27.11.2014 Views

Sep'12 - Punjab National Bank Institute of Information Technology

Sep'12 - Punjab National Bank Institute of Information Technology

Sep'12 - Punjab National Bank Institute of Information Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

w<br />

iatkc uS'kuy cSad<br />

lpuk izkS|ksfxdh laLFkku<br />

foHkwfr [k.M] xkserh uxj] y[kumG & 226 010 ¼;w-ih-½<br />

-----cSafdax] foÙk ,oa chek {ks= esa lwpuk izkS|ksfxdh dk vxz.kh laLFkku<br />

punjab national bank<br />

institute <strong>of</strong> information technology<br />

Vibhuti Khand, Gomti Nagar, Lucknow- 226 010 (U.P.)<br />

..... a premier institute <strong>of</strong> information technology in the area <strong>of</strong> banking, finance & insurance<br />

Vol. VIII No. 1 Special Edition October 2011-September 2012<br />

ISSN 2249 –1996<br />

Biometrics In Uid: A Framework To Identify<br />

And Handle Vulnerabilities<br />

e-track


e-track<br />

Editor<br />

Pramod Dikshit<br />

Editorial Team<br />

Rashi Katiyar<br />

Sanjay Srivastava<br />

Sweety Dube<br />

Printed by<br />

e-track<br />

Dharmendra Tewari<br />

Swastik Printing Press<br />

27, Mai Gi Ki Bagiya,<br />

Kapoorthala Crossing,<br />

Mahanagar, Lucknow<br />

Mobile : 9415419300<br />

punjab national bank<br />

institute <strong>of</strong> information technology<br />

Vibhuti Khand, Gomti Nagar,<br />

Lucknow--226 010 (U.P.)<br />

T : +91 522 2721442, 2721174<br />

F : +91 522 2721201, 2721441<br />

E-mail : bankingtech@pnbiit.ac.in<br />

URL : www.pnbiit.ac.in<br />

Thought<br />

Beyond a wholesome discipline, be<br />

gentle with yourself. You are a child<br />

<strong>of</strong> the universe, no less than the<br />

trees or the stars; you have a right to<br />

be here.<br />

-Disiderata<br />

Dear Readers,<br />

FROM THE EDITOR<br />

When implemented and adopted<br />

efficiently, the Unique Identification (UID)<br />

project possesses the power to eliminate financial<br />

exclusion, enhance accessibility, and uplift living<br />

standards for the majority <strong>of</strong> poor. This can be<br />

achieved when the UID is effectively associated<br />

with pro poor welfare projects like the NREGS.<br />

The Unique Identification Authority <strong>of</strong> India (UIDAI) aims to issue a<br />

unique identification number to all Indian residents that is (1) robust<br />

enough to eliminate duplicate and fake identities, and (2) can be verified<br />

and reliably authenticated in an easy, cost-effective way. The ability <strong>of</strong><br />

UID to positively establish and authenticate the identity <strong>of</strong> every<br />

individual can overcome many <strong>of</strong> the challenges faced by targeted<br />

benefit programs.<br />

In this issue <strong>of</strong> our e-Track magazine the focus is on UID. We have an<br />

article written by Ms. Anumecha Bhasker, Pr<strong>of</strong>essor Richa Jindal and<br />

Ms. Navati Jain telling us about identifying and handling vulnerabilities<br />

in Biometrics <strong>of</strong> UID.<br />

Ms. Namrata Nagpal is telling us through her informative article the<br />

evolution and growth <strong>of</strong> electronic payments in India. How<br />

AADHAAR can be instrumental in getting electronic payment system<br />

seamless.<br />

Mr. Umanath Kumarasamy tells us through his research based article<br />

that with the help <strong>of</strong> technology empowerment and increasing use <strong>of</strong><br />

Smartphone and tabled based devices has increased the use <strong>of</strong> mobile<br />

banking many fold.<br />

Happy reading ...................<br />

Pramod Dikshit<br />

Contents<br />

From The Director's Desk 3<br />

Biometrics In Uid: A Framework To Identify And Handle Vulnerabilities 4<br />

Emergence Of Mobile <strong>Bank</strong>ing –the Indian Scenario 13<br />

Evolution And Growth Of Electronic (e-payments) In India 18<br />

News 22<br />

october 2011- september 2012<br />

2


e-track<br />

FROM THE DIRECTOR'S DESK<br />

It gives me immense pleasure to write this column especially when<br />

the <strong>Institute</strong> is entering a new phase <strong>of</strong> development. After the huge<br />

success in running five consecutive batches <strong>of</strong> our flagship programme<br />

“Advanced Diploma in <strong>Bank</strong>ing <strong>Technology</strong>”, with a 100% placement<br />

record, we have started a one year upgraded ADBT course (2012-2013)<br />

approved by the IBA. The industry today perceives the <strong>Institute</strong> as a<br />

premier state-<strong>of</strong>-the-art organization undertaking training in the domain<br />

<strong>of</strong> banking and information technology.<br />

For our <strong>Institute</strong>, the coming years are crucial for consolidation <strong>of</strong><br />

what has been achieved and focused efforts are needed to put on wheel the thoughts and actions<br />

towards accomplishment <strong>of</strong> the vision. I congratulate the team <strong>of</strong> PNBIIT for all achievements<br />

and thank all learned members <strong>of</strong> Governing Body and Academic Council <strong>of</strong> PNBIIT and all<br />

eminent personalities <strong>of</strong> different premier organizations who associated with the institute and<br />

contributed for its development.<br />

We have been publishing articles related to various domains <strong>of</strong> banking and IT. In this<br />

issue <strong>of</strong> e-track the focus is on UID as we have recently seen a wave <strong>of</strong> registrations and<br />

controversies surrounding the same. The Unique Identification Authority <strong>of</strong> India has<br />

envisioned the UID as a number that will make it possible for Indian residents to easily verify<br />

their identity to public and private agencies across the country. The UID will pave the way for a<br />

variety <strong>of</strong> applications that leverage the reliable authentication the UID <strong>of</strong>fers, within their<br />

infrastructure. Aadhar has an impact in financial sector especially micropayments. Despite the<br />

huge transformation <strong>of</strong> India's economic and regulatory structures, access to finance has<br />

remained scarce in rural India, and for the poorest residents in the country. Today, the proportion<br />

<strong>of</strong> rural residents who lack access to bank accounts remains at over 40%, and this rises to over<br />

three-fifths <strong>of</strong> the population in the east and north-east parts <strong>of</strong> India.<br />

To mitigate the lack <strong>of</strong> financial access in India, the regulator has focused on improving<br />

the reach <strong>of</strong> financial services in new and innovative ways – through no-frills account, the<br />

liberalization <strong>of</strong> banking and ATM policies, and branchless banking with business<br />

correspondents (BCs), which enables local intermediaries such as self-help groups and kirana<br />

stores to provide banking services. Related efforts also include the promotion <strong>of</strong> core-banking<br />

solutions in Regional Rural <strong>Bank</strong>s.<br />

B. K. Mahindroo<br />

(Director)<br />

3<br />

october 2011- september 2012


e-track<br />

BIOMETRICS IN UID: A FRAMEWORK TO IDENTIFY<br />

AND HANDLE VULNERABILITIES<br />

Anumeha Bhasker, Pr<strong>of</strong>. Richa Jindal & Navati Jain<br />

Introduction<br />

Chronologically, Australia was one <strong>of</strong> the first<br />

countries to try the implementation <strong>of</strong> a national ID<br />

card scheme, as early as 1986. These “Australia<br />

Cards” were intended to help check tax evasion and<br />

reduce illegal immigration. In the 1990's, countries<br />

like Canada, New Zealand and Philippines also<br />

initiated steps to introduce such national ID cards. In<br />

all these countries, the scheme had to be shelved<br />

after major public backlash. In the early 2000's,<br />

China attempted to introduce a national ID card<br />

scheme with biometrics, but soon had to withdraw<br />

upon realisation <strong>of</strong> biometrics' liability to major<br />

failures. USA and UK too, although having spent<br />

almost a decade trying to pass a bill, had to shelve the<br />

project after rigorous public protests. The countries<br />

that proposed the idea and failed to launch the<br />

project can be viewed in Table 1.<br />

Table 1. Countries that were forced to shelve<br />

national id project<br />

COUNTRY<br />

Australia<br />

United Kingdom<br />

United States <strong>of</strong> America<br />

China<br />

Canada<br />

New Zealand<br />

REASONS FOR FAILURE IN IMPLEMENTION<br />

Protests citing violation <strong>of</strong> Privacy and civil<br />

liberties.<br />

Protests against technological and Human Rights<br />

issues<br />

Protests on Confidentiality <strong>of</strong> private data.<br />

Difficulty in maintaining biometric data for a<br />

population so large.<br />

Public Protest against Privacy threat<br />

Public backlash against hampering on civil<br />

liberties.<br />

In the few countries that were able to<br />

incorporate the national ID schemes, this was done<br />

by adhering to public sentiments. For example,<br />

Sweden and Italy have extraordinary rules regarding<br />

use <strong>of</strong> data <strong>of</strong> it's citizens, Germany doesn't allow<br />

collection <strong>of</strong> biometric information, France<br />

launched a non-compulsory national ID card, and<br />

Greece had to remove certain data acquired<br />

following massive public protests (Table 2).<br />

Table 2. Countries which implemented national id<br />

project<br />

COUNTRY COMPROMISES MADE<br />

Hong Kong None, biometrics included.<br />

Malaysia None, biometrics included.<br />

Finland<br />

Little personal information and no<br />

biometric data.<br />

Germany No Biometrics<br />

2.0 Unique Identification In India: Aadhaar<br />

The Government <strong>of</strong> India has announced the<br />

creation <strong>of</strong> the Unique ID Authority <strong>of</strong> India<br />

