Credit Card Secure Docuement

Embed Size (px)

Citation preview

  • 8/14/2019 Credit Card Secure Docuement

    1/57

    CARD SECURE PURCHASE ALERT SYSTEM

    A PROJECT REPORT

    Submitted by

    VADIVELU.B

    (Registration Number: 41406621052)

    In partial fulfillment for the award of the degree

    Of

    MASTER OF COMPUTER APPLICATIONS

    In

    DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

    PRINCE SHRI VENKATESHWARA PADMAVATHY

    ENGINEERING COLLEGE, PONMAR

    ANNA UNIVERSITY: CHENNAI 600 025

    June 2009

  • 8/14/2019 Credit Card Secure Docuement

    2/57

    BONAFIDE CERTIFICATE

    Certified that this project report titled CARD SECURE PURCHASE ALERT is the

    bonafide work of Mr.VADIVELU (Registration Number: 414066210252) who carried

    out the research under my supervision. Certified further, that to the best of my knowledge

    the work reported herein does not form part of any other project report or dissertation on

    the basis of which a degree or award was conferred on an earlier occasion on this or any

    other candidate.

    Supervisor Head of the Department

    Submitted for the Project and Viva Examination held on ____________________

    Internal Examiner External Examiner

  • 8/14/2019 Credit Card Secure Docuement

    3/57

    Abstract

    The Card Secure Purchase Alert is a real-time fraud mitigation and 2 way

    communication alert platform embedded in the payment stream resulting in quick

    response, no false positives, and no disruption to the payment process.

    Using secure web and mobile based technology, Purchase Alert can identify a

    fraudulent payment transaction within seconds and put the consumer in immediate

    contact with the consumers bank either through an instantly generated text message,

    email or telephone call allowing the consumer to instantly respond and communicate with

    the bank.

    Effective and affordable fraud detection tool that reduces time and costs of fraud

    mitigation, Customization and flexibility that incorporates your organization's baseline

    rules to align with policy and safeguards Multi-channel functionality that meets the

    diverse channel preferences of your accountholders-be it mobile, PDA, email, land line,

    etc.

  • 8/14/2019 Credit Card Secure Docuement

    4/57

    ACKNOWLEDGEMENT

    I am delighted to thank our honorable Chairman Dr. K. VASUDEVAN, M.A., B.Ed.,

    Ph.D., for giving us an opportunity and the trust members for the completion of this

    project at this institution.

    I would like to thank our Principal Prof. T.SOUNDERRAJAN, M.Tech., (Ph.D)., of

    Prince Shri Venkateshwara padmavathy engineering college for providing me an

    opportunity to carry out this project.

    I express my sincere thanks to Mrs. S. Banumathi M.C.A., M.Phil, (Ph. D) Internal

    Guide PG Department Shri Venkateswara Padmavathy Engineering College Ponmar,

    Chennai.

    With profound indebtedness I thankMr. Vikrama cholan M.C.A, Anju soft(india)

    private limited chennai for her constant encouragement and expert guidance throughout

    the project.

    I express my thanks to all my department faculty members and technical staff members

    for providing necessary information and their sustained interest in my part of fruitful

    completion

    Last but not the least, I put my sincere thanks to My Parents and Friends who helped

    me in the course of my project.

  • 8/14/2019 Credit Card Secure Docuement

    5/57

    CONTENTS

    CHAPTER NO TITLE PAGE NO

    List of Tables

    List of Figures

    List of Abbreviations

    1 Introduction

    1.1 Company Profile

    1.2 Objective

    2 System Analysis

    2.1 Existing System

    2.1.1 Drawbacks

    2.2 Proposed System

    2.3 Feasibility Study

    2.3.1 Economical Feasibility

    2.3.2 Operational Feasibility

    2.3.3 Technical Feasibility

    3 System Specification

    3.1 Hardware Requirements

    3.2 Software Requirements

    4 Software Description

    4.1 Front End

    4.2 Features

  • 8/14/2019 Credit Card Secure Docuement

    6/57

  • 8/14/2019 Credit Card Secure Docuement

    7/57

    LIST OF TABLES

    TABLE NO. TITLE PAGE NO.

