SlideShare a Scribd company logo
JAVA RING
1
Presented by : Etty Mathews
Class : C6
Roll no. : 7
JAVA RING
 A finger ring that contains a small microprocessor
 a sort of smart card that is wearable on a finger
 It’s a stainless steel ring called I-button.
2
HISTORICAL BACKGROUND
 Dallas semiconductor Corp. Produced the first java ring
in 1989
 By 1990 this protocol was refined.
 Sun Microsystems Java ring was introduced at Java One
Conference in 1998.
 Earlier “touch memory”->“I-button”.
3
It is a 1-millon transistors in a single chip.
 The i-button is microcomputer with a
powerful JVM (Java Virtual Machine) in the
steel can.
 I-button is preloaded with applets (Little
Application programs).
 Packaged module has a single electric
contact and a ground return.
Micro chip
WHAT IS JAVA RING
4
 Lithium backed NVRAM offers high read/write speed
 Offers tamper resistance through instantaneous clearing.
 Data integrity and clock function maintained for more than
10 years.
 Tested at Celebration School, Orlando.
 Rings programmed with java applets.
 Operating System -E-commerce was designed
5
SECURITY
6
 Packaged in a 16 mm stainless steel can
 Protects from tampering like hard
knocks
 Rapid Zeroization occurs.
 Extreme temperature or voltage
causes Zeroization.
 A secret “Personal Identification
Number” is maintained.
Stainless-steel can
7
COMPONENTS
 Java Virtual Machine (JVM)
 RAM
ROM
Real Time Clock
 I-button
Blue Dot Receptor
 1 –Wire Interface
8
JAVA VIRTUAL MACHINE
(JVM)
 Its a piece of software, recognizes java language.
 Translates into byte code which can be used by the
system.
 Preloaded with small programs.
9
RAM
 Java ring contains Non-Volatile Random Access
Memory(NVRAM).
 Data stored in this NVRAM.
 Provides r/w & tamper resistance through Zeroization.
 Existing 6Kb can be extended up to 128 Kb.
 Lithium energy preserves the complete state.
 I-buttons when not contact with receptor has zero executing
speed.
10
ROM
 Contains 32 Kb of ROM
 E-Commerce & Java Virtual Machine
stored in the ROM.
 Not supposed to be altered by the user.
 Operating system handles operations in
i-button.
11
REAL TIME CLOCK
 It gives the exact time of the day.
32 Kilohertz crystal oscillator operates the time
 Energy provided by lithium backup
 Inconsistent clock frequency makes it safer
 It runs for more than 10 years with the lithium energy.
12
I-BUTTON
 Jewel of the java ring.
 Contains 1-million transistor processors in single
chip
I-button
13
 ROM,NVRAM is bonded to barrier substrate.
 Barrier substrate and triple layer deny access to data.
This helps to keep private keys and confidential data.
Barrier Substrate
Triple layer
14
 Figure shows a type of i-button
Lithium cell- for backup power
 Energy reservoir
 Quartz- for real time clock
15
 Has single data contact on front
 Does reading, writing and power applied to the module
 Lid is the data contact.
 This contact is connected to
Chip inside.
 Each button has unique
Registration number.
Some have it on the ROM also
64-bit registration number
16
 These numbers are globally unique.
No two i-buttons share the same number
 Needs physical contact with reader to function
 Button will stand up to harsh conditions.
 Zeroization occurs in case of
tampering.
Microchip in stainless-steel can
17
TYPES OF I-BUTTON
 Memory i-button
Stores typed text ,digitized photos.
 Java Powered Cryptographic i-button
Stores encrypted and decrypted data in JVM.
 Themochron i-button
Tracks time ,temperature and calendar etc.
18
BLUE DOT RECEPTOR
 Read /Write operation is done by RS232C serial port.
 Information is transferred through a momentary contact.
 Just touch the i-button to the receptor for data transfer.
 Has Speed up to 142Kbps.
Blue Dot
Receptor
19
1-WIRE INTERFACE
 Used for the communication between PC & I-button.
 Has different communication speeds.
 Every device has unique serial number.
 Bus master issues a reset
 A specific Slave device is selected by unique serial number.
 All other devices are ignored
 After selection data are read and written into button.
20
 Unique serial number is laser etched on to the chip.
64 bit registration number can be divided into three parts
 First 8 bit identify the family of i-button
Middle 48 bit identify the serial number
Last 8bit for error free reading
21
TMEX RUNTIME ENVIRONMENT (TRTE)
 Its a software to interface i-button and computer.
 It installs all drivers and software needed for the i-button.
 It supports Windows 32 bit
22
WORKING OF JAVA RING
 Java ring is programmed with applets that is specific for different users.
 Information transfers with a momentary contact at up to 142Kbps.
 Signet of the i-button is touched to the receptor.
 The receptor is cabled to the serial port which is attached to system.
23
 Signet of i-button is pressed to the receptor.
 System connected performs the necessary functions as instructed.
 Both ring and receptor have the user profile.
 It checks both the profile
 If authentication satisfies, the door
Opens.
Opening door using java ring
24
APPLICATIONS
 Store data such as secret code, credit card numbers etc.
 Can be affixed to badge ,watch ,keychain or ring.
 Can be used to store cash.
 Used to open doors.
25
 To get the account balance.
 Used in cars for security
Java ring used to unlock door
26
COMPARISON
 Can be compared to a credit/debit card.
 It has a magnetic strip which can be tampered.
 Transactions won’t be accepted.
 But i-button stand up the harsh conditions.
27
ADVANTAGES
 Ideal where information need to travel with person.
Replace many password protected devices for financial
transactions.
 More secure than using passwords.
 Withstand harsh conditions.
 Provide authentication to users with the PIN.
 Data transferred by electric conductivity, no radio frequency
needed.
28
DISADVANTAGES
 Java ring being most secure but receptor could be very
expensive.
 Many organization doesn’t know the existence of java ring.
 I-button have limited memory.
 Limited amount of information can be stored.
29
CURRENT LIFE USAGE
 Used by the students at Celebration School,
Orlando.
 In Istanbul, people use for e-cash transactions
 In U.S also it is used
30
CONCLUSION
 It is highly durable ( secure stainless steel packing)
It can be attached to a wide variety of accessories
like keychain etc.
In near future it will be widely used.
31
32

