SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

solesurvivors
Highly Confidential Security System
Software Requirements Specification

Version 1.0

Mentor
Mr.R.Jayaraj (Asst. Professor), Department of CSE
Members
Arun Prasath.S

-

090105107008

Jojy George

-

100405107005

Prabhu.E

-

100405107013

Vivek Andrew Sha -

090105107121

College - Hindusthan College of Engineering and Technology, Coimbatore – 641032
Department - Computer Science and Engineering
State - Tamil Nadu

Sole Survivors | Hindusthan College of Engineering and Technology

1
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

Revision History
Date

Version

Description

Author

20-12-2012

1.0

Initial Release

Sole Survivors

Sole Survivors | Hindusthan College of Engineering and Technology

2
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

Table of Contents
Description

Page No

1. Introduction

4-9

1.1 Methodology ………………………………………………………………………… 4
1.2 Purpose ….. ………………………………………………………………………….. 5
1.3 Scope ……. ………………………………………………………………………….. 5
1.4 Definitions, Acronyms and Abbreviations … ……………………………………….. 6
1.5 References ……….…………………………………………………………………. 7
1.6 Technologies to be used ….………………………………………………………….

7

1.7 Tools to be used …. …………………………………………………………………. 7
1.8 Overview …………………………………………………………………………….. 9

2. Overall Description

9 - 18

2.1 Product Perspective ……….………………………………………………………… 9
2.2 Product Functions……………………………………………………………………. 10
2.3 Software Interface …………………………………………………………………. 10
2.4 Hardware Interface …………………………………………………………………. 11
2.5 User Characteristics …………………………………………………………………. 12
2.6 Constraints ………………………………………………………………………….. 12
2.7 Assumptions and Dependencies……………………………………………………… 12
2.8 Architecture Design …………………………………………………………………. 13
2.9 Use Case Model Survey ……………………………………………………………... 14
2.10 Database Design………………………………………………………………….…. 15
2.11 ER diagram…………………………………………………………………………. 16

3. Specific Requirements

17 - 33

3.1 Use Case Reports ……………………………………………………………………. 17
3.2 Activity Diagrams …………………………………………………………………… 20
3.3 Sequence Diagrams …………………………………………………………………. 29

4. Supporting Information

34

4.1 Index…………………………………………………………………………………. 34

Sole Survivors | Hindusthan College of Engineering and Technology

3
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

1. Introduction
In day-to-day life it is quite hard to remember all confidential data like Mail Id, Password, bank
account number, Insurance policy number, PAN number, Driving License number, education certificate
Numbers, Some highly value scan copy, some confidential photo, music and videos. Crypto Locker is a
highly secure web application to store all confidential data in single credential.

1.1 Methodology
The Rational Unified Process brings together elements from all of the generic process models,
supports iteration and illustrates good practice in specification and design. The RUP is normally described
from three perspectives:


A dynamic perspective that shows the phases of the model over time



A static perspective that shows the process activities that are enacted



A practice perspective that suggests good practices to be used during the process

Sole Survivors | Hindusthan College of Engineering and Technology

4
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

Inception
The goal of the inception phase is to establish a business case for the system. Identifying all
external entities that will interact with the system and defining these interactions. This information is used
to assess the contribution of system to business.

Elaboration
The goals of the elaboration phase are to develop an understanding of the problem domain,
establish an architectural framework, develop project plan and identify key project risks.

Construction
This phase is concerned with system design, programming and testing. Parts of the system are
developed in parallel and integrated during this phase.

Transition
This is the final phase of RUP and is concerned with moving the system from the development
community to the user community and making it work in real environment.

1.2 Purpose
Crypto Locker is a web application developed for secure and easy access of data. Crypto Locker
is a useful and convenient application that spares you the trouble of remembering the passwords and
securing the files. This application helps people to store their passwords and various types of files like
photos, music and videos in a secure and efficient manner. The application which we develop here uses
state of the art encryption technology to secure files and access over anywhere in the world using the
internet.

1.3 Scope


There are two basic users – Administrator, User.



All users have their own profile in Crypto Locker.



Administrator has an ability to manage the registered user profiles and organize the files stored in
the server.



Administrator has the ability to provide the notification message to the logged users via webpage.



Public peoples are the users used this web application to protect their important details in single
credentials.



Citizens (users) can access their files through internet from anywhere in the world.

Sole Survivors | Hindusthan College of Engineering and Technology

5
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

1.4 Definitions, Acronyms and Abbreviations
AJAX - Asynchronous JavaScript and XML is about updating parts of a web page, without reloading the
whole page.

Database platform (DB2) - DB2 Database is the database management system that delivers a
flexible and cost effective database platform to build robust on demand business applications and supports
the J2EE and web services standards.

WASCE - Websphere Application Server Community Edition is an application server that runs and
supports J2EE and web service applications.

UML - Unified Modeling Language is a standard language for writing software blueprints. The UML
may be used to visualize, specify, construct and document

XML - eXtensible Markup Language is a text based format that let developers describe, deliver and
exchange structured data between a range of applications to client for display and manipulation.

JSP - Java Server Pages is used to create dynamic web content.
J2EE - Java 2 Enterprise Edition is a programming platform which is a part of java platform for
developing and running distributed java.

HTTP - Hypertext Transfer Protocol is a transaction oriented client/server protocol between web browser
and a Web Server.

HTTPS - Secure Hypertext Transfer Protocol is a HTTP over SSL (secure socket layer).
RAD - Rational Application Developer is a development tool that helps to design web pages and also
helps to design the diagrams like ER, Database schema diagrams and to generate DDL.

WAS (Websphere Application Server) - It is an application server that runs business applications and
supports the J2EE and web services standards.

Sole Survivors | Hindusthan College of Engineering and Technology

6
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

SOA: Service-Oriented Architecture is a set of principles and methodologies for designing and
developing software in the form of interoperable services.

1.5 References


IBM TGMC Sample Synopsis.



Software Engineering Theory and Practice (2nd Edition) - Shari Lawrence Pfleeger



Database Management Systems - Navathe.



Object Oriented Modeling and Design with UML (2nd Edition) - Michael Blaha, James
Rambaugh.



Java Complete Reference (7th Edition) – Herbert Schildt.



