Sep'12 - Punjab National Bank Institute of Information Technology
Sep'12 - Punjab National Bank Institute of Information Technology
Sep'12 - Punjab National Bank Institute of Information Technology
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
w<br />
iatkc uS'kuy cSad<br />
lpuk izkS|ksfxdh laLFkku<br />
foHkwfr [k.M] xkserh uxj] y[kumG & 226 010 ¼;w-ih-½<br />
-----cSafdax] foÙk ,oa chek {ks= esa lwpuk izkS|ksfxdh dk vxz.kh laLFkku<br />
punjab national bank<br />
institute <strong>of</strong> information technology<br />
Vibhuti Khand, Gomti Nagar, Lucknow- 226 010 (U.P.)<br />
..... a premier institute <strong>of</strong> information technology in the area <strong>of</strong> banking, finance & insurance<br />
Vol. VIII No. 1 Special Edition October 2011-September 2012<br />
ISSN 2249 –1996<br />
Biometrics In Uid: A Framework To Identify<br />
And Handle Vulnerabilities<br />
e-track
e-track<br />
Editor<br />
Pramod Dikshit<br />
Editorial Team<br />
Rashi Katiyar<br />
Sanjay Srivastava<br />
Sweety Dube<br />
Printed by<br />
e-track<br />
Dharmendra Tewari<br />
Swastik Printing Press<br />
27, Mai Gi Ki Bagiya,<br />
Kapoorthala Crossing,<br />
Mahanagar, Lucknow<br />
Mobile : 9415419300<br />
punjab national bank<br />
institute <strong>of</strong> information technology<br />
Vibhuti Khand, Gomti Nagar,<br />
Lucknow--226 010 (U.P.)<br />
T : +91 522 2721442, 2721174<br />
F : +91 522 2721201, 2721441<br />
E-mail : bankingtech@pnbiit.ac.in<br />
URL : www.pnbiit.ac.in<br />
Thought<br />
Beyond a wholesome discipline, be<br />
gentle with yourself. You are a child<br />
<strong>of</strong> the universe, no less than the<br />
trees or the stars; you have a right to<br />
be here.<br />
-Disiderata<br />
Dear Readers,<br />
FROM THE EDITOR<br />
When implemented and adopted<br />
efficiently, the Unique Identification (UID)<br />
project possesses the power to eliminate financial<br />
exclusion, enhance accessibility, and uplift living<br />
standards for the majority <strong>of</strong> poor. This can be<br />
achieved when the UID is effectively associated<br />
with pro poor welfare projects like the NREGS.<br />
The Unique Identification Authority <strong>of</strong> India (UIDAI) aims to issue a<br />
unique identification number to all Indian residents that is (1) robust<br />
enough to eliminate duplicate and fake identities, and (2) can be verified<br />
and reliably authenticated in an easy, cost-effective way. The ability <strong>of</strong><br />
UID to positively establish and authenticate the identity <strong>of</strong> every<br />
individual can overcome many <strong>of</strong> the challenges faced by targeted<br />
benefit programs.<br />
In this issue <strong>of</strong> our e-Track magazine the focus is on UID. We have an<br />
article written by Ms. Anumecha Bhasker, Pr<strong>of</strong>essor Richa Jindal and<br />
Ms. Navati Jain telling us about identifying and handling vulnerabilities<br />
in Biometrics <strong>of</strong> UID.<br />
Ms. Namrata Nagpal is telling us through her informative article the<br />
evolution and growth <strong>of</strong> electronic payments in India. How<br />
AADHAAR can be instrumental in getting electronic payment system<br />
seamless.<br />
Mr. Umanath Kumarasamy tells us through his research based article<br />
that with the help <strong>of</strong> technology empowerment and increasing use <strong>of</strong><br />
Smartphone and tabled based devices has increased the use <strong>of</strong> mobile<br />
banking many fold.<br />
Happy reading ...................<br />
Pramod Dikshit<br />
Contents<br />
From The Director's Desk 3<br />
Biometrics In Uid: A Framework To Identify And Handle Vulnerabilities 4<br />
Emergence Of Mobile <strong>Bank</strong>ing –the Indian Scenario 13<br />
Evolution And Growth Of Electronic (e-payments) In India 18<br />
News 22<br />
october 2011- september 2012<br />
2
e-track<br />
FROM THE DIRECTOR'S DESK<br />
It gives me immense pleasure to write this column especially when<br />
the <strong>Institute</strong> is entering a new phase <strong>of</strong> development. After the huge<br />
success in running five consecutive batches <strong>of</strong> our flagship programme<br />
“Advanced Diploma in <strong>Bank</strong>ing <strong>Technology</strong>”, with a 100% placement<br />
record, we have started a one year upgraded ADBT course (2012-2013)<br />
approved by the IBA. The industry today perceives the <strong>Institute</strong> as a<br />
premier state-<strong>of</strong>-the-art organization undertaking training in the domain<br />
<strong>of</strong> banking and information technology.<br />
For our <strong>Institute</strong>, the coming years are crucial for consolidation <strong>of</strong><br />
what has been achieved and focused efforts are needed to put on wheel the thoughts and actions<br />
towards accomplishment <strong>of</strong> the vision. I congratulate the team <strong>of</strong> PNBIIT for all achievements<br />
and thank all learned members <strong>of</strong> Governing Body and Academic Council <strong>of</strong> PNBIIT and all<br />
eminent personalities <strong>of</strong> different premier organizations who associated with the institute and<br />
contributed for its development.<br />
We have been publishing articles related to various domains <strong>of</strong> banking and IT. In this<br />
issue <strong>of</strong> e-track the focus is on UID as we have recently seen a wave <strong>of</strong> registrations and<br />
controversies surrounding the same. The Unique Identification Authority <strong>of</strong> India has<br />
envisioned the UID as a number that will make it possible for Indian residents to easily verify<br />
their identity to public and private agencies across the country. The UID will pave the way for a<br />
variety <strong>of</strong> applications that leverage the reliable authentication the UID <strong>of</strong>fers, within their<br />
infrastructure. Aadhar has an impact in financial sector especially micropayments. Despite the<br />
huge transformation <strong>of</strong> India's economic and regulatory structures, access to finance has<br />
remained scarce in rural India, and for the poorest residents in the country. Today, the proportion<br />
<strong>of</strong> rural residents who lack access to bank accounts remains at over 40%, and this rises to over<br />
three-fifths <strong>of</strong> the population in the east and north-east parts <strong>of</strong> India.<br />
To mitigate the lack <strong>of</strong> financial access in India, the regulator has focused on improving<br />
the reach <strong>of</strong> financial services in new and innovative ways – through no-frills account, the<br />
liberalization <strong>of</strong> banking and ATM policies, and branchless banking with business<br />
correspondents (BCs), which enables local intermediaries such as self-help groups and kirana<br />
stores to provide banking services. Related efforts also include the promotion <strong>of</strong> core-banking<br />
solutions in Regional Rural <strong>Bank</strong>s.<br />
B. K. Mahindroo<br />
(Director)<br />
3<br />
october 2011- september 2012
e-track<br />
BIOMETRICS IN UID: A FRAMEWORK TO IDENTIFY<br />
AND HANDLE VULNERABILITIES<br />
Anumeha Bhasker, Pr<strong>of</strong>. Richa Jindal & Navati Jain<br />
Introduction<br />
Chronologically, Australia was one <strong>of</strong> the first<br />
countries to try the implementation <strong>of</strong> a national ID<br />
card scheme, as early as 1986. These “Australia<br />
Cards” were intended to help check tax evasion and<br />
reduce illegal immigration. In the 1990's, countries<br />
like Canada, New Zealand and Philippines also<br />
initiated steps to introduce such national ID cards. In<br />
all these countries, the scheme had to be shelved<br />
after major public backlash. In the early 2000's,<br />
China attempted to introduce a national ID card<br />
scheme with biometrics, but soon had to withdraw<br />
upon realisation <strong>of</strong> biometrics' liability to major<br />
failures. USA and UK too, although having spent<br />
almost a decade trying to pass a bill, had to shelve the<br />
project after rigorous public protests. The countries<br />
that proposed the idea and failed to launch the<br />
project can be viewed in Table 1.<br />
Table 1. Countries that were forced to shelve<br />
national id project<br />
COUNTRY<br />
Australia<br />
United Kingdom<br />
United States <strong>of</strong> America<br />
China<br />
Canada<br />
New Zealand<br />
REASONS FOR FAILURE IN IMPLEMENTION<br />
Protests citing violation <strong>of</strong> Privacy and civil<br />
liberties.<br />
Protests against technological and Human Rights<br />
issues<br />
Protests on Confidentiality <strong>of</strong> private data.<br />
Difficulty in maintaining biometric data for a<br />
population so large.<br />
Public Protest against Privacy threat<br />
Public backlash against hampering on civil<br />
liberties.<br />
In the few countries that were able to<br />
incorporate the national ID schemes, this was done<br />
by adhering to public sentiments. For example,<br />
Sweden and Italy have extraordinary rules regarding<br />
use <strong>of</strong> data <strong>of</strong> it's citizens, Germany doesn't allow<br />
collection <strong>of</strong> biometric information, France<br />
launched a non-compulsory national ID card, and<br />
Greece had to remove certain data acquired<br />
following massive public protests (Table 2).<br />
Table 2. Countries which implemented national id<br />
project<br />
COUNTRY COMPROMISES MADE<br />
Hong Kong None, biometrics included.<br />
Malaysia None, biometrics included.<br />
Finland<br />
Little personal information and no<br />
biometric data.<br />
Germany No Biometrics<br />
2.0 Unique Identification In India: Aadhaar<br />
