Fyp Documentation Dealdocsign
Fyp Documentation Dealdocsign
Project Advisor:
Amjad Ali
Submitted By:
Muhammad Talha Saeed [F2020065229]
Muhammad Rashid [F2020065260]
Roqia Zahra Ghafoori [F2020065265]
Muhammad Shoaib Khan [F2020065148]
Session (2020-2024)
University of Management and Technology
C-II Johar Town Lahore Pakistan
|P a g e
Project Title: DealDocSign- A Platform for Secure Document Collaboration.
Objectives:-
Specific: Create a web application called "DealDocSign" that combines advanced
document management and electronic signature features in an integrated platform.
Measurable: Develop a platform where people can upload, save and sign
documents electronically while we measure specific availability indicators like
how quickly it responds or processes e-signatures effectively.
Achievable: Ensure that, with a clear project plan, "DealDocSign" is developed
and deployed within the planned time and budget.
Relevant: Meet the surge in demand for secure and effective document
management and electronic signatures in the digital age, for the individual and
business alike.
Time-bound: Finish making "DealDocSign" within an eight-month period with
ongoing help and enhancements afterwards.
Undertaken by: -
|P a g e
PLAGIARISM REPORT
|P a g e
Dedication
This project is dedicated to:
Allah, our Creator and Prophet صلى الله عليه وسلمwho blessed us with the
required resources that led us to the completion of this project.
Our families, for their unwavering support, understanding, and encouragement
throughout this journey.
Our project advisor, Mr. Amjad Ali, for his guidance, expertise, and mentorship
that contributed immensely to the success of this project.
The entire FYP committee for their valuable feedback and insights during the
evaluation process.
Our friends and classmates who stood by us through the highs and lows,
providing both motivation and camaraderie.
Dedicated to all our teachers who taught us the way of learning and taught us that
how we can make ourselves better every day.
We would like to dedicate this project to the University of Management and
Technology (UMT) for providing us with the platform and resources to pursue
this project. The educational environment and opportunities offered by UMT have
been instrumental in our growth and learning.
This work is a reflection of the collective effort and support of those around us.
Thank you for being an integral part of our FYP experience.
|P a g e
FINAL APPROVAL
|P a g e
Acknowledgment
Our deepest gratitude goes to Allah Almighty who has provided us Knowledge, Wisdom,
Strength to cover this project to completion. I appreciate the School of System and
Technology (UMT) for providing us the tools and technology which was crucial in
making this project. Furthermore, we would like to appreciate Mr. Ibrahim Murad for
carrying on the legacy of his father, this university which is the source of our education
for providing us various opportunities to enhance ourselves educationally moreover
professionally. We would also like to appreciate the dean of SST for running things
smoothly for the students working on their final year projects.
We would like to express our sincerest gratitude to Amjad Ali and Dr. Jameel for their
invaluable guidance, support, and encouragement throughout the duration of this project.
A special applause for our advisor Mr. Amjad Ali whose expertise and patience have
been instrumental in the successful completion of this project. We would also like to
thank SST Faculty for their contributions to this project.
We extend our heartfelt gratitude to Mr. Amad Zahid, our esteemed mentor, for his
invaluable time, unwavering support, and expert guidance throughout the development of
the `DealDocSign` project. On his insights, dedication, and encouragement the success of
this endeavor pivots. Special mention to our team mentor here, whose invaluable time,
unwavering support, and expert guidance steered `DealDocSign` project development.
Working on this project has been tough for us all. It wouldn’t be possible without the
help of Mr. Zahid’s dedication to improving our skills and knowledge for facing
hardships arising from the project’s numerous challenges and complications. The
mentorship offered and how much better it has made what we have learnt were also
appreciated.
Above all, during the journey; we have had constant motivation from our family and
friends, not forgetting the support. Thank you very much for your help.
|P a g e
Tools Used: -
Frontend Development:
o JavaScript Framework: React JS.
o HTML/CSS: For structuring and styling the platform.
Backend Development:
o Programming Language: PHP 8.4.
o Web Framework: Utilize a web framework LARAVEL to streamline
backend development.
Database:
o A relational database MySQL to store user data, documents, and
transaction history.
Authentication:
o Implement user authentication using JWT (JSON Web Tokens), and
Auth0 for secure login and access control.
Document Management:
o Folders: Utilize User Folders to store and manage documents securely.
o Document Processing: Integrate document processing libraries and signing
functionalities.
Security:
o Data Encryption: SSL/TLS to encrypt sensitive user information and
documents from one point to another west.
o Access Control: Managing user permissions and ensuring data security is
Role-based access control (RBAC).
Software tools:
o MS office, visual paradigm, mermaid, Figma, Vs code, Xampp, BotPress.
Documentation: Version 1.
|P a g e
Abstract
Given the rapidly changing digital transformation in Pakistan, secure and effective
document management is imperative especially with respect to contracts and signatures.
'DealDocSign' is a unique system specifically created for taking care of different
challenges and opportunities in Pakistan's commercial and legal perspective.
'DealDocSign' is an innovative technology for managing documents and e-signature
which totally transforms the way agreements are managed in Pakistan. Not only is going
paperless a technological advancement, but it is also a strategic imperative in a society
that has always thrived on paperwork as its mainstay. The aim of this initiative is to come
up with a state-of-the-art web application that can cater for the peculiar needs in this land
and ensure the process remains flawless as we develop e-signatures and manage
documents Pakistan, in the line of other nations, has to deal with conventional workflows
that are paper-based that make the whole process slugged. It can lead to inefficaciousness
and security issues or even complex legal matters with such systems. However,
“DealDocSign” strives to solve this problem by providing secure and regulatory
compliant platform that makes entire document life cycle easy up-to when it comes to e-
signing, right from creating up to electronic signing. The proposed idea offers that an
advanced online system should be developed with capabilities such as secure file
uploading, collaboration, organizing and most importantly legally binding digital
signatures This way the system will be compliant with global e-signature standards
recognizing the importance of legal compliance in Pakistan while at the same time
providing secure and reliable platform for electronic transactions. “DealDocSign” is an
initiative that could uplift many Pakistani independent industries. The platform meets a
variety of needs, from helping legal and financial institutions with secure documents to
expediting business agreements in organizations. Government agencies, academic
institutions, and professions all stand to benefit from increased efficiency in document
management, teamwork, and compliance. The platform makes use of modern tools like
MySQL for safe database storage, PHP 8.4 for Laravel-based backend development,
React JS for the frontend, and strong security features like SSL/TLS encryption for end-
to-end data protection.
|P a g e
REVISION CHART
A revision chart, often called a version or revision history, is a record or table that shows
the modifications made over time to a certain document or project. It offers a history of
updates, revisions, and alterations together with information about version numbers,
authors, changes described, and the date of each revision.