Cryptography and Network Security – William Stallings

1.6 Technologies to be used


J2EE : Programming Platform for developing and running distributed Java



AJAX : Updating parts of a web page, without reloading the whole page.



SOA : Set of principles and methodologies for designing and developing software in the form
of interoperable services.




UML : Standard for writing software blueprints, and used to visualize, specify, construct and
document.
XML : XML is a text based format that let developers describe, deliver and exchange
structured data between a range of applications to client for display and manipulation.



Jasper: Jasper Reports is an open source Java reporting tool that can write to a variety of
targets, such as: screen, a printer, into PDF, HTML, Microsoft Excel, RTF, ODT, Commaseparated values or XML files.

1.7 Tools to be used
Rational Rose
Rational Rose is an object-oriented programming (OOP) and unified modeling language (UML)
tool to design enterprise-level software applications and components. It creates visual software
application models under object-oriented principles. Example application models include the creation of
actors, use cases, relationships, entities, etc. It uses classical UML concepts to graphically model software
applications. This facilitates documenting the environment, requirements and overall design.
Sole Survivors | Hindusthan College of Engineering and Technology

7
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

Eclipse
Eclipse is a multi-language software development environment comprising an integrated
development environment (IDE) and an extensible plug-in system.

WPS
WPS stands for Wi-Fi Protected Setup and was designed to simplify the process of configuring
security on wireless networks.

Rational Software Architect (RSA)
IBM Rational Software Architect, (RSA) made by IBM's Rational Software division, is a
comprehensive modeling and development environment that uses the Unified Modeling Language (UML)
for designing architecture for C++ and Java 2 Enterprise Edition (J2EE) applications and web services.

Development tool – RAD
IBM Rational Application Developer for Web Sphere Software (RAD) is an integrated
development environment (IDE), made by IBM's Rational Software division, for visually designing,
constructing, testing, and deploying Web services, portals, and Java (J2EE) applications.

Websphere Application Server (WAS)
IBM Websphere Application Server (WAS), a software application server, is the flagship product
within IBM's Websphere brand. WAS is built using open standards such as Java EE, XML, and Web
Services.

Web server – WASCE
Websphere Application Server Community Edition (from now on WASCE) is a free, certified
Java EE 5 server for building and managing Java applications. It is IBM's supported distribution of
Apache Geronimo that uses Tomcat for servlet container and Axis 2 for web services. Over 15 WASCE
developers are committers in the Apache Geronimo project.

DB2 (Database 2)
DB2 is a family of relational database products provides an open database environment that runs
on a wide variety of computing platforms. A DB2 database can grow from a small single-user application
to a large multi-user system.
Sole Survivors | Hindusthan College of Engineering and Technology

8
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

1.8 Overview
The SRS will include two sections, namely:
Overall Description
This section will describe major components of the system, interconnections, and external
interfaces.
Specific Requirements
This section will describe the functions of actors, their roles in the system and the constraints
faced by the system.

2. Overall Descriptions
2.1 Product Perspective
The Crypto Locker is available for use by the administrator and the user. The administrator and
users will use the webpage as a front end. The browser goes through an http server. Application server
manages the connection between the front end and backend, all types of information and data, that are
necessary for the users are stored in DB2.

Sole Survivors | Hindusthan College of Engineering and Technology

9
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

2.2 Product Functions


The Crypto Locker service provides the user interface (UI) to user and administrator for creating
their profiles.



This product has the ability to send the “Account verification link” to the user’s mail, while
creating their account.



This product has the ability to send “Password Reset link” to the user’s mail, if the user forgets
the password for accessing the account.



This product is able to detect the user’s browsers.



This product provides the users to create the locker facilities for Bank account information,
Music, Video and Image files.



This product allows the registered users to store their important details on a server in an encrypted
format and while downloading, it is automatically decrypted.



This product provides the facility for administrators to generate the reports on user’s logs in .PDF
and Microsoft Excel formats.



It ask the account’s current password from the user when they want their personal credentials
from our server as a report (PDF and Excel).

2.3 Software Interface
(All users require internet for communication)

Public People (users)
Web browser (any), operating system (any)

Administrator
Web browser (any), operating system (Windows)

Web Server
WASCE, Operating System (Windows)

Data Base Server
DB2, operating system (Windows)

Development End
RAD (J2EE, java, java bean, Servlet, HTML, XML, AJAX) operating system (Windows), Web Sphere
(Web Server)

Sole Survivors | Hindusthan College of Engineering and Technology

10
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

2.4 Hardware Interface
2.4.1 Minimum Requirements

Crypto Locker (Server)

Processor
Storage Space

RAM

Disk Space

Intel Pentium IV –

4 GB RAM

5 TB

1 GB RAM

1 GB

AMD Athlon (1.8 GHz)
DB2 9.72

Users (Public People)

Browser

Processor

RAM

Internet Explorer 7, Firefox 13 with

Intel Pentium IV – AMD

1 GB RAM

Flash Plug-ins

Athlon (1.8 GHz)

2.4.2 Recommended Requirements

Crypto Locker (Server)

Processor
Storage Space

RAM

Disk Space

Intel Core Family (Any)

8 GB RAM

10 TB

2 GB RAM

2 GB

– AMD Phenom
DB2 9.72

(2.2 GHz)

Users (Public People)

Browser

RAM

Intel Core Family (Any) –
Latest Versions of Browsers (any)

Processor

2 GB RAM

AMD Phenom
(2.2 GHz)

Sole Survivors | Hindusthan College of Engineering and Technology

11
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

2.5 User Characteristics


Both users and administrator on internet will be using HTTP protocol.



Users use the FTP protocol for uploading and downloading the files from or to the server.



Administrator configures the SMTP Server for sending the mail to the user.

2.6 Constraints


GUI is only in English.



Login and password is used for the identification of the user (public people) and administrator.



Limited to HTTP, SMTP and FTP protocol.



Centralized server is used.

2.7 Assumptions and Dependencies
Crypto Locker is a platform independent web application. It is assumed that the client or user
computer has latest browser with JavaScript enabled. In addition, Firefox and Internet Explorer need the
flash plug-ins to play the media files. For configuring the SMTP Server it needs the Linux operating
system with at least kernel version 2.6.30, if server is in windows then it may need Windows Server.
Sending the message (SMS) to the users mainly depends on the network operator.

