is concerned with specifying equipment and software that will successfully satisfythe user

    requirement. The technical needs of the system may include:

    Front-end and back-end selection

    An important issue for the development of a project is the selection of suitable front-end

    and back-end. When we decided to develop the project we went through an extensive

    study to determine the most suitable platform that suits the needs of the organization as

    well as helps in development of the project.

    The aspects of our study included the following factors.

    Front-end selection:

    It must have a graphical user interface that assists employees that are not from

    ITbackground.

    Scalability and extensibility.

    Flexibility.

    Robustness.

    According to the organization requirement and the culture.

    9

  • 7/29/2019 aftertable(1)edgerghg

    10/36

    Must provide excellent reporting features with good printing support

    Platform independent.

    Easy to debug and maintain.

    Event driven programming facility.

    Front end must support some popular back end like Ms Access.

    Back-end Selection:

    Multiple user support.

    Efficient data handling.

    Provide inherent features for security.

    Efficient data retrieval and maintenance.

    Stored procedures.

    Popularity.

    Operating System compatible.

    Easy to install.

    Various drivers must be available.

    Easy to implant with the Front-end.

    3.2 Economical feasibility

    10

  • 7/29/2019 aftertable(1)edgerghg

    11/36

    Economic justification is generally the Bottom Line consideration for most systems.

    Economic justification includes a broad range of concerns that includes cost benefit

    analysis. In this we weight the cost and the benefits associated with the candidate

    system and if it suits the basic purpose of the organization i.e. profit making, the project

    is making to the analysis and design phase.

    The financial and the economic questions during the preliminary investigation areverified to

    estimate the following:

    The cost to conduct a full system investigation.

    The cost of hardware and software for the class of application being considered.

    The benefits in the form of reduced cost.

    The proposed system will give the minute information, as a result the

    performance is improved which in turn may be expected to provide increased

    profits.

    This feasibility checks whether the system can be developed with the availablefunds. The ATM

    SECURITY does not require enormous amount ofmoney to be developed. This can be done

    economically if planned judicially, so itis economically feasible

    3.3 Operational Feasibility

    It is mainly related to human organizations and political aspects. The points to be considered are:

    What changes will be brought with the system?

    What organization structures are disturbed?

    What new skills will be required?

    Do the existing staff members have theseskills?

    If not, can they be trained in due course of time?

    The system is operationally feasible as it very easy for the End users to operate it. It only needs

    basic information about Windows platform.

    3.4 Schedule feasibility

    11

  • 7/29/2019 aftertable(1)edgerghg

    12/36

    Time evaluation is the most important consideration in the development of project. The time

    schedule required for the developed of this project is very important since more development

    time effect machine time, cost and cause delay in the development of other systems.

    A reliableATM SECURITY SYSTEM can be developed in the considerable amount of time.

    Schedule of my project will be as follows:

    FEASIBILITY ANALYSIS 7TH JANUARY,2012

    MARKET RESEARCH 21ST JANUARY,2012

    DESIGNING 1ST FEBRUARY,2012

    CODING 3RD MARCH 2012

    MODULE TESTING 15THMARCH,2012

    SYSTEM TESTING 22ND MARCH,2012

    PROJECT SUBMISSION 25THMARCH,2012

    CHAPTER 4:

    PROJECT PLANNING

    12

  • 7/29/2019 aftertable(1)edgerghg

    13/36

    FEATURES OF SOFTWARE

    4.1 Microsoft Visual Studio

    Microsoft Visual Studio is Microsofts flagship software development product for

    computer programmers. It centers on an integrated distribution environment which hasprogrammers create stand alone, and web services that run on any platforms supported by

    Microsofts .Net Framework (for all versions after 6). Supported platforms include Microsoft

    windows, servers and workstations, Pocket PC, Smart Phones and World Wide Web browsers

    not the Java Virtual Machine that all other java tools target.

    4.2 Visual Studio 2010

    The most important language added in this version was the introduction of generics,which are similar in many aspects to C++ templates. This potentially increases the number of

    bugs caught at compile- time instead of run- time by encouraging the use of strict type checking

    in areas where it was not possible before, C++ also got a similar upgrade with the addition of C+

    +/CLI which is slated to replace the use of Managed C++. Other new features of Visual Studio

    2005 include the Development Designer which allows application designs to be validated

    before deployments, an improved environment for web publishing when combined with

    ASP.NET 2.0 and load testing to see application performance under various sorts of user loads.