    3.5.1 LOGIN 26

    3.5.2 MY PROFILE

    3.5.3 CARD TYPE 27

    3.5.4 TRANSACTION

    3.5.5 RULE

    3.5.6 MERCHANT

    3.5.7 FINANCIAL INSTITUTION

    LIST OF FIGURES

    FIGURE NO TITLE

    PAGE NO

    3.3 SYSTEM ARCHITECTURE 16

    3.3.1 LEVEL 0 DATA FLOW DIAGRAM 17

    3.3.2 LEVEL 1 DATA FLOW DIAGRAM 18

    3.3.3 LEVEL 2 DATA FLOW DIAGRAM 19

    3.3.4 ER DIAGRAM 20

    3.3.5 HOME PAGE 21

    6.1.1 LOGIN PAGE 40

    6.1.2 REGISTRATION PAGE 41

    6.1.3 VIEW MY PROFILE FORM 42

  • 8/14/2019 Credit Card Secure Docuement

    8/57

    6.1.4 DEFINE DEBIT\CREDIT CARD 43

    6.1.5 TRANSACTION 44

    6.1.6 RULE BUILDER 45

    6.1.7 MERCHANTS\FINANCIAL INSTITUTION 46

    LIST OF ABBREVATIONS

    ASP - Active Server Pages

    HTML - Hyper Text Markup Language

    URL - Uniform Resource Locator

    SQL - Structured Query Language

    IIS - Internet Information Services

    GUI - Graphical User Interface

    UML - Unified Modeling Language

  • 8/14/2019 Credit Card Secure Docuement

    9/57

  • 8/14/2019 Credit Card Secure Docuement

    10/57

    1.2 Objective

    The Card Secure Purchase Alert is a real-time fraud mitigation and 2 way

    communication alert platform embedded in the payment stream resulting in quick

    response, no false positives, and no disruption to the payment process. Using secure web

    and mobile-based technology, Purchase Alert can identify a fraudulent payment

    transaction within seconds and put the consumer in immediate contact with the

    consumers bank either through an instantly generated text message, email or telephone

    call allowing the consumer to instantly respond and communicate with the bank.

  • 8/14/2019 Credit Card Secure Docuement

    11/57

    CHAPTER 2

    SYSTEM ANALYSIS

    2.1 Existing system

    In earlier system, notification of transaction in any type of card Standard like

    VISA, MASTER CARD etc, is received by the card holder after transaction.

    The consumer has no way to control the purchasing power

    (i.e.) for account holders, the existing system did not provide any additional security.

    There is no security and reliability in payment translations in existing systems.

    The existing system has no solution for reduce the time and expense of fraud

    mitigation.

    2.1.1 Drawbacks

    The consumer has no way to control the purchasing power.

    The existing system has no solution for reduce the time and expense of fraud

    mitigation.

    There is no financial security with a single source to monitor all accounts.

    There is no actionable alerts sent to consumer based on individual preferences

  • 8/14/2019 Credit Card Secure Docuement

    12/57

    2.2 Proposed system

    Card secure consumers can take control of their financial identity and

    purchasing power. Card Secure provides consumers with an additional level of security

    and peace of mind during the payment experience and can help reduce resolution time

    and frustrations associated with resolving payment fraud. This system is developed to

    identify a fraudulent payment transaction within seconds and put the consumer in

    immediate contact through text message email or telephone call.

    For consumers, Card Secure delivers value, including:

    Increased financial security with a single source to monitor all

    accounts

    Actionable alerts sent to consumer based on individual preferences.

    Immediate contact with financial institution upon fraud detection.

    Reduced fraud resolution time, costs, and inconveniences for the

    consumer.

    Audit trail creation to support fraud claims

    Increased peace of mind

  • 8/14/2019 Credit Card Secure Docuement

    13/57

    2.3 Feasibility Study

    The feasibility study is a high level capsule version of the entire system

    analysis and design process. The objective of the feasibility study is to determine

    whether the system is feasible. There are three aspects of feasibility study is which

    system is subjected to be details are future discussed below;

    Technical Feasibility

    Operational Feasibility

    Economical Feasibility

    2.3.1 Technical Feasibility

    The Technical feasibility study determines whether the desired project should

    be done with the current equipment or with the new technology if required. In my project

    the all forms are very easy to access and update the all information. There is no complex

    to retrieve the user data. The system is provided with the necessary features to maintain

    accuracy, reliability and data security. Hence the proposed system was found to be

    technically feasible.

    2.3.2 Operational Feasibility

    Proposed project is beneficial only if it can be turned into information system that

    will meet the organizations operating requirements. Simply Stated, this test of feasibility

    asks if the system will work when it is developed and installed in the place of existing

    system. The project was tested for the operational feasibility.

    2.3.2 Economical Feasibility

    . The benefits that are expected from the new system will be more for internet

    accessing. There is no registration fee for using this service. So it is economically

    feasible.

  • 8/14/2019 Credit Card Secure Docuement

    14/57

    CHAPTER 3

    SOFTWARE DESCRIPTION

    System requirements document serves as the foundation for hardware

    engineering, software engineering, database engineering and human engineering. It

    describes the function and performance of the computer based system and the constraints

    that will govern its development.

    It completely describes what the proposed software should do without describing

    how the software will do it the basic goal of the requirement phase is to produce the

    Software Requirements specification which describes the complete external behavior of

    the proposed software. It indicates the study of hardware and software requirements.

    The hardware and software requirement of the system is the study of minimal

    requirements of the developing system and operational environment.

    3.1 Hardware Requirements

    The hardware specification includes all the hardware and peripherals

    requirements in the development environment.

    Intel 945GC Mother Board

    Intel[R] Core2Duo processor (2.20GHz)

    1 GB of RAM

    160 GB of Hard Disk Drive

  • 8/14/2019 Credit Card Secure Docuement

    15/57

  • 8/14/2019 Credit Card Secure Docuement

    16/57

    CHAPTER 4

    SOFTWARE DESCRIPTION

    4.1 FRONT END AND BACK END DESCRIPTION

    . NET FRAMEWORK

    The .NET Framework is an integral Windows component that supports building

    and running the next generation of applications and XML Web services. The .NET

    Framework is designed to fulfill the following objectives:

    To provide a consistent object-oriented programming environment whether object

    code is stored and executed locally, executed locally but Internet-distributed, or

    executed remotely.

