Professional Documents
Culture Documents
Easypay
Easypay
Easypay
ON
Easypay
By
AKASH J. GUPTA
DAYASHANKAR R. CHAUHAN
2019-2020
CERTIFICATE
AKASH J. GUPTA
DAYASHANKAR R. CHAUHAN
With immense please we are presenting “Easypay” Project report as part of the curriculum of
‘Bachelor of Computer Application’. We wish to thank all the people who gave us unending
support.
Akash J. Gupta
Dayashankar R. Chauhan
INDEX
1. Introduction Page
1.1. Introduction To Easypay ………………………………………….. 1-2
1.2. Problem In Existing System ……………………………................ 2-3
1.3. Purpose Of The Easypay ………………………………................. 3
1.4. Scope Of These Easypay ………………………………………… 4
2. System Analysis
2.1.Need For Developing ……………………………………................ 5-6
2.2.System Specification ……………………………………………… 7-9
2.3.Process Models Used With Justification …………………………… 9-11
2.4.Design Principles & Methodology ………………………................ 11-15
2.5.System Architecture ……………………………………................. 16-17
2.6.The Genesis Of UML ………………………………………………. 18-20
3. Feasibility Study
3.1. Technical Feasibility ………………………………………......... 21-24
3.2. Economic Feasibility …………………………………............... 24-25
3.3. Operational Feasibility ………………………………………… 25-26
8. Conclusion ………………………………………….............. 79
9. Bibliography …………………………………………........... 80
1 INTRODUCTION
Easypay (formerly known as Easypay Money) is one of the best payment gateways to accept online
payments with minimal development effort, easy sign-up, and quick onboarding process. You can
start accepting payments securely and seamlessly within your Windows app, within minutes, with
our 100% online hassle-free on boarding process.
“Easy Pay” is digital payment gateway system. Which has aim to gives fast transactions with
security of money which is now a days very helpful for money transfer to any state any and country
in one click. This application provides various of payment system (mobile recharge, gas payment,
water bill, electricity bill, etc.) for customer and merchant get join easy pay. There is high level of
security in application . client comes to join by other reference or advertises by newspaper or
posters etc. Receptionist takes the join if the client wants to pay money using a easy pay by wallet ,
or if the merchant but you don’t have account on easy pay wants to register and join easy pay, the
receptionist will take enquiry from filled by client.
. Admin is giving all security it will be authorization to delete your account but not see your
password and payment withdrawal your account, Admin manages records. Admin offering new
offers by posters or other advertise processes. We have a customer care provides the notes to 24 x 7
for better learning. Customer care display the result by notice board. Admin advertise various
courses by advertises processes (posters, newspapers etc.). Admin hires new update for payment
system and receptionist for receptionists.
Any large, small, individual, trust, NGO, e Commerce, etc can easily register on EasyPay and use the
payment gateway for receiving online payments. The customers will get multiple payment options to
make a payment on the PayKun checkout.
1
The ways these payments are made can be cumbersome, error prone, and expensive. Growth, after
all, is often messy. Payments systems set up decades ago continue to be used sometimes retrofitted,
sometimes force-fitted—to meet the needs of modern corporations. processes to make optimal use of
them. Solution providers (both banks and non-banks) also face challenges, struggling to cobble
together old systems to meet new demands.
Electronic Payment Gateway is present in our country but it’s not very secure. The existing
payment architecture was also lacking the security factor. Most people Doesn’t trust on online
shopping or online transaction because of security. Security is the main issues behind designing of
Gateway. That’s why the proposed architecture is made secure by the implementation of secure
electronic transaction methods. Because of this now only authentic customers can now buy products
from merchant’s site whose bank accounts is enough to buy the required product. At first it’s
checked if the customer is authorized one or not then the whole transaction takes place.
The electronic payment gateway is made secure enough that any authorized customer can easily
trust on it and fearlessly or confidently make payments over the Internet. If this system is to be
implemented in developing countries then strong support of government of that country is required
as there is not much awareness of electronic transaction in developing countries.
Since the actual processing of the data takes place on the remote client the data has to be transported
over the network, which requires a secured format of the transfer method. How to conduct
transactions is to be controlled by the client and advanced techniques implementing the
cryptographic standards in the executing the data transfer transactions. Present day transactions are
considered to be “un-trusted” in terms of security, i.e. they are relatively easy to be hacked. And also
we have to consider the transfer the large amount of data through the network will give errors while
transferring. Nevertheless, sensitive data transfer is to be carried out even if there is lack of an
alternative. Network security in the existing system is the motivation factor for a new system with
higher-level security standards for the information exchange.
People for long time have tried to sort out the problems faced in the general digital communication
system but as these problems exist even now, a secured and easy transfer system evolved and came
2
to be known as the Encryption and Decryption of the data and converting the file to audio format to
be transferred using the ryptographic standards and Steganography. The advantages of this Audio
Steganography are.
The project was designed to eliminate the long-standing problem of inefficiency and corruption in
the maintenance of land records at dispersed and poorly supervised .
Developing a Easypay is a digital payments platform that allows you to transfer cash into the
integrated wallet via online banking, debit cards, and credit cards, or even by depositing cash via
select banks and partners. Using the money in the Easypay wallet, you can pay for a number of
goods without using cash.
You can also use Easypay to pay for Mobile recharges, utility bill payments, book movie or travel
tickets among other things on this Easypay system . Using the money in the Easypay wallet, you can
pay for a number of goods without using cash. Among the transactions you can make on Easypay are
recharges for mobile phones, DTH cable, data cards, etc, as well as postpaid payments for mobile
phones, landline/ broadband, electricity, water and gas bills, etc.
In a cashless economy, all transactions are carried out using different types of payment methods and
this does not involve the physical use of money for the purchase of various goods and services.
Digital payment methods are often easy to make, more convenient and provide customers the
flexibility to make payments from anywhere and at anytime. These are a good alternative to
traditional methods of payment and speeden up transaction cycles.
3
1.4. Scope Of These Easypay
Digital payment is a type of cashless payment where the payment is made through digital nodes.
These digital nodes are used by both, the payer and the payee. Also called electronic payment, no
hard cash or physical form of cash is used in digital payments. Digital payments are entirely made
online and they are convenient, instant, and time-saving.
In order to encourage and promote digital payments in India, the government of India has been
taking several steps. One such step is digital payments. The digital India payments is a part of Digital
India campaign. The aim of digital payment is to make India a paperless, cashless, and digitally
empowered economy.
When we talk about cash payments, we first have to withdraw cash from the bank account. Then, we
can use the cash to pay at stores, shops, etc. Lastly, the shopkeeper goes to the bank and deposits the
cash paid by you. This entire process is time-consuming. On the contrary, in digital payment, the
money is transferred directly from the payer’s bank account to the payee’s account instantly.
The digital payment system in India is convenient and offers the flexibility of making a payment
anytime and anywhere. This method has speeded up the transaction cycle. In addition, post
demonetization, people have slowly started taking the digital payment method. Today, even small
shop owners and small-time merchants are accepting digital payment.
4
2 System Analysis
Thear maney of people living in india do not have bank accounts. But 75% have something
that could be just as good: This computer system have the capacity to make digital payments.
Using a digital payment platform called bKash, People can send money easily and
inexpensively from one Computer wallet to another and receive cash payments at any one of
100,000 agents — mostly mom-and-pop stores — distributed throughout the country. Mobile
transactions always give you the next level of competition for perfection. Consumers are
getting more and more relied on the smart devices.
Leading the race of smart devices, smart phones have made an impeccable space in the lives
of people.
Not only the entertainment segment, but people are vigorously using the technology to buy
and sell everything ranging from grocery to booking tickets for their weekend getaway.
Easy accessibility
Using a mobile wallet for day to day transactions is really simple to begin with. Downloading
the app and creating a user ID and password is all you need to do here.
It is as simple as logging in to your Gmail or Facebook account from your smartphone.
Simple to load money
You can add money to your wallet in easily via net banking, credit card or debit card.
Being able to store these details saves you from the hassle of entering these details every time
you make a transaction and saves time.