(UIDAI) to generate the largest IT project <strong>of</strong> the<br />

globe – the Unique ID (UID) project – with an aim to<br />

provide a unique twelve digit number to 1.2 billion<br />

residents <strong>of</strong> India. The concept <strong>of</strong> national identity<br />

scheme is not very new for India as the Government<br />

had been evaluating various alternatives for an<br />

identity scheme since a couple <strong>of</strong> decades. The<br />

Government <strong>of</strong> India (GOI) undertook an effort to<br />

provide a clear identity to residents first in 1993,<br />

with the issue <strong>of</strong> photo identity cards by the Election<br />

Commission and subsequently in 2003, when it<br />

approved the Multipurpose <strong>National</strong> Identity Card<br />

(MNIC). The Unique Identification Authority <strong>of</strong><br />

India (UIDAI) was established in January 2009, as<br />

an attached <strong>of</strong>fice to the Planning Commission. The<br />

purpose <strong>of</strong> UIDAI is to issue a unique identification<br />

number (UID) to all Indian residents that is (a)<br />

robust enough to eliminate duplicate and fake<br />

identities, and (b) can be verified and authenticated<br />

october 2011- september 2012<br />

4


e-track<br />

in an easy, cost-effective way [6]. The process <strong>of</strong><br />

generating this identification number will start with<br />

getting the biometrics <strong>of</strong> each resident <strong>of</strong> the country<br />

along with certain demographic details, as would be<br />

needed for any business (like a bank or a telecom<br />

operator) or government organization to identify a<br />

particular Indian resident. Biometrics <strong>of</strong> all ten<br />

fingers, along with the iris scan <strong>of</strong> both the eyes and<br />

the photo <strong>of</strong> the face has been decided to be taken as<br />

identifiers <strong>of</strong> all residents.<br />

3.0 Biometrics Involved In The UID Project<br />

The UIDAI proposes to use three biometric<br />

devices for the implementation <strong>of</strong> this project<br />

namely the IRIS scanner, fingerprint scanner and a<br />

face camera [1]. The collection <strong>of</strong> such biometric<br />

data and the storage involved has been considered to<br />

be quite noteworthy in the UID project. The<br />

biometric solution capabilities, according to the<br />

UIDAI would be used for biometric enrolment,<br />

biometric deduplication and biometric verification<br />

(shown in Figure 1).The overall design <strong>of</strong> the<br />

biometric system is most likely based on three key<br />

criteria, i.e. Interoperability, upgradeability and user<br />

friendliness. It is proposed that multi-modal<br />

biometric features using three biometrics listed<br />

above (fingerprint, face and iris) would be used.<br />

Fig. 1: biometric solution capabilities<br />

To begin, let us discuss the biometrics being used in<br />

the UID project for verification and deduplication<br />

and then evaluate each critically.<br />

3.1 Finger Print Biometric<br />

A fingerprint scanner takes an image <strong>of</strong> the<br />

user's fingerprint. For verification, it uses this image<br />

to check if the image matches the one in the stored<br />

database. Fingerprint pattern ridges may be a whorl,<br />

an arch or a loop. Also, minutiae points i.e. when the<br />

ridges bifurcate or end are also taken into account.<br />

The pattern and these minutiae on one's fingertips is<br />

what makes up a fingerprint and this pattern is<br />

known to be unique and hence has been used as an<br />

identification technique.<br />

The UIDAI proposes to use fingerprint for<br />

deduplication purposes .Various factors are to be<br />

considered in the case <strong>of</strong> fingerprints such as the<br />

type <strong>of</strong> image, number <strong>of</strong> fingers to be captured, the<br />

device used, immediate processing and the storage<br />

used. Though rolled images contain twice as much<br />

information as the plain image, they have been ruled<br />

out by the UIDAI as they require each finger to be<br />

scanned one at a time. The UIDAI committee has<br />

recommended scanning <strong>of</strong> all ten fingers as that<br />

would help improve the accuracy and matching<br />

speed especially in the case <strong>of</strong> rural workers. Of<br />

course, the operational process (operator assistance,<br />

corrective measures and retries) plays a role in<br />

obtaining good quality images. Since the UIDAI<br />

committee recommends that the image should not be<br />

compressed, the total storage required for the entire<br />

population is expected to be 10,000 TB. [2]<br />

Finger print will be used for authentication as<br />

well, but the requirements for accuracy,<br />

performance and interoperability are different .The<br />

UIDAI committee states that since a 1:1 verification<br />

is performed, the image may be <strong>of</strong> lower quality. In<br />

this case, a single or fewer fingers should provide<br />

sufficient accuracy. The format <strong>of</strong> the image to be<br />

5<br />

october 2011- september 2012


e-track<br />

transmitted would depend on the transmission <strong>of</strong> fingerprint biometrics for verification has its set<br />

bandwidth as well as on the processing power <strong>of</strong> the <strong>of</strong> setbacks (Figure 3):<br />

capture device [2].<br />

3.1.1 How the usage <strong>of</strong> Fingerprint Biometrics is<br />

Beneficial.<br />

When thinking with respect to the UID<br />

A major issue is that fingerprints <strong>of</strong> many<br />

people can change with time due to scars or<br />

aging .This is particularly seen in the case <strong>of</strong><br />

manual laborers, which comprise a huge<br />

project's incorporation <strong>of</strong> fingerprint biometrics for population in the country.<br />

individual verification, for a country as large as The greater concern is that, there is a<br />

India, there exist the following advantages (Figure possibility <strong>of</strong> users who are falsely matched or<br />

2): not matched at all. Many such examples are<br />

It is easy to implement and inexpensive to cited in [3] such as the case <strong>of</strong> Brandon<br />

install. This is fortuitous for several machines Mayfield, who was wrongly accused <strong>of</strong><br />

all over the country shall be required to be having been, involved the 2004 Madrid<br />

installed.<br />

Bombing, solely due to wrong fingerprint<br />

Having a record <strong>of</strong> Fingerprints in a matching.<br />

centralized database <strong>of</strong> the people in the Even the UIDAI committee recognizes that<br />

country can prove to be very useful for the “retaining efficacy while scaling the<br />

forensics<br />

database size from fifty million to a billion has<br />

Moreover, since fingerprint has the largest not been adequately analyzed.”[2]<br />

market share <strong>of</strong> all biometrics modalities, Also, Fingerprint quality, the most important<br />

globally it also has a variety <strong>of</strong> suppliers and a variable for determining de-duplication<br />

base <strong>of</strong> experienced pr<strong>of</strong>essionals. The UIDIA accuracy, has not been studied in depth in the<br />

feels that this would be required to implement UID context. [2]<br />

the unique identity management solution at<br />

the scale that India needs.<br />

Where fingerprint<br />

biometrics in UID lacks<br />

Why fingerprint biometrics in UID is a good<br />

Fingerprints may<br />

change with time<br />

Possibility <strong>of</strong><br />

falsely matched<br />

users<br />

Retaining<br />

efficacy while<br />

scaling up<br />

Fingerprint<br />

quality studies<br />

Fig.3. Disadvantages <strong>of</strong> fingerprint biometrics in UID.<br />

Inexpensive and easy to<br />

implement<br />

Experienced pr<strong>of</strong>essionals<br />

easily available<br />

Fig.2. Advantages <strong>of</strong> fingerprint biometrics in UID.<br />

Useful for forensics<br />

3.1.2 How the usage <strong>of</strong> fingerprint biometrics<br />

may prove Ineffective.<br />

However, in a country as large as India, with<br />

people as diverse, belonging to different pr<strong>of</strong>essions<br />

and living in different environments, incorporation<br />

3.2 Iris Scan Biometric<br />

There are two types <strong>of</strong> biometrics for the eye:<br />

iris scanning and retinal scanning. Iris scanning<br />

involves recognition <strong>of</strong> the colored portions <strong>of</strong> the<br />

iris around the pupil. It then uses this recognized<br />

pattern for verification .Retina scan works on the<br />

blood vessel pattern in the retina <strong>of</strong> the eye. The<br />

october 2011- september 2012<br />

6


process for authentication for iris scans is<br />

considered unique for each individual.<br />

The camera takes an image <strong>of</strong> the iris. This<br />

captured image is then stored in the database. During<br />

deduplication as well as verification purposes, it is<br />

used to provide a match <strong>of</strong> the person based on the<br />

data stored in the database. This can be summarized<br />

as shown in the Figure 4.<br />

Since the UIDAI feels that fingerprinting may<br />

not be sufficient to ensure uniqueness, it has added<br />

iris scan to the biometrics. This would overcome the<br />

problem <strong>of</strong> non inclusion <strong>of</strong> poor residents and<br />

