Fact-checked by Grok 2 weeks ago

UID

The Unique Identification Authority of India (UIDAI) is a statutory body established by the Government of India under the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, tasked with issuing a 12-digit randomized unique identification number known as Aadhaar to all residents of the country. Aadhaar enrollment relies on demographic details alongside biometric data, including fingerprints, iris scans, and facial photographs, to create a verifiable digital identity aimed at reducing duplication and fraud in welfare distribution, banking, and public services. Launched as a project in 2009 with the first number issued in 2010, UIDAI has enrolled over 1.37 billion individuals by 2025, making it the world's largest biometric identification system and enabling direct benefit transfers that have saved billions in leakages from subsidy programs. Despite these efficiencies, the system has sparked significant controversies, including Supreme Court rulings limiting mandatory linkage to services, documented data breaches at enrollment centers, and debates over privacy risks from centralized biometric storage, with critics highlighting vulnerabilities in third-party handling despite UIDAI's de-duplication claims.

Unique Identifiers: Core Concepts

Definition and Fundamental Principles

A (UID), also known as a unique ID, is a numeric or alphanumeric assigned to a single —such as an object, , , or —to distinguish it unambiguously from all others within a defined or . This assignment ensures that the identifier serves as a point, independent of the entity's mutable attributes like names, locations, or descriptions, which may change over time. In and contexts, UIDs underpin operations like indexing, querying, and tracking by providing a reliable for association and retrieval. The core principles of unique identifiers revolve around uniqueness, persistence, and scope-bound reliability. Uniqueness guarantees that no two entities within the applicable domain share the same identifier, minimizing collision risks through deterministic or probabilistic methods; for instance, globally unique identifiers like UUIDs (128-bit values) achieve this via standardized generation algorithms that leverage timestamps, hardware addresses, or cryptographically secure randomness, yielding collision probabilities below 1 in 2^122 for random variants. Persistence requires the identifier to remain invariant throughout the entity's lifecycle, avoiding reassignments that could disrupt references or historical linkages, as emphasized in standards for data interoperability where changing IDs would invalidate downstream dependencies. Scope defines the domain of uniqueness—local (e.g., within a single database) versus global (across distributed systems)—with global scopes demanding decentralized generation without central coordination to scale effectively. Additional principles include non-significance and verifiability. Non-significant identifiers deliberately omit encoded meaning about the entity (e.g., avoiding sequential numbers implying order or ), which enhances flexibility as entity properties evolve without necessitating ID alterations. Verifiability supports integrity checks, often through checksums or hashes embedded in the ID , ensuring detectability of errors or tampering. These principles collectively enable causal reliability in systems, where identifiers act as immutable anchors for entity relationships, reducing errors in processes like or asset serialization. Standards such as ISO/IEC 9834-8 specify formats and rules for producing such 128-bit identifiers with guaranteed global uniqueness, applicable across open systems interconnection environments.

Technical Standards and Generation Methods

Unique identifiers in computing adhere to standards such as the (UUID), defined in 4122 and updated in 9562, which specifies a 128-bit value represented as a string of 32 digits grouped as 8-4-4-4-12 characters (e.g., 123e4567-e89b-12d3-a456-426614174000). This format ensures compatibility across systems without requiring a central authority, with the generation algorithms designed to minimize collision probabilities to negligible levels, even in distributed environments. The [International Telecommunication Union](/page/International_Telecommunication Union) (ITU) endorses UUIDs under ISO/IEC 9834-8:2014, emphasizing their suitability for high-volume generation at rates up to 10 million per second per machine. UUID generation employs version-specific algorithms to balance uniqueness, order, and security. UUIDs incorporate a 60-bit ( UTC since October 15, 1582), a 14-bit clock for countering duplicates during clock resets, and the 48-bit node identifier (typically the ), ensuring temporal ordering and spatial uniqueness across networked devices. Version 2 extends this for (DCE) security by embedding user or group IDs in place of parts of the , though it is less commonly used due to privacy concerns with MAC addresses. Name-based versions—v3 using hashing and v5 using —derive identifiers from a UUID and a name string, producing deterministic outputs for the same inputs to enable consistent mapping without . Version 4 relies on random or pseudo-random 122 bits (after reserving version and variant fields), leveraging cryptographic-quality to achieve collision odds of approximately 1 in 2^122 for practical deployments. Beyond UUIDs, other protocols address domain-specific needs, such as Twitter's algorithm, which combines a 41-bit , worker ID, and sequence number for sortable, 64-bit distributed IDs without coordination, though it lacks formal like UUID. Sequential methods, common in centralized databases, increment counters but risk collisions in sharded or distributed setups unless augmented with shards or timestamps; these are not standardized for global uniqueness but follow implementation-specific protocols like auto-increment in SQL databases. Hash-based generation, using functions like SHA-256 on entity attributes, provides uniqueness via input diversity but requires salting to prevent preimage attacks and is not a primary standard for general UIDs. Overall, UUID standards prioritize through mathematical proofs of rarity, with empirical validation showing no recorded collisions in trillions generated.