More Related Content

What's hot

Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar PresentationAparna Nk
 
Brain gate technology
Brain gate technologyBrain gate technology
Brain gate technology
Student
 
Wibree ppt
Wibree pptWibree ppt
ppt on virtual keyboard
ppt on virtual keyboardppt on virtual keyboard
ppt on virtual keyboard
vinaybhaskar15
 
Seminar report Of Touchless Touchscreen
Seminar report Of Touchless TouchscreenSeminar report Of Touchless Touchscreen
Seminar report Of Touchless Touchscreen
Lovely Professional University
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
Arohi Khandelwal
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
9440999171
 
smart note taker
smart note takersmart note taker
smart note taker
veena jl
 
Wisenet network
Wisenet networkWisenet network
Wisenet networkbhavithd
 
Touchless Touch screen technology
Touchless Touch screen technologyTouchless Touch screen technology
Touchless Touch screen technology
Anudeep Sharma Ramadugu
 
E Ball Computer
E Ball ComputerE Ball Computer
E Ball Computer
Subhash Vadadoriya
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoT
Athira_1993
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
Chitradevi
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
Ajay kumar
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
Prachi Jain
 
Biochips seminar report
Biochips seminar reportBiochips seminar report
Biochips seminar report
Golam Murshid
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future walletLeelakh Sachdeva
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
Rithu Pudiyaveedu
 
Touchless touchscreen technology
Touchless touchscreen technologyTouchless touchscreen technology
Touchless touchscreen technology
MATHEW JOSEPH
 

What's hot (20)

Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
Brain gate technology
Brain gate technologyBrain gate technology
Brain gate technology
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
ppt on virtual keyboard
ppt on virtual keyboardppt on virtual keyboard
ppt on virtual keyboard
 
Seminar report Of Touchless Touchscreen
Seminar report Of Touchless TouchscreenSeminar report Of Touchless Touchscreen
Seminar report Of Touchless Touchscreen
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
 
smart note taker
smart note takersmart note taker
smart note taker
 
Wisenet network
Wisenet networkWisenet network
Wisenet network
 
Touchless Touch screen technology
Touchless Touch screen technologyTouchless Touch screen technology
Touchless Touch screen technology
 
E Ball Computer
E Ball ComputerE Ball Computer
E Ball Computer
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoT
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
 
Biochips seminar report
Biochips seminar reportBiochips seminar report
Biochips seminar report
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 
Touchless touchscreen technology
Touchless touchscreen technologyTouchless touchscreen technology
Touchless touchscreen technology
 

Similar to Java ring

Java ring
Java ringJava ring
Java ring
Kaushik Banerjee
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Yogesh Bhalla
 
Introduction to Microcontrollers
Introduction to MicrocontrollersIntroduction to Microcontrollers
Introduction to Microcontrollers
mike parks
 
ATmega8 based password controlled home appliance
ATmega8 based password controlled home applianceATmega8 based password controlled home appliance
ATmega8 based password controlled home appliance
Susmit Sircar
 
