0% found this document useful (0 votes)
62 views

Certificate - 1

This document summarizes several research papers on certificate generation systems. It discusses systems that allow users to dynamically generate certificates based on entered participant information. The certificates can be customized with different template designs and downloaded in compressed format. Blockchain technology is also described for generating certificates in an open and transparent manner to prevent forgery. Database security methods involving dynamic certificates for each query are also reviewed.

Uploaded by

akshay kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views

Certificate - 1

This document summarizes several research papers on certificate generation systems. It discusses systems that allow users to dynamically generate certificates based on entered participant information. The certificates can be customized with different template designs and downloaded in compressed format. Blockchain technology is also described for generating certificates in an open and transparent manner to prevent forgery. Database security methods involving dynamic certificates for each query are also reviewed.

Uploaded by

akshay kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal of Research in Engineering, Science and Management 570

Volume-3, Issue-8, August-2020


journals.resaim.com/ijresm | ISSN (Online): 2581-5792 | RESAIM Publishing

Certificate Generation System


Bharti Chikankar1*, Sidhant Jaiswal2
1
Student, Department of Computer Science and Engineering, Jhulelal Institute of Technology, Nagpur, India
2
Professor, Department of Computer Science and Engineering, Jhulelal Institute of Technology, Nagpur, India
*Corresponding author: [email protected]

Abstract: This paper presents an e-certificate generation system results.


with elegant template designs that contributes to the environment Such primitive systems are highly scalable and developed for
by saving trees and organizational resources with concise planning medium cap and large-cap industries with a large horde of
and effective management of records. The system is not only
designed and developed to save paper but also to organize the employees working in the industry. A login and signup system
distribution in an effective way to minimize aberration and speed are available to authenticate the access to the users for the
up the process 100 times it usually takes with a simple and user- accounts. The user needs to enter the organizational details and
friendly design interface. This research work enables an end-user create the event for the generation of certificates. The user is
to choose their desired certificate template and template format asked to select the templates amongst the available template
without any prerequisite knowledge just by clicking a few buttons designs. The participant details would be entered by the user
and typing from the system GUI.
and the generated certificates can be imported in bulk in zip
Keywords: Certificate, Certificate generation, Certificate format.
template, Certificate verification, Participant, Template format. In this paper [1], they have proposed an application called
Automated Batch Certificate Generation and Verification
1. Introduction System ABCGVS which has been developed based upon client-
The usage of computer software is widespread. Several server technology which can also be used in many other works.
organizations perform their daily activities more efficiently With the coming of client-server technology, many frameworks
using applications founded by the use of computer science are being developed leading to a phenomenally decrease in the
knowledge. Certificate Generation System can be used in expense and the time for building up an application. The main
various universities to automate the distribution of digitally focus is on improving the processing time needed for the
verifiable mark sheets of students to ease the work. This system generation of a certificate and verification systems by enabling
verifies the participants' information from the access database multiple certificates. It allows the end-user to define their
and generates the certificates of all the participants in a portable desired template and template format.
document format.
The paper [2], elaborates research which aims to simplify 2. Literature Survey
the work of clerks working in different sectors that do not have In this paper [3], they have presented research reviewing a
any knowledge in database management, they could still use certificate generation system that is flexible for the generation
this application to get vast amounts of different reports of report-cards and mark sheets of students. The system is
generated from data stored in databases. This can be mainly based upon database technology for fetching data of
implemented in numerous places where databases are used for students and the credit-based grading system (CBGS) which
storage and where various unpredictable reports need to be makes the report more understandable to the users. This paper
generated. Using this ASGRT application it becomes very easy has also elaborated that the development of the system focuses
to make a template for a new report without making a change on describing the tables with columns/rows & sub-columns,
in the application logic, also this can be used in various sectors sub-rows, rules of data selection for calculating credits, and
where database data gathering needs to be automated. summarizing exam data. The developed system mainly targets
The system is also designed and developed to dynamically various enterprises, schools, colleges, and universities for the
generate certificates based upon the user’s entered information. generation of certificates in bulk. The system accesses the
Information of the participants can be imported, deleted, and student's information related to exams and their performances
added for effective customization. It also provides the in various events from the university database and generates the
availability of elegant built-in templates to meet user needs and gadget-sheet and mark-sheets which defines the overall
enlivening the participants for their mesmerizing talent and performance of the student in each sector. The system generates
innovative ideas. The certificates generated in bulk would be it in a portable document format which can be verified easily
downloadable in a compressed format. The system provides and provides the authenticity of the document.
user interface design for user experiences to achieve great The paper [4] presents a survey reviewing Digital Vault
International Journal of Research in Engineering, Science and Management 571
Volume-3, Issue-8, August-2020
journals.resaim.com/ijresm | ISSN (Online): 2581-5792 | RESAIM Publishing