children .When both eyes are scanned it helps in<br />

more accurate estimation <strong>of</strong> roll angle. It was<br />

expected that a total space <strong>of</strong> 200 Terabytes would<br />

be required for the entire population. For<br />

authentication, the committee felt that one eye<br />

would serve the purpose.<br />

3.2.1 How the usage <strong>of</strong> Iris scanning biometric is<br />

Beneficial.<br />

There is plenty <strong>of</strong> literature to support iris<br />

scanning over fingerprint biometrics. When viewed<br />

with respect to the UID project in India, it has the<br />

following merits to it (Figure 5):<br />

e-track<br />

It is claimed that iris scans are inimitable, as<br />

the iris, as an organ, is supposed to be one <strong>of</strong><br />

the first organs to decay, after the death <strong>of</strong> a<br />

person. Thus, it would be hard to make an<br />

artificial iris or employ a dead one to bypass<br />

the system if the detection <strong>of</strong> the iris aliveness<br />

is functioning right. [4].<br />

Also, as stated in [5], unlike the case <strong>of</strong><br />

fingerprints, the iris <strong>of</strong> an individual is stable<br />

throughout his or her life.<br />

Speed <strong>of</strong> matching would be very high, i.e. the<br />

recognition algorithms can search up to 20<br />

million records in less than one second using a<br />

normal Quadcore – 2 Processor blade server.<br />

On the flip side, however, use usage iris<br />

Iris scanning is considered to give extremely scanning biometric doesn't come without its own set<br />

accurate results, overcoming the uncertainty <strong>of</strong> vulnerabilities. Some <strong>of</strong> these include (Figure 6):<br />

<strong>of</strong> error that lies with fingerprint biometrics.<br />

A major disadvantage would be that using this<br />

technology would prove to be quite expensive.<br />

This includes setting up <strong>of</strong> apparatus as well as<br />

employment <strong>of</strong> trained and skilled manpower.<br />

Fig. 4: Sequence involved in iris scan<br />

Fig.5. Advantages <strong>of</strong> iris scan biometrics in<br />

3.2.2 How the usage <strong>of</strong> iris scan biometric is<br />

Ineffective.<br />

The accuracy <strong>of</strong> hardware is also important as<br />

it obtains a small target from a distance that<br />

could be obstructed by eyelids.<br />

Also, care should be taken to ensure that the<br />

illumination is not too bright so as to avoid<br />

7<br />

october 2011- september 2012


e-track<br />

damage to the eye [6].<br />

There are the small issues, such as registering<br />

individual wearing contact lenses and so on.<br />

When compared to fingerprinting, iris scans<br />

are less studied and less standardized.<br />

WHERE IRIS SCAN<br />

BIOMETRICS LACKS IN UID<br />

Table.4. Comparison <strong>of</strong> fingerprint and iris scan<br />

biometrics<br />

Biometric Pros Cons<br />

Fingerprint · Inexpensive<br />

· Ease <strong>of</strong> implementation<br />

· Most standardized<br />

· More market<br />

Iris · Accurate<br />

· Inimitable<br />

· Stable, doesn’t change<br />

· High speed <strong>of</strong> matching<br />

· Fingerprint may change due to<br />

scars and aging<br />

· Non inclusion <strong>of</strong> children<br />

· Relatively high error rates<br />

· Expensive<br />

· Hardware accuracy<br />

· Less studied<br />

· Less standardized<br />

Expensive<br />

technology<br />

Closed eyelids<br />

may hamper<br />

accuracy<br />

Eye damage<br />

due to<br />

illumination<br />

conditions<br />

Registering<br />

citizen wearing<br />

contact lenses<br />

Fig.6. Disadvantages <strong>of</strong> iris scan biometrics in UID.<br />

Less studied<br />

and not<br />

standardised<br />

There are many other such technical<br />

challenges associated with robust face recognition.<br />

Face is currently a poor biometric for use in de-<br />

duplication. It performs better in verification but not<br />

at the accuracy rates that are sometimes claimed. An<br />

obvious way for an undesirable person to avoid face<br />

identification is by the use <strong>of</strong> disguise, which will<br />

cause False Negatives in a screening application. In<br />

general, it is a good biometric identifier for smallscale<br />

verification applications. In the UID project,<br />

Face images will be used primarily for human visual<br />

inspection and for deduplication purposes rather<br />

than verification as is the case for iris scan and<br />

fingerprint biometrics . However, automatic face<br />

recognition may be used as the secondary means <strong>of</strong><br />

authentication/deduplication. Hence, we shall not<br />

delve into the details <strong>of</strong> this method, and have<br />

mentioned it here for the sake <strong>of</strong> completeness.<br />

To provide a comparison, following data is<br />

provided in Table 3 based on measures from the<br />

Biometric Product Testing Final Report (19 March<br />

2001, Center for Mathematics and Scientific<br />

Computing, <strong>National</strong> Physical laboratory), UK. The<br />

terms used are explained as:<br />

FAR (False Acceptance Rate) is the<br />

probability that there would be incorrect<br />

matches <strong>of</strong> the input pattern.<br />

FRR (False Rejection Rate) is the probability<br />

that there is a failure to detect a match.<br />

FER (Failure to Enroll rate) is the rate at which<br />

the system is unsuccessful in trying to create a<br />

template from an input.<br />

Table 3: far, frr and fer rates for the iris and<br />

fingerprint biometric<br />

Biometric FAR<br />

(False<br />

Acceptance Rate)<br />

FRR<br />

(False Rejection Rate)<br />

FER<br />

(Failure to<br />

Enroll rate)<br />

Iris 1:1.2 million 0.1 – 0.2% 0.5%<br />

Fingerprint 1: 100000 2.0 – 3.0% 1.0 – 2.0%<br />

The summary <strong>of</strong> the positive and negative<br />

aspects <strong>of</strong> the two discussed biometrics may be<br />

viewed in Table 4.<br />

3.3 Face Recognition Biometrics<br />

Facial recognition is a method that can be used<br />

to distinguish between people and is one <strong>of</strong> the most<br />

natural ways <strong>of</strong> doing so. Such a system can identify<br />

or verify the person using digital pictures by<br />

comparing with those in a facial database. The face<br />

can prove to be to be a good biometric, but due to<br />

large database size and high value <strong>of</strong> target accuracy,<br />

its capability to improve the FAR rate is limited.<br />

october 2011- september 2012<br />

8


4.0 Issues with Biometrics Performance<br />

Testing<br />

When we speak <strong>of</strong> biometrics performance<br />

testing, we concern ourselves with the reporting <strong>of</strong><br />

recognition error (whether positive or negative, as to<br />

whether a biometric sample is from the same person<br />

as the biometric reference) and throughput rates –<br />

that has been the dominant biometric testing<br />

paradigm since early times. There also exist other<br />

forms <strong>of</strong> testing, such as standards- compliance,<br />

usability, reliability, availability, and<br />

maintainability, which are closely associated with<br />

technical testing [7].<br />

It is important to understand how there lies a<br />

certain 'uncertainty' when relying on biometrics for<br />

identity verification. “Uncertainty” is a broader<br />

concept than “error”. It represents the doubt about<br />

how well a test result represents the quantity it is said<br />

e-track<br />

behaviours, the physical environment <strong>of</strong> the test:<br />

including acoustic noise levels, humidity, day <strong>of</strong> the<br />

week, season <strong>of</strong> the year, and so on. This will be <strong>of</strong><br />

particular necessity when we speak <strong>of</strong> the Registrar<br />

Systems, when citizens come to claim a UID for<br />

themselves.<br />

So now, the tangible factors that impact the<br />

values <strong>of</strong> measurement at any given time must be<br />

controlled and monitored, while the intangible<br />

factors are what contribute to this 'uncertainty'.<br />

These uncertainties must still be dealt with. There<br />

are several ways to deal with uncertainties, and for<br />

the length <strong>of</strong> this paper, they shall be classified as<br />

Uncertainties tackled by Statistical Techniques and<br />

Uncertainties tackled by Other Techniques. The<br />

International Organization for Standardization<br />

document, “Guidelines for the Expression <strong>of</strong><br />

Uncertainty in Measurement” (GUM) categorises<br />

to measure. Uncertainty can exist even in the uncertainties as:<br />

absence <strong>of</strong> error in the sense <strong>of</strong> “mistake”. A central a) incomplete definition <strong>of</strong> the measurand;<br />

source <strong>of</strong> uncertainty is definitional incompleteness b) imperfect realization <strong>of</strong> the definition <strong>of</strong> the<br />

in specifying all <strong>of</strong> the factors influencing the measurand;<br />

measurement [7] c) non-representative sampling-the sample<br />

To test for biometrics performance for the said<br />

application: as an identification parameter for the<br />

measured may not represent the defined<br />

measurand;<br />

UID, it is imperative to understand that how we d) inadequate knowledge <strong>of</strong> the effects <strong>of</strong><br />

