Sie sind auf Seite 1von 68

1.

INTRODUCTION

1.1 SYNOPSIS

SECURE E BANKING WITH CRYPTO AUTHENTICATION


This project aims to develop a online banking which overcomes the disadvantages of Existing systems and allows the user to access it in faster manner in security environment. Online Banking isnt out to change your money habits. Instead, it uses todays computer technology to give you the option of by passing the time-consuming, paper-based aspects of traditional banking in order to manage your finances more quickly and efficiently. For years, financial institutions have used powerful computer networks to automate millions of daily transactions; today, often the only paper record is the customer receipt at the point of sale. Now that its customers are connected to the Internet via personal computers, banks envision similar economic advantages by adapting those same internal electronic processes to home use.

1.2 ORGANIZATION PROFILE

The global software industry, undergoing catalytic changes and periodic metaphors poses viable opportunities aplenty. Primarily to capitalize on them, Sofia Infology was incorporated in the year 2000 as a Training and Development Company and specializes in the niche areas like Industrial Engineering Applications, Management Applications, Custom application Development and other cost-effective Software Solutions.

Sofia also offers tailor-made courses in e-commerce, Electronics, Multimedia and all web related areas to a host of corporate clients through the separate Corporate Training Wing and to hundreds of career oriented techno-savvy individuals, be it professionals or students.

Parallel Development is the crux of the pedagogy at work at Sofia. The trainees are given parallel portions of the live projects to work on and their efforts are constantly compared with the progress of the live projects for evaluating performance levels.

Meritorious candidates on completion of their course are placed with reputed companies in India and abroad through our global placement cell.

1.3 PROJECT DESCRIPTION


Banks view online banking as a powerful value added tool to attract and retain new customers while helping to eliminate costly paper handling and teller interactions in an increasingly competitive banking environment. Banking isnt out to change your money habits. Instead, it uses todays computer technology to give you the option of by passing the time-consuming, paper-based aspects of traditional banking in order to manage your finances more quickly and efficiently. For years, financial institutions have used powerful computer networks to automate millions of daily transactions; today, often the only paper record is the customer receipt at the point of sale. Now that its customers are connected to the Internet via personal computers, banks envision similar economic advantages by adapting those same internal electronic processes to home use. The main objective of the proposed solution is to be automated the various functions and activities of the bank through Internet. The solution will facilitate to the bank employees and the account holders with the different modules. This solution is very much necessary for the private sector banks and the corporate sector. The banking industry will take a new shape and explore like never before. Using the solution the bankers and account holders can generate various kinds of reports.

BUSINESS REQUIREMENTS: Searching Capabilities:


For the account holders convenience and on hand information, this solution provides certain searching and checking features for his account. The account holder can any time and any number of time can log on and search for various details as the accounts balance, details of transactions, interest amounts, debits / credits, etc. The account holder will have his unique id and password for logging on to the accounts information.

User friendly:
The solution provides very simple and modified features, which are very easy to view and operate various features. The said project is designed and organized in very simplified manner to suit the current requirements of the account holders of various models such as Saving Bank Account, Current Account and Recurring Deposit Account.

Transaction Management:
The transaction made through either net or manually in bank need to have a consistency with respect to the account details and other related information like transaction details across various databases.

Value Added Service


The solution provides good number of value added services in comparison to the normal banking services. Account holder can view his accounts and give the instructions of making payment to various government organizations for various services. An account holder can issue the instructions to transfer certain amount to any particular account number of the same / different bank. Individual can log on to the site and open new bank account in his name online by following the simplified registration form instructions 4

Security
The Net Banking system deals with a lot of proprietary information for its users, which are confidential. It is therefore imperative to provide a means though which information can be kept confidential. This is also ensures that the data that is put into the system maintains its integrity because malicious or unauthorized individual will not have access to alter them. The security is at two different levels, one at account holder and other at administrative level at the banks office.