Applications in Computing and Technology

User Identifiers in Operating Systems

In operating systems, such as and BSD variants, users are identified by a user ID (UID), which is a non-negative assigned to each user account upon creation and stored in files like /etc/passwd. The UID 0 is reserved for the , providing full administrative privileges, while UIDs below 1000 are conventionally allocated to system accounts to prevent conflicts with human users. These identifiers enable the to enforce file permissions, , and limits without relying on human-readable usernames, which are merely mapped to UIDs for user convenience. The standard defines three UID variants per process—real UID (RUID), effective UID (EUID), and saved set-UID (SUID)—to handle and drops dynamically. The RUID reflects the process owner's identity for auditing and default access, the EUID determines current privileges (e.g., elevated during execution), and the SUID preserves the original EUID for potential restoration. Complementing UIDs, group IDs (GIDs) associate users with access groups, with files and directories owning both a UID and primary GID to resolve permissions via modes (e.g., 644 for owner read/write, others read). Tools like id and getpwuid query these via the user database, ensuring consistent identity resolution across compliant systems. In Microsoft Windows operating systems, user identifiers take the form of security identifiers (SIDs), which are unique, variable-length binary strings (typically 28 bytes) generated by local or domain authorities to label security principals like users, groups, or services. SIDs follow a structured format beginning with "S-1-" followed by the issuing authority (e.g., 5 for NT Authority) and relative identifiers (RIDs) for uniqueness, such as S-1-5-21-...-1001 for a domain user, preventing reuse even if usernames change. Unlike numeric UIDs, SIDs support domain-wide uniqueness in Active Directory environments, underpinning NTFS access control lists (ACLs), registry keys, and token-based authorization where processes inherit the caller's SID for privilege checks. Well-known SIDs, like S-1-5-18 for the Local System account, are predefined for system entities, with tools such as whoami /user retrieving them for verification. Both paradigms prioritize immutability and efficiency: UIDs/GIDs for lightweight, local compliance and for scalable, hierarchical Windows security models, though cross-platform mappings (e.g., via or ) require emulation layers to reconcile differences. UID/SID collisions are mitigated by generation algorithms ensuring local uniqueness, but enterprise deployments demand centralized management to avoid duplicates in federated setups.

Database and Data Management Uses

In relational databases, unique identifiers (UIDs) serve as primary keys to uniquely distinguish each row or within a table, enforcing by preventing duplicate records and enabling efficient querying and joins. This mechanism, formalized in SQL standards such as ANSI , ensures across tables via foreign keys that reference primary UIDs. Primary keys may consist of a single column or composite set, but must remain immutable to maintain stable relationships. UIDs fall into two primary categories: natural keys, derived from inherent business attributes like social security numbers or email addresses, and surrogate keys, artificially generated by the system without semantic meaning. Natural keys risk instability if underlying data changes, such as address updates, potentially disrupting joins, whereas surrogate keys—often auto-incrementing integers or universally unique identifiers ()—provide consistent referencing regardless of attribute modifications. UUIDs, standardized in published in July 2005, are 128-bit values designed for global uniqueness across distributed systems, generated via algorithms incorporating timestamps, node addresses, and random components to minimize collision probability to approximately 1 in 2^122. The adoption of UIDs in enhances performance through optimized indexing, as primary keys support structures for logarithmic-time lookups and range scans, reducing query overhead in large datasets. Surrogate UIDs like UUIDs further enable horizontal scalability in distributed databases by avoiding centralized sequence generators, while their non-sequential nature obscures predictable patterns, bolstering security against enumeration attacks. Empirical assessments indicate surrogate keys can halve storage for references in high-cardinality joins compared to composite natural keys, though they increase index size by up to 16 bytes per UUID versus 4-byte integers.
Key TypeCharacteristicsAdvantagesDisadvantages
Natural KeyBusiness-derived (e.g., , )Semantic relevance; no extra storage for surrogatesProne to changes; validation overhead; potential for non-uniqueness if attributes evolve
Surrogate KeySystem-generated (e.g., auto-increment, UUID)Immutability; efficient joins; global uniquenessLacks meaning; larger footprint for UUIDs; requires additional constraints for
In practice, hybrid approaches index both natural and surrogate keys, using the latter as primary for internal operations while exposing natural keys for user-facing queries, thereby balancing efficiency and usability.

Hardware and Asset Tracking Systems

Unique identifiers (UIDs) in hardware and asset tracking systems consist of alphanumeric codes or strings permanently assigned to physical items, such as equipment, components, or inventory, to enable precise monitoring throughout their lifecycle. These identifiers facilitate machine-readable tracking via technologies like barcodes, Data Matrix symbols, or RFID tags, ensuring each asset's location, condition, and history can be recorded without ambiguity. In manufacturing and logistics, UIDs replace generic labeling by providing serialized data that links to databases for real-time updates, reducing errors in inventory counts that traditional methods often exceed by 10-20% in manual audits. Implementation typically involves embedding the UID during production or retrofitting legacy hardware with durable labels compliant with standards like ISO/IEC 15459 for automatic identification. For instance, RFID-enabled UIDs allow bulk scanning of assets without line-of-sight, as used in warehouse operations where read rates surpass 99% for tagged pallets compared to 80-90% for barcodes alone. In IT hardware management, UIDs such as extended serial numbers or asset tags integrate with software systems to automate check-ins, maintenance scheduling, and depreciation tracking, with studies showing deployment can cut asset loss rates by up to 30% in large enterprises. Asset tracking systems leverage UIDs for chain-of-custody verification in sectors like electronics assembly, where components bearing unique codes prevent integration, as evidenced by pilots reporting 15-25% improvements in accuracy. Integration with sensors further enhances functionality, allowing UIDs to trigger alerts for anomalies like unauthorized movement, though initial setup costs average $0.50-2 per depending on requirements for harsh environments. Empirical assessments indicate that UID adoption correlates with 20-40% reductions in operational from misplaced assets, based on industry benchmarks from firms implementing serialized tracking since the early .

