SlideShare a Scribd company logo
Contents
 INTRODUCTION
 HISTORY
 COMPONENTS IN JAVA RING
 ARCHITECHTURE
 WORKING
 SECURITY
 APPLICATION
 CONCLUSION
 REFERENCE
INTRODUCTION
 A Java Ring is a finger ring that contains a small

microprocessor with built-in capabilities for the user.

 It contains an inexpensive microprocessr in a stainless steel

ibutton running a JVM and it is preloaded with applet

 The Java Ring is an extremely secure Java-powered

electronic token .

 .Java Ring could have a number of real-world application.
HISTORY
In the summer of 1989, Dallas Semiconductor Corp.

produced the first stainless-steel-encapsulated
memory device called iButton.

iButton is the main component of java ring.

Java Ring was introduced at their JavaOne Conference

in 1998
Java Ring

Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter,
that houses a 1-million-transistor processor, called an iButton. The ring has
134 KB of RAM, 32 KB of ROM
components
Java Virtual Machine (JVM)
 RAM
 ROM
 real-time clock
iButton
 Blue dot reciptor
iButton
o The jewel of the Java Ring is the Java iButton -- a one-

million transistor, single chip trusted microcomputer
with a powerful Java Virtual Machine (JVM) housed in a
rugged and secure stainless-steel case

o Originally called "touch memory" devices, they were later
renamed "iButtons." Packaged like batteries, iButtons

have only a single active electrical contact on the top
surface, with the stainless steel shell serving as ground.
Architecture
Blue dot reciptor
Blue dot receptor lets you communicate with

ibuttons from pcs to microprocessor and embeded
system.
The read/write operation will be done by this blue
dot receptor provided by RS232 serial port adaptor.
Receptor cable connects to the USB port of PC or
any embeded system.
The receptor itself affixes to any accesible spot .
The information is transferred between the ibutton
working
 java ring is programmed with the applets acoording

to our application.
For specific class of user specific java applets is
preloaded in to the java ring.
All the information of the user is stored in the java
ring.
User simply presses the signet of the java ring against
the “blue dot” receptor and the system connected to
the receptor performs the function that the applet
instructs to to.
security
This barrier substrate and the triple-layer metal

construction techniques employed in the silicon
fabrication effectively deny access to the data stored
in the NVRAM. If any attempt is made to penetrate
these barriers, the NVRAM data is immediately
erased.
Java rings are authorized through Personal
Identification Numbers (PINs) so that no one can
steal a person's ring and use that ring.
application
Although Java Rings aren't widely used yet, such rings

or similar devices could have a number of real-world
applications, such as starting your car and having all
your vehicle's components (such as the seat, mirrors,
and radio selections) automatically adjust to your
preferences.
Providing security.
Presonalized services.
conclusion
Highly durable
Highly secure
Used in personal computing.
Reference
 www.javaworld.com


http://electronics.howstuffworks.com
 http://people.cs.uchicago.edu
Presented by

Ravi prakash
s-7
roll no-69
Questions?

More Related Content

What's hot

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
arun Prabha
 
java ring
java ringjava ring
Sunspot
SunspotSunspot
Sunspot
pauldeng
 
Arduino1.0 RC
Arduino1.0 RCArduino1.0 RC
Arduino1.0 RC
馬 萬圳
 
The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?
SecuRing
 
ios device protection review
ios device protection reviewios device protection review
ios device protection review
nlog2n
 
Richard pablo - IoT Provisioning Solving the nightmare
Richard pablo - IoT Provisioning Solving the nightmareRichard pablo - IoT Provisioning Solving the nightmare
Richard pablo - IoT Provisioning Solving the nightmare
AWSCOMSUM
 
Google Glass Breakdown
Google Glass BreakdownGoogle Glass Breakdown
Google Glass Breakdown
Camera Culture Group, MIT Media Lab
 

What's hot (8)

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
java ring
java ringjava ring
java ring
 
Sunspot
SunspotSunspot
Sunspot
 
Arduino1.0 RC
Arduino1.0 RCArduino1.0 RC
Arduino1.0 RC
 
The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?
 
ios device protection review
ios device protection reviewios device protection review
ios device protection review
 
Richard pablo - IoT Provisioning Solving the nightmare
Richard pablo - IoT Provisioning Solving the nightmareRichard pablo - IoT Provisioning Solving the nightmare
Richard pablo - IoT Provisioning Solving the nightmare
 
Google Glass Breakdown
Google Glass BreakdownGoogle Glass Breakdown
Google Glass Breakdown
 

Similar to 66913017 java-ring-1217949449014046-9 (1)

Java ring Engg SEMINAR
Java ring Engg SEMINARJava ring Engg SEMINAR
Java ring Engg SEMINAR
rajdeepsatapathy
 
Presentation1
Presentation1Presentation1
Presentation1
vennela venni
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
Yogesh Bhalla
 
