Search

Advanced Search

E-Services of Ration Card Launched in Kerala

Asha Varma, Kerala ashavarma[dot]kc[at]nic[dot]in
  |   Aug 17, 2010
Inaugural function
Inaugural function

<meta content="text/html; charset=utf-8" http-equiv="CONTENT-TYPE" /> <title></title> <meta content="OpenOffice.org 3.0 (Linux)" name="GENERATOR" /> <style type="text/css"> <!-- @page { margin: 2cm } P { margin-bottom: 0.21cm } --> </style>

The e-Services of Ration cards in Kerala was launched on 23rd July 2010 by the Hon. Minister for Food and Civil Supplies Sri. C. Divikaran during a function held at NIC, Kerala State Training Centre, Thiruvanthapuram. Sri. K. Jyothi Lal, I.A.S., Secretary(Food And Civil Supplies), Smt. M.S. Jaya, I.A.S., Director Civil Supplies and Dr. K. Santhanaraman, SIO, Kerala State unit spoke on the occasion.

The citizen can now avail various services of the ration card viz. Apply for new ration card, addition and deleltion of mamebrs, change of address, renewal of ration card, surrender certificate etc. electronically. Citizen can apply directly or through any of the 3000 Citizen Service centres(Akshaya Centres) in Kerala. The applications submitted on-line will be processed on priority and applicant can collect the card from the taluk Supply office the next day.

The software for the same was developed by NIC, Kerala State Unit. The software provides facility to view the status of applications, send SMS alerts etc. The central database of the entire ration card holders of Kerala is created and are synchronised with the Ration card management system available in the Taluk Supply offices. The software is capable of accepting payment related to the transaction from any cash counter of civil supplies department or Akshaya centres and also offers various delivery modes like SPEED POST and delivery through Akshaya centres. etc. The software also has the facility for e-verification of ration card for registered government departments.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...