National and Biometric Identification Systems

India's Program

The program is India's national biometric identification initiative, issuing a 12-digit unique identity number to residents based on demographic and biometric data to enable de-duplication and authentication for public and private services. Launched under the Unique Identification Authority of India (UIDAI), established on January 28, 2009, by the Planning Commission of , the program sought to address challenges in identity verification, such as ghost beneficiaries in schemes, by creating a scalable, technology-driven system for direct benefit transfers and . The first Aadhaar number was generated in September 2010 in , with rapid scaling thereafter; by 2016, over 940 million enrollments had been completed, targeting coverage for India's then-estimated 1.2 billion residents. Enrollment involves residents voluntarily providing demographic details—such as name, date of birth, , and —alongside biometric , including all ten , scans of both eyes, and a photograph, captured at authorized centers. UIDAI employs an automated biometric identification system to match against existing records, ensuring uniqueness with a claimed de-duplication accuracy exceeding 99.97% based on multi-biometric fusion algorithms. The process is free for initial enrollment and updates, with over 1.43 billion numbers generated as of mid-2025, achieving near-universal adult saturation above 99% in most states relative to projected populations. occurs via , , face, or (OTP) linked to the mobile number, supporting over 284 transactions monthly as of 2025, a 32% year-over-year increase reflecting integration into digital payments and services. The program's statutory framework was formalized through the (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act of 2016, which designated UIDAI as a statutory responsible for , , and while prohibiting the use of Aadhaar for non-essential purposes beyond subsidy delivery. Initial funding came from the , with UIDAI operating under the Ministry of and ; by 2025, it manages a network of over 1.57 million certified stations and 960 active agencies. Empirical assessments indicate Aadhaar has reduced leakages in programs like the Public Distribution System by enabling biometric-linked disbursements, with studies estimating savings of up to 20-30% in subsidy expenditures through elimination of duplicates. However, saturation varies by demographics, with lower rates among children under five (around 80-90% in some regions) due to phased biometric requirements starting at age five.

Military and Government Implementations (e.g., IUID)

The () employs Item Unique Identification (IUID) to assign globally unique and unambiguous identifiers to tangible items, distinguishing each from all others acquired, produced, or owned by the department throughout its lifecycle. This system mandates machine-readable data elements on qualifying items, such as those valued at $5,000 or more, controlled by , mission-essential, or replenished via repair cycles, to support , accountability, and sustainment. The unique item identifier (UII) is constructed from standardized elements, including an enterprise identifier (e.g., or Acquisition Activity Identifier) concatenated with item-specific data like , adhering to DoD Instruction 8320.04 for serially managed items. Implementation began in 2003 following congressional directives to enhance property visibility and reduce losses, with formal policy via a September 2003 Defense Federal Acquisition Regulation Supplement (DFARS) interim rule and subsequent updates, including DFARS clause 252.211-7003 effective from 2005. Marking complies with standards, typically using two-dimensional symbols encoded on items via direct part marking techniques like or dot peen, ensuring readability despite environmental wear. Qualifying items must be registered in the IUID Registry, a capturing UII , pedigree, and status updates to enable real-time queries across supply chains. Branch-specific adaptations include the U.S. Marine Corps' 2010 order (MCO 4410.28) requiring IUID for ground equipment meeting thresholds, with registration and periodic audits to verify compliance. The U.S. Navy provides dedicated training for IUID processes, emphasizing integration with systems for inventory management. By 2012, DoD reported marking millions of items, yielding improvements in asset visibility, though audits noted gaps in full implementation for legacy inventory. Beyond , federal civilian agencies apply similar UID principles under broader policies, such as the Federal Acquisition Regulation's valuation requirements, but military implementations prioritize serialized tracking for high-value weapons systems and munitions. Internationally, allies adopt compatible standards for , though specifics vary by nation without a unified global registry equivalent to DoD's.

Organizations and Governance

Unique Identification Authority of India (UIDAI)

The Unique Identification Authority of India (UIDAI) operates as a under the Ministry of Electronics and Information Technology, tasked with issuing and managing the identification numbers for Indian residents. Established initially in January 2009 as an attached office of the Planning Commission to design and implement the scheme, it gained statutory status through the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, effective from July 12, 2016. This legislative framework mandates UIDAI to collect demographic and biometric data for unique identification, facilitate authentication services, and ensure data security without authorizing surveillance or profiling. UIDAI's core mandate centers on generating 12-digit unique numbers, which as of September 16, 2025, total 142.76 , covering over 99% saturation in most states based on projected populations. The authority oversees centers, biometric de-duplication using fingerprints, scans, and , and supports e-KYC and protocols limited to yes/no responses to prevent leakage. It maintains a with and multi-factor safeguards, responding to over 221 transactions in August 2025 alone, reflecting a 10% year-over-year increase tied to expanded linkages. Organizationally, UIDAI is governed by a chairperson appointed by the central government, alongside full-time and part-time members, with operational leadership vested in a Chief Executive Officer reporting to the Department of Electronics and Information Technology. Bhuvnesh Kumar has served as CEO since January 2025, succeeding prior appointees including Sailesh, with the structure comprising a headquarters in New Delhi and eight regional offices each led by a Deputy Director General supported by directors and technical staff. Funding derives from government allocations and authentication fees, as detailed in annual reports submitted under Section 27 of the Aadhaar Act. UIDAI enforces regulations for enrollment agencies, conducts audits, and handles updates via online or permanent enrollment centers, with grievance mechanisms including a toll-free (1947) and portal for complaints on rejections or data issues. While official documentation highlights compliance with data minimization principles—storing only hashed and prohibiting UIDAI from linking identities to transactions—independent assessments of governance have noted challenges in deactivating deceased individuals' records, with only about 1.15 cards deactivated despite higher estimated deaths, potentially inflating active counts beyond live population estimates of 142.39 as of 2025. UIDAI's responses emphasize ongoing cleanup drives and voluntary update protocols to maintain integrity.