|P a g e
CONTENTS
Table of Contents
CONTENTS...................................................................................................................................................X
DEFINITIONS AND ACRONYMS..................................................................................................................XIII
LIST OF FIGURES.......................................................................................................................................XIV
LIST OF TABLES.........................................................................................................................................XV
1. INTRODUCTION.................................................................................................................................1
1.1 MOTIVATIONS.....................................................................................................................................1
1.2 PROJECT OVERVIEW...........................................................................................................................1
1.2.1 Overview Statement....................................................................................................1
1.2.2 Customer.....................................................................................................................2
1.2.3 Goals...........................................................................................................................2
1.2.4 System Functions........................................................................................................2
1.2.5 System Attributes.........................................................................................................2
1.3 PROBLEM STATEMENT........................................................................................................................3
1.4 OBJECTIVES........................................................................................................................................3
2. DOMAIN ANALYSIS...........................................................................................................................5
2.1 CUSTOMER..........................................................................................................................................5
2.2 STAKEHOLDERS..................................................................................................................................5
2.3 AFFECTED GROUPS WITH SOCIAL OR ECONOMIC IMPACT..................................................................5
2.3.1 Businesses and Organizational Entities:....................................................................6
2.3.2 Legal and Financial Institutions:...............................................................................6
2.3.3 Professionals and Independent Workers:...................................................................6
2.3.4 Academic Institutions:................................................................................................6
2.3.5 Governmental Bodies:................................................................................................6
2.3.6 General Public:...........................................................................................................6
2.3.7 Environmental Conservation and Sustainability:.......................................................6
2.3.8 Linkage with Objectives:............................................................................................6
2.4 DEPENDENCIES/ EXTERNAL SYSTEMS................................................................................................7
2.5 REFERENCE DOCUMENTS...................................................................................................................7
2.5.1 Related Projects..........................................................................................................8
3. REQUIREMENTS ANALYSIS.........................................................................................................10
3.1 REQUIREMENTS................................................................................................................................10
3.2 LIST OF ACTORS...............................................................................................................................13
3.3 LIST OF USE CASES...........................................................................................................................13
3.4 SYSTEM USE CASE DIAGRAM..........................................................................................................14
Actors:.......................................................................................................................14
Use Cases:................................................................................................................14
Relationships:...........................................................................................................14
System Boundary:.....................................................................................................14
3.5 EXTENDED USE CASES......................................................................................................................16
3.5.1 Login.........................................................................................................................16
3.5.2 Upload Document.....................................................................................................17
3.5.3 Manage Document.........................................................................................................18
3.5.4 Sign Document..........................................................................................................20
3.5.5 View History.............................................................................................................22
|P a g e
3.5.6 Receive Notification..................................................................................................24
3.5.7 Manage Users, Roles, Permissions...........................................................................26
3.5.8 Monitor System Activities.........................................................................................28
3.6 USER INTERFACES (MOCK SCREENS)................................................................................................30
4. DATA FLOW DIAGRAM (OPTIONAL).........................................................................................35
4.1 DATA FLOW DIAGRAM LEVEL 0......................................................................................................35
4.2 DATA FLOW DIAGRAM LEVEL 1......................................................................................................35
4.3 DATA FLOW DIAGRAM LEVEL 2......................................................................................................36
5. SYSTEM DESIGN..............................................................................................................................37
5.1 SYSTEM ARCHITECTURE DIAGRAM..................................................................................................37
5.2 CLASS DIAGRAM..............................................................................................................................38
5.3 SEQUENCE DIAGRAMS......................................................................................................................39
5.4 COLLABORATION DIAGRAMS...........................................................................................................40
5.5 ERD..................................................................................................................................................41
5.6 DATA DICTIONARY...........................................................................................................................42
6. IMPLEMENTATION DETAILS......................................................................................................43
6.1 DEVELOPMENT SETUP......................................................................................................................43
6.1.1 ReactJS:....................................................................................................................43
6.1.2 Laravel:.....................................................................................................................43
6.1.3 MySQL:.....................................................................................................................43
6.1.4 Postman:...................................................................................................................43
6.1.5 Visual Studio Code:..................................................................................................43
6.2 DEPLOYMENT SETUP.........................................................................................................................44
6.2.1 ReactJS:....................................................................................................................44
6.2.2 Laravel:.....................................................................................................................44
6.3 ALGORITHMS....................................................................................................................................44
6.4 CONSTRAINTS...................................................................................................................................46
6.4.1 Assumptions..............................................................................................................46
6.4.2 System constraints.....................................................................................................47
6.4.3 Restrictions...............................................................................................................47
6.4.4 Limitations................................................................................................................48
7. TESTING.............................................................................................................................................50
7.1 EXTENDED TEST CASES....................................................................................................................50
7.1.1 Sign-Up.....................................................................................................................50
7.1.2 Login.........................................................................................................................51
7.1.3 Upload Document:....................................................................................................52
7.1.4 Password Recovery...................................................................................................53
7.1.5 Editing Template:.....................................................................................................54
7.1.6 User Signature..........................................................................................................55
7.1.7 Update Account.........................................................................................................56
7.1.8 Share Document........................................................................................................57
7.1.9 View Signed Document:............................................................................................58
7.1.10 Logout:......................................................................................................................59
7.2 DECISION TABLE..............................................................................................................................60
7.2.1 Code snippet.............................................................................................................60
7.2.2 Decision coverage table............................................................................................62
7.3 TRACEABILITY MATRIX....................................................................................................................63
7.3.1 RID vs UCID (requirements vs use cases)................................................................63
7.3.2 Test Cases (RID vs TID)...........................................................................................63
|P a g e
7.3.3 Coverage (UCID vs TID)..........................................................................................64
8. RESULTS/OUTPUT/STATISTICS...................................................................................................65
8.1 %COMPLETION..................................................................................................................................65
8.2 %ACCURACY.....................................................................................................................................65
8.3 %CORRECTNESS................................................................................................................................65
9. CONCLUSION....................................................................................................................................66
10. FUTURE WORK...........................................................................................................................67
11. BIBLIOGRAPHY..........................................................................................................................68
11.1 BOOKS..........................................................................................................................................68
11.2 ARTICLES.....................................................................................................................................68
11.3 OTHER REFERENCES....................................................................................................................68
12. APPENDIX.....................................................................................................................................69
12.1 GLOSSARY OF TERMS...................................................................................................................69
12.2 PRE-REQUISITES...........................................................................................................................70
|P a g e
Definitions and Acronyms
The important terms, concepts, and domain-specific vocabulary used in the project
documentation are explained in detail and succinctly in this section. In order to maintain
clarity, this section covers acronyms and abbreviations used in the project together with
their full forms.