.There are many reasons that the world's poorest people have not been considered attractive banking
customers. It's hard for banks to achieve sufficient margins of equity by processing smaller
transactions, and prohibitively expensive to do so when those transactions are made almost entirely
in cash.Digital payments jump right over these barriers. Poor households typically have high
transaction volumes — an attractive proposition for mobile carriers. And customers can build equity
and experience with formal banking by using cash-in cash-out systems operated by networks of
5
agents. Moreover, digital payment products are the ideal medium to reach a large customer base
across a wide territory. Thanks to scale, digital products can be both cheap and profitable.
Leading the race of smart devices, smart phones and computers have made an impeccable space in
the lives of people.
Digital payment methods are often easy to make, more convenient and provide customers the
flexibility to make payments from anywhere and at anytime. These are a good alternative to
traditional methods of payment and speeden up transaction cycles. Post demonetization, people
slowly started embracing digital payments and even small time merchants and shop owners started
accepting payments through the digital mode.
Software Requirement
Hardware Requirement
Hard Disk - 5 GB
Memory -1 GB
Digital Payment
Digital payment occurs when goods or services are purchased through the use of various electronic
mediums. There is no use of cash or cheques in this type of payment method.
6
Requirements for Digital Payment Systems
The success or failure of any on-line payment systems depends not only on technical issues but also
on user’s acceptance. The user’s acceptance depends on a number of issues such as advertisement,
market position, user preferences etc.
1. Atomicity
Atomicity guarantees that either the user’s on- line payment transaction is completed or it does not
take place at all. If the current on-line payment transaction fails then it should be possible to recover
the last stable state. This feature resembles the transactional database systems, in which either a
transaction is committed or rolled back.
2. Anonymity/Privacy
Anonymity suggests that the identity, privacy and personal information of the individuals using the
on- line payment methods should not be disclosed. In some on- line payment methods, it is possible
to trace the individual’s payment details. In case of purchases using Debit Card, it is possible to find
out the purchase details as that information is registered at the vendor and the bank’s databases. So
some on- line payment systems like
3. Scalability
As the on- line payment methods are getting more and more acceptance of the users, the demand for
on- line payment infrastructure will also be increasing rapidly. Payment systems should handle the
addition of users without any performance degradation. To provide the required quality of service
without any performance degradation, the payment systems need a good number of central servers.
The central servers are needed to process or check the payment transactions. The growing demand
for the central servers, limits the scalability of the on- line payment systems.
4. Security
Security is one of the main concerns of the on- line payment methods and it is one of the crucial
issues which decide the general acceptance of any on- line payment methods. Internet is an open
network without any centralized control and the on- line payment systems should be protected
against any security risks to ensure a safe and reliable service to the users.
7
When users are paying on- line they want to be sure that their money transaction is safe and secure.
On the other hand, banks and payment companies and other financial institutions want to keep their
money, financial information and user information in a secure manner to protect it against any
possible misuse.
5. Reliability
As in any other business activity, even in on- line payment methods, the user expects a reliable and
an efficient system. Any on- line payment system would fail, despite of it’s advanced technological
features, if it fails to get the users acceptance and pass their reliability tests. There are many reasons,
which can make the system unreliable to the users. Some of them are Security threats, poor
maintenance and unexpected breakdowns.
6. Usability
Usability is an important characteristic of an interactive product like on- line payments. On-line
payment systems should be user friendly and easy to use. Any on- line payment system with
complicated procedures, complex payment process and other associated complications with the
payment environment, can’t get users acceptance. Poor usability of a web shopping or a payment
method could also discourage on- line shopping. To make the online payments simple and user
friendly, some of the on- line payment systems allow the users to make payments with minimum
authorization and information inputs.
7. Inter operability
In on- line payment Technologies, different users prefer different payment systems. The different
payment systems use different kinds of currencies and the payment systems should support
interoperability between them. If a payment system is inter operable, then it is open and allows other
interested parties to join without confining to a particular currency. In the real life situation, there
should be some sort of mutual agreement between various on- line payment systems to provide the
interoperability. Interoperability can be achieved by the means of open standards for data
transmission protocols and infrastructure. An interoperability system can gain much acceptance and
high level of applicability than individually operating payment systems.
Because of the rapid technological changes, it’s not always easy to get interoperability between
various payment systems.
8
2.3. Process Models Used With Justification
What is Easypay?
Easypay is India’s first computer payments, e-wallet, and commerce platform. Though started as a
recharge platform in 2020, Easypay has subsequently changed its business model to a marketplace
and a virtual bank model. It is also one of the pioneers of the cashback business model.
The company has transformed itself into one of the Indian giants dealing in mobile payments,
banking services, marketplace, gold, recharge and bill payments, etc. who serve around 100 million
registered users.
Model of Easypay
Recharge Services
There was a time when Easypay Business Model consisted just mobile recharge and bill payment
services. Times have changed and online recharge services for pc subscriptions, TV channels
subscriptions, data-card, and metro card, etc have been added to the revenue model of Easypay.
The company, just like other recharge services providers, charge commissions from these operators.
Bill Payment
In addition to the recharge facilities, the customers can even pay their electricity, telephone, water,
mobile, broadband, gas, etc. bills on Easypay. Apart from these, Easypay has also partnered with
several education and financial organizations and act as a portal to accept education fees and
insurance instalments.
9
Revenue, just like recharge services, is generated by charging commissions from these providers.
Payment Solutions
Easypay offers smart payment solutions for online businesses. The payment solutions allow them to
accept online payments through Easypay.The payment option comes with no setup fee and
maintenance charges. However, the company charges a commission of 1.99% on every transaction.
Easypay Wallet
Cashbacks are credited to the users in their Easypay wallets. Easypay has already rolled out its new
marketing strategy where it has planned to focus more on the digital currency prospects. Hence, all
of its core marketing and promotional strategies enforce the use of Easypay Wallet. This is a very
clever move as Easypay will get the first mover advantage and through its extensive distribution
strategy (which is far better than its competitors like Freerecharge, Ola Money, etc.), will be able to
increase its brand preference. This will eventually help it to carry out its future plans.
Easypay wallet is a semi-closed wallet (approved by RBI) used to store currency in digital form
which can be used to buy goods and services (including financial services) at identified merchant
locations or establishments (like petrol pumps, a supermarket, your barber’s shop, movie hall, etc.)
which have a specific contract with the company to accept these payment instruments.Easypay wallet
doesn’t permit cash withdrawal.
Easypay wallet can be used to pay for almost anything, everywhere. It has created a new market for
digital currency users because of its ease of use.
Money can be transferred between the Easypay wallets of two users with just a few taps on the
pc.As per the RBI guidelines, the money deposited by users in Easypay wallet is deposited by
Easypay in an Escrow Account with a partner bank. This escrow account deposit fetches Easypay
certain interest which is decided as per the contract between the bank and Easypay.
10
Easypay Bank
Paytm wallet is no more just a semi-closed wallet. The company has revamped itself as a payments
bank.A payments bank is a digital bank which can accept deposits and give out interests on the
deposits but can’t offer loans to its customers.
DFD in the next level. The lop-level diagram is often called context diagram. It consists a single
process bit, which plays vital role in studying the current system. The process in the context level
diagram is exploded into other process at the first level DFD. The idea behind the explosion of a
process into more process is that understanding at one level of detail is exploded into greater detail at
the next level. This is done until further explosion is necessary and an adequate amount of detail is
described for analyst to understand the process.
Larry Constantine first developed the DFD as a way of expressing system requirements in a
graphical from, this lead to the modular design.
11
A DFD is also known as a “bubble Chart” has the purpose of clarifying system requirements and
identifying major transformations that will become programs in system design. So it is the starting
point of the design to the lowest level of detail. A DFD consists of a series of bubbles joined by data
flows in the system.
DFD SYMBOLS:
2. An arrow identifies data flow. It is the pipeline through which the information flows
3. A circle or a bubble represents a process that transforms incoming data flow into outgoing data
CONSTRUCTING A DFD:
1. Process should be named and numbered for an easy reference. Each name should be
representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data traditionally flow from
source to the destination although they may flow back to the source. One way to indicate this is to
draw long flow line back to a source. An alternative way is to repeat the source symbol as a
destination. Since it is used more than once in the DFD it is marked with a short diagonal.