Other Relevant Bodies

The , headquartered in Brussels, Belgium, develops and maintains global standards for unique identification in supply chains, including the (GTIN) and (SSCC), which assign unique identifiers to products, locations, and assets to facilitate tracking and interoperability across industries. Founded in 1977 as the successor to earlier standardization efforts, GS1 operates through over 110 member organizations worldwide, enabling the issuance of billions of unique codes annually for , logistics, and healthcare applications, such as the (UDI) system adopted by regulators like the FDA and . Its standards emphasize data accuracy and machine readability, reducing errors in global trade estimated at $1.5 trillion annually due to identification mismatches. The International Biometrics + Identity Association (IBIA), established in and based in the United States, serves as a advocating for ethical deployment of biometric and technologies, including unique identification systems reliant on fingerprints, facial recognition, and iris scans. With members spanning technology providers, integrators, and end-users, IBIA promotes standards for privacy-preserving biometrics and has influenced policies in over 50 countries, publishing annual reports on biometric deployments that highlight efficacy in reducing fraud by up to 90% in enrollment processes. Unlike government authorities, IBIA focuses on and , critiquing overreliance on centralized databases vulnerable to breaches, as seen in incidents affecting millions of records globally. The World Bank's Identification for Development (ID4D) initiative, launched in 2014, assists governments in designing and implementing foundational identity systems, including unique ID registries integrated with , to reach the estimated 850 million people worldwide lacking legal proof of identity. Operating through partnerships with over 50 countries, ID4D provides diagnostic tools, legal frameworks, and , emphasizing cost-effective biometric enrollment that has enabled for 1.2 billion individuals via linked systems as of 2023. Its assessments prioritize empirical metrics like coverage rates and de-duplication accuracy, reporting that robust UID frameworks correlate with 20-30% increases in service delivery efficiency, while warning against exclusionary designs that disproportionately affect vulnerable populations. ID4D's non-binding guidelines draw from cross-country data, advocating hybrid digital-physical IDs to mitigate risks from pure digital failures, such as outages in centralized biometric matching.

Controversies, Criticisms, and Empirical Assessments

Privacy and Surveillance Debates

Critics of unique identification systems, particularly India's program, argue that the centralization of biometric and demographic data in a single repository facilitates unprecedented government capabilities, enabling the tracking of individuals' activities across public and private services without adequate safeguards. logs, which record details including time, , and type, can be correlated to citizens' behaviors, raising fears of function creep where initial welfare-focused uses expand into broader monitoring. This concern is amplified by the absence of mandatory purpose limitation or recording for authentications, allowing indefinite retention of logs accessible to authorities under broad provisions in the Aadhaar Act of 2016. Empirical evidence of vulnerabilities underscores these risks, with multiple data exposure incidents demonstrating the fragility of the system. In early 2017, Excel files containing numbers and personal details of millions were inadvertently published online by offices and retrievable via simple searches, while a programming exposed bank details of over one million pension beneficiaries on a public . Further, in , approximately 200 websites accidentally disclosed enrollees' biometric and demographic , affecting potentially billions of records in aggregate exposures. Biometric identifiers, being non-secret and immutable—unlike revocable passwords—pose permanent threats once compromised, as duplicates cannot be reissued, heightening and unauthorized identification risks. Legal challenges have centered on these issues, culminating in the Indian Supreme Court's recognition of as a fundamental right under Articles 14, 19, and 21 of the Constitution in the 2017 Puttaswamy judgment, which scrutinized 's proportionality. In its September 26, 2018, ruling, a 4-1 majority upheld the program's constitutionality for targeted welfare delivery and tax administration but imposed restrictions, prohibiting private entities from mandating Aadhaar for services, barring non-essential linkages like bank accounts or mobile numbers, and mandating data minimization to curb potential. Dissenting Justice D.Y. Chandrachud warned of the system's dystopian risks, including total state control over personal data. Despite these judicial limits, ongoing criticisms highlight insufficient enforcement and the lack of a comprehensive data protection regime at 's inception, which permitted weak insider controls and unregulated third-party access, exacerbating fears amid reports of police harassment via scrutiny. Proponents, including the Unique Identification Authority of India (UIDAI), counter that data is anonymized and time-bound (retained for six months), with no verified instances of systemic misuse for , positioning the system as a necessary tool for efficient service delivery rather than an apparatus. However, peer-reviewed analyses emphasize that the architecture's design flaws, such as centralized storage without for all transmissions, inherently prioritizes over resilience.

Security Incidents and Data Integrity Issues

In early 2018, multiple vulnerabilities exposed through unauthorized s and applications, allowing access to personal details including names, es, phone numbers, and Aadhaar numbers for nearly 1.1 billion individuals between August 2017 and January 2018, as reported by cybersecurity firm . One notable case involved a where users could search and retrieve demographic for as little as Rs 500 using minimal inputs like name and partial , highlighting weak in third-party portals integrated with UIDAI systems. The World Economic Forum's Global Risks Report identified this as the world's largest at the time, underscoring risks from centralized biometric databases despite UIDAI's claims of no compromise to the core repository. In October 2023, approximately 815 million records, including personal identifiable information, surfaced for sale on forums and , brokered by threat actors offering access to datasets with names, phone numbers, and Aadhaar IDs. Cybersecurity firm Resecurity noted a spike in such listings, attributing them to leaks from compromised databases rather than direct UIDAI infiltration, though the scale raised questions about ongoing perimeter . UIDAI responded by advising users to lock biometric via its portal, but critics pointed to persistent ecosystem vulnerabilities in enrollment and verification agencies. Biometric data integrity faced direct challenges in April 2025 when dismantled a ring that tampered with fingerprints of over 1,500 holders across 12 states, enabling duplicate enrollments and identity swaps for fraudulent benefits. The operation exploited lax oversight at enrollment centers, altering stored to bypass , which compromised the central to UIDAI's . High biometric failure rates, exceeding 10% in some attempts as of July 2025, further eroded trust, prompting UIDAI scrutiny and system upgrades amid reports of denied services due to mismatched or degraded templates. These incidents reveal causal vulnerabilities from decentralized enrollment processes and insufficient tamper-proofing, rather than isolated hacks.