The major operations in the system are:


Account oppening Teller Services

Account Summary Transaction Details Card Transaction

Cash Withdrawal(Saving/Current withdrawal) Inquery Statement report Cash transformation Pin change Requests

Cheque Reorder New Card Request

2. SYSTEM ANALYSIS
System analysis is a process of gathering and interpreting facts, diagnosing problems and the information to recommend improvements on the system. It is a problem solving activity that requires intensive communication between the system users and system developers. System analysis or study is an important phase of any system development process. The system is studied to the minutest detail and analyzed. The system analyst plays the role of the interrogator and dwells deep into the working of the present system. The system is viewed as a whole and the input to the system are identified. The outputs from the organizations are traced to the various processes. System analysis is concerned with becoming aware of the problem, identifying the relevant and decisional variables, analyzing and synthesizing the various factors and determining an optimal or at least a satisfactory solution or program of action.A detailed study of the process must be made by various techniques like interviews, questionnaires etc. The data collected by these sources must be scrutinized to arrive to a conclusion. The conclusion is an understanding of how the system functions. This system is called the existing system. Now the existing system is subjected to close study and problem areas are identified. The designer now functions as a problem solver and tries to sort out the difficulties that the enterprise faces. The solutions are given as proposals. The proposal is then weighed with the existing system analytically and the best one is selected. The proposal is presented to the user for an endorsement by the user. The proposal is reviewed on user request and suitable changes are made. This is loop that ends as soon as the user is satisfied with proposal. Preliminary study is the process of gathering and interpreting facts, using the information for further studies on the system. Preliminary study is problem solving activity that requires intensive communication between the system users and system developers. It does various feasibility studies. In these studies a rough figure of the system activities can be obtained, from which the decision about the strategies to be followed for effective system study and analysis can be taken.

1. 2.

EXISTING SYSTEM PROPOSED SYSTEM

2.1 EXISTING SYSTEM


In the existing system the transactions are done only manually but in proposed system we have to computerize all the banking transaction using the software Online Banking.

problems with existing system


Lack of security of data. More man power. Time consuming. Consumes large volume of pare work. Needs manual calculations. No direct role for the higher officials. Damage of machines due to lack of attention.

To avoid all these limitations and make the working more accurately the system needs to be computerized.

2.2 PROPOSED SYSTEM


The proposed system can be accessed from any part of the world, as opposed to stand alone or manual system, and provides information at any time, anywhere round the clock to the customers. The aim of proposed system is to develop a system of improved facilities. The proposed system can overcome all the limitations of the existing system. The system provides proper security and reduces the manual work.

advantages of the proposed system


The system is very simple in design and to implement. The system requires very low system resources and the system will work in almost all configurations. It has got following features Security of data using crypto authentication Ensure data accuracy's. Proper control of the higher officials. Reduce the damages of the machines. Minimize manual data entry. Minimum time needed for the various processing. Greater efficiency. Better service. User friendliness and interactive. Minimum time required.

3.SYSTEM REQUIREMENTS

3.1 HARDWARE CONFIGURATION

The machine used to develop this system has the following hardware Specification need

Processor

Pentium IV

CPU Clock Speed

850 MHz

Board Memory

640 KB

Hard Disc Capacity

20 GB

Floppy Drive

1.44 MB

Display Type

: :

VGA 15 Digital

monitor
Pointing Device

Mouse

Key Board

104 keys

3.2 SOFTWARE CONFIGURATION

Operating system

Windows2000 or XP

Webserver

Internet Information Server (IIS)

Language

PHP

Back End

MYSQL

Web tool

Any browser, which supports web pages

Client Side Scripting :

Java Script

10

4. SOFTWARE DESCRIPTION

Microsoft Windows 2000


Operating System is an interface between user and computer, which controls the access of the Application Software to the computer. Microsoft Windows is a simple, easy to understand graphical user interface. In GUI, the computer screevn is called Desktop.Programs and documents can be opened in the user areas of the desktop. Though manywindows can be opened in the desktop, only one will be active at a time.

