Chuks Project Work
Chuks Project Work
INTRODUCTION
The National Identity Card Processing and Administration system is the only true way a state
geographical area, it is necessary to bear a mark. Mark here does not really mean facial mark
rather an identity. This identity card will bear your name, state and all information about you as
an individual or person. This therefore boils down to what we know as National Identity Card.
The Question is “what is an identity card? As defined by many authors and dictionary including
government of a country to every individual or person that the definition National Identity Card
can also be called a true image of an individual or person; because it tells well abut a person.”
The idea of a national identification card system in Nigeria was originally conceived in 1977 but
was eventually executed in 2003 after several controversies and bottlenecks (Obi, 2006). In 1978
under the Department of National Civic Registration (DNCR), which was charged with
registering and issuing a National Identity Card to every citizen of Nigeria who was then 18
years or older, an attempt was initiated to document the identity of Nigerians and non-citizens
using biographic data. The aim of this scheme then as stated in the National Identity
Management System Handbook on Business Processes, Standards and Specifications (2011) was
to use the program as an effective tool for controlling illegal immigration, to validate other civic
documents like travel passports, and to set up a reliable personal identification system for
1
In 2007, National Identity Management Commission (NIMC), established by the NIMC Act No.
23 of 2007, was given the mandate to establish, own, operate, maintain and manage the National
Identity Database in Nigeria. A key requirement of the National Identity Management System
(NIMS) is the capture of biometrics and necessary demographic data in a standardized manner
that would facilitate identity authentication and verification using the unique National
discharging of its duties, on July 2009 constituted a body to be known as the National Identity
Management and Harmonization Committee (NIMHC) to become the custodian for setting
standards for National Identity Management System. By the extension of the National Identity
Management Commission Act, Section 5, part (j), NIMHC established rules and standards that
shall be binding on all subjects, agencies, organizations, and entities that are collecting,
Although NIMC has been seen to discharge its duties effectively, there exist some bottlenecks
which happen to hamper the successful discharge of duties. These bottlenecks arise mostly due
to the manual method of operation (paper/pen method of documentation). This project tends to
curb the known problems by designing an automated national identity card management system
for Nigerian people. Although there are different arms in the National Identity Management
Commission which takes the responsibility of checking and issuing the National Identity Card,
but as it concerns our area of interest in this project work, Department of National Civil
Registration under the NIMC, of Ngwo Local Government Area of Enugu State will be our
target.
2
1.2 STATEMENT OF THE PROBLEM
Currently, the processing of acquiring and managing national identity card in Nigeria involves
the manual method where paper and pen are used for documentation. Some many disadvantages
have been seen to be involved in this method; National Identity Card processing and
Administration system is not an easy task. This reason is because it involves absolute carefulness
to ascertain a population figure, prevent forgery and avoid the dangers of Impersonation,
Scanning through reports for a file with definite information can be a techniques and time
wasting work because of the large volume of record to be scanned. Also to change particular
information may be as a result of marriage, change of name, or loss of the Identity card in other
words known as update will also be a tug of way for the individual in charge.
It creates weariness and loss of dedication to duties by the staff thereby restricting the powers of
the Department of National Civil Registration services following the constitution of the Federal
Republic of Nigeria which states that “No Public Officer shall put himself in a position where his
personal interest conflict with his duties and responsibilities” (1999 Constitution 5th schedule
point 1 no.1) The processing and administration of the computerized national identity card
management system will be capable of restricting access to non-authorized person, provide faster
The main aim of this study is to review the manual method of operation being carried out in the
National Identity Management Commission, Ngwo Local government area of Enugu state and
design an automated system to manage identity cards. To achieve the stated aim, the following
3
i. Design a system capable of capturing and storing data using client server architecture.
ii. System should check and prevent multiple possession of the National Identity card
iii. Deprive immigrant who are not citizen of the country from obtaining the national identity
card
v. Develop a proper secured storage system which keeps all vital information ready for use
This project work is of immense help to National Identity Management Commission in particular
because it will help them discharge their duties effectively. Data manipulation and loss will be
mitigated as only authorized users are granted access to database. This work can also server a
guidance and reference point to scholars researching the field of automated systems.
This is limited to the activities involved in National Identity Management Commission and its
administration system and also report generation on the National Identity Card Holders
Information. The system is built using PHP programming language and runs on a browser. The
client/server architecture ensures that the server database is updated whenever necessary and
It is on these that the effectiveness and efficiency of the National Identity card section of the
The limitation is based on the facts which the researcher could not lay hands on pertaining to the
study, which evolves the problems of insufficient analysis. In addition to these limitations are
4
1.7 DEFINITION OF TERMS
As we go into this work, some words will need precise definition to enable the reader assimilate
NIMC: NIMC operates and regulates matters of national identity in Nigeria with services
covering National Identification Number (NIN) enrolment and issuance, National e-ID
Citizen: Under the provision of the amended constitution decree No. 32 of 1974, citizen
is any person who becomes citizen of any country either by birth, descendant,
Registration or Nationalization.