The Government <strong>of</strong> India has announced the<br />
creation <strong>of</strong> the Unique ID Authority <strong>of</strong> India<br />
(UIDAI) to generate the largest IT project <strong>of</strong> the<br />
globe – the Unique ID (UID) project – with an aim to<br />
provide a unique twelve digit number to 1.2 billion<br />
residents <strong>of</strong> India. The concept <strong>of</strong> national identity<br />
scheme is not very new for India as the Government<br />
had been evaluating various alternatives for an<br />
identity scheme since a couple <strong>of</strong> decades. The<br />
Government <strong>of</strong> India (GOI) undertook an effort to<br />
provide a clear identity to residents first in 1993,<br />
with the issue <strong>of</strong> photo identity cards by the Election<br />
Commission and subsequently in 2003, when it<br />
approved the Multipurpose <strong>National</strong> Identity Card<br />
(MNIC). The Unique Identification Authority <strong>of</strong><br />
India (UIDAI) was established in January 2009, as<br />
an attached <strong>of</strong>fice to the Planning Commission. The<br />
purpose <strong>of</strong> UIDAI is to issue a unique identification<br />
number (UID) to all Indian residents that is (a)<br />
robust enough to eliminate duplicate and fake<br />
identities, and (b) can be verified and authenticated<br />
october 2011- september 2012<br />
4
e-track<br />
in an easy, cost-effective way [6]. The process <strong>of</strong><br />
generating this identification number will start with<br />
getting the biometrics <strong>of</strong> each resident <strong>of</strong> the country<br />
along with certain demographic details, as would be<br />
needed for any business (like a bank or a telecom<br />
operator) or government organization to identify a<br />
particular Indian resident. Biometrics <strong>of</strong> all ten<br />
fingers, along with the iris scan <strong>of</strong> both the eyes and<br />
the photo <strong>of</strong> the face has been decided to be taken as<br />
identifiers <strong>of</strong> all residents.<br />
3.0 Biometrics Involved In The UID Project<br />
The UIDAI proposes to use three biometric<br />
devices for the implementation <strong>of</strong> this project<br />
namely the IRIS scanner, fingerprint scanner and a<br />
face camera [1]. The collection <strong>of</strong> such biometric<br />
data and the storage involved has been considered to<br />
be quite noteworthy in the UID project. The<br />
biometric solution capabilities, according to the<br />
UIDAI would be used for biometric enrolment,<br />
biometric deduplication and biometric verification<br />
(shown in Figure 1).The overall design <strong>of</strong> the<br />
biometric system is most likely based on three key<br />
criteria, i.e. Interoperability, upgradeability and user<br />
friendliness. It is proposed that multi-modal<br />
biometric features using three biometrics listed<br />
above (fingerprint, face and iris) would be used.<br />
Fig. 1: biometric solution capabilities<br />
To begin, let us discuss the biometrics being used in<br />
the UID project for verification and deduplication<br />
and then evaluate each critically.<br />
3.1 Finger Print Biometric<br />
A fingerprint scanner takes an image <strong>of</strong> the<br />
user's fingerprint. For verification, it uses this image<br />
to check if the image matches the one in the stored<br />
database. Fingerprint pattern ridges may be a whorl,<br />
an arch or a loop. Also, minutiae points i.e. when the<br />
ridges bifurcate or end are also taken into account.<br />
The pattern and these minutiae on one's fingertips is<br />
what makes up a fingerprint and this pattern is<br />
known to be unique and hence has been used as an<br />
identification technique.<br />
The UIDAI proposes to use fingerprint for<br />
deduplication purposes .Various factors are to be<br />
considered in the case <strong>of</strong> fingerprints such as the<br />
type <strong>of</strong> image, number <strong>of</strong> fingers to be captured, the<br />
device used, immediate processing and the storage<br />
used. Though rolled images contain twice as much<br />
information as the plain image, they have been ruled<br />
out by the UIDAI as they require each finger to be<br />
scanned one at a time. The UIDAI committee has<br />
recommended scanning <strong>of</strong> all ten fingers as that<br />
would help improve the accuracy and matching<br />
speed especially in the case <strong>of</strong> rural workers. Of<br />
course, the operational process (operator assistance,<br />
corrective measures and retries) plays a role in<br />
obtaining good quality images. Since the UIDAI<br />
committee recommends that the image should not be<br />
compressed, the total storage required for the entire<br />
population is expected to be 10,000 TB. [2]<br />
Finger print will be used for authentication as<br />
well, but the requirements for accuracy,<br />
performance and interoperability are different .The<br />
UIDAI committee states that since a 1:1 verification<br />
is performed, the image may be <strong>of</strong> lower quality. In<br />
this case, a single or fewer fingers should provide<br />
sufficient accuracy. The format <strong>of</strong> the image to be<br />
5<br />
october 2011- september 2012
e-track<br />
transmitted would depend on the transmission <strong>of</strong> fingerprint biometrics for verification has its set<br />
bandwidth as well as on the processing power <strong>of</strong> the <strong>of</strong> setbacks (Figure 3):<br />
capture device [2].<br />
3.1.1 How the usage <strong>of</strong> Fingerprint Biometrics is<br />
Beneficial.<br />
When thinking with respect to the UID<br />
A major issue is that fingerprints <strong>of</strong> many<br />
people can change with time due to scars or<br />
aging .This is particularly seen in the case <strong>of</strong><br />
manual laborers, which comprise a huge<br />
project's incorporation <strong>of</strong> fingerprint biometrics for population in the country.<br />
individual verification, for a country as large as The greater concern is that, there is a<br />
India, there exist the following advantages (Figure possibility <strong>of</strong> users who are falsely matched or<br />
2): not matched at all. Many such examples are<br />
It is easy to implement and inexpensive to cited in [3] such as the case <strong>of</strong> Brandon<br />
install. This is fortuitous for several machines Mayfield, who was wrongly accused <strong>of</strong><br />
all over the country shall be required to be having been, involved the 2004 Madrid<br />
installed.<br />
Bombing, solely due to wrong fingerprint<br />
Having a record <strong>of</strong> Fingerprints in a matching.<br />
centralized database <strong>of</strong> the people in the Even the UIDAI committee recognizes that<br />
country can prove to be very useful for the “retaining efficacy while scaling the<br />
forensics<br />
database size from fifty million to a billion has<br />
Moreover, since fingerprint has the largest not been adequately analyzed.”[2]<br />
market share <strong>of</strong> all biometrics modalities, Also, Fingerprint quality, the most important<br />
globally it also has a variety <strong>of</strong> suppliers and a variable for determining de-duplication<br />
base <strong>of</strong> experienced pr<strong>of</strong>essionals. The UIDIA accuracy, has not been studied in depth in the<br />
feels that this would be required to implement UID context. [2]<br />
the unique identity management solution at<br />
the scale that India needs.<br />
Where fingerprint<br />
biometrics in UID lacks<br />
Why fingerprint biometrics in UID is a good<br />
Fingerprints may<br />
change with time<br />
Possibility <strong>of</strong><br />
falsely matched<br />
users<br />
Retaining<br />
efficacy while<br />
scaling up<br />
Fingerprint<br />
quality studies<br />
Fig.3. Disadvantages <strong>of</strong> fingerprint biometrics in UID.<br />
Inexpensive and easy to<br />
implement<br />
Experienced pr<strong>of</strong>essionals<br />
easily available<br />
Fig.2. Advantages <strong>of</strong> fingerprint biometrics in UID.<br />
Useful for forensics<br />
3.1.2 How the usage <strong>of</strong> fingerprint biometrics<br />
may prove Ineffective.<br />
However, in a country as large as India, with<br />
people as diverse, belonging to different pr<strong>of</strong>essions<br />
and living in different environments, incorporation<br />
3.2 Iris Scan Biometric<br />
There are two types <strong>of</strong> biometrics for the eye:<br />
iris scanning and retinal scanning. Iris scanning<br />
involves recognition <strong>of</strong> the colored portions <strong>of</strong> the<br />
iris around the pupil. It then uses this recognized<br />
pattern for verification .Retina scan works on the<br />
blood vessel pattern in the retina <strong>of</strong> the eye. The<br />
october 2011- september 2012<br />
6
process for authentication for iris scans is<br />
considered unique for each individual.<br />
The camera takes an image <strong>of</strong> the iris. This<br />
captured image is then stored in the database. During<br />
deduplication as well as verification purposes, it is<br />
used to provide a match <strong>of</strong> the person based on the<br />
data stored in the database. This can be summarized<br />
as shown in the Figure 4.<br />
Since the UIDAI feels that fingerprinting may<br />
not be sufficient to ensure uniqueness, it has added<br />
iris scan to the biometrics. This would overcome the<br />
problem <strong>of</strong> non inclusion <strong>of</strong> poor residents and<br />
children .When both eyes are scanned it helps in<br />
more accurate estimation <strong>of</strong> roll angle. It was<br />
expected that a total space <strong>of</strong> 200 Terabytes would<br />
be required for the entire population. For<br />
