Professional Documents
Culture Documents
Online Banking is one of the most important financial activities which will
be carried out by any person who holds a bank account. There are various
activities that can be carried out once you log in to your bank account. Once a
user logs in he or she can check the bank balance, check bank account
transaction history or account summary, add beneficiary accounts, transfer funds
to another account, download account summary. Whenever we deal with a
banking system main concern should be the security related to banking
transactions and account login activity.
The main objective of our project is to provide more security while
performing online transaction by providing efficient authentication etc. In the
existing system, we can perform all the operations using a single user id and
password. Once this password is stolen, it is easy for the others to access all the
operations like transfer of money etc., so that the customer could pay a huge
loss. Thus it is not secured up to mark. In our project, we provide much security
to the customer while using the online banking service in the following ways. The
customer using the online banking service would be given user id along with two
other passwords. One called Login Password and the other called transaction
password. By using login password the customer can login to be account and we
can perform only some (limited) operations like viewing A/C balance and personal
details etc. But to perform transfer or online transaction, the user needs to
provide the transaction password and other secure information in order to
complete the transaction successful.
If the customer login password and id is stolen by someone else, he can
see the details but he can’t perform online transaction or transfer. Apart from the
transaction password the customer needs to get verified by providing the grid
values present on is debit card which would be asked randomly. So there is no
chance for the person whose steals the password details to make transaction
because he also needs to enter the values which are present on the customer’s
debit card.
3) Project Category
Networking & RDBMS
4) Environment:
i. Tools/Platform:
Platform: Microsoft Visual Studio 2008
Microsoft Visual Studio 2008 developed by Microsoft is a
Integrated development Environment based on .Net Framework. It is IDE
providing various tools and types to create various kind of project like
windows app, Web app and Mobile app etc. Following are the features of
the Microsoft Visual Studio 2008.
a) Graphical User Interface: The IDE provides a point and click
interface to develop the project which helps user to easily locate
and use the tools of IDE.
b) Integration: The IDE supports various languages like c++, C#,
Visual Basic etc.
c) Memory Management: The IDE provides garbage collection to
clean the unreferenced memory held by a program.
d) CLR: CLR stands for Common Language Runtime which is the
heart of the dot Net Framework.
5) Problem Analysis:
The customer using the online banking service would be given user
id along with two other passwords. One called Login Password and
the other called transaction password.
By using login password the customer can login to be account and
we can perfume only some (limited) operations like saving A/C
balance and personal details etc.
But to perform transfer or online transaction, he needs to provide
the transaction password.
If the customer login password and id is stolen by someone else, he
can see the details but he can’s perfume online transaction or
transfer. Apart from the transaction password the customer needs to
get verified by providing the grid values present on is debit card
which would be asked randomly
So there is no chance for the person whose steals the password
details to make transaction because he also needs to enter the
values which are present on the customer’s debit card
PERT : PERT Stands for Program (or Project) Evaluation and Review
Technique, is
a statistical tool used in Project Management that is designed to
analyze
and represent the tasks involved in completing a given project.
Following steps can be followed to create PERT chart:
Feasibility Analysis
Analysis
20/01/12 to 24/01/2012
20/01/12 to 25/01/2012
Negotiation
26/01/12 to 28/01/2012
Design
30/01/12 to 06/02/2012
Development
07/02/12 to 06/02/2012
Coding
07/01/12 to 23/02/2012
Testing
07/01/12 to 05/03/2012
Finish
Date:
PERT CHART
6) Software Requirements Analysis
Software requirement specification provides the essential detail of the
system needs to be developed. In this phase of Software development Life cycle
the functions of the proposed system are identified and the Software
Requirement Specification document is prepared which will guide the developer
to go ahead and develop the system.
Following are the requirements identified for the System:
7) Design:
Entity:
Entity is the thing which we want to store information. It is an elementary basic
building block of storing information about business process. An entity represents an object
defined within the information system about which you want to store information. Entities
are distinct things in the enterprise.
Relationships:
A relationship is a named collection or association between entities or used to relate
two or more entities with some common attributes or meaningful interaction between the
objects.
Attributes:
Attributes are the properties of the entities and relationship, Descriptor of the entity.
Attributes are elementary pieces of information attached to an entity.
ER Diagram Notation
Super Entity
Regular Entity
Attributes
Weak Entity
Connectors
Relationshi
p
vBranch_Name
Branch
vBranch_Address
cBranch_Contact nBranch_Pin
Linked
To
Account_Master
AdminLogin
dtDOC
cUser_ID
vPassword
vName
ER Diagram
nFrom
dtDOT ID vL_Name
cGender
nTo Transaction mAmount
vIFSC vAddress
Account Master
Does mMin_Ba
l
vNominee iAge
dtDOB
Has
mBal
vRelationship dtDOR
vEmail vContact
cGrp
Security_Question
Login_Master
cAcc_Number
tPassword lPassword
Security_Answer
ER Diagram
7.2 Database Design: Database design is defined as the table structures of the
database. Following are the tables used for Rotary Website:
Table : adminlogin
Field Name Type Length Constraint Reference Table
cUser_ID Char 5 Primary Key -
vPassword Varchar 15 Not Null -
vName Varchar 50 Not Null -
dtDOC Datetime 8 Not NULL -
Table : branch
Field Name Data Type Length Constraint Reference Table
cCode char 10 Primary Key -
vBranch_Name varchar 50 Not Null -
vBranch_Address varchar 200 Not Null -
nBranch_Pin char 6 Not Null -
cBranch_Contact char 12 Not Null -
Table : Account_Master
Field Name Data Type Length Constraint Reference Table
nAcc_Number nvarchar 13 Primary Key -
vF_Name varchar 50 Not NULL -
vL_Name varchar 50 Not NULL -
vFather_Name Varchar 50 Not NULL -
dtDOB datetime 8 Not NULL -
cGender Char 10 Not NULL -
vAdddress varchar 200 Not NULL -
vContact varchar 12 Not NULL -
iAge Int 8 Not NULL -
vNominee varchar 50 - -
vRelationship varchar 30 - -
mBal money - Default = 0 -
vEmail varchar 50 - -
mMin_Bal money - Default = 0 -
cCode char 10 Not NULL -
Description: This table stores the account holder details.