    To provide a code-execution environment that minimizes software deployment

    and versioning conflicts.

    To provide a code-execution environment that promotes safe execution of code,

    including code created by an unknown or semi-trusted third party.

    To provide a code-execution environment that eliminates the performance

    problems of scripted or interpreted environments.

    To make the developer experience consistent across widely varying types of

    applications, such as Windows-based applications and Web-based applications.

    To build all communication on industry standards to ensure that code based on the

    .NET Framework can integrate with any other code.

    Advantages:

    Consistent Programming Model

    Direct Support for Security

    Simplified Development Efforts

    Easy Application Deployment and Maintenance

  • 8/14/2019 Credit Card Secure Docuement

    17/57

    ASP.NET

    ASP.NET, the next version of ASP, is a programming framework used to create

    enterprise-class Web Applications. These applications are accessible on a global basis

    leading to efficient information management.

    Advantages Using ASP.NET [1*]

    ASP.NET drastically reduces the amount of code required to build large

    applications

    ASP.NET makes development simpler and easier to maintain with an event-

    driven, server-side programming model

    ASP.NET pages are easy to write and maintain because the source code and

    HTML are together

    The source code is executed on the server. The pages have lots of power and

    flexibility by this approach

    The source code is compiled the first time the page is requested. Execution is fast

    as the Web Server compiles the page the first time it is requested. The server saves

    the compiled version of the page for use next time the page is requested

    The HTML produced by the ASP.NET page is sent back to the browser. Theapplication source code you write is not sent and is not easily stolen

    ASP.NET makes for easy deployment. There is no need to register components

    because the configuration information is built-in

    The Web server continuously monitors the pages, components and applications

    running on it. If it notices memory leaks, infinite loops, other illegal software or

    activities, it seamlessly kills those activities and restarts itself

    ASP.NET validates information (validation controls) entered by the user without

    writing a single line of code

    ASP.NET easily works with ADO .NET using data-binding and page formatting

    features

    ASP.NET applications run faster and counters large volumes of users without

    performance problems

  • 8/14/2019 Credit Card Secure Docuement

    18/57

    C # Overview

    C# (pronounced C Sharp) is a multi-paradigm programming language that encompassesfunctional, imperative, generic, object oriented (class based) , and component oriented

    programming disciplines.

    Features:

    Some notable C# distinguishing features are:

    There are no global variables or functions. All methods and members must be

    declared within classes. It is possible, however, to use static methods/variables

    within public classes instead of global variables/functions.

    C# supports a strict Boolean data type, bool. Statements that take conditions,

    such as while and ifrequire an expression of a Boolean type.

    Managed memory cannot be explicitly freed, but is automatically garbage

    collected. Garbage collection addresses memory leaks.

    C# is more type safe than C++. The only implicit conversions by default are

    those, which are considered safe, such as widening of integers and conversion

    from a derived type to a base type. This is enforced at compile-time, during JIT,

    and, in some cases, at runtime. There are no implicit conversions between

    Booleans and integers, nor between enumeration members and integers. Any user-

    defined conversion must be explicitly marked as explicit or implicit, unlike C++

    copy constructors and conversion operators, which are both, implicit by default.

    C# currently (as of 3 June 2008) has 77 reserved words.

  • 8/14/2019 Credit Card Secure Docuement

    19/57

    MICROSOFT SQL SERVER 2005:

    SQL Server 2005 offers new features and enhancements that improve productivity,

    efficiency, availability, and administrative ease.

    FEATURES OF SQL SERVER 2005:

    Database mirroring

    The primary database continuously sends transaction logs to the backup database on a

    separate SQL Server instance. A third SQL Server instance is then used as a witness

    database to monitor the interaction between the primary and the mirror databases.

    Database snapshots

    A database snapshot is essentially an instant read-only copy of a database. In

    addition to being a great reporting tool, users can revert control from primary database to

    a snapshot database in the event of an error

    CLR integration

    With SQL Server 2005, users now have the ability to create custom .NET objects

    with the database engine. For example, stored procedures, triggers, and functions cannow be created using familiar .NET languages such as VB and C#.

    Service Broker

    This feature gives you the ability to create asynchronous, message-based

    applications in the database entirely through TSQL. The database engine guarantees

    message delivery, message order consistency, and handles message grouping

    DDL triggers

    DDL triggers are defined at the server or database level and fire when DDL

    statements occur. This gives the ability to audit when new tables, stored procedures, or

    logins are created.

  • 8/14/2019 Credit Card Secure Docuement

    20/57

    Ranking functions

    SQL Server 2005 provides the ability to rank result sets returned from the

    database engine. This allows to customize the manner in which result sets are returned,

    such as creating customized paging functions for Web site data.