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters. Process and dataflow
names have the first letter of each work capitalized
12
1.Zero level Data Flow Digram
Report
Admin
13
2.Level 1 Data Flow Diagram
1.0
Credential
user Login/registration User Table
s validate
. Validate user
Provider
1.1
Add Bank Bank Details Select
Payment
mode
Select payment service provider
Electricity
pay
1.5
1.3
Wallet Source of payment
Check Bill
Details History report
Bill
Payment
Admin
14
2.Level 2 Data Flow Diagram
2.0
Bill pay
2.1
Water bill
provider
2.2
Bill 2.4
generation
Bill details
2.3
EWTB History report
Payment
15
2.5 System Architecture
ER Diagram
ERD is the notation that is used to conduct the date modeling activity the attributes of each data
object noted is the ERD can be described resign a data object descriptions.
The primary purpose of the ERD is to represent data objects and their relationships.
An entity relationship diagram (ERD) shows the relationships of entity sets stored in a database. An
entity in this context is an object, a component of data. An entity set is a collection of similar entities.
These entities can have attributes that define its properties.
By defining the entities, their attributes, and showing the relationships between them, an ER diagram
illustrates the logical structure of databases.
ER diagrams are used to sketch out the design of a database
16
Password Mobile No
U_ID rdd
Prepaid
Name E-mail
Postpaid
User Paid
A/c No 1
Mobile no
Bank
Name m User ID
Bank
Details
Payment n Amount
Mode Recharge
1 Branch 1
MTNL
Bank
Ifsc code
1 Operator
A/c Type
Add Us_ID has
Money
Balance
Saving jio
m Current Idea
1
Wallet pay Payment airtel
Money 1 Money m
U_Name
User_ID
Mobile No
W-Balance
17
2.6. The Genesis Of UML
Many users of these methods had trouble finding a modeling language that met their needs
completely, thus fueling the so-called method wars. A few methods gained prominence, including
Booch's method, Jacobson's OOSE (Object-Oriented Software Engineering), and Rumbaugh's OMT
(Object Modeling Technique). Other important methods included Fusion, Shlaer-Mellor, and Coad-
Yourdon. Each of these was a complete method, although each was recognized as having strengths
and weaknesses. In simple terms, the Booch method was particularly expressive during the design
and construction phases of projects; OOSE provided excellent support for use cases as a way to drive
requirements capture, analysis, and high-level design; and OMT was most useful for analysis and
data-intensive information systems.
Devising a language for use in object-oriented analysis and design is not unlike designing a
programming language. First, we had to constrain the problem: Should the language encompass
requirements specification? Should the language be sufficient to permit visual
18
Too simple a language would limit the breadth of problems that could be solved; too complex a
language would overwhelm the mortal developer. In the case of unifying existing methods, we also
had to be sensitive to the installed base. Make too many changes and we would confuse existing
users; resist advancing the language and we would miss the opportunity to engage a much broader
set of users and to make the language simpler. The UML definition strives to make the best trade-
offs in each of these areas.
The UML effort started officially in October 1994 when Rumbaugh joined Booch at Rational. Our
project's initial focus was the unification of the Booch and OMT methods. The version 0.8 draft of
the Unified Method (as it was then called) was released in October 1995. Around the same time,
Jacobson joined Rational and the scope of the UML project was expanded to incorporate OOSE. Our
efforts resulted in the release of the UML version 0.9 documents in June 1996. Throughout 1996, we
invited and received feedback from the general software engineering community. During this time, it
also became clear that many software organizations saw the UML as strategic to their business.
We established a UML consortium, with several organizations willing to dedicate resources to work
toward a strong and complete UML definition. Those partners contributing to the UML 1.0 definition
included Digital Equipment Corporation, Hewlett-Packard, I-Logix, Intellicorp, IBM, ICON
Computing, MCI Systemhouse, Microsoft, Oracle, Rational, Texas Instruments, and Unisys. This
collaboration resulted in the UML 1.0, a modeling language
that was well-defined, expressive, powerful, and applicable to a wide spectrum of problem domains.
Mary Loomis was instrumental in convincing the Object Management Group (OMG) to issue a
request for proposals (RFP) for a standard modeling language. UML 1.0 was offered for
standardization to the OMG in January 1997 in response to their RFP.
Between January 1997 and July 1997, the original group of partners was expanded to include
virtually all of the other submitters and contributors of the original OMG response, including
Andersen Consulting, Ericsson, ObjecTime Limited, Platinum Technology,
Eykholt of Rational, to formalize the UML specification and to integrate the UML with other
standardization efforts. A revised version of the UML (version 1.1) was offered to the OMG for
19
standardization in July 1997. In September 1997, this version was accepted by the OMG Analysis
and Design Task Force (ADTF) and the OMG Architecture Board and then put up for vote by the
entire OMG membership. UML 1.1 was adopted by the OMG on November 14, 1997.
For several years, UML was maintained by an OMG Revision Task Force, which produced versions
1.3, 1.4, and 1.5. From 2000 to 2003, a new and expanded set of partners produced an updated
specification of UML, version 2.0. This version was reviewed for a year by a Finalization Task Force
(FTF) headed by Bran Selic of IBM, and the official version of UML 2.0 was adopted by the OMG
in early 2005. UML 2.0 is a major revision of UML 1 and includes a large number of additional
features. In addition, many changes were made to previous constructs based on experience with the
previous version. The actual UML specification documents .
UML is the work of a large number of individuals, and the ideas in it come from a wide range of
previous works. It would be a major historical research project to reconstruct a complete list of
sources, and even more difficult to identify the many predecessors who have influenced UML in
manners large and small. As with all scientific research and engineering practice, UML is a small hill
atop a large mountain of previous experience.
20
3 Feasibility Study
Due to the availability and acceptance by consumers, the computer is expected to be the best carrier
of payment functionalities and to replace the use of cash money It is seen as a very suitable
technology to replace cash, since it provides convenience and computers have an important role in
the daily life of consumers. Due to the costs involved with cash money, like storage, theft and errors,
retailers are looking for methods to reduce cash payment volumes.
The actual development and acceptance of computer payments in the markets around the world have
not met the expectations yet however. Only in very specific markets computer payments have
reached mass market, but in most European markets no large success has been reported. When
looking at the Netherlands, several attempts to introduce computer payments have been made, but
most failed and disappeared again, others only have reached small niche markets. Why is the
development in the Dutch market so difficult and slow?
Several solutions for computer payments with Near Field Communication (NFC) technology could
be feasible in the Netherlands. NFC computer payments are made by holding a smartphone very
close to a reader in a shop. However, contactless payments with cards will also be taken into
account, since they use similar technology and require the same acceptance infrastructure. Three
main solutions have been determined and will be analysed as possible implementations to introduce
NFC payments in the Dutch market on a short term:
In this work, the technical feasibility of passive secure payments for brick-and-mortar points of sale
is analyzed. The core element of the proposed approach is a new application for
context-based risk and trust assessment. It allows for dynamic selection of payment authorization
methods that constitutes accurate trade-off between security and convenience. Particularly, the
payments can be performed and authorized in the
21
-17-Due to the availability and acceptance by consumers, the computer is expected to be the best
carrier of payment functionalities and to replace the use of cash money It is seen as a very suitable
technology to replace cash, since it provides convenience and computers have an important role in
the daily life of consumers. Due to the costs involved with cash money, like storage, theft and errors,
retailers are looking for methods to reduce cash payment volumes. The actual development and
acceptance of computer payments in the markets around the world have not met the expectations yet
however. Only in very specific markets computer payments have reached mass market, but in most
European markets no large success has been reported. When looking at the Netherlands, several
attempts to introduce computer payments have been made, but most failed and disappeared again,
others only have reached small niche markets. Why is the development in the Dutch market so
difficult and slow?