authentication, the committee felt that one eye<br />
would serve the purpose.<br />
3.2.1 How the usage <strong>of</strong> Iris scanning biometric is<br />
Beneficial.<br />
There is plenty <strong>of</strong> literature to support iris<br />
scanning over fingerprint biometrics. When viewed<br />
with respect to the UID project in India, it has the<br />
following merits to it (Figure 5):<br />
e-track<br />
It is claimed that iris scans are inimitable, as<br />
the iris, as an organ, is supposed to be one <strong>of</strong><br />
the first organs to decay, after the death <strong>of</strong> a<br />
person. Thus, it would be hard to make an<br />
artificial iris or employ a dead one to bypass<br />
the system if the detection <strong>of</strong> the iris aliveness<br />
is functioning right. [4].<br />
Also, as stated in [5], unlike the case <strong>of</strong><br />
fingerprints, the iris <strong>of</strong> an individual is stable<br />
throughout his or her life.<br />
Speed <strong>of</strong> matching would be very high, i.e. the<br />
recognition algorithms can search up to 20<br />
million records in less than one second using a<br />
normal Quadcore – 2 Processor blade server.<br />
On the flip side, however, use usage iris<br />
Iris scanning is considered to give extremely scanning biometric doesn't come without its own set<br />
accurate results, overcoming the uncertainty <strong>of</strong> vulnerabilities. Some <strong>of</strong> these include (Figure 6):<br />
<strong>of</strong> error that lies with fingerprint biometrics.<br />
A major disadvantage would be that using this<br />
technology would prove to be quite expensive.<br />
This includes setting up <strong>of</strong> apparatus as well as<br />
employment <strong>of</strong> trained and skilled manpower.<br />
Fig. 4: Sequence involved in iris scan<br />
Fig.5. Advantages <strong>of</strong> iris scan biometrics in<br />
3.2.2 How the usage <strong>of</strong> iris scan biometric is<br />
Ineffective.<br />
The accuracy <strong>of</strong> hardware is also important as<br />
it obtains a small target from a distance that<br />
could be obstructed by eyelids.<br />
Also, care should be taken to ensure that the<br />
illumination is not too bright so as to avoid<br />
7<br />
october 2011- september 2012
e-track<br />
damage to the eye [6].<br />
There are the small issues, such as registering<br />
individual wearing contact lenses and so on.<br />
When compared to fingerprinting, iris scans<br />
are less studied and less standardized.<br />
WHERE IRIS SCAN<br />
BIOMETRICS LACKS IN UID<br />
Table.4. Comparison <strong>of</strong> fingerprint and iris scan<br />
biometrics<br />
Biometric Pros Cons<br />
Fingerprint · Inexpensive<br />
· Ease <strong>of</strong> implementation<br />
· Most standardized<br />
· More market<br />
Iris · Accurate<br />
· Inimitable<br />
· Stable, doesn’t change<br />
· High speed <strong>of</strong> matching<br />
· Fingerprint may change due to<br />
scars and aging<br />
· Non inclusion <strong>of</strong> children<br />
· Relatively high error rates<br />
· Expensive<br />
· Hardware accuracy<br />
· Less studied<br />
· Less standardized<br />
Expensive<br />
technology<br />
Closed eyelids<br />
may hamper<br />
accuracy<br />
Eye damage<br />
due to<br />
illumination<br />
conditions<br />
Registering<br />
citizen wearing<br />
contact lenses<br />
Fig.6. Disadvantages <strong>of</strong> iris scan biometrics in UID.<br />
Less studied<br />
and not<br />
standardised<br />
There are many other such technical<br />
challenges associated with robust face recognition.<br />
Face is currently a poor biometric for use in de-<br />
duplication. It performs better in verification but not<br />
at the accuracy rates that are sometimes claimed. An<br />
obvious way for an undesirable person to avoid face<br />
identification is by the use <strong>of</strong> disguise, which will<br />
cause False Negatives in a screening application. In<br />
general, it is a good biometric identifier for smallscale<br />
verification applications. In the UID project,<br />
Face images will be used primarily for human visual<br />
inspection and for deduplication purposes rather<br />
than verification as is the case for iris scan and<br />
fingerprint biometrics . However, automatic face<br />
recognition may be used as the secondary means <strong>of</strong><br />
authentication/deduplication. Hence, we shall not<br />
delve into the details <strong>of</strong> this method, and have<br />
mentioned it here for the sake <strong>of</strong> completeness.<br />
To provide a comparison, following data is<br />
provided in Table 3 based on measures from the<br />
Biometric Product Testing Final Report (19 March<br />
2001, Center for Mathematics and Scientific<br />
Computing, <strong>National</strong> Physical laboratory), UK. The<br />
terms used are explained as:<br />
FAR (False Acceptance Rate) is the<br />
probability that there would be incorrect<br />
matches <strong>of</strong> the input pattern.<br />
FRR (False Rejection Rate) is the probability<br />
that there is a failure to detect a match.<br />
FER (Failure to Enroll rate) is the rate at which<br />
the system is unsuccessful in trying to create a<br />
template from an input.<br />
Table 3: far, frr and fer rates for the iris and<br />
fingerprint biometric<br />
Biometric FAR<br />
(False<br />
Acceptance Rate)<br />
FRR<br />
(False Rejection Rate)<br />
FER<br />
(Failure to<br />
Enroll rate)<br />
Iris 1:1.2 million 0.1 – 0.2% 0.5%<br />
Fingerprint 1: 100000 2.0 – 3.0% 1.0 – 2.0%<br />
The summary <strong>of</strong> the positive and negative<br />
aspects <strong>of</strong> the two discussed biometrics may be<br />
viewed in Table 4.<br />
3.3 Face Recognition Biometrics<br />
Facial recognition is a method that can be used<br />
to distinguish between people and is one <strong>of</strong> the most<br />
natural ways <strong>of</strong> doing so. Such a system can identify<br />
or verify the person using digital pictures by<br />
comparing with those in a facial database. The face<br />
can prove to be to be a good biometric, but due to<br />
large database size and high value <strong>of</strong> target accuracy,<br />
its capability to improve the FAR rate is limited.<br />
october 2011- september 2012<br />
8
4.0 Issues with Biometrics Performance<br />
Testing<br />
When we speak <strong>of</strong> biometrics performance<br />
testing, we concern ourselves with the reporting <strong>of</strong><br />
recognition error (whether positive or negative, as to<br />
whether a biometric sample is from the same person<br />
as the biometric reference) and throughput rates –<br />
that has been the dominant biometric testing<br />
paradigm since early times. There also exist other<br />
forms <strong>of</strong> testing, such as standards- compliance,<br />
usability, reliability, availability, and<br />
maintainability, which are closely associated with<br />
technical testing [7].<br />
It is important to understand how there lies a<br />
certain 'uncertainty' when relying on biometrics for<br />
identity verification. “Uncertainty” is a broader<br />
concept than “error”. It represents the doubt about<br />
how well a test result represents the quantity it is said<br />
e-track<br />
behaviours, the physical environment <strong>of</strong> the test:<br />
including acoustic noise levels, humidity, day <strong>of</strong> the<br />
week, season <strong>of</strong> the year, and so on. This will be <strong>of</strong><br />
particular necessity when we speak <strong>of</strong> the Registrar<br />
Systems, when citizens come to claim a UID for<br />
themselves.<br />
So now, the tangible factors that impact the<br />
values <strong>of</strong> measurement at any given time must be<br />
controlled and monitored, while the intangible<br />
factors are what contribute to this 'uncertainty'.<br />
These uncertainties must still be dealt with. There<br />
are several ways to deal with uncertainties, and for<br />
the length <strong>of</strong> this paper, they shall be classified as<br />
Uncertainties tackled by Statistical Techniques and<br />
Uncertainties tackled by Other Techniques. The<br />
International Organization for Standardization<br />
document, “Guidelines for the Expression <strong>of</strong><br />
Uncertainty in Measurement” (GUM) categorises<br />
to measure. Uncertainty can exist even in the uncertainties as:<br />
absence <strong>of</strong> error in the sense <strong>of</strong> “mistake”. A central a) incomplete definition <strong>of</strong> the measurand;<br />
source <strong>of</strong> uncertainty is definitional incompleteness b) imperfect realization <strong>of</strong> the definition <strong>of</strong> the<br />
in specifying all <strong>of</strong> the factors influencing the measurand;<br />
measurement [7] c) non-representative sampling-the sample<br />
To test for biometrics performance for the said<br />
application: as an identification parameter for the<br />
measured may not represent the defined<br />
measurand;<br />
UID, it is imperative to understand that how we d) inadequate knowledge <strong>of</strong> the effects <strong>of</strong><br />
control, measure and report the values in a test must e n v i r o n m e n t a l c o n d i t i o n s o n t h e<br />
reflect how we expect those values to be used by measurement or imperfect measurement <strong>of</strong><br />
others. That is to say, our testing and reporting must environmental conditions;<br />
take into account, and state, how we expect the<br />
e) personal bias in reading analogue instruments;<br />
results to be used.<br />
f) finite instrument resolution or discrimination<br />
The “technical performance test” in<br />
threshold;<br />
biometrics being proposed for the UID must<br />
g) inexact values <strong>of</strong> measurement standards and<br />