control, measure and report the values in a test must e n v i r o n m e n t a l c o n d i t i o n s o n t h e<br />

reflect how we expect those values to be used by measurement or imperfect measurement <strong>of</strong><br />

others. That is to say, our testing and reporting must environmental conditions;<br />

take into account, and state, how we expect the<br />

e) personal bias in reading analogue instruments;<br />

results to be used.<br />

f) finite instrument resolution or discrimination<br />

The “technical performance test” in<br />

threshold;<br />

biometrics being proposed for the UID must<br />

g) inexact values <strong>of</strong> measurement standards and<br />

measure everything involved in the test-both<br />

reference materials;<br />

tangible and intangible. This includes not only the<br />

h) inexact values <strong>of</strong> constants and other<br />

collection, analysis and computational equipment,<br />

parameters obtained from external sources<br />

but the human subjects and their attitudes, their<br />

9<br />

october 2011- september 2012


e-track<br />

and used in the data-reduction algorithm;<br />

i) approximations and assumptions incorporated A technology test uses a pre-collected<br />

in the measurement method and procedure; database <strong>of</strong> biometric samples and reports the<br />

j) variations in repeated observations <strong>of</strong> the performance for each s<strong>of</strong>tware package against that<br />

measurand under apparently identical database. So each s<strong>of</strong>tware package is tested against<br />

conditions.<br />

exactly the same data and our results tell us about the<br />

5.0 How Biometrics Performance In UID Must<br />

Be Measured<br />

In biometric technical testing, performance is<br />

judged in terms <strong>of</strong> “error rates” in the recognition<br />

process: those errors being either false positive (an<br />

incorrect decision that a biometric sample and the<br />

biometric reference are from the same individual<br />

when they are not) or false negative (an incorrect<br />

decision that a biometric sample and a biometric<br />

reference are not from the same individual when<br />

they in fact are) — as well as the interrelated<br />

measures <strong>of</strong> “failure to enroll”, and “failure to<br />

acquire” rates and throughput rates. Any <strong>of</strong> these<br />

five measurands can be set as independent variables,<br />

impacting all <strong>of</strong> the other measurements in a test.<br />

The question arising next is <strong>of</strong> what is it that<br />

we actually measure, what statistical controls are<br />

required and what is our measurement uncertainty In<br />

1999, NIST developed the concept <strong>of</strong> three levels <strong>of</strong><br />

testing in biometrics: technology, scenario and<br />

operational (Figure 7). It is our proposal that tests<br />

belonging to these three levels be used to measure<br />

the performance and applicability <strong>of</strong> the biometrics<br />

being currently employed in the UID project in India<br />

Uncertainty in technology<br />

tests<br />

Biometrics performance<br />

tests<br />

Uncertainty in scenario<br />

tests<br />

Fig.7. Levels <strong>of</strong> biometrics performance tests<br />

Uncertainty in operational<br />

tests<br />

5.1 Uncertainty in <strong>Technology</strong> Tests<br />

efficacy <strong>of</strong> the s<strong>of</strong>tware with respect to the database.<br />

Examples include most <strong>of</strong> the NIST IAD biometric<br />

test programs, such as the Speaker Recognition<br />

Evaluation, the Multi-Biometric Grand Challenge,<br />

the Proprietary Fingerprint Template Testing, and<br />

MINEX programs. If there is a prescribed way to use<br />

the test data, then barring s<strong>of</strong>tware or hardware<br />

limitations that may bias the results, and assuming<br />

pristine bookkeeping by the testing agency, the<br />

results <strong>of</strong> a technical test would be completely<br />

repeatable, that is, irrespective <strong>of</strong> the time or place it<br />

is conducted, the same results should be obtained in<br />

an ideal situation.<br />

However, blunders in recording or analyzing<br />

data can introduce a significant unknown error in the<br />

result <strong>of</strong> a measurement. While large blunders can<br />

usually be identified by a careful review <strong>of</strong> the data,<br />

small ones could be masked by, or even appear as,<br />

random variations.<br />

One approach that is proposed for technology<br />

tests is to employ a “divide-and-conquer” strategy<br />

whereby a single database is randomly partitioned<br />

into subsets, and the variability <strong>of</strong> the performance<br />

<strong>of</strong> the matching s<strong>of</strong>tware among the different<br />

subsets be used as intimation <strong>of</strong> its operational<br />

acumen.<br />

However, in technology testing, test data is<br />

generally not a randomly selected subset <strong>of</strong> a larger<br />

database, such as the centralised database we see<br />

being used for UID. Rather, if a larger database <strong>of</strong><br />

october 2011- september 2012<br />

10


e-track<br />

biometric samples does exist, a selection <strong>of</strong> the test<br />

database is made to systematically remove<br />

problems, such as “poor quality” or blank images.<br />

5.2 Uncertainty in Scenario Tests<br />

A “scenario test” moves us from the use <strong>of</strong><br />

previously collected data to the process <strong>of</strong> data<br />

collection from human subjects. The introduction <strong>of</strong><br />

human data subjects directly into the test<br />

environment causes great changes in the unit <strong>of</strong><br />

empirical significance and makes scenario testing a<br />

social science -- as much about the data subjects as<br />

about the technologies[7]. The goal is to model a<br />

system in an environment and with a population<br />

relevant to the evaluation.<br />

glasses, the less tangible influence quantities <strong>of</strong><br />

human attitudes, perceptions and behaviours <strong>of</strong> both<br />

the data subjects and supervising experimenters<br />

impact the measurands and thus the repeatability<br />

and reproducibility <strong>of</strong> scenario test results.<br />

5.3 Uncertainty in Operational Tests<br />

The factors attributable to or impacting the<br />

data subjects which influence technical test<br />

measurements include, but are not limited to[7]: data<br />

subject age, gender, experience, and height; the<br />

instructional materials presented the data subject;<br />

the placement, height and angle <strong>of</strong> the collection<br />

device; the temperature, humidity, lighting and<br />

noise <strong>of</strong> the collection location. For a scenario test,<br />

the values <strong>of</strong> these factors in the operational<br />

environment to be modelled may not be known or<br />

controllable by the experimenter. In addition to this<br />

list <strong>of</strong> general, technology-independent, but human-<br />

related factors to be controlled, each specific<br />

recognition technology (iris, face, voice, fingerprint,<br />

hand, etc.) will have specific factors that must be<br />

within a state <strong>of</strong> statistical control. For example,<br />

when we speak <strong>of</strong> the iris scan, there may be the<br />

unattended problem <strong>of</strong> contact lenses being worn.<br />

Besides, beyond the observable and easily<br />

quantifiable aspects <strong>of</strong> the collection conditions,<br />

such as lighting and acoustic noise, and <strong>of</strong> the data<br />

subjects, such as height, handedness and presence <strong>of</strong><br />

An operational test seeks to determine<br />

technical performance metrics in a real, application<br />

environment. In the case <strong>of</strong> applying these tests to<br />

the UID biometrics, it may be realised that<br />

Operational testing inherits all <strong>of</strong> the uncertainty <strong>of</strong><br />

technology and scenario tests, but with added<br />

problems <strong>of</strong> statistical control over all population<br />

and environmental elements in the unit <strong>of</strong> empirical<br />

significance. Also, improvements in the biometrics<br />

system with the help <strong>of</strong> Operational tests will require<br />

in-depth thinking and innovation. This because, in<br />

an operational environment, the data subject will<br />

make some claim (perhaps only implicitly) as to<br />

being or not being the source <strong>of</strong> a biometric<br />

characteristic in the database. We can assume that an<br />

acceptance <strong>of</strong> this claim, regardless <strong>of</strong> whether true<br />

or false, by an operational data subject will go<br />

unreported. When a s<strong>of</strong>tware decision results in<br />

“rejection” <strong>of</strong> the claim <strong>of</strong> an operational data<br />

subject, the data subject may be informed <strong>of</strong> the<br />

decision by some applications, allowing redress [7].<br />

If we assume that the redress process always<br />

correctly classifies the original claim as “true” or<br />

“false”, we can get an estimate <strong>of</strong> the “system false<br />

rejection” rate. Of course, this assumption is<br />

incorrect, leading to measurement uncertainty.<br />

But those with an “accepted” claim, whether<br />

that claim is true or false, will not seek redress.<br />

Therefore in an operational system, we will have a<br />

way <strong>of</strong> estimating the “system false rejection” rate,<br />

11<br />

october 2011- september 2012


e-track<br />

but not the “system false acceptance” rate.<br />

Thus, it may be realised that the relationships<br />

between the measurands in an operational test<br />

(system false acceptance/ system false rejection)<br />

and those in either technology tests (false<br />

match/false nonmatch) or scenario tests (false<br />

acceptance/false rejection) will be difficult to assess.<br />

It can be concluded that the three types <strong>of</strong> tests are<br />

measuring incommensurate quantities and therefore<br />

it is expected that the values for the same<br />

technologies will vary widely and unpredictably<br />

over the three types <strong>of</strong> tests.<br />

6.0 Conclusion<br />

The Unique Identity Project in India makes its<br />

promises to help enhance and ameliorate the social,<br />

political and economic lives <strong>of</strong> the people <strong>of</strong> India.<br />