    Visual Studio 2010 also added extensive 64- bit support. While the development environment

    itself only available as a 32- bit application, visual C++ 2010. supports compiling for

    (x64AMD64 and EM64T) as well as IA- 64 (Itanium). The platforms SDK include 64- bit and

    64-bit versions of the libraries.

    4.3 NET Framework SDK

    The .NET framework is an integral windows component that supports building and

    running the next generation of applications and XML web services. The key component of the

    .NET frame work are the common language run time and the. NET frame work class library,

    which includes ADO.NET, ASP.NET and windows forms. The .NET framework provides a

    managed execution environment simplified development and deployment and integration with a

    wide variety of programming languages.

    13

  • 7/29/2019 aftertable(1)edgerghg

    14/36

    This framework is made up of the following parts:

    The common language runtime(CLR)

    The base class libraries.

    Object oriented internet development with ASP.NET

    Rich client user interface using windows forms

    RAD for the internet using web forms

    4.4 Overview of the .NET Framework

    The .NET framework is a new computing platform that simplifies application

    development in the highly distributed environment of the internet. The .NET framework is

    designed to fulfill following objectives:

    To provide a consistent object oriented programming environment whether object code

    is stored and executed locally but internet- distributed or executed remotely.

    To provide a code execution environment that minimizes software deployment and

    versioning conflicts.

    To provide a code execution environment that guarantees safe execution of code,

    including code created by an unknown or semi trusted third party.

    To provide a code execution environment that eliminates the performance problem of

    scripted or interpreted environments.

    To make the developer experience consistent across widely types of application, such as

    windows based applications and web based applications.

    To build all communication on industry standards to ensure that code based on the .NET

    framework can integrate with any other code.

    14

  • 7/29/2019 aftertable(1)edgerghg

    15/36

    Fig 4.1 .NET Framework

    The .NET framework has two main components: the common language runtime and the .Net

    framework class library. The common language runtime is the foundation of the .NET

    framework. You can think of the runtime as an agent that manages code at execution time, and

    removing while also enforcing strict type safely and other forms of code accuracy that ensure

    security and robustness in fact the concept of code management is a fundamental principle of the

    runtime.

    4.5 Common Language Runtime (CLR)

    The common language runtime (CLR) is responsible for runt-time services such as

    language integration; security enforcement; and memory, process and thread management. In

    addition, it has a roll at development time when features such as life cycle management strong

    type naming, cross-language exception handling, dynamic binding and so on, reduce the amount

    of code that a developer must write to turn the business logic the reusable component. The

    runtime can be hosted by high performance, server-side applications, such an s Microsoft

    Internet Information Services (IIS) for building web applications with ASP.NE and the next

    release of Microsoft SQL Server. This infrastructure enables you to use code managed by

    15

  • 7/29/2019 aftertable(1)edgerghg

    16/36

    the .NET framework to write your business logic, while still enjoying the superior performance

    of the industrys best enterprises servers that support runtime hosting.

    4.6 ASP.NETASP.NET is a set of Microsoft.NET framework technologies used for building web

    applications and XML Web services. ASP.NET page execute on the server and generate mark

    up such as HTML, WML or XML that is sent to a desktop or mobile browser. ASP.NET pages

    use a compiled, event-driven programming model that improves performance and enables the

    separation of application logic and user interface. Both ASP.NET pages and ASP.NET web

    services files contain server-side (as opposed to client side logic) written in Visual basic .NET,

    C#.NET or any .NET compatible language, Web applications and XML Web Services take

    advantage of the features of the common language runtime, such as type safety, inheritance,

    language, interoperability, versioning, and integrated security.

    4.7 IIS

    Microsoft Internet Information S4ervices (IIS; formerly called Server is a set of

    Internet-based services for servers using Microsoft Windows. It is the worlds second most

    popular web server in terms of overall websites. As of September 2007 it served 34.94% of all

    websites and 36.63% of all active websites according to Net craft. The servers currently include

    FTP, SMTP, NNTOP, and HTTP/HTTPS.

    4.8 ADO.NET

    ADO.NET provides consistent access to data sources such a Microsoft SQL Server and

    XML, as well as to data sources exposed through OLE DB and ODBC. Data sharing consumer

    applications can use ADO.NET to connect to these data sources and retrieve, manipulate and

    update the data that they contain.

