SlideShare una empresa de Scribd logo
1 de 16
JAVA RING
v.Janardhan
13f11f0026
3rd
M.C.A
NEC Gudur.
CONTENTS
Introduction
History
Components in Java Ring
Working
Security
Application
Disadvantages of Java Ring
Conclusion
References
INTRODUCTION
A Java Ring is a finger ring that contains a small
microprocessor with built-in capabilities for the user.
It contains an inexpensive microprocessor in a stainless
steel ibutton running a JVM and it is preloaded with
applet.
The Java Ring is an extremely secure Java-powered
electronic token .
HISTORY
In the summer of 1989, Dallas Semiconductor Corp.
produced the first stainless-steel-encapsulated
memory device called iButton.
Java Ring was introduced at their JavaOne Conference
in 1998
Java Ring is a stainless-steel ring, that houses a 1-
million-transistor processor, called an iButton . The ring
has 134 KB of RAM , 32 KB of ROM
Components in java ring
Java Virtual Machine (JVM)
RAM
ROM
real-time clock
iButton
Blue dot receptor
Java Virtual Machine
 JVM is the heart of Java’s network orientation
 Java ring is programmed with java application program and
applets ,that communicate with the host application on the
networked system. .
 The java virtual machine is the piece of software that
recognizes the java language and translate the byte code
,which is used by the system which is connected to the java
ring via ring reader
RAM and ROM
Java ring contains 134kb of non-volatile random access
memory. Program and data is stored in this NVRAM.
High security is offered by the ability to erase the
contents of NVRAM extremely quickly.
The java ring contains 32kb of ROM.
Ecommerce operating system is stored in ROM because
it is not supposed to be altered by the user.
Real Time Clock
 In the java ring real time clock gives the exact time of the day.
 A 32-kilohertz crystal oscillator is used in the Java iButton to
operate the time-of-day.
 The real time clock continuously running up to more than 10
years by the energy provided the lithium backup.
iBUTTON
The iButton was invented and is still manufactured
exclusively by Dallas Semiconductor
Each iButton starts with a guaranteed-unique
registration number engraved in the silicon .
Blue Dot Receptor
iButton requires connection to a reader known as a Blue
Dot Receptor in order to be supplied with power and to
receive input and send output.
The read/write operation will be done by this blue dot
receptor provided by RS232 serial port adaptor.
Receptor cable connects to the USB port of PC or any
embedded system.
The information is transferred between the ibutton and pc
with momentary touching java ring .
Working
 java ring is programmed with the applets acoording to our
application.
 For specific class of user specific java applets is preloaded in
to the java ring.
 All the information of the user is stored in the java ring.
 User simply presses the signet of the java ring against the
“blue dot” receptor and the system connected to the
receptor performs the function that the applet instructs to.
Security
The java ring provides very high degree of security for the
confidential data that is stored in the NVRAM memory.
Armored with stainless steel for the hard knocks of
everyday use.
Java rings are authorized through Personal Identification
Numbers (PINs) so that no one can steal a person’s ring
and use that ring.
Applications
Java ring is used for getting account balance of an user
through internet .
In celebration school,each student is issued a Java Ring.
Java ring is used in opening the door
Java ring can also be used in the security of car.
Disadvantages of Java Ring
 The cost of implementing the java ring could be very high.
 The problem with the Java Ring is that many of the
organization don't even know the existence of Java Ring.
 Only limited amount of information can be stored so, an
individual might need to carry more than one Java Ring.
 Carrying the Java Ring everywhere could lead to theft issues.
Conclusion
 A very easy and convenient way for users.
 It is more secure than using passwords, since passwords are
short or can be guessed.
 A ring is a personal thing that the user and only the user
carries along anytime and anywhere, so that he can
authenticate himself in every situation.
 It is also possible to use a tag on the key ring or a watch
instead of a ring.
THANKYOU
any ?’s

Más contenido relacionado

Destacado

.The business of IT
.The business of IT.The business of IT
.The business of ITLauren Riley
 
.Organizational Strategy and Information Systems
.Organizational Strategy and Information Systems.Organizational Strategy and Information Systems
.Organizational Strategy and Information SystemsLauren Riley
 
My daily routine (1)
My daily routine (1)My daily routine (1)
My daily routine (1)norapuig
 
Dimensional Modeling for AHS
Dimensional Modeling for AHSDimensional Modeling for AHS
Dimensional Modeling for AHSLauren Riley
 
La comunicación on line
La comunicación on lineLa comunicación on line
La comunicación on lineSol taramon
 
Digital jewellery janardhan
Digital jewellery janardhanDigital jewellery janardhan
Digital jewellery janardhanJana Vontari
 

Destacado (6)

.The business of IT
.The business of IT.The business of IT
.The business of IT
 
.Organizational Strategy and Information Systems
.Organizational Strategy and Information Systems.Organizational Strategy and Information Systems
.Organizational Strategy and Information Systems
 
