BY
D.AKSHAYA
WHAT IS A JAVA RING????
 A finger ring with a small
micro –processor – a sort
of smart card that is
wearable on a finger.
HISTORY…
 IN 1989-Dallas semiconductor corp produced the first
stainless-steel-encapsulated memory devices.
 They were called “touch memory devices later
renamed as “I buttons”
 i-buttons have one electrical contact at their surface
 Java rings were first issued at a conference registration
WHAT IS AN I-BUTTON??
 A micro-chip similar to
those in smart cards!
 Memory devices to store
data can be read &
written like floppies
 i-buttons with password
protected areas can even
store e-cash
Crypto i-buttons
 Does not have internal
power source
 Provides secure
transaction of
information between the
parties involved!
 i-buttons with
temperature sensors can
detect temperature for
transport,food storage
etc
I- BUTTONS
Potentials of java ring!!
 Data can be read from or written to it through a simple
RS232C serial port adapter
 The adapter supplies the power to perform the i/o
operations.
 When not connected to the adapter data is maintained
in NVRAM
 NVRAM unlike EEPROM can be erased & rewritten
without wear out.
JAVA RING FEATURES
1
• Durable & wearable
• Indestructible
2
• Has a real time clock
• Not heavy & clumsy
3
• 6k ROM,NVRAM!
• Has i-buttons in it!
 Has 6k memory to which authentication of the user
can be done!
 The java ring has an i-button that has a JVM which
runs applets that serve varied needs
 Once the user chooses his preference the data gets
stored and automatically the applet runs according to
the user’s preference
Advantages & disadvantages
 Helps in remote & safe
transactions
 Rugged & can be worn all
the time by the user
 10 years of durability
 Can be used even as a
key!!No more
passwords!!!
 Can be used anywhere in
the world
Disadvantages
 Provides real memory,
more power, and a capacity
for dynamic programming
 Can contain the
information about the user
 Cannot be stolen & when
an unauthorized person
tries to access the data
NVRAM automatically gets
erased!
 High investments
 Memory is small
Conclusion…
In near future the
computing devices
would only be so
intimate to humans!
The world of computing
will obviously be
mobile!!
Java ring

Java ring

  • 1.
  • 2.
    WHAT IS AJAVA RING????  A finger ring with a small micro –processor – a sort of smart card that is wearable on a finger.
  • 3.
    HISTORY…  IN 1989-Dallassemiconductor corp produced the first stainless-steel-encapsulated memory devices.  They were called “touch memory devices later renamed as “I buttons”  i-buttons have one electrical contact at their surface  Java rings were first issued at a conference registration
  • 4.
    WHAT IS ANI-BUTTON??  A micro-chip similar to those in smart cards!  Memory devices to store data can be read & written like floppies  i-buttons with password protected areas can even store e-cash
  • 6.
    Crypto i-buttons  Doesnot have internal power source  Provides secure transaction of information between the parties involved!  i-buttons with temperature sensors can detect temperature for transport,food storage etc
  • 7.
  • 8.
    Potentials of javaring!!  Data can be read from or written to it through a simple RS232C serial port adapter  The adapter supplies the power to perform the i/o operations.  When not connected to the adapter data is maintained in NVRAM  NVRAM unlike EEPROM can be erased & rewritten without wear out.
  • 10.
    JAVA RING FEATURES 1 •Durable & wearable • Indestructible 2 • Has a real time clock • Not heavy & clumsy 3 • 6k ROM,NVRAM! • Has i-buttons in it!
  • 11.
     Has 6kmemory to which authentication of the user can be done!  The java ring has an i-button that has a JVM which runs applets that serve varied needs  Once the user chooses his preference the data gets stored and automatically the applet runs according to the user’s preference
  • 12.
    Advantages & disadvantages Helps in remote & safe transactions  Rugged & can be worn all the time by the user  10 years of durability  Can be used even as a key!!No more passwords!!!  Can be used anywhere in the world
  • 13.
    Disadvantages  Provides realmemory, more power, and a capacity for dynamic programming  Can contain the information about the user  Cannot be stolen & when an unauthorized person tries to access the data NVRAM automatically gets erased!  High investments  Memory is small
  • 14.
    Conclusion… In near futurethe computing devices would only be so intimate to humans! The world of computing will obviously be mobile!!