|P a g e
List of Figures
Figure 1: DealDocSign use case diagram.......................................................................................15
Figure 2: Prototype (1) Registration Page......................................................................................31
Figure 3: Prototype (2) Login Page................................................................................................32
Figure 4: Prototype (3) Forget Password Page...............................................................................33
Figure 5: Prototype (4) Dashboard.................................................................................................34
Figure 6: DFD Level 0....................................................................................................................35
Figure 7: DFD Level 1....................................................................................................................36
Figure 8: DFD Level 2....................................................................................................................36
Figure 9: System Architecture Diagram.........................................................................................37
Figure 10: Class Diagram...............................................................................................................38
Figure 11: Sequence Diagram.........................................................................................................39
Figure 12: Collaboration Diagram..................................................................................................40
Figure 13: ERD Diagram................................................................................................................41
Figure 14: Home page logic............................................................................................................45
Figure 15: Send document logic.....................................................................................................45
Figure 16: Delete document logic...................................................................................................46
Figure 17: Home Page Logic..........................................................................................................61
Figure 18: Send Document Logic...................................................................................................61
Figure 19: Delete Document Logic.................................................................................................62
|P a g e
List of Tables
Table 1: Revision Chart....................................................................................................viii
Table 2: Table of acronyms and definitions......................................................................xii
Table 3: Stakeholders and their role in system....................................................................5
Table 4: Feature Comparison table of DealDocSign and PakSign......................................8
Table 5: FR & NFR............................................................................................................10
Table 6: Functional and Non-Functional Requirements of the System.............................10
Table 7: Extended Use case "Login".................................................................................16
Table 8: Extended Use case "Upload Document".............................................................17
Table 9: Extended Use case "Manage Document"............................................................18
Table 10: Extended Use case "Sign Document"................................................................20
Table 11: Extended Use case "View History"...................................................................21
Table 12: Extended Use case "Receive Notification"........................................................23
Table 13: Extended Use case " Manage Users, Roles, Permissions "...............................25
Table 14: Extended Use case " Monitor System Activities "...........................................27
Table 15: Data Dictionary..................................................................................................40
Table 16: Test Case for Sign-Up.......................................................................................48
Table 17: Test Case for Login...........................................................................................49
Table 18: Test Case for Upload Document........................................................................50
Table 19: Test Case for Password Recovery.....................................................................50
Table 20: Test Case for Editing Template.........................................................................51
Table 21: Test Case for User Signature.............................................................................52
Table 22: Test Case for Update Account...........................................................................53
Table 23: Test Case for Share Document..........................................................................54
Table 24: Test Case for View Signed Document...............................................................55
Table 25: Test Case for Logout.........................................................................................56
Table 26: requirements vs use cases..................................................................................60
Table 27: RID vs TID........................................................................................................60
Table 28: UCID vs TID.....................................................................................................61
|P a g e
1. INTRODUCTION
1.1 Motivations
The decision to undertake the "DealDocSign" project was driven by several key
motivations and considerations:
Industry Relevance:
The project fills a significant gap in all industries, where secure electronic
signatures and effective document management are becoming more and more
essential for simplified operations.
Market Demand:
A considerable amount of market research revealed an increasing need for
advanced document management systems that incorporate electronic signature
functionality. "DealDocSign" offers a user-friendly and feature-rich platform to
bridge this divide.
Digital Transformation:
Our project’s goal is to update current document procedures according to world
standards on going digitalization. DealDocSign stands as a nudge towards
individuals and entities transitioning to paperwork less operations.
Legal Compliance:
Our plan is to offer a solution which meets the global e-signature standards
enabling its users to have lawful and secure electronic signatures in their work.
We are aware of the importance of adherence to e-signatures even under legal
perspectives.
Inspiration from Existing Solutions:
DocuSign like international platforms, which have been successful in their efforts,
motivating us by showing us how valuable advanced e-signature and document
storage systems can be on a worldwide scale. "DealDocSign" hopes to make a
local contribution to this domain.
|P a g e
1.2.2 Customer
The main stakeholders and end users of the proposed system include Pakistani
enterprises, professions, academic institutions, government agencies, legal and financial
institutions, and the general public.
1.2.3 Goals
The broad, overarching objectives that a project or organization seeks to accomplish are
referred to as goals. These objectives give the project team and stakeholders focus and
direction, pointing them in the direction of a shared vision. Usually, goals are in line with
the organization's overarching mission and strategic goals.
|P a g e
1.2.5 System Attributes
system attributes refer to those properties or characteristics that define what a computer
does and how well it does it when we talk about software engineering, this includes
system functions such as storage capacity for data processing speed processing power
among others which will help you define what exactly you want from your program
before writing any code at all." In conversations involving computer programs as well as
system architecture, the expression “system attributes” means the attributes or qualities
which identify the performance, functionality and behavior of the system. they help in
defining the overall nature of the system and guide the design and development process.
Performance Optimization: Make sure to maintain extraordinary system performance
even when there is a high number of connected users at a go. Optimize database queries
and server response times for fast document retrieval.
Scalability Design: Build the system with scalability in mind in order to take care of
future growth in terms of users as well as document volumes.
User-Centric Interface Design: Create an easy-to-use interface that has responsive
design in order to offer seamless user experience.
Security and Compliance Measures: Strong encryption techniques are essential for
security and privacy of stored files and digital signatures.
1.4 Objectives
Together, those objectives seek to provide a comprehensive and secure document
management system with cutting-edge electronic signature capabilities, satisfying the
varied requirements of users in a range of industries.
Functional Excellence: Develop a fully functional web application that
seamlessly integrates document management and electronic signature
functionalities.
User Authentication and Access Control: Implement robust user authentication,
including multi-factor authentication, and define user roles with specific
permissions.
Efficient Document Handling: Enable users to securely upload, organize, and
store various document types with a focus on user-friendly features and templates.
|P a g e
Legally Binding E-Signatures:
Streamline the electronic signing process to ensure legal validity and compliance
with international e-signature regulations.
Real-time Collaboration: Facilitate real-time collaboration by allowing multiple
users to concurrently edit and comment on documents securely.
Secure Document Sharing: Implement secure document sharing features,
enabling users to confidently share documents with specific individuals or groups.
Advanced Search and Retrieval: Develop a robust search feature based on
keywords, tags, and metadata for efficient document retrieval.
User-Centric Interface Design: Craft an intuitive and user-friendly interface
with responsive design to ensure a seamless user experience across devices.
Security and Compliance Measures: Employ robust encryption techniques to
guarantee the security and confidentiality of stored documents and electronic
signatures.
Performance Optimization: Ensure exceptional system performance, even with
a substantial number of simultaneous users, through optimized database queries
and server response times.
Scalability and Future Expansion: Design the system architecture for
scalability, accommodating an expanding user base and increasing document
volumes over time.
Reporting and Audit Trail: Implement robust reporting features for
administrators to generate comprehensive usage reports and monitor system
activities effectively.
Empirical Investigation: Conduct an empirical investigation to evaluate user
satisfaction, efficiency metrics, legal validity, regulatory compliance, security,
and data protection.
|P a g e
2. DOMAIN ANALYSIS
2.1 Customer
The project is developed for general use or potential clients in the targeted sectors.
2.2 Stakeholders
Stakeholders are individuals, groups, or entities that have an interest or concern in the
success or outcome of that project or business. Both internal and external to the
organization can be the stakeholders where diverse roles and perspectives are included.
The identification and comprehension of stakeholders in projects are crucial for
successful management as well as decision making.
|P a g e
economic aspects. It is the duty of this part within project charter or papers helping in
understanding wider consequences of a project along with its immediate targets.
|P a g e
2.4 Dependencies/ External Systems
It refers to the dependencies of DealDocSign System and external factors on which it
depends for its completion or functionality. Some of them are listed below.