Smart cards
Smart cards Smart cards
Java Ring
Java Ring Java Ring
Java Ring
Aradhya Kundu
 
Presentation1
Presentation1Presentation1
Presentation1
vennela venni
 
java Ring
java Ringjava Ring
java Ring
ranjeetdon
 
Boimetric using 8051
Boimetric  using 8051 Boimetric  using 8051
Boimetric using 8051
Shilpa Nayak
 
Arduino PAPER ABOUT INTRODUCTION
Arduino PAPER ABOUT INTRODUCTION  Arduino PAPER ABOUT INTRODUCTION
Arduino PAPER ABOUT INTRODUCTION
NAGASAI547
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
KDivyaLatha
 
IoT and embedded systems.pptx
IoT and embedded systems.pptxIoT and embedded systems.pptx
IoT and embedded systems.pptx
DanishKhan894003
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
NIT srinagar
 
Embedded System for begners and good for seminar
 Embedded System for begners and good for seminar Embedded System for begners and good for seminar
Embedded System for begners and good for seminar
Swaraj Nayak
 
electronic voting machine by rfid
electronic voting machine by rfidelectronic voting machine by rfid
electronic voting machine by rfidSaurabh Uniyal
 
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptx
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptxINDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptx
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptx
MeghdeepSingh
 
Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...
Claude Ndayisenga
 

Similar to Java ring (20)

Java ring
Java ringJava ring
Java ring
 
New Ring
New RingNew Ring
New Ring
 
Java ring
Java ringJava ring
Java ring
 
Java ring
Java ringJava ring
Java ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
Introduction to Microcontrollers
Introduction to MicrocontrollersIntroduction to Microcontrollers
Introduction to Microcontrollers
 
ATmega8 based password controlled home appliance
ATmega8 based password controlled home applianceATmega8 based password controlled home appliance
ATmega8 based password controlled home appliance
 
Smart cards
Smart cards Smart cards
Smart cards
 
Java Ring
Java Ring Java Ring
Java Ring
 
Presentation1
Presentation1Presentation1
Presentation1
 
java Ring
java Ringjava Ring
java Ring
 
Boimetric using 8051
Boimetric  using 8051 Boimetric  using 8051
Boimetric using 8051
 
Arduino PAPER ABOUT INTRODUCTION
Arduino PAPER ABOUT INTRODUCTION  Arduino PAPER ABOUT INTRODUCTION
Arduino PAPER ABOUT INTRODUCTION
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
IoT and embedded systems.pptx
IoT and embedded systems.pptxIoT and embedded systems.pptx
IoT and embedded systems.pptx
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
 
Embedded System for begners and good for seminar
 Embedded System for begners and good for seminar Embedded System for begners and good for seminar
Embedded System for begners and good for seminar
 
electronic voting machine by rfid
electronic voting machine by rfidelectronic voting machine by rfid
electronic voting machine by rfid
 
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptx
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptxINDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptx
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptx
 
Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Java ring

  • 1. JAVA RING 1 Presented by : Etty Mathews Class : C6 Roll no. : 7
  • 2. JAVA RING  A finger ring that contains a small microprocessor  a sort of smart card that is wearable on a finger  It’s a stainless steel ring called I-button. 2
  • 3. HISTORICAL BACKGROUND  Dallas semiconductor Corp. Produced the first java ring in 1989  By 1990 this protocol was refined.  Sun Microsystems Java ring was introduced at Java One Conference in 1998.  Earlier “touch memory”->“I-button”. 3
  • 4. It is a 1-millon transistors in a single chip.  The i-button is microcomputer with a powerful JVM (Java Virtual Machine) in the steel can.  I-button is preloaded with applets (Little Application programs).  Packaged module has a single electric contact and a ground return. Micro chip WHAT IS JAVA RING 4
  • 5.  Lithium backed NVRAM offers high read/write speed  Offers tamper resistance through instantaneous clearing.  Data integrity and clock function maintained for more than 10 years.  Tested at Celebration School, Orlando.  Rings programmed with java applets.  Operating System -E-commerce was designed 5
  • 6. SECURITY 6  Packaged in a 16 mm stainless steel can  Protects from tampering like hard knocks  Rapid Zeroization occurs.  Extreme temperature or voltage causes Zeroization.  A secret “Personal Identification Number” is maintained. Stainless-steel can
  • 7. 7 COMPONENTS  Java Virtual Machine (JVM)  RAM ROM Real Time Clock  I-button Blue Dot Receptor  1 –Wire Interface
  • 8. 8 JAVA VIRTUAL MACHINE (JVM)  Its a piece of software, recognizes java language.  Translates into byte code which can be used by the system.  Preloaded with small programs.
  • 9. 9 RAM  Java ring contains Non-Volatile Random Access Memory(NVRAM).  Data stored in this NVRAM.  Provides r/w & tamper resistance through Zeroization.  Existing 6Kb can be extended up to 128 Kb.  Lithium energy preserves the complete state.  I-buttons when not contact with receptor has zero executing speed.
  • 10. 10 ROM  Contains 32 Kb of ROM  E-Commerce & Java Virtual Machine stored in the ROM.  Not supposed to be altered by the user.  Operating system handles operations in i-button.
  • 11. 11 REAL TIME CLOCK  It gives the exact time of the day. 32 Kilohertz crystal oscillator operates the time  Energy provided by lithium backup  Inconsistent clock frequency makes it safer  It runs for more than 10 years with the lithium energy.
  • 12. 12 I-BUTTON  Jewel of the java ring.  Contains 1-million transistor processors in single chip I-button
  • 13. 13  ROM,NVRAM is bonded to barrier substrate.  Barrier substrate and triple layer deny access to data. This helps to keep private keys and confidential data. Barrier Substrate Triple layer
  • 14. 14  Figure shows a type of i-button Lithium cell- for backup power  Energy reservoir  Quartz- for real time clock
  • 15. 15  Has single data contact on front  Does reading, writing and power applied to the module  Lid is the data contact.  This contact is connected to Chip inside.  Each button has unique Registration number. Some have it on the ROM also 64-bit registration number
  • 16. 16  These numbers are globally unique. No two i-buttons share the same number  Needs physical contact with reader to function  Button will stand up to harsh conditions.  Zeroization occurs in case of tampering. Microchip in stainless-steel can
  • 17. 17 TYPES OF I-BUTTON  Memory i-button Stores typed text ,digitized photos.  Java Powered Cryptographic i-button Stores encrypted and decrypted data in JVM.  Themochron i-button Tracks time ,temperature and calendar etc.
  • 18. 18 BLUE DOT RECEPTOR  Read /Write operation is done by RS232C serial port.  Information is transferred through a momentary contact.  Just touch the i-button to the receptor for data transfer.  Has Speed up to 142Kbps. Blue Dot Receptor
  • 19. 19 1-WIRE INTERFACE  Used for the communication between PC & I-button.  Has different communication speeds.  Every device has unique serial number.  Bus master issues a reset  A specific Slave device is selected by unique serial number.  All other devices are ignored  After selection data are read and written into button.
  • 20. 20  Unique serial number is laser etched on to the chip. 64 bit registration number can be divided into three parts  First 8 bit identify the family of i-button Middle 48 bit identify the serial number Last 8bit for error free reading
  • 21. 21 TMEX RUNTIME ENVIRONMENT (TRTE)  Its a software to interface i-button and computer.  It installs all drivers and software needed for the i-button.  It supports Windows 32 bit
  • 22. 22 WORKING OF JAVA RING  Java ring is programmed with applets that is specific for different users.  Information transfers with a momentary contact at up to 142Kbps.  Signet of the i-button is touched to the receptor.  The receptor is cabled to the serial port which is attached to system.
  • 23. 23  Signet of i-button is pressed to the receptor.  System connected performs the necessary functions as instructed.  Both ring and receptor have the user profile.  It checks both the profile  If authentication satisfies, the door Opens. Opening door using java ring
  • 24. 24 APPLICATIONS  Store data such as secret code, credit card numbers etc.  Can be affixed to badge ,watch ,keychain or ring.  Can be used to store cash.  Used to open doors.
  • 25. 25  To get the account balance.  Used in cars for security Java ring used to unlock door
  • 26. 26 COMPARISON  Can be compared to a credit/debit card.  It has a magnetic strip which can be tampered.  Transactions won’t be accepted.  But i-button stand up the harsh conditions.
  • 27. 27 ADVANTAGES  Ideal where information need to travel with person. Replace many password protected devices for financial transactions.  More secure than using passwords.  Withstand harsh conditions.  Provide authentication to users with the PIN.  Data transferred by electric conductivity, no radio frequency needed.
  • 28. 28 DISADVANTAGES  Java ring being most secure but receptor could be very expensive.  Many organization doesn’t know the existence of java ring.  I-button have limited memory.  Limited amount of information can be stored.
  • 29. 29 CURRENT LIFE USAGE  Used by the students at Celebration School, Orlando.  In Istanbul, people use for e-cash transactions  In U.S also it is used
  • 30. 30 CONCLUSION  It is highly durable ( secure stainless steel packing) It can be attached to a wide variety of accessories like keychain etc. In near future it will be widely used.
  • 31. 31
  • 32. 32