Skip to main content

ONLINE DOCUMENT VERIFICATION

Page 1

International Research Journal of Engineering and Technology (IRJET) e ISSN:2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN:2395 0072

ONLINE DOCUMENT VERIFICATION

1,2,3 Affiliated By AKTU, Dept of Computer Science, Ghaziabad, Uttar Pradesh, India (Students, Dept of Computer Science, Krishna Engineering College, Ghaziabad, Uttar Pradesh, India) ***

ABSTRACT

Overtheyearstherehavebeenagreatneedofeasyandfastedmeansofverifydocuments(likemarksheets,certificatesetc.) toreducethelevelofdocumentsforgeryandtoeasethestressandalsosavethetimeofverificationwhichisdonemanually today.Incaseofresultandcertificatesanemployeroranybodyconcernwillhavetocomeorsenddelegatetoschooltoverify a particular certificate, some employer never did and this has resulted on accepting a forge certificate. The system can be implemented as a standalone site and/or an application or can also be embedded in an already existing institution official website.

This software is basically a verification service to ease the work of verification process in all the fields and to decrease the paper workload. Verification process in other words is very important nowadays for a lot of companies. It actually allows companiestovalidatetheinfoprovidedbytheiremployeesaretrueandcorrectwithoutanydiscrepancies.

IMPLEMENT: ThiswillbeimplementedbyusingabackenddatabaseofMySQLwitha PHPcodeandwillconsistofawebpageforitseaseuse.Itwouldhavethefollowingusertypes:

• Adminwillbasicallyapproveverifierloginandgivefinalapprovalforasubmitteddocument.

• Theverifierwillvalidatethedetailsandattachmentsthathavebeenuploadedbyaloggedinusers.

• Theuserwillregisterandonceregisteredtheywillhaveadashboardforrulesandsystemguide.

Infuturethis project will canactasa core to everysoftware requiring database.In thiswecanadda downloadoption for a specificcategoryaspertherequirementsofthecandidateswhosedocumentswearefetching

KEYWORDS: InformationSystem,Verification,OnlineVerificationandValidation,Authentication,FraudDetection

I. INTRODUCTION

ONE of the most frequently used means of exchanging information among people is the Internet. This method of electronic data transmission breaks all the distance barriers. Furthermore, everyone should be able to browse the same websites and have the opportunity for equal user experience in the Internet. In other words, the Internet should be usable by everyone. OnlineDocumentVerificationsystemrepresentsthedirection offuturedocumentauthenticatingdevelopment.Promotionof OnlineDocumentVerificationsystemwillimprovethespeedandquality (Nwachukwu NwokeaforK.C,December 2015) Its background is centered on the need to adopt online verification system that will save the huddles of manual verification method.

Thiswillenableanybodytoverifyaninstitutioncertificateonline,withouthavingtocomedowntotheschool/institutiontodo soortocarryoriginaldocumenteverywhere.Allthatisrequiredtologintotheverificationportaland,thentheoriginalcopy ofthatwillbedisplayedonthescreenalongwiththemessageaspertheauthenticityofthedocument.

If the document is valid then the document will be displayed with the message that the document submitted by the user is validandauthenticate.Butifthedocumentnumberisinvalid,thefollowingmessagewillbedisplayedonthescreen“Invalid

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page3339
Srishti Gaur1 , Vaishali Thakur2 , Sonu Chaudhary3

International Research Journal of Engineering and Technology (IRJET) e ISSN:2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN:2395 0072

document as per our records as we don’t have details of this person, it is either you made a typing mistake or the owner haven’tprovidedthecorrectinformation,Verifyandtryagain

II. METHODOLOGY

Documentverificationistheelementarystepthathastobedoneafterenrollmentorregistrationinanyorganizationorwhere verificationismustlikepassportoffice,bordersstations,duringanybanktransactionandmanymore.Forthiswecanuseany unique thing for identification like Aadhar card, Passport, PAN number and other things. We use 12 digit Aadhar card number for identification in this. Whole system will be online and mechanized , the system will be personlized to have each certificates that are linked to the student’s detail . Our software should automatically verified all the required documents by enteringtheaadharnumber.Thissoftwareiswebbasedaswellasmobileapplication.Anypersonororganizationthatwant to check the authentcity of the documnents that enter the aadhar number as shown in fig 1 . Its main objective to make verificationeasyforourselfsandtheorganizationbyusingthissoftwareTooptimizethe processbyconsideringvarioususer constraintsaswellasotherinformationlikelocationofactivities,theirduration,andtravelsignalstrengthdependingonmode ofinternetconnectivity

III. MODELING AND ANALYSIS

SHA 256

The SHA 256 compression function operates on a 512 bit message block and a 256 bit intermediate hash value. It is essentiallya256 bitblockcipheralgorithmwhichencryptstheintermediatehashvalueusingthemessageblockaskey.Hence therearetwomaincomponentstodescribe:

(1) theSHA 256compressionfunction,and

(2) theSHA 256messageschedule

Wewillusethefollowingnotation

BitwiseXOR BitwiseAND BitwiseOR BitwiseComplement

Mod2^32addition

Rightshiftbynbits

Rightrotationbynbits

Table1:NotationforSHA 256

© 2022,
|
Certified Journal | Page3340
IRJET
Impact Factor value: 7.529 | ISO 9001:2008

International Research Journal of Engineering and Technology (IRJET) e ISSN:2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN:2395 0072

a) Asthissoftwareisconnectedtothecentralserversoyoucanaccessthedocumentanytimeandanywhere.

b) Asthissoftwareisavailableforwebaswellasmobileapplication

IV. RESULT

The system needs various hardware and software. The Hardware consists of Operating system like windows, Linux etc. and the project contain web server, XAMPP win32 7.0.9 0 VC15 installer for (Apache Web Server). The functional requirements consist of webpage and the web application. The system will identify the documents like marksheet and other government certificates.

