Java Ring


Published on

The Java Ring is an extremely secure Java-powered electronic token. report:
link to download this ppt

Published in: Technology, Business
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Java Ring

  1. 2. Contents <ul><li>INTRODUCTION </li></ul><ul><li>HISTORY </li></ul><ul><li>COMPONENTS IN JAVA RING </li></ul><ul><li>ARCHITECHTURE </li></ul><ul><li>WORKING </li></ul><ul><li>SECURITY </li></ul><ul><li>APPLICATION </li></ul><ul><li>CONCLUSION </li></ul><ul><li>REFERENCE </li></ul>
  2. 3. INTRODUCTION <ul><li>A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user. </li></ul><ul><li>It contains an inexpensive microprocessr in a stainless steel ibutton running a JVM and it is preloaded with applet </li></ul><ul><li>The Java Ring is an extremely secure Java-powered electronic token . </li></ul><ul><li>.Java Ring could have a number of real-world application. </li></ul>
  3. 4. HISTORY <ul><li>In the summer of 1989, Dallas Semiconductor Corp. produced the first stainless-steel-encapsulated memory device called iButton. </li></ul><ul><li>iButton is the main component of java ring. </li></ul><ul><li>Java Ring was introduced at their JavaOne Conference in 1998 </li></ul>
  4. 5. Java Ring Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton . The ring has 134 KB of RAM , 32 KB of ROM
  5. 6. components <ul><li>Java Virtual Machine (JVM) </li></ul><ul><li>RAM </li></ul><ul><li>ROM </li></ul><ul><li>real-time clock </li></ul><ul><li>iButton </li></ul><ul><li>Blue dot reciptor </li></ul>
  6. 7. iButton <ul><li>The jewel of the Java Ring is the Java iButton -- a one-million transistor, single chip trusted microcomputer with a powerful Java Virtual Machine (JVM) housed in a rugged and secure stainless-steel case </li></ul><ul><li>Originally called &quot;touch memory&quot; devices, they were later renamed &quot;iButtons.&quot; Packaged like batteries, iButtons have only a single active electrical contact on the top surface, with the stainless steel shell serving as ground. </li></ul>
  7. 8. Architecture
  8. 9. Blue dot reciptor <ul><li>Blue dot receptor lets you communicate with ibuttons from pcs to microprocessor and embeded system. </li></ul><ul><li>The read/write operation will be done by this blue dot receptor provided by RS232 serial port adaptor. </li></ul><ul><li>Receptor cable connects to the USB port of PC or any embeded system. </li></ul><ul><li>The receptor itself affixes to any accesible spot . </li></ul><ul><li>The information is transferred between the ibutton and pc with momentary touching java ring . </li></ul>
  9. 10. working <ul><li>java ring is programmed with the applets acoording to our application. </li></ul><ul><li>For specific class of user specific java applets is preloaded in to the java ring. </li></ul><ul><li>All the information of the user is stored in the java ring. </li></ul><ul><li>User simply presses the signet of the java ring against the “blue dot” receptor and the system connected to the receptor performs the function that the applet instructs to to. </li></ul>
  10. 11. security <ul><li>This barrier substrate and the triple-layer metal construction techniques employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. </li></ul><ul><li>Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring. </li></ul>
  11. 12. application <ul><li>Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences. </li></ul><ul><li>Providing security. </li></ul><ul><li>Presonalized services. </li></ul>
  12. 13. conclusion <ul><li>Highly durable </li></ul><ul><li>Highly secure </li></ul><ul><li>Used in personal computing. </li></ul>
  13. 14. <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>Reference
  14. 15. Presented by <ul><li>Ravi prakash </li></ul><ul><li>s-7 </li></ul><ul><li>roll no-69 </li></ul>
  15. 16. Questions?