Achievements in Efficiency and Inclusion

The system has facilitated substantial efficiency gains in India's welfare delivery through (DBT), which uses biometric authentication to route subsidies directly to beneficiaries' bank accounts, thereby minimizing intermediaries and fraud. As of April 2025, DBT has generated cumulative savings of ₹3.48 lakh crore (approximately $41 billion) by curbing leakages in schemes such as subsidies and public distribution systems, where historical diversion rates exceeded 40% in some programs prior to implementation. These reductions stem from real-time verification that eliminates ghost beneficiaries, with independent assessments confirming halved subsidy allocations in targeted sectors due to improved targeting accuracy. Further efficiency is evident in streamlined public service delivery, where integration has accelerated processes like pension disbursements and scholarship payments, reducing administrative costs by enabling over manual verification. A cost-benefit by the National Institute of Public Finance and Policy estimates a 52.85% over a decade from such applications, driven by lower operational overheads and enhanced transparency in government expenditures. Empirical data from fuel subsidy reforms, for instance, show direct cash transfers replacing inefficient voucher systems, yielding annual savings through reduced pilferage and better fiscal management. In terms of inclusion, has enrolled over 1.3 billion individuals by 2024, providing a foundational identity framework that has integrated previously undocumented populations into formal financial and welfare systems, particularly in rural and low-income demographics. This has boosted via the Jan Dhan-Aadhaar-Mobile (JAM) trinity, with empirical studies indicating widespread uptake of zero-balance bank accounts linked to Aadhaar, enabling access to credit and remittances for underserved households. For women and marginalized groups, Aadhaar-enabled digital payments have narrowed gender gaps in banking access, as evidenced by increased formal account holdings among female-headed households post-integration with schemes like . These inclusion effects extend to broader economic participation, where authentication has facilitated over 10 billion verifications annually for services like mobile connections and portals, drawing informal sector workers into digital ecosystems and reducing exclusion from public goods. While challenges in coverage persist for remote populations, the system's scalability has demonstrably expanded service reach, with analyses highlighting its role in enhancing for equitable .