Identity Card: Any document that may be used to prove a person's identity. If issued in
a small, standard credit card size form, it is usually called an identity card (IC, ID card,
citizen card)
5
CHAPTER 2
In this section the following will be discussed, core concept of identity card, identification
system in Nigeria, processes to have identification card, national identification number, present
Webster’s Ninth New Collegiate Dictionary defines Identity Card as a formal document that is
used by an authorized official of a country to one of its citizen. The Question is “what is an
identity card? As defined by many authors and dictionary including the encyclopedia, it is a
individuals or person that is of the stipulated age of ownership. From the definition, National
Identity Card can also be called a true image of an individual or persons because it tells well
about a person.” Identity card as defined cannot be acquired from neither from school nor home.
But, there is a special organization or ministry that takes charge of both processing and
administration of National Identity Card. The ministry of Internal Affairs Under the Department
According to J. K. Plack in his book “information Processing and Identification” says that
identity card is a mark of Identification. And also, it tightly identifies the holder whose
photograph is placed in the identity card. It also contains all necessary information needed to
know about the holder of the identity card. Furthermore, he emphasized that the essence of such
identification is mainly for security purposes. During national identity card processing,
everything is put into consideration to check fraud of any form. Any fraud is detected and
6
canceled because the identity cards are made unique. It is not always easy. Forging of identity
card. And personification in areas where adequate attention is not given to processing of the
John Orgeon in his book. “Travelers and Juris” defines travelers as a process of making long
journey within or outside ones’ territory. People travels in other to visit people, do business with
people or for changing environment. To this effect, there is every need that he/she traveling bears
a mark of identification, which is the national identity card. The identity card being and
outstanding document, is very official and is only issued out and controlled by the Government
Dan Jougliow in his book. “Automatic Document and Processing” defines document processing
as preparation of printed evidences for births, deaths, marriage, and identification etc.
These document are processed to be very unified and easily maintained. With the introduction of
identity card, the problem associated with identity card processing system has been totally
solved. The computer maintains and access information about identity card holders automatically
with little human intervention. Fraud is eliminated. The machine assesses everything
Tony Ikara in a journal titled “Identity Card Processing Effects and Benefits” Says that identity
card represents the image of a nation. IKAM also emphasized that every National should attach
more importance to the mode of insurance and assessment of identity card since it will contribute
to a large extent sanitizing the image of countries within or outside their own country. Identity
card holders should at the same time exhibit good and recommendable character within and
7
2.1.2. IDENTIFICATION SYSTEM IN NIGERIA
Presently, Nigeria has a national identity programme that is incomplete because not every
Nigerian participated in the last National identity (ID) Card project which means that not
everybody is uniquely identified. That is why the critical private sectors are doing their own
identification (Obi, 2006). The NIMS Handbook stated that there is currently no centralized
national identity database and no system of National Identity Management which efficiently
links public and private sector identity schemes. While the financial services sector has been
most proactive in the deployment of identification schemes for delivery of its services, several
different identification schemes and databases by the various institutions offering services to that
person has led to the duplication of an individual’s identity. Government agencies also hold a
system for verification and secure authentication of an individual’s identity is still being
fashioned out with the plan introduction of the NIN project, which is a means of having a
dependable data base of its citizens (Omoniyi, 2012). Therefore, there is need for contributions
to have viable national network architecture (deployment map) for an identification management
system in Nigeria.
For the national identification management system, a low cost deployment map that allows
building on existing technology to create highly efficient, integrated systems that collect,
manage, organize, and disseminate information throughout different sectors in both public and
8
2.1.2.1 Processes to have Identification Card
There have been different intended approaches to achieve the national identification project
among which is the talked about synergy among Nigerian Communications Commission (NCC),
NIMC and the Federal Road Safety Commission (FRSC) to deliver a national database, which
will effectively capture the details of Nigerians (Aginam, 2008). The outcome of this has not
been seen, though NCC is to transfer the data compiled during the SIM card registration to
(www.nimc.gov.ng).