Several solutions for computer payments with Near Field Communication (NFC) technology could
be feasible in the Netherlands. NFC computer payments are made by holding a smartphone very
close to a reader in a shop. However, contactless payments with cards will also be taken into account,
since they use similar technology and require the same acceptance infrastructure. Three main
solutions have been determined and will be analysed as possible implementations to introduce NFC
payments in the Dutch market on a short term:
In this work, the technical feasibility of passive secure payments for brick-and-mortar points of sale
is analyzed. The core element of the proposed approach is a new application for context-based risk
and trust assessment. It allows for dynamic selection of payment authorization methods that
constitutes accurate trade-off between security and convenience. Particularly, the payments can be
performed
background using biometric means (face recognition), without user’s explicit action. Generally, in
the proposed approach, multiple devices are used for authorization: mobile, wearables, or stationary,
client’s or seller’s, and multiple authorization methods are used: biometric, knowledge-based, and
possession-based. The reported research includes requirement identification, novel architecture and
protocol proposition, proof-of-concept prototype system deployment, and evaluation-based lessons
learned. The research confirms that with the proposed approach, it is possible to take advantage of
client-seller trust dynamism to simplify the payment process while maintaining the security level.
bought every day in the same café on the way to work, quick lunch at a self-service restaurant near
the office, or a few times a month, the fuel payment at a neighbor gas station. Despite the fact that
22
the recurring transactions usually involve small amounts, there are also medium- or high-amount
ones, so that they constitute a larger set of operations than those that could be conveniently handled
using a contactless smart card.
The simplification of the payment process concerns reducing its execution time and minimizing the
number of operations required to be performed by the client. Analyzing the sequence of actions
required by a traditional contactless payment procedure, it is clear that simplification of this process
is possible only by eliminating the need to authorize the payment by the client. In such scenario, the
client orders products/services, receives them, and leaves without having to search for the wallet and
pulling out her payment card or any other attribute necessary to authorize the payment. Payments
made in this way are referred to as passive payments in this article. If a process of passive payment
authorization does not require communication with user’s device, it is referred to as passive
deviceless payment. In the proposed concept, the decision how to authorize the payment (passively
or actively; with biometrics, possession, or knowledge; choice of a specific method from these
classes; choice of the device) is done by a payment operator (e.g., a bank, a payment platform) on
behalf of the client.
To validate specification of a system that enables context-aware passive payments for physical point
of sale (PoS)
23
To prove added value provided by the system to each of the three actors: the client, the seller, and the
payment operator
The digital economy is rapidly developing worldwide. It is one of the most important drivers of
innovation, competitiveness and growth. Digital technologies and big data now allow financial
service providers to more effectively serve the financially excluded, with a “customer-centric”
approach. By announcing a ban on the old Rs. 1,000 and Rs. 500 notes and by putting a cap on
withdrawals from banks and ATMs, Prime Minister Narendra Modi floated the idea of a cashless
society. The demonetization move that initially paralyzed the economy is now catalyzingthe
country’s digital payments ecosystem. We are witnessing an economic transition right now.
India aims to create a cleaner, more transparent economy via digitalization that will lead to an
improved climate for foreign investment, boost economic growth, and ultimately propel the
country to the next chapter of its emerging markets story. The long-term impact will be a
paradigmshift to the digital fintech platforms.
According to a study, "The cost of cash places a huge burden on the Indian economy equivalent to
1.7 per cent of gross domestic product (GDP). This high cost of cash stems fromlarge volumes of
cash flow in the Indian economy. Global consulting firm McKinsey has said digital finance is a $700
billion opportunity for India, offering 11.8 per cent boost to GDP by 2025,benefitting millions of
people. Digital financial services delivered via mobile phones, the Internet or cards linked to a
digital payment system could be a boon to individuals, businesses, and governments across the
developing world boosting GDP and making the aspiration of financial inclusion a reality.
A few months ago, I blogged about the intersection of social protection and financial inclusion and
wondered if these regular, consistent payments from governments could be a catalyst for bringing
beneficiaries more easily into the formal financial system. Digital
24
payments hold particular promise, and the key question is: What is the cost-benefit for a government
to connect all households to an Digital payment system.
There’s disruption happening in the Indian payments space. Since demonetisation took place a year
before, both banks and e-wallets are aggressively promoting digital payments. And, many
individuals who were happy using cash have had to go the digital way. It’s not easy.
While everything is just ‘a click’ or ‘a scan’ away sounds great, it comes with a host of issues.
Individuals new to a digital payment system can end up transferring money to a wrong account. Or
as happens sometimes, transactions simply fail.
Digital payments have evolved hugely in recent years, with contactless payment cards technology
and the emergence of new services from financial and technology players changing the way
individuals and businesses conduct financial transactions.
There is much more to come, though. Continuing and fierce competition in the financial services
sector, demographic changes and the adoption of emerging technology, are all playing a role.
As we enter a new year, we’ve come up with the three trends that we think are most likely to impact
digital payments in 2019 and beyond.
While the uptake of mobile payments has been slower than expected , this is likely to change as open
banking and the greater availability of APIs lay the way for improved customer experiences beyond
the functional elements offered by most mobile payments apps.
These developments will enable payments players to bring together the power of mobile technology,
the wider technology ecosystem and data sharing to deliver better payments experiences. Services
such as immediate rewards and proactive balance alerts will provide value beyond the transactions.
25
2. The influence of Gen Z continues to grow
Generation Z, the age group following the Millennials, is making its presence felt in the workplace
and wider global economy. This generation have never known a world without Google, Apple,
Facebook and Amazon and are comfortable with digital technology.
These young adults and older teens will soon represent a significant proportion of the payments
industry customer base.
This age group is also interested in digital tools to manage payments, bills, expenses and personal
finance. More Gen Z consumers (69 per cent) use mobile banking apps daily or weekly than any
other generation. They are likely to be the first generation to forego a physical wallet in favour of a
digital one.
As an example of their thirst for faster payment methods, as well as personal control, 68 per cent of
Generation Z consumers surveyed by Accenture said they were interested in instant person-to-person
payments – more than any other group.
Fintech companies are now more willing to work with traditional financial services providers and
retailers, while banks are starting to innovate like fintech players.
Banks are embracing connected networks to multiply impact, and to collaborate in new and
disruptive ways. According to Accenture, these ecosystems will result in new payment routes, bank
networks and alternative forms of payment.
26
4 Software Requirement Specifications
The software, Site Explorer is designed for management of web sites from a remote location.
INTRODUCTION
Purpose: The main purpose for preparing this document is to give a general insight into the analysis
and requirements of the existing system or situation and for determining the operating characteristics
of the system.
Scope: This Document plays a vital role in the development life cycle (SDLC) and it describes the
complete requirement of the system. It is meant for use by the developers and will be the basic
during testing phase. Any changes made to the requirements in the future will have to go through
formal change approval process.
4.1. Modules
User Module
Admin module
User Module
User Login :- A Easypay login defines a name and a password for a user to allow access to Adaptive
Server. When you execute create login, Adaptive Server adds a row to assigns a unique system user
ID (suid) for the new user, and fills in specified attribute information. When a user logs in, Adaptive
Server looks in syslogins for the name and password
provided by the user. The password column is encrypted with a one-way algorithm so it is not
readable.A easypay login profile is a collection of attributes to be applied to a set of login accounts.
The attributes define login characteristics, such as default roles or the login script associated with
27
each login bound to the profile. Easypay Login profiles save save time for the system security
administrator because attributes of login accounts are set up and managed in one place.
User Ragistration :- A registered user is a user of a Easypay or other system who has
previously registered. Registered users normally provide some sort of credentials (such as a
username or e-mail address, and a password) to the system in order to prove their identity: this is
known as logging in. Systems intended for use by the general public often allow any user to register
simply by selecting a register or sign up function and providing these credentials for the first time.
Registered users may be granted privileges beyond those granted to unregistered users.
Rationale :-User registration and login enables a system to personalize itself. For example, a
website might display a welcome banner with the user's name and change its appearance or behavior
according to preferences indicated by the user.
-
The system may also allow a logged-in user to send and receive messages, and to view and modify
personal files or other information
28
Privacy concerns :- Registration necessarily provides more personal information to a system than it
would otherwise have. Even if the credentials used are otherwise meaningless, the system can
distinguish a logged-in user from other users and might use this property to store a history of users'
actions or activity, possibly without their knowledge or consent.