measure everything involved in the test-both<br />
reference materials;<br />
tangible and intangible. This includes not only the<br />
h) inexact values <strong>of</strong> constants and other<br />
collection, analysis and computational equipment,<br />
parameters obtained from external sources<br />
but the human subjects and their attitudes, their<br />
9<br />
october 2011- september 2012
e-track<br />
and used in the data-reduction algorithm;<br />
i) approximations and assumptions incorporated A technology test uses a pre-collected<br />
in the measurement method and procedure; database <strong>of</strong> biometric samples and reports the<br />
j) variations in repeated observations <strong>of</strong> the performance for each s<strong>of</strong>tware package against that<br />
measurand under apparently identical database. So each s<strong>of</strong>tware package is tested against<br />
conditions.<br />
exactly the same data and our results tell us about the<br />
5.0 How Biometrics Performance In UID Must<br />
Be Measured<br />
In biometric technical testing, performance is<br />
judged in terms <strong>of</strong> “error rates” in the recognition<br />
process: those errors being either false positive (an<br />
incorrect decision that a biometric sample and the<br />
biometric reference are from the same individual<br />
when they are not) or false negative (an incorrect<br />
decision that a biometric sample and a biometric<br />
reference are not from the same individual when<br />
they in fact are) — as well as the interrelated<br />
measures <strong>of</strong> “failure to enroll”, and “failure to<br />
acquire” rates and throughput rates. Any <strong>of</strong> these<br />
five measurands can be set as independent variables,<br />
impacting all <strong>of</strong> the other measurements in a test.<br />
The question arising next is <strong>of</strong> what is it that<br />
we actually measure, what statistical controls are<br />
required and what is our measurement uncertainty In<br />
1999, NIST developed the concept <strong>of</strong> three levels <strong>of</strong><br />
testing in biometrics: technology, scenario and<br />
operational (Figure 7). It is our proposal that tests<br />
belonging to these three levels be used to measure<br />
the performance and applicability <strong>of</strong> the biometrics<br />
being currently employed in the UID project in India<br />
Uncertainty in technology<br />
tests<br />
Biometrics performance<br />
tests<br />
Uncertainty in scenario<br />
tests<br />
Fig.7. Levels <strong>of</strong> biometrics performance tests<br />
Uncertainty in operational<br />
tests<br />
5.1 Uncertainty in <strong>Technology</strong> Tests<br />
efficacy <strong>of</strong> the s<strong>of</strong>tware with respect to the database.<br />
Examples include most <strong>of</strong> the NIST IAD biometric<br />
test programs, such as the Speaker Recognition<br />
Evaluation, the Multi-Biometric Grand Challenge,<br />
the Proprietary Fingerprint Template Testing, and<br />
MINEX programs. If there is a prescribed way to use<br />
the test data, then barring s<strong>of</strong>tware or hardware<br />
limitations that may bias the results, and assuming<br />
pristine bookkeeping by the testing agency, the<br />
results <strong>of</strong> a technical test would be completely<br />
repeatable, that is, irrespective <strong>of</strong> the time or place it<br />
is conducted, the same results should be obtained in<br />
an ideal situation.<br />
However, blunders in recording or analyzing<br />
data can introduce a significant unknown error in the<br />
result <strong>of</strong> a measurement. While large blunders can<br />
usually be identified by a careful review <strong>of</strong> the data,<br />
small ones could be masked by, or even appear as,<br />
random variations.<br />
One approach that is proposed for technology<br />
tests is to employ a “divide-and-conquer” strategy<br />
whereby a single database is randomly partitioned<br />
into subsets, and the variability <strong>of</strong> the performance<br />
<strong>of</strong> the matching s<strong>of</strong>tware among the different<br />
subsets be used as intimation <strong>of</strong> its operational<br />
acumen.<br />
However, in technology testing, test data is<br />
generally not a randomly selected subset <strong>of</strong> a larger<br />
database, such as the centralised database we see<br />
being used for UID. Rather, if a larger database <strong>of</strong><br />
october 2011- september 2012<br />
10
e-track<br />
biometric samples does exist, a selection <strong>of</strong> the test<br />
database is made to systematically remove<br />
problems, such as “poor quality” or blank images.<br />
5.2 Uncertainty in Scenario Tests<br />
A “scenario test” moves us from the use <strong>of</strong><br />
previously collected data to the process <strong>of</strong> data<br />
collection from human subjects. The introduction <strong>of</strong><br />
human data subjects directly into the test<br />
environment causes great changes in the unit <strong>of</strong><br />
empirical significance and makes scenario testing a<br />
social science -- as much about the data subjects as<br />
about the technologies[7]. The goal is to model a<br />
system in an environment and with a population<br />
relevant to the evaluation.<br />
glasses, the less tangible influence quantities <strong>of</strong><br />
human attitudes, perceptions and behaviours <strong>of</strong> both<br />
the data subjects and supervising experimenters<br />
impact the measurands and thus the repeatability<br />
and reproducibility <strong>of</strong> scenario test results.<br />
5.3 Uncertainty in Operational Tests<br />
The factors attributable to or impacting the<br />
data subjects which influence technical test<br />
measurements include, but are not limited to[7]: data<br />
subject age, gender, experience, and height; the<br />
instructional materials presented the data subject;<br />
the placement, height and angle <strong>of</strong> the collection<br />
device; the temperature, humidity, lighting and<br />
noise <strong>of</strong> the collection location. For a scenario test,<br />
the values <strong>of</strong> these factors in the operational<br />
environment to be modelled may not be known or<br />
controllable by the experimenter. In addition to this<br />
list <strong>of</strong> general, technology-independent, but human-<br />
related factors to be controlled, each specific<br />
recognition technology (iris, face, voice, fingerprint,<br />
hand, etc.) will have specific factors that must be<br />
within a state <strong>of</strong> statistical control. For example,<br />
when we speak <strong>of</strong> the iris scan, there may be the<br />
unattended problem <strong>of</strong> contact lenses being worn.<br />
Besides, beyond the observable and easily<br />
quantifiable aspects <strong>of</strong> the collection conditions,<br />
such as lighting and acoustic noise, and <strong>of</strong> the data<br />
subjects, such as height, handedness and presence <strong>of</strong><br />
An operational test seeks to determine<br />
technical performance metrics in a real, application<br />
environment. In the case <strong>of</strong> applying these tests to<br />
the UID biometrics, it may be realised that<br />
Operational testing inherits all <strong>of</strong> the uncertainty <strong>of</strong><br />
technology and scenario tests, but with added<br />
problems <strong>of</strong> statistical control over all population<br />
and environmental elements in the unit <strong>of</strong> empirical<br />
significance. Also, improvements in the biometrics<br />
system with the help <strong>of</strong> Operational tests will require<br />
in-depth thinking and innovation. This because, in<br />
an operational environment, the data subject will<br />
make some claim (perhaps only implicitly) as to<br />
being or not being the source <strong>of</strong> a biometric<br />
characteristic in the database. We can assume that an<br />
acceptance <strong>of</strong> this claim, regardless <strong>of</strong> whether true<br />
or false, by an operational data subject will go<br />
unreported. When a s<strong>of</strong>tware decision results in<br />
“rejection” <strong>of</strong> the claim <strong>of</strong> an operational data<br />
subject, the data subject may be informed <strong>of</strong> the<br />
decision by some applications, allowing redress [7].<br />
If we assume that the redress process always<br />
correctly classifies the original claim as “true” or<br />
“false”, we can get an estimate <strong>of</strong> the “system false<br />
rejection” rate. Of course, this assumption is<br />
incorrect, leading to measurement uncertainty.<br />
But those with an “accepted” claim, whether<br />
that claim is true or false, will not seek redress.<br />
Therefore in an operational system, we will have a<br />
way <strong>of</strong> estimating the “system false rejection” rate,<br />
11<br />
october 2011- september 2012
e-track<br />
but not the “system false acceptance” rate.<br />
Thus, it may be realised that the relationships<br />
between the measurands in an operational test<br />
(system false acceptance/ system false rejection)<br />
and those in either technology tests (false<br />
match/false nonmatch) or scenario tests (false<br />
acceptance/false rejection) will be difficult to assess.<br />
It can be concluded that the three types <strong>of</strong> tests are<br />
measuring incommensurate quantities and therefore<br />
it is expected that the values for the same<br />
technologies will vary widely and unpredictably<br />
over the three types <strong>of</strong> tests.<br />
6.0 Conclusion<br />
The Unique Identity Project in India makes its<br />
promises to help enhance and ameliorate the social,<br />