    Row versioning-based isolation levels

    This new database engine feature improves database read concurrency by

    reducing the amount of locks being used in the database

    XML integration

    SQL Server 2005 introduces the new XML data-type. This allows users to store

    full XML documents in this new data-type, and you can place validations on the well-

    formed documents in the database

    Database Mail

    Database Mail uses standard SMTP to send e-mail messages. These messages

    may contain query results, attachments (which can be governed by the DBA), and is fully

    cluster aware.

    5. PROJECT DESCRIPTION

  • 8/14/2019 Credit Card Secure Docuement

    21/57

    5.1 PROBLEM DEFINTION

    The main problem in all payment processing players-merchants, financial

    institutions, card companies and processors- can now deploy a real-time fraud mitigation

    and 2-way communication alert platform that is embedded in the payment stream. This

    innovative solution enables you to detect fraud in real time while engaging in 2-way

    communication with accountholders, resulting in quick response, no false positives and

    no disruption to the payment process.

    This is unlike any technology currently available. Purchase Alert delivers an

    additional level of security and peace of mind to the consumer payment experience and

    enables consumers to take control of their financial identity and purchasing power.

    Using secure web and mobile-based technology, Purchase Alert can identify a fraudulent

    transaction within seconds and informed to consumer.

    5.2 Overview of the project

  • 8/14/2019 Credit Card Secure Docuement

    22/57

  • 8/14/2019 Credit Card Secure Docuement

    23/57

    Framework, testing the model, integrating the model, fixing the bugs if any and

    implementing the model.

    5.3 MODULE DESCRIPTION

    The modules are

    Login

    In this module, the new user can create an account. The existing user enter the user

    name and password to use the features of card secure purchase alert system.

    Card type

    The user can enter the details in this module to perform secure card transaction

    Transaction

    The details needed for transaction is obtained by this module such that merchant

    name, account holder name, date, amount etc.

    Rule

    The transaction is validated in this module. That is the given parameters are checked

    according to rules

    Notification

    In this module, during transaction is notified to the consumer through mail or SMS.

    The status of notification is viewed in this module.

    Merchant/Financial Institution

    In this module, to add merchants and financial institutions to perform secure card

    transaction

    5.4 INPUT DESIGN

  • 8/14/2019 Credit Card Secure Docuement

    24/57

    Input design deals with the selection of controls and devices used for creating a

    project. The following are the primary objectives of an input design:

    1. Controlling amount of I/p

    2. Avoiding delay

    3. Avoiding errors in data

    4. Avoiding extra steps

    5. Keeping the process simple.

    The following basic input devices are used in my project for the system to accept input

    from the user

    1. Keyboard

    2. Mouse

    SSO uses various controls that allow users to furnish information as input to the

    system. Some of those input controls are mentioned below:

    1. Text Box

    2. Drop Down List box

    3. Radio Button List

    4. Check Box List

  • 8/14/2019 Credit Card Secure Docuement

    25/57

    5.5 OUTPUT DESIGN

    Output is the primary purpose of any system. Output design is often discussed

    before other aspects of design because, from the client's point of view, the output is the

    system. Output is what the client is buying when he or she pays for a development

    project. Inputs, databases, and processes exist to provide output .

    Coding the program for each module with its logic is performed in this step.

    Proper software specifications are also done here.

    Computer output is the most important and direct source of information to user.

    Output design is a process that involves designing necessary outputs that have to be

    various users according to their requirements. Efficient intelligent output design should

    improve the system relationship with the user and help in decision making.

    The output data design is made in such a way that it is easily understandable to

    the data entry operators by using meaningful and appropriate messages. When designing

    output, a system analyst accomplishes the following.

    Determine the information to present.

    Decide whether to display or print the information and select the output medium.

    Arrange the present to information acceptable format.

    Decide how to distribute the output to intended receipts.

    The output device used in my project is a color monitor, which enables the user to

    view information displayed on the web page for future accessing.

    Since my project, Card Secure purchase alert is a web application, output will be

    in the form of web pages which are linked to each other inside a website.

    5.6 DATABASE DESIGN

  • 8/14/2019 Credit Card Secure Docuement

    26/57

    Database files are the key source of information into the system. It is the process of

    designing database file, which are the key source of information to the system.

    A general theme behind a database is to handle the information as an integrated whole.

    A database is a collection of interrelated data stored with minimum redundancy to serve

    many users quickly and effectively. The general objective is to make information access

    easy, quick, inexpensive and flexible for the user.

    The databases are implemented using a DBMS package. Each particular DBMS has

    unique characteristics and general techniques for database design.

    The proposed system CARD SECURE stores the information relevant for processing

    in the MS SQL SERVER Database. MS SQL SERVER database contain tables, where

    each table corresponds to one particular type of Information. Each piece of information in

    the table is called a field or column.

    A table also contains records, which is a set of fields. All records in a table have the

    same set of fields with different information. Each row in a table is said to be entity. Each

    field is referred as attributes.

    Each table contains key fields that establish relationship in a MS SQL SERVER

    database and how the records are stored. There are primary key fields that uniquely

    identify a record in a table. The tables consist of more than one n Normalization process.

    NORMALIZATION

  • 8/14/2019 Credit Card Secure Docuement

    27/57

    The term normalization of data refers to the way data items are grouped together into the

    records structures. Normalization is a technique of separating redundant fields and

    breaking of a large table into smaller ones.