The Government continues to envisage it from a<br />

developmental angle, but it is also important to look<br />

at its' fundamental building blocks from the<br />

skeptical eyes <strong>of</strong> a technologist. This has been<br />

successfully achieved by placing a technocrat like<br />

Nandan Nilekani as the Chairman. However, for a<br />

country as large and diverse as India, the smallest <strong>of</strong><br />

errors can be expected to propagate fast and cause a<br />

problem much bigger than one would expect. The<br />

technologies being employed for identity<br />

verification and deduplication, that is, fingerprint<br />

and iris scan biometrics <strong>of</strong>fer challenges, which<br />

need to be dealt with before the project is launched<br />

into the masses. This paper strives to suggest the<br />

possible areas where these problems can be<br />

eradicated, and <strong>of</strong>fer solutions using statistical<br />

techniques to tackle uncertainties arising in areas<br />

where these problems cannot be gotten rid <strong>of</strong>. The<br />

UID project is one that <strong>of</strong>fers to India great hope's: in<br />

terms <strong>of</strong> securing the nation from terrorists, helping<br />

policies made for the poor reach the intended masses<br />

and delivering social welfare programmes by<br />

making them more inclusive <strong>of</strong> companies, to speak<br />

on broad terms. However, there exist loopholes in its<br />

planning and implementation. Once these can be<br />

handled, there is not much that can stop the nation<br />

from truly shining.<br />

References<br />

[1]: http://uidai.gov.in/<br />

[2]: Biometrics Design Standards for UID<br />

Applications, www.uidai.gov.in.<br />

[3]: R. Ramakumar, The Unique ID Project in<br />

India: A Skeptical Note<br />

[4]: P.Stanleya, Wilson Jebersona, V.V. Klinsegaa:<br />

Biometric Authentication: A Trustworthy<br />

<strong>Technology</strong> for Improved Authentication,<br />

2009 International Conference on Future<br />

Networks<br />

[5]: De:Duplication:The complexity in the Unique<br />

ID context.4G Identity solutions<br />

[6]: Rajanish Dass, Unique Identity Project in<br />

India: A Divine Dream or a Miscalculated<br />

Heroism?<br />

[7]: James L. Wayman, Antonio Possolo, and<br />

Anthony J. Mansfield, Fundamental issues in<br />

biometric performance testing: A modern<br />

statistical and philosophical framework for<br />

uncertainty assessment<br />

october 2011- september 2012<br />

12


EMERGENCE OF MOBILE BANKING –THE INDIAN SCENARIO<br />

e-track<br />

-Umanath Kumarasamy<br />

Senior Process Associate<br />

INTRODUCTION<br />

The advent <strong>of</strong> the Internet has empowered<br />

novel ways to comportment business in all industry,<br />

banking must not be excluded from that. The new<br />

Per TRA I, in India we have<br />

893.84 million mobile phone<br />

users as <strong>of</strong> Dec 2011 and per<br />

Census data 2011, the population<br />

covering 1.21 billion; hence the<br />

73.85% <strong>of</strong> people are using<br />

mobile phone in India.<br />

approaches resulting in the creation <strong>of</strong> new<br />

institutions, such as online banks, online brokers and<br />

wealth managers. Such institutions still account for a<br />

tiny percentage <strong>of</strong> the industry. The mobile phone<br />

applications are very much important one to do those<br />

banking operations.<br />

Over the last few years, the mobile and<br />

wireless market has been one <strong>of</strong> the fastest growing<br />

markets in the world and it is still growing at a rapid<br />

pace. So, many advances and applications are in<br />

ongoing phase and everything is useful in different<br />

purposes. In this study we will see about the mobile<br />

banking and it usages as a main objective. Also the<br />

study attempts to account growth level <strong>of</strong> the volume<br />

and value <strong>of</strong> transactions done<br />

through mobile banking during<br />

the selected period to see the<br />

evaluation <strong>of</strong> mobile banking<br />

services in India. Let we start<br />

with what is mobile banking<br />

first and move to the objective<br />

<strong>of</strong> the study.<br />

MOBILE BANKING<br />

Mobile <strong>Bank</strong>ing a convenient way to bank<br />

using a mobile device that allows to do banking<br />

transactions in a simple and secure way. MB is a<br />

simplest way to transfer funds, pay bills and much<br />

more on banking. To reveal more, Mobile <strong>Bank</strong>ing<br />

(also known as M-<strong>Bank</strong>ing, mbanking, SMS<br />

<strong>Bank</strong>ing) is a term used for performing balance<br />

checks, account transactions, payments, credit<br />

applications and other banking transactions through<br />

a mobile device such as a mobile phone or Personal<br />

Digital Assistant (PDA).<br />

The earliest mobile banking services were<br />

<strong>of</strong>fered over SMS. With the introduction <strong>of</strong> the first<br />

primitive smart phones with WAP support enabling<br />

the use <strong>of</strong> the mobile web in 1999, the first European<br />

banks started to <strong>of</strong>fer mobile banking on this<br />

platform to their customers. The rapid growth in<br />

users and wider coverage <strong>of</strong> mobile phone networks<br />

have made this channel an important platform for<br />

extending banking services to customers. With the<br />

rapid growth in the number <strong>of</strong> mobile phone<br />

13<br />

october 2011- september 2012


e-track<br />

subscribers in India, banks have been exploring the by using a different delivery channel (retailers/<br />

feasibility <strong>of</strong> using mobile phones as an alternative mobile phones), a different trade partner (Telco /<br />

channel <strong>of</strong> delivery <strong>of</strong> banking services.<br />

Chain Store) having experience and target market<br />

MOBILE BANKING BUSINESS MODELS<br />

distinct from traditional banks, and may be<br />

significantly cheaper than the bank based<br />

A wide spectrum <strong>of</strong> Mobile/branchless<br />

alternatives. The bank-led model may be<br />

banking models is evolving. These models differ<br />

implemented by either using correspondent<br />

primarily on the question that who will establish the<br />

arrangements or by creating a JV between <strong>Bank</strong> and<br />

relationship (account opening, deposit taking,<br />

Telco/non-bank. In this model customer account<br />

lending etc.) with the end customer, the <strong>Bank</strong> or the<br />

relationship rests with the bank.<br />

Non- <strong>Bank</strong>/Telecommunication Company (Telco).<br />

Models <strong>of</strong> branchless banking can be classified into<br />

NON-BANK-LED MODEL<br />

three broad categories - <strong>Bank</strong> Focused, <strong>Bank</strong>-Led The non-bank-led model is where a bank<br />

and Non-<strong>Bank</strong>-Led.<br />

does not come into the picture (except possibly as a<br />

BANK-FOCUSED MODEL<br />

The bank-focused model emerges when a<br />

safe-keeper <strong>of</strong> surplus funds) and the non-bank (e.g.<br />

Telco) performs all the functions.<br />

traditional bank uses non-traditional low cost<br />

delivery channels to provide banking services to its<br />

TECHNOLOGIES BEHIND MOBILE<br />

BANKING<br />

existing customers. Examples range from use <strong>of</strong> Technically speaking most <strong>of</strong> these services<br />

automatic teller machines (ATMs) to internet can be deployed using more than one channel.<br />

banking or mobile phone banking to provide certain Presently, Mobile <strong>Bank</strong>ing is being deployed using<br />

limited banking services to banks' customers. This mobile applications developed on one <strong>of</strong> the<br />

model is additive in nature and may be seen as a following four channels.<br />

modest extension <strong>of</strong> conventional branch-based<br />

IVR (Interactive Voice Response)<br />

banking.<br />

SMS (Short Messaging Service)<br />

BANK-LED MODEL<br />

The bank-led model <strong>of</strong>fers a distinct<br />

WAP (Wireless Access Protocol)<br />

Standalone Mobile Application Clients<br />

alternative to conventional branch-based banking in<br />

MOBILE BANKING SERVICES<br />

that customer conducts financial transactions at a<br />

<strong>Bank</strong>s <strong>of</strong>fering mobile access are mostly<br />

whole range <strong>of</strong> retail agents (or through mobile<br />

supporting some or all <strong>of</strong> the following services:<br />

phone) instead <strong>of</strong> at bank branches or through bank<br />

Account <strong>Information</strong><br />

employees. This model promises the potential to<br />

substantially increase the financial services outreach<br />

Mini-statements and checking <strong>of</strong> account<br />

history<br />

october 2011- september 2012<br />

14


e-track<br />

Alerts on account activity or passing <strong>of</strong> set<br />

thresholds<br />

Monitoring <strong>of</strong> term deposits<br />

Access to loan statements<br />

Access to card statements<br />

Mutual funds / equity statements<br />

Insurance policy management<br />

Pension plan management<br />

Payments & Transfers<br />

Domestic and international fund transfers<br />

Micro-payment handling<br />

Mobile recharging<br />

Commercial payment processing<br />

Bill payment processing<br />

Investments<br />

Portfolio management services<br />

Real-time stock quotes<br />

Personalized alerts and notifications on<br />

security prices<br />

Support<br />

Status <strong>of</strong> requests for credit, including<br />

mortgage approval, and insurance coverage<br />

Check (cheque) book and card requests<br />

Exchange <strong>of</strong> data messages and email,<br />

including complaint submission and<br />

tracking<br />

EMERGENCE OF MOBILE BANKING<br />

SERVICES IN INDIAN BANKING INDUSTRY<br />

Financial Sector Reforms set in motion in<br />

1991 have greatly changed the face <strong>of</strong> Indian<br />

<strong>Bank</strong>ing. The banking industry has moved<br />

gradually from a regulated environment to a<br />

deregulated market economy. The market<br />

developments kindled by liberalization and<br />

globalization have resulted in changes in the<br />

intermediation role <strong>of</strong> banks. The pace <strong>of</strong><br />