Sole Survivors | Hindusthan College of Engineering and Technology

12
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

2.8 Architecture Design

Sole Survivors | Hindusthan College of Engineering and Technology

13
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

2.9 Use Case Model Survey

2.9 Use Case Model Survey

Users (Public People)
Users can upload their files in their own personal locker. The locker includes various subsets like
Music locker, Image locker, Video locker, Password locker and Bank Account Information locker. Users
can access their personal (uploaded) files through internet. Users can participate in forum discussions to
clarify their doubts and also able to view the notifications sent from the administrator.

Sole Survivors | Hindusthan College of Engineering and Technology

14
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

Administrator
Administrator has the ability to manage the registered user’s profile. Administrator can send the
notification to the logged user about any changes in the service and also clarify the user’s doubts and
questions about the service.

System
While users are trying to create their account, Crypto System validates the user’s details and post
the message (success or failure) to them. Server has the ability to send the “Password reset link” to the
user’s mail, if the user forgets the password to access their account. It automatically blocks the abuse
users. When users are uploading the file, the system encrypts it by using the algorithm, when the users are
downloading their file, the system decrypts it.

2.10 Database Design

Sole Survivors | Hindusthan College of Engineering and Technology

15
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

2.11 ER Diagram

Sole Survivors | Hindusthan College of Engineering and Technology

16
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3. Specific Requirements
3.1 Use Case Reports
3.1.1 Administrator

3.1.1 Use Case Report for Administrator

USECASE
Register
Username Verification
Sign In
Validate Password
Profiles
Update Profile
Manage user Profiles
Push Notification
Generate Reports
Manage FAQ
Sign out

DESCRIPTION
The administrator create their account for managing the service
It checks the provided name with already existing name during registration
The admin can sign in into account and manage the service
The server validates the password and lets the admin use the service
The admin can view their own profile
The admin can update their own profile in case of any changes
The admin can manage the field registered user’s profile
The admin can push/send the notification in case of any changes
The admin can able to generate the reports about the service
The admin may clarify the doubts from clients
Logged out from the server

Sole Survivors | Hindusthan College of Engineering and Technology

17
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.1.2 Public People

3.1.2 Use Case Report for Public People (Users)

USECASE
Register
Username Verification
Sign In
Validate Password
Profiles
Update Profile
FAQ
View Notifications
Download File
Generate Reports
Upload File
Encryption/Decryption
Lockers
Sign out

DESCRIPTION
Citizens can create their account for using the service
It checks the provided name with already existing name during registration
The user can sign in into account and use the service
The server validates the password and lets the user use the service
The user can view his profile
The user can update his current status about the case
The user can able to post and reply their answers in the forum like page
The user receive the notification message from the administrator
The user can download their personal data using the secret key
The user can generate report from remote location.
The user can upload their personal data into the server
All data can be securely transmitted and received using Encryption algorithm
It includes image, video, music, password and bank account details
Logged out from the service

Sole Survivors | Hindusthan College of Engineering and Technology

18
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.1.3 Crypto System

3.1.3 Use Case Report for Crypto System

USECASE
Encryption
Decryption
Block abuse user
Validate Registration
Send Mail
Send Password Token

DESCRIPTION
The system encrypts the files from the user’s disk when he/she want to upload
The system decrypts the files from the server when the user want to download
Sever automatically blocks the lazy and abuse users based on the rules
Server Validates the user details and registers it into the database
Server sends the verification link to the user for the confirmation
Server sends the password token in case the user forgets the password

Sole Survivors | Hindusthan College of Engineering and Technology

19
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.2 Activity Diagrams
3.2.1 User Registration
The user is made to fill all the mandatory fields, each user must choose a unique user name. If the
user has filled a name that is already present in the database, then the user will be prompted to fill in a
different username. After this the user must enter the new password twice. When the user clicks the
submit button the database verifies all the mandatory fields are filled or not. When all the fields are filled
the verification mail is automatically send to user’s mail, after click the verification link the user is
registered, otherwise the user is made to fill the fields again.

3.2.1 User Registration Activity
Sole Survivors | Hindusthan College of Engineering and Technology

20
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.2.2 Validate Registration
The user enters the registration details. The system validates the details and if the details are
found invalid the system rejects it else the system sends the verification mail to the user. The user needs
to follow the verification link to complete his registration.

3.2.2 Validate Registration

Sole Survivors | Hindusthan College of Engineering and Technology

21
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.2.3 Login Activity
The user enters the login credentials. The System validates the login credentials. If the login
credentials are valid then the system detects the type of user. If user is a member then the system redirects
to the member’s home page. If the user is administrator then the system redirects to the administrator’s
home page.

3.2.3 Login Activity
Sole Survivors | Hindusthan College of Engineering and Technology

22
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.2.4 Password Reset
If the user forgets his password then he should click on the Forget password link. Then the system
prompts him to enter his Mail ID. The system validates the Mail ID. If the Mail ID is valid then the
system sends the password reset mail to that Mail ID. If the Mail ID is invalid then the system displays
the error message.

3.2.4 Password Reset Activity
Sole Survivors | Hindusthan College of Engineering and Technology

23
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.2.5 Public People
The public people (user) can login to the website using a supplied username and password. After
logging in the user can perform several tasks such as generate reports, access lockers, participate in FAQ
center, edit profiles and view the notifications sent from the administrator.

3.2.5 Public People (users) on Web

Sole Survivors | Hindusthan College of Engineering and Technology

24
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.2.6 FAQ Page
The administrator and the user participate in the FAQ (Discussion forum) for clarifying their
doubts. Both admin and citizen can view the posts and may reply to the post, or may be post the questions
from the remote location.

3.2.6 FAQ
Sole Survivors | Hindusthan College of Engineering and Technology

25
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.2.7 Access Lockers
A crypto Locker service is provided for the users, who need to store their confidential details in a
single password. To access the lockers first he/she need to enter their Crypto Locker credential to login.
After that he has the ability to open locker and manage that by uploading and downloading the files. He is
also able to generate the reports about their activity for a certain period in a .PDF format documented file.

