SlideShare a Scribd company logo
BY : RAJDEEP SATAPATHY
BRANCH: CSE
Dated: 2011
1
o A Java Ring is a finger ring that contains a small microprocessor with built-in
capabilities for the user, a sort of smart card that is wearable on a finger. Sun
Microsystem's Java Ring was introduced at their JavaOne Conference in 1998
and, instead of a gemstone, contained an inexpensive microprocessor in a
stainless-steel iButton running a Java virtual machine and preloaded with
applets (little application programs). The rings were built by Dallas
Semiconductor.
o
Workstations at the conference had "ring readers" installed on them that
downloaded information about the user from the conference registration
system. This information was then used to enable a number of personalized
services. For example, a robotic machine made coffee according to user
preferences, which it downloaded when they snapped the ring into another
"ring reader."
o
Although Java Rings aren't widely used yet, such rings or similar devices
could have a number of real-world applications, such as starting your car and
having all your vehicle's components (such as the seat, mirrors, and radio
selections) automatically adjust to your preferences.
2
 INTRODUCTION
 HISTORY
 COMPONENTS IN JAVA RING
 ARCHITECTURE
 WORKING
 SECURITY
 COMPARISION WITH SMART CARDS
 APPLICATION
 DISADVANTAGES
 CONCLUSION
 REFERENCE
3
4
 A Java Ring is a finger ring that contains a small
microprocessor with built-in capabilities for the user.
 It contains an inexpensive microprocessr in a stainless
steel ibutton running a JVM and it is preloaded with
applet.
 The Java Ring is an extremely secure Java-powered
electronic token .
 The Java Ring is a stainless-steel ring, 16-millimeters (0.6
inches) in diameter, that houses a 1-million-transistor
processor, called an ibutton.
 The ring has 134 KB of RAM, 32 KB of ROM, a real-time
clock and a Java virtual machine, which is a piece of
software that recognizes the Java language and translates
it for the user's computer system.
Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in
diameter, that houses a 1-million-transistor processor, called an
iButton. The ring has 134 KB of RAM, 32 KB of ROM.
5
In the summer of 1989, Dallas Semiconductor Corp.
produced the first stainless-steel-encapsulated memory
device called iButton.
IButton is the main component of java ring.
Java Ring was introduced at their Java One Conference
in 1998.
6
 Java Virtual Machine (JVM).
 RAM.
 ROM.
 Real-time clock.
 iButton.
 Blue dot receptor.
7
Java ring is programmed with java application
program and applets that communicate with the
host application on the networked system.
Applets are the small application that is designed
to run on the another application system.
The java virtual machine is the piece of software
that recognizes the java language and translates
the byte code, which is used by the system which
is connected to the java ring via ring reader.
8
 Java ring contains 134kb of non-volatile random access
memory.
 Program and data is stored.
 This non-volatile random access memory offers high
read/write speed and also provides temper resistance
through instantaneous clearing of all memory when
tempering is detected. This process is called rapid
zeroization.
 The NVRAM iButton memory can be erased or rewritten
as often as necessary without wearing out.
9
The java ring contains 32kb of ROM.
A special kind of operating system called E-
Commerce operating system which is based on
java and JVM is stored in the ROM.
This operating system handles all the operation
which is happening in the iButton.
It is stored in ROM because it is not supposed to
be altered by the user.
10
 In the java ring real time clock gives the exact time
of the day.
 The real time clock continuously run up to more
than 10 years by the energy provided the lithium
backup.
 In addition, the processor itself is driven by an
unstabilized ring oscillator operating over a range of
10 to 20 megahertz, so that the clock frequency of
the processor is not constant and cannot be
determined by external means.
11
The jewel of the Java Ring is the Java iButton -- a
one-million transistor, single chip trusted
microcomputer with a powerful Java Virtual
Machine (JVM) housed in a rugged and secure
stainless-steel case
Originally called "touch memory" devices, they
were later renamed "iButtons." Packaged like
batteries, iButtons have only a single active
electrical contact on the top surface, with the
stainless steel shell serving as ground.
12
 Blue dot receptor lets you communicate with ibutton
from pcs to microprocessor and embedded system.
 The read/write operation will be done by this blue
dot receptor provided by RS232 serial port adaptor.
 Receptor cable connects to the USB port of PC or
any embedded system.
 The information is transferred between the ibutton
and pc with momentary touching java ring .
13
14
 Java ring is programmed with the applets according
to our application.
 For specific class of user specific java applets is
preloaded in to the java ring.
 All the information of the user is stored in the java
ring.
 User simply presses the signet of the java ring against
the “blue dot” receptor and the system connected to
the receptor performs the function that the applet
instructs to do.
15
Information is transferred between your iButton
and a PC with a momentary contact at up to
142kbps.
You simply touch your iButton to a Blue Dot
receptor or other iButton probe, which is
connected to a PC.
16
This barrier substrate and the triple-layer metal
construction techniques employed in the silicon
fabrication effectively deny access to the data
stored in the NVRAM. If any attempt is made to
penetrate these barriers, the NVRAM data is
immediately erased.
Java rings are authorized through Personal
Identification Numbers (PINs) so that no one can
steal a person's ring and use that ring.
17
iButtons have an advantage over conventional
smart cards in term of durability and longevity.
iButtons are rugged enough to withstand harsh
environments.
iButton uses java as a common programming
language.
18
 Although Java Rings aren't widely used yet, such rings or
similar devices could have a number of real-world
applications, such as starting your car and having all your
vehicle's components (such as the seat, mirrors, and radio
selections) automatically adjust to your preferences.
 Providing security.
 Personalized services.
 Access Control.
 Time and attendance.
 eCash.
 Gaming Systems.
19
Parents and teachers will have less
control over children and students.
Loss of privacy.
20
 Java ring is highly durable because of its rugged and
secure stainless packing. It is used in personal
computing.
 With its stainless steel armor, it offers the most
durable packaging for a class of products that likely
will suffer heavy use and abuse as personal
possessions.
 The iButton form factor permits attachment to a
wide variety of personal accessories that includes
rings, watchbands, key fobs, wallets, bracelets, and
necklaces, so the user can select a variation that suits
his or her lifestyle.
21
www.javaworld.com
http://electronics.howstuffworks.com
http://people.cs.uchicago.edu
22
23

