Search

Advanced Search

J and K : Deputy Commissioner Jammu launches Passenger Registration and Management System, SMS Services to facilitate travelers

Jit Raj, Jammu and Kashmir jit[dot]raj[at]nic[dot]in
  |   Jun 3, 2020
Deputy Commissioner Jammu Ms Sushma Chauhan launching the PRMS Application. DIO Jammu Sanjay Gupta also present on the occasion
Deputy Commissioner Jammu Ms Sushma Chauhan launching the PRMS Application. DIO Jammu Sanjay Gupta also present on the occasion

Screenshot of the Homepage of the PRMS Application
Screenshot of the Homepage of the PRMS Application

Jammu, June 02: In order to keep systematic record of all passengers arriving at Jammu railway station and to inform these passengers them about results of COVID-19 tests, that each passenger undergoes, Deputy Commissioner Jammu Ms. Sushma Chauhan has formally launched IT enabled solutions along with mobile applications that are downloaded on handheld gadgets and mobile phones enabling officials manning entire process to do their job at ease and with precision, along with SMS based service for intimation of test results.

Giving details of the IT enabled services, Deputy Commissioner Jammu, Ms. Sushma Chauhan said that a Control Room has been established at Railway Station Jammu which monitors the data being captured through mobile app on real time basis at the Railway Platform itself. Similarly, to facilitate people about their COVID-19 test results, SMS are sent to individuals on their mobile phones thereby streamlining the response mechanism. 

The application “Passengers Registration Management System (PRMS)” and SMS services that are being put to use have been indigenously developed by NIC District Centre Jammu headed by Sanjay Gupta Technical Director & DIO Jammu. This system is a part of e-governance initiative and is supported by an android application. Tagging vehicles against each train passenger is another facility which has been provided in the PRMS as well as mobile app. After complete vehicle tagging, a detailed manifest of all passengers travelling in a bus can be generated, thus enabling smooth transportation of passengers arriving at Jammu Railway Station & bound for districts other than Jammu also.

PRMS works on a model of pre-existing data of all passengers travelling in the train, provided by IRCTC after preparation of Charts by Railway authorities. This data is then searched by Mobile Application and updated into a central server and real time data and statistics can be monitored by authorities in the control room. Data of more than 16200 passengers has been captured through TPRMS and Mobile App so far.

Deputy Commissioner Jammu, Ms. Sushma Chauhan lauded the efforts of DIO NIC Jammu for designing, developing and implementing IT enabled solutions in shortest possible time span and ensuring data precision to the core.
 

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...