Publicidad

Java ring

19 de Feb de 2015
Publicidad

Más contenido relacionado

Publicidad

Java ring

  1. JAVA RING 1 Presented by : Etty Mathews Class : C6 Roll no. : 7
  2. JAVA RING  A finger ring that contains a small microprocessor  a sort of smart card that is wearable on a finger  It’s a stainless steel ring called I-button. 2
  3. HISTORICAL BACKGROUND  Dallas semiconductor Corp. Produced the first java ring in 1989  By 1990 this protocol was refined.  Sun Microsystems Java ring was introduced at Java One Conference in 1998.  Earlier “touch memory”->“I-button”. 3
  4. It is a 1-millon transistors in a single chip.  The i-button is microcomputer with a powerful JVM (Java Virtual Machine) in the steel can.  I-button is preloaded with applets (Little Application programs).  Packaged module has a single electric contact and a ground return. Micro chip WHAT IS JAVA RING 4
  5.  Lithium backed NVRAM offers high read/write speed  Offers tamper resistance through instantaneous clearing.  Data integrity and clock function maintained for more than 10 years.  Tested at Celebration School, Orlando.  Rings programmed with java applets.  Operating System -E-commerce was designed 5
  6. SECURITY 6  Packaged in a 16 mm stainless steel can  Protects from tampering like hard knocks  Rapid Zeroization occurs.  Extreme temperature or voltage causes Zeroization.  A secret “Personal Identification Number” is maintained. Stainless-steel can
  7. 7 COMPONENTS  Java Virtual Machine (JVM)  RAM ROM Real Time Clock  I-button Blue Dot Receptor  1 –Wire Interface
  8. 8 JAVA VIRTUAL MACHINE (JVM)  Its a piece of software, recognizes java language.  Translates into byte code which can be used by the system.  Preloaded with small programs.
  9. 9 RAM  Java ring contains Non-Volatile Random Access Memory(NVRAM).  Data stored in this NVRAM.  Provides r/w & tamper resistance through Zeroization.  Existing 6Kb can be extended up to 128 Kb.  Lithium energy preserves the complete state.  I-buttons when not contact with receptor has zero executing speed.
  10. 10 ROM  Contains 32 Kb of ROM  E-Commerce & Java Virtual Machine stored in the ROM.  Not supposed to be altered by the user.  Operating system handles operations in i-button.
  11. 11 REAL TIME CLOCK  It gives the exact time of the day. 32 Kilohertz crystal oscillator operates the time  Energy provided by lithium backup  Inconsistent clock frequency makes it safer  It runs for more than 10 years with the lithium energy.
  12. 12 I-BUTTON  Jewel of the java ring.  Contains 1-million transistor processors in single chip I-button
  13. 13  ROM,NVRAM is bonded to barrier substrate.  Barrier substrate and triple layer deny access to data. This helps to keep private keys and confidential data. Barrier Substrate Triple layer
  14. 14  Figure shows a type of i-button Lithium cell- for backup power  Energy reservoir  Quartz- for real time clock
  15. 15  Has single data contact on front  Does reading, writing and power applied to the module  Lid is the data contact.  This contact is connected to Chip inside.  Each button has unique Registration number. Some have it on the ROM also 64-bit registration number
  16. 16  These numbers are globally unique. No two i-buttons share the same number  Needs physical contact with reader to function  Button will stand up to harsh conditions.  Zeroization occurs in case of tampering. Microchip in stainless-steel can
  17. 17 TYPES OF I-BUTTON  Memory i-button Stores typed text ,digitized photos.  Java Powered Cryptographic i-button Stores encrypted and decrypted data in JVM.  Themochron i-button Tracks time ,temperature and calendar etc.
  18. 18 BLUE DOT RECEPTOR  Read /Write operation is done by RS232C serial port.  Information is transferred through a momentary contact.  Just touch the i-button to the receptor for data transfer.  Has Speed up to 142Kbps. Blue Dot Receptor
  19. 19 1-WIRE INTERFACE  Used for the communication between PC & I-button.  Has different communication speeds.  Every device has unique serial number.  Bus master issues a reset  A specific Slave device is selected by unique serial number.  All other devices are ignored  After selection data are read and written into button.
  20. 20  Unique serial number is laser etched on to the chip. 64 bit registration number can be divided into three parts  First 8 bit identify the family of i-button Middle 48 bit identify the serial number Last 8bit for error free reading
  21. 21 TMEX RUNTIME ENVIRONMENT (TRTE)  Its a software to interface i-button and computer.  It installs all drivers and software needed for the i-button.  It supports Windows 32 bit
  22. 22 WORKING OF JAVA RING  Java ring is programmed with applets that is specific for different users.  Information transfers with a momentary contact at up to 142Kbps.  Signet of the i-button is touched to the receptor.  The receptor is cabled to the serial port which is attached to system.
  23. 23  Signet of i-button is pressed to the receptor.  System connected performs the necessary functions as instructed.  Both ring and receptor have the user profile.  It checks both the profile  If authentication satisfies, the door Opens. Opening door using java ring
  24. 24 APPLICATIONS  Store data such as secret code, credit card numbers etc.  Can be affixed to badge ,watch ,keychain or ring.  Can be used to store cash.  Used to open doors.
  25. 25  To get the account balance.  Used in cars for security Java ring used to unlock door
  26. 26 COMPARISON  Can be compared to a credit/debit card.  It has a magnetic strip which can be tampered.  Transactions won’t be accepted.  But i-button stand up the harsh conditions.
  27. 27 ADVANTAGES  Ideal where information need to travel with person. Replace many password protected devices for financial transactions.  More secure than using passwords.  Withstand harsh conditions.  Provide authentication to users with the PIN.  Data transferred by electric conductivity, no radio frequency needed.
  28. 28 DISADVANTAGES  Java ring being most secure but receptor could be very expensive.  Many organization doesn’t know the existence of java ring.  I-button have limited memory.  Limited amount of information can be stored.
  29. 29 CURRENT LIFE USAGE  Used by the students at Celebration School, Orlando.  In Istanbul, people use for e-cash transactions  In U.S also it is used
  30. 30 CONCLUSION  It is highly durable ( secure stainless steel packing) It can be attached to a wide variety of accessories like keychain etc. In near future it will be widely used.
  31. 31
  32. 32
Publicidad