    ADO.NET separates data access from data manipulation into discrete components that

    can be used separately or in tandem. ADO.NET includes .NET Frame work data providers for

    connecting to a database, executing commands and retrieving results. Those results are either

    processed directly, placed in and ADO.NET Dataset objects in order to be exposed to the used in

    16

  • 7/29/2019 aftertable(1)edgerghg

    17/36

    an ad hoc manner, combined with data from multiple sources or remote between tiers. The

    ADO.NET Dataset object can also be used independently of a .NET Framework data provider to

    manage data local to the application or sourced from XML.

    The ADO.NET classes are found in System.Data.dll and are integrated with the XML

    classes found in System.Xml.dll. When compiling code that uses the System. Data, namespace

    reference both System.Data.dll and System.Xml.dll.

    ADO.NET provided functionality to developers writing managed code similar to the

    functionality provided to native component object model (COM) developers by ActiveX Data

    Objects (ADO).

    4.9 ADO.NET Components

    There are two components of ADO.NET that you can use to access and manipulate

    data:

    .NET Framework data providers.

    The DataSet

    4.10 NET Framework Data Providers

    The .NET Framework Data providers are components that have been explicitly

    designed for data manipulation and fast, forward-only, read-only access to data. The connection

    object provides connectivity to a data source. The command object enables access to database

    commands to return data, modify data, run stored procedures and send or retrieve parameter

    information. The Data Adapter provides a high-performance stream of data from the data

    source. Finally, the Data Adapter provides the bridge between the DataSet object and the data

    source. The Data Adapter uses command object to execute SQL commands at the data source to

    both load the DataSet with data and reconcile changes made to the data in the DataSet back to

    the data source.

    17

  • 7/29/2019 aftertable(1)edgerghg

    18/36

    4.11 The DataSet

    The ADO.NET DataSet is explicitly designed for data access independent of any data

    source. As a result, it can be used with multiple and differing data sources used with XML data

    or used to manage data local to the application. The DataSet contains a collection n of one or

    more DataTable objects made up to rows and columns of data as well as primary key, foreign

    key, constraint and relation information about the data in the DataTable objects.

    4.12 Benefits of ADO.NET

    ADO.NET offers several advantages over previous versions of ADO and over other

    data access components. These benefits fall into the following categories:

    1. Interoperability

    2. Maintainability

    3. Programmability

    4. Salability.

    4.13 Chosen Database: SQL Server Management Studio

    SQL Server Management Studio is a software application first launched with the Microsoft SQL

    Server 2005 that is used for configuring, managing, and administering all components within

    Microsoft SQL Server. The tool includes both script editors and graphical tools which work with

    objects and features of the server. A central feature of SQL Server Management Studio is the

    Object Explorer, which allows the user to browse, select, and act upon any of the objects within

    the server. It also has an "express" version that can be freely downloaded.

    18

  • 7/29/2019 aftertable(1)edgerghg

    19/36

    CHAPTER 5:

    PROBLEM STATEMENT

    EXISTING SYSTEM

    In existing system of ATM card we dont have the proper security for a user as if his or her card

    is lost or incase misplaced by any chance he can face a big financial loss within the time he will

    get to know about his card. As in anyone can take anyones card and without the registered user

    any transaction can take place.

    To prevent this security in the present system we will be applying our new idea of securing the

    transaction with the help of random pin generator and sms portal. The problem which exists in

    the current system has made the many go victim of this credit card or ATM card defaulter for

    which in the end either the user or the bank has to pay the amount as it will be too late by the

    time it comes in knowledge of registered user about his loss which can be at higher scale too.

    This system will prove to be beneficial due to its low cost and more benefits it provides to the

    card users as well as bank.This low on cost web application will enhance security to a level

    which will raise standards of security in India.

    This web application can be implemented into real time system efficiently.

    CHAPTER 6:

    19

  • 7/29/2019 aftertable(1)edgerghg

    20/36

    DESIGN AND IMPLEMENTATION

    Project Planning

    Fig 6.1 Project Planning

    20

  • 7/29/2019 aftertable(1)edgerghg

    21/36

    Fig 6.2 E-R Diagram

    With the help of following these steps we were successfully able to build our web application

    (1) The process to be followed to identify an individual through a username and password.

    (2) The process will follow in authorizing a transaction through an ATM system will identify.(3) The integration model will develop public portal will be used to send the message to the user

    and random code generator will be used to generate the code which is to be sent for the safer

    authentication.

    21

  • 7/29/2019 aftertable(1)edgerghg

    22/36

    MODULE-Random Pin Generator

    Random pin Generator is a function which produces a unique random pin every time fora new transaction for each and every user. This uses the technique of encryption of

    alphabets and digits. The digits are ENCRYPTED from 0 to 9 and the alphabets are

    ENCRYPTED from A to Z.

