Search

Advanced Search

Release of new version of Covid Suraksha 2.0 by Honble Health Minister of Assam

Kavita Barkakoty, Assam asm-kavita[at]nic[dot]in
  |   Jun 12, 2020
Release of new version of Covid Suraksha 2.0 by Honble Health Minister of Assam
Release of new version of Covid Suraksha 2.0 by Honble Health Minister of Assam

NIC Team with Honble Health Minister Assam
NIC Team with Honble Health Minister Assam

The new version of Covid Suraksha 2.0 with geo-fencing technology was launched by Sh.Himanta Biswa Sarma, Honble Minister of Health and Finance on 6th June 2020 in the presence of Deputy Commissioner Jorhat and other Senior functionaries. The app was functioning in many districts from April with monitoring of the quarantine people by the Health workers module. The following new features were added based on the request from Deputy Commissioner Jorhat.

  • Common platform for both home quarantine persons and health workers.
  • Self-Registration of citizens advised for 14 days’ home quarantine.
  • Users can login to the app using registered credentials.
  • Profile and QR code section of the citizen users.
  • Sending of regular selfie photo update containing current location coordinates, timestamp etc.
  • Timely notification to remind about sending periodic selfie update.
  • Notification when the user exits/enters the geofence area.
  • Geofencing feature to send alert to the concerned authority if the home quarantine person crosses the circle of 150m from hisher home.
  • Monitoring of selfie photos, geofence status and user details at web dashboard.

 

The App was developed by Suman Boro, DIA, Hojai District, Assam and the Web application and Dashboard for the District Administration by Gautam Sharma, NIC Assam State Unit.

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...