Web Hosting Services: The system requires reliable web hosting services to
ensure seamless accessibility, performance, and availability for end-users.
|P a g e
6. "Laravel Documentation" - Laravel.
https://laravel.com/docs/10.x/readme
7. "React Documentation" - React.
https://legacy.reactjs.org/docs/getting-started.html
PakSign Platform
Developed by PakTech Solutions.
In-depth information and documentation were acquired directly from PakTech Solutions,
the developers of PakSign. The system's functionality was observed through the official
website at www.paksign.com.
|P a g e
businesses and
individuals.
|P a g e
3. REQUIREMENTS ANALYSIS
3.1 Requirements
Functional requirements (FR) specify the functions and actions that a system must do.
These include data processing, user interfaces, and functionality. Non-Functional
Requirements (NFR) focus on system attributes like efficiency, safety, usability, and
dependability and define how the system accomplishes those objectives. In essence,
NFRs explain the limitations and quality of the way a system performs its operations,
whereas FRs represent the actions of the system itself. Below listed functional and non-
functional requirements of DealDocSign system.
|P a g e
R1.3 Enable users to functional Compliance Integrate signature fields
electronically sign within documents. Ensure
documents for compliance with
legal validity. international e-signature
regulations.
|P a g e
reporting features mechanism to record user
for administrators. actions and document
changes. Ensure
compliance with data
protection regulations.
|P a g e
permissions.
|P a g e
10. Administer System Settings: The DealDocSign system permits admins to
engage in user roles, authorizations, and wide-ranging system preferences.
|P a g e
Figure 1: DealDocSign use case diagram
|P a g e
3.5 Extended use cases
An extended use case diagram offers a more thorough and detailed picture of particular
use cases that are given in a use case diagram. It is also referred to as an expanded use
case scenario or a detailed use case description. It describes the sequence of events and
the precise actions made during the execution of a given use case, providing more detail
on the interactions between actors and the system.
3.5.1 Login
Below is table explanation of an extended use case for the "Login" functionality.
|P a g e
Includes: None
Frequency of 500 users per day
Use:
Special 1. The user's password must never be shown in plain text anywhere in
Requirements: the application's UI. Textual characters are always indicated by special
characters.
2. The user's credentials must not be duplicated in the system.
Assumptions: The Customer shall understand English.
Notes and 1. The customer enter must be email in format of [email protected]
Issues: 2. The password must have at least 1 special character, 1 capital letter,
alphanumeric and at least have 8 characters.
Trigger: The Document Owner initiates the use case by selecting the option to
upload a document.
|P a g e
3. Document Owner selects the file and initiates the upload.
4. System validates the document format and size.
5. Document is stored in the system.
6. Document Owner receives a confirmation message.
Alternative If the document format is invalid:
Flows: 1. System notifies Document Owner about the invalid format.
[Alternative
Flow 1 – Not 2. Document Owner selects a valid document.
in Network]
Exceptions:
If the system is unavailable:
1. Document Owner receives a message about the unavailability.
2. Use case is terminated.
Includes: None
Frequency of Frequent - Multiple times a day
Use:
Special The system should support common document formats (PDF, DOCX,
Requirements: etc.).
- Maximum document size should be configurable.
Assumptions: 1. Document Owner has a reliable internet connection.
2. System resources are sufficient for document storage.
Notes and None.
Issues:
|P a g e
Actors: User (Document Manager)
System Administrator
Description: This use case involves the User, who acts as a Document Manager,
performing various management tasks related to documents within the
DealDocSign system. The System Administrator may oversee document
management activities and configure system settings accordingly.
Trigger: The User decides to manage documents and accesses the relevant
functionality within the DealDocSign system.
Preconditions: 1. The User is logged into the DealDocSign system.
2. The system is operational.
3. The User has appropriate permissions to manage documents.
Normal Flow: 1. User navigates to the "Manage Documents" section within the
DealDocSign system.
2. System presents User with a list of available documents and
relevant management options.
3. User selects a document to manage from the list.
4. User chooses the desired management action (e.g., edit, delete,
archive).
5. User provides necessary information or confirms the action.
6. System executes the chosen action on the selected document.
7. User receives a confirmation message indicating successful
execution of the management task.
|P a g e
2. System Administrator is alerted about the issue for resolution.
3. Use case is terminated until the issue is resolved.
Includes: None
Frequency of Frequent - Multiple times a day
Use:
Special 1. The system should provide clear and intuitive interfaces for
Requirements document management actions.
: 2. Document management permissions and configurations should be
customizable by the System Administrator.
3. System should maintain a log of document management activities
for audit purposes.
|P a g e
Trigger: The User receives a document that requires digital signing within the
DealDocSign.
Preconditions: 1. The User is logged into the DealDocSign.
2. The system is operational.
3. The User has appropriate permissions to sign documents.
Includes: None
Frequency of Frequent - Multiple times a day
Use:
|P a g e
Requirements with relevant regulations (e.g., eIDAS in the EU, ESIGN Act in
: the US).
2. Signed documents should be encrypted and stored securely to
ensure data integrity and confidentiality.
Assumptions: 1. User has access to necessary hardware and software for digital
signing (e.g., digital certificate, electronic signature pad).
2. System resources are sufficient for handling signing operations
efficiently.
Notes and User education and awareness regarding digital signing best practices
Issues: may enhance the overall signing process efficiency and security.
Description: This use case involves the User, who acts as the Document Viewer,
accessing and reviewing the history of document interactions within the
DealDocSign. The System Administrator may oversee viewing history
activities and manage related settings.
Trigger: The User navigates to the "View History" section within the
DealDocSign interface.
Preconditions: 1. The User is logged into the DealDocSign.
2. The system is operational.
3. The User has appropriate permissions to view document history.
|P a g e
interaction history.
2. The User may take appropriate actions based on the insights
gained from viewing the history.
Normal Flow: 1. User navigates to the "View History" section within the
DealDocSign interface.
2. System presents User with a list of available documents and
relevant historical data.
3. User selects a document from the list to view its history.
4. System displays the document's interaction history, including
actions such as creation, modification, sharing, signing, and any
relevant timestamps.
5. User reviews the document interaction history to gain insights
into past activities.
6. User may take appropriate actions based on the insights gained
from viewing the history.
Alternative If the User wants to filter the history by specific criteria (e.g., date range,
Flows: document type):
[Alternative 1. User applies relevant filters to refine the displayed history.
Flow 1 – Not 2. System updates the displayed history based on the applied filters.
in Network]
Includes: None
Frequency of Frequent - Multiple times a day
Use:
|P a g e
Assumptions: 1. User understands the significance of document interaction history
and its relevance to their tasks.
2. System resources are sufficient for storing and managing
document interaction history data effectively.
Notes and Providing a clear and intuitive interface for viewing document
Issues: interaction history can enhance User experience and productivity.
Regular maintenance and optimization of the history database can
help ensure optimal performance and reliability of the "View
History" functionality.
Description: This use case involves the User, who acts as the recipient, receiving
notifications from the Notification System within the DealDocSign.
Notifications inform the User about various events, updates, or actions
related to documents, tasks, or system status.
Trigger: An event or action occurs within the DealDocSign that triggers the
generation of a notification for the User.