Recharge Services :- There was a time when Easypay Business Model consisted just mobile
recharge and bill payment services. Times have changed and online recharge services for mobile
subscriptions, TV channels subscriptions, data-card, and metro card, etc have been added to the
revenue model of easypay.
The company, just like other recharge services providers, charge commissions from these operators.
29
Bill Payments:- In addition to the recharge facilities, the customers can even pay their electricity,
telephone, water, mobile, broadband, gas, etc. bills on Easypay. Apart from these, Paytm has also
partnered with several education and financial organizations and act as a portal to accept education
fees and insurance instalments.
Easypay Wallet :- Easypay wallet is a semi-closed wallet used to store currency in digital form
which can be used to buy goods and services (including financial services) at identified merchant
locations or establishments (like petrol pumps, a supermarket, your barber’s shop, movie hall, etc.)
which have a specific contract with the company to accept these payment instruments.Easypay wallet
doesn’t permit cash withdrawal.
30
Admin module
Application Administrators aren't developers and they're not users, but they are critical to keeping the
applications your organization relies on running. They install, update, tune, diagnose, and babysit
both internal and third-party applications.
The applications they support can include ERP (Enterprise Resource Planning), CRM (Customer
Relationship Management), POS (Point of Sale), BPM (Business Process Management), budgeting
and forecasting, HR (Human Resources), legal matter management, AP (Accounts Payable)/ AR
(Accounts Receivable), payroll, general ledger, SOX (Sarbanes Oxley) compliance tracking,
training, time tracking, supply chain, database engines, and messaging, i.e., e-mail.
While software can be readily licensed from a vendor, it still requires a significant amount of effort
on the part of the acquiring organization. Someone has to prepare the servers that it will run on.
Then someone has to install it, configure it, load data into it, tune it, upgrade it, and generally keep
the package up and running.
31
If errors occur, someone has to report them to the vendor and work with vendor technicians to
correct the prob- lems. These are all tasks that an Application Administrator handles.
In many cases, corporations are absolutely dependent that these applications be kept running. What
would be the response of employees if the payroll application broke down?
What would happen to the organization's financial situation if invoices weren't sent out to customers?
What if new employees couldn't be added to the HR system?
The importance of Application Administrators and their level of expertise shouldn't be over- looked.
Since the trend of relying upon third-party software isn't going to decrease in the foreseeable future,
the role of Application Administrator won't be going away either.
Every company employs them even if their official job title doesn't sound at all like "Application
Administrator." A job title of "system application administrator" might be for a position that covers
both application administration and systems administration. Since there is a significant degree of
overlap between these two positions, this isn't uncommon.
32
4.2 Literature Survey
“Easy Pay” is digital payment gateway system. Which has aim to gives fast transection with security
of money which is now a days very helpful for money transfer to any state any and country in one
click. This application provides various of payment system (mobile recharge, gas payment, water
bill, electricity bill, etc.) for customer and merchant get join easy pay. There is high level of security
in application . client comes to join by other reference or advertises by newspaper or posters etc.
Receptionist takes the join if the client wants to pay money using a easy pay by wallet , or if the
merchant but you don’t have account on easy pay wants to register and join easy pay, the
receptionist will take enquiry from filled by client.
Admin is giving all security it will be authorization to delete your account but not see your password
and payment withdrawal your account, Admin manages records. Admin offering new offers by
posters or other advertise processes. We have a customer care provides the notes to 27 x 7 for better
learning. Customer care display the result by notice board. Admin advertise various courses by
advertises processes (posters, newspapers etc.). Admin hires new update for payment system and
receptionist for receptionists Saves time: digital wallets hold the amount in the electronic form so as
to ease the payment.
Security: There is a good amount of security when payments are made through e wallets since the
wallet does not pass the payment card details to the website. These virtual wallets allow users to lock
their wallet.
Objective of Study
Improve the ease of conducting card/digital transactions for an individual.
Reduce the risks and costs of handling cash at the individual level.
Reduce costs of managing cash in the economy.
Build a transactions history to enable improved credit access and financial inclusion.
Reduce tax avoidance.
Reduce the impact of counterfeit money
Scope:
33
Provide access to financial payment services to every citizen along with ability to conduct card /
digital transactions.
Digitalize Government collections by equipping each collection point with a method to accept
card/digital payments.
Migrate payment transactions from cash dominated to non-cash through incentivization of card
digital transactions and disincentivization of cash based transactions.
Enhance acceptance infrastructure in the country to promote digital transactions.
Encourage corporate, institutions and merchant, establishments to facilitate card / digital payments.
Goal:
The goal of the proposed policy changes is to provide the necessary incentives to use digital financial
transactions to replace the use of cash-either in government transactions, or in regular commerce
over a period of time through policy intervention.
RESEARCH METHODOLOGY
The current study is based on primary data collected from 150 respondents from the different parts of
Delhi. A well-structured questionnaire was designed to collect the information from the respondents
the questionnaire was designed to study perception of customer towards adoption of digital payment
mode. Likert five point scales were used for obtaining responses. The responses have been collected
by means of face-to-face interviews by authors.
Sampling Plan
Sampling unit: This call is for defining the target population to be surveyed. In this research the
sampling unit was the customers who have been using the digital payment modes.
Sample size: In this survey the sample size decided was 150.
Sampling procedure: We adopted Intercept interview method for collection of primary data, as it
is not possible to take appointment from a large number of respondents. Purpose of this research was
told to respondents and questions were explained to them in case there was any need for
understanding any particular question. There had been no personal bias or distortions were allowed
while recording the responses.
34
Research and Statistical Tools Employed
The research and statistical tools employed in this study are ANOVA and frequency analysis. SPSS
19 was used to perform statistical analysis. Cronbach’s Alpha test was used to find the reliability of
the data. Frequency analysis on the main factor under study, indicate overall satisfaction levels of
respondents with digital payment mode. ANOVA was carried out to find the variance in the
responses and to test the hypothesis.
Java Frameworks are the bodies of pre-written code through which you are allowed to add your own
code. But there are a lot of frameworks out there which have various applications. So, in this article,
I’ll discuss the top 10 Java frameworks you should master.
35
problem. You make use of a framework by calling its methods, inheritance, and supplying callbacks,
listeners, or other implementations of the patterns.
A framework will often dictate the structure of an application. Some frameworks even supply so
much code that you have to do very little to write your application. This can be good or bad,
depending on how easy it is to use. Frameworks are the substance of programming. You build on top
of a good one, your program is solid and fast and comes together beautifully. You build on top of a
bad one, your life is miserable, brutish, and short.
4.2.2.Java
It is used for:
Java works on different platforms (Windows, Mac, Linux, Raspberry Pi, etc.)
It is one of the most popular programming language in the world
It is easy to learn and simple to use
It is open-source and free
It is secure, fast and powerful
It has a huge community support (tens of millions of developers)
36
Java is an object oriented language which gives a clear structure to programs and allows code
to be reused, lowering development costs
As Java is close to C++ and C#, it makes it easy for programmers to switch to Java or vice
versa
Wat is Java
Java produces applets (browser-run programs), which facilitate graphical user interface (GUI) and
object interaction by Internet users. Prior to Java applets, Web pages were typically static and non-
interactive.
Java applets run in a Web browser with Java Virtual Machine (JVM), which translates Java bytecode
into native processor instructions and allows indirect OS or platform program execution. JVM
provides the majority of components needed to run bytecode, which is usually smaller than
executable programs written through other programming languages. Bytecode cannot run if a system
JVM.
NetBeans IDE is the official IDE for Java 8. With its editors, code analyzers, and converters, you can
quickly and smoothly upgrade your applications to use new Java 8 language constructs, such as
lambdas, functional operations, and method references.
Batch analyzers and converters are provided to search through multiple applications at the same
time, matching patterns for conversion to new Java 8 language constructs.
With its constantly improving Java Editor, many rich features and an extensive range of tools,
templates and samples, NetBeans IDE sets the standard for developing with cutting edge
technologies out of the box.
37
Fast & Smart Code Editing
An IDE is much more than a text editor. The NetBeans Editor indents lines, matches words
and brackets, and highlights source code syntactically and semantically. It lets you easily refactor
code, with a range of handy and powerful tools, while it also provides code templates, coding tips,
and code generators.