3.2.7 User Access the Lockers

Sole Survivors | Hindusthan College of Engineering and Technology

26
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.2.8 Administrator
The administrator login into their account’s home page and manage the overall activity of the
application like user management, own profile management, frequently asked Questions i.e., Discussion
forum management, notifications management and finally generate the reports.

3.2.8 Administrator on Web

Sole Survivors | Hindusthan College of Engineering and Technology

27
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.2.9 Crypto System
The web application has the automatic controls itself. While registration the server system
validate the user details, if there is any issues then it automatically denies the registration process, and
during the upload, download process encryption and decryption process starts with the help of key
provided by the user. Also it blocks the abuse user to prevent the server from any misbehavior activities.

3.2.9 Server system’s Activity

Sole Survivors | Hindusthan College of Engineering and Technology

28
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.3 Sequence Diagrams
3.3.1 User Registration

Sole Survivors | Hindusthan College of Engineering and Technology

29
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.3.2 Login Sequence

Sole Survivors | Hindusthan College of Engineering and Technology

30
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.3.3 Password Reset

Sole Survivors | Hindusthan College of Engineering and Technology

31
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.3.4 Upload Files

Sole Survivors | Hindusthan College of Engineering and Technology

32
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

3.3.5 Download Files

Sole Survivors | Hindusthan College of Engineering and Technology

33
Highly Confidential Security System
Software Requirements Specification
Sole Survivors

Version 1.0
20-12-2012

4. Supporting Information
4.1 Index
A

I

S

Abbreviations - 6

Inception - 5

Scope - 5

Acronyms – 6

Interface – 10, 11

Sequence Diagrams –29

Activity Diagrams – 20

Introduction - 4

SOA - 7

Administrator – 10, 15
AJAX - 6, 7
Architecture Design - 13

J
J2EE – 6, 7

Software – 10
Specific Requirements -9, 17

JSP - 6

T

M

Technologies - 7

Methodology - 4

Tools – 7

Minimum Requirements - 11

Transition - 5

O

U

Assumptions - 12

C
Constraints – 12
Construction - 5
Crypto Locker - 9

Operating System- 10, 12

D

Overview – 9

Database Design – 15

Overall Descriptions - 9

Database platform – 6

UML – 6, 7
Use Case Model - 14
Use Case Reports – 17

P

User - 14

DB2 - 6, 8

Product Perspective – 9

User Characteristics - 12

Definitions - 6

Product Functions – 10

W

Dependencies - 12

Public People - 14

WASCE – 6, 8

Development Tool - 8

Purpose - 5

WAS – 6, 8

E

R

WPS – 8

Eclipse – 8

RAD - 6

Web Server – 10

Elaboration - 5

Rational Rose - 7

X

ER Diagram - 16

RSA – 8

XML – 6, 7

H

Recommended - 11

Hardware - 11

References - 7

Development End - 10

HTTP - 6

Sole Survivors | Hindusthan College of Engineering and Technology

34

Contenu connexe

Similaire à Highly confidential security system - sole survivors - SRS

Toll application - .NET and Android - SRS
Toll application - .NET and Android - SRSToll application - .NET and Android - SRS
Toll application - .NET and Android - SRSArun prasath
 
Learning Management System-SRS Modified(Semi-Final)
Learning Management System-SRS Modified(Semi-Final)Learning Management System-SRS Modified(Semi-Final)
Learning Management System-SRS Modified(Semi-Final)Sharon Varghese
 
Software Engineering for Web Applications
Software Engineering for Web ApplicationsSoftware Engineering for Web Applications
Software Engineering for Web ApplicationsMoh'd Shakeb Baig
 
Framework adoption for java enterprise application development
Framework adoption for java enterprise application developmentFramework adoption for java enterprise application development
Framework adoption for java enterprise application developmentClarence Ho
 
Design Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureDesign Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureTiffany Graham
 
E learning resource Locator Project Report (J2EE)
E learning resource Locator Project Report (J2EE)E learning resource Locator Project Report (J2EE)
E learning resource Locator Project Report (J2EE)Chiranjeevi Adi
 
IBM-TGMC e-learning resource locator_project report
IBM-TGMC e-learning resource locator_project reportIBM-TGMC e-learning resource locator_project report
IBM-TGMC e-learning resource locator_project reportVeeru Kallapur
 
Final sds of academic a webpage based android application
Final sds of academic a webpage based android applicationFinal sds of academic a webpage based android application
Final sds of academic a webpage based android applicationpreeta sinha
 
Whats Next for JCA?
Whats Next for JCA?Whats Next for JCA?
Whats Next for JCA?Fred Rowe
 
Core java report
Core java reportCore java report
Core java reportSumit Jain
 
Laboratory Information Management System
Laboratory Information Management SystemLaboratory Information Management System
Laboratory Information Management SystemMike Taylor
 
Local Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMSLocal Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMSYogeshIJTSRD
 
Android For Java Developers
Android For Java DevelopersAndroid For Java Developers
Android For Java DevelopersMike Wolfson
 
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectiveNational%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectivekalimullahmohd89
 

Similaire à Highly confidential security system - sole survivors - SRS (20)

Toll application - .NET and Android - SRS
Toll application - .NET and Android - SRSToll application - .NET and Android - SRS
Toll application - .NET and Android - SRS
 
Application development framework
Application development frameworkApplication development framework
Application development framework
 
Learning Management System-SRS Modified(Semi-Final)
Learning Management System-SRS Modified(Semi-Final)Learning Management System-SRS Modified(Semi-Final)
Learning Management System-SRS Modified(Semi-Final)
 
Resume
ResumeResume
Resume
 
Software Engineering for Web Applications
Software Engineering for Web ApplicationsSoftware Engineering for Web Applications
Software Engineering for Web Applications
 
Framework adoption for java enterprise application development
Framework adoption for java enterprise application developmentFramework adoption for java enterprise application development
Framework adoption for java enterprise application development
 
Design Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureDesign Decisions For Understanding Software Architecture
Design Decisions For Understanding Software Architecture
 
E learning resource Locator Project Report (J2EE)
E learning resource Locator Project Report (J2EE)E learning resource Locator Project Report (J2EE)
E learning resource Locator Project Report (J2EE)
 
Suresh_out_Personal
Suresh_out_PersonalSuresh_out_Personal
Suresh_out_Personal
 
IBM-TGMC e-learning resource locator_project report
IBM-TGMC e-learning resource locator_project reportIBM-TGMC e-learning resource locator_project report
IBM-TGMC e-learning resource locator_project report
 
soa1.ppt
soa1.pptsoa1.ppt
soa1.ppt
 
Final sds of academic a webpage based android application
Final sds of academic a webpage based android applicationFinal sds of academic a webpage based android application
Final sds of academic a webpage based android application
 
Whats Next for JCA?
Whats Next for JCA?Whats Next for JCA?
Whats Next for JCA?
 