Preconditions: 1. The User is registered and logged into the DealDocSign.
2. The Notification System is operational.
3. The User has configured notification preferences or subscribed to
relevant events.
|P a g e
triggered it.
Normal Flow: 1. An event or action occurs within the DealDocSign, such as
document sharing, document signing, task assignment, or system
status update.
2. The Notification System detects the event or action and generates
a corresponding notification for the User.
3. The notification is delivered to the User via their preferred
communication channel (e.g., email, mobile app notification, in-
app message).
4. User receives and views the notification.
5. User may take appropriate actions based on the information
provided in the notification (e.g., reviewing a shared document,
completing an assigned task).
Includes: None
Frequency of Frequent - Multiple times a day
Use:
|P a g e
notifications are delivered (e.g., email, mobile device).
2. User understands the importance of notifications and their role in
staying informed about project-related activities and updates.
Table 13: Extended Use case " Manage Users, Roles, Permissions "
Use Case ID: UC-1.7
Use Case Manage Users, Roles, Permissions
Name:
Created By: Shoaib Khan Last Updated By: Talha Saeed
Date 12/09/2023 Last Revision 12/15/2023
Created: Date:
Actors: System Administrator
Description: This use case involves the System Administrator managing users, roles,
and permissions within the DealDocSign. The System Administrator
oversees user accounts, assigns roles, and configures permissions to
ensure appropriate access and security levels.
Trigger: The System Administrator accesses the user management interface within
the DealDocSign.
Preconditions: 1. The System Administrator is logged into the DealDocSign.
2. The system is operational.
|P a g e
2. System presents System Administrator with a list of existing users
and their associated roles and permissions.
3. System Administrator selects a user from the list to manage.
4. System Administrator may perform various actions, including:
5. Creating new user accounts.
6. Editing existing user details, such as username, email, or contact
information.
7. Assigning or modifying user roles based on predefined role
templates.
8. Configuring granular permissions for specific users or roles,
including document access, editing rights, and administrative
privileges.
9. System Administrator saves the changes made to user accounts,
roles, or permissions.
10. System updates user accounts, roles, and permissions accordingly.
Alternative If the System Administrator wants to create a new role:
Flows: 1. System Administrator accesses the role management interface.
[Alternative 2. System Administrator defines the new role's name, description,
Flow 1 – Not and associated permissions.
in Network] 3. System Administrator saves the new role configuration.
If the System Administrator needs to deactivate or delete a user account:
1. System Administrator selects the user account to deactivate or
delete.
2. System Administrator confirms the action and saves the changes.
3. System updates the user account status accordingly.
Includes: None
Frequency of Frequent - Multiple times a day
Use:
|P a g e
3. System should provide a user-friendly interface for System
Administrator to manage users, roles, and permissions efficiently.
Notes and Regular review and maintenance of user accounts, roles, and
Issues: permissions can help ensure the integrity and security of the
DealDocSign.
Providing comprehensive documentation and training resources
for System Administrators can facilitate smooth and efficient user
management processes.
Table 14: Extended Use case " Monitor System Activities "
Use Case ID: UC-1.8
Use Case Monitor System Activities
Name:
Created By: Shoaib Khan Last Updated By: Talha Saeed
Date 12/09/2023 Last Revision 12/15/2023
Created: Date:
Actors: System Administrator
Description: This use case involves the System Administrator monitoring system
activities within the DealDocSign. The System Administrator oversees
various aspects of system performance, security, and user interactions to
ensure optimal operation and identify any potential issues or anomalies.
Trigger: The System Administrator accesses the system monitoring interface
within the DealDocSign.
Preconditions: 1. The System Administrator is logged into the DealDocSign.
2. The system is operational.
|P a g e
conditions: 2. Any detected issues or anomalies are addressed and resolved as
needed.
Normal Flow: 1. The system administrator navigates to the system monitoring
section in the DealDocSign interface.
2. System will show a System Administrator data in real time or in
history in various activities about the system. With:
When you are measuring system performance, CPU Utilization,
Memory Utilization and Network traffic are the key parameters.
Session durations when user’s login/logout.
Performing tasks that include creating, changing and accessing
documents.
Security events like failed logins or login attempts without
permission.
A System Administrator reviews collected data to understand the
general health and performance of the system.
Any anomalies, malfunctions or indicators of declining
performance would be identified by the system manager.
3. The system administrator can implement corrective measures for
these incidents that could consist of:
Investigation of likely security violations or unauthorized
admission trials must be done. This would be followed up with
optimization for system resources in order to better its
performance and scalability including informing relevant
personnel about the same as well as starting emergency plans for
important cases.
4. The monitoring operations and actions taken by the system
administrator are logged and documented for future reference and
audit purposes.
|P a g e
methods to continue monitoring system activities.
Includes: None
Frequency of Frequent - Multiple times a day
Use:
Notes and Proactive and regular system monitoring can help detect and
Issues: mitigate potential issues or security threats before they escalate
into critical problems.
Continuous improvement of monitoring processes and tools based
on analysis of historical data and emerging trends can enhance
system resilience and performance over time.
This below mock screen illustrates the registration page where users register their
credentials to access the system.
|P a g e
Figure 2: Prototype (1) Registration Page
|P a g e
This mock screen illustrates the login page where users input their credentials to access
the system.
|P a g e
This mock screen illustrates the Forget Password page where users input their credentials
to change the password and access the system.
|P a g e
After logging in successfully, the user experiences a dashboard that offers him basic
information and services.
|P a g e
4. DATA FLOW DIAGRAM (OPTIONAL)
In a system, a data flow diagram (DFD) visually represents data flow and data
processing. Extensivity used to delineate information flow contained in different data
stores and data destinations outside a system. Thus, DFDs are commonly applied for
process simulation in a system and data flow between them in system analysis as well as
design.
|P a g e
Figure 7: DFD Level 1
|P a g e
5. SYSTEM DESIGN
|P a g e
5.2 Class Diagram
A class diagram is a kind of UML (Unified Modeling Language) diagram which displays
the relationships and the static structure of a software application or system. It shows the
classes graphically and gives details about properties, operations and relationships
existing between them. It is common to see the way a system is actually constructed in an
OOD (object-oriented design) model through class diagrams that represent this fact.
|P a g e
5.3 Sequence Diagrams
A sequence diagram represents communication patterns among various objects or parts of
a system at different periods. It outlines how messages or actions are passed from one
element (object or lifeline) to another during a certain scenario or usage situation. These
are diagrams that show how things work together based on the requirements of
developers or clients.
|P a g e
5.4 Collaboration Diagrams
A collaboration diagram is also known as an interaction diagram or communication
diagram. It indicates how different objects contribute together toward a specific task or
situation in a Unified Modeling Language (UML) system. This kind of diagram uses lines
to show relationships between different objects within the system, simulating exchanges
that take place over time thus highlighting the dynamic properties of a system.
|P a g e
5.5 ERD
ERDs are the abbreviations for Entity relationship diagrams which are graphic
representations of how several entities interconnect within a database. They are usually
used as a guide during creation and understanding of databases in database designing.
|P a g e
5.6 Data Dictionary
A data dictionary refers to a centralized location containing information about the data
stored within a database or an information system. It serves as a store for metadata, data
definitions, as well as other details on how data is organized and structured within an
entity. The central purpose of a data dictionary is to provide a comprehensive and
trustworthy source of information for system development and data management.
|P a g e
6. IMPLEMENTATION DETAILS
6.1.1 ReactJS:
ReactJS is a popular JavaScript library for creating user interfaces. ReactJS's component-
based design is one of its best qualities. Front-end of the DealDocSign is build using
ReactJS. React function-based components are used to create and implement the front-
end. The Marketplace's user interface is broken up into smaller, independent components
that offer a dynamic experience.