Keeping a clear overview of large applications, with thousands of folders and files, and millions of
lines of code, is a daunting task. NetBeans IDE provides different views of your data, from multiple
project windows to helpful tools for setting up your applications and
managing them efficiently, letting you drill down into your data quickly and easily, while giving you
versioning tools via Subversion, Mercurial, and Git integration out of the box.
The cost of buggy code increases the longer it remains unfixed. NetBeans provides static analysis
tools, especially integration with the widely used FindBugs tool, for identifying and fixing common
problems in Java code. In addition, the NetBeans Debugger lets you place breakpoints in your source
code, add field watches, step through your code, run into methods, take snapshots and monitor
execution as it occurs.
What is a Database?
A database is a separate application that stores a collection of data. Each database has one or more
distinct APIs for creating, accessing, managing, searching and replicating the data it holds.
Other kinds of data stores can also be used, such as files on the file system or large hash tables in
memory but data fetching and writing would not be so fast and easy with those type of systems.
38
Nowadays, we use relational database management systems (RDBMS) to store and manage huge
volume of data. This is called relational database because all the data is stored into different tables
and relations are established using primary keys or other keys known as Foreign Keys.
RDBMS Terminology
Before we proceed to explain the MySQL database system, let us revise a few definitions related to
the database.
Table − A table is a matrix with data. A table in a database looks like a simple spreadsheet.
Column − One column (data element) contains data of one and the same kind, for example
the column postcode.
Row − A row (= tuple, entry or record) is a group of related data, for example the data of one
subscription.
Primary Key − A primary key is unique. A key value can not occur twice in one table. With
a key, you can only find one row.
Foreign Key − A foreign key is the linking pin between two tables.
Compound Key − A compound key (composite key) is a key that consists of multiple
columns, because one column is not sufficiently unique.
Referential Integrity − Referential Integrity makes sure that a foreign key value always
points to an existing row.
39
MySQL Database
MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses. MySQL
is developed, marketed and supported by MySQL AB, which is a Swedish company. MySQL is
becoming so popular because of many good reasons −
MySQL is released under an open-source license. So you have nothing to pay to use it.
MySQL is a very powerful program in its own right. It handles a large subset of the
functionality of the most expensive and powerful database packages.
MySQL works on many operating systems and with many languages including PHP, PERL,
C, C++, JAVA, etc.
MySQL works very quickly and works well even with large data sets.
MySQL is very friendly to PHP, the most appreciated language for web development.
MySQL supports large databases, up to 50 million rows or more in a table. The default file
size limit for a table is 4GB, but you can increase this (if your operating system can handle
it) to a theoretical limit of 8 million terabytes (TB).
MySQL is customizable. The open-source GPL license allows programmers to modify the
MySQL software to fit their own specific environments.
40
5 System Design
Unified Modeling Language (UML) is a general purpose modelling language. The main aim of UML
is to define a standard way to visualize the way a system has been designed. It is quite similar to
blueprints used in other fields of engineering.
UML is not a programming language, it is rather a visual language. We use UML diagrams to
portray the behavior and structure of a system. UML helps software engineers, businessmen and
system architects with modelling, design and analysis. The Object Management Group (OMG)
adopted Unified Modelling Language as a standard in 1997. Its been managed by OMG ever since.
International Organization for Standardization (ISO) published UML as an approved standard in
2005. UML has been revised over the years and is reviewed periodically.
UML is a standardized graphical display format for of (software) systems. It offers a set of
the visualization, specification, design and documentation standardized diagram types with which
complex data, processes and systems can easily be arranged in a clear, intuitive manner.
UML is neither a procedure nor a process; rather, it provides a "dictionary" of symbols - each of
which has a specific meaning. It offers diagram types for object-oriented analysis, design and
programming, thereby ensuring a seamless transition from requirements placed on a system to final
implementation. Structure and system behavior are likewise shown, thereby offering clear reference
points for solution optimization.
UML is linked with object oriented design and analysis. UML makes the use of elements and forms
associations between them to form diagrams. Diagrams in UML can be broadly classified as:
41
2. Behavior Diagrams – Capture dynamic aspects or behavior of the system. Behavior diagrams
include: Use Case Diagrams, State Diagrams, Activity Diagrams and Interaction Diagrams.
There are two broad categories of diagrams and they are again divided into subcategories −
Structural Diagrams
Behavioral Diagrams
Structural Diagrams
The structural diagrams represent the static aspect of the system. These static aspects represent
those parts of a diagram, which forms the main structure and are therefore stable.
These static parts are represented by classes, interfaces, objects, components, and nodes. The four
structural diagrams are −
Class diagram
Object diagram
Component diagram
Deployment diagram
Behavioral Diagrams
Any system can have two aspects, static and dynamic. So, a model is considered as complete when
both the aspects are fully covered.
Behavioral diagrams basically capture the dynamic aspect of a system. Dynamic aspect can be
further described as the changing/moving parts of a system.
Sequence diagram
Collaboration diagram
Statechart diagram
Activity diagram
42
5.2.1 Use Case Diagram
Use case diagram consists of use cases and actors and shows the interaction between them. The key
points are:
’s perspective.
Updating
Verificatio
visit n
Login
Transactions
Report
Recharge
Logout
43
User Use Case Diagram
Login
Add Bank
Logout
Feedback Recharge
and Bill Pay
user
Change
Password
44
Admin Use Case Diagram
Login
Logout
Mange
Payment
Admin
Add User
Updating
Verifications
Mange
Payment mode
45
4.2.2 Activity Diagram
Activity diagrams provide a way to model the workflow of a business process. An activity diagram is
typically used for modeling the sequence of Activities in a process. Activity diagrams can model
many different types of work flows. A software company could use activity diagrams to model a
software development process. The following tools are used on the activity diagram toolbox to
model activity diagrams.
Activities
Association
Conditions
Constraints
Once the above-mentioned parameters are identified, we need to make a mental layout of the entire
flow. This mental layout is then transformed into an activity diagram.
The basic usage of activity diagram is similar to other four UML diagrams. The specific usage is to
model the control flow from one activity to another. This control flow does not include messages.
Activity diagram is suitable for modeling the activity flow of the system. An application can have
multiple systems. Activity diagram also captures these systems and describes the flow from one
system to another. This specific usage is not available in other diagrams. These systems can be
database, external queues, or any other system.
46
User Activity Diagram
Login/Registration
Is
user
Registration
Login/Registration
Login
Select a
servic
Make another
Transection ?
yes
No
Logout
47
Admin Activity Diagram
Home Page
Enter credentials
Login
Validate details
No
yes
Logout
48
5.2.3 Collaboration Diagram
Collaboration diagram is an interaction diagram that shows the order of messages that implement an
operation or a transaction. Another type of interaction diagram is the collaboration diagram. A
collaboration diagram is a set of objects related in a particular context, and interaction, which is a set
of messages exchanged among the objects within the collaboration to achieve a desired outcome. In a
collaboration diagram, objects are shown in figures. As in a sequence diagram, arrows indicate the
message sent within the given use case. In a collaboration diagram, the sequence is indicated by
numbering the messages. Some people argue that numbering the messages makes it more difficult to
see
the sequence than drawing the lines on the page. However, since the collaboration diagram is more
compressed, other things can be shown more easily. A collaboration diagram provides several
numbering schemes.
What is a Collaboration?
A Collaboration is a collection of named objects and actors with links connecting them.
They collaborate in performing some task.
A Collaboration defines a set of participants and relationships that are meaningful for a
given set of purposes
Unlike a sequence diagram, a collaboration diagram shows the relationships among the objects.
Sequence diagrams and collaboration diagrams express similar information, but show it in
different ways.