Core java report
Core java reportCore java report
Core java report
 
Laboratory Information Management System
Laboratory Information Management SystemLaboratory Information Management System
Laboratory Information Management System
 
JavaResume
JavaResumeJavaResume
JavaResume
 
Local Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMSLocal Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMS
 
Android For Java Developers
Android For Java DevelopersAndroid For Java Developers
Android For Java Developers
 
Ravindra Resume
Ravindra ResumeRavindra Resume
Ravindra Resume
 
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspectiveNational%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
 

Plus de Arun prasath

Managing Microservices traffic using Istio
Managing Microservices traffic using IstioManaging Microservices traffic using Istio
Managing Microservices traffic using IstioArun prasath
 
Elk with Openstack
Elk with OpenstackElk with Openstack
Elk with OpenstackArun prasath
 
Docker - Demo on PHP Application deployment
Docker - Demo on PHP Application deployment Docker - Demo on PHP Application deployment
Docker - Demo on PHP Application deployment Arun prasath
 
HP CloudSystem Matrix
HP CloudSystem MatrixHP CloudSystem Matrix
HP CloudSystem MatrixArun prasath
 
ARCHITECTING TENANT BASED QOS IN MULTI-TENANT CLOUD PLATFORMS
ARCHITECTING TENANT BASED QOS IN MULTI-TENANT CLOUD PLATFORMSARCHITECTING TENANT BASED QOS IN MULTI-TENANT CLOUD PLATFORMS
ARCHITECTING TENANT BASED QOS IN MULTI-TENANT CLOUD PLATFORMSArun prasath
 
Toll app - Android project
Toll app - Android projectToll app - Android project
Toll app - Android projectArun prasath
 

Plus de Arun prasath (8)

Managing Microservices traffic using Istio
Managing Microservices traffic using IstioManaging Microservices traffic using Istio
Managing Microservices traffic using Istio
 
Istio
Istio Istio
Istio
 
Elk with Openstack
Elk with OpenstackElk with Openstack
Elk with Openstack
 
Openstack Heat
Openstack HeatOpenstack Heat
Openstack Heat
 
Docker - Demo on PHP Application deployment
Docker - Demo on PHP Application deployment Docker - Demo on PHP Application deployment
Docker - Demo on PHP Application deployment
 
HP CloudSystem Matrix
HP CloudSystem MatrixHP CloudSystem Matrix
HP CloudSystem Matrix
 
ARCHITECTING TENANT BASED QOS IN MULTI-TENANT CLOUD PLATFORMS
ARCHITECTING TENANT BASED QOS IN MULTI-TENANT CLOUD PLATFORMSARCHITECTING TENANT BASED QOS IN MULTI-TENANT CLOUD PLATFORMS
ARCHITECTING TENANT BASED QOS IN MULTI-TENANT CLOUD PLATFORMS
 
Toll app - Android project
Toll app - Android projectToll app - Android project
Toll app - Android project
 

Dernier

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Dernier (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Highly confidential security system - sole survivors - SRS

