JSEA  Vol.7 No.5 , May 2014
Using Database Management System to Generate, Manage and Secure Personal Identification Numbers (PIN)
ABSTRACT

A number of problems are associated with the generation, management and security of PINs, a subset of password. The PINs may be recharge card used by GSM operators or for authentication in ATM. The problems associated with the use of these PINs range from scratching off any of the recharge PIN numbers in recharge card to loss of PIN number or entering invalid number in the case of authentication. It usually takes time for the customer service of the service provider or system administrator to provide convincing solution to these problems promptly when it occurred. PINs generation could seem like simply arranging ranges of number and feeding it into the telecommunication systems such as mobile handsets or ATM to grant access but it requires a specialized and secured way to generate, store and manage it in order to achieve prompt access. This paper focused on the development of database concept to provide solution to these problems by desiging a system by which the PINs generated can be effectively stored and managed so that userss can have immediate access to the PINs if they can provide the identification number on the card. Succintly, the paper discusses the design of a system that generates, manages and secures PINs application using Visual Basic Version 6.0 for designing the front and interface and Microsoft Access 2007 as the database. The system was implemented using real data and the result was successful.


Cite this paper
Akomolafe, D. and Afeni, B. (2014) Using Database Management System to Generate, Manage and Secure Personal Identification Numbers (PIN). Journal of Software Engineering and Applications, 7, 461-469. doi: 10.4236/jsea.2014.75043.
References
[1]   Williams, K.B. and Sawyer, S.C. (1999) Using Information Technology, a Practical Introduction to Computers and Communications. 3rd Edition, McGraw Hill, New York.

[2]   Sopan, T. (2004) Evolution of the Mobile Technology. Instant Book, New Delhi.

[3]   Wikipedia Encyclopedia (2007) Billing in Mobile Communication. www.wikipedia.org

[4]   Encyclopaedia Britannica (2007) Student and Home Edition.

[5]   Hatem, M. (2006) Introduction to Billing Systems. Design and Strategy Articles, USA.

[6]   Stephen, R.S. (1996) Classical and Object-Oriented Software Engineering. McGraw-Hill, New York.

[7]   Pressman, R.S. (2005) Software Engineering A Practitioner’s Approach. 6th Edition, McGraw-Hill, New York.

[8]   Georgia, A.T. (2010) Applications of PIN Numbers. Prisma Book. Pub. Ltd., Marlborough, 12-14.

[9]   Lawrence, H. (2006) Introduction to Mobile Telephone Systems. 2nd Edition, Instant Book, New Delhi.

[10]   Walker, J. (2009) Generation of Genuine Random Numbers. 4th Edition, Landmark Publication, Cedarburg.

[11]   Mathwork, T. (2009) Common Generation Methods. Jasper Publisher Ltd., London.

[12]   Anderson, R. (2008) PIN Generation and Verification Techniques. Jaype Publishers Ltd., New Delhi.

[13]   Zieliński, P. and Bond, M. (2003) Decimalisation Table Attacks for PIN Cracking. University of Cambridge Computer Laboratory, Hill, UK.

[14]   Brown, J.S. (2010). Issues of PIN Security. Cephas Publishing and Co., UK.

[15]   David, M.K. (2000) Database Processing. 7th Edition, Macedonia and Evans, London.

[16]   Microsoft Encarta (2010) Definition of Terms; Database Management.

[17]   Sasha, V.R. (2009) Technology of Subscriber Identity Module (SIM) Card. Berlin.

[18]   Perly, G. (1998) Visual Basic Programming Language. 4th Edition, Wesley Publishing, Tokyo.

 
 
Top