SlideShare a Scribd company logo
1 of 4
Java Ring
What is Java Ring ?
The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter that houses
a 1-million-transistor processor, called an iButton
The Java Ring is a tiny wearable computer with 134kilobytes of RAM.
RAM has 6KB of data memory and to 32KB 0f program memory
6KB may not sound like much, but it is 20 percent more memory
than the first computer ever used .

Even 6 K is enough to hold our secret codes, our credit card
numbers, our driver license, other wallet contents, and even some electronic cash. The
ring can also store a few important URLs.


The Java Ring is a wearable computer that can be used to authenticate users to services
on the Internet. A user only has to push the ring on his finger on a Java Ring reader for
about a second.

The key issue about a wearable computer is not whether it is a ring
or another form factor: the deciding point is that we will always
have it with us. Many aspects of computing change once there
is no need to go to a special room to get at the computer.

INSIDE JAVARING
A Java Ring is a finger ring that contains ร 
JAVA VIRTUAL MACHINE
134KB RAM
32KB ROM
REAL TIME CLOCK
IBUTTON
BLUE DOT RECEPTOR

JAVA VIRTUAL MACHINE
JVM is the piece of software that recognises java language and translate into byte code,
which is used by system connected to java ring via reader.

134KB of RAM
It is used to store program and data. The NVRAM offers high R/W speed and also
provides temper resistance through instantaneous clearing of all memory when tempering
is detected.
Energy provided by lithium backup preserves complete state of machine when java ring
is disconnected from user
Performs garbage collection to deal with the objects which are out of scope and recycle
memory. Applets can be loaded or unloaded from java iButton
32KB of ROM
Special kind of operating system called E-commerce based on java and JVM is stored in
the ROM. This is because it is not supposed to be altered by the user. Operating system
handles all operations happening in iButton.
REAL TIME CLOCK
It gives exact time of the day. It can run up to 10 years by energy provided by lithium
backup. Processor clock frequency is not constant and cannot be determined by external
means.

The jewel of the Java Ring is the Java iButton

The iButton is a computer chip enclosed in a 16mm thick stainless steel can. Because of
this unique and durable container, up-to-date information can travel with a person or
object anywhere they go. Designed to be fully compatible with the Java Card 2.0 standard
the processor features a high-speed , large RAM and ROM memory capacity, and an
unalterable real-time clock. It is small and portable enough to attach to a key fob, ring,
watch, or other personal items.

Types of iButtons

โ€ข Memory iButton

โ€ข Java-powered cryptographic iButton

โ€ข Thermochron iButton


iBUTTON COMPONENTS
Can :
It is an electronic communications
interface. Each can has a data contact,
called the 'lid', and a ground contact,
called the 'base'. Each of these contacts
is connected to the silicon chip inside.

Grommet :

The two contacts are separated by a polypropylene grommet .Information is transferred
between iButton and a PC with a momentary contact, at up to 142K bits per second.

To do that one presses iButton to the Blue Dot receptor, a $15 pipeline into PC. The Blue
Dot sticks to any convenient spot on the front of a PC and is cabled to the serial or
parallel port in the back.
By simply touching the iButton to the two contacts described
above ,we can communicate with it through our 1-Wire protocol.
The 1-Wire interface has two communication speeds: standard
mode at 16kbps, and overdrive mode at 142kbps

Information is transferred between an iButton and a PC with a
momentary contact at up to 142kbps. We simply need to touch our
iButton to a Blue Dot receptor or other iButton probe, which is
connected to a PC.

Blue Dot Receptor

The R/W operation in java ring is done by blue dot receptor provided by RS232 serial
port adapter. DS1402D-DR8 is a 1-wire network cable designed to connect to any serial
or USB 1-wire port that has up to two buttons simultaneously.

Information is transferred between an iButton and a PC with a momentary contact, at up
to 142kbps.We just need to touch our iButton to a Blue Dot receptor or other iButton
probe, which is connected to a PC.

The Blue Dot receptor is cabled to a 1-wire adapter that is attached to the PCโ€™s serial or
parallel port.
Each receptor contains two Blue Dots to accommodate instances where multiple iButtons
are required to complete a transaction.

TMEX RUNTIME ENVIRONMENT(RTE)

A layer of software is required to interface iButtons to computers and produce the desired
information in the desired format.

For all iButtons ,iButton-TMEX is a software platform on which to build applications.
TMEXโ€™s architecture follows the International Standards Organization(ISO) reference
model of Open System Interconnection (OSI), a protocol with seven layers denoted as
Physical, Link, Network,Transport,Session , Presentation, and Application.

iButton Viewer
With the TMEX Windows installations we get the iButtons Viewer, an application for
exploring iButton features from our PC.

iButton Viewer automatically finds iButtons on our system and displays their serial
numbers with a description of relevant features and menu options

Java Virtual Machine

Automatic garbage collection for efficient reuse of memory space.

Add or delete applets in a secure manner to update applications.
Java-accessible unique 64 bit registration number supplements IP addresses to make the
intermittent network of roaming iButtons globally addressable.