    Normalization is adopted to overcome the drawbacks like

    Repetition of data

    Loss of information

    Inconsistency

    All the tables have been normalized up to the second normal form. Various narmal forms

    that are available are as follows:

    First Normal Form

    A relation is said to be in 1NF (First Normal Form) if the values in the domain of each

    attribute of the relation are automatic, i.e., only one value is associated with each attribute

    and the value is not a set of values. A database is said to be in 1NF if all the relations of

    the database are in 1NF.

    Second Normal Form

    The 2NF is based on the concept of full functional dependence. A relation is said to be

    in 2NF (Second Normal Form) if and only if it is in 1NF and every non-key attribute is

    fully functionally dependent on candidate key of the table.

    Third Normal Form

    The 3NF is based on the concept of transitive dependency. A relation in 2NF if and

    only if every non-key attribute is non-transitively dependent on the primary key.

  • 8/14/2019 Credit Card Secure Docuement

    28/57

    5.6.1 List of tables

    Table Name:Card_Master

    Table Name: Transaction_master

    Fieldname Datatype length Constraints

    Tran_id int NotNull

    M_name Varchar 30 NotNull

    Acc_Name Varchar 20 NotNull

    Date datetime NotNull

    Amount money NotNull

    Status image 20 NotNull

    Table Name: Rule_master

    \

    Fieldname Datatype length Constraints

    Field name Datatype length constraints

    Acc_id varchar 20 Not null

    FI_name VarChar 20 Notnull

    Card_Type VarChar 20 Notnull

    Nick_name VarChar 30 NotNull

    Card_no Int NotNull

    ExpYear Varchar 20 NotNull

    Expmonth VarChar 20 NotNull

  • 8/14/2019 Credit Card Secure Docuement

    29/57

    Acc_name varchar 20 NotNull

    Rule nVarchar(max)

    Email bit NULL

    Sms bit NULL

    TableName:FI_master

    Fieldname Datatype Lenght Constraints

    S_no int 4

    FI_Name nvarchar 20 Not Null

  • 8/14/2019 Credit Card Secure Docuement

    30/57

    FieldName Datatype Length Constraints

    Tran_id int 20

    Email_sent bit Not null

    Sms_sent bit Not null

    Tran_date datetime

    Reply_received bit

    Amount money Not null

    Status char

    Mer_name nvarchar 20 Not null

  • 8/14/2019 Credit Card Secure Docuement

    31/57

    5.7 DATA FLOW DIAGRAM

    Dataflow diagram is a graphical representation of the flow of data through aninformation system

    There are basically three levels in a DFD

    Level 0

    This level shows the overall context of the system and its operating

    environment and shows the whole system as just one process

    Level 1

    The purpose of this level is to show the major high level processes of the system

    and their interrelation

    Level 2

    This level is a decomposition of a process shown in a level 1 diagram, as such

    there should be a level 2 diagrams for each and every process shown in a level 1 diagram

  • 8/14/2019 Credit Card Secure Docuement

    32/57

    DFD LEVEL 0

    Login Transaction alertsService

  • 8/14/2019 Credit Card Secure Docuement

    33/57

    Level-1

    Database Stores (GUID)

    Last 4 digits

    Global unique

    Identifier (GUID)

    Card no

    Authentication details

    Authentication result

    Level-2

    Consumer Registe

    Card secure center

    FISFITS

    Authenti

    cation

  • 8/14/2019 Credit Card Secure Docuement

    34/57

    Transaction

    Transaction details

    details

    Transaction

    Transaction status GUID, Merchantname, amount

    C-Conform

    D-Deny

    Execute rules

    Reply

    SMS/Email

    Merchant Swipes FITS

    FIS

    Rules

    /verification

    Card Secure Center

    Consumer

    CONFO

    RMATI

    ON

    Verification

  • 8/14/2019 Credit Card Secure Docuement

    35/57

    5.8 Entity Relationship Diagram

    Entity relationship model is an abstract representation of structured data. An entity-

    relationship (ER) diagram is a specialized graphic that illustrates the interrelationships

    between entities in a database.

    ER diagrams often use symbols to represent three different types of information.

    Boxes are commonly used to represent entities. Diamonds are normally used to represent

    relationships and ovals are used to represent attributes.

  • 8/14/2019 Credit Card Secure Docuement

    36/57

    E-R DIAGRAM

    Register

    have

    Card Master

    Card id

    Cardtyp

    ExpYea

    ExpMo

    FIName

    User

    Userid Pwd

    Rule master

    Email Rule

    Card_nSms

  • 8/14/2019 Credit Card Secure Docuement

    37/57

    CHAPTER 6

    SYSTEM TESTING

    System testing is the stage of implementations, which is aimed at ensuring that the

    system works accurately and efficiently before live operation commences. A series of

    testing is done for proposed system before the system is ready for user acceptance. Test

    data are prepared and the system is tested using the test data. System testing is a critical

    element of software quality assurance and represents the ultimate review of specification,

    design and coding. Testing objective should be to design the tests that systematically

    uncover different classes of errors and do so with minimum amount of time and effort.

