Securing Identification Card Aganist Unauthorised Access
A. Yaswanth Sai Raj1, J. Rene Beulah2
1A. Yaswanth Sai Raj, UG Student, Department of Computer Science and Engineering, Saveetha School of Engineering, Chennai (Tamil Nadu), India.
2J. Rene Beulah, Assistant Professor, Department of Computer Science and Engineering, Saveetha School of Engineering, Chennai (Tamil Nadu), India.
Manuscript received on 29 May 2019 | Revised Manuscript received on 11 June 2019 | Manuscript Published on 22 June 2019 | PP: 550-553 | Volume-8 Issue-3S, February 2019 | Retrieval Number: C11180283S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Identification (ID) cards palys a major role in the day to day life of students and employees. It is used not only for identification purpose, but also used as mobile wallets for payment purposes. The ID cards are linked to accounts and users can purchase or make payments by QR code payment system. This gives more convenience to the users as they need not carry cash money everywhere. With this mobile walletsystem, it is easy to transfer money or pay bills, fees etc. A common problem faced in such systems is the risk involved in losing ID card. Anyone who gets access to the lost card can use it illegitimately to pay his own bills. To avoid such problems, a secure authentication system is proposed in this work to identify the legitimate user. In the proposed system, the mobile number of the authorized user is linked to his/her ID card. Whenever the ID card is used for making some payments, an One Time Password (OTP) will be sent to the authorized user’s mobile phone. The user has to enter the OTP and the transaction will be completed only on successful verification of the OTP. If an illegitimate user tries to use the ID card, the card will get blocked. This ensures that the card will not get misused.
Keywords: Android Security, Permission Use Analysis, Vetting Undesirable Behaviours, Android Behaviour Representation.
Scope of the Article: Broadband Access Technologies