The unique NIN is principally meant to give the country a dependable data base of its millions of
citizens, a process that has never been entirely completed in any programme in the past. The NIN
Enrolment consists of the recording of an individual’s demographic data and the capture of the
9
10 fingerprints, head to shoulder facial picture and digital signature which are all used to
crosscheck existing data in the national identity data base, to confirm that there is no previous
entry of the same data. Once this process is completed the data is then stored with the unique
number known as NIN (Omoniyi, 2012). When the numbers are issued, they will be uploaded on
2012). This number when issued to a person cannot be used again, even if the person to whom it
is issued dies. It is the number that ties all the relevant records of a person in the data base and is
used to verify diverse identities. Access to the database is secure and graduated and that every
resident from 16 and above would soon be mandated by law to register their NIN or they would
It is a unique identification number that every citizen and legal permanent resident must have. It
helps the government to plan. It is to differentiate two or more people with the same names. This
makes identification easier. A lot of other information like home address, phone number, date of
birth, parent’s information, DNA information, criminal record, driving record, marriage
information and even employment record of people are stored with the number. Hence, a
complete life history of a person can be pulled from the computer (by authorized government
Presently, Nigeria Interbank Settlement System (NIBSS) is working in collaboration with NIMC
to integrate the Nigeria Central Switch, NCS, operated by NIBSS with the NIMS. This
integration will enable banks to conduct identity verification on NIMS through NIBSS to issue
10
The front-end partners (FEP), of the NIMC had agreed with NIMC, CBN, and NIBSS that
starting from 1st of September 2012, they would commence an enrolment exercise for all banks’
customers nationwide with a view to capturing their biometrics, issuing them the National
Identity Numbers (NIN) and the General Multi-Purpose Identity Cards (GMPC), as well as
providing verification infrastructure for linking their bank accounts to the issued NIN within the
NIMC data base. This enrolment exercise was planned to be completed by the 31st December
Many countries around the world have either implemented, or are in the process of embarking on
national ID projects. The key motives behind such initiatives is to improve the identification and
authentication mechanisms in order to reduce crime, combat terrorism, eliminate identity theft,
control immigration, stop benefit fraud, and provide better service to both citizens and legal
immigrants (Al-Khouri, 2006). Many countries around the world have national identification
cards, although the type of card and the purposes for which it is used varies (Wang, 2003). The
majority of cards in developed nations contain name, sex, and date of birth and some with
photographs and fingerprints (Wang, 2003). Some nations have much more data on their cards.
Wang (2003) cited examples and the purpose of identification card management in some
countries. In Korea, the card has name, birth date, permanent address, current address, military
record, issuing agency, issued date, photograph, national identification number, and prints of
both thumbs.
The Italian card contains identity number, name, photo, signature, fingerprint, date and place of
birth, citizenship, residency, address, marital status, profession, and physical characteristics. In
Spain, when someone works under contract the identification must be used to demonstrate work
11
eligibility, and it also is used for the health care system. In Kenya, the national identity card is
required to get a job, get married, purchase or sell land, or register to vote. In Belgium, everyone
over the age of fifteen is required to carry the identification card at all times. The card is used for
banking, billing, rental agreements, proof of age when buying alcohol and cigarettes, or entering
an adult-only business. A police officer can ask to see the card of anyone in a public space and
does not need to have any particular justification (Wang, 2003). As a result of the rapid growth
of the economy as well as the population over the past few years in the United Arab Emirates
(UAE), the project which was kicked off in June 2003, aimed to develop a modern identity
management system with two strategic objectives addressing security and economical
This work is anchored on Technology Acceptance Model (TAM) which is widely studied and
verified by different studies that examine the individual technology acceptance behavior in
Technology Acceptance Model has been developed by Davis, (1989) is one of the most popular
research models to predict use and acceptance of information systems and technology by
individual users. TAM has been widely studied and verified by different studies that examine the
In TAM model, there are two factors perceived usefulness and perceived ease of use is relevant
in computer use behaviors. Davis defines perceived usefulness as the prospective user’s
subjective probability that using a specific application system will enhance his or her job or life
performance. Perceive ease of use (EOU) can be defined as the degree to which the prospective
12
user expects the target system to be free of effort. Behavioral intention is the measure of the
Chau and Hu (2002) combined the factor of peer Influence with Technology Acceptance Model.
According to study by Franco and Roldan (2005) the relationship between perceived usefulness
and behavioral intention was strong among goal‐directed users. Chau and Hu (2001) compared
three models Technology Acceptance Model (TAM), the Theory of Planned Behavior (TPB),
and a decomposed TPB model that is potentially adequate in the targeted healthcare professional
setting in Hong Kong. The results indicated that TAM was superior to TPB in explaining the
physicians’ intention to use telemedicine technology. The study conducted by Sun and Zhang,
(2003) found voluntariness can be factor in determining the behavioral intention to use.
