SlideShare a Scribd company logo
1 of 16
Contents
 INTRODUCTION
 HISTORY
 COMPONENTS IN JAVA RING
 ARCHITECHTURE
 WORKING
 SECURITY
 APPLICATION
 CONCLUSION
 REFERENCE
INTRODUCTION
 A Java Ring is a finger ring that contains a small

microprocessor with built-in capabilities for the user.

 It contains an inexpensive microprocessr in a stainless steel

ibutton running a JVM and it is preloaded with applet

 The Java Ring is an extremely secure Java-powered

electronic token .

 .Java Ring could have a number of real-world application.
HISTORY
In the summer of 1989, Dallas Semiconductor Corp.

produced the first stainless-steel-encapsulated
memory device called iButton.

iButton is the main component of java ring.

Java Ring was introduced at their JavaOne Conference

in 1998
Java Ring

Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter,
that houses a 1-million-transistor processor, called an iButton. The ring has
134 KB of RAM, 32 KB of ROM
components
Java Virtual Machine (JVM)
 RAM
 ROM
 real-time clock
iButton
 Blue dot reciptor
iButton
o The jewel of the Java Ring is the Java iButton -- a one-

million transistor, single chip trusted microcomputer
with a powerful Java Virtual Machine (JVM) housed in a
rugged and secure stainless-steel case

o Originally called "touch memory" devices, they were later
renamed "iButtons." Packaged like batteries, iButtons

have only a single active electrical contact on the top
surface, with the stainless steel shell serving as ground.
Architecture
Blue dot reciptor
Blue dot receptor lets you communicate with

ibuttons from pcs to microprocessor and embeded
system.
The read/write operation will be done by this blue
dot receptor provided by RS232 serial port adaptor.
Receptor cable connects to the USB port of PC or
any embeded system.
The receptor itself affixes to any accesible spot .
The information is transferred between the ibutton
working
 java ring is programmed with the applets acoording

to our application.
For specific class of user specific java applets is
preloaded in to the java ring.
All the information of the user is stored in the java
ring.
User simply presses the signet of the java ring against
the “blue dot” receptor and the system connected to
the receptor performs the function that the applet
instructs to to.
security
This barrier substrate and the triple-layer metal

construction techniques employed in the silicon
fabrication effectively deny access to the data stored
in the NVRAM. If any attempt is made to penetrate
these barriers, the NVRAM data is immediately
erased.
Java rings are authorized through Personal
Identification Numbers (PINs) so that no one can
steal a person's ring and use that ring.
application
Although Java Rings aren't widely used yet, such rings

or similar devices could have a number of real-world
applications, such as starting your car and having all
your vehicle's components (such as the seat, mirrors,
and radio selections) automatically adjust to your
preferences.
Providing security.
Presonalized services.
conclusion
Highly durable
Highly secure
Used in personal computing.
Reference
 www.javaworld.com


http://electronics.howstuffworks.com
 http://people.cs.uchicago.edu
Presented by

Ravi prakash
s-7
roll no-69
Questions?

More Related Content

What's hot

What's hot (8)

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
java ring
java ringjava ring
java ring
 
Sunspot
SunspotSunspot
Sunspot
 
Arduino1.0 RC
Arduino1.0 RCArduino1.0 RC
Arduino1.0 RC
 
The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?
 
ios device protection review
ios device protection reviewios device protection review
ios device protection review
 
Richard pablo - IoT Provisioning Solving the nightmare
Richard pablo - IoT Provisioning Solving the nightmareRichard pablo - IoT Provisioning Solving the nightmare
Richard pablo - IoT Provisioning Solving the nightmare
 
Google Glass Breakdown
Google Glass BreakdownGoogle Glass Breakdown
Google Glass Breakdown
 

Similar to 66913017 java-ring-1217949449014046-9 (1)

Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
Yogesh Bhalla
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
Yoga Kkg
 

Similar to 66913017 java-ring-1217949449014046-9 (1) (20)

Java ring Engg SEMINAR
Java ring Engg SEMINARJava ring Engg SEMINAR
Java ring Engg SEMINAR
 
Presentation1
Presentation1Presentation1
Presentation1
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
Java ring
Java ringJava ring
Java ring
 
Java Ring
Java RingJava Ring
Java Ring
 
java Ring
java Ringjava Ring
java Ring
 
New Ring
New RingNew Ring
New Ring
 
Java Ring
Java RingJava Ring
Java Ring
 
Java ring
Java ringJava ring
Java ring
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
 
Java ring ppt
Java ring pptJava ring ppt
Java ring ppt
 
Java Ring
Java Ring Java Ring
Java Ring
 
Java ring
Java ringJava ring
Java ring
 
Sun Spot Talk
Sun Spot TalkSun Spot Talk
Sun Spot Talk
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Dj ppt
Dj pptDj ppt
Dj ppt
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 

More from Sahithi Naraparaju

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
Sahithi Naraparaju
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
Sahithi Naraparaju
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
Sahithi Naraparaju
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
Sahithi Naraparaju
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
Sahithi Naraparaju
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
Sahithi Naraparaju
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in C
Sahithi Naraparaju
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
Sahithi Naraparaju
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
Sahithi Naraparaju
 

More from Sahithi Naraparaju (16)

PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
 
over view of viruses
over view of virusesover view of viruses
over view of viruses
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in C
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

66913017 java-ring-1217949449014046-9 (1)

  • 1.
  • 2. Contents  INTRODUCTION  HISTORY  COMPONENTS IN JAVA RING  ARCHITECHTURE  WORKING  SECURITY  APPLICATION  CONCLUSION  REFERENCE
  • 3. INTRODUCTION  A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user.  It contains an inexpensive microprocessr in a stainless steel ibutton running a JVM and it is preloaded with applet  The Java Ring is an extremely secure Java-powered electronic token .  .Java Ring could have a number of real-world application.
  • 4. HISTORY In the summer of 1989, Dallas Semiconductor Corp. produced the first stainless-steel-encapsulated memory device called iButton. iButton is the main component of java ring. Java Ring was introduced at their JavaOne Conference in 1998
  • 5. Java Ring Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM
  • 6. components Java Virtual Machine (JVM)  RAM  ROM  real-time clock iButton  Blue dot reciptor
  • 7. iButton o The jewel of the Java Ring is the Java iButton -- a one- million transistor, single chip trusted microcomputer with a powerful Java Virtual Machine (JVM) housed in a rugged and secure stainless-steel case o Originally called "touch memory" devices, they were later renamed "iButtons." Packaged like batteries, iButtons have only a single active electrical contact on the top surface, with the stainless steel shell serving as ground.
  • 9. Blue dot reciptor Blue dot receptor lets you communicate with ibuttons from pcs to microprocessor and embeded system. The read/write operation will be done by this blue dot receptor provided by RS232 serial port adaptor. Receptor cable connects to the USB port of PC or any embeded system. The receptor itself affixes to any accesible spot . The information is transferred between the ibutton
  • 10. working  java ring is programmed with the applets acoording to our application. For specific class of user specific java applets is preloaded in to the java ring. All the information of the user is stored in the java ring. User simply presses the signet of the java ring against the “blue dot” receptor and the system connected to the receptor performs the function that the applet instructs to to.
  • 11. security This barrier substrate and the triple-layer metal construction techniques employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.
  • 12. application Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences. Providing security. Presonalized services.