SlideShare una empresa de Scribd logo
1 de 33
JAVA RING
JAVA RING

Figure 1: prototype of stainless steel java ring
CONTENTS
•

INTRODUCTION

•

COMPONENTS

•

WORKING

•

SECURITY

•

APPLICATIONS

•

ADVANTAGES

•

DISADVANTAGES

•

CONCLUSION

•

REFERENCE
INTRODUCTION
• Java ring is a finger ring that contains a small
microprocessor with built in capabilities for the user.
• Java ring is a sort of a smartcard that is wearable on a
finger
• Java ring a stainless-steel ring,16-millimeters (0.6 inches)
in diameter.
CONTINUED…
• It contains an inexpensive microprocessor in a stainless
steel iButton which runs JVM and it is preloaded with applet.
• The java Ring is an extremely secure Java-Powered
electronic token.
• Java Ring have number of real-world application.
THE JAVA RING
• Contains a tiny Java Virtual Machine
• Implements the Java Card 2.0 API
• Stores information in NVRAM ,ROM

• Runs applets
• Includes microprocessor, memory, clock and battery
JAVA RING IN ITS NATURAL
ENVIRONMET..
COMPONENTS
• Java Virtual Machine (JVM)
•

RAM

•

ROM

•

real-time clock

•

iButton

•

Blue dot reciptor
JAVA VIRTUAL MACHINE
The java virtual machine is the piece of software that
recognizes the java language and translates the byte
Code.
RAM
• Java ring contains 134kb of non-volatile random
access memory .
• This non-volatile random access memory offers

high read/write speed.
• It also provides rapid zeroization.
ROM
• The java ring contains 32kb of ROM .
• Special kind of operating system called
e-commerce operating system is stored in the ROM
REAL TIME CLOCK
• Real time clock gives the exact time of the day and it can
run up to 10 years continuously .

• It is driven by a constant 32KHz crystal oscillator.
• In addition ,the frequency of the processor clock is
not constant ,ranges from 10-20MHz.
• This aspect prohibits hackers in obtaining the
information from the iButton.
i BUTTON
i BUTTON…
• The jewel of the java ring is the iButton.
• iButton is a computer chip enclosed in a thick stainless

steel can.
• It is originally called “touch memory devices they were
later renamed as “iButtons”.
• Java ring uses 1-wire protocol for communication
with the host and the iButton.
CONTINUED…
• The iButton is a mechanical packaging standard that
places a 1-Wire component inside a small stainless
steel "button" similar to a disk-shaped battery.
• Each iButton has a unique and unalterable address laser
attached onto its chip inside the can lid.
• The address can be used as a key or identifier for each
iButton.
i BUTTON STRUCTURE
BLUE DOT RECEPTOR
• The Blue Dot Receptors are iButton reader/probes that provide
convenient pipeline into the PC for iButton-to-PC

communication.

• The receptor's cable connects to a USB, serial, or parallel-port

1-Wire adapter, whichever type of port you wish to use.
• The receptor itself easily affixes to any accessible spot on

the front of the PC.

a
BLUE DOT RECEPTOR…
CONTINUED…
• Key features:
• It has a coiled cable for connecting iButtons to 1-Wire
networks .
• Adhesive pad for mounting on objects.
• Supports for up to two iButtons at once.
• Can be used with any Dallas Semiconductor port
adapter
WORKING
• Java Ring is programmed with the applets and
the programming is done according to our application
• Whenever the user pushes his ring on a ring reader(Blue
Dot Receptor), the corresponding application will take
place.
OPENING DOORS
Figure 5.2: Working process of Java Ring(Source: Java Card Technology
CONTINUED…
• Information is transferred between your iButton and a PC
with a momentary contact at up to 142kbps.
• You simply touch your iButton to a Blue Dot receptor or
other iButton probe, which is connected to a PC.
• The Blue Dot receptor is cabled to a 1-Wire adapter that is
attached to a spare PC port. 1-Wire adapters exist for USB,
serial, and parallel ports.
SECURITY
• The barrier substrate and the triple-layer metal construction

techniques employed in the silicon fabrication effectively deny
unauthorized access to the data stored in the NVRAM. If any

attempt is made to penetrate these barriers, the NVRAM data is
immediately erased.
• Java rings are authorized through Personal Identification

Numbers

(PINs) so that no one can steal a person's ring and use that ring.
APPLICATIONS
• The java ring can be used to hold secret codes,
credit cards numbers, driver license, other wallet
contents, and even some electronic cash.
•