facility, by applying the concept of Digital signatures that 3. Block Details


employs asymmetric cryptography. This paper proposes a
system that consists of a DigiVault [Digital Storage] website
that can be linked with different websites of various
government departments. They have also elaborated that, the
documents generated by the government can be digitally signed
and can also be verified by government authority entitled for
the same purpose. It implemented the concept of Public Key
Infrastructure. The certificates serve as an identity of an
individual for a certain purpose, e.g. a driver's license which
identifies someone who can legally drive in a particular
country. Document Validation will be provided at the user end
where he wants to apply for certain government documents like
Pan Card and Licenses or if one wants to apply for Visa.
This paper [5] elaborates on a survey about the Blockchain,
it is a distributed database that is widely used for recording
distinct transactions. It is the fundamental technology
underlying the emerging cryptocurrencies which also includes
Bitcoin. The key advantage of the blockchain is that it can help
establish a disintermediary peer-to-peer (P2P) transaction. The
transaction is added to a block when a certain consensus among
different nodes is reached, this block already holds records of
several transactions. Each of these blocks contains the hash Fig. 1. Block diagram of the system
value of its respective last counterpart for the connection. All
the blocks are connected and together they form a blockchain. 4. Implementation
Data are distributed among various nodes (the distributed data The proposed system provides the facility to either upload
storage) and are thus decentralized. the details of the participant in the form of a CSV file or add the
This paper describes a new blockchain-based system that participant details manually. The system consists of an
reduces the certificate forgery. Automated certificate-granting amazing, elegant certificate template designs to appreciate the
is open and transparent in the proposed system. Companies or participants with enlivening content. The certificates can be
organizations can rely on the information on any certificate downloaded in the compressed format based on the entered
from the system. This paper presents a system that saves on information. These certificates can be saved (in PDF format)
paper, cuts management costs, prevents document forgery, and and exported in bulk based on inserted information the
provides accurate and reliable information on digital. participant. The implementation of the project of the certificate
In this paper [6], we discuss database security and how to generation system is majorly divided into three main phases.
handle it. This paper has described a new method that protects 1. UI/UX design
the database using dynamic certificates that works for each 2. Designing and Modeling of a database structure.
query to be sent to the database. This paper has truly focused on 3. Development of backend.
the conceptual and logical design, also it has described the
A. Website Design
implementation of a graphical user interface for the stages of
the database life process. The first step of implementation for our project is designing
. The dynamically generated query is more secure as the the user interface for a fluent and seamless user experience with
query is not sent to the database in its pure form it is sent in a simplicity. The functional elements of the web design are
very long and encrypted string. Thus semantically and navigation, speed, animations, user interactions, site structure,
syntactically equivalent queries generated using the Dynamic and cross-browser and cross-device compatibility and are
certificates have proven to be much more efficient than the pure highly scalable with 5ms of loading speed.
queries fired by the user. This method can be run on any The UI/UX design of the web application is designed using
database. If the attacker attacks the database he/she will get the the bootstrap four libraries in CSS and its awful components
encrypted schemas that make the query processing for them a such as mobile responsive navigation bar, modals, cards, and
complicated process. Dynamic certificates not only provide carousels.
data and query confidentiality but also make the database The functional elements of the web design are navigation,
system secret and secure. speed, animations, user interactions, site structure, and cross-
device compatibility.
International Journal of Research in Engineering, Science and Management 572
Volume-3, Issue-8, August-2020
journals.resaim.com/ijresm | ISSN (Online): 2581-5792 | RESAIM Publishing

Fig. 2. Login Page


Fig. 6. Logout Confirmation Modal

B. Database Design
The next most crucial step of this project is designing the
database. There are three entities of the database structure that
are Account Details, Organizational Details, and Participants
Details.
The following are the snapshots of each of the entities with
their structural properties and their codes in SQL to design the
structure.