    Here we take an empty string Rendompass and then this string takes the value of thenew password generated each time. Every time the password is generated this password

    is updated and pen drives serial number is selected with the help of select command

    along with the users mobile number so that this transaction password can be sendsuccessfully.

    Here we use a function of .net Rnd.next and a loop to each time generate a new

    password of 6 digits which could either be a numeric or alphanumeric. This random pin

    will be send to the user with the help of a SMS portal to users mobile number.

    With the help of this Random pin generated each time we would be able to make our

    transactions very secure and we will be able to prevent all the threats , frauds happening

    in our daily life due to the lost or stolen or misplaced cards. Now a days stolen cards areeasily accessed during shopping just swap and can any signature can fulfill the purpose.

    This low cost effective technique will be prove to be beneficial both to the bank

    authority and customers .In this modern world sending SMS are very cheap and provide

    ease of communication so this web application can be implemented in Real TimeSystems too.

    User Requirements:

    22

  • 7/29/2019 aftertable(1)edgerghg

    23/36

    Hardware:

    Processor : 1.0 GHz and above

    Memory : 256 MB RAM

    Network : Active Internet Connection

    Technology Used:

    Front End : ASP.NET

    Backend : MY SQL DATABASE

    Software:

    Internet Browser

    Visual studio

    MethodologyAdopted:

    1. One and the main modifications made in this very project is the usage of a Pen Drive

    instead of an ATM card as per the technology.

    2. We insert a Pen Drive to the system, this shall lead us to a Login Interface.

    3. This Login Interface requires us to fill in details, the username and the password. On

    filling these up, the system enters our account.

    4. On the other hand as the user enters the account the random pin generator generates a

    random pin. This pin is sent to the users mobile phone number in a SMS.

    5. To complete the transaction the user now needs to enter this pin.

    6. If the pin matches the correct pin the transaction is completed, otherwise an error

    message shall appear.

    CHAPTER 7:

    23

  • 7/29/2019 aftertable(1)edgerghg

    24/36

    RECOMMENDATIONS

    As we have applied SMS portal in our web application in future as we see the number of users

    increasing on using this web application then there may be a chance of having a heavy traffic on

    the server due to which it may delay in sending a SMS to the registered user because of which a

    user may back out to use the proposed application. To prevent this heavy traffic on SMS server

    we can implement the idea of biometric usage in which in future for every card user we can have

    the record of every distinct users finger print and use it as an alternative to authenticate the

    transaction instead of SMS which will be 100% secure of any financial transaction taking place

    regarding that card.

    This delaying of reaching SMS can surely cause the downfall of this web application so on the

    basis of that to prevent it we can use the best of biometric usage in this web application.

    CHAPTER 8:

    SYSTEM TESTING

    The testing and implementation they are important and final phases. All the process that has been

    done is just a trail or by assumption. All the required hardware & software is prepared for the

    testing so that some errors or some modifications may be required for further proceeding.

    24

  • 7/29/2019 aftertable(1)edgerghg

    25/36

    8.1 SYSTEM TESTING

    Testing is vital to the success of the system. System testing makes a logical assumption that if all

    parts of the system are correct. The goal will be successfully achieved. There are four steps with

    in, they are,

    Unit Testing

    Integration Testing

    Validation testing

    Output Testing

    8.1.1 UNIT TESTING

    In this testing, the smaller part of the project is tested first that is modules and the sub functions

    present in the project. It seems to be working satisfactorily with out the errors and that shows the

    unit testing is successful.

    8.1.2 INTEGRATION TESTING

    The integration testing is a part that the software makes all functions behaviors and process

    required. The errors which are uncovered are integrated testing, are corrected during this phase.

    The collection of the functions are tested and found with errors are rectified .So that the result

    can be easily obtained in a successful manner.

    8.1.3 VALIDATION TESTING

    The validation part is very much essential for each every application projects so that each data can be

    validated in a good manner. In some cases the records are created according to the key of the

    corresponding table to which it has been referenced for data constraint for good secured database.

    While testing the system by using test data errors are again uncovered and corrected by using above

    25

  • 7/29/2019 aftertable(1)edgerghg

    26/36

    testing steps and corrections are also noted for future use. If there is any error then it is allowed for

    testing from the beginning.

