SlideShare una empresa de Scribd logo
1 de 33
JAVA RING
JAVA RING

Figure 1: prototype of stainless steel java ring
CONTENTS
•

INTRODUCTION

•

COMPONENTS

•

WORKING

•

SECURITY

•

APPLICATIONS

•

ADVANTAGES

•

DISADVANTAGES

•

CONCLUSION

•

REFERENCE
INTRODUCTION
• Java ring is a finger ring that contains a small
microprocessor with built in capabilities for the user.
• Java ring is a sort of a smartcard that is wearable on a
finger
• Java ring a stainless-steel ring,16-millimeters (0.6 inches)
in diameter.
CONTINUED…
• It contains an inexpensive microprocessor in a stainless
steel iButton which runs JVM and it is preloaded with applet.
• The java Ring is an extremely secure Java-Powered
electronic token.
• Java Ring have number of real-world application.
THE JAVA RING
• Contains a tiny Java Virtual Machine
• Implements the Java Card 2.0 API
• Stores information in NVRAM ,ROM

• Runs applets
• Includes microprocessor, memory, clock and battery
JAVA RING IN ITS NATURAL
ENVIRONMET..
COMPONENTS
• Java Virtual Machine (JVM)
•

RAM

•

ROM

•

real-time clock

•

iButton

•

Blue dot reciptor
JAVA VIRTUAL MACHINE
The java virtual machine is the piece of software that
recognizes the java language and translates the byte
Code.
RAM
• Java ring contains 134kb of non-volatile random
access memory .
• This non-volatile random access memory offers

high read/write speed.
• It also provides rapid zeroization.
ROM
• The java ring contains 32kb of ROM .
• Special kind of operating system called
e-commerce operating system is stored in the ROM
REAL TIME CLOCK
• Real time clock gives the exact time of the day and it can
run up to 10 years continuously .

• It is driven by a constant 32KHz crystal oscillator.
• In addition ,the frequency of the processor clock is
not constant ,ranges from 10-20MHz.
• This aspect prohibits hackers in obtaining the
information from the iButton.
i BUTTON
i BUTTON…
• The jewel of the java ring is the iButton.
• iButton is a computer chip enclosed in a thick stainless

steel can.
• It is originally called “touch memory devices they were
later renamed as “iButtons”.
• Java ring uses 1-wire protocol for communication
with the host and the iButton.
CONTINUED…
• The iButton is a mechanical packaging standard that
places a 1-Wire component inside a small stainless
steel "button" similar to a disk-shaped battery.
• Each iButton has a unique and unalterable address laser
attached onto its chip inside the can lid.
• The address can be used as a key or identifier for each
iButton.
i BUTTON STRUCTURE
BLUE DOT RECEPTOR
• The Blue Dot Receptors are iButton reader/probes that provide
convenient pipeline into the PC for iButton-to-PC

communication.

• The receptor's cable connects to a USB, serial, or parallel-port

1-Wire adapter, whichever type of port you wish to use.
• The receptor itself easily affixes to any accessible spot on

the front of the PC.

a
BLUE DOT RECEPTOR…
CONTINUED…
• Key features:
• It has a coiled cable for connecting iButtons to 1-Wire
networks .
• Adhesive pad for mounting on objects.
• Supports for up to two iButtons at once.
• Can be used with any Dallas Semiconductor port
adapter
WORKING
• Java Ring is programmed with the applets and
the programming is done according to our application
• Whenever the user pushes his ring on a ring reader(Blue
Dot Receptor), the corresponding application will take
place.
OPENING DOORS
Figure 5.2: Working process of Java Ring(Source: Java Card Technology
CONTINUED…
• Information is transferred between your iButton and a PC
with a momentary contact at up to 142kbps.
• You simply touch your iButton to a Blue Dot receptor or
other iButton probe, which is connected to a PC.
• The Blue Dot receptor is cabled to a 1-Wire adapter that is
attached to a spare PC port. 1-Wire adapters exist for USB,
serial, and parallel ports.
SECURITY
• The barrier substrate and the triple-layer metal construction

techniques employed in the silicon fabrication effectively deny
unauthorized access to the data stored in the NVRAM. If any

attempt is made to penetrate these barriers, the NVRAM data is
immediately erased.
• Java rings are authorized through Personal Identification

Numbers

(PINs) so that no one can steal a person's ring and use that ring.
APPLICATIONS
• The java ring can be used to hold secret codes,
credit cards numbers, driver license, other wallet
contents, and even some electronic cash.
•