Because of the format of the collaboration diagram, they tend to better suited for analysis
activities (see Activity: Use-Case Analysis). Specifically, they tend to be better suited to
depicting simpler interactions of smaller numbers of objects. However, if the number of objects
and messages grows, the diagram becomes increasingly hard to read. In addition, it is difficult to
show additional descriptive information such as timing, decision points, or other unstructured
information that can be easily added to the notes in a sequence diagram. So, here are some use
cases that we want to create a collaboration diagram for:
49
Model collaborations between objects or roles that deliver the functionalities of use cases
and operations
Model mechanisms within the architectural design of the system
Capture interactions that show the messages passing between objects and roles within the
collaboration
Model alternative scenarios within use cases or operations that involve the collaboration of
different objects and interactions
Support the identification of objects (hence classes) that participate in use cases
In UML, the two types of interaction diagrams are collaboration and sequence diagrams. While both
types use similar information, they display them in separate ways. Collaboration diagrams are used
to visualize the structural organization of objects and their interactions. Sequence diagrams, on the
other hand, focus on the order of messages that flow between objects. However, in most scenarios, a
single figure is not sufficient in describing the behavior of a system and both figures are required.
Bill details
5.Pay bill()
Pay bill
6. validate credentials
7.Pay wallet()
Wallet
50
Admin Collaboration Diagram
1. Open app
4.Login check
Home Page
8.Response massage
clslogin
5.Execute query
Database DALsqlHelper
6.Execute
7.verified
51
5.2.4 Sequence Diagram
A sequence diagram is a graphical view of a scenario that shows object interaction in a time based
sequence-what happens first, what happens next. Sequence diagrams establish the roles of objects
and help provide essential information to determine class responsibilities and interfaces. A sequence
diagram has two dimensions: the vertical dimension represents time; the horizontal dimension
represents different objects. The vertical line is called the object’s lifeline. The lifeline represents the
object’s existence during the interaction. This form was first popularized by acobson. An object is
shown as a box at the top of a dashed vertical line. A role is a slot for an object within a collaboration
that describes the type of object that may play the role and its relationships to other roles. However, a
sequence diagram does not show the relationships among the roles ort eh association among the
objects. An object role is shown as a vertical dashed line, the lifeline.
Sequence Diagrams Represent the objects participating the interaction horizontally and time
vertically.
Sequence diagrams are time focus and they show the order of the interaction visually by using the
vertical axis of the diagram to represent time what messages are sent and when.
Sequence Diagrams captures interaction in different level of granularity:
1. high-level interactions between user of the system and the system, between the system and other
systems, or between subsystems (sometimes known as system sequence diagrams)
2. the interaction that takes place in a collaboration that either realizes a use case or an operation
(instance diagrams or generic diagrams)
3. Represent objects interact in (Model, View / Controller) MVC pattern of software framework
Sequence diagrams can be useful references for businesses and other organizations. Try drawing a
sequence diagram to:
52
User Server Service provider Wallet
Login/ Registration
Authentication
Response
Sand plan
Select plan
Recharge
Wallet pay
Authentication
Sand details
[user valid ]
Recharge successful
Commit Logout
Confirm
53
5.2.5 Class Diagram
Class diagram is a static diagram. It represents the static view of an application. Class diagram is
not only used for visualizing, describing, and documenting different aspects of a system but also for
constructing executable code of the software application.
Class diagram describes the attributes and operations of a class and also the constraints imposed on
the system. The class diagrams are widely used in the modeling of objectoriented systems because
they are the only UML diagrams, which can be mapped directly with object-oriented languages.
Class diagram shows a collection of classes, interfaces, associations, collaborations, and constraints.
It is also known as a structural diagram.
A description of a group of objects all with similar roles in the system, which consists of:
Structural features (attributes) define what objects of the class "know"
Represent the state of an object of the class
Are descriptions of the structural or static features of a class
Behavioral features (operations) define what objects of the class "can do"
Define the way in which objects may interact
Operations are descriptions of behavioral or dynamic features of a class
Class Notation
54
The name of the class appears in the first partition.
2. Class Attributes
Attributes are shown in the second partition.
The attribute type is shown after the colon.
Attributes map onto member variables (data members) in code.
3. Class Operations (Methods)
Operations are shown in the third partition. They are services the class provides.
The return type of a method is shown after the colon at the end of the method
signature.
The return type of method parameters is shown after the colon following the
parameter name.
Operations map onto class methods in code
55
User
Add bank
Admin
-U_name :String
+Bank A/C number : - + U-id :number (0…*) 1
-Admin_id : String
number -Email : String -Password :number
-Bank name : String -Password: number
-Branch name : String +Mobile No :number
-Account type : String -Date :: String +Manage user : void()
-Ifsc code : String -Time :: String +View Report : void()
-Users id : number (1…*) +Registration :void()
+Verify user : void()
-Balance : number +Login : void() +update new features : void()
+Transfer money: void() +Bank add: void() (1…*) +manage payment : void()
+Payment service provide : +Recharge/payment:
void() void() 1
(1…*) ( 1…*) (1…*) (1…*)
(1…*) (1…*)
+Check available bill :void() +Sand feed back : void() +Check transactions
+Bill pay : void() history : void()
+Bill pay history : void()
56
5.3 Gantt Chart
Gantt charts, such as the Accelo Gantt chart, are smart tools that are intuitive and track where you are
in a specific project. They’re great at helping to plan and schedule projects and are one of the best
visual project management tools that you can use to increase transparency across the board. Gantt
charts take a project and break it into small, easy to swallow pieces with checkpoints along the
way. The smartest Gantt charts will even automatically update project timelines when upstream
dependencies have been met - so all you need to do is focus on the task at hand.
2020
Software development fab 25 10 mar 25 mar 20 April 25 may
Selection of project
Software requirements
Requirements analysis
Feasibility study
Conceptual module
design
Systems design
Ifebmplementation
Testing
Development
57
5.4 Data Dictionary
After carefully understanding the requirements of the client the the entire data storage requirements
are divided into tables. The below tables are normalized to avoid any anomalies during the course of
data entry.
MySQL Server incorporates a transactional data dictionary that stores information about database
objects. In previous MySQL releases, dictionary data was stored in metadata files, nontransactional
tables, and storage engine-specific data dictionaries.
1) User Registration
Yes you can definitely start using easypay without a bank account. ... As for loading money you
will need a bank account from where you can debit money to add it to your wallet. Or what you
58
could do is ask your friend or family member to load money into your easypay wallet from
their bank and you pay them in cash.
3) Easypay wallet
You can use the easypay Wallet only for merchant payments such as recharges, bill payments, online
shopping or payments at your favourite stores that accept easypay Wallet.
59
4)Mobile Recharge/bill pay
60
7) Gas Book
9) user feedback
61
10) Transfer money
62
6.Screenshots
2) About
63
3)User Registration
4)Add Bank
64
5)Easypay Login
65
7)Mobile recharge
66
9) GAS Bill pay
67
11) Tv Recharge
68
13) Money Transfer
69
15) Wallet to wallet Transfer Money
70
7.Testing
Psychology of testing is a type of testing which fully depends on the mindset of developers and
tester. When we are building the software, we working positively towards the software never think
about negative things. The mindset should be different while testing and reviewing developing
software. With the correct mindset, the programmer can test their own code. At a certain point
independence tester often makes the tester more
Tests designed by the person who wrote the software under test
Tests designed by another person
Tests designed by a person from a different organizational group or test specialists
Tests designed by a person from a different organization or company
In Psychology of testing, People and projects are driven by objectives. While developing the
software, programmer writing code to build software, that time Programmers test their code then
71
pass through the next phase but as we already mentioned, It is difficult to find our own mistakes.
That’s why independence tester highly recommendable. Because they are testing specialists or
professional testers. In Psychology of testing communication also matters, tester and test lead need
good interpersonal skill to communicate. In Psychology of testing Tester and others can improve
communication by
WHITE BOX TESTING is testing of a software solution's internal structure, design, and coding. In
this type of testing, the code is visible to the tester. It focuses primarily on verifying the flow of
inputs and outputs through the application, improving design and usability, strengthening security.
White box testing is also known as Clear Box testing, Open Box testing,
Structural testing, Transparent Box testing, Code-Based testing, and Glass Box testing. It is usually
performed by developers.
It is one of two parts of the Box Testing approach to software testing. Its counterpart, Blackbox
testing, involves testing from an external or end-user type perspective. On the other hand, Whitebox
testing is based on the inner workings of an application and revolves around internal testing.