  • 1. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 solesurvivors Highly Confidential Security System Software Requirements Specification Version 1.0 Mentor Mr.R.Jayaraj (Asst. Professor), Department of CSE Members Arun Prasath.S - 090105107008 Jojy George - 100405107005 Prabhu.E - 100405107013 Vivek Andrew Sha - 090105107121 College - Hindusthan College of Engineering and Technology, Coimbatore – 641032 Department - Computer Science and Engineering State - Tamil Nadu Sole Survivors | Hindusthan College of Engineering and Technology 1
  • 2. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 Revision History Date Version Description Author 20-12-2012 1.0 Initial Release Sole Survivors Sole Survivors | Hindusthan College of Engineering and Technology 2
  • 3. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 Table of Contents Description Page No 1. Introduction 4-9 1.1 Methodology ………………………………………………………………………… 4 1.2 Purpose ….. ………………………………………………………………………….. 5 1.3 Scope ……. ………………………………………………………………………….. 5 1.4 Definitions, Acronyms and Abbreviations … ……………………………………….. 6 1.5 References ……….…………………………………………………………………. 7 1.6 Technologies to be used ….…………………………………………………………. 7 1.7 Tools to be used …. …………………………………………………………………. 7 1.8 Overview …………………………………………………………………………….. 9 2. Overall Description 9 - 18 2.1 Product Perspective ……….………………………………………………………… 9 2.2 Product Functions……………………………………………………………………. 10 2.3 Software Interface …………………………………………………………………. 10 2.4 Hardware Interface …………………………………………………………………. 11 2.5 User Characteristics …………………………………………………………………. 12 2.6 Constraints ………………………………………………………………………….. 12 2.7 Assumptions and Dependencies……………………………………………………… 12 2.8 Architecture Design …………………………………………………………………. 13 2.9 Use Case Model Survey ……………………………………………………………... 14 2.10 Database Design………………………………………………………………….…. 15 2.11 ER diagram…………………………………………………………………………. 16 3. Specific Requirements 17 - 33 3.1 Use Case Reports ……………………………………………………………………. 17 3.2 Activity Diagrams …………………………………………………………………… 20 3.3 Sequence Diagrams …………………………………………………………………. 29 4. Supporting Information 34 4.1 Index…………………………………………………………………………………. 34 Sole Survivors | Hindusthan College of Engineering and Technology 3
  • 4. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 1. Introduction In day-to-day life it is quite hard to remember all confidential data like Mail Id, Password, bank account number, Insurance policy number, PAN number, Driving License number, education certificate Numbers, Some highly value scan copy, some confidential photo, music and videos. Crypto Locker is a highly secure web application to store all confidential data in single credential. 1.1 Methodology The Rational Unified Process brings together elements from all of the generic process models, supports iteration and illustrates good practice in specification and design. The RUP is normally described from three perspectives:  A dynamic perspective that shows the phases of the model over time  A static perspective that shows the process activities that are enacted  A practice perspective that suggests good practices to be used during the process Sole Survivors | Hindusthan College of Engineering and Technology 4
  • 5. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 Inception The goal of the inception phase is to establish a business case for the system. Identifying all external entities that will interact with the system and defining these interactions. This information is used to assess the contribution of system to business. Elaboration The goals of the elaboration phase are to develop an understanding of the problem domain, establish an architectural framework, develop project plan and identify key project risks. Construction This phase is concerned with system design, programming and testing. Parts of the system are developed in parallel and integrated during this phase. Transition This is the final phase of RUP and is concerned with moving the system from the development community to the user community and making it work in real environment. 1.2 Purpose Crypto Locker is a web application developed for secure and easy access of data. Crypto Locker is a useful and convenient application that spares you the trouble of remembering the passwords and securing the files. This application helps people to store their passwords and various types of files like photos, music and videos in a secure and efficient manner. The application which we develop here uses state of the art encryption technology to secure files and access over anywhere in the world using the internet. 1.3 Scope  There are two basic users – Administrator, User.  All users have their own profile in Crypto Locker.  Administrator has an ability to manage the registered user profiles and organize the files stored in the server.  Administrator has the ability to provide the notification message to the logged users via webpage.  Public peoples are the users used this web application to protect their important details in single credentials.  Citizens (users) can access their files through internet from anywhere in the world. Sole Survivors | Hindusthan College of Engineering and Technology 5
  • 6. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 1.4 Definitions, Acronyms and Abbreviations AJAX - Asynchronous JavaScript and XML is about updating parts of a web page, without reloading the whole page. Database platform (DB2) - DB2 Database is the database management system that delivers a flexible and cost effective database platform to build robust on demand business applications and supports the J2EE and web services standards. WASCE - Websphere Application Server Community Edition is an application server that runs and supports J2EE and web service applications. UML - Unified Modeling Language is a standard language for writing software blueprints. The UML may be used to visualize, specify, construct and document XML - eXtensible Markup Language is a text based format that let developers describe, deliver and exchange structured data between a range of applications to client for display and manipulation. JSP - Java Server Pages is used to create dynamic web content. J2EE - Java 2 Enterprise Edition is a programming platform which is a part of java platform for developing and running distributed java. HTTP - Hypertext Transfer Protocol is a transaction oriented client/server protocol between web browser and a Web Server. HTTPS - Secure Hypertext Transfer Protocol is a HTTP over SSL (secure socket layer). RAD - Rational Application Developer is a development tool that helps to design web pages and also helps to design the diagrams like ER, Database schema diagrams and to generate DDL. WAS (Websphere Application Server) - It is an application server that runs business applications and supports the J2EE and web services standards. Sole Survivors | Hindusthan College of Engineering and Technology 6
  • 7. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 SOA: Service-Oriented Architecture is a set of principles and methodologies for designing and developing software in the form of interoperable services. 1.5 References  IBM TGMC Sample Synopsis.  Software Engineering Theory and Practice (2nd Edition) - Shari Lawrence Pfleeger  Database Management Systems - Navathe.  Object Oriented Modeling and Design with UML (2nd Edition) - Michael Blaha, James Rambaugh.  Java Complete Reference (7th Edition) – Herbert Schildt.  Cryptography and Network Security – William Stallings 1.6 Technologies to be used  J2EE : Programming Platform for developing and running distributed Java  AJAX : Updating parts of a web page, without reloading the whole page.  SOA : Set of principles and methodologies for designing and developing software in the form of interoperable services.   UML : Standard for writing software blueprints, and used to visualize, specify, construct and document. XML : XML is a text based format that let developers describe, deliver and exchange structured data between a range of applications to client for display and manipulation.  Jasper: Jasper Reports is an open source Java reporting tool that can write to a variety of targets, such as: screen, a printer, into PDF, HTML, Microsoft Excel, RTF, ODT, Commaseparated values or XML files. 1.7 Tools to be used Rational Rose Rational Rose is an object-oriented programming (OOP) and unified modeling language (UML) tool to design enterprise-level software applications and components. It creates visual software application models under object-oriented principles. Example application models include the creation of actors, use cases, relationships, entities, etc. It uses classical UML concepts to graphically model software applications. This facilitates documenting the environment, requirements and overall design. Sole Survivors | Hindusthan College of Engineering and Technology 7