political and economic lives <strong>of</strong> the people <strong>of</strong> India.<br />
The Government continues to envisage it from a<br />
developmental angle, but it is also important to look<br />
at its' fundamental building blocks from the<br />
skeptical eyes <strong>of</strong> a technologist. This has been<br />
successfully achieved by placing a technocrat like<br />
Nandan Nilekani as the Chairman. However, for a<br />
country as large and diverse as India, the smallest <strong>of</strong><br />
errors can be expected to propagate fast and cause a<br />
problem much bigger than one would expect. The<br />
technologies being employed for identity<br />
verification and deduplication, that is, fingerprint<br />
and iris scan biometrics <strong>of</strong>fer challenges, which<br />
need to be dealt with before the project is launched<br />
into the masses. This paper strives to suggest the<br />
possible areas where these problems can be<br />
eradicated, and <strong>of</strong>fer solutions using statistical<br />
techniques to tackle uncertainties arising in areas<br />
where these problems cannot be gotten rid <strong>of</strong>. The<br />
UID project is one that <strong>of</strong>fers to India great hope's: in<br />
terms <strong>of</strong> securing the nation from terrorists, helping<br />
policies made for the poor reach the intended masses<br />
and delivering social welfare programmes by<br />
making them more inclusive <strong>of</strong> companies, to speak<br />
on broad terms. However, there exist loopholes in its<br />
planning and implementation. Once these can be<br />
handled, there is not much that can stop the nation<br />
from truly shining.<br />
References<br />
[1]: http://uidai.gov.in/<br />
[2]: Biometrics Design Standards for UID<br />
Applications, www.uidai.gov.in.<br />
[3]: R. Ramakumar, The Unique ID Project in<br />
India: A Skeptical Note<br />
[4]: P.Stanleya, Wilson Jebersona, V.V. Klinsegaa:<br />
Biometric Authentication: A Trustworthy<br />
<strong>Technology</strong> for Improved Authentication,<br />
2009 International Conference on Future<br />
Networks<br />
[5]: De:Duplication:The complexity in the Unique<br />
ID context.4G Identity solutions<br />
[6]: Rajanish Dass, Unique Identity Project in<br />
India: A Divine Dream or a Miscalculated<br />
Heroism?<br />
[7]: James L. Wayman, Antonio Possolo, and<br />
Anthony J. Mansfield, Fundamental issues in<br />
biometric performance testing: A modern<br />
statistical and philosophical framework for<br />
uncertainty assessment<br />
october 2011- september 2012<br />
12
EMERGENCE OF MOBILE BANKING –THE INDIAN SCENARIO<br />
e-track<br />
-Umanath Kumarasamy<br />
Senior Process Associate<br />
INTRODUCTION<br />
The advent <strong>of</strong> the Internet has empowered<br />
novel ways to comportment business in all industry,<br />
banking must not be excluded from that. The new<br />
Per TRA I, in India we have<br />
893.84 million mobile phone<br />
users as <strong>of</strong> Dec 2011 and per<br />
Census data 2011, the population<br />
covering 1.21 billion; hence the<br />
73.85% <strong>of</strong> people are using<br />
mobile phone in India.<br />
approaches resulting in the creation <strong>of</strong> new<br />
institutions, such as online banks, online brokers and<br />
wealth managers. Such institutions still account for a<br />
tiny percentage <strong>of</strong> the industry. The mobile phone<br />
applications are very much important one to do those<br />
banking operations.<br />
Over the last few years, the mobile and<br />
wireless market has been one <strong>of</strong> the fastest growing<br />
markets in the world and it is still growing at a rapid<br />
pace. So, many advances and applications are in<br />
ongoing phase and everything is useful in different<br />
purposes. In this study we will see about the mobile<br />
banking and it usages as a main objective. Also the<br />
study attempts to account growth level <strong>of</strong> the volume<br />
and value <strong>of</strong> transactions done<br />
through mobile banking during<br />
the selected period to see the<br />
evaluation <strong>of</strong> mobile banking<br />
services in India. Let we start<br />
with what is mobile banking<br />
first and move to the objective<br />
<strong>of</strong> the study.<br />
MOBILE BANKING<br />
Mobile <strong>Bank</strong>ing a convenient way to bank<br />
using a mobile device that allows to do banking<br />
transactions in a simple and secure way. MB is a<br />
simplest way to transfer funds, pay bills and much<br />
more on banking. To reveal more, Mobile <strong>Bank</strong>ing<br />
(also known as M-<strong>Bank</strong>ing, mbanking, SMS<br />
<strong>Bank</strong>ing) is a term used for performing balance<br />
checks, account transactions, payments, credit<br />
applications and other banking transactions through<br />
a mobile device such as a mobile phone or Personal<br />
Digital Assistant (PDA).<br />
The earliest mobile banking services were<br />
<strong>of</strong>fered over SMS. With the introduction <strong>of</strong> the first<br />
primitive smart phones with WAP support enabling<br />
the use <strong>of</strong> the mobile web in 1999, the first European<br />
banks started to <strong>of</strong>fer mobile banking on this<br />
platform to their customers. The rapid growth in<br />
users and wider coverage <strong>of</strong> mobile phone networks<br />
have made this channel an important platform for<br />
extending banking services to customers. With the<br />
rapid growth in the number <strong>of</strong> mobile phone<br />
13<br />
october 2011- september 2012
e-track<br />
subscribers in India, banks have been exploring the by using a different delivery channel (retailers/<br />
feasibility <strong>of</strong> using mobile phones as an alternative mobile phones), a different trade partner (Telco /<br />
channel <strong>of</strong> delivery <strong>of</strong> banking services.<br />
Chain Store) having experience and target market<br />
MOBILE BANKING BUSINESS MODELS<br />
distinct from traditional banks, and may be<br />
significantly cheaper than the bank based<br />
A wide spectrum <strong>of</strong> Mobile/branchless<br />
alternatives. The bank-led model may be<br />
banking models is evolving. These models differ<br />
implemented by either using correspondent<br />
primarily on the question that who will establish the<br />
arrangements or by creating a JV between <strong>Bank</strong> and<br />
relationship (account opening, deposit taking,<br />
Telco/non-bank. In this model customer account<br />
lending etc.) with the end customer, the <strong>Bank</strong> or the<br />
relationship rests with the bank.<br />
Non- <strong>Bank</strong>/Telecommunication Company (Telco).<br />
Models <strong>of</strong> branchless banking can be classified into<br />
NON-BANK-LED MODEL<br />
three broad categories - <strong>Bank</strong> Focused, <strong>Bank</strong>-Led The non-bank-led model is where a bank<br />
and Non-<strong>Bank</strong>-Led.<br />
does not come into the picture (except possibly as a<br />
BANK-FOCUSED MODEL<br />
The bank-focused model emerges when a<br />
safe-keeper <strong>of</strong> surplus funds) and the non-bank (e.g.<br />
Telco) performs all the functions.<br />
traditional bank uses non-traditional low cost<br />
delivery channels to provide banking services to its<br />
TECHNOLOGIES BEHIND MOBILE<br />
BANKING<br />
existing customers. Examples range from use <strong>of</strong> Technically speaking most <strong>of</strong> these services<br />
automatic teller machines (ATMs) to internet can be deployed using more than one channel.<br />
banking or mobile phone banking to provide certain Presently, Mobile <strong>Bank</strong>ing is being deployed using<br />
limited banking services to banks' customers. This mobile applications developed on one <strong>of</strong> the<br />
model is additive in nature and may be seen as a following four channels.<br />
modest extension <strong>of</strong> conventional branch-based<br />
IVR (Interactive Voice Response)<br />
banking.<br />
SMS (Short Messaging Service)<br />
BANK-LED MODEL<br />
The bank-led model <strong>of</strong>fers a distinct<br />
WAP (Wireless Access Protocol)<br />
Standalone Mobile Application Clients<br />
alternative to conventional branch-based banking in<br />
MOBILE BANKING SERVICES<br />
that customer conducts financial transactions at a<br />
<strong>Bank</strong>s <strong>of</strong>fering mobile access are mostly<br />
whole range <strong>of</strong> retail agents (or through mobile<br />
supporting some or all <strong>of</strong> the following services:<br />
phone) instead <strong>of</strong> at bank branches or through bank<br />
Account <strong>Information</strong><br />
employees. This model promises the potential to<br />
substantially increase the financial services outreach<br />
Mini-statements and checking <strong>of</strong> account<br />
history<br />
october 2011- september 2012<br />
14
e-track<br />
Alerts on account activity or passing <strong>of</strong> set<br />
thresholds<br />
Monitoring <strong>of</strong> term deposits<br />
Access to loan statements<br />
Access to card statements<br />
Mutual funds / equity statements<br />
Insurance policy management<br />
Pension plan management<br />
Payments & Transfers<br />
Domestic and international fund transfers<br />
Micro-payment handling<br />
Mobile recharging<br />
Commercial payment processing<br />
Bill payment processing<br />
Investments<br />
Portfolio management services<br />
Real-time stock quotes<br />
Personalized alerts and notifications on<br />
security prices<br />
Support<br />
Status <strong>of</strong> requests for credit, including<br />
mortgage approval, and insurance coverage<br />
Check (cheque) book and card requests<br />
Exchange <strong>of</strong> data messages and email,<br />