References

  1. [1]
    Unique Identification Authority of India | Government of India - uidai
    The UIDAI is a statutory authority established under the provisions of the Aadhaar Act, 2016 on 12 July 2016 by the Government of India.Vision & Mission · Composition of UIDAI Authority · Finance & Accounts
  2. [2]
    About UIDAI - Unique Identification Authority of India | Government ...
    The UIDAI is a statutory authority established under the provisions of the Aadhaar Act, 2016 on 12 July 2016 by the Government of India.Historical Background · Work with UIDAI · UIDAI Citizens Charter · Legal Framework
  3. [3]
    Aadhaar: India's Identification System - DGA Group
    The UID number is stored in a centralized database and linked to the basic demographics and biometric information – photograph, ten fingerprints and iris – of ...
  4. [4]
    Understanding Aadhaar: India's National Identification Initiative
    Sep 13, 2025 · India's Aadhaar ('Foundation') system is the world's largest national biometric ID card initiative, with nearly 1.377 billion unique ID numbers ...
  5. [5]
    Biometric Electronic ID Cards: Lessons from India's Aadhaar System ...
    Jan 13, 2025 · This article delves deeper into Aadhaar's journey, examining its achievements, controversies, major security incidents, and the lessons they offer to the ...
  6. [6]
    What is a unique identifier (UID)? | Definition from TechTarget
    Sep 4, 2024 · A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.
  7. [7]
  8. [8]
    What Is a Unique Identifier (UID), and Why Is It Important? - Coursera
    Oct 30, 2024 · Unique identifiers (UIDs) are specific codes or numbers assigned to objects, people, or data to distinguish them from others.
  9. [9]
    UUID - Glossary - MDN Web Docs
    Jul 11, 2025 · A Universally Unique Identifier (UUID) is a label used to uniquely identify a resource among all other resources of that type.
  10. [10]
    ISO/IEC 9834-8:2008 - Information technology — Open Systems ...
    ISO/IEC 9834-8:2008 specifies the format and generation rules that enable users to produce128-bit identifiers that are either guaranteed to be globally unique.
  11. [11]
    Universally Unique Identifiers (UUIDs) - ITU
    ​A UUID (Universally Unique Identifier) can be used for multiple purposes, from tagging objects with an extremely short lifetime, to reliably identifying very ...
  12. [12]
    F1: (Meta) data are assigned globally unique and persistent identifiers
    Globally unique and persistent identifiers remove ambiguity in the meaning of your published data by assigning a unique identifier to every element of metadata.
  13. [13]
    [PDF] NIST.AMS.300-12.pdf
    Jul 12, 2024 · Associating persistent and universally unique identifiers, in combination with human-readable identifiers, to key engineering require- ments ...
  14. [14]
    ISO/IEC 15459-1:2006 - Unique identifiers for transport units
    ISO/IEC 15459-1:2006 specifies a unique, non-significant, string of characters for the identification of transport units.
  15. [15]
    RFC 9562: Universally Unique IDentifiers (UUIDs)
    This specification defines a Uniform Resource Name namespace for Universally Unique IDentifiers (UUIDs), also known as Globally Unique IDentifiers (GUIDs).
  16. [16]
    RFC 9562 - Universally Unique IDentifiers (UUIDs) - IETF Datatracker
    This specification defines a Uniform Resource Name namespace for Universally Unique IDentifiers (UUIDs), also known as Globally Unique IDentifiers (GUIDs).
  17. [17]
    How to Generate Unique IDs in Distributed Systems: 6 Key Strategies
    Time-based MAC: This UUID uses the MAC Address of your computer and the current time. ; Version 2 — DCE ...
  18. [18]
    The Art and Science of Unique ID Generation in Distributed Systems
    Jun 21, 2025 · UUIDv1: Generates IDs based on a timestamp and the MAC address of the host. This makes them somewhat ordered by time and unique per machine.
  19. [19]
    Understanding UUID: Purpose and Benefits of a Universal Unique ...
    Jun 10, 2023 · These UUIDs, also known as name-based UUIDs, are generated by taking the 128-bit MD5 message digest of a concatenated string consisting of a ...
  20. [20]
    What are User Ids in Linux and Unix? - SSH Communications Security
    In Linux and Unix, the kernel identifies users by their user id. User ids are integers. User ids are mapped to user names in user mode programs.Missing: like | Show results with:like
  21. [21]
    User account management with UIDs and GIDs - Red Hat
    Dec 10, 2019 · Part one focused on useful commands. This current article deals with managing user IDs (UIDs) and group IDs (GIDs).
  22. [22]
    How does Linux identify users? - Unix & Linux Stack Exchange
    Jun 20, 2018 · In Unix, users are identified by their ID (uid), which must be unique (in the scope of the local system).
  23. [23]
    Understanding Unix UIDs - Trugman Internals
    Dec 25, 2018 · Unix-based operating systems identify users registered with the system using UIDs. Every user has a unique UID.
  24. [24]
    Real, Effective and Saved UserID in Linux - GeeksforGeeks
    Mar 18, 2021 · Every user in Unix like operating system is identified by a different integer number, this unique number is called as UserID.<|separator|>
  25. [25]
    Linux File Permission: What are UID vs GID? - CBT Nuggets
    Apr 2, 2025 · UID is the unique identifier for a file's owner, and GID is the identifier for the group associated with that file, both of which determine access permissions ...
  26. [26]
    id - The Open Group Publications Catalog
    If a user operand is provided and the process has appropriate privileges, the user and group IDs of the selected user shall be written. In this case, effective ...
  27. [27]
    Security Identifiers - Win32 apps - Microsoft Learn
    Jul 9, 2025 · A security identifier (SID) is a unique value of variable length used to identify a trustee. Each account has a unique SID issued by an authority.
  28. [28]
    What is a Security Identifier (SID)? - SentinelOne
    Jul 21, 2025 · A Security Identifier (SID) is a unique, immutable value used in Windows environments such as Windows servers, OSes, and Active Directory to identify security ...
  29. [29]
    What is a SID (Security Identifier)? - TechTarget
    Mar 8, 2022 · A security identifier (SID) is a unique value that is used to identify any security entity that the Windows operating system (OS) can authenticate.
  30. [30]
    Defining user identifiers (UIDs) - IBM
    A user with a UID and a default group (and current connect group, if applicable) with a GID can use z/OS UNIX functions and access z/OS UNIX files based on the ...
  31. [31]
    What is a Security Identifier (SID)? - JumpCloud
    Sep 9, 2025 · A Security Identifier (SID) is a variable-length alphanumeric string that uniquely identifies every security principal within a Windows ...
  32. [32]
    What Is a Primary Key? - IBM
    A primary key, also known as an SQL primary key, gives a unique identifier to each record associated with a primary key value. · SQL supports a range of data ...What is a primary key? · Understanding keys and...
  33. [33]
    Primary keys vs. unique keys: Fundamental differences - Gleek.io
    Apr 4, 2022 · Primary keys are a column or set of columns in a relational database table that uniquely identify items in the rows of the table.
  34. [34]
    Difference between Primary key and Unique key - GeeksforGeeks