  • 8. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 Eclipse Eclipse is a multi-language software development environment comprising an integrated development environment (IDE) and an extensible plug-in system. WPS WPS stands for Wi-Fi Protected Setup and was designed to simplify the process of configuring security on wireless networks. Rational Software Architect (RSA) IBM Rational Software Architect, (RSA) made by IBM's Rational Software division, is a comprehensive modeling and development environment that uses the Unified Modeling Language (UML) for designing architecture for C++ and Java 2 Enterprise Edition (J2EE) applications and web services. Development tool – RAD IBM Rational Application Developer for Web Sphere Software (RAD) is an integrated development environment (IDE), made by IBM's Rational Software division, for visually designing, constructing, testing, and deploying Web services, portals, and Java (J2EE) applications. Websphere Application Server (WAS) IBM Websphere Application Server (WAS), a software application server, is the flagship product within IBM's Websphere brand. WAS is built using open standards such as Java EE, XML, and Web Services. Web server – WASCE Websphere Application Server Community Edition (from now on WASCE) is a free, certified Java EE 5 server for building and managing Java applications. It is IBM's supported distribution of Apache Geronimo that uses Tomcat for servlet container and Axis 2 for web services. Over 15 WASCE developers are committers in the Apache Geronimo project. DB2 (Database 2) DB2 is a family of relational database products provides an open database environment that runs on a wide variety of computing platforms. A DB2 database can grow from a small single-user application to a large multi-user system. Sole Survivors | Hindusthan College of Engineering and Technology 8
  • 9. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 1.8 Overview The SRS will include two sections, namely: Overall Description This section will describe major components of the system, interconnections, and external interfaces. Specific Requirements This section will describe the functions of actors, their roles in the system and the constraints faced by the system. 2. Overall Descriptions 2.1 Product Perspective The Crypto Locker is available for use by the administrator and the user. The administrator and users will use the webpage as a front end. The browser goes through an http server. Application server manages the connection between the front end and backend, all types of information and data, that are necessary for the users are stored in DB2. Sole Survivors | Hindusthan College of Engineering and Technology 9
  • 10. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 2.2 Product Functions  The Crypto Locker service provides the user interface (UI) to user and administrator for creating their profiles.  This product has the ability to send the “Account verification link” to the user’s mail, while creating their account.  This product has the ability to send “Password Reset link” to the user’s mail, if the user forgets the password for accessing the account.  This product is able to detect the user’s browsers.  This product provides the users to create the locker facilities for Bank account information, Music, Video and Image files.  This product allows the registered users to store their important details on a server in an encrypted format and while downloading, it is automatically decrypted.  This product provides the facility for administrators to generate the reports on user’s logs in .PDF and Microsoft Excel formats.  It ask the account’s current password from the user when they want their personal credentials from our server as a report (PDF and Excel). 2.3 Software Interface (All users require internet for communication) Public People (users) Web browser (any), operating system (any) Administrator Web browser (any), operating system (Windows) Web Server WASCE, Operating System (Windows) Data Base Server DB2, operating system (Windows) Development End RAD (J2EE, java, java bean, Servlet, HTML, XML, AJAX) operating system (Windows), Web Sphere (Web Server) Sole Survivors | Hindusthan College of Engineering and Technology 10
  • 11. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 2.4 Hardware Interface 2.4.1 Minimum Requirements Crypto Locker (Server) Processor Storage Space RAM Disk Space Intel Pentium IV – 4 GB RAM 5 TB 1 GB RAM 1 GB AMD Athlon (1.8 GHz) DB2 9.72 Users (Public People) Browser Processor RAM Internet Explorer 7, Firefox 13 with Intel Pentium IV – AMD 1 GB RAM Flash Plug-ins Athlon (1.8 GHz) 2.4.2 Recommended Requirements Crypto Locker (Server) Processor Storage Space RAM Disk Space Intel Core Family (Any) 8 GB RAM 10 TB 2 GB RAM 2 GB – AMD Phenom DB2 9.72 (2.2 GHz) Users (Public People) Browser RAM Intel Core Family (Any) – Latest Versions of Browsers (any) Processor 2 GB RAM AMD Phenom (2.2 GHz) Sole Survivors | Hindusthan College of Engineering and Technology 11
  • 12. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 2.5 User Characteristics  Both users and administrator on internet will be using HTTP protocol.  Users use the FTP protocol for uploading and downloading the files from or to the server.  Administrator configures the SMTP Server for sending the mail to the user. 2.6 Constraints  GUI is only in English.  Login and password is used for the identification of the user (public people) and administrator.  Limited to HTTP, SMTP and FTP protocol.  Centralized server is used. 2.7 Assumptions and Dependencies Crypto Locker is a platform independent web application. It is assumed that the client or user computer has latest browser with JavaScript enabled. In addition, Firefox and Internet Explorer need the flash plug-ins to play the media files. For configuring the SMTP Server it needs the Linux operating system with at least kernel version 2.6.30, if server is in windows then it may need Windows Server. Sending the message (SMS) to the users mainly depends on the network operator. Sole Survivors | Hindusthan College of Engineering and Technology 12
  • 13. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 2.8 Architecture Design Sole Survivors | Hindusthan College of Engineering and Technology 13
  • 14. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 2.9 Use Case Model Survey 2.9 Use Case Model Survey Users (Public People) Users can upload their files in their own personal locker. The locker includes various subsets like Music locker, Image locker, Video locker, Password locker and Bank Account Information locker. Users can access their personal (uploaded) files through internet. Users can participate in forum discussions to clarify their doubts and also able to view the notifications sent from the administrator. Sole Survivors | Hindusthan College of Engineering and Technology 14
  • 15. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 Administrator Administrator has the ability to manage the registered user’s profile. Administrator can send the notification to the logged user about any changes in the service and also clarify the user’s doubts and questions about the service. System While users are trying to create their account, Crypto System validates the user’s details and post the message (success or failure) to them. Server has the ability to send the “Password reset link” to the user’s mail, if the user forgets the password to access their account. It automatically blocks the abuse users. When users are uploading the file, the system encrypts it by using the algorithm, when the users are downloading their file, the system decrypts it. 2.10 Database Design Sole Survivors | Hindusthan College of Engineering and Technology 15
  • 16. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 2.11 ER Diagram Sole Survivors | Hindusthan College of Engineering and Technology 16
  • 17. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3. Specific Requirements 3.1 Use Case Reports 3.1.1 Administrator 3.1.1 Use Case Report for Administrator USECASE Register Username Verification Sign In Validate Password Profiles Update Profile Manage user Profiles Push Notification Generate Reports Manage FAQ Sign out DESCRIPTION The administrator create their account for managing the service It checks the provided name with already existing name during registration The admin can sign in into account and manage the service The server validates the password and lets the admin use the service The admin can view their own profile The admin can update their own profile in case of any changes The admin can manage the field registered user’s profile The admin can push/send the notification in case of any changes The admin can able to generate the reports about the service The admin may clarify the doubts from clients Logged out from the server Sole Survivors | Hindusthan College of Engineering and Technology 17