Its greatest promise appears to lie in its capacity to
interact with Internet applications to support strong
remote authentication and remotely authorized financial

transactions.
CONTINUED…
• For opening the door
• E-banking application
• Logging in your PC

• Providing security in your car
• Used to fill forms
ADVANTAGES
• The Java Rings are very easy and convenient for
users.
• It can function between -40C to+70C and in much
harsher environment.
• It has higher durability.
CONTINUED…
• Easier for administrator to maintain the security
infrastructure.
• Provides real memory, more power, and a capacity
for dynamic programming .
• Provides authentication to user which is crucial for many
applications.
DISADVANTAGES
• The cost of implementing the system is high.
• It needs a high level tools and method in order to

program

application efficently, reliabily,securily.
• iButton has a limited processor capacity and memory , which
means an individual might need to carry more
Java Ring.

than one
CONCLUSION
• Although Java Rings aren't widely used yet, such rings or
similar devices could have a number of real-world
applications, such as starting your car and automatically
adjust to your preferences.
•

The key issue about a wearable computer (java ring) is not
whether it is a ring or another form factor: the deciding point is
that you will always have it with you.
REFERENCES
• http://www.javaworld.com/
• http://www.people.uchicago.edu/
• http://www.electronics.howstuffworks.com
abhi.globalistic@gmail.com

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

I twin technology
I twin technologyI twin technology
I twin technology
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Java ring
Java ringJava ring
Java ring
 
E ball technology
E ball technologyE ball technology
E ball technology
 
Haptic technology ppt
Haptic technology pptHaptic technology ppt
Haptic technology ppt
 
SIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORTSIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORT
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Micro electronic pill
Micro electronic pillMicro electronic pill
Micro electronic pill
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Haptic Technology ppt
Haptic Technology pptHaptic Technology ppt
Haptic Technology ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
SMART NOTE TAKER
SMART NOTE TAKERSMART NOTE TAKER
SMART NOTE TAKER
 
wireless usb ppt
wireless usb pptwireless usb ppt
wireless usb ppt
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
3D Internet
3D Internet3D Internet
3D Internet
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 

Similar a Java Ring

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ringarun Prabha
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Yogesh Bhalla
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptsowndryaganesh
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Jana Vontari
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Prachi Jain
 
How i built my own irrigation controller
How i built my own irrigation controllerHow i built my own irrigation controller
How i built my own irrigation controllerShree Kumar
 
Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.Nitish Kumar
 
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)Jonathan Engelsma
 
CEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemCEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemBillBlanco
 

Similar a Java Ring (20)

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
java ring
java ringjava ring
java ring
 
Java ring
Java ring   Java ring
Java ring
 
New Ring
New RingNew Ring
New Ring
 
Java ring
Java ringJava ring
Java ring
 
Presentation1
Presentation1Presentation1
Presentation1
 
Java Ring
Java Ring Java Ring
Java Ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
Java ring
Java ringJava ring
Java ring
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
 
Java Ring
Java RingJava Ring
Java Ring
 
How i built my own irrigation controller
How i built my own irrigation controllerHow i built my own irrigation controller
How i built my own irrigation controller
 
java Ring
java Ringjava Ring
java Ring
 
Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.
 
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
 
IoT and Its Application
IoT and Its ApplicationIoT and Its Application
IoT and Its Application
 
CEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemCEIS101: IoT Home Security System
CEIS101: IoT Home Security System
 

Más de Abhishek Abhi

Augmented reality The future of computing
Augmented reality The future of computingAugmented reality The future of computing
Augmented reality The future of computingAbhishek Abhi
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobilesAbhishek Abhi
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting systemAbhishek Abhi
 

Más de Abhishek Abhi (7)

Blue brain
Blue brainBlue brain
Blue brain
 
3d search
3d search3d search
3d search
 
3D Internet
3D Internet 3D Internet
3D Internet
 
Augmented reality The future of computing
Augmented reality The future of computingAugmented reality The future of computing
Augmented reality The future of computing
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Java Ring