6.1.2 Laravel:
Laravel is a web application framework with expressive, elegant syntax. Laravel strives
to provide an amazing developer experience while providing powerful features such as
thorough dependency injection, an expressive database abstraction layer, queues and
scheduled jobs, unit and integration testing, and more.
6.1.3 MySQL:
MySQL is an open-source relational database management system (RDBMS) that uses
SQL for managing and querying data. Web applications are widely used because they are
scalable, high performing and work across many platforms MySQL offers ACID
transactions, stored procedures and triggers that make complex database actions possible
and secure. There are community and enterprise editions for different kinds of users.
6.1.4 Postman:
Postman is a widely-recognized tool that makes it easier to create and test APIs. It
reduces the complexity of APIs by simplifying their management process as well. You
can use its GUI (Graphical User Interface) while doing things like sending HTTP
requests or moving responses from one place”. Additionally, Postman can be used in
software testing since it supports scripting, including interface automation, and
integration with CI/CD pipelines to facilitate automated API testing. It also provides
collaboration features which enable teams to share as well as document their APIs
effectively. Postman comes in form of a desktop\browser extension hence enhancing on
productivity in the development and debugging of APIs.
|P a g e
6.2 Deployment setup
The pre-requisites for deploying the set-up include downloading and installing Laravel
and NodeJS.
6.2.1 ReactJS:
• Open the source code file in Visual studio code (vs code).
• Open the terminal in vs code
• Run the command “npm start”
6.2.2 Laravel:
• Open the source code file in Visual studio code (vs code).
• Open the terminal in vs code
• Run the command “php artisan serve”
6.3 Algorithms
Algorithms are crucial in documentation for ensuring efficiency and optimization,
enabling developers to understand and improve performance. They provide consistency
and accuracy, making processes repeatable and reliable. Documentation aids in
knowledge transfer and onboarding new team members. It helps in debugging and
maintaining the system by clarifying the logic used.
Some of the algorithm’s proofs are given below:
• This React functional component, Home, sets the document title to "Home -
DevTech" using useEffect when the component mounts. It manages an active tab
state with auto-switching every 2 seconds using another useEffect and setInterval.
The component renders a home banner with an email input form and a "Try Now"
button.
|P a g e
Figure 14: Home page logic
• The function called `sendDocument` checks if there are necessary files and user
data in an incoming connection request to accept or not. It also looks at whether a
user has been authorized before taking this other step of uploading files thereby
saving them onto cloud storage services where they won’t be lost even if
something happens such as loss of information due to power outages among
others.
|P a g e
• The ‘deleteDocumentById’ function performs different checks before removing a
document from storage and provides feedback according to what it finds.
6.4 Constraints
Project's development is affected by constraints. These include technical constraints
related to software and hardware capabilities, time constraints imposed by deadlines,
budget constraints limiting financial resources, scope constraints defining project
boundaries, resource constraints on human and material availability, and regulatory and
ethical constraints ensuring compliance with laws and guidelines. Understanding these
constraints is crucial and kind important for effective project planning and execution.
6.4.1 Assumptions
Assumption means recognizing a situation or circumstance without checking that serves
as basis for planning and decision making in a project or undertaking. This calls for
acceptance of unknowns and hazards amidst hopes grounded in taken-for-granted factors.
• Users have compatible devices (desktop, laptop, tablet, or smartphone) with
modern web browsers capable of running web applications.
• Users have access to a stable internet connection for seamless browsing, signing,
and sending documents.
• Users are familiar with basic web operations and can navigate through web
applications.
• Users understand the concept of electronic signatures and are comfortable using
them in place of traditional signatures.
|P a g e
• Users have registered accounts with valid personal information to securely sign,
send, and track documents.
• Users are willing to provide necessary permissions for accessing features such as
file storage and camera (if needed for document verification).
• Users have a secure method for uploading documents and are comfortable
entering personal details within the application.
• Users have a secure payment method and are comfortable entering payment
details within the app for any paid features or services.
• Users trust the application to handle sensitive information and documents
securely, following privacy regulations and best practices.
• Users are willing to receive and respond to email notifications related to their
document transactions.
These assumptions are ensuring that the users are able to effectively utilize their e-
signature.
6.4.3 Restrictions
The term ‘restrictions’ in software development refers to limits or particular conditions
placed by the customer that hinder the development or performance of a software.
Restrictions can involve factors such as cost, time deadline, legal obligations, or
technological choices made by a specific customer. In line with the expectations of the
customer, it is important for software development to understand and follow these
limitations so that successful completion of the project can be assured.
|P a g e
Examples of restrictions that could be imposed on an electronic signature web application
are:
• Ensuring that the application conforms to legal standards for electronic signatures
and data privacy such as GDPR, HIPAA or eIDAS.
• Developing an authentication method that is extremely powerful ensures that we
authenticate people’s identities and maintain integrity in signed documents.
• Adherence to industry best security practices (SSL/TLS encryption, for example)
is essential to safeguard transmitted data from unauthorized access to sensitive
data.
• Integration with existing systems or platforms (for example, CRM software,
document management systems) in a manner that ensures compatibility and
interoperability.
• Compliance with accessibility guidelines (e.g., WCAG) to ensure the application
is usable by individuals with disabilities.
• Designing the application to handle a large number of users and documents
efficiently, while maintaining performance under peak loads.
• Support for multiple languages and locales to cater to a diverse user base across
different regions.
• Compliance with terms of service or usage agreements set by the application
provider or regulatory bodies regarding acceptable use and limitations on user
behavior.
6.4.4 Limitations
Limitations refer to the services or functionalities that the software is unable to provide
due to constraints or design choices. These may include:
|P a g e
• Lack of specialized compliance features tailored to specific industries or
regulatory requirements, necessitating additional customization or third-party
solutions.
• Inability to fully customize the branding and appearance of the e-signature
interface due to platform restrictions or licensing agreements.
|P a g e
7. TESTING
7.1.1 Sign-Up
Table 16: Test Case for Sign-Up
Test Case ID: TC_01
Test Case Sign-Up
Name:
Created By: Muhammad Talha Last Updated By: Muhammad Talha
Saeed Saeed
Date Created: 15-05-2024 Last Revision Date: 12-06-2024
Actors: Admin, Signer
Description: All user shall be sign-up for the first time to interact app.
Pre-Conditions: Ensure that the website is accessible.
No existing account in the system
Stable internet connection
Actions: Enter a valid email address in the email address field.
Enter a strong password in the password field.
Enter the name and other required details in the respective
fields.