    The tests are made functional, structural and simple.

    Testing Objective

    The objectives of the testing are:

    Testing is a process of executing a program with the intent finding

    an error.

    A good test case is one that has high probability of finding an as

    yet undiscovered error.

    Types of Testing Unit Testing

    Integration Testing

    Validation Testing

    Performance Testing

    UNIT TESTING

    Each module interface is tested to ensure that information properly flows in to andout of the program unit under test. As the system is getting up the development ladder, it

    is tested unit by unit. All common errors of computation are uncovered in this testing

    method.

  • 8/14/2019 Credit Card Secure Docuement

    38/57

    INTEGRATION TESTING

    Integration Testing is a logical extension of unit testing. In this simplest form, two

    units that have already been tested are combined into a component and the interface

    between them is tested. Integration testing is done is three ways, they are:

    Top down approach

    Bottom up approach

    The top-down approach to integration testing requires the highest-level modules

    be tested and integrated first. The bottom-up approach requires the lowest-level units be

    tested and integrated first. First, the inputs for functions are integrated in the bottom-up

    pattern discussed above. The outputs for each function are then integrated in the top-

    down manner.

    VALIDATION TESTING:

    Validation can be defined in many ways, but a simple definition is that can be

    reasonable expected by the customer, which is defined in the software requirement

    specification, a document that describes all user visible attribute of the software.

    The following test producers are followed during system development:

    Testing each option independently

    Testing all possible combinations of image file formats entered by user including

    invalid data

    Testing robustness of each option

    Testing the option after integrating it with the entire system

    Testing the entire system

    The users of the company are trained to operate the developed system. Both the

    hardware and software are made to run the developed system successfully in the future.

  • 8/14/2019 Credit Card Secure Docuement

    39/57

    Test Cases

    A test case in software engineering is a set of conditions or variables under which a

    tester will determine whether an application or software system meets specifications.

    The mechanism for determining whether a software program or system has passed or

    failed such a test is known as a test oracle. In some settings an oracle could be a

    requirement or use case. It may take many test cases to determine that a software

    program or system is functioning correctly. Test cases are often referred to as test

    scripts, particularly when written. Written test cases are usually collected into test

    suites.

  • 8/14/2019 Credit Card Secure Docuement

    40/57

    CHAPTER 7

    SYSTEM IMPLEMENTATION

    Implementation involves the conversion of a basic application to a

    complete replacement with a computer system. It is a process of converting the new or

    revised system design into an operational one.

    During the design phase, the product structure, its undergoing data structure,

    the general algorithm and the interfaces a control/data linkage needed to support

    communication among the various substructures was established.

    Implementation is the final and important phase. The most critical stage in

    achieving a successful new system and in giving the users a confidence that the new

    system will work and be effective is that the system can be implemented only after

    thorough testing is done and if it found to working according to the specification.

    At the beginning of the development phase, a preliminary implementation plan is

    created to schedule and manage the many different activities that must be integrated into

    plan.

    In my project CARD SECURE PURCHASE ALERT can be implemented into

    internet and user can access any time. Easy to access and secure the credit/debit cards in

    them own way.

  • 8/14/2019 Credit Card Secure Docuement

    41/57

    CHAPTER 8

    CONCLUSION AND FUTURE ENHANCEMENT

    8.1 CONCLUSION

    I feel happy and proud in making my project CARD SECURE PURCHASE

    ALERT. This project work has given an opportunity to develop my knowledge in

    programming. This training improved to ability to develop flexible solutions to the given

    problem. Several sophisticated features available in ASP.NET were followed in this

    project.

    Programs have been developed and implemented as per the requirements of the

    users. This system is user-friendly and hence very easy to operate. In all these

    applications, the company can get the satisfied output. Hence the company can drive the

    benefit of this system, without having to do any manual book keeping.

    Apart from the programming, I also came to know about the various tools need for

    developing and designing a program.

    Finally, I am proud in doing project and also I conclude this project CARD

    SECURE PURCHASE ALERT with great successful and satisfaction.

  • 8/14/2019 Credit Card Secure Docuement

    42/57

    CHAPTER 9

    APPENDIX

    9.1 SCREEN SHOTS

  • 8/14/2019 Credit Card Secure Docuement

    43/57

    Sign up page

  • 8/14/2019 Credit Card Secure Docuement

    44/57

    Signup page

  • 8/14/2019 Credit Card Secure Docuement

    45/57

  • 8/14/2019 Credit Card Secure Docuement

    46/57

    Account information page

  • 8/14/2019 Credit Card Secure Docuement

    47/57

  • 8/14/2019 Credit Card Secure Docuement

    48/57

    Rule builder page

  • 8/14/2019 Credit Card Secure Docuement

    49/57

    Transaction page

  • 8/14/2019 Credit Card Secure Docuement

    50/57

    Due alert page

  • 8/14/2019 Credit Card Secure Docuement

    51/57

    9.2 Sample Coding

    Code for login form

    using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;using System.Data.SqlClient;

    publicpartialclassAccountLogin : System.Web.UI.Page{ Database db = newDatabase();

    protectedvoid Page_Load(object sender, EventArgs e){

    Lblaccmsg.Visible = false;