transformation has been more significant in recent<br />

times with technology acting as a catalyst. The<br />

financial system is the lifeline <strong>of</strong> the economy.<br />

Liberalization and de-regulation process started in<br />

1991-92 has made a sea change in the banking<br />

system. From a totally regulated environment, we<br />

have gradually moved into a market driven<br />

competitive system. Our move towards global<br />

benchmarks has been, by and large, calibrated and<br />

regulator driven. The changes in the economy get<br />

mirrored in the performance <strong>of</strong> the financial system,<br />

more so <strong>of</strong> the banking industry. The traditional<br />

banking functions would give way to a system<br />

geared to meet all the financial needs <strong>of</strong> the<br />

customer. We could see emergence <strong>of</strong> highly varied<br />

financial products, which are tailored to meet<br />

specific needs <strong>of</strong> the customers in the retail as well as<br />

corporate segments.<br />

In India, banking industry is prominent one;<br />

it is growing tremendously with all new technology<br />

developments. MB also one <strong>of</strong> the pillar to take the<br />

Indian <strong>Bank</strong>ing Industry top in position. The<br />

appraisal <strong>of</strong> MB in Indian banks is remarkable one;<br />

in below we will see the same with figures which<br />

drafted based on data from Reserve <strong>Bank</strong> <strong>of</strong> India, a<br />

central bank to the country.<br />

15<br />

october 2011- september 2012


e-track<br />

FIGURE NO.1<br />

sometimes simultaneously.<br />

MONTHLY MOBILE BANKING<br />

The mobile banking industry in India is<br />

TRANSACTIONS VOLUME IN INDIA ready to take <strong>of</strong>f, especially with the ecosystem<br />

players, i.e., operators, banks and mobile<br />

manufacturers coming together and launching pilot<br />

services. The bigger question still remains whether<br />

these services are planned keeping “consumers” at<br />

the center, or whether it is just about the pro<strong>of</strong> <strong>of</strong><br />

concepts. Number <strong>of</strong> banking transactions done<br />

through mobile phone in India evidenced with<br />

upward movement, on another hand in below we<br />

Figure No.1 describing the mobile banking will examine the value in rupees against those<br />

transactions monthly volume in India from May transactions during the elected period from May<br />

2009 to November 2011. The trend clearly showing 2009 to November 2011.<br />

an upward move, 52538 banking transactions were<br />

FIGURE NO.2<br />

done through mobile phone in May 2009 and it<br />

M O N T H L Y M O B I L E B A N K I N G<br />

reached 2319145 banking transactions in November<br />

TRANSACTIONS VALUE IN INDIA<br />

2011, in between the growth had uptrend with slight<br />

volatility. The study covers 31 months (from May<br />

2009 to November 2011), therefore the average<br />

transactions per month pointing with 722335.16 in<br />

number.<br />

The emergence <strong>of</strong> MB has implications for<br />

the more general set <strong>of</strong> discussions about mobile<br />

telephony in the developing world. For example, it<br />

underscores the way the device blurs the domestic<br />

and the productive spheres, the social and the<br />

transactional. Each transaction is influenced by (and<br />

reinforces) the structural position <strong>of</strong> people in<br />

broader informational networks. The latest case <strong>of</strong><br />

m-banking/m-payments systems is a reminder that<br />

an understanding <strong>of</strong> the role <strong>of</strong> the mobile in<br />

developing societies must include its role in<br />

mediating both social and economic transactions,<br />

Figure No. 2 demonstrating the monthly mobile<br />

banking transactions value in rupees transacted in<br />

India during the study period. The self interpreter,<br />

figure no.2 making clear impression that money<br />

value transacted through mobile phone from May<br />

2009 to November 2011 equally ascendant with<br />

number <strong>of</strong> transactions towered. Started with Rs.<br />

46,543 in May 2009, the MB transactions value in<br />

october 2011- september 2012<br />

16


e-track<br />

India reached Rs. 17, 39,172 in November 2011, its<br />

really a remarkable one. However, the scope for<br />

value <strong>of</strong> transactions compare with number <strong>of</strong><br />

transactions should have minimum, why because the<br />

non-money transactions also partake in the count in<br />

number <strong>of</strong> transaction done through MB.<br />

CONCLUSION<br />

With help <strong>of</strong> technology empowerment and<br />

increasing use <strong>of</strong> smartphone and tablet based<br />

devices, the use <strong>of</strong> Mobile <strong>Bank</strong>ing functionality<br />

enabled customer connect across entire life cycle<br />

much comprehensively than before, the study<br />

evidenced the growth in both volume and value <strong>of</strong><br />

mobile banking operations in India. In this situation,<br />

the current mobile banking objectives includes<br />

building relationships, reducing cost, achieving new<br />

revenue stream will transform to facilitate new<br />

objectives targeting higher level goals such as<br />

building brand <strong>of</strong> the banking organization.<br />

ABOUT THE AUTHOR<br />

Umanath Kumarasamy, working in TCS E-<br />

serve International Ltd, Chennai as a Senior Process<br />

Associate now, before to TCS worked in the same<br />

area in RR Donnelley and prior to that performed as<br />

Database Analyst in CMOTS InfoTech, who have<br />

had completed his research program in commerce<br />

with specialization on financial management at Dept<br />

<strong>of</strong> Commerce, Bharathiar University, Coimbatore.<br />

He holding the degrees named M.Com (CA), M.<br />

Phil and MBA.<br />

He presented three research papers in<br />

international level and eleven in national level<br />

seminars and conferences; also he published four<br />

national level articles and one international level<br />

article. If you want to be in touch with him please<br />

write to vku_mphil@rediffmail.com.<br />

Authored By- Umanath Kumarasamy, Senior<br />

Process Associate, TCS E-Serve International<br />

Limited, Email: vku_mphil@rediffmail.com<br />

17<br />

october 2011- september 2012


e-track<br />

EVOLUTION AND GROWTH OF ELECTRONIC (E-PAYMENTS) IN INDIA<br />

-Namrata Nagpal<br />

T h e p e r i l s o f<br />

establishing nationwide<br />

identity systems have<br />

always been a hot topic <strong>of</strong><br />

debate in countries that<br />

attach great value to privacy and human rights <strong>of</strong> its<br />

holds a cabinet rank. The<br />

UIDAI is part <strong>of</strong> the Planning<br />

Commission <strong>of</strong> India. Nandan<br />

Nilekani, former co-chairman<br />

<strong>of</strong> Infosys Technologies, was<br />

appointed as the first Chairman<br />

citizens. Plans to launch national ID cards have met <strong>of</strong> the authority in June 2009.<br />

with stiff opposition in UK, which announced the<br />

final design <strong>of</strong> its card in end <strong>of</strong> July 2009. The<br />

United States Senate too is getting ready to debate<br />

the PASS ID bill, a renamed version <strong>of</strong> George Bush<br />

regime's REAL ID that will bring in a national ID<br />

through the backdoor.<br />

Compare this with the scenario in India where<br />

the UPA government has launched a national ID<br />

program through the Unique Identity Development<br />

Authority <strong>of</strong> India (UIDAI), a body created blatantly<br />

bypassing the authority <strong>of</strong> parliament. And there is<br />

not even a whimper <strong>of</strong> protest from civil society<br />

groups or politicians.<br />

The Unique Identification Authority <strong>of</strong> India<br />

(UIDAI) is an agency <strong>of</strong> the Government <strong>of</strong> India<br />

