By
Rajanivetha G
INTRODUCTION:
 Finger ring that contains a small microprocessor.
 Built-in capabilities for the user.
 It is extremely secured .
 It contains an inexpensive microprocessor in stainless
steel ibutton running a JVM and it is preloaded with
applet.
COMPONENTS:
 Java virtual machine
 RAM
 ROM
 Real time clock
 iButton
 Blue dot receptor
RAM & ROM :
RAM : 134kb
----> Program & data
ROM : 32kb
----> OS
iButton:
 iButton is a computer chip thick stainless steel can.
 Address etched onto its chip inside the can.
 Address can be used as a key or identifier.
iButton Structure:
TYPES OF iBUTTON:
 Memory iButton
 Java Powered Cryptographic iButton
 Thermochron iButton
Lay out of iButton:
Components for iButton
application :
 An iButton device
 A host system
 A reader/writer device to get information into and out
of the button.
 A layer of software.
Blue Dot Receptors:
 Provides a convenient pipeline for iButton - PC
communication.
 Information transfers with momentary touching java ring.
SECURITY:
 Armored with stainless steel for the hard knocks of
everyday use.
 Personal Identification Number(PIN)
WORKING:
 The Java Ring is in fact a Java smart card, which is
capable of running Java programs.
 A serial reader connects to a computer's serial port.
Contd..
 An applet written to run on the Java ring
follows a very simple structure.
 The methods are as follows:
 deselect -- another applet, or possibly this
one, is about to be selected
 install -- installs the applet
 process -- incoming APDUs arrive here
 select -- called when a select command is
received
APPLICATIONS:
 Attendance.
 Opening the door
 Security of car
 Thermochron Applications
 Access Control
ADVANTAGES:
 A very easy and convenient way for users.
 More secure than using passwords.
 Portable.
 Ruggedness.
 Wearable.
 Provides real memory
DISADVANTAGES:
 Cost of implementing is high.
 Limited amount of information is stored.
 The machine must support the same standard ibutton
reader interfaces.
CONCLUSION:
 Durable because of its rugged and secure stainless
packing.
 The iButton form factor permits attachment to a wide
variety of personal accessories that includes rings,
watchbands, key fobs, wallets, bracelets, and
necklaces, so the user can select a variation that suits
his or her lifestyle.
Java ring

Java ring

  • 1.
  • 2.
    INTRODUCTION:  Finger ringthat contains a small microprocessor.  Built-in capabilities for the user.  It is extremely secured .  It contains an inexpensive microprocessor in stainless steel ibutton running a JVM and it is preloaded with applet.
  • 3.
    COMPONENTS:  Java virtualmachine  RAM  ROM  Real time clock  iButton  Blue dot receptor
  • 4.
    RAM & ROM: RAM : 134kb ----> Program & data ROM : 32kb ----> OS
  • 5.
    iButton:  iButton isa computer chip thick stainless steel can.  Address etched onto its chip inside the can.  Address can be used as a key or identifier.
  • 6.
  • 7.
    TYPES OF iBUTTON: Memory iButton  Java Powered Cryptographic iButton  Thermochron iButton
  • 8.
    Lay out ofiButton:
  • 10.
    Components for iButton application:  An iButton device  A host system  A reader/writer device to get information into and out of the button.  A layer of software.
  • 11.
    Blue Dot Receptors: Provides a convenient pipeline for iButton - PC communication.  Information transfers with momentary touching java ring.
  • 15.
    SECURITY:  Armored withstainless steel for the hard knocks of everyday use.  Personal Identification Number(PIN)
  • 16.
    WORKING:  The JavaRing is in fact a Java smart card, which is capable of running Java programs.  A serial reader connects to a computer's serial port.
  • 17.
    Contd..  An appletwritten to run on the Java ring follows a very simple structure.  The methods are as follows:  deselect -- another applet, or possibly this one, is about to be selected  install -- installs the applet  process -- incoming APDUs arrive here  select -- called when a select command is received
  • 18.
    APPLICATIONS:  Attendance.  Openingthe door  Security of car  Thermochron Applications  Access Control
  • 20.
    ADVANTAGES:  A veryeasy and convenient way for users.  More secure than using passwords.  Portable.  Ruggedness.  Wearable.  Provides real memory
  • 21.
    DISADVANTAGES:  Cost ofimplementing is high.  Limited amount of information is stored.  The machine must support the same standard ibutton reader interfaces.
  • 22.
    CONCLUSION:  Durable becauseof its rugged and secure stainless packing.  The iButton form factor permits attachment to a wide variety of personal accessories that includes rings, watchbands, key fobs, wallets, bracelets, and necklaces, so the user can select a variation that suits his or her lifestyle.