SlideShare una empresa de Scribd logo
1 de 18
 WHAT IS A JAVA RING?
Is a finger ring that contains a small microprocessor
with built in capabilities for the user. The java ring is
an extremely secure java-powered electronic token.
 The Java Ring is a stainless-steel ring, 16-millimeters
(0.6 inches) in diameter, that houses a 1-million-
transistor processor, called an iButton.
 The Ring has 134 kb of RAM, 32 kb of ROM, a real-time
clock and a java virtual machine, which is a piece of
software that recognizes the java language and translates it
for the user's computer system.
JAVA RING
 The INSIDE Java Ring Contains
 Small micro processor with
built-in capabilities for the
user.
 Stainless steel iButton.
 Java Virtual Machine.
 applets
 Real Time Clock
JAVA RING IN ITS NATURAL ENVIRONMENT..
 HISTORY :
 The java ring was developed by Dallas Semiconductor in
1989..
 Java ring has been tested at Celebration School (United
States) to students and have been programmed to
 automatically unlock doors
 take attendance
 store medical information
 The rings given to students are programmed with
Java applets that communicate with applications on
networked systems.
 WORKING :
 This java applets application is preloaded into
java ring.
 Java ring is programmed with the applets
according to our application.
 User simply presses the signal of the java ring
against the "BLUE DOT" receptor and the system
is connected to the receptor that performs the
function that the applet instructs to it.
iButton Blue Dot Receptor
 Simply touch your iButton to a Blue Dot receptor or
other iButton probe, which is connected to a PC.
Ground content called "base" Data content called "LID“.
 COMPONENTS :
 Java Virtual Machine
 RAM
 ROM
 Real-time clock
 iButton
 Blue dot receptor.
 APPLICATIONS :
 Although Java Rings aren't widely used yet, such
rings have real-world applications,such as starting
vehicles that automatically adjust to your
preferences.
 Provides Security.
 Personalised services.(manual work performed
by a service provider by serving to a customer).
 Java ring provides high degree of security for the
confidential data that is stored.
 Java rings are authorised through Personal
Identification Numbers (PINs) so that no one can
steal a persons ring and use that ring.
 SECURITY :
 ADVANTAGES :
Java Ring is Wearable Completely Controlled by the
user.
 10 years of durability.
 It can be used anywhere in the world.
 It can be used even as a key without passwords.
 CONCLUSION:
 Latest Technology.
 It can be attached to various personal accessories.
 A very easy and convenient way for users.
 It is more secure than using passwords,since
passwords are short or can be guessed.
Presentation1
Presentation1

Más contenido relacionado

La actualidad más candente

66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
Sahithi Naraparaju
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
Yogesh Bhalla
 
Eric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 SlidesEric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 Slides
evetillard
 
Finger print based security system
Finger print based security systemFinger print based security system
Finger print based security system
Ecway Technologies
 
Finger print based security access control system
Finger print based security access control systemFinger print based security access control system
Finger print based security access control system
Ecwayt
 

La actualidad más candente (20)

Java ring ppt
Java ring pptJava ring ppt
Java ring ppt
 
Java ring
Java ringJava ring
Java ring
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Java ring Engg SEMINAR
Java ring Engg SEMINARJava ring Engg SEMINAR
Java ring Engg SEMINAR
 
Java Ring
Java Ring Java Ring
Java Ring
 
Java Ring
Java RingJava Ring
Java Ring
 
Java ring
Java ringJava ring
Java ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
New Ring
New RingNew Ring
New Ring
 
My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
java ring
java ringjava ring
java ring
 
Eric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 SlidesEric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 Slides
 
computer system Architecture (Food detector)
computer system Architecture (Food detector)computer system Architecture (Food detector)
computer system Architecture (Food detector)
 
Sun SPOT, Wireless Sensors Networks
Sun SPOT, Wireless Sensors NetworksSun SPOT, Wireless Sensors Networks
Sun SPOT, Wireless Sensors Networks
 