Fig. 3. User Registration Page

Templates of these certificates may vary to different


organizations and can be provided at the end of a given contract,
project, and desired objective or certain intervals of the project,
contract, or achievement of the desired goal.
Fig. 7. The query of Organization table

The reason behind creating the organization table/entity is to


store the data of the events/organizations created by the
registered users to dynamically generate certificates. The
credentials asked the user by the system at the time of creating
an event/organization are first organization name (org_name),
event name (event name), authorization 1 (auth1), authorization
2 (auth2), authorization 3 (auth3) and their respective
designations (i.e., desig1, desig2, desig3).
C. Backend Design
Fig. 4. Certificate Templates Page
Back-end development refers to the server-side of an
application and everything that communicates between the
database and the browser. The primary focus in backend
development is on the working of the website.
The back-end architecture designed for the proposed system
of certificate generation is based upon the synchronous request
handling send by the clients to the server. The back-end is
designed and developed by using the language PHP in an
object-oriented module with the MVC (Model View
Controller). Now, let us first explore the MVC coding pattern
and then will know how the MVC pattern is implemented in
Fig. 5. Participant’s Detail Page back-end development.
We have used the concept of PDO i.e., PHP data objects
International Journal of Research in Engineering, Science and Management 573
Volume-3, Issue-8, August-2020
journals.resaim.com/ijresm | ISSN (Online): 2581-5792 | RESAIM Publishing

which is useful in preparing secured database queries. Also, the gets the information regarding the event such as event name,
basic secure validation for the users has been done with the help organization name, organizing authorities, and their
of the concepts of session and cookie. A session creates a file designations by the user. All this essential information with
in a temporary directory on the server where registered session proper algorithm design and architecture leads to the successful
variables and their values are stored. This data will be available result of the enlivening certificate to appreciate participants and
to all pages on the site during that visit. A session ends when students. The system saves on paper, cuts management costs,
the user closes the browser or after leaving the site, the server prevents document forgery, and provides accurate and reliable
will terminate the session after a predetermined period. information on digital certificates.

References
[1] Ahmed Dalhatu Yusuf, Moussa Mahamat Boukar, Shahriar Shamiluulu,
“Automated Batch Certificate Generation and Verification System” in
IEEE, November 2017.
[2] Dejan Gjorgjevikj, Gjorgji Madjarov, Ivan Chorbev, Martin Angelovski,
Marjan Georgiev, and Bojan Dikovski, “ASGRT Automated Report
Generation System” in International Conference on ICT Innovations,
January 2011.
[3] Srushti A. Shimpi, Sanket Mandare, Aman Trivedi, Tyagraj Sonawane,
“Certificate Generation System” in International Journal on Recent and
Innovation Trends in Computing and Communication (IJRITCC),
Volume 2, Issue 2, February 2014.
[4] Samit Shivadekar, Stephen Raj Abraham, Sheikh Khalid, "Document
Validation and Verification System", International Journal of Advanced
Research in Computer Engineering & Technology (IJARCET), Volume
5, Issue 3, March 2016.
[5] Neethu Gopal, Vani V Prakash, "Survey on Blockchain-Based Digital
Fig. 8. Generated e-Certificate Certificate System", International Research Journal of Engineering and
Technology (IRJET), Volume 5, Issue 11, Nov. 2018.
[6] Kiran Gautam and Divya Upadhyay, “Implementing Dynamic
5. Conclusion Certificates for Securing Database,” in IEEE 5th International
We have generated an e-certificate generation system which Conference, 25-26 Sept. 2014.

You might also like