Security in Java Ring
Confidential data is stored in Non Volatile RAM memory.
Barrier substrate and triple layer technique deny unauthorized access to NVRAM
confidential data.
If any unauthorized access penetrates the two layers, its detected by security processor
and data is erased immediately. This is called as Rapid Zeroization.
The communication between iButton and outside world is limited to single line, provides
security against hard ware attacks.
Processor clock frequency is not constant and cannot be determined by external means

Applications

Some of the applications of Java ring are in:
e-banking to get the account balance of customer.

Configuring our car components according to preferences.

Opening door to prevent entry of unauthorized users.

The Java Ring, therefore, is simply the latest and most complex descendant of a long line
of products that have proven themselves to be highly successful in the marketplace. With
its stainless steel armour, it offers the most durable packaging for a class of products that
likely will suffer heavy use and abuse as personal possessions. The iButton form factor
permits attachment to a wide variety of personal accessories that includes rings,
watchbands, key fobs, wallets, bracelets, and necklaces, so the user can select a variation
that suits his or her lifestyle.

More Related Content

What's hot

5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
PRADEEP Cheekatla
ย 
Voice browser
Voice browserVoice browser
Voice browser
Suman Bose
ย 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
Hafsa Tahir
ย 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
indianspandana
ย 
Eye gaze communication
Eye gaze communicationEye gaze communication
Eye gaze communication
PRADEEP Cheekatla
ย 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
Aparna Nk
ย 

What's hot (20)

Java ring
Java ring   Java ring
Java ring
ย 
Amith blue brain
Amith blue brainAmith blue brain
Amith blue brain
ย 
Fingerprint Based Security System
Fingerprint Based Security SystemFingerprint Based Security System
Fingerprint Based Security System
ย 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
ย 
Voice browser
Voice browserVoice browser
Voice browser
ย 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
ย 
BLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGYBLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGY
ย 
Seminar on isphere
Seminar on isphereSeminar on isphere
Seminar on isphere
ย 
Smart note taker
Smart note takerSmart note taker
Smart note taker
ย 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
ย 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final report
ย 
Voice Morping ppt
Voice Morping pptVoice Morping ppt
Voice Morping ppt
ย 
My seminar ppt SPACE MOUSE
My seminar ppt  SPACE MOUSEMy seminar ppt  SPACE MOUSE
My seminar ppt SPACE MOUSE
ย 
Eye gaze communication
Eye gaze communicationEye gaze communication
Eye gaze communication
ย 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
ย 
Wearable computing
Wearable computing Wearable computing
Wearable computing
ย 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
ย 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
ย 
USB 3.0 Product Info
USB 3.0 Product InfoUSB 3.0 Product Info
USB 3.0 Product Info
ย 
Esp8266 NodeMCU
Esp8266 NodeMCUEsp8266 NodeMCU
Esp8266 NodeMCU
ย 

Similar to Java ring

Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
Yogesh Bhalla
ย 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2
Naruin
ย 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2
Kyle
ย 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2
ekul
ย 
Java Ring
Java RingJava Ring
Java Ring
Haku Hikaru
ย 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
Jana Vontari
ย 

Similar to Java ring (20)

New Ring
New RingNew Ring
New Ring
ย 
Java Ring
Java Ring Java Ring
Java Ring
ย 
Java ring
Java ringJava ring
Java ring
ย 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
ย 
java Ring
java Ringjava Ring
java Ring
ย 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
ย 
Internet of things
Internet of thingsInternet of things
Internet of things
ย 
My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
ย 
Java ring
Java ringJava ring
Java ring
ย 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2
ย 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2
ย 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2
ย 
IRJET - Eyeblink Controlled Virtual Keyboard using Raspberry Pi
IRJET -  	  Eyeblink Controlled Virtual Keyboard using Raspberry PiIRJET -  	  Eyeblink Controlled Virtual Keyboard using Raspberry Pi
IRJET - Eyeblink Controlled Virtual Keyboard using Raspberry Pi
ย 
java ring
java ringjava ring
java ring
ย 
Presentation1
Presentation1Presentation1
Presentation1
ย 
Java Ring
Java RingJava Ring
Java Ring
ย 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
ย 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
ย 
IoT Intro and Demo
IoT Intro and DemoIoT Intro and Demo
IoT Intro and Demo
ย 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
ย 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
ย 

Recently uploaded (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
ย 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
ย 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
ย 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
ย 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
ย 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
ย 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
ย 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
ย 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
ย 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
ย 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
ย 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
ย 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
ย 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
ย 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
ย 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
ย 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
ย 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
ย 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
ย 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
ย 

