Smart Court Case Management Using Ai

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Abstract –The main objective is to Create a user-friendly online interface for users to communicate with court system and, reduce the distance and time barrier between users and court system, To create a online platform where people can share ideas, invoke discussions, issue complaints, create suggestion/petitions for improvement in court case application website. To encourage the users to actively participate in court system to bring transparency and flexibility. Users will be able to create new account, log-in to their existing accounts which allow them the facility for online submission of various forms related to online appeal of new case. The smart court case management provides forms language option so it’s easy to use.

Keywords—Artificial Intelligence, Security, Digital Signature.

Introduction

Smart Court Case Management can be defined as the employment of internet for providing services and information to the people. The Main motive is to help people for their daily court case management activities.

Smart Court Case Management intends to help people by removing the wastage of time caused by waiting in a queue for various process (Case Appeal, Get case dates, etc).This is regarding to the Government. It is another step towards elimination of corruption. Smart Court Case Management provides interface for people to communicate with court and reduce the distance and time barrier between people and court, it can also be considered as an online platform where people can share ideas, view comments of that case on system, register complaints and creates suggestion/petitions for improvement of Court administration.

System Functionality

Figure 1 explains overall functionality of the system along with different set of users involved.

Figure 1: Court case management’s users

User: This user is normal user who will have the limited access to case related data and if want can do online appeal for the legal case in court.

Client: The client user will be the petitioner and respondent of the legal case.

SuperAdmin: The SuperAdmin user will control all the Admins.

Admin: There will be several Admins, under every admin there will be particular number of police stations, admin will assign judge to case, send case related mails to police station and petitioner and respondent.

Judge: Judge is the only user who can edit the actual case data.

Lawyer: The lawyer user will collect and store the proofs.

PoliceStation: Police station will be the only place where case can be created.

BACKGROUND

The court data should be secured. The Smart Court Case Management software is concerned with the security of the court data and thus proper care has to be taken that confidential data from within the database is not leaked out. The main focus of the system is on security and thus the following sets of features are used to provide high security.

Encryption and Decryption

Digital Signature

Encryption and Decryption

This system is based on the 3 pillars of information security- Confidentiality, Integrity and Availability. The digital signature used here protects the integrity and authenticity of a message. However other techniques are still required to provide confidentiality of the message being sent. Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as cipher text).

In many contexts, the word encryption also implicitly refers to the reverse process, decryption, to make the encrypted information readable again (i.e. to make it unencrypted). For this project uses inbuilt package ‘javax.crypto’

To provide higher integrity and confidentiality project uses both the digital signature and encryption mechanisms. The document is digitally signed by the sender as well as the document is encrypted.

Digital Signature

A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit.

Any data/document which is sent through the system will require the sender to digitally sign the data before sending. The concept works in two stages, Signing and Verification as illustrated in Figure 2(a) and 2(b) respectively.

D:\DigDocSign01.gif

Figure 2(a) Signing

D:\DigDocSign02.gifFigure 2(b) Verification

java.security Package: Java provides an in built package with the classes and interfaces for the security framework.

Generate private and public keys:TheKeyPairGenerator class is used to generate pairs of public and private keys. Key pair generators are constructed using the getInstance factory methods. These are static methods that return instances of a given class. A Key pair generator for a particular algorithm creates a public/private key pair that can be used with this algorithm.

Sign the data: A digital signature is created (or verified) using an instance of the Signature class.

Signature dsa =

Signature.getInstance("SHA1withDSA","SUN");

DSA is a Digital Signature Algorithm while SHA1 is a Secure Hash Algorithm which is the message digest algorithm.

Verify the Signature: Once all of the data is supplied to the Signature object, one can verify the digital signature of that data and report the result. Suppose that the alleged signature was read into a byte array called sigToVerify.

boolean verifies = sig.verify(sigToVerify);

System.out.println("signature verifies: " + verifies);

The verifies value will be true if the alleged signature (sigToVerify) is the actual signature of the specified data file generated by the private key corresponding to the public key

System Scope

There is a wide scope for our project in today’s world. We considered this project for district level courts activities. Our application will prove to be of great help to any people who is related to court for performing his/her daily court management activities.

Functionality which are within the scope of system:

User can submit their case Appeal online.

User can view dates of hearings online.

User can submit their comments online.

User can download result of case.

It provides case scheduling facility to court authority.

Entire Software Application is being divided into two broad categories – Request an Appeal and Forum

Request an Appeal is basically form based system which operates to issue case. General users request for appeal by filling the complete details and this information will be passed to authorities.

Forum provides information regarding general updates and it also provides facilities to submit their queries and feedback to authorities.

Understanding all the needs lead to an idea to develop Smart Court Case Management and we decided to take the initiative to develop the application and render our service.

Artificial Intelligence

In smart court case management we are making the use of Case-based reasoning for predicting the possible results of running case by comparing the current case with the references of the previous cases.

Case-based reasoning has been formalized for purposes of computer reasoning as a four-step process:

Retrieve: Given a target problem, retrieve from memory cases relevant to solving it. A case consists of a problem, its solution, and, typically, annotations about how the solution was derived.

Reuse: Map the solution from the previous case to the target problem. This may involve adapting the solution as needed to fit the new situation.

Revise: Having mapped the previous solution to the target situation, test the new solution in the real world and if necessary, revise.

Retain: After the solution has been successfully adapted to the target problem, store the resulting experience as a new case in memory.

conclusion

This project thus allows court to manage cases in a secured and confidential way. The secured login system which uses digital signatures and encryption login provides a high level of security. Digital Signatures and encryption used will help to prevent unauthorized access to data. Thus this project achieves information security by following the 3 principles of ‘Confidentiality’, ‘Integrity’ and ‘Authenticity’.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now