Mba, Nwogbaga, and Nnaji, (2018), analyzed the establishment of the National Identity
Management Commission (NIMC) by Act No. 23 of 2007 to replace the defunct Directorate of
National Civil Registration (DNCR) was aimed at reforming the identity sector in Nigeria and to
provide a unified or centralized National Identity Database and secured means to irrefutably
assert the identity of Nigerians which we saw as a veritable or rather key to nation building in
Nigeria. But as of June 2016, only about 9.5million Nigerians had been captured into the
National Identity Database (NIDB) and as of May 2016, only about above 1million National “e-
ID” card had been produced and about 300,000 National e-ID cards collected. This propelled our
search light on the challenges and prospects of NIMC in the light of modernization prism.
Relying quantitatively on secondary data, this study reflected on the roles, challenges and
prospects of NIMC in nation building and recommended integrated information system to realize
13
Ojaide, (2010), examined an effective national identification system is a necessity in any national
government for the proper implementation and execution of its governmental policies and duties.
This thesis aims at restructuring Nigeria national identification system so as to make it effective
in addressing its political and civil problems, which ranges from manipulated census count
figures and electoral fraud to economic fraud and civil problems. These problems are arguably
restructured Nigeria national identification system to help address these political and civil
problems. The proposed identification system is designed such that it will help to address
identification problems in general, reduce elections and census count fraud to a minimum and be
Focus Group Technical Report, (2016), evaluated the status and characteristics of 48 national
evaluation of how these programs are being connected to or used for service provision. The
identity programs reviewed are mainly government-issued national IDs. However, other types of
national identity programs with links to various services including voter cards, passports, and
two programs targeting the poor and the banking population were also reviewed. Following a
brief review of the roles of identity systems in development and recent identity system trends, an
overview of the 48 national identity programs, including technical features (such as whether
the report. The implementation challenges around accountability, privacy, data management,
enrollment, coverage, cost, and harmonization of identity programs were also reviewed. Finally,
the functional applications of national identity programs, reporting how these programs are
14
linked with services in finance, health, agriculture, elections, and other areas, and analyzing
whether particular identity program characteristics are associated with functional applications are
Ibrahim and Abubakar, (2016), Despite several debates on the implementation of Identity
Management System in Nigeria. IDMS stands to play an important role on economic growth,
social capital and political development in a country. It is argued that IDMS represents a new
“General Multi-Purpose Smart Card” with the potential view to link a secure database with
sees the application and use of Identity Management System as generating higher national
Oluyemi, Ebelogu, Agu and Hammawa, (2019), evaluated the Nigeria’s national identity systems
that exist today, which were developed on centralized data management system, may soon
present operational risks for citizens and government agencies due to single points of trust and
failure which make the system vulnerable to attack. Decentralized identity management system
is a solution to address this challenge, which specifies a user-focused approach that gives full
control of identity back to the individual. This paper proposes the blockchain, which is a secure
and decentralized system, as the platform to achieve this. Taking Nigerian’s National Identity
proposed. Models for identity creation, modification, authentication and disclosure are presented.
Prevention of Sybil attack and developing of handshake protocol model for identity attribute
disclosure are other contributions. Lastly, a prototype of the proposed system is developed in
15
Python programming language to demonstrate the salient features that meet the research
objectives.
In summary, the National Identity Management Commission and design an automated system to
manage identity cards. It considers the conceptual framework that includes core concept of
identity card, identification system in Nigeria, processes to have identification card, national
management in other countries. This work is also anchored on Technology Acceptance Model
(TAM) which is widely studied and verified by different studies that examine the individual
technology acceptance behavior in different information systems constructs. And also considers
16
CHAPTER 3
RESEARCH METHODOLOGY
3.1 INTRODUCTION
This section will offer a description of the existing system, derive its limitations and also provide
an in depth description on the proposed national identity card management system. It will also
lay out the targeted objectives of the proposed system. The section will also look at the
differences between the existing system and the proposed system and also describe its feasibility
study. The design process will also be displayed using unified modeling languages.
During the course of this study, the researcher applied different method of finding fact. The
methods include.
i. Interview: The researcher visited the National Identity Management Commission Office
(especially the Administrative, Field Operation, Local government) which was used as a
case study and interviewed the staff and personnel available on seat orally. The persons
involved responded to the interviewed question to the best to their knowledge. The facts
and answers incurred from the discussion made it possible for the researcher. to begin the
What are the major rules of the operation and Border patrol section over the
What are the objectives of the existing National identity card processing system?
17
What are the problems encountered by both the operation/Border Patrol as well as
ii. References to Written Document and Manual: The researcher addition to her findings
visited some libraries and the department of national civic registrations library and made
references to already written document for more details concerning this study. To this
effect, the fact provided by the referenced next made it possible for the completion of the
study work.