    8.1.4 OUTPUT TESTING

    The output is major required part of the development of the project. The output is tested for required

    format, if it does not acquire such format then the testing is done or any screen modification is alone

    for the further operations. The output testing is mainly for the two things they are,

    On screen format

    Print format

    The screen is found to be correct as the format designed according to the user needs

    for the hard copy also; the output comes out as specified by the user. Hence output testing

    doesnt result in any correction in the system.

    8.2 SYSTEM IMPLEMENTATION

    Training the operating staff

    Installing hardware

    Installing terminals

    Installing telecommunication network before system is up and running.

    In the implementation phase, the project reached its fruition. After the development phase of the

    SDLC is complete, the system is implemented. The software, which was designed in design and

    programmed in development phase of the SDLC, was installed on all the PCs that require it. The

    personas using the program was trained during this phase of the SDLC. Moreover, both the

    hardware and software are tested. Although we found and fixed many problems, almost

    invariably, the users helped us to uncover problems that we were unable to simulate. These were

    the main activities performed by us in the course of the project, which lead to its proper

    completion.

    26

  • 7/29/2019 aftertable(1)edgerghg

    27/36

    8.3 POST IMPLEMENTATON REVEIW

    When computer based systems are built therefore we must develop mechanism for evaluating

    controlling and making modifications, maintenance issued to improve the case with which the

    changes can be accommodated and reduce the amount of expended on its maintenance activity

    occurs because it is unreasonable to assume that software testing will uncover all latest errors in

    a large software system. The final event in the post implementation flow is review that

    revalidates all elements of the system configuration and ensures correctness, after the software

    maintenance, software reviews is being conducted for future maintenance effort and provides

    feedback, which is important to effectively management of software organization.

    CHAPTER 9:

    RESULTS AND DISCUSSIONS

    27

  • 7/29/2019 aftertable(1)edgerghg

    28/36

    Fig 9.1 Admin Login screen

    Fig 9.2 ICICI Bank Timer

    Fig 9.3 User Registration Form

    28

  • 7/29/2019 aftertable(1)edgerghg

    29/36

    Fig 9.4 Account Type Form

    Fig 9.5 Withdraw Form

    29

  • 7/29/2019 aftertable(1)edgerghg

    30/36

    Fig 9.6 Generation of Ministatement

    Fig 9.7 Balance Enquiry Form

    30

  • 7/29/2019 aftertable(1)edgerghg

    31/36

    Fig 9.8 Generation of Random Pin

    CHAPTER 10:

    CONCLUSION

    Here we have applied all the tools in improvising the ATM card security as we aimed to develop

    with this security. Our project being designed to increase the security of credit card defaults havebeen implemented to prevent the misuse of them in future. Our research has shown us how being

    a little carefree can lead misuse of it to a highly financial loss. We have applied our aim and

    research to do the best to the prevention of all. In recommending for future usage at high scale

    level implement of better technologies in our project will help more better and faster results.

    This technology will surely bring results when implemented in Real time applications as it

    would prove to be more reliable and cost effective as it will include a random pin generator

    along with an SMS application.

    ADVANTAGES

    It is fast, efficient and reliable

    31

  • 7/29/2019 aftertable(1)edgerghg

    32/36

    Avoids data redundancy and inconsistency

    Very user-friendly

    Easy accessibility of data

    Number of personnel required is considerably less

    Provides more security and integrity to data

    10.1 ATM Security Module Lets You:

    Managing the Database Accurately and Efficiently

    Whether your organization is a small business, a non-profit organization, or a multinational

    corporation, you must have an accurate and timely way to manage the database of the company,

    and generate the proper reports fulfilling all the requirements. This, more often than not, means

    the implementation of registration module software into your accounting system. Without

    registration software, the detailed elements involved with this task could quickly become

    overwhelming.

    Automating Tasks with Registration Module Software

    Once the initial information is inputted into the system, registration module software can

    automatically update figures and log them in the appropriate sections. These actions make

    registration a much simpler and quicker process than if trying to perform these duties manually.

    Minimizing Errors and Saving Time

    The two biggest advantages to using registration module software are undoubtedly speed and

    accuracy. The administration of this can be complex and prone to errors. Timely and accurate

    company, trade and banking registrationare critical to any business of any size. Delays in such

    32

  • 7/29/2019 aftertable(1)edgerghg

    33/36

    updations can result in the wrong and out of date storage of data in the database.Registration

    module software assures accuracy and timeliness.

    Manage Regional Enrolments

    Leverage on one core payroll engine to manage your regional payroll activities. The Payroll

    Module supports multi-country, taking into account pre-determined statutory compliance for

    each individual country. This way, companies can manage payroll and compensation with one

    payroll engine that utilizes country-specific localizations. Even non-permanent staff can be

    included in the payroll system.

