Вы находитесь на странице: 1из 26

Aadhaar Enabled Service Delivery

UIDAI www.uidai.gov.in

Context of UIDs in India


Provision of a robust, reusable ID to those who do not have any ID proof To clean up existing databases of multiple and fake entries To Improve Targeting and Delivery of Services To Reduce the cost of Delivery of Services

UIDAIs Mandate
To provide Unique ID Number to all Residents
Enrolment is a one time process for the resident Establishes Uniqueness

Provide online, cost-effective, ubiquitous authentication services across country


Authentication is transactional Establishes identity To be done at the time of availing a benefit

UIDAI issues unique IDs


UID Unique number Random number
Name Parents Gender DoB PoB Address

Basic demographic data and biometrics stored centrally


UID = 1568 3647 4958 6218

Standardized identity attributes No duplicates(1:N check) Flexibility to partners on Know Your Resident (KYR)+

Central UID database

Property of UIDAI - Highly confidential

and authenticate IDs online, real-time


Authentication - Are you who you claim to be?

UID = 1568 3647 4958 6218

Central UID database

1:1 check, no ID fraud Only YES/NO response, no details no invasion of privacy Person can see self-details, no one else can
Property of UIDAI - Highly confidential 5

Aadhaar : A flexible, national infrastructure


Universal ID, valid all India

6654 3212 9087

Only one number per person

Interoperable platform for multiple applications

Anywhere authentication through demographics, biometrics, or OTP

Identity verifiable through mobile and online

Can be linked to a bank a/c numbers, mobile numbers, and other identifiers

What is in a number?
Service Delivery Potential of Aadhaar

Service Delivery Potential of Aadhaar Number


Uniqueness and Existence ensures no fakes or duplicates As a sufficient KYC for Opening of bank accounts and other financial products, Mobile Connections, LPG, State Govt. Programs Universal Address for a person Enables breaking of database silos : Credit Bureau, Medical Records Provides resident-centric view of welfare programs

Service Delivery potential due to Authentication


Transactions normally require verification of identity Aadhaar online authentication will provide a common platform which can be used across all transactions and other applications. Entitlements should reach the intended beneficiary non-transferability can be ensured This can be effectively done by authentication at the point of service delivery Many domains will be able to use as a proof of presence for the beneficiary : Attendance, proxies in the examinations

Aadhaar Authentication

Current Challenges in ID Authentication


Currently most of the service agencies create physical identity tokens of type what the user has like Ration card, PAN card, NREGS Job card, Pension card etc which can be authenticated manually only.

Higher setup cost with limited scalability and it can only work in assisted mode.

Difficult to identify fake documents and copies

Cannot verify that the person carrying the identity token is indeed the same person defined in the identity token except where photo is printed on the identity token

Difficult to identify misuse. No authentic audit trail and requires exhaustive manual audit mechanism

In contrast AADHAAR ID Authentication relies on what the user is (biometrics) and a combination of what the user has and knows (OTP); is a digital and online form of authentication; and can function in self-service mode.

Aadhaar Authentication at a Glance

and/or*

YES
OR

NAME, GENDER DOB, Address,


and/or
*

NO

*and/or Single or multi-factor authentication *OTP One Time Pin

Aadhaar Authentication: Operating Model

UIDAI rolls out Authentication


First Aadhaar Issued: 29th September 2010 First Authentication PoC: 23rd February 2011 First live authentication transaction done in Jharkhand: 24th December 2011 Authentication Rollout: 07th February 2012

Key Actors in Authentication


Authentication User Agency (AUA): An AUA is any government / public / private legal agency registered in India that seeks to use Aadhaar authentication for its services. An AUA is the principal agency that sends authentication requests to enable its services / business functions. An AUA connects to the CIDR through an ASA (either by becoming ASA on its own or contacting services of an existing ASA) Authentication Service Agency (ASA): An ASA is an agency that establishes secure leased line connectivity to the CIDR to transmit authentication request on behalf of AUAs and receive response back from CIDR. An ASA can serve more than one AUA.

UIDAI will not charge for Aadhaar authentication services till December 2013

Steps to become an AUA / ASA


Authentication Service Agency (ASA) Define Service Offering Fill Online Forms, send signed contract and supporting documents to UIDAI Establish leased line connectivity with CIDR Ensure process and technology compliance with ASA checklists Authentication User Agency (AUA) Identify Business / Service Delivery Needs Choose Authentication Type, Exception Mechanism Engage with ASA for connectivity service

Send signed contract and supporting documents to UIDAI, fill online forms
Ensure process and technology compliance with AUA checklists Complete Aadhaar Seeding Device procurement and deployment Full Application development and testing Go-live

Obtain approvals from UIDAI


Perform end-to-end testing Go-live Engage with AUAs

More details available on: http://www.uidai.gov.in/auth

Aadhaar Authentication Readiness


Preparatory Activities

ASA Readiness
Contractual readiness Process & Technology Readiness

AUA Readiness
Contractual readiness Process & Technology Readiness

Authentication Devices Deployment


Operator/merchant readiness Device procurement & integration

Authentication Request

AUA Specific Communication Protocol

AUA/ASA Specific Communication Protocol

1
Authentication Transaction Aadhaar Holder

Https over secured leased line

4 7
Authentication Devices AUA ASA
Yes / No Response

5
Yes / No Response

Service Delivered

Necessary Updates & Confirmation

MSP managing CIDR

Ongoing Activities

Exception Handling

Monitoring & Audits

Aadhaar and Financial Inclusion

Current Challenges

2:30pm deadline 2 hour wait at the bank and a frustrated bank clerk The return journey 14 km bus journey

6 km walk to bus stop

Moneylender dues @ 5% pm

Rams Thursday ordeal

Ration from village kirana with remaining money

Convenient cash withdrawal


Rams bank account
8. Inform: Call / SMS

Resident

5. Authorize

6. Debit
1. Withdrawal request 9. Cash

4. Authenticate

Interoperable Switch

UIDAI
3. Forward to switch

7. Credit

2. AADHAAR number, money transfer instruction, biometrics

BCs bank account

BC with Micro-ATM

Aadhaar platform for Banking


Access
Address Transactions
Open Bank Accounts using Aadhaar Connect existing Bank Accounts

Transfer funds to Aadhaar Enabled Accounts Simplifies disbursal of funds uses only one account for all disbursals

Withdrawal and deposit Check balance, peer to peer transfers Inter-operable, portable anytime anywhere

Aadhaar accepted as

PoI/PoA for mobile connections

KYC for no frills bank A/Cs

Other applications to follow

Applications ecosystem
Wave 4: Next generation applications

Key funding source


Consumers

PPP & Wave 3: Mainstream applications consumers Healthcare, education, financial services and consumer applications including utility services and telecom

Wave 2: Initial application PDS, NREGA, State services, energy, financial services Wave 1: Enrolment & infrastructure creation

State government & financial services Central govt & registrars

2009

2010

2011

2012

2013

2014

2015

2016

Key ecosystem partners

IT services Consulting Financial services Telecom services Enrolment hardware Offline apps H/W Online Applications hardware Greenfield apps and investor ecosystem Logistics

In Conclusion..
Aadhaar Authentication framework is ready User entities need to re-engineer their applications and systems to leverage this Empanelment of Consultants and Software Development firms by UIDAI to assist partners in developing Aadhaar based applications Creating an Aadhaar Authentication Ecosystem of ASA, AUAs, Device manufacturers The next one year will be a year of applications driven by Aadhaar authentication Let us join hands to benefit the common man

Thanks!

Вам также может понравиться