18
3.4 ANALYSES OF THE EXISTING SYSTEM
There already exists a semi-computerized sector in the management of identity cards. But its
existence does not give full criteria of what is required to process a particular identity card. The
computer present is only used to document the details of registered users for printing using
Microsoft Word while the rest activities are carried out manually. The parable mode of operation
is very expensive to maintain and it is very difficult to operate. This is because a high number of
registered citizens which creates intensive tasks for the workers to maintain and thereby give
The ‘input’ being rigid, does not allow easy operation in the case of error because it is made on
paper. To this effect, there is no room for easy update because of its ancient system set up. Data
update and assessment update is not reliable due to partial manual operation in its achievement.
Report Generation which aids processing of national identity card are not made timely therefore
delays fast decision. Also, it is always not as accurate as desired by the management due to a lot
of discrepancies during the processing even when there is a need of inspection to know how the
Therefore, the existing system has failed to meet up entirely with the expectation requested of it
before the design started. This is a result of the advancement in the society which has outgrown
i. Input Analysis: The input to the system is made on papers in forms. The forms are filled
by the National Identity applicant and submitted to the clearance officer for clearance
then to the duty clerk who files it and makes it flow. Before a form is issued to the
19
Letter of identification from the local government through the councilor in charge
of your areas.
And until these conditions are met, no applicant can be given a right to fill a form in procurement
for a national identity card. Since the input is very rigid, it does not allow for easy correction of
data if any mistake is noticed. Also due to the mistakes and clean up using fluids, it makes input
ii. Process Analysis: The processing analysis is the use of laid down conditions in assessing
the application record. This processing is a careful exercise. It takes a lot of time to come
to a conclusion on whether to issue national identity card to an applicant or not. This also
involved the checking of the validation of the supplied record by the Applicant.
iii. Output Analysis: The output is the National identity card booklet information which
builds up the national identity card holders records with the Department of national civic
Registration or the ministry of internal affairs and national identity card section. These
records are kept for security purposes and for the major purposes of references when
necessary.
The sample below shows the national identity card output. The management when necessary
20
ID card form
The propose system consists of the Integrated Database created from the simulation of National
technologies which give users ability to access it from any location. Users can fill and upload
their data when allowed by the admin. Users can also request for a change of details which are
i. Citizens’ data populate automatically from existing national databases to form authentic
ii. Citizens who have incomplete data are notified to upload the required documents
iii. On successful registration, a unique identification number is generated for each user.
21
iv. Admin can print the national identity card and issue to users
Computers have added immense effort in the monitoring of national identity card holders in and
out of Nigeria. Since we are in the path of information technology growth, we need the basic
capability to install and use advanced computers. With computer installed in NIMC (especially
Easy data storage, update and retrieved very easy and accurate.
At the center of any on-line, real-time information system, one needs a database
information. This facilitates the rapid storage, classification, retrieved, update as well as
In future, we will see the rapid introduction of intelligent work stations which are able to
Incremental methodology was used in this study. In incremental model the whole requirement is
divided into various builds. Multiple development cycles take place here, making the life cycle a
“multi-waterfall” cycle. Cycles are divided-up into smaller, more easily managed modules. Each
module passes through the requirements, design, implementation and testing phases. A working
version of software is produced during the first module, so you have working software early on
22
during the software life cycle. Each subsequent release of the module adds function to the
pervious release. The process continuous till the complete system is achieved.
The advantage of the incremental model is that it generates working software quickly and early
during the software life cycle; and this model is more flexible, less costly to change scope and
requirements. It is also easier to test and debug during a smaller iteration. In this model customer
can respond to each built; it also has a lower initial delivery cost; easier risk management
Disadvantage of the incremental model is that it needs a clear and complete definition of the
whole system before it can be broken down and built incrementally. The total cost is higher than
waterfall. We use the incremental model when the requirements of the complete system are
clearly defined and understood. The major requirement must be defined; however, some details
can evolve with time. There is a need to get a product to the market early. And resources with
The purpose of the system is to produce specifications, which will enable a complete, accurate
and specialized implementation of the new system. The new system designed after a detailed
analysis of the existing system. The functional units of the existing system were included the
problem associated with them were detected and possible solutions proffered in the new design.
The client/server architecture has been use in the development of this system. There the database
application and the database are separated into two parts: a front-end or client portion, and a
23
backend or server portion. The client executes the database application that accesses database
information and interacts with a user through the keyboard, screen, and pointing device such as a
mouse. The server executes the software and handles the functions required for concurrent,
Although the client application and SQL can be executed on the same computer, it may
be more efficient and effective when the client portion(s) and server portion are executed by
different computers connected via a network. The following sections discuss possible variants in
Note: In a distributed database, one server may need to access a database on another server. In
24
Figure 2: system architecture-client/server
The input to the system is flexible and precise. It is also supplied through the system is flexible
Surname:
Sex: age:
Date of birth:
Height:
Current address:
Profession:
Marital status:
Next of kin:
Blood group:
Genotype:
25
Also, there are some spaces reserved for the officers in charge of National identity card section.