    } protectedvoid LinkButton1_Click(object sender, EventArgs e)

    {Response.Redirect("Signup.aspx");

    } protectedvoid LinkButton4_Click(object sender, EventArgs e)

    {Response.Redirect("Cardsec_consumer.aspx");

    } protectedvoid LinkButton5_Click(object sender, EventArgs e)

    {Response.Redirect("Cardsec_consumer.aspx");

    } protectedvoid LinkButton3_Click(object sender, EventArgs e)

    { string q = "select * from Master_Profile where Login ='" +TextBox1.Text + "' ";

    db.dt.Rows.Clear();db.dt.Columns.Clear();db.getdata(q);

    if (db.dt.Rows.Count != 0){

    Session["login_name"] = TextBox1.Text;Response.Redirect("Forgot_Password.aspx");

  • 8/14/2019 Credit Card Secure Docuement

    52/57

    } else

    {Lblaccmsg.Visible = true;Lblaccmsg.Text = "Enter the valid user name";

    }

    } protectedvoid Button1_Click(object sender, EventArgs e)

    {

    string q = "select * from Master_Profile where Login ='" +TextBox1.Text + "' and user_Password='" + TextBox2.Text + "'";

    db.dt.Rows.Clear();db.dt.Columns.Clear();db.getdata(q);

    if (db.dt.Rows.Count != 0){

    Session["Username"] = TextBox1.Text;

    Session["Userpassword"] = TextBox2.Text;Session["mobile"] =

    db.dt.Rows[0]["mobile_phone"].ToString();Session["mailid"] = db.dt.Rows[0]["e_mail1"].ToString();Response.Redirect("MyProfile_user.aspx");

    } else

    {Lblaccmsg.Visible = true;Lblaccmsg.Text = "You are not a valid user";

    }}

    protectedvoid updateButton_Click(object sender, EventArgs e){

    string str1 = "server=Anjusoft\\SQLEXPRESS;database=cardsecure1; trusted_connection=true"; SqlConnection sqlcon = newSqlConnection(); SqlDataAdapter sqlada = newSqlDataAdapter(); DataSet ds = newDataSet();

    sqlcon = newSqlConnection(str1);sqlcon.Open();

    string query = "Select update_picture from master_Profile whereLogin='"+TextBox1.Text +"'";

    sqlada = newSqlDataAdapter(query, sqlcon);

    sqlada.Fill(ds, "master_Profile");DataGrid1.DataSource = ds.Tables["master_Profile"];DataGrid1.DataBind();

    }}

  • 8/14/2019 Credit Card Secure Docuement

    53/57

    Coding for define card form

    using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;

    publicpartialclass images_DebitCredit : System.Web.UI.Page{

    Database db = new Database(); protectedvoid Page_Load(object sender, EventArgs e)

    { if (Session != null)

    { if (IsPostBack == false)

    {Label8.Visible = false;

    string loginname = Session["username"].ToString();Label3.Text = loginname.ToString();financialInstitution();

    string s = "selectCardID,Nick_Name,substring(Card_No,13,4) as CardNo,Amount,Expiry_Datefrom Card_Details where user_name='" + Label3.Text + "'";

    db.dt.Rows.Clear();db.dt.Columns.Clear();db.Bind(s);datagrid1.DataSource = db.ds;datagrid1.DataBind();

    }

    }}

    publicvoid financialInstitution(){

    string loginname = Session["username"].ToString();Label3.Text = loginname.ToString();

    string s = "select financial_name frommaster_financialinstitution where user_name='"+Label3.Text+"'";

    db.dt.Rows.Clear();db.dt.Columns.Clear();db.Bind1(s);

  • 8/14/2019 Credit Card Secure Docuement

    54/57

    Dropfinancialinst.Items.Clear(); while (db._sqldr.Read())

    {Dropfinancialinst.Items.Add(db._sqldr[0].ToString());

    }

    } protectedvoid Button1_Click(object sender, EventArgs e)

    { string aa = "null";

    Label8.Visible =false; string loginname = Session["username"].ToString();

    Label3.Text = loginname.ToString();

    if (Btnaddcart.Text == "Submit"){

    if (Txtnickname.Text != "" && Textamount.Text !="" &&TxtExpirydate.Text !="" && Txtcardno.Text !="")

    {

    int dd=Txtcardno.Text.Length; if (dd == 16)

    {

    string s = "select * from Card_Details whereNick_Name='" + Txtnickname.Text + "' and Card_No='" + Txtcardno.Text +"' ";

    db.dt.Rows.Clear();db.dt.Columns.Clear();db.getdata(s);

    if (db.dt.Rows.Count != 0){

    Label8.Visible = true;Label8.Text = "Your Nick name and Card No is

    Already Exist in responding card type";}

    else{

    string squery = "insert into Card_Detailsvalues ('" + Dropfinancialinst.SelectedItem.Text.ToString() + "','" +DropCardtype1.SelectedItem.Text.ToString() + "','" + Txtnickname.Text +"','" + Txtcardno.Text + "','" + Textamount.Text + "','" +TxtExpirydate.Text + "','" + Label3.Text + "')";

    db.insert(squery);Label8.Visible = true;Label8.Text = "New Card is added

    successfully";