    Jul 11, 2025 · A primary key is a column of a table that uniquely identifies each tuple (row) in that table. The primary key enforces integrity constraints to the table.
  35. [35]
    Surrogate Key vs Natural Key Differences and When to Use in SQL ...
    Jan 31, 2022 · A surrogate key is a system generated (could be GUID, sequence, unique identifier, etc.) value with no business meaning that is used to uniquely identify a ...
  36. [36]
    Surrogate Keys or Natural Keys? - Data and Technology Today
    Apr 23, 2014 · A surrogate key provides immutability because it is assigned and therefore its value need never change even as other data values change.
  37. [37]
    RFC 4122 - A Universally Unique IDentifier (UUID) URN Namespace
    This specification defines a Uniform Resource Name namespace for UUIDs (Universally Unique IDentifier), also known as GUIDs (Globally Unique IDentifier).
  38. [38]
    Understanding Unique IDs: Their Role and Importance Explained
    May 28, 2025 · The use of UIDs facilitates efficient data indexing and retrieval processes, which are essential for maintaining database performance.Uuid Generation Principles · Uids As Primary Keys · Unique Ids And Data Security
  39. [39]
    The Benefits of Using UUIDs for Unique Identification - PingCAP
    Jul 17, 2024 · A UUID, or Universally Unique Identifier, is a 128-bit number used to uniquely identify information in computer systems.<|separator|>
  40. [40]
    Surrogate versus Natural Keys - Ask TOM
    Jun 3, 2011 · - Can surrogate use more space, yes. But it really depends on how complex the natural keys are, how many relationships exists and how big the child tables are.Comments · Some Problems When Using... · Dbas Need To Calm Down On...Natural Key as Primary Key Vs Surrogate Key - Ask TOM - OracleSurrogate keys and their use in Data warehousing - Ask TOMMore results from asktom.oracle.com
  41. [41]
    Artificial vs Surrogate Keys | Learning Tree
    Natural keys are existing characteristic values of database objects that serve as keys. Artificial keys are generated automatically and have no intrinsic ...
  42. [42]
    When and How to Use Surrogate Keys in Databases | Sisense
    Aug 28, 2023 · If a natural key is recommended, use a surrogate key field as the primary key, and a natural key as a foreign key. While users may interact with ...General guidelines for... · Selecting a Primary key... · Combining Natural and...
  43. [43]
    How to get the "best of both worlds" with natural and surrogate keys ...
    Jul 24, 2022 · Surrogate keys have the benefit of ensuring all of these things remain true in the case when the human-readable value has the ability to change.<|control11|><|separator|>
  44. [44]
  45. [45]
    What is UID? - Metalcraft, Inc.
    Apr 2, 2025 · A unique identifier UID is designed to be a permanent, machine-readable code that provides asset visibility, traceability, and accountability.
  46. [46]
    Understanding UID (Unique Identifier) - Fogwing
    A Unique Identifier (UID) is a distinct code, number, or alphanumeric string assigned to each item in an inventory system. This identifier serves as a unique “ ...
  47. [47]
    [PDF] Department of Defense Guide to Uniquely Identifying Items
    Dec 2, 2014 · This guide is for DoD contractors and suppliers using IUID Data Matrices on new items, and DoD components on legacy items, using automatic ...
  48. [48]
  49. [49]
    Asset Tagging 101: A Guide to Tracking Your IT Hardware Efficiently
    Feb 23, 2024 · Asset tagging is the process of assigning unique identifiers or tags to hardware devices to facilitate monitoring and maintenance.<|control11|><|separator|>
  50. [50]
    Unique Identification (UID) - AssetWatch
    UID is a system of establishing unique identifiers for items to track and manage them throughout their lifecycle. In maintenance, UID can be applied to ...
  51. [51]
    6 Best Practices for Global UID Asset Tracking
    Feb 18, 2025 · The global UID asset tracking program developed by the U.S. military has transformed the management of relevant equipment, inventory, and parts.
  52. [52]
    Top Hardware Inventory Management Software 2025 - Infraon
    Jan 30, 2023 · Assign unique identification: Once all the equipment has been identified, assign a unique identification number or barcode to each item.
  53. [53]
  54. [54]
    [PDF] Aadhaar: Digital Inclusion and Public Services in India
    Aadhaar, India's program to provide a unique identity number for every resident, is the largest biometric identification program in the world.
  55. [55]
    What to Know About Aadhaar, India's Biometric Identity System | TIME
    Sep 28, 2018 · Aadhaar, which means 'foundation' in Hindi, centers around a 12-digit identity number, linked to fingerprints and iris scans.Missing: UIDAI | Show results with:UIDAI
  56. [56]
    Aadhaar Dashboard - uidai
    0 Total Registered Enrolment Station ; 1,577,427 Total Certified Operators & Supervisors ; 960 Total Active Enrolment Agencies ; 296 Total Active Registrars.
  57. [57]
    Crores of dead people live as Aadhaar ghosts; UIDAI ... - India Today
    Jul 16, 2025 · As of June 2025, India has 142.39 crore Aadhaar holders. According to the United Nations Population Fund, the country's total population stood ...
  58. [58]
    Over 284 Crore Aadhaar Authentications in January 2025 - PIB
    Feb 7, 2025 · The authentication transactions in January 2025 have recorded a growth of over 32% when compared with January 2024, when 214.8 crore such ...
  59. [59]
  60. [60]
    Data Standards - Item Unique Identification (IUID) - OUSD A&S
    Directs Services and Agencies to compile quarterly reports that reflect the rate of inclusion of the clause in contracts procuring IUID items.Missing: history | Show results with:history
  61. [61]
    Item Unique Identification (IUID) | www.dau.edu
    The IUID program assigns a unique identifier to each item, ensuring that it remains constant throughout the item's lifecycle. Item Unique Identification (IUID) ...
  62. [62]
    [PDF] DoD Instruction 8320.04, "DoD Serially Managed Items of Tangible ...
    Nov 29, 2024 · Prescribes the item-level data required for DoD serially managed items, standards for constructing the IUID 2.0 unique item identifier (UII), ...
  63. [63]
    Defense Logistics: Improvements Needed to Enhance DOD's ...
    May 3, 2012 · In 2003, DOD began implementation of IUID and has estimated that it could improve the accountability and maintenance of its property and ...
  64. [64]
    Defense Federal Acquisition Regulation Supplement; Unique Item ...
    Apr 22, 2005 · SUPPLEMENTARY INFORMATION: A. Background. DoD published an interim rule at 68 FR 75196 on December 30, 2003, containing policy that requires ...
  65. [65]
    Item Unique Identification (IUID) | www.dau.edu
    Item Unique Identification (IUID) is a systematic process to globally and unambiguously distinguish one item from all the other items that DoD buys or owns.Missing: history | Show results with:history<|separator|>
  66. [66]
    Item Unique Identification (IUID) - DoD Procurement Toolbox
    Item Unique Identification (IUID) is required for all new Department of Defense (DoD) acquisitions meeting these criteria.<|separator|>
  67. [67]
    [PDF] MCO 4410.28 ITEM UNIQUE IDENTIFICATION (IUID) OF GROUND ...
    Feb 1, 2010 · Employ IUID within the Marine Corps by ensuring all ground equipment items meeting established criteria are IUID marked and registered, and ...
  68. [68]