Features of Microsoft Windows


Supports multiple monitors with a single CPU. Plays streaming multimedia faster. Maintenance wizard helps to improve PCs speed and efficiency. By subscribing to our favorite web sites, we can schedule windows to check the site automatically and notify when the site is updated and download the web pages automatically. We can show web pages on active desktop

11

4.1 PHP INCLUDES


HTML CSS JAVA SCRIPT PHP

HTML
Hyper Text Markup Language was originally developed by Tim Berners-Lee while at CERN, and popularized by the Mosaic browser developed at NCSA. During the course of the 1990s it has blossomed with the explosive growth of the web. During this time, HTML has been extended in a number of ways. The Web depends on Web page authors and vendors sharing the same conventions for HTML. This has motivated joint work on specifications for HTML.HTML 4 extends HTML with mechanisms for style sheets, scripting, frames, embedding objects, improved supports for right to left and mixed direction text, richer tables, and enhancements to forms, offering improved accessibility for people. HTML 4 developments inspired by concerns for accessibility include: Better distinction between document structure and presentation, thus encouraging the use of style sheets instead of HTML presentation elements and attributes. Better forms, including the addition of access keys, the ability to group form Controls semantically, the ability to group SELECT options semantically, and active labels. The ability to markup a text description of an included objects (with the OBJECT elements). A new client-side image map mechanism (the MAP element) that allows authors to integrate image and text links. 12

The requirements that alternate text accompany images included with the IMG element and image maps included with the AREA element. Support for the title and long attributes on all elements. Support for the ABBR and ACRONYM elements.

CASCADING STYLE SHEETS


Style sheets simplify HTML markup and largely relieve HTML of the responsibilities of presentation. They give both authors and users control over the presentation of documentsfont information, alignment, color, etc. Style information can be specified for individual elements or groups of elements. Style information may be specified in an HTML document. Or in external style sheets. The mechanisms for associating a style sheet with a document are independent of the style sheet language. Before the advent of style sheets, authors had limited control over rendering. HTML 3.2 included a number of attributes and elements offering control over alignment, font size, and text color. Authors also exploited tables and images as a means for laying out pages. The relatively long time it takes for users to upgrade their browsers means that these features will continue to be used for some time. However, since style sheets offer more powerful presentation mechanisms, the World Wide Web Consortium will eventually phase out many of HTMLs presentation elements and attributes.

13

SCRIPTING
Style sheets represent a major breakthrough for web page designers, expanding their ability to improve the appearance of their pages. Through scripts, authors may create dynamic Web pages (e.g.,smart forms that react as users fill them out) and use HTML as a means to built networked applications. The mechanisms provided to include scripts in an HTML document are independent the scripting language. Scripts offer authors a means to extend HTML documents in highly active and interactive ways.

For examples:
Scripts may be evaluated as a document loads to modify the contents of the document dynamically. Scripts may accompany a form to process input as it is entered. Designers may dynamically fill out parts of a form based on the values of other fields. They may also ensure that input data conforms to predetermined ranges of values, that fields are mutually consistent, etc.,. Scripts may be triggered by events that affect the document, such as loading, unloading, element focus, mouse movement, etc. Scripts may be linked to form controls (e.g.,buttons)to produce graphical user interface elements. Hypertext Markup language is used for creating web pages which are accessed by PHP. The client side interactions will be performed by Hypertext Markup language is used for creating web pages which are HTML. The data given from clients through HTML and they are processed by Servers using PHP. HTML is designed to specify the logical organization of a document, with important hypertext extensions. Many different browsers of different abilities can view HTML documents. The URL specified with in the Form tag is submitted to the Server. METHOD option present in the Form is used to submit the fill-out form to a query server. Which method we use depends on how the particular server works. The valid choices are GET and POST GET - the default method causes the fill-out form contents to be appended to the URL as if they were a

14

norml query. POST- this method causes the fill-out form contents to be sent to the Server in a data body rather than as part of the URL.

