QR Code Of E-Aadhaar
What is UIDAI Secure QR Code? How QR Code enhance the security of e-Aadhaar?
UIDAI e-Aadhaar letter contains a QR code. UIDAI has replaced existing QR code, on e-Aadhaar, having Resident’s demographic details with a secured QR Code which contains demographics along with photograph of the Aadhaar holder. There will be two QR Codes – Small one on front side of cutaway portion with demographic data only; and a large one on top portion of front side and rear side of cutaway portion, with demographic data and photo. Further, to make this Information more secured and tamper-proof, it will be signed with UIDAI digital signature. This new digitally signed QR code can be read ONLY using UIDAI’s windows based Custom client for desktops/laptops and validate it against UIDAI digital signatures in real time. Therefore, any fraud attempted on e-Aadhaar can be easily detected by using QR Code scanner.
What information does new Secure QR Code of e-Aadhaar contain?
Both QR codes of e-Aadhaar contain demographic details of resident like Name, Address, Date of Birth, Gender and Masked Aadhaar Number. In addition, the larger QR code contains photograph also.
How can someone read new secure QR code available on e-Aadhaar?
The new digitally signed QR code can be read ONLY using UIDAI’s windows based application and validate it against UIDAI digital signatures. Application can be downloaded from uidai.gov.in. Moreover, a good quality QR scanner will be required.
Presently, following models commercially available in market have been tested to read UIDAI QR Code: Zebra (DS-2200), Syga Barcode Scanner (S005), TVS barcode scanner and Honeywell (Xenon-1900).
Important: It is recommended to print e-Aadhaar having this secure QR code using LaserJet printer only.
How QR Scanner and UIDAI Application will work?
Post installation of UIDAI’s QR code reader application, secure QR code of e-Aadhaar need to be scanned using the physical scanner in line with UIDAI Specifications. The application will display the demographic details of resident once the QR Code of e-Aadhaar is digitally verified by UIDAI at backend and give scan QR Code verified. In case the digital signature is not verified the reader displays QR Code not verified GUI Screen.
Who all can use secure QR code of e-Aadhaar?
Anyone, whether a Aadhaar Holder or an User/Service Agencies like Banks, AUAs, KUAs etc can use this facility for offline verification of the data in e-Aadhaar.
Note:- On 20th February 2018 new QR Code was implemented on e-Aadhaar and the QR Code reader client is available on uidai.gov.in from 27th March 2018.
How can someone read new secure QR code available on e-Aadhaar?
The new digitally signed QR code can be read ONLY using UIDAI’s windows based application and validate it against UIDAI digital signatures. Application can be downloaded from uidai.gov.in. Moreover, a good quality QR scanner will be required.
What is Hashing?
Hashing is an algorithm that calculates a fixed-size bit string value from a file. A file basically contains blocks of data. Hashing transforms this data into a far shorter fixed-length value or key which represents the original string. The hash value can be considered the distilled summary of everything within that file.
A good hashing algorithm would exhibit a property called the avalanche effect, where the resulting hash output would change significantly or entirely even when a single bit or byte of data within a file is changed. A hash function that does not do this is considered to have poor randomization, which would be easy to break by hackers.
A hash is usually a hexadecimal string of several characters. Hashing is also a unidirectional process so you can never work backwards to get back the original data.
A hash is usually a hexadecimal string of several characters. Hashing is also a unidirectional process so you can never work backwards to get back the original data.
What are the benefits of Hashing?
One main use of hashing is to compare two files for equality. Without opening two document files to compare them word-for-word, the calculated hash values of these files will allow the owner to know immediately if they are different.
Hashing is also used to verify the integrity of a file after it has been transferred from one place to another, typically in a file backup program like SyncBack. To ensure the transferred file is not corrupted, a user can compare the hash value of both files. If they are the same, then the transferred file is an identical copy.
In some situations, an encrypted file may be designed to never change the file size nor the last modification date and time (for example, virtual drive container files). In such cases, it would be impossible to tell at a glance if two similar files are different or not, but the hash values would easily tell these files apart if they are different.
कोई टिप्पणी नहीं:
एक टिप्पणी भेजें