including complaint submission and<br />
tracking<br />
EMERGENCE OF MOBILE BANKING<br />
SERVICES IN INDIAN BANKING INDUSTRY<br />
Financial Sector Reforms set in motion in<br />
1991 have greatly changed the face <strong>of</strong> Indian<br />
<strong>Bank</strong>ing. The banking industry has moved<br />
gradually from a regulated environment to a<br />
deregulated market economy. The market<br />
developments kindled by liberalization and<br />
globalization have resulted in changes in the<br />
intermediation role <strong>of</strong> banks. The pace <strong>of</strong><br />
transformation has been more significant in recent<br />
times with technology acting as a catalyst. The<br />
financial system is the lifeline <strong>of</strong> the economy.<br />
Liberalization and de-regulation process started in<br />
1991-92 has made a sea change in the banking<br />
system. From a totally regulated environment, we<br />
have gradually moved into a market driven<br />
competitive system. Our move towards global<br />
benchmarks has been, by and large, calibrated and<br />
regulator driven. The changes in the economy get<br />
mirrored in the performance <strong>of</strong> the financial system,<br />
more so <strong>of</strong> the banking industry. The traditional<br />
banking functions would give way to a system<br />
geared to meet all the financial needs <strong>of</strong> the<br />
customer. We could see emergence <strong>of</strong> highly varied<br />
financial products, which are tailored to meet<br />
specific needs <strong>of</strong> the customers in the retail as well as<br />
corporate segments.<br />
In India, banking industry is prominent one;<br />
it is growing tremendously with all new technology<br />
developments. MB also one <strong>of</strong> the pillar to take the<br />
Indian <strong>Bank</strong>ing Industry top in position. The<br />
appraisal <strong>of</strong> MB in Indian banks is remarkable one;<br />
in below we will see the same with figures which<br />
drafted based on data from Reserve <strong>Bank</strong> <strong>of</strong> India, a<br />
central bank to the country.<br />
15<br />
october 2011- september 2012
e-track<br />
FIGURE NO.1<br />
sometimes simultaneously.<br />
MONTHLY MOBILE BANKING<br />
The mobile banking industry in India is<br />
TRANSACTIONS VOLUME IN INDIA ready to take <strong>of</strong>f, especially with the ecosystem<br />
players, i.e., operators, banks and mobile<br />
manufacturers coming together and launching pilot<br />
services. The bigger question still remains whether<br />
these services are planned keeping “consumers” at<br />
the center, or whether it is just about the pro<strong>of</strong> <strong>of</strong><br />
concepts. Number <strong>of</strong> banking transactions done<br />
through mobile phone in India evidenced with<br />
upward movement, on another hand in below we<br />
Figure No.1 describing the mobile banking will examine the value in rupees against those<br />
transactions monthly volume in India from May transactions during the elected period from May<br />
2009 to November 2011. The trend clearly showing 2009 to November 2011.<br />
an upward move, 52538 banking transactions were<br />
FIGURE NO.2<br />
done through mobile phone in May 2009 and it<br />
M O N T H L Y M O B I L E B A N K I N G<br />
reached 2319145 banking transactions in November<br />
TRANSACTIONS VALUE IN INDIA<br />
2011, in between the growth had uptrend with slight<br />
volatility. The study covers 31 months (from May<br />
2009 to November 2011), therefore the average<br />
transactions per month pointing with 722335.16 in<br />
number.<br />
The emergence <strong>of</strong> MB has implications for<br />
the more general set <strong>of</strong> discussions about mobile<br />
telephony in the developing world. For example, it<br />
underscores the way the device blurs the domestic<br />
and the productive spheres, the social and the<br />
transactional. Each transaction is influenced by (and<br />
reinforces) the structural position <strong>of</strong> people in<br />
broader informational networks. The latest case <strong>of</strong><br />
m-banking/m-payments systems is a reminder that<br />
an understanding <strong>of</strong> the role <strong>of</strong> the mobile in<br />
developing societies must include its role in<br />
mediating both social and economic transactions,<br />
Figure No. 2 demonstrating the monthly mobile<br />
banking transactions value in rupees transacted in<br />
India during the study period. The self interpreter,<br />
figure no.2 making clear impression that money<br />
value transacted through mobile phone from May<br />
2009 to November 2011 equally ascendant with<br />
number <strong>of</strong> transactions towered. Started with Rs.<br />
46,543 in May 2009, the MB transactions value in<br />
october 2011- september 2012<br />
16
e-track<br />
India reached Rs. 17, 39,172 in November 2011, its<br />
really a remarkable one. However, the scope for<br />
value <strong>of</strong> transactions compare with number <strong>of</strong><br />
transactions should have minimum, why because the<br />
non-money transactions also partake in the count in<br />
number <strong>of</strong> transaction done through MB.<br />
CONCLUSION<br />
With help <strong>of</strong> technology empowerment and<br />
increasing use <strong>of</strong> smartphone and tablet based<br />
devices, the use <strong>of</strong> Mobile <strong>Bank</strong>ing functionality<br />
enabled customer connect across entire life cycle<br />
much comprehensively than before, the study<br />
evidenced the growth in both volume and value <strong>of</strong><br />
mobile banking operations in India. In this situation,<br />
the current mobile banking objectives includes<br />
building relationships, reducing cost, achieving new<br />
revenue stream will transform to facilitate new<br />
objectives targeting higher level goals such as<br />
building brand <strong>of</strong> the banking organization.<br />
ABOUT THE AUTHOR<br />
Umanath Kumarasamy, working in TCS E-<br />
serve International Ltd, Chennai as a Senior Process<br />
Associate now, before to TCS worked in the same<br />
area in RR Donnelley and prior to that performed as<br />
Database Analyst in CMOTS InfoTech, who have<br />
had completed his research program in commerce<br />
with specialization on financial management at Dept<br />
<strong>of</strong> Commerce, Bharathiar University, Coimbatore.<br />
He holding the degrees named M.Com (CA), M.<br />
Phil and MBA.<br />
He presented three research papers in<br />
international level and eleven in national level<br />
seminars and conferences; also he published four<br />
national level articles and one international level<br />
article. If you want to be in touch with him please<br />
write to vku_mphil@rediffmail.com.<br />
Authored By- Umanath Kumarasamy, Senior<br />
Process Associate, TCS E-Serve International<br />
Limited, Email: vku_mphil@rediffmail.com<br />
17<br />
october 2011- september 2012
e-track<br />
EVOLUTION AND GROWTH OF ELECTRONIC (E-PAYMENTS) IN INDIA<br />
-Namrata Nagpal<br />
T h e p e r i l s o f<br />
establishing nationwide<br />
identity systems have<br />
always been a hot topic <strong>of</strong><br />
debate in countries that<br />
attach great value to privacy and human rights <strong>of</strong> its<br />
holds a cabinet rank. The<br />
UIDAI is part <strong>of</strong> the Planning<br />
Commission <strong>of</strong> India. Nandan<br />
Nilekani, former co-chairman<br />
<strong>of</strong> Infosys Technologies, was<br />
appointed as the first Chairman<br />
citizens. Plans to launch national ID cards have met <strong>of</strong> the authority in June 2009.<br />
with stiff opposition in UK, which announced the<br />
final design <strong>of</strong> its card in end <strong>of</strong> July 2009. The<br />
United States Senate too is getting ready to debate<br />
the PASS ID bill, a renamed version <strong>of</strong> George Bush<br />
regime's REAL ID that will bring in a national ID<br />
through the backdoor.<br />
Compare this with the scenario in India where<br />
the UPA government has launched a national ID<br />
program through the Unique Identity Development<br />
Authority <strong>of</strong> India (UIDAI), a body created blatantly<br />
bypassing the authority <strong>of</strong> parliament. And there is<br />
not even a whimper <strong>of</strong> protest from civil society<br />
groups or politicians.<br />
The Unique Identification Authority <strong>of</strong> India<br />
(UIDAI) is an agency <strong>of</strong> the Government <strong>of</strong> India<br />
responsible for implementing the AADHAAR<br />
scheme, a unique identification project. It was<br />
established in February 2009, and will own and<br />
operate the Unique Identification Number database.<br />
The authority aims to provide a unique id number to<br />
all Indians, but not smart cards. The authority will<br />
maintain a database <strong>of</strong> residents containing<br />
biometric and other data.<br />
The agency is headed by a chairman, who<br />
Ram Sewak Sharma, an IAS Officer <strong>of</strong> Jharkhand<br />
Government is the Director General and Mission<br />
Director <strong>of</strong> the Authority.<br />
What is AADHAAR?<br />
Aadhaar is a 12-digit unique number which<br />
the Unique Identification Authority <strong>of</strong> India<br />
(UIDAI) will issue for all residents in India. The<br />
number will be stored in a centralized database and<br />
linked to the basic demographics and biometric<br />
information – photograph, ten fingerprints and iris –<br />
<strong>of</strong> each individual. It is easily verifiable in an online,<br />
cost-effective way. So also, it is unique and robust<br />
enough to eliminate the large number <strong>of</strong> duplicate<br />