72
The term "WhiteBox" was used because of the see-through box concept. The clear box or WhiteBox
name symbolizes the ability to see through the software's outer shell (or "box") into its inner
workings. Likewise, the "black box" in "Black Box Testing" symbolizes not being able to see the
inner workings of the software so that only the end-user experience can be tested.
BLACK BOX TESTING is defined as a testing technique in which functionality of the Application
Under Test (AUT) is tested without looking at the internal code structure, implementation details and
knowledge of internal paths of the software. This type of testing is based entirely on software
requirements and specifications. In BlackBox Testing we just focus on inputs and output of the
software system without bothering about internal knowledge of the software program.
The above Black-Box can be any software system you want to test. For Example, an operating
system like Windows, a website like Google, a database like Oracle or even your own custom
application. Under Black Box Testing, you can test these applications by just focusing on the inputs
and outputs without knowing their internal code implementation.
A TEST PLAN is a detailed document that describes the test strategy, objectives, schedule,
estimation and deliverables and resources required for testing. Test Plan helps us determine the effort
needed to validate the quality of the application under test. The test plan serves as a blueprint to
conduct software testing activities as a defined process which is minutely monitored and controlled
by the test manager.
73
7.3 Levels Of Testing
tests are grouped together based on where they are added in SDLC or the by the level of of detailing
they contain. In general, there are four levels of testing: unit testing, integration testing, system
testing, and acceptance testing. The purpose of Levels of testing is to make software testing
systematic and easily identify all possible test cases at a particular level.
There are many different testing levels which help to check behavior and performance for software
testing. These testing levels are designed to recognize missing areas and reconciliation between the
development lifecycle states. In SDLC models there are characterized phases such as requirement
gathering, analysis, design, coding or execution, testing, and deployment.
1. Unit Testing
2. Integration Testing
3. System Testing
4. Acceptance Testing
Each of these testing levels has a specific purpose. These testing level provide value to the software
development lifecycle.
74
7.3.1 Unit testing:A Unit is a smallest testable portion of system or application which can be
compiled, liked, loaded, and executed. This kind of testing helps to test each module separately.
The aim is to test each part of the software by separating it. It checks that component are fulfilling
functionalities or not. This kind of testing is performed by developers.
UNIT TESTING is a type of software testing where individual units or components of a software are
tested. The purpose is to validate that each unit of the software code performs as expected. Unit
Testing is done during the development (coding phase) of an application by the developers. Unit
Tests isolate a section of code and verify its correctness. A unit may be an individual function,
method, procedure, module, or object.
Integration means combining. For Example, In this testing phase, different software modules are
combined and tested as a group to make sure that integrated system is ready for system testing.
Integrating testing checks the data flow from one module to other modules. This kind of testing is
performed by testers.
NTEGRATION TESTING is defined as a type of testing where software modules are integrated
logically and tested as a group. A typical software project consists of multiple software modules,
coded by different programmers. The purpose of this level of testing is to expose defects in the
interaction between these software modules when they are integrated
components. It involves load, performance, reliability and security testing.System testing most often
the final test to verify that the system meets the specification. It evaluates both functional and non-
functional need for the testing.
75
SYSTEM TESTING is a level of testing that validates the complete and fully integrated software
product. The purpose of a system test is to evaluate the end-to-end system specifications. Usually,
the software is only one element of a larger computer-based system. Ultimately, the software is
interfaced with other software/hardware systems. System Testing is actually a series of different tests
whose sole purpose is to exercise the full computer-based system.
Validation Testing, carried out by QA professionals, is to determine if the system complies with the
requirements and performs functions for which it is intended and meets the organization’s goals and
user needs. This kind of testing is very important, as well as verification testing. Validation is done at
the end of the development process and takes place after verification is completed.
Validation Planning – To plan all the activities that need to be included while testing.
Define Requirements – To set goals and define the requirements for testing.
Selecting a Team – To select a skilled and knowledgeable development team (the third party
included).
Developing Documents – To develop a user specification document describing the operating
conditions.
Estimation/Evaluation – To evaluate the software as per the specifications and submit a
validation report.
Fixing bugs or Incorporating Changes – To change the software so as to remove any errors
found during evaluation.
FUNCTIONAL TESTING is a type of software testing that validates the software system against the
functional requirements/specifications. The purpose of Functional tests is to test each function of the
software application, by providing appropriate input, verifying the output against the Functional
requirements.
76
FUNCTIONAL TESTING is a type of software testing whereby the system is tested against
the functional requirements/specifications.
Functions (or features) are tested by feeding them input and examining the output. Functional
testing ensures that the requirements are properly satisfied by the application. This type of
testing is not concerned with how processing occurs, but rather, with the results of
processing. It simulates actual system usage but does not make any system structure
assumptions.
During functional testing, Black Box Testing technique is used in which the internal logic of
the system being tested is not known to the tester.
Functional testing is normally performed during the levels of System Testing and Acceptance
Testing.
Acceptance testing is a test conducted to find if the requirements of a specification or contract are
met as per its delivery. Acceptance testing is basically done by the user or customer. However, other
stockholders can be involved in this process.
User Acceptance Testing (UAT) is a type of testing performed by the end user or the client to
verify/accept the software system before moving the software application to the production
environment. UAT is done in the final phase of testing after functional, integration and system
testing is done.
The main purpose of UAT is to validate the end to end business flow. It does NOT focus on
Cosmetic errors, Spelling mistakes or System testing. User Acceptance Testing is carried out in a
separate testing environment with production-like data setup. It is a kind of black box testing where
two or more end-users will be involved. The Full Form of UAT is User Acceptance Testing.
Client
End users
77
Need of User Acceptance Testing:
Once software has undergone Unit, Integration, and System testing the need of Acceptance Testing
may seem redundant. But Acceptance Testing is required because
Regression Testing
Buddy Testing
Alpha Testing
Beta Testing
78
8 Conclusion
Finally it can be said that, Digital Payment System is the latest technology to make a great and
convenient banking and payment process. Going digital will help in keeping track of the monetary
transactions taking place and will pose more security on individual’s wealth. Digital payments will
also be a step for an eco friendly environment as the usage of paper reduces. A drawback factor to
the making of a digital India will be the high rates of illiteracy and poverty.
Easypay saves customer’s time on going to separate websites for separate payments.
Most importantly, it's very easy to use.
In a nutshell, it is one useful app that can really come in “handy for customers” and is definitely
worth a try.
The app is best app so you don’t have to worry too much about the authenticity and security. So you
should use it for recharge and payment for your bills. There is nothing wrong in getting some bucks
for making payments.
Easypay is a great app undoubtedly. It has all the features that a payments app should have. You can
make and receive payments in moments. It is secure, fast and easy to use.
Digital payments are future. In coming years we will see payment methods transitioning from
physical cash to the digital payment methods. Before the transition concludes, many new trends will
appear and disappear. These trends will play a vital role in shaping our future payment methods.
Easypay is a payment app that encompasses different aspects as well . However, just like other
payment apps, it also comes with a maximum limit on the quantum of transactions that is possible
through the app in 24 hours. The best part about the app is that you do not have to load the wallet
again and again to make any transaction. It is much easier to keep track record of the incoming and
outgoing money via bank statements.
79
9.BIBLIOGRAPHY
https://www.guru99.com/
http://softwaretestingfundamentals.com/
https://scholar.google.com/
https://www.google.com/
https://www.javatpoint.com/
https://www.w3schools.com/
https://www.youtube.com/channel/UCBTuzjmeuyMkkDCSNKUxJiw
https://www.youtube.com/channel/UCmlllk0gmFt6nOtyuOhYEpg
https://.wikipedia.org/
https://netbeans.org/community/releases/82/
https://dev.mysql.com/doc/refman/8.0/en/introduction.html
https://www.sparxsystems.eu/resources/project-development-with-uml-and-
ea/introduction-to-uml/
https://www.sciencedirect.com/topics/computer-science/technical-feasibility
http://www.ofm.wa.gov/resources/ecommerce.asp.
BOOK
Chablis - Market Analysis of Digital Payment Systems by Ricarda Weber.
Fundamental of Software Engineering By Rajiv Mall.
80