Profession / occupation:
Special features
Maiden name
Surname:
Address:
Applicants origin:
Place: state:
Id form number:
26
Personal number:
Here, the input is determined by the output. The output is very precise and comprehensive. It is
the report generated on citizen issued with the National Identity Card. Also the output design
Name:
Address:
Age:
Sex:
Marital status:
Date of birth:
State of origin:
Height:
Current address:
Profession:
Occupation:
Next of kin:
Genotype:
27
NATIONAL IDENTITIY CARD FORMAT
ADDRESS:……………….. TOWN:……………………………….
AGE:…………………………….. STATE:……………………………….
PROFESSION/OCCUPATION:…………………………………………
R.C:…………………..SEQUENCE N0…………………….
The file design was for the purpose of good storage of received data., proper management
assessment and reliable retrieval of data. MySQL database was used for the storage and has the
following structure.
28
FILE STRUCTURE
VARIABLE
WIDTH
NAME
FIELD
TYPE
1 SURNAME SN CHARACTER 15
2 OTHERNAME ON CHARACTER 20
3 SEX SE CHARACTER 3
9 HEIGHT HE CHARACTER 3
15 PLACE PL CHARACTER 8
16 STATE ST CHARACTER 8
18
RC RC NUMERIC 8
19 SEQUENCE NUMBER SN NUMERIC 3
29
3.7.4 Unified Modeling Language Diagram
A formal model of the proposed system is built using Unified Modeling Language
(UML). The UML is a modeling system which provides a set of conventions that are used to
describe a software system in terms of objects. It offers diagrams that provide different
perspective views of the system parts. The UML diagrams used to model the system are;
i. Procedure Chart: This is a chart on which are graphically shown in sequence the separate
Procedure Chart:
30
ii. Flowchart: A flowchart is simply a graphical representation of steps. It shows steps in
sequential order and is widely used in presenting the flow of algorithms, workflow or
processes. Typically, a flowchart shows the steps as boxes of various kinds, and their
Flowchart
31
iii. Information Diagram
32
CHAPTER 4
4.1 INTRODUCTION
System implementation involves checking each of the system modules to make sure that they are
functioning properly. A design may be implemented in various ways depending on the priorities
of the software developer. In this work, several factors were taken into consideration during
Correctness: The implementation was carried out with the aim of the final product
system response.
Performance: Software performance is the extent to which a product meets its constraints
regards speed / response time and appropriate search techniques were employed to ensure
PHP was chosen as the programming language which serves as the client to enable me to create the
input and output forms while the MySQL database was used as the database server. PHP is a
programming. For most software applications there exists a wide variety of languages in which the
33
application may be implemented. Apart from mere suitability of the programming languages, many
factors influenced the use of PHP as the programming language for the source code shown in the
i. Speed: Being a compiled language, it is very fast and speed is important in database
application.
iii. Efficient: The final code tends to be compact and run quickly.
source code.
each module is assigned a specific function. This will make maintenance of the system
easier.
vi. Security: it has proper backups, quality control mechanism for all modules and
The system requirements specification encompasses the minimum hardware and software
requirements that will be required by the application to ensure smooth running and performance.
enables flexibility to do whatever the user wants. This package can only be run and developed
34
Client side
The system functions well with a good computer compatible with a hard disk drive of 30GB.
This is needed to save the program so that it can be made available any time. It requires a visual
display unit (VDU) of high resolution and graphic ability for good display of all outputs. A
functional CDROM / external drive is needed to be used as backup or disk in case the programs
served on hard disk is eventually destroyed by a virus. An uninterrupted power supply (UPS) is
needed to sustain power failure for sometimes whenever PHCH puts of power supply. This
software requires the following minimum hardware for its development and running;
35
iii. Minimum Hard disk: 30GB
Test Cases
36
Test Case Number 2.0
Output Successful
The program complexity were broken down into simpler units and solved separately and
individually. The units were represented as module in the artifacts of the design. This makes it
easy for modifications in order to meet with the new technological changes. There were a total of
five modules in the entire program design. As earlier, stated. The modules were represented
individually.
Home Module: This is the landing page when any user visits the website
37
Login Module: The admin and standard users can log in from here
38
Registered citizens: Displays all the registered citizens with their unique ID
New user: New user is created from here to manage registration but with fewer
privileges
39
Announcements: Admin can add announcement to all the users
Print ID: This shows the hardcopy printing of the generated ID cards
40
4.6 PROGRAM FLOWCHARTS
41
ii. Update record flowchart
42
iii. Delete record flowchart
43
iv. Display record flowchart
4.7 DOCUMENTATION
This section details the manual guide on how to run the program effectively. All the steps that
will help in the smooth running and operating or using the program are all documented.