Sunspot
SunspotSunspot
Sunspot
 
Finger print based security system
Finger print based security systemFinger print based security system
Finger print based security system
 
Finger print based security access control system
Finger print based security access control systemFinger print based security access control system
Finger print based security access control system
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Smart Gloves for Blind
Smart Gloves for BlindSmart Gloves for Blind
Smart Gloves for Blind
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 

Similar a Presentation1

Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
Yoga Kkg
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
Manu Priya
 
Presentation on digital jwellary.pptx
Presentation on digital jwellary.pptxPresentation on digital jwellary.pptx
Presentation on digital jwellary.pptx
GarimaKabra3
 

Similar a Presentation1 (20)

Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
Java Ring
Java RingJava Ring
Java Ring
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Dj ppt
Dj pptDj ppt
Dj ppt
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
Digital jewellery ppt
Digital   jewellery pptDigital   jewellery ppt
Digital jewellery ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
online hotel management system
online hotel management system online hotel management system
online hotel management system
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika Nigam
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
vishala.pptx
vishala.pptxvishala.pptx
vishala.pptx
 
Presentation on digital jwellary.pptx
Presentation on digital jwellary.pptxPresentation on digital jwellary.pptx
Presentation on digital jwellary.pptx
 
How java is better than other languages according to history and uses.
How java is better than other languages according to history and uses.How java is better than other languages according to history and uses.
How java is better than other languages according to history and uses.
 
Vankam ppt.ppt
Vankam ppt.pptVankam ppt.ppt
Vankam ppt.ppt
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Presentation1

  • 1.
  • 2.
  • 3.  WHAT IS A JAVA RING? Is a finger ring that contains a small microprocessor with built in capabilities for the user. The java ring is an extremely secure java-powered electronic token.  The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million- transistor processor, called an iButton.  The Ring has 134 kb of RAM, 32 kb of ROM, a real-time clock and a java virtual machine, which is a piece of software that recognizes the java language and translates it for the user's computer system.
  • 5.  The INSIDE Java Ring Contains  Small micro processor with built-in capabilities for the user.  Stainless steel iButton.  Java Virtual Machine.  applets  Real Time Clock
  • 6. JAVA RING IN ITS NATURAL ENVIRONMENT..
  • 7.  HISTORY :  The java ring was developed by Dallas Semiconductor in 1989..  Java ring has been tested at Celebration School (United States) to students and have been programmed to  automatically unlock doors  take attendance  store medical information  The rings given to students are programmed with Java applets that communicate with applications on networked systems.
  • 8.  WORKING :  This java applets application is preloaded into java ring.  Java ring is programmed with the applets according to our application.  User simply presses the signal of the java ring against the "BLUE DOT" receptor and the system is connected to the receptor that performs the function that the applet instructs to it.
  • 9. iButton Blue Dot Receptor
  • 10.  Simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. Ground content called "base" Data content called "LID“.
  • 11.  COMPONENTS :  Java Virtual Machine  RAM  ROM  Real-time clock  iButton  Blue dot receptor.
  • 12.  APPLICATIONS :  Although Java Rings aren't widely used yet, such rings have real-world applications,such as starting vehicles that automatically adjust to your preferences.  Provides Security.  Personalised services.(manual work performed by a service provider by serving to a customer).
  • 13.  Java ring provides high degree of security for the confidential data that is stored.  Java rings are authorised through Personal Identification Numbers (PINs) so that no one can steal a persons ring and use that ring.  SECURITY :
  • 14.  ADVANTAGES : Java Ring is Wearable Completely Controlled by the user.  10 years of durability.  It can be used anywhere in the world.  It can be used even as a key without passwords.
  • 15.
  • 16.  CONCLUSION:  Latest Technology.  It can be attached to various personal accessories.  A very easy and convenient way for users.  It is more secure than using passwords,since passwords are short or can be guessed.