JAVASCRIPT
JavaScript is based on an action-oriented model of the World Wide Web. Elements of a Web page, such as a button or checkbox, may trigger actions or events. When None of these events occurs, a corresponding piece of JavaScript code, usually a JavaScript function is executed. That function, in turn, is composed of various statements which perform calculations, examine or modify the contents of the Web page, or perform other tasks in order to respond in some way to that event. For example, pressing the SUBMIT button on an online order form might Invoke a JavaScript function that validates the contents of that form to ensure that the user entered all the required information. JavaScript is case-sensitive. In general, the elements of a JavaScript program can be divided into categories, as follows: 1. 2. 3. 4. Variables and their values Expressions, which manipulate those values Control structures, which modify how statements are performed Functions, which execute a block of statements Objects and arrays, which are ways of grouping related pieces of data together

15

PHP
HISTORY OF PHP
PHP (PHP: Hypertext Preprocessor) was created by Rasmus Lerdorf in 1994. It was initially developed for HTTP usage logging and server-side form generation in Unix.

PHP 2 (1995) transformed the language into a Server-side embedded scripting language. Added database support, file uploads, variables, arrays, recursive functions, conditionals, iteration, regular expressions, etc.

PHP 3 (1998) added support for ODBC data sources, multiple platform support, email protocols (SNMP,IMAP), and new parser written by Zeev Suraski and Andi Gutmans.

PHP 4 (2000) became an independent component of the web server for added efficiency. The parser was renamed the Zend Engine. Many security features were added.

WHAT IS PHP?
PHP is an HTML-embedded scripting language. Much of its syntax is borrowed from C, Java and Perl with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly. PHP stands for PHP: Hypertext Preprocessor. This confuses many people because the first word of the acronym is the acronym. This type of acronym is called a recursive acronym. PHP, which stands for "PHP: Hypertext Preprocessor" is a widely used Open Source general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.

16

INTRODUCTION

PHP is a powerful language and the interpreter, whether included in a web server as a module or executed as a separate CGI binary, is able to access files, execute commands and open network connections on the server.

PHP is a widely used open source, general-purpose scripting language. It was originally designed for use in Web site development. In fact, PHP started life as Personal Home Page tools, developed by Rasmus Lerdorf to assist users with Web page tasks. PHP proved so useful and popular, it rapidly grew to become the full-featured language that it is today, acquiring the name PHP Hypertext Preprocessor along the way to represent its expanded abilities processing Web pages before theyre displayed.

The popularity of php continues to grow rapidly because of its many advantages:
Its fast: On Web sites, because it is embedded in HTML code, the time to process and load a Web page is short. Its free: PHP is proof that free lunches do exist and that you can get more than you paid for. Its easy to use: The syntax is simple and easy to understand and use, even for nonprogrammers. For use in Web sites, PHP code is designed to be included easily in an HTML file. Its versatile: PHP runs on a wide variety of operating systems Windows, Linux, Mac OS, and most varieties of Unix. Its secure: As long as your scripts are designed correctly, the user does not see the PHP code.

17

Its customizable: The open source license allows programmers to modify the PHP software, adding or modifying features as needed to fit their own environments. PHP provides significant control over the environment, reducing chances of failure.

Interact with HTML forms: PHP can display an HTML form and process the information that the user types in.

Communicate with databases: PHP can interact with databases to store information from the user or retrieve information that is displayed to the user.

Generate secure Web pages: PHP allows the developer to create secure Web pages that require users to enter a valid username and password before seeing the Web page content.

Using PHP for database applications


PHP has support for over 20 databases, including the most popular commercial and open source varieties. PHP is particularly strong in its ability to interact with databases. the database, and returns the database response to you. Major databases currently supported by PHP include the some of the following:

Dbase Informix Ingres Microsoft SQL Server Msql Mysql Oracle Postgresql Sybase

18

PHP works well for a database-driven Web site. PHP scripts in the Web site can store data in and retrieve data from any supported database. PHP also can interact with supported databases outside a Web environment. Database use is one of PHPs best features.

Using PHP for system commands


PHP can interact with our operating system to perform any task the operating system can perform. We can execute an operating system command and receive the output. For example, we can execute a dir or ls command (to list the files in your directory) from PHP and receive the list of filenames that the dir/ls command produces.

The ability to execute system commands includes the ability to run any other program on the system. Thus, we can run programs in other languages from PHP and make use of the output.

PHP for the Web


The Web sever is the software that delivers our Web pages to the world. The PHP software works in conjunction with the Web server.