NOTE: The software is live and interacts with database. The host computer must have a running
2. Copy nimc fold to C:/xamp/htdocs if you are using XAMPP or C:/wamp/www folder
44
4. Click on import then select the cert.sql file in database folder
Username: admin
Password: 123456
Username: cuzzy
Password: 123456
45
CHAPTER 5
5.1 SUMMARY
The work has been designed and computerized for the National Identity Card section of the
Management Commission (NIMC). To assess and monitor the procurement of the National
Identity Card by individuals in order to eradicate the forgery and duplication of National Identity
Cards thereby restricting individuals only to one national identity card for citizens. Using PHP
5.2 CONCLUSION
Computer has made work very ready and interesting. The national identity card as produced in
time and adequate measures are taken to maintain proper record and security pursuits. This work
made the staff to have more time to them. Also by implementing of this work, the huge
5.3 RECOMMENDATION
Computer has all times proven its superiority over every other technological invention. To this
Every aspect of the National Identity Card operation should cease to a manual operation.
A system analyst should be employed to make-up the board of decision that are
responsible for planning and implementing the attire of National Identity Card issuance
and assessment.
The workers should be given more incentives to enable them put in relenting efforts in
46
The computerization should be maintained up-to date at all times.
Security code inscription should be maintained on all the National Identity Card.
The program should be modified to suit all the sections of Department of national civic
registration.
47
REFERENCES
Adesanya, A. (2020). National identity app not yet approved for public use—NIMC. Business
Post. https://businesspost.ng/general/national-identity-app-not-yet-approved-for-public-
use-nimc/.
Aginam, E. 2008. Mobile Fraud - NCC to Collaborate with National ID Commission on SIM
Card Registration. Vanguard Newspaper. Accessed on May 10, 2011 at
allafrica.com/stories/200808181274.html
Akinlabi, A. 2006. Nigeria National Identification Card -Its Costs and Benefits. Accessed on
May 10, 2011 at www.gamji.com/article6000/NEWS6202.htm
Bozbeyoglu, A. C. (2011). Citizenship rights in a surveillance society: The case of the electronic
ID card in Turkey. Surveillance & Society, 9(1/2), 64–79.
Clark, V. L. P., & Ivankova, N. V. (2015). Mixed methods research: A guide to the field, 3(9).
Sage publications.
Court, A. (2014). Branding Nigeria: MasterCard-backed I.D. is also a debit card and a passport.
Cnn.Com. http://edition.cnn.com/2014/09/25/business/branding-nigeria-mastercard-
backed-i-d-/index.html.
Creswell, J. W., & Clark, V. L. P. (2017). Designing and conducting mixed methods research.
Sage publications.
Curry, L., & Nunez-Smith, M. (2014). Mixed methods in health sciences research: A practical
primer, 1(2). Sage publications.
Dahir, A., & Mureithi, C. (2020). Kenya’s High Court delays national biometric ID Program.
New York Times. https://www.nytimes.com/2020/01/31/world/africa/kenya-biometric-
ID-registry.html.
Dunn, H. S. (2020). Risking identity: A case study of Jamaica’s short-lived national ID system.
Journal of Information, Communication and Ethics in Society.
Gelb, A., & Clark, J. (2013). Identification for development: The biometrics revolution. Center
for Global Development Working Paper, 315.
48
Gelb, A., & Metz, A. D. (2018). Identification revolution: Can digital ID be harnessed for
development? Brookings Institution Press.
George C. Paul, (2005). Concerns about National ID Cards. Accessed on May 10, 2011 at
http://www.frost.com/prod/servlet/market-insight-top.pag?docid=38947972
Global Partnership for Financial Inclusion. (2018). G20 digital identity onboarding. World Bank.
https://books.google.co.uk/books?id=TZc8zQEACAAJ.
Goel, V. (2018). India’s top court limits sweep of biometric ID program. The New York Times.
https://www.nytimes.com/2018/09/26/technology/india-id-aadhaar-supreme-court.html.
Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. The British Journal of
Sociology, 51(4), 605–622.
Hammouchi, H., et al. (2019). Digging Deeper into Data Breaches: An Exploratory Data
Analysis of Hacking Breaches Over Time. Procedia Computer Science, 151, 1004–1009.
Hersey, F. (2021) Centralized, decentralized or neither: Which national digital ID system will
you choose? Biometric update. Available from:
https://www.biometricupdate.com/202112/centralized-decentralized-or-neither-which-
national-digital-id-system-will-you-choose [Accessed 24/03/22].
Ibekwe, N. (2015). Over N121 billion wasted, Nigeria’s troubled National ID Card project in
fresh controversy. Premium Times.
https://www.premiumtimesng.com/news/headlines/183720-over-n121-billion-wasted-
nigerias-troubled-national-id-card-project-in-fresh-controversy.html.
