AUTOMATED POLICE IDENTITY CARD ALLOCATION SYSTEM A CASE STUDY OF NIGERIAN POLICE FORCE, IKOT EKPENE

0
374

ABSTRACT

This research work focused on the development of Automated Police Identity Card Allocation System using Nigerian Police Force, Ikot Ekpene as a case study. The research work was necessary because of the problems in the existing system which includes: identity theft problem as most people front as police officers, commonly known as impersonation, it is time consuming to manually verify identity information of holders, if the Police identity card is missing there is no other easy way to proof identity than manual process, duplication of Police identity card allocation numbers due to manual processing. In view of these problems, the objectives of the study is therefore to design a system to maintain digital identity information of Police officers, to design a system that can generate and allocate identity numbers to each Police officer during registration in such a way that there are no conflicts or duplicate identity numbers. The study is significant in the following ways: the system would benefit the administration of the police force as it will provide a database of all registered police officers for the identification card, it will help in reducing the risk of impersonation or identity theft, the system will benefit other agencies that are curious about the identity of any Police Officer. The software development methodology used is Object Oriented Analysis and Design Methodology (OOADM). The programming language used is PHP (pHp Hypertext Pre-processor) and the database used is MySql.

TABLE OF CONTENTS

Title Page             –        –        –        –        –        –        –        –        i 

Certification         –        –        –        –        –        –        –        –        –        ii

Approval    –        –        –        –        –        –        –        –        –        iii

Dedication            –        –        –        –        –        –        –        –        iv

Acknowledgment –        –        –        –        –        –        –        –        v

Abstract               –        –        –        –        –        –        –        –        vi

Table of Contents –        –        –        –        –        –        –        –    vii-ix

List of Tables       –        –        –        –        –        –        –        –        x

List of Figures      –        –        –        –        –        –        –        –        xi

CHAPTER ONE: INTRODUCTION

1.0     Introduction         –        –        –        –        –        –        –        1-2

1.1     Background of the Study        –        –        –        –        –        –        2-3

1.2     Statement of Problem              –        –        –        –        –        3-4

1.3     Aim and Objectives of the Study                –        –        –        4

1.4     Significance of the Study         –        –        –        –        –        –        4-5

1.5     Scope of the Study        –        –        –        –        –        –        –        5

1.6     Organization of the Research  –        —       –        –        –        5-6

1.7     Definition of Terms       –        –        –        –        –        –        6

CHAPTER TWO: LITERATURE REVIEW

2.0    Introduction          –        –        –                  –        –        –        –        7

2.1Theoretical Background     –        –        –        –        –        –        7-8

2.2 Overview of the Nigerian Police Force          –           –           –           –           9

2.3 Concept of National Identity Number (NIN) –           –           –           9-11   

2.4 The General Multi-Purpose Smart Card (GMPC)    –        –        11-12

2.4.1 A Unique Identification Scheme (Signifier) for    

Every Individual  –        –        –        –        –        –        –        12-13

2.5 Concept of Digital Identity –       –        –        –        –        –        13-14

2.5.1 Elements of Digital identity     –        –        –        –        –        14

2.5.2 Categorisation of Digital Identity      –        –        –        –        14-15

2.6 Potential Benefits and Pitfalls of a Digital Identity Framework  15-17

2.7 Digital Identity Platform as a Unique Identifier       –        –        –        17-18

CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN

  • Introduction   –        –        –        –        –        –        –                  19     

3.1 Research Methodology      –        –        –        –        –                  19-20

3.2 Analysis of the Existing System –        –        –        –                  20

3.2.1 Disadvantages of the Existing System        –        –        –                  20-21

3.3 Analysis of the Proposed System         –        –        –        –                  21

3.2.3.1 Advantages of the Proposed system        –        –        –                  21

3.4 System Design         –        –        –        –        –        –        –                 22     

3.4.1 Input layout          –        –        –        –        –        –        –                 22

3.4.2 Output Layout                                                 –   –                  23-24

3.4.3 Algorithm                                                         –   –                  25

3.4.4 Program Flowchart                                          –   –                  26-31

3.4.5 Database Design   –        –                  –        –        –                  31

3.4.6 System Architecture       –        –        –        –        –                  32

3.4.7 Use Case/Class Diagram          –        –        –        –        –        –        33-34

CHAPTER FOUR: SYSTEM IMPLEMENTATION AND DOCUMENTATION

4.0     Introduction                  –        –        –        –        –        –                  35

4.1     System Design Diagram –        –        –        –        –                  35

4.2     Choice of Programming Language              –        –                  35

4.2     Analysis of Modules               –        –        –        –                  35-36

4.4     Programming Environment     –        –        –        –                  36

4.4.1 Hardware Requirements –        –        –        –        –                  36

4.4.2 Software Requirements  –        –        –        –        –                  36

4.5     System Implementation –        –        –        –        –                  37

4.6    Software Testing   –        –        –        –        –        –                  37

CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATIONS

5.0     Introduction         –        –        –        –        –        –        –        –        38     

5.1     Constraints of the Study         –        –        –        –        –        –        38

5.2     Summary                       –        –        –        –        –                  38

5.3     Conclusion                     –        –        –        –        –        –        39

5.4     Recommendations                   –        –        –        –        –        –        39

          References                      –        –        –        –        –        –        40