When used on the Web, PHP is an embedded scripting language. This means that PHP code is embedded in HTML code. we use HTML tags to enclose the PHP language that you embed in your HTML file. we create and edit Web pages containing PHP the same way we create and edit regular HTML pages.

PHP and the Web server must work closely together. PHP is not integrated with all Web servers but works with many of the most popular ones. PHP is developed as a project under the Apache Software Foundation and, consequently, works best with Apache. PHP also works with Microsoft IIS/PWS.

19

Functions
A function is a named block of code that performs a specific task, possibly acting upon a set of values given to it, or parameters, and possibly returning a single value. Functions save on compile timeno matter how many times we call them, functions are compiled only once for the page. They also improve reliability by allowing us to fix any bugs in one place, rather than everywhere you perform a task, and they improve readability by isolating code that performs specific tasks.

Strings
Most data we encounter as program will be sequences of characters, or strings. Strings hold people's names, passwords, addresses, credit-card numbers, photographs, purchase histories, and more. For that reason, PHP has an extensive selection of functions for working with strings.

Arrays
An array is a collection of data values, organized as an ordered collection of key-value pairs. Adding and removing elements from an array, and looping over the contents of an array. There are many built-in functions that work with arrays in PHP, because arrays are very common and useful

Objects
Object-oriented programming (OOP) opens the door to easier maintenance, and greater code reuse. OOP acknowledges the fundamental connection between data and the codes that works on that data, and design and implement programs around that connection.

Web Techniques
PHP was designed as a web scripting language and, although it is possible to use it in purely command-line and GUI scripts, the Web accounts for the vast majority of PHP uses. A

20

dynamic web site may have forms, sessions, and sometimes redirection, implement those things in PHP.

Security
PHP is a flexible language that has hooks into just about every API offered on the machines on which it runs. Because it was designed to be a forms-processing language for HTML pages, PHP makes it easy to use form data sent to a script.. The very features that let you quickly write programs in PHP can open doors for those who would break into your systems.

PHP on Windows
There are many reasons to use PHP on a Windows system, but the most common is that we want to develop web applications on our Windows desktop machine without the hassle of telnetting into the central Unix server. This is very easy to do, as PHP is extremely crossplatform friendly, and installation and configuration are becoming easier all the time.

21

4.2 MYSQL
To successfully use the PHP functions to talk to MySQL, we must have MySQL running at a location to which our Web server can connect (not necessarily the same machine as our Web server). we also must have created a user (with a password), and we must know the name of the database to which we want to connect. If you followed the instructions in, the sample database name is testDB, the sample user is joeuser, and the sample password is somepass. Substitute our own information when we use these scripts.

Using mysql_connect()
The mysql_connect() function is the first function we must call when utilizing a PHP script to connect to MySQLwithout an open connection to MySQL. The basic syntax for the connection is mysql_connect("hostname", "username", "password"); Using actual sample values, the connection function looks like this: mysql_connect("localhost", "arifauser", "sulpass"); This function returns a connection index if the connection is successful or returns false if the connection fails.This is a working example of a connection script. It assigns the value of the connection index to a variable called $conn, then prints the value of $conn as proof of a connection. A Simple Connection Script 1: <?php 2: $conn = mysql_connect("localhost", "joeuser", "somepass"); 3: echo "$conn"; 4: ?>

22

Connecting and Selecting a Database 1: <?php 2: $conn = mysql_connect("localhost", "arifauser", "sulpass"); 3: mysql_select_db("testDB",$conn); 4: ?> You now have two important pieces of information: the connection index ($conn) and the knowledge that PHP will use testDB as the database throughout the life of this particular script. The connection index is used in mysql_query()

syntax:
mysql_query(query, connection index);

23

5. SYSTEM DESIGN
5.1 INPUT DESIGN
The Data, which is input to a computer-based information system, must be correct. If data is incorrect and errors enter the system, it will lead to incorrect results whose sequences will be expensive and embracing to the designer. Hence, one of the important tasks of a system designer is to ensure that the design prevents such errors.

The existing user can enter into this application by entering the correct username and password, if the user is new to this application the user should fill the registration form. The admin will allow only the registered user to view this application.

