JAVA RING
A finger ring that contains a small microprocessor
a sort of smart card that is wearable on a finger
It’s a stainless steel ring called I-button.
2
HISTORICAL BACKGROUND
Dallas semiconductor Corp. Produced the first java ring
in 1989
By 1990 this protocol was refined.
Sun Microsystems Java ring was introduced at Java One
Conference in 1998.
Earlier “touch memory”->“I-button”.
3
It is a 1-millon transistors in a single chip.
The i-button is microcomputer with a
powerful JVM (Java Virtual Machine) in the
steel can.
I-button is preloaded with applets (Little
Application programs).
Packaged module has a single electric
contact and a ground return.
Micro chip
WHAT IS JAVA RING
4
Lithium backed NVRAM offers high read/write speed
Offers tamper resistance through instantaneous clearing.
Data integrity and clock function maintained for more than
10 years.
Tested at Celebration School, Orlando.
Rings programmed with java applets.
Operating System -E-commerce was designed
5
SECURITY
6
Packaged in a 16 mm stainless steel can
Protects from tampering like hard
knocks
Rapid Zeroization occurs.
Extreme temperature or voltage
causes Zeroization.
A secret “Personal Identification
Number” is maintained.
Stainless-steel can
8
JAVA VIRTUAL MACHINE
(JVM)
Its a piece of software, recognizes java language.
Translates into byte code which can be used by the
system.
Preloaded with small programs.
9
RAM
Java ring contains Non-Volatile Random Access
Memory(NVRAM).
Data stored in this NVRAM.
Provides r/w & tamper resistance through Zeroization.
Existing 6Kb can be extended up to 128 Kb.
Lithium energy preserves the complete state.
I-buttons when not contact with receptor has zero executing
speed.
10
ROM
Contains 32 Kb of ROM
E-Commerce & Java Virtual Machine
stored in the ROM.
Not supposed to be altered by the user.
Operating system handles operations in
i-button.
11
REAL TIME CLOCK
It gives the exact time of the day.
32 Kilohertz crystal oscillator operates the time
Energy provided by lithium backup
Inconsistent clock frequency makes it safer
It runs for more than 10 years with the lithium energy.
12
I-BUTTON
Jewel of the java ring.
Contains 1-million transistor processors in single
chip
I-button
13
ROM,NVRAM is bonded to barrier substrate.
Barrier substrate and triple layer deny access to data.
This helps to keep private keys and confidential data.
Barrier Substrate
Triple layer
14
Figure shows a type of i-button
Lithium cell- for backup power
Energy reservoir
Quartz- for real time clock
15
Has single data contact on front
Does reading, writing and power applied to the module
Lid is the data contact.
This contact is connected to
Chip inside.
Each button has unique
Registration number.
Some have it on the ROM also
64-bit registration number
16
These numbers are globally unique.
No two i-buttons share the same number
Needs physical contact with reader to function
Button will stand up to harsh conditions.
Zeroization occurs in case of
tampering.
Microchip in stainless-steel can
17
TYPES OF I-BUTTON
Memory i-button
Stores typed text ,digitized photos.
Java Powered Cryptographic i-button
Stores encrypted and decrypted data in JVM.
Themochron i-button
Tracks time ,temperature and calendar etc.
18
BLUE DOT RECEPTOR
Read /Write operation is done by RS232C serial port.
Information is transferred through a momentary contact.
Just touch the i-button to the receptor for data transfer.
Has Speed up to 142Kbps.
Blue Dot
Receptor
19
1-WIRE INTERFACE
Used for the communication between PC & I-button.
Has different communication speeds.
Every device has unique serial number.
Bus master issues a reset
A specific Slave device is selected by unique serial number.
All other devices are ignored
After selection data are read and written into button.
20
Unique serial number is laser etched on to the chip.
64 bit registration number can be divided into three parts
First 8 bit identify the family of i-button
Middle 48 bit identify the serial number
Last 8bit for error free reading
21
TMEX RUNTIME ENVIRONMENT (TRTE)
Its a software to interface i-button and computer.
It installs all drivers and software needed for the i-button.
It supports Windows 32 bit
22
WORKING OF JAVA RING
Java ring is programmed with applets that is specific for different users.
Information transfers with a momentary contact at up to 142Kbps.
Signet of the i-button is touched to the receptor.
The receptor is cabled to the serial port which is attached to system.
23
Signet of i-button is pressed to the receptor.
System connected performs the necessary functions as instructed.
Both ring and receptor have the user profile.
It checks both the profile
If authentication satisfies, the door
Opens.
Opening door using java ring
24
APPLICATIONS
Store data such as secret code, credit card numbers etc.
Can be affixed to badge ,watch ,keychain or ring.
Can be used to store cash.
Used to open doors.
25
To get the account balance.
Used in cars for security
Java ring used to unlock door
26
COMPARISON
Can be compared to a credit/debit card.
It has a magnetic strip which can be tampered.
Transactions won’t be accepted.
But i-button stand up the harsh conditions.
27
ADVANTAGES
Ideal where information need to travel with person.
Replace many password protected devices for financial
transactions.
More secure than using passwords.
Withstand harsh conditions.
Provide authentication to users with the PIN.
Data transferred by electric conductivity, no radio frequency
needed.
28
DISADVANTAGES
Java ring being most secure but receptor could be very
expensive.
Many organization doesn’t know the existence of java ring.
I-button have limited memory.
Limited amount of information can be stored.
29
CURRENT LIFE USAGE
Used by the students at Celebration School,
Orlando.
In Istanbul, people use for e-cash transactions
In U.S also it is used
30
CONCLUSION
It is highly durable ( secure stainless steel packing)
It can be attached to a wide variety of accessories
like keychain etc.
In near future it will be widely used.