responsible for implementing the AADHAAR<br />

scheme, a unique identification project. It was<br />

established in February 2009, and will own and<br />

operate the Unique Identification Number database.<br />

The authority aims to provide a unique id number to<br />

all Indians, but not smart cards. The authority will<br />

maintain a database <strong>of</strong> residents containing<br />

biometric and other data.<br />

The agency is headed by a chairman, who<br />

Ram Sewak Sharma, an IAS Officer <strong>of</strong> Jharkhand<br />

Government is the Director General and Mission<br />

Director <strong>of</strong> the Authority.<br />

What is AADHAAR?<br />

Aadhaar is a 12-digit unique number which<br />

the Unique Identification Authority <strong>of</strong> India<br />

(UIDAI) will issue for all residents in India. The<br />

number will be stored in a centralized database and<br />

linked to the basic demographics and biometric<br />

information – photograph, ten fingerprints and iris –<br />

<strong>of</strong> each individual. It is easily verifiable in an online,<br />

cost-effective way. So also, it is unique and robust<br />

enough to eliminate the large number <strong>of</strong> duplicate<br />

and fake identities in government and private<br />

databases. The random number generated will be<br />

devoid <strong>of</strong> any classification based on caste, creed,<br />

religion and geography.<br />

UIDAI launched AADHAAR program in the<br />

tribal village, Tembhli, in Shahada, Nandurbar,<br />

Maharashtra on 29 September 2010. The program<br />

was inaugurated by the Prime Minister, Manmohan<br />

Singh along with UPA chairperson Sonia Gandhi.<br />

The first resident to receive an AADHAAR was<br />

Rajana Sonawane <strong>of</strong> Tembhli village.<br />

october 2011- september 2012<br />

18


e-track<br />

Basics <strong>of</strong> UID<br />

UID or AADHAR is a “unique identification”<br />

will also facilitate entry for poor and<br />

underprivileged residents into the formal<br />

number that is to be assigned to every resident <strong>of</strong><br />

banking system and the opportunity to avail<br />

India – one person, one number. Since it will be<br />

services provided by the government and the<br />

issued to every resident, including children above<br />

private sector giving mobility <strong>of</strong> identity.<br />

the age <strong>of</strong> five, it is not a pro<strong>of</strong> <strong>of</strong> citizenship. 3. Financial inclusion with deeper penetration <strong>of</strong><br />

The numbers will be issued through various<br />

banks, insurance and easy distribution <strong>of</strong><br />

agencies authorized by the UIDAI across the<br />

benefits <strong>of</strong> government schemes.<br />

country, called “Registrars”. Registrars include 4. The UID project was initiated on the apparent<br />

government, public sector and private sector premise that the poor faced great hurdles in<br />

organizations. Enrolment also entails collection <strong>of</strong> accessing benefits and subsidies due to the<br />

biometric data such as fingerprints and iris scan. inability to provide pro<strong>of</strong> <strong>of</strong> their identity. As a<br />

This number, being unique for each person, can be result, every time an individual tries to access<br />

verified from his or her fingerprints.<br />

a benefit, the UID is a solution <strong>of</strong> its identity<br />

Documents required for registration: The<br />

and hence get a commodity.<br />

“Handbook for Registrars”, prepared by the UIDAI, 5. UID is supposed to act as an all-purpose, foollists<br />

valid identity documents for UID enrolment, pro<strong>of</strong> identification device. This could help in<br />

such as the ration card, PAN Card, Voter ID, etc. facilitating all processes that require<br />

Those who do not have any <strong>of</strong> these documents can identifying oneself – such as opening a bank<br />

also apply for a UID number (Aadhaar). In such account or applying for a passport.<br />

cases, authorized individuals (introducers), who<br />

6. Will help fight corruption in welfare<br />

already have an Aadhaar, can introduce residents<br />

programs, enhance inclusiveness in<br />

who don't possess any <strong>of</strong> the requisite documents<br />

government schemes, and so on. Specific<br />

and certify their identity.<br />

areas where the benefits <strong>of</strong> UID are supposed<br />

Projected Benefits<br />

to flow are NREGA, PDS and public health,<br />

1. Aadhaar will become the single source <strong>of</strong><br />

among others.<br />

identity verification. Residents would be 7. Biometric-enabled UID to authenticate<br />

spared the hassle <strong>of</strong> repeatedly providing identity can only help to prevent “fraud”, but<br />

supporting identity documents each time they is <strong>of</strong> little use in preventing collusion or<br />

wish to access services such as obtaining a extortion. UID can address the wage-related<br />

bank account, passport, driving license and so fraud in NREGA; it can do little about<br />

on.<br />

material-related corruption.<br />

2. By providing a clear pro<strong>of</strong> <strong>of</strong> identity, Aadhaar 8. Many poor people do not benefit from<br />

19<br />

october 2011- september 2012


e-track<br />

government welfare schemes because they do biometric data, 100% reliability in<br />

not have proper identification pro<strong>of</strong>. Hence authentication can still never be guaranteed.<br />

UID will be the solution to their problem and Diverse conditions will throw up more<br />

help them seek proper schemes for their challenges to such a system.<br />

betterment and living.<br />

6. <strong>National</strong> Security and NATGRID: The UID<br />

9. UID will help in elimination <strong>of</strong> “bogus” cards number will be fed into a database to be shared<br />

and can help deal with “ghost cards” and with NATGRID, which includes 11 security<br />

duplicates. With UID, beneficiaries can claim and intelligence agencies like Intelligence<br />

their benefits wherever they are as UID is Bureau, Research and Analysis Wing, CBI,<br />

portable.<br />

Central Boards <strong>of</strong> Excise and Direct Taxes,<br />

Risks and Criticism<br />

etc). These databases would be integrated with<br />

information available not just with<br />

1. Security Risk: Since the UID database has to<br />

government agencies and public sector, but<br />

be accessible over networks in real time, it<br />

also private organizations such as banks,<br />

involves major operational and security risks.<br />

insurance companies, airlines, railways,<br />

The identification system may collapse before<br />

telecom service providers, etc.<br />

network failure and hacking.<br />

7. This would give security agencies the power<br />

2. There is also a significant risk <strong>of</strong> transmitting<br />

to access sensitive personal information such<br />

biometric data over networks where they may<br />

as bank account details, market transactions,<br />

be intercepted, copied, and actually tampered<br />

websites visited, credit card transactions, etc.<br />

with, <strong>of</strong>ten without any detection.<br />

and enable them “to detect patterns, trace<br />

3. Reliability: Another concern is the reliability sources for monies and support, track<br />

<strong>of</strong> biometrics. Worn-out fingers <strong>of</strong> farmers travelers, and identify those who must be<br />

and manual laborers will be difficult to scan, watched, investigated, disabled and<br />

and an iris scan can't be done on people with neutralized”. Though at one point <strong>of</strong> time, this<br />

corneal blindness or corneal scars.<br />

can be a huge benefit to the nation in tracking<br />

4. Reliability Criticism: There were recent down the fraudulous people but on the other<br />

reports <strong>of</strong> elderly citizens being turned away hand it disqualifies “Right to Privacy” clause<br />

from enrolment centers for failure in meeting issued by the Supreme Court <strong>of</strong> India.<br />

biometric requirements. 8. Verification and Authenticity <strong>of</strong> <strong>Information</strong><br />

5. Besides the financial costs and time and effort collected: The bill does not clearly address the<br />

to enroll individuals and collect their issue <strong>of</strong> verification <strong>of</strong> information recorded<br />

october 2011- september 2012<br />

20


e-track<br />

/collected. The UIDAI delegates the<br />

responsibility to registrars and other enrolling<br />

agencies, but the possibility <strong>of</strong> flaws in<br />

recording information even by negligence<br />

remains unaddressed.<br />

9. Adoption <strong>of</strong> a direct approach: The<br />

government should clearly state whether the<br />

procurement <strong>of</strong> UID number is optional or<br />

mandatory. The UIDAI claims that UID is a<br />

“voluntary facility” – no one is obliged to<br />

enroll. As categorically stated by Mr. Nandan<br />

Nilekani, UID is not a pro<strong>of</strong> <strong>of</strong> citizenship.<br />

10. Privacy Law: Law enforcement is one <strong>of</strong> the<br />

areas that need to be critically considered<br />

upon by the government before coming out<br />

with any verdict on the UID scheme. In the<br />

absence <strong>of</strong> any statutory law in the area <strong>of</strong><br />