Submit the sign-up form.
Expected Successful sign-up
Results: Account created
Login possible
Verification email sent to the registered email address (if
email verification is enabled)
Post User account exists in the system
Conditions: Login credentials verified
User details stored in the database
Test Data: Valid email address: [email protected]
Strong password: Test@123
Correct name and details (e.g., John Doe, 123 Main St, etc.)
Test Web application
Environment:
|P a g e
Test Case Manual testing
Execution:
Test Result: Pass
Test Case Closed
Closure:
Actual Result: Pass
7.1.2 Login
Table 17: Test Case for Login
Test Case ID: TC_02
Test Case Login
Name:
Created By: Muhammad Talha Last Updated By: Muhammad Talha
Saeed Saeed
Date Created: 15-05-2024 Last Revision Date: 12-06-2024
Actors: Admin, Signer
Description: Users shall log in to access the app.
Pre-Conditions: Existing account in the system
Correct login credentials (email address and password)
Stable internet connection
Actions: Enter a valid email address in the email address field.
Enter the correct password in the password field.
Submit the login form.
Expected Successful login
Results: Access granted to the app
User details retrieved from the database
Redirected to the dashboard or main page
Post User session established
Conditions: Login credentials verified
User details updated in the session
Test Data: Valid email address: [email protected]
Correct password: Test@123
Test Web application
Environment:
Test Case Manual testing
Execution:
Test Result: Pass
|P a g e
Test Case Closed
Closure:
Actual Result: Pass
|P a g e
7.1.4 Password Recovery
Table 19: Test Case for Password Recovery
Test Case ID: TC_04
Test Case Password Recovery
Name:
Created By: Muhammad Talha Last Updated By: Muhammad Talha
Saeed Saeed
Date Created: 15-05-2024 Last Revision Date: 12-06-2024
Actors: Admin, Signer
Description: Users shall recover their passwords.
Pre-Conditions: Existing account in the system
User has forgotten their password
Stable internet connection
Actions: Click on the "Forgot Password" link.
Enter the email address associated with the account.
Click the "Submit" button.
Wait for the password recovery email.
Enter the new password.
Confirm the new password.
Click the "Reset Password" button.
Expected Password recovery email sent successfully
Results: New password saved successfully
User logged in successfully with the new password
Password reset confirmation message displayed
Post Password updated in the database
Conditions: User session updated with the new password
Password reset confirmation email sent
Test Data: Valid email address: [email protected]
New password: NewPassword123
Confirm new password: NewPassword123
Test Web application
Environment:
Test Case Manual testing
Execution:
Test Result: Pass
Test Case Closed
Closure:
|P a g e
Actual Result: Pass
|P a g e
7.1.6 User Signature
Table 21: Test Case for User Signature
Test Case ID: TC_06
Test Case User Signature
Name:
Created By: Muhammad Talha Last Updated By: Muhammad Talha
Saeed Saeed
Date Created: 15-05-2024 Last Revision Date: 12-06-2024
Actors: Signer
Description: Users shall sign documents electronically.
Pre-Conditions: Logged-in user
Document uploaded and prepared for signing
Stable internet connection
Actions: Select the document to sign from the document list.
Click the "Sign" button.
Choose the signature type: electronic, digital
Create or select a signature: draw, upload, type
Apply the signature to the document.
Verify the signed document.
Expected Document signed successfully
Results: Signature applied correctly
Signed document saved and stored
User notified of successful signing
Post Document updated in the database with the signature
Conditions: User session updated with the signed document
Test Data: Document ID: DOC001
Signature type: electronic, digital
Signature data: image, text
Test Web application
Environment:
Test Case Manual testing
Execution:
Test Result: Pass
Test Case Closed
Closure:
Actual Result: Pass
|P a g e
7.1.7 Update Account
Table 22: Test Case for Update Account
Test Case ID: TC_07
Test Case Update Account
Name:
Created By: Muhammad Talha Last Updated By: Muhammad Talha
Saeed Saeed
Date Created: 15-05-2024 Last Revision Date: 12-06-2024
Actors: Admin, Signer
Description: Users shall update their account information.
Pre-Conditions: Logged-in user
Existing account with valid credentials
Stable internet connection
Actions: Click on the "Account" or "Profile" link.
Click on the "Edit" or "Update" button.
Make changes to the account information: name, email,
password, address.
Click the "Save" or "Update" button.
Verify the updated account information.
Expected Account updated successfully
Results: Changes reflected in the account information
User notified of successful update
Login credentials updated (if password was changed)
Post Account information updated in the database
Conditions: User session updated with the new account information
Test Data: Account ID: ACC001
Updated account information: new name, email, password,
address
Test Web application
Environment:
Test Case Manual testing
Execution:
Test Result: Pass
Test Case Closed
Closure:
Actual Result: Pass
|P a g e
7.1.8 Share Document
Table 23: Test Case for Share Document
Test Case ID: TC_08
Test Case Share document
Name:
Created By: Muhammad Talha Last Updated By: Muhammad Talha
Saeed Saeed
Date Created: 15-05-2024 Last Revision Date: 12-06-2024
Actors: Admin
Description: Users shall share documents with signers for electronic signature.
Pre-Conditions: Logged-in user
Document uploaded and prepared for sharing
Signer's email address or user account
Stable internet connection
Actions: Select the document to share from the document list.
Enter the signer's email address or select their user account.
Choose the signing method: electronic, digital.
Add a message or notes for the signer.
Click the "Share" or "Send" button.
Verify the document sharing status.
Expected Document shared successfully
Results: Signer receives the document and signing request
User notified of successful sharing
Document status updated in the system
Post Document shared with the signer
Conditions: Signer's status updated in the system: pending, signed
User session updated with the shared document information
Test Data: Document ID: DOC001
Signer's email address or user account
Signing method: electronic, digital
Message or notes for the signer.
Test Web application
Environment:
Test Case Manual testing
Execution:
Test Result: Pass
Test Case Closed
Closure:
Actual Result: Pass
|P a g e
7.1.9 View Signed Document:
Table 24: Test Case for View Signed Document
Test Case ID: TC_09
Test Case View Signed Document
Name:
Created By: Muhammad Talha Last Updated By: Muhammad Talha
Saeed Saeed
Date Created: 15-05-2024 Last Revision Date: 12-06-2024
Actors: Admin
Description: Users shall view signed documents.
Pre-Conditions: Logged-in user
Document signed and stored in the system
Stable internet connection
Actions: Select the signed document to view from the document list.
Click the "View" or "Download" button.
Verify the signed document details.
Verify the signature details: signer's name, date, timestamp.
Verify the document content and layout.
Expected Signed document displayed correctly
Results: Signature details displayed correctly
Document content and layout preserved
User notified of successful viewing
Post Signed document viewed successfully
Conditions: User session updated with the viewed document information
Test Data: Document ID: DOC001
Signer's name and email address
Signature date and timestamp
Document content and layout
Test Web application
Environment:
Test Case Manual testing
Execution:
Test Result: Pass
Test Case Closed
Closure:
Actual Result: Pass
|P a g e
7.1.10 Logout:
Table 25: Test Case for Logout
Test Case ID: TC_10
Test Case Logout
Name:
Created By: Muhammad Talha Last Updated By: Muhammad Talha
Saeed Saeed
Date Created: 15-05-2024 Last Revision Date: 12-06-2024
Actors: Admin, Signer
Description: Users shall log out of the web application.