Data Input:
The input of data to a computer can be either on-line or off-line. Any errors in data entry are checked immediately and the suitable message will be sent with in one or two seconds to correct the input data.

The following points should be carefully handled while I design this application. 1. The allocated space for each field 2. Field sequence, which must match, which in the source documents. 3. The format in which the data fields are entered. 4. Enough space for writing legibly the information. 5. Clear instruction to fill the form. The instruction is in front of the line where the data is to be entered.

24

5.2 OUTPUT DESIGN


Very often the success and acceptance of a systems depends on good output presentation. It is thus essential for a system analyst to understand how to design output reports. Currently excellent graphic displays are widely in use. The following method will be used in this application to produce an expected output. 1. Title will be specified for each output 2. Sample output will be produced for each and every module. 3. The output will satisfy the user requirements. 4. Correct result will be produced while the user search for a bit of information. 5. The Admin will produce the Result for the exam written by the user. 6. The admin will also response the user through mail.

25

5.3 DATA FLOW DIAGRAM


DFD is the one of the tools of structural analysis. A DFD models a system by using external entities from which data flows to process which transforms the data and creates output data which goes to other processes on external entities or files data in tables and may also flow to processes as inputs. The main merit of DFD is that it can provide an overview of what data a system should process, what transformation of data were done what files are used and here the results flow. The graphical representation of the system makes it a good communication tool between the user and an analyst. Four symbols are used in drawing DFD. A circle is used to depict a process. Both inputs and outputs are data flows. A line with an arrow represents data flows. The arrow shows the direction of flow of data. External entities are represented by rectangles. Entities supplying data are known as source and those that consumer data are called sinks. The data flow diagram for this system is shown in the next page.

Definition:
Modules

Process

Link

26

ZERO-LEVEL

Account Transaction & Services

Net Banking System

Reports

DFD-I

Account-Types

States

Get New Account Details New Account Report Details

New A/C

Store Accounts Nominee

Require-Deposits

Term-Deposits

Credit-Cards

Customers

27

DFD-II

Accounts

Get Funds Transfer Details Funds Transfer Funds Transferred

Store

Funds-Transfers

28

DFD-IV

Accounts Get Bill Payment Bill Paid

Bill Details

Store

Bill- Payments

29

DFD-V

Accounts

Get Reorder Details Check Reorder Check Reordered

Store

Cheque-Reorders

30

DFD_VI

Accounts

Credit-cards

Get New Card Details New Card Request New Card Created

Store

Credit-Cards

31

DFD-VII

Accounts

Get Draft/Cheque Details Draft/ Cheque Draft/ Cheque Created

Store

Draft-Cheque

32

DFD-IX

Accounts

Customers

Nominee

Get New Account Details Open Another Account New Account Created

Store

Accounts

Customers

Nominee

33

DFD-X

Accounts

Get Account Details Close Account Account Closed

Store

Transaction Accounts Customers Nominee

34

DFD_XI

Accounts Get

Nominee

Account Details

Modify A/C Info

Account Details Notified

Store

Accounts

Nominee

35

DFD_XII

Customers

Get Customer Details Modify Customer Details Customer Details Modified

Store

Customers

36

5.4 LIST OF TABLES

acct_services:

career:

cust_loan:

form:

37

home loan:

admin:

autogen:

38

custaccinfo:

custdepotrans:

custsecurity:

homeloan:

39

mail:

otherloan:

translogin:

40

6.

SYSTEM TESTING

Software testing is a crucial element of software quality assurance and represents the review of the specification, design and coding. The user tests the developed system and changes are made according their needs. The testing phase involved the testing developed system using various kinds of data.

System testing is the stage of implementation that is aimed at assuring that the system works accurately and efficiently before live operation commences. Testing is the vital to the success of the system. System testing makes a logical assumption that if all parts of the system are correct, the goal will be successfully achieved. Here there are two testing methods, they are white box testing and Black box testing.