and fake identities in government and private<br />
databases. The random number generated will be<br />
devoid <strong>of</strong> any classification based on caste, creed,<br />
religion and geography.<br />
UIDAI launched AADHAAR program in the<br />
tribal village, Tembhli, in Shahada, Nandurbar,<br />
Maharashtra on 29 September 2010. The program<br />
was inaugurated by the Prime Minister, Manmohan<br />
Singh along with UPA chairperson Sonia Gandhi.<br />
The first resident to receive an AADHAAR was<br />
Rajana Sonawane <strong>of</strong> Tembhli village.<br />
october 2011- september 2012<br />
18
e-track<br />
Basics <strong>of</strong> UID<br />
UID or AADHAR is a “unique identification”<br />
will also facilitate entry for poor and<br />
underprivileged residents into the formal<br />
number that is to be assigned to every resident <strong>of</strong><br />
banking system and the opportunity to avail<br />
India – one person, one number. Since it will be<br />
services provided by the government and the<br />
issued to every resident, including children above<br />
private sector giving mobility <strong>of</strong> identity.<br />
the age <strong>of</strong> five, it is not a pro<strong>of</strong> <strong>of</strong> citizenship. 3. Financial inclusion with deeper penetration <strong>of</strong><br />
The numbers will be issued through various<br />
banks, insurance and easy distribution <strong>of</strong><br />
agencies authorized by the UIDAI across the<br />
benefits <strong>of</strong> government schemes.<br />
country, called “Registrars”. Registrars include 4. The UID project was initiated on the apparent<br />
government, public sector and private sector premise that the poor faced great hurdles in<br />
organizations. Enrolment also entails collection <strong>of</strong> accessing benefits and subsidies due to the<br />
biometric data such as fingerprints and iris scan. inability to provide pro<strong>of</strong> <strong>of</strong> their identity. As a<br />
This number, being unique for each person, can be result, every time an individual tries to access<br />
verified from his or her fingerprints.<br />
a benefit, the UID is a solution <strong>of</strong> its identity<br />
Documents required for registration: The<br />
and hence get a commodity.<br />
“Handbook for Registrars”, prepared by the UIDAI, 5. UID is supposed to act as an all-purpose, foollists<br />
valid identity documents for UID enrolment, pro<strong>of</strong> identification device. This could help in<br />
such as the ration card, PAN Card, Voter ID, etc. facilitating all processes that require<br />
Those who do not have any <strong>of</strong> these documents can identifying oneself – such as opening a bank<br />
also apply for a UID number (Aadhaar). In such account or applying for a passport.<br />
cases, authorized individuals (introducers), who<br />
6. Will help fight corruption in welfare<br />
already have an Aadhaar, can introduce residents<br />
programs, enhance inclusiveness in<br />
who don't possess any <strong>of</strong> the requisite documents<br />
government schemes, and so on. Specific<br />
and certify their identity.<br />
areas where the benefits <strong>of</strong> UID are supposed<br />
Projected Benefits<br />
to flow are NREGA, PDS and public health,<br />
1. Aadhaar will become the single source <strong>of</strong><br />
among others.<br />
identity verification. Residents would be 7. Biometric-enabled UID to authenticate<br />
spared the hassle <strong>of</strong> repeatedly providing identity can only help to prevent “fraud”, but<br />
supporting identity documents each time they is <strong>of</strong> little use in preventing collusion or<br />
wish to access services such as obtaining a extortion. UID can address the wage-related<br />
bank account, passport, driving license and so fraud in NREGA; it can do little about<br />
on.<br />
material-related corruption.<br />
2. By providing a clear pro<strong>of</strong> <strong>of</strong> identity, Aadhaar 8. Many poor people do not benefit from<br />
19<br />
october 2011- september 2012
e-track<br />
government welfare schemes because they do biometric data, 100% reliability in<br />
not have proper identification pro<strong>of</strong>. Hence authentication can still never be guaranteed.<br />
UID will be the solution to their problem and Diverse conditions will throw up more<br />
help them seek proper schemes for their challenges to such a system.<br />
betterment and living.<br />
6. <strong>National</strong> Security and NATGRID: The UID<br />
9. UID will help in elimination <strong>of</strong> “bogus” cards number will be fed into a database to be shared<br />
and can help deal with “ghost cards” and with NATGRID, which includes 11 security<br />
duplicates. With UID, beneficiaries can claim and intelligence agencies like Intelligence<br />
their benefits wherever they are as UID is Bureau, Research and Analysis Wing, CBI,<br />
portable.<br />
Central Boards <strong>of</strong> Excise and Direct Taxes,<br />
Risks and Criticism<br />
etc). These databases would be integrated with<br />
information available not just with<br />
1. Security Risk: Since the UID database has to<br />
government agencies and public sector, but<br />
be accessible over networks in real time, it<br />
also private organizations such as banks,<br />
involves major operational and security risks.<br />
insurance companies, airlines, railways,<br />
The identification system may collapse before<br />
telecom service providers, etc.<br />
network failure and hacking.<br />
7. This would give security agencies the power<br />
2. There is also a significant risk <strong>of</strong> transmitting<br />
to access sensitive personal information such<br />
biometric data over networks where they may<br />
as bank account details, market transactions,<br />
be intercepted, copied, and actually tampered<br />
websites visited, credit card transactions, etc.<br />
with, <strong>of</strong>ten without any detection.<br />
and enable them “to detect patterns, trace<br />
3. Reliability: Another concern is the reliability sources for monies and support, track<br />
<strong>of</strong> biometrics. Worn-out fingers <strong>of</strong> farmers travelers, and identify those who must be<br />
and manual laborers will be difficult to scan, watched, investigated, disabled and<br />
and an iris scan can't be done on people with neutralized”. Though at one point <strong>of</strong> time, this<br />
corneal blindness or corneal scars.<br />
can be a huge benefit to the nation in tracking<br />
4. Reliability Criticism: There were recent down the fraudulous people but on the other<br />
reports <strong>of</strong> elderly citizens being turned away hand it disqualifies “Right to Privacy” clause<br />
from enrolment centers for failure in meeting issued by the Supreme Court <strong>of</strong> India.<br />
biometric requirements. 8. Verification and Authenticity <strong>of</strong> <strong>Information</strong><br />
5. Besides the financial costs and time and effort collected: The bill does not clearly address the<br />
to enroll individuals and collect their issue <strong>of</strong> verification <strong>of</strong> information recorded<br />
october 2011- september 2012<br />
20
e-track<br />
/collected. The UIDAI delegates the<br />
responsibility to registrars and other enrolling<br />
agencies, but the possibility <strong>of</strong> flaws in<br />
recording information even by negligence<br />
remains unaddressed.<br />
9. Adoption <strong>of</strong> a direct approach: The<br />
government should clearly state whether the<br />
procurement <strong>of</strong> UID number is optional or<br />
mandatory. The UIDAI claims that UID is a<br />
“voluntary facility” – no one is obliged to<br />
enroll. As categorically stated by Mr. Nandan<br />
Nilekani, UID is not a pro<strong>of</strong> <strong>of</strong> citizenship.<br />
10. Privacy Law: Law enforcement is one <strong>of</strong> the<br />
areas that need to be critically considered<br />
upon by the government before coming out<br />
with any verdict on the UID scheme. In the<br />
absence <strong>of</strong> any statutory law in the area <strong>of</strong><br />
privacy rights, the enforcement <strong>of</strong> such a<br />
scheme directly involves a huge risk to<br />
confidentiality <strong>of</strong> personal information.<br />
It's high time when government should rethink<br />
on the ambitious dream and its implementation to<br />
make UID as central identity indicator. The pros and<br />
cons <strong>of</strong> linking it to those schemes which are only<br />
ray <strong>of</strong> hope for poor should be pondered over. The<br />
adverse impact <strong>of</strong> uncontrolled surveillance should<br />
be reflected upon. Parliamentarians need to question<br />
how reliable and useful such a technology will be in<br />
a vast country like India where a large population is<br />
still illiterate and not accustomed to such complex<br />
technologies.<br />
If used positively, UID itself can become a<br />
forceful weapon to sieve undesirable security risks<br />
out <strong>of</strong> the system. Therefore, right now, we need to<br />
seriously mull over the potential benefits and<br />
misuses <strong>of</strong> UID and be prepared with remedy.<br />
21<br />
october 2011- september 2012
e-track<br />
Google simplifies public transit information<br />
Google has announced that it had crossed the<br />
one- million mark in public transit stop information<br />
available through its Maps application. The million<br />
transit stops are spread across 500 major cities<br />
presented in an easy-to-understand format. The<br />
Indian cities on the list are Bangalore, Chennai, New<br />
Delhi, Ahmedabad, Hyderabad, Kolkata, Mumbai<br />
and Pune.<br />
The latest iteration <strong>of</strong> the Android app from<br />