privacy rights, the enforcement <strong>of</strong> such a<br />

scheme directly involves a huge risk to<br />

confidentiality <strong>of</strong> personal information.<br />

It's high time when government should rethink<br />

on the ambitious dream and its implementation to<br />

make UID as central identity indicator. The pros and<br />

cons <strong>of</strong> linking it to those schemes which are only<br />

ray <strong>of</strong> hope for poor should be pondered over. The<br />

adverse impact <strong>of</strong> uncontrolled surveillance should<br />

be reflected upon. Parliamentarians need to question<br />

how reliable and useful such a technology will be in<br />

a vast country like India where a large population is<br />

still illiterate and not accustomed to such complex<br />

technologies.<br />

If used positively, UID itself can become a<br />

forceful weapon to sieve undesirable security risks<br />

out <strong>of</strong> the system. Therefore, right now, we need to<br />

seriously mull over the potential benefits and<br />

misuses <strong>of</strong> UID and be prepared with remedy.<br />

21<br />

october 2011- september 2012


e-track<br />

Google simplifies public transit information<br />

Google has announced that it had crossed the<br />

one- million mark in public transit stop information<br />

available through its Maps application. The million<br />

transit stops are spread across 500 major cities<br />

presented in an easy-to-understand format. The<br />

Indian cities on the list are Bangalore, Chennai, New<br />

Delhi, Ahmedabad, Hyderabad, Kolkata, Mumbai<br />

and Pune.<br />

The latest iteration <strong>of</strong> the Android app from<br />

Google Maps (version 6.10) simplified transit<br />

information, allowing users to pick their preferred<br />

mode <strong>of</strong> transit. This feature will be useful in cities<br />

that have multiple modes <strong>of</strong> transit available, and<br />

thus multiple layers <strong>of</strong> data embedded on Maps.<br />

Samsung Takes the High Road With WinPho 8<br />

Ativ S<br />

reverse <strong>of</strong> the word "Vita," or "life."<br />

It will be <strong>of</strong>fered in 8 GB and 16 GB<br />

versions.The design <strong>of</strong> the Ativ S looks very much<br />

like that <strong>of</strong> Samsung's Galaxy S III. It has a 1.5 GHz<br />

dual-core processor, a 4.8-inch HD Super<br />

AMOLED screen, an 8 MP auto focus front camera<br />

with LED flash in the rear and a 1.9 MP front<br />

camera.<br />

It incorporates near field communications<br />

(NFC) so users can share information with other<br />

NFC-enabled smartphones by tapping the devices<br />

together.<br />

The Ativ S comes with Samsung Family Story<br />

preloaded. Samsung Family Story is a private social<br />

network that's also available on other Samsung<br />

devices, including the company's Smart TV.<br />

Samsung ChatOn also comes preloaded on the<br />

device.<br />

The public transit information available for<br />

Chennai, for example, includes data from the<br />

Chennai MRTS, Southern Railway and<br />

Metropolitan Transport Corporation (MTC).<br />

The Ativ S comes with the usual sensors --<br />

For New Delhi, the list includes the Delhi proximity, accelerometer and so on -- and both A-<br />

Integrated Multi-Modal Transit System, DMRC, GPS and GLONASS.<br />

Northern Railway, Delhi Metro Rail and the Delhi<br />

Transport Corporation.<br />

The update to Google Maps is particularly<br />

useful in cities where visitors are at odds reading<br />

signages in local languages and have difficulty in<br />

getting around places. The Google Maps application<br />

for Android mobile devices can be downloaded free<br />

from Google Play. It requires data connectivity.<br />

(Source: www.thehindu.com)<br />

Samsung has announced the first smartphone<br />

running Windows Phone 8, The Samsung Ativ S.<br />

The most common cause <strong>of</strong> leaks from add-<br />

ons is when they accidentally hold on to extra copies<br />

<strong>of</strong> a website in memory after a user has closed a tab.<br />

The Ativ S is part <strong>of</strong> the company's Ativ family<br />

<strong>of</strong> devices. Samsung has created this brand for its<br />

Windows-based devices. Ativ, by the way, is the<br />

NEWS<br />

It runs on HSPA+ 42 networks and supports<br />

Bluetooth. It also has a slot for an SD card. Further,<br />

the Ativ S has a physical Windows button.<br />

Source: http://www.technewsworld.com<br />

Firefox 15 Goes on a Memory Diet<br />

Better management <strong>of</strong> memory and updates<br />

highlight the latest release <strong>of</strong> the Mozilla<br />

Foundation's Web browser, Firefox 15.<br />

Firefox's development team has steadily<br />

improved the browser's memory management over<br />

recent months, but with this release <strong>of</strong> the program,<br />

it's targeting a major contributor to the s<strong>of</strong>tware's<br />

piggish memory ways: add-on applications.<br />

october 2011- september 2012<br />

22


The pages pile up and eat massive amounts <strong>of</strong><br />

memory with no user benefit.<br />

With Firefox 15, Mozilla has developed a<br />

mechanism to prevent those leaks from happening.<br />

The browser now detects that pattern, recaptures the<br />

leaked memory and frees it up. The result is that<br />

Firefox stays stable even if an add-on is making this<br />

mistake.<br />

Source: http://www.technewsworld.com<br />

e-track<br />

This integrates the company's virtualization,<br />

cloud infrastructure and management portfolio into<br />

one bundle.<br />

It lets users set up their own virtual data<br />

centers, consisting <strong>of</strong> virtual compute, storage,<br />

networking and security resources.<br />

The s<strong>of</strong>tware-defined data center "transforms<br />

all data center services -- compute, storage,<br />

networking, security and availability -- into<br />

s<strong>of</strong>tware to enable the on-demand provisioning and<br />

automated management <strong>of</strong> an entire virtual data<br />

center<br />

A s<strong>of</strong>tware-defined data center brings all<br />

seven layers <strong>of</strong> technology in the Open Systems<br />

Interconnection framework "under the control <strong>of</strong> a<br />

single management layer". "This would allow<br />

administrators to manage how resources are used<br />

across systems and workloads."<br />

Source: http://www.technewsworld.com<br />

New vCloud 5.1 Brings Data Centers Into the<br />

Virtual Fold<br />

VMware has launched what it claims is the<br />

first solution to deliver what it calls the "s<strong>of</strong>tware-<br />

defined data center" -- its vCloud Suite 5.1.<br />

free till the end <strong>of</strong> 2013; however users need to have<br />

a paid subscription to Google's cloud-based<br />

s<strong>of</strong>tware for businesses, Google Apps, for<br />

uninterrupted access.<br />

The new business tools allow business users to<br />

control who can see their posts on the social<br />

networking website and features integrated video<br />

conferencing and improved administrative controls<br />

over the posts and who can see them.<br />

Google is giving a full preview <strong>of</strong> the features<br />

to Google Apps users. Moreover, users can also add<br />

a hangout to a Calendar event. Hangouts were<br />

previously accessible via Gmail and via Google<br />

Docs. Administrators now also have the option to<br />

restrict Hangouts for private meetings. Google is<br />

currently working on the mobile version <strong>of</strong> the new<br />

business suite along with more administrative<br />

controls.<br />

Source: http://www.thinkdigit.com<br />

Google releases new tools for Google+ business<br />

users<br />

Google released a suite <strong>of</strong> business tools for<br />

Google+ users. Google is <strong>of</strong>fering these tools for<br />

23<br />

october 2011- september 2012


e-track<br />

BOOK REVIEW<br />

Author: Khaled Hosseini<br />

Publisher:Penguin Books India, ISBN: 978-0747585893, Pages: 372.<br />

A Thousand Splendid Suns is a breathtaking<br />

story set against the volatile events <strong>of</strong> Afghanistan's<br />

last thirty years, from the Soviet invasion to the<br />

reign <strong>of</strong> the Taliban to post-Taliban rebuilding,<br />

which puts the violence, fear, hope and faith <strong>of</strong> this<br />

country in intimate, human terms. It is a tale <strong>of</strong> two<br />

generations <strong>of</strong> characters brought jarringly together<br />

by the tragic sweep <strong>of</strong> war, where personal lives, the<br />

struggle to survive, raise a family, find happiness,<br />

are inextricable from the history playing out around<br />

them.<br />

The author has managed to tell the modern<br />

history <strong>of</strong> Afghanistan: from the end <strong>of</strong> the<br />

monarchy to the invasion <strong>of</strong> the Soviets to the chaos<br />

<strong>of</strong> rule by the war lords to the tight fisted maniacal<br />

rule <strong>of</strong> the Taliban to the post-9/11 return to some<br />

semblance <strong>of</strong> relative normalcy. The author again<br />

uses the device <strong>of</strong> telling the stories <strong>of</strong> two main<br />

characters <strong>of</strong> differing backgrounds. The author<br />

uses this novel to tell the story <strong>of</strong> Afghani women<br />

and the hardships that face them with each regime<br />

change.<br />

It is a great story wonderfully told, however,<br />

and the fact that it takes place in a land few <strong>of</strong> us<br />

understand makes it educational as well as<br />

entertaining. The writing is absolutely beautiful.<br />

The pictures he paints with his words are so vivid<br />

that everything from the fun everyday life to the<br />

squalor that war brings to the ordinary person just<br />

flashes before your eyes like a movie. There are<br />

some parts that have no doubt happened to many<br />

people but to think that any <strong>of</strong> this is even remotely<br />

possible will just<br />

kill you especially<br />

the parts about<br />

what a mother will<br />

do to save her<br />

children.<br />

It's not as<br />

violent as I thought<br />

it would be, given<br />

that it takes place<br />

during the war in<br />

Afghanistan and<br />

there is hope, but the story will shake you to the core.<br />

You have people living a regular life, they go to<br />

work, they fall in love, they have a family, they make<br />

mistakes, and they try to atone for their mistakes and<br />

then war hits and life as they know it changes within<br />

the blink <strong>of</strong> an eye. It's not a story about war though<br />

it's a story about people from different walks <strong>of</strong> life<br />

trying to go about the business <strong>of</strong> living as best as<br />

they can and trying to find a tiny corner <strong>of</strong><br />

happiness.<br />

This book describes, through a human perspective,<br />

how the nation became a veritable hell for its own<br />

people after the usurping. How the people had to<br />

survive with restrictions on the most basic, most<br />

mundane aspects <strong>of</strong> their life.It is a good choice for<br />

readers who appreciate fiction that combines<br />

accurate history with wonderful story telling.<br />

KhaledHosseini is an excellent writer and A<br />

Thousand Splendid Suns is just another example <strong>of</strong><br />

his gift for storytelling.<br />

october 2011- september 2012<br />

24

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!