Its greatest promise appears to lie in its capacity to
interact with Internet applications to support strong
remote authentication and remotely authorized financial

transactions.
CONTINUED…
• For opening the door
• E-banking application
• Logging in your PC

• Providing security in your car
• Used to fill forms
ADVANTAGES
• The Java Rings are very easy and convenient for
users.
• It can function between -40C to+70C and in much
harsher environment.
• It has higher durability.
CONTINUED…
• Easier for administrator to maintain the security
infrastructure.
• Provides real memory, more power, and a capacity
for dynamic programming .
• Provides authentication to user which is crucial for many
applications.
DISADVANTAGES
• The cost of implementing the system is high.
• It needs a high level tools and method in order to

program

application efficently, reliabily,securily.
• iButton has a limited processor capacity and memory , which
means an individual might need to carry more
Java Ring.

than one
CONCLUSION
• Although Java Rings aren't widely used yet, such rings or
similar devices could have a number of real-world
applications, such as starting your car and automatically
adjust to your preferences.
•

The key issue about a wearable computer (java ring) is not
whether it is a ring or another form factor: the deciding point is
that you will always have it with you.
REFERENCES
• http://www.javaworld.com/
• http://www.people.uchicago.edu/
• http://www.electronics.howstuffworks.com
abhi.globalistic@gmail.com

Más contenido relacionado

La actualidad más candente (20)

Brain gate
Brain gateBrain gate
Brain gate
 
Blue brain ppt
Blue brain pptBlue brain ppt
Blue brain ppt
 
Silverlight
SilverlightSilverlight
Silverlight
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
 
Pill camera presentation
Pill camera presentationPill camera presentation
Pill camera presentation
 
Diamond chip
Diamond chipDiamond chip
Diamond chip
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Digital jewellery janardhan
Digital jewellery janardhanDigital jewellery janardhan
Digital jewellery janardhan
 
Java ring
Java ring   Java ring
Java ring
 
iSphere - Device for 3D graphic modeling (CAD)
iSphere - Device for 3D graphic modeling (CAD)iSphere - Device for 3D graphic modeling (CAD)
iSphere - Device for 3D graphic modeling (CAD)
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 
E-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTE-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORT
 
I.t in space
I.t in spaceI.t in space
I.t in space
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Rain technology
Rain technologyRain technology
Rain technology
 
digital jewelry
digital jewelrydigital jewelry
digital jewelry
 

Similar a Java Ring

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ringarun Prabha
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Yogesh Bhalla
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptsowndryaganesh
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Jana Vontari
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Prachi Jain
 
How i built my own irrigation controller
How i built my own irrigation controllerHow i built my own irrigation controller
How i built my own irrigation controllerShree Kumar
 
Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.Nitish Kumar
 
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)Jonathan Engelsma
 
CEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemCEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemBillBlanco
 

Similar a Java Ring (20)

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
java ring
java ringjava ring
java ring
 
Java ring
Java ringJava ring
Java ring
 
New Ring
New RingNew Ring
New Ring
 
Java ring
Java ringJava ring
Java ring
 
Presentation1
Presentation1Presentation1
Presentation1
 
Java Ring
Java Ring Java Ring
Java Ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
Java ring
Java ringJava ring
Java ring
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
 
Java Ring
Java RingJava Ring
Java Ring
 
How i built my own irrigation controller
How i built my own irrigation controllerHow i built my own irrigation controller
How i built my own irrigation controller
 
java Ring
java Ringjava Ring
java Ring
 
Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.
 
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
 
IoT and Its Application
IoT and Its ApplicationIoT and Its Application
IoT and Its Application
 
CEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemCEIS101: IoT Home Security System
CEIS101: IoT Home Security System
 

Más de Abhishek Abhi

Augmented reality The future of computing
Augmented reality The future of computingAugmented reality The future of computing
Augmented reality The future of computingAbhishek Abhi
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobilesAbhishek Abhi
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting systemAbhishek Abhi
 

Más de Abhishek Abhi (7)

Blue brain
Blue brainBlue brain
Blue brain
 
3d search
3d search3d search
3d search
 
3D Internet
3D Internet 3D Internet
3D Internet
 
Augmented reality The future of computing
Augmented reality The future of computingAugmented reality The future of computing
Augmented reality The future of computing
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Java Ring

