Sponsored
    Follow Us:
Sponsored

Q.1 What is UIDAI Secure QR Code? How QR Code enhance the security of e-Aadhaar?

Ans. UIDAI e-Aadhaar letter contains a Aadhaar secure QR code. UIDAI has replaced existing QR code, on e-Aadhaar, having Resident’s demographic details with a secured QR Code which contains digitally signed data like last 4 digits of Aadhaar number, demographic data like name, address, gender, and date of birth, and photograph of the Aadhaar number holder etc. There will be two QR Codes – Small one on front side of cutaway portion with demographic data only; and a large one on top portion of front side and rear side of cutaway portion, with demographic data and photo. Further, to make this Information more secured and tamper-proof, it will be signed with UIDAI digital signature. This new digitally signed QR code can be read ONLY using UIDAI’s windows based Custom client for desktops/laptops and validate it against UIDAI digital signatures in real time. Therefore, any fraud attempted on e-Aadhaar can be easily detected by using QR Code scanner

Q.2 What information does new Secure QR Code of e-Aadhaar contain?

Ans. Both QR codes of e-Aadhaar contain demographic details of resident like Name, Address, Date of Birth, Gender and Masked Aadhaar Number i.e. last 4 digits of the Aadhaar number. In addition, the larger QR code contains photograph also

Q.3 How can someone read new secure QR code available on e-Aadhaar?

Ans. The new digitally signed QR code can be read by ONLY using UIDAI’s windows based application and validate it against UIDAI digital signatures. Application can be downloaded from uidai.gov.in. Additionally, a good quality STQC certified QR Code scanner will be required.

Important: It is recommended to print e-Aadhaar having this secure QR code using LaserJet printer only

Q.4 How QR Scanner and UIDAI Application will work?

Ans. Post installation of UIDAI’s QR code reader application, secure QR code of e-Aadhaar need to be scanned using the physical scanner in line with UIDAI Specifications. The application will display the demographic details of resident once the QR Code of e-Aadhaar is digitally verified by UIDAI at backend and give scan QR Code verified. In case the digital signature is not verified the reader displays QR Code not verified GUI Screen.

Q.5 Who all can use secure QR code of e-Aadhaar?

Ans. Anyone, whether a Aadhaar Holder or an User/Service Agencies like Banks, AUAs, KUAs etc can use this facility for offline verification of the data in e-Aadhaar.

Note:- On 20th February 2018 new QR Code was implemented on e-Aadhaar and the QR Code reader client is available on uidai.gov.in from 27th March 2018.

Q.6 What is Hashing?

Ans. Hashing is an algorithm that calculates a fixed-size bit string value from a file. A file basically contains blocks of data. Hashing transforms this data into a far shorter fixed-length value or key which represents the original string. The hash value can be considered the distilled summary of everything within that file.

A good hashing algorithm would exhibit a property called the avalanche effect, where the resulting hash output would change significantly or entirely even when a single bit or byte of data within a file is changed. A hash function that does not do this is considered to have poor randomization, which would be easy to break by hackers.

A hash is usually a hexadecimal string of several characters. Hashing is also a unidirectional process so you can never work backwards to get back the original data.

A hash is usually a hexadecimal string of several characters. Hashing is also a unidirectional process so you can never work backwards to get back the original data

Q.7 What are the benefits of Hashing?

Ans. One main use of hashing is to compare two files for equality. Without opening two document files to compare them word-for-word, the calculated hash values of these files will allow the owner to know immediately if they are different.

Hashing is also used to verify the integrity of a file after it has been transferred from one place to another, typically in a file backup program like SyncBack. To ensure the transferred file is not corrupted, a user can compare the hash value of both files. If they are the same, then the transferred file is an identical copy.

In some situations, an encrypted file may be designed to never change the file size nor the last modification date and time (for example, virtual drive container files). In such cases, it would be impossible to tell at a glance if two similar files are different or not, but the hash values would easily tell these files apart if they are different.

Q.8 Why is it needed for our QR Code Client?

Ans. Comparing HASH will ensure that the client that has been downloaded is the one that was provided by UIDAI. UIDAI will provide SHA-1 and SHA-256 for verification

Q.9 Where can I find the Public Certificate for Digital Signature validation?

Ans. Public certificate for Digital signature validation can be downloaded from here

Sponsored

Tags:

Join Taxguru’s Network for Latest updates on Income Tax, GST, Company Law, Corporate Laws and other related subjects.

Leave a Comment

Your email address will not be published. Required fields are marked *

Sponsored
Sponsored
Search Post by Date
July 2024
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
293031