    Synchronize with Global System

    Ability to interface with Enterprise Resource Planning System (ERP), in addition to the

    traditional input methods. This can be done via MS Excel files. For Bonus and Variable Bonus

    projections, there is a hypothetical worksheet modelling. This tool allows the extraction and

    manipulation of raw data with queries while filters create scenarios and build projections. Upon

    approval by management, results are ported to the employees payroll.

    Monitor Performance andSecurity

    Consistent and accurate reports on payroll and a comprehensive audit trail of all progress and

    updates.

    Automate payroll calculation and printing of paychecks

    Eliminate tax penalties for inaccurate returns or late payments

    Improve payroll accuracy with automatic tax and deduction calculations

    Improve organization with consolidation of payroll records and reports

    Reduce time spent calculating and completing government payroll forms

    Improve management reports by tracking labor paid by job, cost center, or

    account

    33

  • 7/29/2019 aftertable(1)edgerghg

    34/36

    CHAPTER 11:

    FUTURE SCOPE AND ESTIMATED COST

    In future we can implement this project for the higher scale and we can see easier ways to

    provide security to cardholders by various methods. To use few methods can be used instead of

    sms system we can apply biometric safety system which uses the finger print of an authorized

    person which will genuinely end all the transaction frauds. Our project may go slow on higher

    traffic using sms portal where the number of users increase they might have to wait longer for

    sms to be received. T or prevent this in future we can come with more different ideas which

    should be highly confidential. With more brains and time on our project we are sure we can

    make it better for the use in market.

    My SQL: Rs. 700/-

    Conveyance charges for research travel: Rs. 1200/-

    SMS portal: Rs 1000/-

    Following are some of the benefits:-

    Better Control

    Control is in your hands. On-going validation procedures automatically result in higher quality

    input, and errors can be detected and corrected immediately.

    34

  • 7/29/2019 aftertable(1)edgerghg

    35/36

    Added Flexibility

    Because you use your source documents, screen input is customized by order or by company.

    You'll experience fewer time restraints since registration is entered in batches and balanced daily

    if desired.

    Registration Information at your Fingertips

    Because up-to-date registration and personnel information is always available online, you'll save

    the time of looking up information on separate paper reports.

    Time and Labor Savings

    You'll reduce the time required to do a registration since it's no longer necessary to pre-sort input

    documents, accumulate control totals or prepare d. Data transmission takes only minutes and can

    be set up to send payroll data automatically even when you are not present.

    Cost savings

    Computerized accounting programs reduce staff time doing accounts and reduce audit expenses

    as records are neat, up-to-date and accurate.

    Confidentiality

    Company access by company Id , trade licenses by license number and banking details by bank

    code .

    Withdrawal Processing

    A computerized registration system has direct-registering capability, which saves money spent

    on live checks and reconciliation. Additionally, paycheck and pay stub generation occurs

    quickly, regardless of volume.

    Up-to-date information

    35

  • 7/29/2019 aftertable(1)edgerghg

    36/36

    The accounting records are automatically updated and so account balances will always be up-to-

    date.

    CHAPTER 12:

    REFERENCES

    http://www.1000projects.com/new/java/major/46.html

    http://en.wikipedia.org/wiki/Microsoft_SQL_Server

    http://www.asp.net/sql-server/videos

    http://dotnetkicks.com/mvc/Multi_tenant_ASP_NET_Foundation

    http://www.asp.net/mvc/tutorials#Overview

    http://en.wikipedia.org/wiki

    http://www.asp.net/sql-server/videos

    http://www.1000projects.com/new/java/major/46.htmlhttp://en.wikipedia.org/wiki/Microsoft_SQL_Serverhttp://www.asp.net/sql-server/videoshttp://dotnetkicks.com/mvc/Multi_tenant_ASP_NET_Foundationhttp://www.asp.net/mvc/tutorials#Overviewhttp://en.wikipedia.org/wikihttp://www.asp.net/sql-server/videoshttp://www.1000projects.com/new/java/major/46.htmlhttp://en.wikipedia.org/wiki/Microsoft_SQL_Serverhttp://www.asp.net/sql-server/videoshttp://dotnetkicks.com/mvc/Multi_tenant_ASP_NET_Foundationhttp://www.asp.net/mvc/tutorials#Overviewhttp://en.wikipedia.org/wikihttp://www.asp.net/sql-server/videos