    [PDF] Department of Navy Item Unique Identification (IUID) Training ...
    Sep 17, 2014 · Information within this guide is available from government resources. Other relevant aspects, particularly training opportunities, may be ...
  69. [69]
  70. [70]
    [PDF] DoD Instruction 8320.03, "Unique Identitfication (UID) Standards for ...
    Nov 4, 2015 · Use UID standards to create unique identifiers to clearly identify entities in information exchanges among the DoD Components and their mission ...Missing: history | Show results with:history
  71. [71]
    [PDF] State/UT wise Aadhaar Saturation - uidai
    Total population. (Projected for 2025). Numbers of Aadhaar assigned (Raw) Sep-25. Estimated numbers of Aadhaar assigned. (Live). Penetration %. (Live). 1. A & N ...
  72. [72]
    UIDAI records 221 crore Aadhaar authentication transactions in ...
    Sep 8, 2025 · UIDAI records 221 crore Aadhaar authentication transactions in August 2025, 10% increase over August 2024. - Unique Identification Authority of ...
  73. [73]
    Composition of UIDAI Authority | Government of India - uidai
    Bhuvnesh Kumar joined Unique Identification Authority of India in January 2025 and is currently serving as Chief Executive Officer (CEO) of the Unique ...
  74. [74]
    Organizational Structure - Unique Identification Authority of India
    Each of the eight Regional Offices of UIDAI is headed by a Deputy Director General (DDG) and the support structure comprises of Directors/ Assistant Directors ...
  75. [75]
    Annual Reports - Unique Identification Authority of India
    The Annual Report contains the information required to be forwarded to the Government of India under the provisions of Section 27 of Aadhaar (Targeted Delivery ...
  76. [76]
    Grievance Redressal Mechanism - Unique Identification Authority of ...
    Individual can lodge its grievance at UIDAI through multiple channels viz. Phone, Email, Chat, Letter/Post, Web Portal, Walk in and Social Media.Missing: governance controversies criticisms
  77. [77]
    Security in UIDAI system - Unique Identification Authority of India
    As far as UIDAI is concerned, it responds to such authentication requests by replying either 'Yes' or 'No'. In case of an e-KYC request by the requesting entity ...Missing: governance controversies criticisms
  78. [78]
    Unique Device Identification (UDI) - Healthcare - GS1
    GS1 is an UDI issuing agency or Entity for many UDI regulations worldwide, including in the European Union, Brazil, China, Egypt, Saudi Arabia, Singapore, South ...Unique Device Identification... · More About Udi · What Is Udi?
  79. [79]
    Privacy Concerns with Aadhaar - Communications of the ACM
    Nov 1, 2019 · Privacy concerns with Aadhaar include identity theft, identification without consent, tracking across domains, and lack of purpose recording ...
  80. [80]
    A Failure to “Do No Harm” -- India's Aadhaar biometric ID program ...
    India's biometric identity program, Aadhaar, issues a 12-digit32 unique identification number to enrollees. The Unique Identification Authority of India (UIDAI) ...
  81. [81]
    The Aadhaar Card: Cybersecurity Issues with India's Biometric ...
    May 9, 2019 · Aadhaar has been plagued by a myriad of internal and legal problems, as well as major leaks and vulnerabilities in the overall security of the system.<|control11|><|separator|>
  82. [82]
    The Indian Supreme Court's Aadhaar judgment — A privacy analysis
    Oct 9, 2018 · The Supreme Court of India recently, by a 4 to 1 majority, upheld the constitutional validity of the Aadhaar project, after some minor tweaks and suggestions.
  83. [83]
    India's Top Court Limits Sweep of Biometric ID Program
    Sep 26, 2018 · The Supreme Court said the Aadhaar fingerprint ID system is legal, but restricted it to government benefits and banned companies from using ...
  84. [84]
    [PDF] Judgement_26-Sep-2018.pdf - uidai
    Sep 26, 2018 · In the meanwhile, no person should suffer for not getting the Aadhaar card in spite of the fact that some authority.
  85. [85]
    A critical survey of the security and privacy aspects of the Aadhaar ...
    This paper describes in detail the security features of the Aadhaar card while emphasizing the security challenges involving demographic and biometric data.
  86. [86]
    Aadhaar Data Breach Largest in the World, Says WEF's Global Risk ...
    Anonymous sellers over WhatsApp charged Rs500 and lower for a portal into UIDAI where the records of virtually every citizen was at the payer's fingertips, as ...
  87. [87]
    PII Belonging to Indian Citizens, Including their Aadhaar IDs, Offered ...
    Oct 15, 2023 · Resecurity observed a spike in incidents involving Aadhaar IDs and their leakage on underground cybercriminal forums by threat actors looking to ...
  88. [88]
    Aadhaar data on sale: A step-by-step guide to locking your biometric ...
    Nov 1, 2023 · Aadhaar update: Last week, reports stated that the Aadhaar data of 815 million Indians was on sale on the internet.
  89. [89]
    Major Aadhaar Identity Fraud Ring Busted in India - Mobile ID World
    Apr 8, 2025 · Major Aadhaar Identity Fraud Ring Busted in India: Over 1,500 Biometric Records Compromised Across 12 States ... details such as names, addresses, ...
  90. [90]
    High rates of Aadhaar biometric verification failure leads to UIDAI ...
    Jul 18, 2025 · UIDAI officials acknowledged the persistent verification challenges but insisted upgrades to biometric systems are underway. They defended the ...
  91. [91]
    India's DBT: Boosting Welfare Efficiency
    Apr 21, 2025 · India's Direct Benefit Transfer (DBT) system has helped the country achieve cumulative savings of ₹3.48 lakh crore by plugging leakages in welfare delivery.
  92. [92]
    DBT helped India save Rs 3.5 lakh crore, which otherwise would ...
    Apr 21, 2025 · India's Direct Benefit Transfer (DBT) system has yielded substantial savings of Rs 3.48 lakh crore by curbing welfare delivery leakages, according to a Finance ...Missing: achievements | Show results with:achievements
  93. [93]
    Direct Benefit Transfer System's Achievements - GKToday
    Apr 18, 2025 · By 2025, it has achieved remarkable efficiencies, saving Rs 3.48 lakh crore and halving subsidy allocations. The system has expanded from 11 crore ...
  94. [94]
    Creating 1.2 Billion Unique eIDs: Lessons from India
    Apr 25, 2014 · According to Malladi, Aadhaar is helping to reduce the leakage, wastage and diversion of benefits that distort the various welfare schemes of ...
  95. [95]
    Usage of Aadhaar - Unique Identification Authority of India
    Curbing Leakages through Targeted Delivery: All social welfare programmes where beneficiaries are required to be confirmed before the service delivery, stand to ...
  96. [96]
    (PDF) An Empirical Study of Jan Dhan - Aadhaar - Mobile Trinity and ...
    The study indicated that the level of financial inclusion varies widely among these households. Although banking services are available in the vicinity they ...
  97. [97]
    Gender Inclusivity of India's Digital Financial Revolution for ...
    Apr 25, 2023 · We begin with a review of evidence of the impact of digital financial inclusion in Africa and India to provide a contextual backdrop for ...
  98. [98]
    India's Aadhaar System: Bringing E-Government to Life
    Aadhaar is a digital identity system providing a unique, secure ID to India's population, using biometrics and a unique ID for authentication.