2. A PROJECT REPORT ON
Personal Identity Management
Submitted to CSVTU UNIVERSITY for the
partial fulfillment of the Requirement for
the
MINOR PROJECT
B.E.
Done By
Gaurav Burman
Akhil Upadhyay
Amarjit Kumar
LAKHMI CHAND INSTITUTE OF TECHNOLOGY
3. Object of the Project :-
This is a site which is used to store
Personal information like passwords
and files. Only authorized user can
login into the system and he/she can
store the data. Something like a
personal data vault.
4. Purpose of the System :-
To provide facility to maintain password and
file management through a website.
Problems of Existing System :-
Actually we are browsing lot of sites , For
some sites we required user id and password
. But frequently we are forgetting passwords
because of lot of sites.
5. Solution of the Problem :-
This is a site which is used to store usernames
and passwords, we can store files and frequent
visited and important sites.
Proposed System :-
In this site we have to register first with login
name and password then we can store our
different passwords and we can store our personal
files and photos . It will work as personal data
vault.
6. Functional Requirements :-
User must register first.
Admin will approve the user request.
User can add password and files as well as
favourites.
The modified date will maintained .
Communication facility through mails.
Other use full information links are provided .
7. Number of Modules :-
Admin
User
Authentication
Communication
Registration
8. Modules Description :-
Admin :-
Admin is the owner of this site , he is the person to
approve the user request.
After verifying the users registration data admin can
accept/reject the request of users.
He can add states and countries.
User :-
user has to register first after admin acceptance only
he can eligible to login into the site . To user facilities
of this site he has to provide login name and
password (like gmail or yahoo).In this site he can
store his file and photos . He can add favourites and
he can store passwords of different sites . You can
mail to your friend only in this site.
9. Authentication :-
The process of identifying an individual usually
based on a username and password. In security
systems, authentication is distinct from
authorization, which the process of giving individuals
access to system object based on their identity.
Authentication merely ensures that the individual is
who he or she claims to be, but says nothing about the
access rights of the individual.
Registration :-
The system has a process of registration. Every
user need to submit their complete details including
user name and password in the form of registration.
Whenever a user registration completed then only a
user can get log in into the system by using his user id
and password.
Communication :-
11. Input & Output
Inputs :-
Admin enters credentials.
Admin add states by entering details .
Admin adds Countries.
Admin Approve the user by verifying the registration
details
User enters registration details.
User enters credentials.
User Adds the Favourites by entering favourites
details.
User adds the User adds the Passwords by entering
password details.
User enter the change password details.
12. Outputs :-
Admin will get his home page.
User can get his favourites list.
User can check the mails.
User will get his home page
User can get his profile.
14. Feasibility Report :-
The feasibility study is the important step in any
software development process. This is
because it makes analysis of different aspects
like cost required for developing and executing
the system, the time required for each phase of
the system and so on. If these important
factors are not analyzed then definitely it would
have impact on the organization and the
development and the system would be a total
failure. So for running the project and the
organization successfully this step is a very
important step in a software development life
cycle process.
15. Advantages of making Feasibility study :-
This study being made as the initial step of software
development life cycle has all the analysis part in it which
helps in analyzing the system requirements completely.
Helps in identifying the risk factors involved in developing
and deploying the system
The feasibility study helps in planning for risk analysis
Feasibility study helps in making cost/benefit analysis
which helps the organization and system to run efficiently.
Feasibility study helps in making plans for training
developers for implementing the system.
In project development and feasibility studies stage of the
SDLC, software engineers and developers should be able
16. Outline Technical Needs :-
In project planning, developers should be able
to come up with the possible technical needs of
the software. These are very important since
without them, software development is nearly
impossible. Within the realms of the
budget, developers should get the best devices
to help them in project development.