WHITE BOX TESTING


This will be tested at the outside of the environment., which means accessing the server. I.e. accessing data from the database. This will check whether data is retrieved correctly or not will be seen. Here MYSQL server will be used as backend database. Here for the project some tables are created, In the program it has clearly specified. Whenever inserting data, updating data and selecting data from the database the queries must be written carefully. The seperation between the string and numeric must be shown. The client side validations will be written in PHP so that the data entered is numbered or string

BLACK BOX TESTING


This is another important test method will check only internal code loops, conditional loops will be checked. This method will check the loops like FORLOOPS, WHILELOOP all will be checked their boundary condition also. If the data at extreme conditions are correctly retrieved. So there will be no error.
41

Testing steps are as follows


Unit testing Code testing Validation testing

Unit Testing
Each and every module will be tested while running correctly or not. The Link from one module with another module will also clearly check.

Code Testing
Coding will be checked for every form during inserting, updating and removing the data from the database.

Validation Testing
Validation testing can be defined in many ways, but a simple definition is that validation succeeds when the software functioned in a manner that can be reasonably expected by the user. The fields in the forms will not be empty whether the data will be stored in database.

42

7. SYSTEM IMPLEMENTATION
IMPLEMENTATION PLAN
The most crucial stage in achieving a new successful system and in giving confidence on the new system for the users that will work efficiently and effectively. The system can be implemented only after thorough testing in done and if found to work according to the specification.

It involves careful planning, investigation of the current system and its constraints on implementation, design of methods to achieve the changeover, an evaluation of changeover methods apart from planning.

IMPLEMENTATION PROCESS
The implementation process begins with preparing a plan for the implementation system. According to this plan, the other activities are to be carried out. In this plan, discussion has been made regarding the equipment, resources and how to test the activities. Thus a clear plan is preparing for the activities.

This Application is Tested and implemented successfully in the client spot. The Input will be stored correctly in database and produce the expected output whenever the user required.

43

8 CONCLUSION

SECURE E BANKINHG System will satisfy all the user needs. SECURE BANKING Promote common corporate culture: certain user has the right to viewing the information by restricting through login. This system has been developed in an attractive dialogs fashion .so user with minimum knowledge about computer can also to operate the system easily.

44

8.1 SOURCE CODING


FORM:accdeposit
<?php ob_start(); session_start(); ob_get_flush(); include_once "conn.inc"; ?> <!doctype html> <html lang="en"> <head> <title>welcome to application form</title> <meta charset="utf-8"> <link rel="stylesheet" href="css/reset.css" type="text/css" media="screen"> <link rel="stylesheet" href="css/style.css" type="text/css" media="screen"> <link rel="stylesheet" href="css/grid.css" type="text/css" media="screen"> <script src="jquery-1.6.4.js" type="text/javascript"></script> <link rel="stylesheet" href="themes/base/jquery.ui.all.css"> <script src="jquery.ui.core.js"></script> <script src="jquery.ui.widget.js"></script> <script src="jquery.ui.datepicker.js"></script> <script src="js/ff_cash.js" type="text/javascript"></script> <script src="js/superfish.js" type="text/javascript"></script> <script src="js/tms-0.3.2.js" type="text/javascript"></script> <script src="js/tms_presets.js" type="text/javascript"></script> <script src="js/cufon-yui.js" type="text/javascript"></script> <script src="js/cufon-replace.js" type="text/javascript"></script> <script src="js/oswald_400.font.js" type="text/javascript"></script>

<script> $(document).ready(function() { var sendvalue = "account deposit main"; $.post("frmcustsupport.php", { sendtovalue: ""+sendvalue+""}, function(data){ 45

$('#depositmaindiv').html(data); });

});

function findcustinfo(param2) { var param1="find customer information"; var sendvalue = param1 + "#" + param2; $.post("frmcustsupport.php", { sendtovalue: ""+sendvalue+""}, function(data){ $('#custinfodiv').html(data); }); } function deposit(param2,param3) { var param1="complete deposit"; var sendvalue = param1 + "#" + param2 + "#" + param3; $.post("frmcustsupport.php", { sendtovalue: ""+sendvalue+""}, function(data){ $('#depositresult').html(data); }); } function redirect() { var url = "frmaccdeposit.php"; $(location).attr('href',url); }