Google Maps (version 6.10) simplified transit<br />
information, allowing users to pick their preferred<br />
mode <strong>of</strong> transit. This feature will be useful in cities<br />
that have multiple modes <strong>of</strong> transit available, and<br />
thus multiple layers <strong>of</strong> data embedded on Maps.<br />
Samsung Takes the High Road With WinPho 8<br />
Ativ S<br />
reverse <strong>of</strong> the word "Vita," or "life."<br />
It will be <strong>of</strong>fered in 8 GB and 16 GB<br />
versions.The design <strong>of</strong> the Ativ S looks very much<br />
like that <strong>of</strong> Samsung's Galaxy S III. It has a 1.5 GHz<br />
dual-core processor, a 4.8-inch HD Super<br />
AMOLED screen, an 8 MP auto focus front camera<br />
with LED flash in the rear and a 1.9 MP front<br />
camera.<br />
It incorporates near field communications<br />
(NFC) so users can share information with other<br />
NFC-enabled smartphones by tapping the devices<br />
together.<br />
The Ativ S comes with Samsung Family Story<br />
preloaded. Samsung Family Story is a private social<br />
network that's also available on other Samsung<br />
devices, including the company's Smart TV.<br />
Samsung ChatOn also comes preloaded on the<br />
device.<br />
The public transit information available for<br />
Chennai, for example, includes data from the<br />
Chennai MRTS, Southern Railway and<br />
Metropolitan Transport Corporation (MTC).<br />
The Ativ S comes with the usual sensors --<br />
For New Delhi, the list includes the Delhi proximity, accelerometer and so on -- and both A-<br />
Integrated Multi-Modal Transit System, DMRC, GPS and GLONASS.<br />
Northern Railway, Delhi Metro Rail and the Delhi<br />
Transport Corporation.<br />
The update to Google Maps is particularly<br />
useful in cities where visitors are at odds reading<br />
signages in local languages and have difficulty in<br />
getting around places. The Google Maps application<br />
for Android mobile devices can be downloaded free<br />
from Google Play. It requires data connectivity.<br />
(Source: www.thehindu.com)<br />
Samsung has announced the first smartphone<br />
running Windows Phone 8, The Samsung Ativ S.<br />
The most common cause <strong>of</strong> leaks from add-<br />
ons is when they accidentally hold on to extra copies<br />
<strong>of</strong> a website in memory after a user has closed a tab.<br />
The Ativ S is part <strong>of</strong> the company's Ativ family<br />
<strong>of</strong> devices. Samsung has created this brand for its<br />
Windows-based devices. Ativ, by the way, is the<br />
NEWS<br />
It runs on HSPA+ 42 networks and supports<br />
Bluetooth. It also has a slot for an SD card. Further,<br />
the Ativ S has a physical Windows button.<br />
Source: http://www.technewsworld.com<br />
Firefox 15 Goes on a Memory Diet<br />
Better management <strong>of</strong> memory and updates<br />
highlight the latest release <strong>of</strong> the Mozilla<br />
Foundation's Web browser, Firefox 15.<br />
Firefox's development team has steadily<br />
improved the browser's memory management over<br />
recent months, but with this release <strong>of</strong> the program,<br />
it's targeting a major contributor to the s<strong>of</strong>tware's<br />
piggish memory ways: add-on applications.<br />
october 2011- september 2012<br />
22
The pages pile up and eat massive amounts <strong>of</strong><br />
memory with no user benefit.<br />
With Firefox 15, Mozilla has developed a<br />
mechanism to prevent those leaks from happening.<br />
The browser now detects that pattern, recaptures the<br />
leaked memory and frees it up. The result is that<br />
Firefox stays stable even if an add-on is making this<br />
mistake.<br />
Source: http://www.technewsworld.com<br />
e-track<br />
This integrates the company's virtualization,<br />
cloud infrastructure and management portfolio into<br />
one bundle.<br />
It lets users set up their own virtual data<br />
centers, consisting <strong>of</strong> virtual compute, storage,<br />
networking and security resources.<br />
The s<strong>of</strong>tware-defined data center "transforms<br />
all data center services -- compute, storage,<br />
networking, security and availability -- into<br />
s<strong>of</strong>tware to enable the on-demand provisioning and<br />
automated management <strong>of</strong> an entire virtual data<br />
center<br />
A s<strong>of</strong>tware-defined data center brings all<br />
seven layers <strong>of</strong> technology in the Open Systems<br />
Interconnection framework "under the control <strong>of</strong> a<br />
single management layer". "This would allow<br />
administrators to manage how resources are used<br />
across systems and workloads."<br />
Source: http://www.technewsworld.com<br />
New vCloud 5.1 Brings Data Centers Into the<br />
Virtual Fold<br />
VMware has launched what it claims is the<br />
first solution to deliver what it calls the "s<strong>of</strong>tware-<br />
defined data center" -- its vCloud Suite 5.1.<br />
free till the end <strong>of</strong> 2013; however users need to have<br />
a paid subscription to Google's cloud-based<br />
s<strong>of</strong>tware for businesses, Google Apps, for<br />
uninterrupted access.<br />
The new business tools allow business users to<br />
control who can see their posts on the social<br />
networking website and features integrated video<br />
conferencing and improved administrative controls<br />
over the posts and who can see them.<br />
Google is giving a full preview <strong>of</strong> the features<br />
to Google Apps users. Moreover, users can also add<br />
a hangout to a Calendar event. Hangouts were<br />
previously accessible via Gmail and via Google<br />
Docs. Administrators now also have the option to<br />
restrict Hangouts for private meetings. Google is<br />
currently working on the mobile version <strong>of</strong> the new<br />
business suite along with more administrative<br />
controls.<br />
Source: http://www.thinkdigit.com<br />
Google releases new tools for Google+ business<br />
users<br />
Google released a suite <strong>of</strong> business tools for<br />
Google+ users. Google is <strong>of</strong>fering these tools for<br />
23<br />
october 2011- september 2012
e-track<br />
BOOK REVIEW<br />
Author: Khaled Hosseini<br />
Publisher:Penguin Books India, ISBN: 978-0747585893, Pages: 372.<br />
A Thousand Splendid Suns is a breathtaking<br />
story set against the volatile events <strong>of</strong> Afghanistan's<br />
last thirty years, from the Soviet invasion to the<br />
reign <strong>of</strong> the Taliban to post-Taliban rebuilding,<br />
which puts the violence, fear, hope and faith <strong>of</strong> this<br />
country in intimate, human terms. It is a tale <strong>of</strong> two<br />
generations <strong>of</strong> characters brought jarringly together<br />
by the tragic sweep <strong>of</strong> war, where personal lives, the<br />
struggle to survive, raise a family, find happiness,<br />
are inextricable from the history playing out around<br />
them.<br />
The author has managed to tell the modern<br />
history <strong>of</strong> Afghanistan: from the end <strong>of</strong> the<br />
monarchy to the invasion <strong>of</strong> the Soviets to the chaos<br />
<strong>of</strong> rule by the war lords to the tight fisted maniacal<br />
rule <strong>of</strong> the Taliban to the post-9/11 return to some<br />
semblance <strong>of</strong> relative normalcy. The author again<br />
uses the device <strong>of</strong> telling the stories <strong>of</strong> two main<br />
characters <strong>of</strong> differing backgrounds. The author<br />
uses this novel to tell the story <strong>of</strong> Afghani women<br />
and the hardships that face them with each regime<br />
change.<br />
It is a great story wonderfully told, however,<br />
and the fact that it takes place in a land few <strong>of</strong> us<br />
understand makes it educational as well as<br />
entertaining. The writing is absolutely beautiful.<br />
The pictures he paints with his words are so vivid<br />
that everything from the fun everyday life to the<br />
squalor that war brings to the ordinary person just<br />
flashes before your eyes like a movie. There are<br />
some parts that have no doubt happened to many<br />
people but to think that any <strong>of</strong> this is even remotely<br />
possible will just<br />
kill you especially<br />
the parts about<br />
what a mother will<br />
do to save her<br />
children.<br />
It's not as<br />
violent as I thought<br />
it would be, given<br />
that it takes place<br />
during the war in<br />
Afghanistan and<br />
there is hope, but the story will shake you to the core.<br />
You have people living a regular life, they go to<br />
work, they fall in love, they have a family, they make<br />
mistakes, and they try to atone for their mistakes and<br />
then war hits and life as they know it changes within<br />
the blink <strong>of</strong> an eye. It's not a story about war though<br />
it's a story about people from different walks <strong>of</strong> life<br />
trying to go about the business <strong>of</strong> living as best as<br />
they can and trying to find a tiny corner <strong>of</strong><br />
happiness.<br />
This book describes, through a human perspective,<br />
how the nation became a veritable hell for its own<br />
people after the usurping. How the people had to<br />
survive with restrictions on the most basic, most<br />
mundane aspects <strong>of</strong> their life.It is a good choice for<br />
readers who appreciate fiction that combines<br />
accurate history with wonderful story telling.<br />
KhaledHosseini is an excellent writer and A<br />
Thousand Splendid Suns is just another example <strong>of</strong><br />
his gift for storytelling.<br />
october 2011- september 2012<br />
24