    }}

    else{

    Label8.Visible = true;Label8.Text = "You must enter 16 digit";

    }

    }

  • 8/14/2019 Credit Card Secure Docuement

    55/57

    else{

    Label8.Visible = true;Label8.Text = "Enter all the Fields";

    }}

    elseif (Btnaddcart.Text == "Update"){

    string cid = Session["card_id"].ToString(); string a = "update Card_Details setfinancial_inst_name='"+Dropfinancialinst.SelectedItem.Text.ToString()+"', card_type='"+DropCardtype1.SelectedItem.Text.ToString()+"',Card_No='" + Txtcardno.Text + "', Amount='" + Textamount.Text + "',Expiry_Date='" + TxtExpirydate.Text + "' where user_name='" +Label2.Text + "' and CardID=" + cid.ToString() + " andfinancial_inst_name='" + Dropfinancialinst.SelectedItem.Text.ToString()+ "' and card_type='" + DropCardtype1.SelectedItem.Text.ToString() +"'";

    db.Update(a);

    Label8.Visible = true;Label8.Text = "Debit/Card Details is updated

    successfully"; string sbind = "select * from Card_Detailswhere user_name='" + Label2.Text + "'";

    db.dt.Rows.Clear();db.dt.Columns.Clear();db.Bind(sbind);datagrid1.DataSource = db.ds;datagrid1.DataBind();Btnaddcart.Text = "Submit";

    }

    string ss = "select CardID,Nick_Name,substring(Card_No,13,4)as CardNo, Amount,Expiry_Date from Card_Details where user_name='" +Label3.Text + "'";

    db.dt.Rows.Clear();db.dt.Columns.Clear();db.Bind(ss);datagrid1.DataSource = db.ds;datagrid1.DataBind();

    }

    protectedvoid Txtcardno_TextChanged(object sender, EventArgs e){

    }

    protectedvoid datagrid1_ItemCommand(object source,DataGridCommandEventArgs e)

    {Label1.Visible = false;Btnaddcart.Text = "Update";

    int l; string code;

    l = e.Item.ItemIndex;

  • 8/14/2019 Credit Card Secure Docuement

    56/57

    code = e.Item.Cells[0].Text.ToString();Session["card_id"] = code.ToString();

    string loginname = Session["username"].ToString();Label2.Text = loginname.ToString();

    string squery1 = "selectFinancial_inst_name,Card_type,Nick_Name,substring(Card_No,13,4) asCardNo,Amount,Expiry_Date from Card_Details where CardID='" +code.Trim() + "' and user_name='" + Label2.Text + "'";

    db.dt.Rows.Clear();db.dt.Columns.Clear();db.getdata(squery1);

    if (db.dt.Rows.Count != 0){Dropfinancialinst.SelectedItem.Text =

    db.dt.Rows[0]["Financial_inst_name"].ToString();DropCardtype1.SelectedItem.Text =

    db.dt.Rows[0]["Card_type"].ToString();Txtnickname.Text = db.dt.Rows[0]["Nick_Name"].ToString();Txtcardno.Text = db.dt.Rows[0]["Card_No"].ToString();Textamount.Text = db.dt.Rows[0]["Amount"].ToString();

    TxtExpirydate.Text = db.dt.Rows[0]["Expiry_Date"].ToString();}

    else{

    Label1.Visible = true;Label1.Text = "Debit/Credit details is not available ";

    }}

    protectedvoid datagrid1_DeleteCommand(object source,DataGridCommandEventArgs e)

    {Label1.Visible = false;

    int l; string code;

    l = e.Item.ItemIndex;code = e.Item.Cells[0].Text.ToString();

    string sdelete = "delete from Card_Details where CardID='" +code.Trim() + "' and user_name='" + Label2.Text + "'";

    db.delete(sdelete);

    Label1.Visible = true;Label1.Text = "Card Details is deleted successfully";

    string sbind = "select * from Card_Details where user_name='" +Label2.Text + "'";

    db.dt.Rows.Clear();

    db.dt.Columns.Clear();db.Bind(sbind);datagrid1.DataSource = db.ds;datagrid1.DataBind();Btnaddcart.Text = "Submit";

    } protectedvoid DropCardtype1_SelectedIndexChanged(object sender,EventArgs e)

    {

  • 8/14/2019 Credit Card Secure Docuement

    57/57

    }}

    CHAPTER 10

    REFERENCES

    BIBLIOGRAPHY

    1. Douglas J. Reliy (2002 Edition), Microsoft press, Designing Asp.NET.

    2. David Sussman, Alex Homer(2006 Edition),Wiley Publishing, Wroxs ASP.NET 2.0

    Visual Web Developer 2005 Express Edition Starter Kit.

    3. Dino Esposito (2002 Edition). Microsoft press, ASP.NET Programming

    4. Roger S. Pressman, Fourth Edition, McGraw Hill, Software Engineering

    5. Reference Websites:

    i.www.asp.net

    ii.www.codeproject.com

    iii.www.w3schools.com