National ID Card Case Study

Great Essays
I. BACK GROUND
National ID cards for Unique Identification have long been advocated as resources to enhance national security, debunk probable terrorists, and guard against illegitimate immigrants. National ID Cards are in use in many realms around the world together with supreme European countries, Hong Kong, Malaysia, Singapore and Thailand.
Presently India; The Aadhar Project was sold to the public based on the claim that enrolment was “Controlled”. This basically meant that there was no legitimate obligation to enrol. The government and the Unique Identification Authority of India, however, worked, overtime to create a practical compulsion to enrol: National ID card was made mandatory for an ever-widening range of facilities and services.
…show more content…
INTRODUCTION
In this study we reduce the Aadhar coup and to create model of Secured multipurpose Unique System ID card framework with the help of technologies.Our proposed model reduces all the conflict issues of Aadhar Card like Forgery, Privacy, Security, Theft, Loss of Cards, which shrink problems such as multiple cards issued to single person for same tenacity encumbrance’s government work.
The national e-governance strategy in India, formerly known as Unique Identification Number (UID) ambitions to make our wellbeing structures more manageable and fair to every citizens of India. For this single-mindedness,
The Government of India has organized the Unique Identification Authority of India (UIDAI) which will

deliver every occupier, a unique identification number that will oblige as a proof of identity, permitting citizens to inaugurate their identifications anyplace in India.
TABLE I
FEATURES OF AADHAR CARD
Aadhaar work as Aadhaar not work as
A 12-digit unique identity for every Indian individual, including children and infants Just another card like multipurpose
…show more content…
Reimbursements Of National ID as Smart Card
Different substitute, not as much of secure ID card technologies (such as magnetic stripe, RFID), smart card technology maintenances various unique topographies that can make stronger the security and privacy of any ID system. Singlehanded essential characteristic of a secure ID system is the facility to yoke the separable owning an identity document securely to the document, in consequence providing strong authentication of the individual’s uniqueness. Smart card technology ropes PINs, biometric influences, and chromatic identity verification. Smart cards upkeep the encryption of sensitive data, both on the testimonial and all through communications with an external reader. Smart cards discourage forgers and can ensure that only the person to whom the card is allotted will be gifted to verify themselves when the card is accessible. No other technology can offer such secure, trusted, and cost-effective identification capabilities. Smart card tools can maintenance the additional applications that heighten citizen convenience besides/otherwise government service

Related Documents

  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Chip Card Nightmares Published in Wall Street Journal, Joanna Stern’s “Chip Card Nightmares, Help Is on The Way” (a) Swipe the card (b) get scold by the cashier to use the chip reader (c) insert the chip and cancel all foreseeable plans (d) wait, wait some more and celebrate once you hear that joyless “ remove your card” sound. I want you to remember that next time you experience, it’s not you. It’s the banks, credit card companies, merchants, payment processors, terminal Manufacturers and many others But there’s a ray of hope; your Smartphone.…

    • 94 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    According to National Conference of State Legislature, “Texas (Act 123, SB 14): Amended a 1997 law to create a strict photo ID requirement; went into effect in 2013, and has faced court challenges; in August 2015 a federal appeals court ruled it could not be enforced while the case goes back to a lower court; a final ruling is yet to come.” On the National Conference of State Legislature website, they have a chart that represents the strict photo or some form of identification from 2000 to 2016. The chart shows the decrease of no ID requirement and the increase of some form of identification. There are multiple advantages and disadvantages to the Texas’ Picture ID Law. An advantage of the law would be to prevent illegal voting in Texas.…

    • 1063 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Blown To Bits Analysis

    • 346 Words
    • 2 Pages

    Blown to Bits Chapter 2 showed us how private the digital world is. Headline spoke upon different types about privacy around the globe. The main topic was Radio Frequency Identification Tags (RFID). The topic entirely went into detail about how it knows almost everything about a person or company. This Chapter reveled benefits, effects of technology being in our private lives and the change it has had on our society as a whole.…