My daily routine (1)
My daily routine (1)My daily routine (1)
My daily routine (1)
 
Dimensional Modeling for AHS
Dimensional Modeling for AHSDimensional Modeling for AHS
Dimensional Modeling for AHS
 
La comunicación on line
La comunicación on lineLa comunicación on line
La comunicación on line
 
Digital jewellery janardhan
Digital jewellery janardhanDigital jewellery janardhan
Digital jewellery janardhan
 

Similar a Secure Java-powered electronic token in a ring

Similar a Secure Java-powered electronic token in a ring (20)

Java ring
Java ringJava ring
Java ring
 
Presentation1
Presentation1Presentation1
Presentation1
 
Java ring Engg SEMINAR
Java ring Engg SEMINARJava ring Engg SEMINAR
Java ring Engg SEMINAR
 
Java Ring
Java RingJava Ring
Java Ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
java ring
java ringjava ring
java ring
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
 
java Ring
java Ringjava Ring
java Ring
 
New Ring
New RingNew Ring
New Ring
 
java-ring
 java-ring java-ring
java-ring
 
Java Ring
Java RingJava Ring
Java Ring
 
Java ring
Java ringJava ring
Java ring
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
Java ring
Java ring   Java ring
Java ring
 
My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
Java ring ppt
Java ring pptJava ring ppt
Java ring ppt
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 
Java Ring
Java Ring Java Ring
Java Ring
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Secure Java-powered electronic token in a ring

  • 2. CONTENTS Introduction History Components in Java Ring Working Security Application Disadvantages of Java Ring Conclusion References
  • 3. INTRODUCTION A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user. It contains an inexpensive microprocessor in a stainless steel ibutton running a JVM and it is preloaded with applet. The Java Ring is an extremely secure Java-powered electronic token .
  • 4. HISTORY In the summer of 1989, Dallas Semiconductor Corp. produced the first stainless-steel-encapsulated memory device called iButton. Java Ring was introduced at their JavaOne Conference in 1998 Java Ring is a stainless-steel ring, that houses a 1- million-transistor processor, called an iButton . The ring has 134 KB of RAM , 32 KB of ROM
  • 5. Components in java ring Java Virtual Machine (JVM) RAM ROM real-time clock iButton Blue dot receptor
  • 6. Java Virtual Machine  JVM is the heart of Java’s network orientation  Java ring is programmed with java application program and applets ,that communicate with the host application on the networked system. .  The java virtual machine is the piece of software that recognizes the java language and translate the byte code ,which is used by the system which is connected to the java ring via ring reader
  • 7. RAM and ROM Java ring contains 134kb of non-volatile random access memory. Program and data is stored in this NVRAM. High security is offered by the ability to erase the contents of NVRAM extremely quickly. The java ring contains 32kb of ROM. Ecommerce operating system is stored in ROM because it is not supposed to be altered by the user.
  • 8. Real Time Clock  In the java ring real time clock gives the exact time of the day.  A 32-kilohertz crystal oscillator is used in the Java iButton to operate the time-of-day.  The real time clock continuously running up to more than 10 years by the energy provided the lithium backup.
  • 9. iBUTTON The iButton was invented and is still manufactured exclusively by Dallas Semiconductor Each iButton starts with a guaranteed-unique registration number engraved in the silicon .
  • 10. Blue Dot Receptor iButton requires connection to a reader known as a Blue Dot Receptor in order to be supplied with power and to receive input and send output. The read/write operation will be done by this blue dot receptor provided by RS232 serial port adaptor. Receptor cable connects to the USB port of PC or any embedded system. The information is transferred between the ibutton and pc with momentary touching java ring .
  • 11. Working  java ring is programmed with the applets acoording to our application.  For specific class of user specific java applets is preloaded in to the java ring.  All the information of the user is stored in the java ring.  User simply presses the signet of the java ring against the “blue dot” receptor and the system connected to the receptor performs the function that the applet instructs to.
  • 12. Security The java ring provides very high degree of security for the confidential data that is stored in the NVRAM memory. Armored with stainless steel for the hard knocks of everyday use. Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person’s ring and use that ring.
  • 13. Applications Java ring is used for getting account balance of an user through internet . In celebration school,each student is issued a Java Ring. Java ring is used in opening the door Java ring can also be used in the security of car.
  • 14. Disadvantages of Java Ring  The cost of implementing the java ring could be very high.  The problem with the Java Ring is that many of the organization don't even know the existence of Java Ring.  Only limited amount of information can be stored so, an individual might need to carry more than one Java Ring.  Carrying the Java Ring everywhere could lead to theft issues.
  • 15. Conclusion  A very easy and convenient way for users.  It is more secure than using passwords, since passwords are short or can be guessed.  A ring is a personal thing that the user and only the user carries along anytime and anywhere, so that he can authenticate himself in every situation.  It is also possible to use a tag on the key ring or a watch instead of a ring.