</script>

<style> .messagebox{ position:absolute; width:100px; margin-left:30px; border:1px solid #c93; background:#ffc; 46

padding:3px; } .messageboxok{ position:absolute; width:auto; margin-left:30px; border:1px solid #349534; background:#c9ffca; padding:3px; font-weight:bold; color:#008000; } .messageboxerror{ position:absolute; width:auto; margin-left:30px; border:1px solid #cc0000; background:#f7cbca; padding:3px; font-weight:bold; color:#cc0000; } .btnmenu{ background:url(button.png) 0 0 no-repeat; border:none; cursor:pointer; float:center; border:none; color:white; font-family: arial; font-weight: bold; font-size:8pt; border-radius:6px; -moz-border-radius:6px; -webkit-border-radius:6px; -webkit-background-clip: padding-box; } .edit_btn{ background:url(edit_btn.png) 0 0 no-repeat; width: 80px; height: 20px; cursor:pointer; float:center; border:none; 47

color:transparent; font-size:0.1pt; padding-left:100px; border-radius:6px; -moz-border-radius:6px; -webkit-border-radius:6px; -webkit-background-clip: padding-box;

} .update_btn{ background:url(update_btn.png) 0 0 no-repeat; width: 60px; height: 20px; cursor:pointer; float:center; border:none; color:transparent; font-size:0.1pt; padding-left:100px; border-radius:6px; -moz-border-radius:6px; -webkit-border-radius:6px; -webkit-background-clip: padding-box;

} .delete_btn{ background:url(delete_btn.png) 0 0 no-repeat; width: 60px; height: 20px; cursor:pointer; float:center; border:none; color:transparent; font-size:0.1pt; padding-left:100px; border-radius:6px; -moz-border-radius:6px; -webkit-border-radius:6px; -webkit-background-clip: padding-box; }

48

</style>

</head> <body id="page1"> <!-==============================header=================================-> <header> <div class="main"> <div class="row-1"> <h1><a href="#">south indian <strong>bank</strong></a><span>always behind us</span></h1> <span class="contact-top"><span>free</span> <strong>toll free </strong> no. 1234 567 890</span> </div> <div class="row-2"> <nav> <ul class="sf-menu"> <li><a class="current" href="index.php">home</a></li> <li><a href="frmadminuseract.php">user account management</a></li> <li><a href="frmaccdeposit.php">account deposit</a></li> <li><a href="frmtranslog.php">transaction review</a></li> <li><a href="frmadminhome.php">back</a></li> </ul> </nav> </div> </div> </header> <!--==============================end header=================================--> <!-==============================content================================-> <section id="content"> <div class="padding-content"> <div class="container_12"> <div class="wrapper p4"> <article class="grid_88"> <table> <tr><td><div id='depositmaindiv' name='depositmaindiv'></div></td></tr> <tr><td><div id='custinfodiv' name='custinfodiv'></div></td></tr> 49

</table> <p><div id='depositresult' name='depositresult'></div></p> </div> </td> </tr> </table>

</article> </div> </div> </section> <!--==============================end content================================--> <!-==============================footer=================================-> <footer> <div class="main"> <div class="wrapper"> <div class="fleft"> </div> <div class="footer-link"> <!-- {%footer_link} --> </div> </div> </div> </footer> <!--==============================end footer=================================--> </body> </html>

50

8.2 SCREEN SHORT

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

9. FUTURE ENHANCEMENT

SECURE E BANKING is more flexible for user purchases the mobiles from the company. Every transaction is maintained regularly. Every transaction such as money transfer and card transfer will be updated in account. But this system had some drawbacks to avoid this; the future would have to develop as below mentioned:

In Future this secure e banking web application can use bio metric authentication for secured transactions. Mobile banking facilities will be added in future. Customer relationship management such as statements, check requires, password change, cards requirement service, can be automated in mobile banking.

67

10.
BOOK REFERENCE

BIBLIOGRAPHY

o PHP A Beginners Guide --- Dave Mercer o HTML 4 Complete Reference o Jesse Liberty, Dan Hurwitz- Programming PHP

Website Reference
www.coolarchive.com

www.smartwebby.com www.a1javascripts.com www. Wiley.com

68