Java ring

  • 1. Java Ring What is Java Ring ? The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter that houses a 1-million-transistor processor, called an iButton The Java Ring is a tiny wearable computer with 134kilobytes of RAM. RAM has 6KB of data memory and to 32KB 0f program memory 6KB may not sound like much, but it is 20 percent more memory than the first computer ever used . Even 6 K is enough to hold our secret codes, our credit card numbers, our driver license, other wallet contents, and even some electronic cash. The ring can also store a few important URLs. The Java Ring is a wearable computer that can be used to authenticate users to services on the Internet. A user only has to push the ring on his finger on a Java Ring reader for about a second. The key issue about a wearable computer is not whether it is a ring or another form factor: the deciding point is that we will always have it with us. Many aspects of computing change once there is no need to go to a special room to get at the computer. INSIDE JAVARING A Java Ring is a finger ring that contains ร  JAVA VIRTUAL MACHINE 134KB RAM 32KB ROM REAL TIME CLOCK IBUTTON BLUE DOT RECEPTOR JAVA VIRTUAL MACHINE JVM is the piece of software that recognises java language and translate into byte code, which is used by system connected to java ring via reader. 134KB of RAM It is used to store program and data. The NVRAM offers high R/W speed and also provides temper resistance through instantaneous clearing of all memory when tempering is detected. Energy provided by lithium backup preserves complete state of machine when java ring is disconnected from user Performs garbage collection to deal with the objects which are out of scope and recycle memory. Applets can be loaded or unloaded from java iButton
  • 2. 32KB of ROM Special kind of operating system called E-commerce based on java and JVM is stored in the ROM. This is because it is not supposed to be altered by the user. Operating system handles all operations happening in iButton. REAL TIME CLOCK It gives exact time of the day. It can run up to 10 years by energy provided by lithium backup. Processor clock frequency is not constant and cannot be determined by external means. The jewel of the Java Ring is the Java iButton The iButton is a computer chip enclosed in a 16mm thick stainless steel can. Because of this unique and durable container, up-to-date information can travel with a person or object anywhere they go. Designed to be fully compatible with the Java Card 2.0 standard the processor features a high-speed , large RAM and ROM memory capacity, and an unalterable real-time clock. It is small and portable enough to attach to a key fob, ring, watch, or other personal items. Types of iButtons โ€ข Memory iButton โ€ข Java-powered cryptographic iButton โ€ข Thermochron iButton iBUTTON COMPONENTS Can : It is an electronic communications interface. Each can has a data contact, called the 'lid', and a ground contact, called the 'base'. Each of these contacts is connected to the silicon chip inside. Grommet : The two contacts are separated by a polypropylene grommet .Information is transferred between iButton and a PC with a momentary contact, at up to 142K bits per second. To do that one presses iButton to the Blue Dot receptor, a $15 pipeline into PC. The Blue Dot sticks to any convenient spot on the front of a PC and is cabled to the serial or parallel port in the back. By simply touching the iButton to the two contacts described above ,we can communicate with it through our 1-Wire protocol.
  • 3. The 1-Wire interface has two communication speeds: standard mode at 16kbps, and overdrive mode at 142kbps Information is transferred between an iButton and a PC with a momentary contact at up to 142kbps. We simply need to touch our iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. Blue Dot Receptor The R/W operation in java ring is done by blue dot receptor provided by RS232 serial port adapter. DS1402D-DR8 is a 1-wire network cable designed to connect to any serial or USB 1-wire port that has up to two buttons simultaneously. Information is transferred between an iButton and a PC with a momentary contact, at up to 142kbps.We just need to touch our iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. The Blue Dot receptor is cabled to a 1-wire adapter that is attached to the PCโ€™s serial or parallel port. Each receptor contains two Blue Dots to accommodate instances where multiple iButtons are required to complete a transaction. TMEX RUNTIME ENVIRONMENT(RTE) A layer of software is required to interface iButtons to computers and produce the desired information in the desired format. For all iButtons ,iButton-TMEX is a software platform on which to build applications. TMEXโ€™s architecture follows the International Standards Organization(ISO) reference model of Open System Interconnection (OSI), a protocol with seven layers denoted as Physical, Link, Network,Transport,Session , Presentation, and Application. iButton Viewer With the TMEX Windows installations we get the iButtons Viewer, an application for exploring iButton features from our PC. iButton Viewer automatically finds iButtons on our system and displays their serial numbers with a description of relevant features and menu options Java Virtual Machine Automatic garbage collection for efficient reuse of memory space. Add or delete applets in a secure manner to update applications.
  • 4. Java-accessible unique 64 bit registration number supplements IP addresses to make the intermittent network of roaming iButtons globally addressable. Security in Java Ring Confidential data is stored in Non Volatile RAM memory. Barrier substrate and triple layer technique deny unauthorized access to NVRAM confidential data. If any unauthorized access penetrates the two layers, its detected by security processor and data is erased immediately. This is called as Rapid Zeroization. The communication between iButton and outside world is limited to single line, provides security against hard ware attacks. Processor clock frequency is not constant and cannot be determined by external means Applications Some of the applications of Java ring are in: e-banking to get the account balance of customer. Configuring our car components according to preferences. Opening door to prevent entry of unauthorized users. The Java Ring, therefore, is simply the latest and most complex descendant of a long line of products that have proven themselves to be highly successful in the marketplace. With its stainless steel armour, it offers the most durable packaging for a class of products that likely will suffer heavy use and abuse as personal possessions. The iButton form factor permits attachment to a wide variety of personal accessories that includes rings, watchbands, key fobs, wallets, bracelets, and necklaces, so the user can select a variation that suits his or her lifestyle.