  • 2. JAVA RING Figure 1: prototype of stainless steel java ring
  • 4. INTRODUCTION • Java ring is a finger ring that contains a small microprocessor with built in capabilities for the user. • Java ring is a sort of a smartcard that is wearable on a finger • Java ring a stainless-steel ring,16-millimeters (0.6 inches) in diameter.
  • 5. CONTINUED… • It contains an inexpensive microprocessor in a stainless steel iButton which runs JVM and it is preloaded with applet. • The java Ring is an extremely secure Java-Powered electronic token. • Java Ring have number of real-world application.
  • 6. THE JAVA RING • Contains a tiny Java Virtual Machine • Implements the Java Card 2.0 API • Stores information in NVRAM ,ROM • Runs applets • Includes microprocessor, memory, clock and battery
  • 7. JAVA RING IN ITS NATURAL ENVIRONMET..
  • 8. COMPONENTS • Java Virtual Machine (JVM) • RAM • ROM • real-time clock • iButton • Blue dot reciptor
  • 9. JAVA VIRTUAL MACHINE The java virtual machine is the piece of software that recognizes the java language and translates the byte Code.
  • 10.
  • 11. RAM • Java ring contains 134kb of non-volatile random access memory . • This non-volatile random access memory offers high read/write speed. • It also provides rapid zeroization.
  • 12. ROM • The java ring contains 32kb of ROM . • Special kind of operating system called e-commerce operating system is stored in the ROM
  • 13. REAL TIME CLOCK • Real time clock gives the exact time of the day and it can run up to 10 years continuously . • It is driven by a constant 32KHz crystal oscillator. • In addition ,the frequency of the processor clock is not constant ,ranges from 10-20MHz. • This aspect prohibits hackers in obtaining the information from the iButton.
  • 15. i BUTTON… • The jewel of the java ring is the iButton. • iButton is a computer chip enclosed in a thick stainless steel can. • It is originally called “touch memory devices they were later renamed as “iButtons”. • Java ring uses 1-wire protocol for communication with the host and the iButton.
  • 16. CONTINUED… • The iButton is a mechanical packaging standard that places a 1-Wire component inside a small stainless steel "button" similar to a disk-shaped battery. • Each iButton has a unique and unalterable address laser attached onto its chip inside the can lid. • The address can be used as a key or identifier for each iButton.
  • 18. BLUE DOT RECEPTOR • The Blue Dot Receptors are iButton reader/probes that provide convenient pipeline into the PC for iButton-to-PC communication. • The receptor's cable connects to a USB, serial, or parallel-port 1-Wire adapter, whichever type of port you wish to use. • The receptor itself easily affixes to any accessible spot on the front of the PC. a
  • 20. CONTINUED… • Key features: • It has a coiled cable for connecting iButtons to 1-Wire networks . • Adhesive pad for mounting on objects. • Supports for up to two iButtons at once. • Can be used with any Dallas Semiconductor port adapter
  • 21. WORKING • Java Ring is programmed with the applets and the programming is done according to our application • Whenever the user pushes his ring on a ring reader(Blue Dot Receptor), the corresponding application will take place.
  • 23. Figure 5.2: Working process of Java Ring(Source: Java Card Technology
  • 24. CONTINUED… • Information is transferred between your iButton and a PC with a momentary contact at up to 142kbps. • You simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. • The Blue Dot receptor is cabled to a 1-Wire adapter that is attached to a spare PC port. 1-Wire adapters exist for USB, serial, and parallel ports.
  • 25. SECURITY • The barrier substrate and the triple-layer metal construction techniques employed in the silicon fabrication effectively deny unauthorized access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. • Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.
  • 26. APPLICATIONS • The java ring can be used to hold secret codes, credit cards numbers, driver license, other wallet contents, and even some electronic cash. • Its greatest promise appears to lie in its capacity to interact with Internet applications to support strong remote authentication and remotely authorized financial transactions.
  • 27. CONTINUED… • For opening the door • E-banking application • Logging in your PC • Providing security in your car • Used to fill forms
  • 28. ADVANTAGES • The Java Rings are very easy and convenient for users. • It can function between -40C to+70C and in much harsher environment. • It has higher durability.
  • 29. CONTINUED… • Easier for administrator to maintain the security infrastructure. • Provides real memory, more power, and a capacity for dynamic programming . • Provides authentication to user which is crucial for many applications.
  • 30. DISADVANTAGES • The cost of implementing the system is high. • It needs a high level tools and method in order to program application efficently, reliabily,securily. • iButton has a limited processor capacity and memory , which means an individual might need to carry more Java Ring. than one
  • 31. CONCLUSION • Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and automatically adjust to your preferences. • The key issue about a wearable computer (java ring) is not whether it is a ring or another form factor: the deciding point is that you will always have it with you.