  • 18. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.1.2 Public People 3.1.2 Use Case Report for Public People (Users) USECASE Register Username Verification Sign In Validate Password Profiles Update Profile FAQ View Notifications Download File Generate Reports Upload File Encryption/Decryption Lockers Sign out DESCRIPTION Citizens can create their account for using the service It checks the provided name with already existing name during registration The user can sign in into account and use the service The server validates the password and lets the user use the service The user can view his profile The user can update his current status about the case The user can able to post and reply their answers in the forum like page The user receive the notification message from the administrator The user can download their personal data using the secret key The user can generate report from remote location. The user can upload their personal data into the server All data can be securely transmitted and received using Encryption algorithm It includes image, video, music, password and bank account details Logged out from the service Sole Survivors | Hindusthan College of Engineering and Technology 18
  • 19. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.1.3 Crypto System 3.1.3 Use Case Report for Crypto System USECASE Encryption Decryption Block abuse user Validate Registration Send Mail Send Password Token DESCRIPTION The system encrypts the files from the user’s disk when he/she want to upload The system decrypts the files from the server when the user want to download Sever automatically blocks the lazy and abuse users based on the rules Server Validates the user details and registers it into the database Server sends the verification link to the user for the confirmation Server sends the password token in case the user forgets the password Sole Survivors | Hindusthan College of Engineering and Technology 19
  • 20. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.2 Activity Diagrams 3.2.1 User Registration The user is made to fill all the mandatory fields, each user must choose a unique user name. If the user has filled a name that is already present in the database, then the user will be prompted to fill in a different username. After this the user must enter the new password twice. When the user clicks the submit button the database verifies all the mandatory fields are filled or not. When all the fields are filled the verification mail is automatically send to user’s mail, after click the verification link the user is registered, otherwise the user is made to fill the fields again. 3.2.1 User Registration Activity Sole Survivors | Hindusthan College of Engineering and Technology 20
  • 21. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.2.2 Validate Registration The user enters the registration details. The system validates the details and if the details are found invalid the system rejects it else the system sends the verification mail to the user. The user needs to follow the verification link to complete his registration. 3.2.2 Validate Registration Sole Survivors | Hindusthan College of Engineering and Technology 21
  • 22. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.2.3 Login Activity The user enters the login credentials. The System validates the login credentials. If the login credentials are valid then the system detects the type of user. If user is a member then the system redirects to the member’s home page. If the user is administrator then the system redirects to the administrator’s home page. 3.2.3 Login Activity Sole Survivors | Hindusthan College of Engineering and Technology 22
  • 23. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.2.4 Password Reset If the user forgets his password then he should click on the Forget password link. Then the system prompts him to enter his Mail ID. The system validates the Mail ID. If the Mail ID is valid then the system sends the password reset mail to that Mail ID. If the Mail ID is invalid then the system displays the error message. 3.2.4 Password Reset Activity Sole Survivors | Hindusthan College of Engineering and Technology 23
  • 24. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.2.5 Public People The public people (user) can login to the website using a supplied username and password. After logging in the user can perform several tasks such as generate reports, access lockers, participate in FAQ center, edit profiles and view the notifications sent from the administrator. 3.2.5 Public People (users) on Web Sole Survivors | Hindusthan College of Engineering and Technology 24
  • 25. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.2.6 FAQ Page The administrator and the user participate in the FAQ (Discussion forum) for clarifying their doubts. Both admin and citizen can view the posts and may reply to the post, or may be post the questions from the remote location. 3.2.6 FAQ Sole Survivors | Hindusthan College of Engineering and Technology 25
  • 26. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.2.7 Access Lockers A crypto Locker service is provided for the users, who need to store their confidential details in a single password. To access the lockers first he/she need to enter their Crypto Locker credential to login. After that he has the ability to open locker and manage that by uploading and downloading the files. He is also able to generate the reports about their activity for a certain period in a .PDF format documented file. 3.2.7 User Access the Lockers Sole Survivors | Hindusthan College of Engineering and Technology 26
  • 27. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.2.8 Administrator The administrator login into their account’s home page and manage the overall activity of the application like user management, own profile management, frequently asked Questions i.e., Discussion forum management, notifications management and finally generate the reports. 3.2.8 Administrator on Web Sole Survivors | Hindusthan College of Engineering and Technology 27
  • 28. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.2.9 Crypto System The web application has the automatic controls itself. While registration the server system validate the user details, if there is any issues then it automatically denies the registration process, and during the upload, download process encryption and decryption process starts with the help of key provided by the user. Also it blocks the abuse user to prevent the server from any misbehavior activities. 3.2.9 Server system’s Activity Sole Survivors | Hindusthan College of Engineering and Technology 28
  • 29. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.3 Sequence Diagrams 3.3.1 User Registration Sole Survivors | Hindusthan College of Engineering and Technology 29
  • 30. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.3.2 Login Sequence Sole Survivors | Hindusthan College of Engineering and Technology 30
  • 31. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.3.3 Password Reset Sole Survivors | Hindusthan College of Engineering and Technology 31
  • 32. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.3.4 Upload Files Sole Survivors | Hindusthan College of Engineering and Technology 32
  • 33. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 3.3.5 Download Files Sole Survivors | Hindusthan College of Engineering and Technology 33
  • 34. Highly Confidential Security System Software Requirements Specification Sole Survivors Version 1.0 20-12-2012 4. Supporting Information 4.1 Index A I S Abbreviations - 6 Inception - 5 Scope - 5 Acronyms – 6 Interface – 10, 11 Sequence Diagrams –29 Activity Diagrams – 20 Introduction - 4 SOA - 7 Administrator – 10, 15 AJAX - 6, 7 Architecture Design - 13 J J2EE – 6, 7 Software – 10 Specific Requirements -9, 17 JSP - 6 T M Technologies - 7 Methodology - 4 Tools – 7 Minimum Requirements - 11 Transition - 5 O U Assumptions - 12 C Constraints – 12 Construction - 5 Crypto Locker - 9 Operating System- 10, 12 D Overview – 9 Database Design – 15 Overall Descriptions - 9 Database platform – 6 UML – 6, 7 Use Case Model - 14 Use Case Reports – 17 P User - 14 DB2 - 6, 8 Product Perspective – 9 User Characteristics - 12 Definitions - 6 Product Functions – 10 W Dependencies - 12 Public People - 14 WASCE – 6, 8 Development Tool - 8 Purpose - 5 WAS – 6, 8 E R WPS – 8 Eclipse – 8 RAD - 6 Web Server – 10 Elaboration - 5 Rational Rose - 7 X ER Diagram - 16 RSA – 8 XML – 6, 7 H Recommended - 11 Hardware - 11 References - 7 Development End - 10 HTTP - 6 Sole Survivors | Hindusthan College of Engineering and Technology 34