Ibrahim, I. A. & Abubakar, Y., (2016). The Importance of Identity Management Systems in
Developing Countries. International Journal of Innovative Research in Engineering &
Management (IJIREM), ISSN: 2350-0557, Volume-3(1), 1-12
Ifeoma, P. (2020). National digital identity card: NGO seeks injunction against NIMC over data
breach…. DNL legal and style. https://dnllegalandstyle.com/2020/national-digital-
identity-card-ngo-seeks-injunction-against-nimc-over-data-breach/.
Johnson, J. (2021) Nigeria internet user penetration 2026. [Online] Statista. Available from:
https://www.statista.com/statistics/484918/internet-user-reach-nigeria/[Accessed
25/03/22].
49
Khaira, R. (2018). Rs 500, 10 minutes, and you have access to billion Aadhaar details. The
Tribune. https://www.tribuneindia.com/news/archive/nation/rs-500-10-minutes-and-you-
have-access-to-billion-aadhaar-details-523361.
Komolafe Babajide 2011. Customers to provide National Identity Number at banks – CBN. June
1, Vanguard Newspaper.
Lyon, D. (2009). National IDs in a global world: Surveillance, security, and citizenship. Case
Western Reserve Journal of International Law, 42, 607.
MacDonald, L. 2011. Leapfrogging Technology, the Case for Biometrics: Alan Gelb Accessed
on May 10, 2011 at
http://blogs.cgdev.org/global_prosperity_wonkcast/2011/01/11/leapfrogging-
technologythe-case-for-biometrics-alan-gelb/.
Mba, I. K., Nwogbaga, D. & Nnaji, F., (2018). The Philosophy and Politics of National Identity
Management in Nigeria: A Case for Nation-Building. African Journal of Politics and
Administrative Studies, 11(1),
National Bureau of Statistics, Facts and Figures about Nigeria, 2008. Accessed on May 10, 2011
at http://www.nigerianstat.gov.ng/ext/latest_release/Fact08.zip
National Identity Management Commission, 2011. Public Notice on the Proposed Adoption of
Biometrics and Demographics Data Standards and Verification Procedure for the
National Identity Management System (NIMS). Accessed on May 10, 2011 at
http://www.nimc.gov.ng/downloads/adverts/Public_Notice_on_Proposed_Biometrics.pdf
Obi, E. U. 2006. National Identification Policy for Nigeria: An Action Agenda. Accessed on
May 10, 2011 at www.dawodu.com/obi6.htm
Oketola, Dayo 2012. Nigerians to get national identity numbers in May: March 26, Punch
Newspaper. Monday, 02 April. Daily Trust online
Oluyemi A., Ebelogu, C. U., Agu E. O. & Hammawa, M. B., (2019). Development of a National
Identity Management System using Blockchain Technology, 12(4), 13-36; ISSN 2006-
1781
50
Ominyi O. A. (2012). "Information-Theoretically Secure Data Origin Authentication with
Quantum and Classical Resources". Cryptography. 4 (4): 31-41. arXiv:2011.06849.
doi:10.3390/cryptography4040031. S2CID 226956062.
Paul, C., (2007). identity card processing effects and benefits: Kleen University Press.
Wang, T.V. 2003. The Debate Over a National Identification Card. The Century Foundation
Homeland Security Project, Issue in Brief. Accessed on May 10, 2011 at
http://tcf.org/publications/pdfs/pb284/National_ID_Card.pdf.
51
APPENDIX
Source Codes
<?php
session_start();
$current = $_SESSION['username'];
?>
<!DOCTYPE html>
<html>
<style>
input[type=text], input[type=password] {
width: 100%;
margin: 8px 0;
display: inline-block;
box-sizing: border-box;
</style>
52
<body>
</div>
<li><a href="announcements.php">Announcements</a></li>
>)</a></li>
</ul>
<div class="container">
<h2>Registered citizens</h2>
<table class="w3-table-all">
<tr>
<th>NAME</th>
<th>date of birth</th>
<th>ADDRESS</th>
<th>BLOOD GROUP</th>
<th>TOWN</th>
<th>L.G.A</th>
53
<th>STATE</th>
<th>OCCUPATION</th>
<th>PHONE NUMBER</th>
<th>VIEW</th>
<th>DELETE</th>
</tr>
<?php
include 'database_configuration.php';
$result = $conn->query($sql);
if ($result->num_rows > 0) {
while($row = $result->fetch_assoc()) {
id='.$row['regstrationid'].'">View</a>';
id='.$row['regstrationid'].'">Delete</a>';
} else {
54
print '
</div>';
$conn->close();
?>
</table>
</footer>
55