Appendix A (Source Code)-    –        –        –        –        –                  41-49

 Appendix B (Output)                                  –      –        –                50-54

LIST OF TABLES

                                                                                      Page Number

Table 3.1: Output Layout        –        –        –        –        –        –        24

Table 3.2:  Database design     –        –        –        –        –        31

LIST OF FIGURES

                                                                                      Page Number

Figure 2.1: Admin Login page –        –        –        –        –        9

Figure 3.1: Input Layout         –        –        –        –        –        –        22

Figure 3.2: Output Layout 1   –        –        –        –        –        23

Figure 3.3: Login flowchart     –        –        –        –        –        26

Figure 3.4:  Main Menu Flowchart   –        –        –        –        27

Figure 3.5: ID Card Registration Flowchart                  –        –        28

Figure 3.6: ID Card printing flowchart       –        –        –        –        29

Figure 3.7: Update flowchart  –        –        –        –        –        30

Figure 3.8: Database Records flowchart     –        –        –        31

Figure 3.9: Architecture of the System       –        –        –        –        32

Figure 3.10: Use case diagram          –        –        –        –        –        33

Figure 3.11: Class diagram      –        –        –        –        –        34

Figure 4.1: System Design Diagram  –        –        –        –        35

CHAPTER ONE

INTRODUCTION

1.0 Introduction

This chapter presents the introduction to automated police identity card allocation system. It presents the introduction, background of the study, statement of the problem, aim and objectives of the study, significance of the study, scope of the study, organization of the research and definition of terms.

An identity card is a national or organization document certifying the identity of the holder. It can also be seen as the true image of an individual or person because it tells well about a person. An identity card is a proof of the holder’s identity that includes a photograph. An identity card is also used as a travel document. Most SMART identity cards also contain a technical component (microchip) which makes e-service easier. The Nigerian Police Force being a national institution needs to maintain proper identity record of its staff. It is not just enough to hold a printed card, it is important that a digital identity management system is also developed for easy verification of identity and to prevent identity theft (Kohntopp, 2001).   

The identity cards scheme is a major project that will use information andcommunication technology (ICT) and biometric technologies in recording, holding andverifying personal identity information. As such, it is reliant upon sound scientific adviceand requires an appropriate approach to the handling of risk. The cost of failure of thisproject would be enormous, both financially and politically in terms of public trust.

Identity management system refers to an information system orto a set of technologies that can be used for enterprise or acrossnetworkidentity management. Identity management system alsorefers to a set of technologies that enable the users to control thenature and the amount of personnel information released (Claubet-al, 2001).According to National Identity Management Commission, thereis no documented history. Implementation is the realization of anapplication, or execution of a plan, idea, model, designspecification, standard algorithm or policy.

1.1 Background of the Study

The identity of a person comprises a huge amount of personaldata with respect to individuals. All subsets of the identityrepresents the person (or components of the person). Some ofthese “partial identities” uniquely identify the person, others donot. Depending on the situation and the context, the person maybe represented by different partial identities.For instance, the National Identity Management System NIMS comprises ofNational Identity Database (also known as a central identity repository or register (CIDR), a chip-based, secured identity card, and a network of access and means to irrefutable assert the identity of an individual. It also includes the harmonization of existing identity database in public sectors. The most important thing about the Identity Management System is that itwill provide a universal identification infrastructure for the entire country. This will help bring real and recognizable benefits to the government, each of us, individually and collectively and also forlegal residents in Nigeria.Identity management is a term that refers broadly to the administration of individual identities within a system, such as a company, a network or even a country. In enterprise IT, identity management is about establishing and managing the roles andaccess privileges of individual network users. Identitymanagement systems provide IT managers with tools andtechnologies for controlling user access to critical informationwithin an organization. The identity management system in thedigital world relates to the behaviour of persons in everydayactivities (Claub& Kohn et-al., 2001).

Identity management system in the context of privacy enhancingtechnologies focused on anonymity and authenticity contains theconcept of an identity protector that have been built, but in mostcases not directly controlled by the user, or at least not in herown sphere of control. Implementation in the context of “securityin communication technologies” focused on reachability as itcontains a concept for user identification and the way usershandle identity functions (Damker and Prodesch, 1999).

It is in view of the need to properly maintain identity information of members of the Police Force that necessitated this research work on automated police identity card allocation system. It is a digital identity information management system.

1.2 Statement of the Problems

The growing complexity and decreasing transparency of theworld is a serious problem that we cannot solve entirely by anidentity manager. This growing complexity increases thedifficulty of the identity manager to visualize the degree ofprivacy in supporting the user because a potential risk couldeasily be under-or over-estimated. The following problems were identified:

  1. Identity theft problem as most people front as police officers. Commonly known as impersonation.
  2. It is time consuming to manually verify identity information of holders.
  3. If the Police identity card is missing there is no other easy way to proof identity than manual process.
  4. Duplication of Police identity card allocation numbers due to manual processing.
  5. Identity information of holders cannot be easily updated with manual system when necessary.
AUTOMATED POLICE IDENTITY CARD ALLOCATION SYSTEM A CASE STUDY OF NIGERIAN POLICE FORCE, IKOT EKPENE