Pre-Conditions: Logged-in user
Stable internet connection
Actions: Click on the "Logout" or "Sign Out" button.
Verify the logout confirmation message.
Click on the "Confirm" or "Logout" button.
Verify the user is redirected to the login page.
Verify the user's session is terminated.
Expected Logout successful
Results: User redirected to the login page
User's session terminated
User notified of successful logout
Post User's session terminated
Conditions: User's login credentials invalidated
User redirected to the login page
Test Data: None
Test Web application
Environment:
Test Case Manual testing
Execution:
Test Result: Pass
Test Case Closed
Closure:
Actual Result: Pass
|P a g e
and their corresponding actions, enabling thorough analysis and testing of all possible
scenarios. By clearly outlining these relationships, a decision table ensures
comprehensive and consistent decision-making across a system or process.
|P a g e
Figure 18: Send Document Logic
• The `deleteDocumentById` function validates the request, checks user
authentication, retrieves the specified document, and deletes it if it exists. It
returns appropriate status messages based on the success or failure of these
operations.
|P a g e
7.2.2 Decision coverage table
Analyzing a system's behavior under different conditions using a decision table for code
coverage is one such instance. It introduces a comprehensive method of mapping inputs
to outputs in tables, such that there would be no test left out; hence, making it easier
designing them for a given software product while improving its quality.
Condition/Rule C1 C2 C3 C4 C5 C6 C7 C8
User is registered No No Yes Ye Yes Yes Ye Yes
s s
Valid email Ye No Yes No Yes Yes Ye Yes
s s
Valid password Ye Yes Yes Ye No Yes Ye Yes
s s s
Document is uploaded - - - - - No Ye Yes
s
Document requires signature - - - - - - No Yes
Action
A1: Show sign-up form X X
A2: Show error message (invalid X X
email)
A3: Show error message (invalid X
password)
A4: Log in user X
A5: Show upload document option X
A6: Show error message (upload X
required)
A7: Show document signing option X
|P a g e
UC 1 ✓
UC 2 ✓ ✓ ✓
UC 3 ✓ ✓
UC 4 ✓
UC 5 ✓
UC 6 ✓
UC 7 ✓
UC 8 ✓
UC 9 ✓
UC 10 ✓ ✓
|P a g e
Table 28: UCID vs TID
TCID/UCID UC1 UC UC3 UC4 UC UC6 UC UC8 UC UC10
2 5 7 9
TC_01 ✓
TC_02 ✓
TC_03 ✓
TC_04 ✓
TC_05 ✓
TC_06 ✓
TC_07 ✓
TC_08 ✓ ✓ ✓
TC_09 ✓ ✓
TC_10 ✓
|P a g e
8. RESULTS/OUTPUT/STATISTICS
8.1 %completion
Using the matrix and values from section 7.3.1, the percentage completion of
requirements is calculated as follows:
8.2 %accuracy.
Using the matrix and values from section 7.3.2, the percentage accuracy of implemented
requirements is shown:
8.3 %correctness
Using the matrix and values from section 7.3.3, the percentage correctness of tested
requirements is calculated as follows:
|P a g e
9. CONCLUSION
|P a g e
10. FUTURE WORK
In the future, DealDocSign will focus its attention on making its functionality and user
experience better. One major improvement that will be made is in the use of more
advanced methods of verification like biometric verification and blockchain technology
that will ensure very high levels of security and integrity for signed documents.
Also, we aim to add additional functions for document editing and collaboration on the
platform. These functions will enable many people to be simultaneously working within a
document at any time thus enabling real-time collaboration. Improved chatbot
functionality will allow for advanced user support services based on NLP and other
related technologies. Additionally, we are looking to sync DealDocSign with the most
well-known cloud storage solutions and business automation tools.
|P a g e
11. BIBLIOGRAPHY
11.1 Books
https://books.google.com.pk/books?hl=en&lr=&id=Cne-
igPOkhgC&oi=fnd&pg=PA17&dq=%22electronic+signatures
%22+value+in+law&ots=0CQzkbeA5X&sig=CbWgIbgM2RbodFcor-
7QYoV2eLg&redir_esc=y#v=onepage&q=%22electronic%20signatures%22%20value
%20in%20law&f=false
11.2 Articles
Legality and Validity of E-Signatures in Pakistan - Courting The Law
https://www.sdcollegeambala.ac.in/wp-content/uploads/2021/07/etbmit2017-73.pdf
https://www.certinal.com/esignature-legality/pakistan
https://www.mdpi.com/0718-1876/2/3/24
https://www.ceeol.com/search/article-detail?id=773109
https://itidjournal.org/index.php/itid/article/view/144.html
|P a g e
12. APPENDIX
API (Application Program Interface): A set of protocols and tools for building
software and applications. It specifies how software components should interact.
Authentication: The process of verifying the identity of a user or system.
Auth0: A platform that provides authentication and authorization as a service.
Backend Development: Server-side development which involves databases,
server logic, and integration with front-end.
Cloud Storage: Storing data on remote servers accessed from the internet, used to
store, manage, and process data.
Collaboration: The action of working with others to produce or create something,
often in real-time.
CSS (Cascading Style Sheets): A style sheet language used for describing the
presentation of a document written in HTML or XML.
Data Encryption: The process of converting data into a code to prevent
unauthorized access.
Database: A structured set of data held in a computer, especially one that is
accessible in various ways.
Document Processing: The handling of documents by computers including
storing, retrieving, and sharing.
End-to-end Encryption: A method of secure communication that prevents third-
parties from accessing data while it's transferred from one end system to another.
E-Sign (Electronic-Signature): An electronic indication of a person's intent to
agree to the contents of a document.
Frontend Development: Client-side development dealing with the user interface
and user experience.
HTML (Hypertext Markup Language): The standard markup language for
documents designed to be displayed in a web browser.
IDE (Integrated Development Environment): A software suite that consolidates
basic tools required for software testing and debugging.
JavaScript: A programming language commonly used to create interactive
effects within web browsers.
JWT (JSON Web Tokens): A compact, URL-safe means of representing claims
to be transferred between two parties.
Laravel: A PHP web application framework with expressive, elegant syntax.
MySQL: An open-source relational database management system.
PHP (Hypertext Preprocessor): A popular general-purpose scripting language
that is especially suited to web development.
|P a g e
RBAC (Role-based Access Control): An approach to restricting system access to
authorized users.
React JS: A JavaScript library for building user interfaces.
SSL/TLS (Secure Sockets Layer/Transport Layer Security): Cryptographic
protocols designed to provide communications security over a computer network.
User Authentication: The process of verifying the identity of a user attempting to
access a system.
Version Control: A system that records changes to a file or set of files over time
so that specific versions can be recalled later.
12.2 Pre-requisites
Below are some recommended prerequisites for effectively understanding and working
with the platform called ‘DealDocSign’:
|P a g e