The certificates stored in the database and it can only access by the admin, the user can upload the document and the rest process is done by the other authorities like for marksheet of CBSE verified by CBSE authorities etc. The software contains differentmodulesandeverymodulehasitsspecificfunctionality.Everycompanyhasitsownidandpassword,theycanverify documentseasily.Ifanycompanywantstoidentifythedocument,thenthe Tokenisgeneratedontheusersideandbyusing thatToken the companycanalsoidentify the candidate’s documents, buttheycan’tupdate,change or deletethecandidate’s certificates.Theresultoftheprojectandtestresultsareasfollows:

a) Login and registration

Thisistheadminfrontpagewhichwill beusedforonlineverificationofdocument.Itcontainsregistrationpage forthe newuserandloginpagefortheexistinguser.

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page3341
Fig 4 : Shows the admin login for online verification

International Research Journal of Engineering and Technology (IRJET) e ISSN:2395 0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN:2395 0072

Fig 5 : shows the registration for online verification

b) Notification and verification link to change Password

Thisinterfacewillpopupwhenuserclicksthe“forgottenpassword”link.Theverificationlinkforthepasswordchangewill be senttotheregisteredemailid,theusercanchangethepasswordfromthelink.Fig4.andFig.5displaytheusernotificationand verificationlinktochangethepassword.

Fig 6 : User notification to Change Password

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page3342

International Research Journal of Engineering and Technology (IRJET) e ISSN:2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN:2395 0072

Fig 7: Verification Link to Change Password

c) Document Verification

Aftersuccessfulregistration,thesystemwillshowtypeofdocumentandusercanselectthedocumentfromthe givenoption andthencansuccessfullyuploaditonthesystemandafterthatsystemwillverifythatdocument.Fig.3.showstheDocument verificationprocess.

Fig 8 : Document verification

d) Token generated for verifying document

TheTokenisgeneratedfortheverificationpurpose,whenanycorporateoranyotheruserisidentifyingourdocuments.The Token is generated for 30 minutes and the company can only identify user document, they don’t have any access for the deletionandupdationofanydocuments.Fig.6.showstheTokengeneratedforverifyingcertificate.

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page3343

International Research Journal of Engineering and Technology (IRJET) e ISSN:2395 0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN:2395 0072

Fig 9 : Token generated for verifying Document

V. CONCLUSION

Theproposedverificationsystemhelpsthepotentialclientstoverifytheirdetailsovertheinternet Itgivestherealpossibility toverifythedocumentscanbeplacedinsecureenvironment.Thissystemishandyatthoseareaswheremanpowerisneeded. This system provides the online platform to store the documents and certificates, by which a user can easily carry his/her documentswithoutphysicallycarryingthem.ThissystemenablesanyorganizationtomeetlegalobligationsincludingCounter TerrorismFinancingandAnti MoneyLaundering.Itsavestime and money, reduce many errorsat minimum bycomparing it withmanualmethodwithareductionfactor.Thecredentialsarevisuallyverifiedifpresentedphysicallyorcheckedagainstthe authentic data source if presented online. Any individual, can easily verifies the authenticity and validity of the documents givenbytheperson.TheauthorizedaccesscanonlybegivenafterOTPverification.Beforethesubmissionofdocuments,they wouldbeverifiedasthedocumentswouldbeprovidedbytheactualpersonaswellasweourselveswouldbeverifyingthem personally.SecurityofthepersoncanbeassuredasthesessionwouldbeloggedoutafteralimitedtimeafterOTPverification andtore accessthedocumentsOTPverificationisrequiredagain.Takingscreenshotisalsonotallowedduringtheaccessing ofthedocuments.OnlineVerificationsystemoffersuserconvenienceandsignificanteasetoemployersastheycangetoriginal documents more easily and faster than standard manual authentication methods. All though computerized verification systemshavea numberofleadsovermanualones,thereafewchallengesthatmustbeovercomeinorderthattheirbenefits may be fully realized. First of all, there is the high initial cost of running such a system, as it is typical for all computerized systems.Hence,thissystemprovidestwofacilitiestotheuserlikestoringdocumentsonlineandverifyingthemonlineaswell astheywouldbesecurealso. VI. REFERENCES

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page3344
[1] AnalysisofBackgroundCheckPolicyinHigherEducationGregoryT.OwenGeorgiaStateUniversity [2] Beyondthebasicbackgroundcheck:hiringthe‘‘right’’employeesRichardG.BrodyDepartmentofAccounting,Anderson SchoolsofManagement,UniversityofNewMexico,Albuquerque,NewMexico,USA [3] EffectiveHiringProcessBackgroundCheckStrategiesChristinaDianeWaddellWaldenUniversity [4] FurtherBeyondtheBasicBackgroundCheck:PredictingFutureUnethicalBehaviorFrankS.PerriJD,CPA,CFE [5] Expected Practices in Background Checking: Review of the Human Resource Management Literature Julia Levashina & MichaelA.CampionPublishedonline:5May2009

Turn static files into dynamic content formats.

Create a flipbook