UIDAI system has multiple layers of security check to thwart manipulation: CEO

NEW DELHI: The UIDAI's device incorporates a couple of layers of safety assessments, and any try of manipulation at the operator degree might be detected and thwarted at the back-end, Aadhaar-issuing body's CEO Ajay Bhushan Pandey has mentioned.

The feedback of the Unique Identification Authority of India (UIDAI) leader got here towards the backdrop of a recent file alleging Aadhaar instrument hack.

"The whole Aadhaar system is designed in a manner that it has multiple layers of security. Because of multiple layers of security, if manipulation is done at the systems' front end, at the back-end the security checks will thwart that attempt," Pandey mentioned.

Once the appliance for enrolment is received, validation or safety assessments are performed at the device's back-end too, Pandey mentioned, including that those safeguards allow rogue makes an attempt to be detected.

"...all such attempts will get detected at the back-end and the enrolment packets then get rejected, and Aadhaar is not generated...we are also able to identify which operator has done this and, in such cases, the operator will be blacklisted...in appropriate cases we file prosecution under the Aadhaar Act," Pandey told PTI.

A file lately claimed that Aadhaar instrument and database were compromised by way of a instrument patch that purportedly disables crucial safety features of the enrolment instrument.

The file had additionally mentioned that the patch allegedly enabled unauthorised folks to generate Aadhaar, a claim that has been refuted by way of the UIDAI.

In a observation earlier this week, UIDAI claimed that no operator could make or replace Aadhaar unless a person provides biometrics main points.


"Therefore it is not possible to introduce ghost entries into Aadhaar database," the UIDAI observation had mentioned.


When contacted, Jaideep Srivastava, Professor of Computer Science at University of Minnesota mentioned that the era of an Aadhaar quantity is the result of a full 'two-way handshake' between the client instrument and the server instrument.


"The former collects and sends a packet, and the latter then decides to accept or not accept the enrolment packet. Since the server-end decides the second, it has more power than the client software...Just because a rogue operator or compromised enrolment software tries to register an unauthorised person does not mean that the server will accept the packet and generate Aadhaar," Srivastava mentioned in response to an e mail question.


UIDAI system has multiple layers of security check to thwart manipulation: CEO UIDAI system has multiple layers of security check to thwart manipulation: CEO Reviewed by kailash soni on September 14, 2018 Rating: 5
Powered by Blogger.