  • 2. JAVA RING Figure 1: prototype of stainless steel java ring
  • 4. INTRODUCTION • Java ring is a finger ring that contains a small microprocessor with built in capabilities for the user. • Java ring is a sort of a smartcard that is wearable on a finger • Java ring a stainless-steel ring,16-millimeters (0.6 inches) in diameter.
  • 5. CONTINUED… • It contains an inexpensive microprocessor in a stainless steel iButton which runs JVM and it is preloaded with applet. • The java Ring is an extremely secure Java-Powered electronic token. • Java Ring have number of real-world application.
  • 6. THE JAVA RING • Contains a tiny Java Virtual Machine • Implements the Java Card 2.0 API • Stores information in NVRAM ,ROM • Runs applets • Includes microprocessor, memory, clock and battery
  • 7. JAVA RING IN ITS NATURAL ENVIRONMET..
  • 8. COMPONENTS • Java Virtual Machine (JVM) • RAM • ROM • real-time clock • iButton • Blue dot reciptor
  • 9. JAVA VIRTUAL MACHINE The java virtual machine is the piece of software that recognizes the java language and translates the byte Code.
  • 10.
  • 11. RAM • Java ring contains 134kb of non-volatile random access memory . • This non-volatile random access memory offers high read/write speed. • It also provides rapid zeroization.
  • 12. ROM • The java ring contains 32kb of ROM . • Special kind of operating system called e-commerce operating system is stored in the ROM
  • 13. REAL TIME CLOCK • Real time clock gives the exact time of the day and it can run up to 10 years continuously . • It is driven by a constant 32KHz crystal oscillator. • In addition ,the frequency of the processor clock is not constant ,ranges from 10-20MHz. • This aspect prohibits hackers in obtaining the information from the iButton.
  • 15. i BUTTON… • The jewel of the java ring is the iButton. • iButton is a computer chip enclosed in a thick stainless steel can. • It is originally called “touch memory devices they were later renamed as “iButtons”. • Java ring uses 1-wire protocol for communication with the host and the iButton.
  • 16. CONTINUED… • The iButton is a mechanical packaging standard that places a 1-Wire component inside a small stainless steel "button" similar to a disk-shaped battery. • Each iButton has a unique and unalterable address laser attached onto its chip inside the can lid. • The address can be used as a key or identifier for each iButton.
  • 18. BLUE DOT RECEPTOR • The Blue Dot Receptors are iButton reader/probes that provide convenient pipeline into the PC for iButton-to-PC communication. • The receptor's cable connects to a USB, serial, or parallel-port 1-Wire adapter, whichever type of port you wish to use. • The receptor itself easily affixes to any accessible spot on the front of the PC. a
  • 20. CONTINUED… • Key features: • It has a coiled cable for connecting iButtons to 1-Wire networks . • Adhesive pad for mounting on objects. • Supports for up to two iButtons at once. • Can be used with any Dallas Semiconductor port adapter
  • 21. WORKING • Java Ring is programmed with the applets and the programming is done according to our application • Whenever the user pushes his ring on a ring reader(Blue Dot Receptor), the corresponding application will take place.
  • 23. Figure 5.2: Working process of Java Ring(Source: Java Card Technology
  • 24. CONTINUED… • Information is transferred between your iButton and a PC with a momentary contact at up to 142kbps. • You simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. • The Blue Dot receptor is cabled to a 1-Wire adapter that is attached to a spare PC port. 1-Wire adapters exist for USB, serial, and parallel ports.
  • 25. SECURITY • The barrier substrate and the triple-layer metal construction techniques employed in the silicon fabrication effectively deny unauthorized access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. • Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.
  • 26. APPLICATIONS • The java ring can be used to hold secret codes, credit cards numbers, driver license, other wallet contents, and even some electronic cash. • Its greatest promise appears to lie in its capacity to interact with Internet applications to support strong remote authentication and remotely authorized financial transactions.
  • 27. CONTINUED… • For opening the door • E-banking application • Logging in your PC • Providing security in your car • Used to fill forms
  • 28. ADVANTAGES • The Java Rings are very easy and convenient for users. • It can function between -40C to+70C and in much harsher environment. • It has higher durability.
  • 29. CONTINUED… • Easier for administrator to maintain the security infrastructure. • Provides real memory, more power, and a capacity for dynamic programming . • Provides authentication to user which is crucial for many applications.
  • 30. DISADVANTAGES • The cost of implementing the system is high. • It needs a high level tools and method in order to program application efficently, reliabily,securily. • iButton has a limited processor capacity and memory , which means an individual might need to carry more Java Ring. than one
  • 31. CONCLUSION • Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and automatically adjust to your preferences. • The key issue about a wearable computer (java ring) is not whether it is a ring or another form factor: the deciding point is that you will always have it with you.