Table: Login_Master
Field Name Data Type Length Constraints Reference Table
nAcc_Number nvarchar 13 Primary Key/ Account_Master
Foreign Key
User_Name nvarchar 50 Not NULL -
lPassword nvarchar 50 Not NULL -
tPassword nvarchar 50 Not NULL -
Login_Stamp datetime 8 Null -
Security_Question nvarchar 100 Not NULL -
Security_Answer nvarchar 100 Not NULL -
dtDOR datetime 8 Not NULL -
Description: This table stores the information of the account holder login credentials.
Table: Transaction
Field Name Data Type Length Constraint Reference Table
ID Int 8 Primary Key -
vRemark Varchar 200 - -
dtDOT datetime 8 Not NULL -
nFrom nvarchar 13 Foreign Key Account_Master
nTo nvarchar 13 Not NULL -
vIFSC Varchar 13 Not NULL -
mAmount Money - Not NULL -
Description: This table is used for storing the various transactions done by the account
holder.
7.3 Data Dictionary: Data dictionary is a detailed description of the words (i.e.
column name etc) used in the tables.
Function/Process
External Entity
Input/output
Flow
Context Level
On the context diagram (also known as the Level 0 DFD) the system's
interactions with the outside world are modeled purely in terms of data flows across
the system boundary. This context diagram shows the entire Rotary Club Web Site as
a single process.
Branch Details
Admin/ User
Admin/ Account
Holder
Online Banking
System
Login
Transaction
Account Master
This context-level data flow diagram shows the interaction between the system and
external agents which act as data sources and data sinks.
Level 1 (High Level Diagram)-
A level 1 data flow diagram shows the system’s primary processes, data stores, sources, and
destinations linked by data flows. Generally, a system’s primary processes are independent,
and thus, separated from each other by intermediate data stores that suggest the data are held
in some way between processes.
The purpose of this level is to show the major high-level processes of Rotary Club
Website and their interrelation. A level-1 diagram must be balanced with its parent
context level diagram, i.e. there must be the same external entities and the same data
flows, these can be broken down to more detail in the level 1, e.g. User Interaction
with “Rotary Club Website" data flow could be split into "Different Pages" that user
might access.
Account
Holder/Admin
Home Page
1
D1
Data Strore
Login Page
Account
Transaction Holder
Report Page Admin
Page
Transaction
Add/Edit
Add/Edit Add/Edit
Transaction Branch Account
Details Holder
D1
Data Strore
D2
Data Strore
D3 D3
Data Strore Data Strore
Level 1 Data Flow Diagram(DFD)
8.1) Modules: There are following modules in the proposed system which needs
to be modeled:
o Home: This will be the default page when user requests the url.
o Admin: This will have all the functionalities related to admin.
o Account Holder: This will have all the functionalities related to an
account holder.
o Registration: This will let admin or user to open an account.
o Fund Transfer: This will be used to send or view fund transfer details.
8.2) Process Flow: Process flow of each module of the system is as follows:
o Navigation: This is the simple process in which the user clicks on the
provided link the respective page will be opened. Some pages are static.
For example the about us, foundation and contact us pages. Some pages
are dynamic which needs load to data from the server.
o Modification & Updation : The options for modification of any page is
available only after a valid login. Whenever a user tries to access these
pages, the login page will be displayed if the user is not logged in. After
login in, the administrator or registered account holder can change the
required information by selecting various privileged option.
o Security: The website will be having a sql based authentication in order
to prevent it from unauthorized access for modification to the website.
8.3) Implementation Methodology: As it is a website portal it will be
implemented on the Web Server. The website can be implemented by
using its web Setup file or by uploading the required files to the
destination server.
9) Network architecture: For development a LAN setup is needed for
checking the website from different nodes. We can setup LAN comprising of
two and three nodes in a room for testing purpose.
For accessing the website the user need to have internet connection. No other
network architecture is needed.
11.1Websites
Following websites are referring to create this project reports.
http://www.google.com
http://www.microsoft.com
http://www.programmer2programmer.net
http://www.codeproject.com
http://www.asp.net
http://www.asp123.com
http://www.wikipedia.org
11.2 Books
Following books and ebook are used to complete this project
reports.
Mastering VB (Paperback)
SQL Server Bible (Paperback)
.NET Black Book (Paperback)
Professional ASP.NET (Paperback)
MCAD/MCSD Self-Paced Training Kit: Developing Web
Applications with Microsoft® Visual Basic® .NET and Microsoft
Visual C#® .NET, Second Edition
ASP.Net Book from NIIT