Java ring
Java ringJava ring
Java ring
Kaushik Banerjee
 
Java Ring
Java RingJava Ring
java Ring
java Ringjava Ring
java Ring
ranjeetdon
 
New Ring
New RingNew Ring
New Ring
guest768cbf8
 
Java Ring
Java RingJava Ring
Java Ring
Abhishek Abhi
 
Java ring
Java ringJava ring
Java ring
nilpatil
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
KDivyaLatha
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
sowndryaganesh
 
Java ring ppt
Java ring pptJava ring ppt
Java ring ppt
TbSk121
 
Java Ring
Java Ring Java Ring
Java Ring
Aradhya Kundu
 
Java ring
Java ringJava ring
Java ring
Etty94
 
Sun Spot Talk
Sun Spot TalkSun Spot Talk
Sun Spot Talk
vittalp88
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
Krishna Thrideep
 
Dj ppt
Dj pptDj ppt
Dj ppt
maha lakshmi
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
Krishna Thrideep
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
Yoga Kkg
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
Arohi Khandelwal
 

Similar to 66913017 java-ring-1217949449014046-9 (1) (20)

Java ring Engg SEMINAR
Java ring Engg SEMINARJava ring Engg SEMINAR
Java ring Engg SEMINAR
 
Presentation1
Presentation1Presentation1
Presentation1
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
Java ring
Java ringJava ring
Java ring
 
Java Ring
Java RingJava Ring
Java Ring
 
java Ring
java Ringjava Ring
java Ring
 
New Ring
New RingNew Ring
New Ring
 
Java Ring
Java RingJava Ring
Java Ring
 
Java ring
Java ringJava ring
Java ring
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
 
Java ring ppt
Java ring pptJava ring ppt
Java ring ppt
 
Java Ring
Java Ring Java Ring
Java Ring
 
Java ring
Java ringJava ring
Java ring
 
Sun Spot Talk
Sun Spot TalkSun Spot Talk
Sun Spot Talk
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Dj ppt
Dj pptDj ppt
Dj ppt
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 

More from Sahithi Naraparaju

PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
Sahithi Naraparaju
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
Sahithi Naraparaju
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
Sahithi Naraparaju
 
over view of viruses
over view of virusesover view of viruses
over view of viruses
Sahithi Naraparaju
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
Sahithi Naraparaju
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
Sahithi Naraparaju
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
Sahithi Naraparaju
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
Sahithi Naraparaju
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
Sahithi Naraparaju
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in C
Sahithi Naraparaju
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
Sahithi Naraparaju
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
Sahithi Naraparaju
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
Sahithi Naraparaju
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
Sahithi Naraparaju
 

More from Sahithi Naraparaju (16)

PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
 
over view of viruses
over view of virusesover view of viruses
over view of viruses
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in C
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 

66913017 java-ring-1217949449014046-9 (1)

  • 1.
  • 2. Contents  INTRODUCTION  HISTORY  COMPONENTS IN JAVA RING  ARCHITECHTURE  WORKING  SECURITY  APPLICATION  CONCLUSION  REFERENCE
  • 3. INTRODUCTION  A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user.  It contains an inexpensive microprocessr in a stainless steel ibutton running a JVM and it is preloaded with applet  The Java Ring is an extremely secure Java-powered electronic token .  .Java Ring could have a number of real-world application.
  • 4. HISTORY In the summer of 1989, Dallas Semiconductor Corp. produced the first stainless-steel-encapsulated memory device called iButton. iButton is the main component of java ring. Java Ring was introduced at their JavaOne Conference in 1998
  • 5. Java Ring Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM
  • 6. components Java Virtual Machine (JVM)  RAM  ROM  real-time clock iButton  Blue dot reciptor
  • 7. iButton o The jewel of the Java Ring is the Java iButton -- a one- million transistor, single chip trusted microcomputer with a powerful Java Virtual Machine (JVM) housed in a rugged and secure stainless-steel case o Originally called "touch memory" devices, they were later renamed "iButtons." Packaged like batteries, iButtons have only a single active electrical contact on the top surface, with the stainless steel shell serving as ground.
  • 9. Blue dot reciptor Blue dot receptor lets you communicate with ibuttons from pcs to microprocessor and embeded system. The read/write operation will be done by this blue dot receptor provided by RS232 serial port adaptor. Receptor cable connects to the USB port of PC or any embeded system. The receptor itself affixes to any accesible spot . The information is transferred between the ibutton
  • 10. working  java ring is programmed with the applets acoording to our application. For specific class of user specific java applets is preloaded in to the java ring. All the information of the user is stored in the java ring. User simply presses the signet of the java ring against the “blue dot” receptor and the system connected to the receptor performs the function that the applet instructs to to.
  • 11. security This barrier substrate and the triple-layer metal construction techniques employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.
  • 12. application Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences. Providing security. Presonalized services.