Search

Advanced Search

Smart Card Driving License System Launched at Chitrakoot, Uttar Pradesh

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   May 23, 2013

Smart Card based Driving License system was inaugurated at ARTO Chitrakoot on 2nd May 2013 by Dr. Balkar Singh District Magistrate, Chitrakoot Uttar Pradesh. The district is in the Seventh and last phase of SCDL Implementation in Uttar Pradesh as planned by the UP Transport Department. Senior functionaries of transport department Shri Uday Ram ARTO and Shri Anil Mishra RTO Banda were present during the inauguration.

The system restricts the issuance of fake and duplicate DLs as the applicants will have to be physically present before the authorities to submit their thumb impression, photos and digital signatures.  The database is thus created for the license, which will be used for the creation of State Register and then National Register.

The new DL comes in tamper proof plastic card with 64 Kb microchip processor embedded in it. The chip contains information like Name and date of birth of the. The SARATHI software developed by NIC is used for providing all the activities related with the License. To secure the information on chip the Key Management System, developed by NIC is also being used. A fee of Rs.300 will be charged for issuing new SCDL and Rs.200 will be charged for converting old DL into the new SCDL.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...