Top Banner
By Sowmya B N
38
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: java ring

By Sowmya B N

Page 2: java ring

IntroductionHistoryComponentsWorkingSecurityApplicationsAdvantagesDisadvantagesConclusionReference

Page 3: java ring

Is a finger ring that contains a small microprocessor with built in capabilities for the user.

Is a sort of a smartcard that is wearable on a finger.

Is a stainless-steel ring,16-millimeters (0.6 inches) in diameter.

Page 4: java ring

It contains an inexpensive microprocessor in a stainless steel iButton running a JVM and it is preloaded with applet.

The java Ring is an extremely secure Java-Powered electronic token.

Java Ring could have a number of real-world application

Page 5: java ring
Page 6: java ring

The Java Ring

Contains a tiny Java Virtual Machine Implements the Java Card 2.0 API Stores information in NVRAM ,ROM Runs applets Includes microprocessor, memory,

clock and battery

Page 7: java ring
Page 8: java ring

The java ring, which is powered by Java card was introduced at Sun Microsystems's JavaOne Conference, in March 1998.

It was developed by Dallas Semiconductor. Workstations at the conference had "ring

readers" installed on them that downloaded information about the user from the conference registration system.

This information was then used to enable a number of personalized services.

Page 9: java ring

Java ring has been tested at Celebration School, an innovative K-12 school, just outside Orlando, FL. The rings are given to students and have been programmed to;

store electronic cash to pay for lunches automatically unlock doors take attendance store medical information allow students to check out books. Students simply press the signet of

their Java Ring, and it performs the desired function.

Page 10: java ring

The rings given to students are programmed with Java applets that communicate with host applications on networked systems

The Java Ring is snapped into a reader, called a Blue Dot receptor, to allow communication between a host system and the Java Ring.

Page 11: java ring

Java Virtual Machine (JVM) RAM ROM real-time clock iButton Blue dot reciptor

Page 12: java ring

The java virtual machine is the

piece of software that recognizes the java language and translates the byte code .

Page 13: java ring

Java ring contains 134kb of non-volatile random access memory .

This non-volatile random access memory offers high read/write speed.

It also provides rapid zeroization.

Page 14: java ring

The java ring contains 32kb of ROM .

Special kind of operating system called e-commerce operating system is stored in the ROM.

Page 15: java ring

Real time clock gives the exact time of the day and it can run up to 10 years continuously .

It is driven by a constant 32KHz crystal oscillator.

In addition ,the frequency of the processor clock is not constant ;ranges from 10-20MHz.

This aspect prohibits hackers in obtaining the information from the iButton.

Page 16: java ring
Page 17: java ring

The jewel of the java ring is the iButton.

iButton is a computer chip enclosed in a thick stainless steel can.

It is originally called “touch memory devices they were later renamed as “iButtons”.

Java ring uses 1-wire protocol for communication with the host and the iButton.

Page 18: java ring

The iButton is a mechanical packaging standard that places a 1-Wire component inside a small stainless steel "button" similar to a disk-shaped battery.

Each iButton has a unique and unalterable address laser etched onto its chip inside the can.

The address can be used as a key or identifier for each iButton.

Page 19: java ring
Page 20: java ring

Mainly three types of iButton are in use:

1.Thermochrone iButton2.Crypto iButton3.Memory iButton

Page 21: java ring

This includes a thermometer, a clock and a memory.

It tracks time and temperature in different environment.

Page 22: java ring

Memories around 64K can be stored either in typed text or digitized photos.

It has ability to operate as mobile databases.

Page 23: java ring
Page 24: java ring

The Blue Dot Receptors are iButton reader/probes that provide a convenient pipeline into the PC for iButton-to-PC communication.

The receptor's cable connects to a USB, serial, or parallel-port 1-Wire adapter, whichever type of port you wish to use.

The receptor itself easily affixes to any accessible spot on the front of the PC.

Page 25: java ring
Page 26: java ring

Key features: It has a coiled cable for

connecting iButtons to 1-Wire networks .

Adhesive pad for mounting on objects.

Supports for up to two iButtons at once.

Can be used with any Dallas Semiconductor port adapter.

Page 27: java ring

Java Ring is programmed with the applets and the programming is done according to our application

Whenever the user pushes his ring on a ring reader(Blue Dot Receptor), the corresponding application will take place.

Page 28: java ring
Page 29: java ring

Information is transferred between your iButton and a PC with a momentary contact at up to 142kbps.

You simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC.

The Blue Dot receptor is cabled to a 1-Wire adapter that is attached to a spare PC port. 1-Wire adapters exist for USB, serial, and parallel ports.

Page 30: java ring

The barrier substrate and the triple-layer metal construction techniques employed in the silicon fabrication effectively deny unauthorized access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased.

Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.

Page 31: java ring

The java ring can be used to hold secret codes, The java ring can be used to hold secret codes, credit cards numbers, driver license, other credit cards numbers, driver license, other wallet contents, and even some electronic cash. wallet contents, and even some electronic cash.

It’s greatest promise appears to lie in its It’s greatest promise appears to lie in its capacity to interact with Internet applications capacity to interact with Internet applications to support strong remote authentication and to support strong remote authentication and remotely authorized financial transactions.remotely authorized financial transactions.

Page 32: java ring

For opening the doorFor opening the door

E-bank applicationE-bank application

Logging in your PCLogging in your PC

Providing security in your car.Providing security in your car.

Page 33: java ring

The Java Rings are very easy and convenient for users.

It can function between -40C to+70C

and in much harsher environment.

It has higher durability.

Page 34: java ring

Provides authentication to users which is crucial for many applications.

Easier for administrator to maintain the security infrastructure.

Provides real memory, more power, and a capacity for dynamic programming

Page 35: java ring

The cost of implementing the system is high.

It needs a high level tools and method in order to program application efficiently,reliabily,securily.

iButton has a limited processor capacity and memory ,which means an individual might need to carry more than one Java Ring.

Page 36: java ring

Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences.

The key issue about a wearable computer (java ring) is not whether it is a ring or another form factor: the deciding point is that you will always have it with you.

Page 37: java ring

[1] http://www.javaworld.com/ [2]

http://www.electronics.howstuffworks.com/

[3] http://www.people.uchicago.edu/

Page 38: java ring