    • 346 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    There is currently a great debate in our nation about the necessity of Voter ID laws and the impact they will have on our democracy. It is with clear distinction that the Voter ID laws recently passed in various states, noted by right wing support, are a clear infringement on the ideals of a collective and openly participatory democracy. Voter ID laws, which in their inception are supposedly to protect democratic thought, would be a noble effort if they were implemented without malicious intentions and voter fraud was actually a problem. These Voter ID laws, in fact, act to deter and discriminate against minorities and various groups. From 2000-2010 there were only 13 cases of voter fraud demonstrating that there is no reason to enact cumbersome…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The Future of Policing in America The wrong doers won’t stand a chance when in future the police force will become all technically sound and intelligent. When they will be able to find the culprits from the suspects within no time, when chasing the track to robberies and controlling angry crowd won’t be any problem. Technologies like the body cameras and other tracking devices are already a part of enhancements the police department already owns and uses. They help a great deal in ensuring flawless operation management.…

    • 1028 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In the post 9/11 era “Smart Borders” has become a multi-faceted political, economic, and international endeavor balancing policy, to facilitate the safe and legal flow of goods and people through an array of technologies. After 9/11 extra attention was placed on cargo transportation systems, inspection technologies, and traffic management systems in an effort to ease congestion at the borders and extend inspections to include points of departure abroad (Andreas, 2009). Furthermore this emphasis was reinforced by the thirty points “smart border” declaration signed between Canada and the United States, and shortly after with Mexico (Andreas, 2009). The concept behind smart borders was to create a layer approach to border controls and cross…

    • 664 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Many said that this was unconstitutional. In 2005 when Illinois passed strict voter ID laws, they were taken to court in the case Crawford v. Marion County Election Board. In a 6-3 decision the court decided “that the photo I.D. requirement was closely related to Indiana’s’ legitimate state interests in preventing voter fraud. The slight burden the law imposed on voters’ rights did not outweigh these interests” (Roberts Court, 2008, “Crawford,” para. 3).…

    • 1147 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    “India, the country that occupies the greater part of South Asia. It is a constitutional republic consisting of 29 states, each with a substantial degree of control over its own affairs; 6 less fully empowered union territories; and the Delhi national capital territory, which includes New Delhi, India’s capital. With roughly one-sixth of the world’s total population, India is the second most-populous country, after China” (Schwartzberg). India can be a shock to some when it comes to their economy, there are people that are so rich that they live in castles and own whole buildings and then there are people that live in the slums.…

    • 1147 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    "None of our Business?" by Roberta Fusaro Raydar Electronics is a technology firm which makes radio frequency identification tags and readers. This article describes the use of RFIDs and where they are placed, what their intended purpose is, and why it has stirred commotion to people. Dante Sorella, a CEO of a technology firm informs the readers of some presentations that were given as well. One quick example of this that places such as the US military which have been experimenting with RFIDs on tires for vehicles they use. Further into the article, Marketing director at KoolKids incorporated Carol Sullivan and the CEO of KK Craig Davis took an interest in Raydar to know what is going in and out of the warehouse.…

    • 950 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    States across the country are passing new voter ID laws. These laws happen to be supported strongly by Republicans and disapproved strongly by Democrats. The big question seems to be, does the new laws matter? The Indiana Supreme Court don’t think it matters.…

    • 712 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This argument would be valid if integrity were an increasingly problematic issue. From a period of 10 years (2002-2012), there were only 62 fraud cases in regards to voting. These facts only support the idea that there is some type of discrimination going on with the Voter Id law. Another factor is that the law allows a gun license as valid proof of identification, yet does not allow student id. “The law was unfavorable to young voters, who trend liberal, while favorable to gun owners, who trend conservative.”…

    • 741 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Forward: When Edward Snowden revealed that the NSA was spying on us in 2012, I expected people to be outraged. I expected a massive public backlash that would lead to reform. By and large, the public’s reaction has been underwhelming. For one reason or another, government surveillance is a topic that many people don’t know about or don’t talk about. I’ve talked to people about surveillance before, and many of them were unaware of key details about it.…

    • 1437 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Outsourcing Trends

    • 1566 Words
    • 7 Pages

    Briefly describe the technologies that are leading businesses into the third wave of electronic commerce. The key technologies that are leading businesses into the third wave of electronic commerce include mobile phones and tablets along with high-speed networks that allow users to access the Internet and smart cards and radio frequency identification devices (RFID) that are being used with biometric technologies such as retina scanners and fingerprint readers. In about 100 words, describe the function of the Internet Corporation for Assigned Names and Numbers. Include a discussion of the differences between gTLDs and sTLDs in your answer.…

    • 1566 Words
    • 7 Pages
    Improved Essays