More Related Content

What's hot

E ball technology
E ball technologyE ball technology
E ball technology
MOHAMMAD ASIF
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
Shruthi Srigadi
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
Deevena Dayaal
 
SMART NOTE TAKER REPORT
SMART NOTE TAKER REPORTSMART NOTE TAKER REPORT
SMART NOTE TAKER REPORT
Vivek Jha
 
Smart quill seminar report final
Smart quill seminar report finalSmart quill seminar report final
Smart quill seminar report finalPramod Kumar
 
Arduino
ArduinoArduino
Arduino
vipin7vj
 
Nano computing.
Nano computing.Nano computing.
Nano computing.
Sunny Sundeep
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
Tarun tyagi
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
Mohammed Rizwan S
 
BRAIN CHIP TECHNOLOGY
BRAIN CHIP TECHNOLOGYBRAIN CHIP TECHNOLOGY
BRAIN CHIP TECHNOLOGY
sathish sak
 
digital jewelry
digital jewelrydigital jewelry
digital jewelry
Shruthi K Gowda
 
Virtual instrumentation
Virtual instrumentationVirtual instrumentation
Virtual instrumentation
Abhijeet Agarwal
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewelleryManu Priya
 
Internet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPTInternet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPT
Charan Vimala
 
DIGITAL JEWELLERY
DIGITAL JEWELLERYDIGITAL JEWELLERY
DIGITAL JEWELLERYveera
 
smart quill pen
smart quill pensmart quill pen
smart quill pen
ranjith12
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
Ajay kumar
 

What's hot (20)

E ball technology
E ball technologyE ball technology
E ball technology
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 
SMART NOTE TAKER REPORT
SMART NOTE TAKER REPORTSMART NOTE TAKER REPORT
SMART NOTE TAKER REPORT
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Chatbot_Presentation
Chatbot_PresentationChatbot_Presentation
Chatbot_Presentation
 
Smart quill seminar report final
Smart quill seminar report finalSmart quill seminar report final
Smart quill seminar report final
 
Arduino
ArduinoArduino
Arduino
 
Nano computing.
Nano computing.Nano computing.
Nano computing.
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
 
BRAIN CHIP TECHNOLOGY
BRAIN CHIP TECHNOLOGYBRAIN CHIP TECHNOLOGY
BRAIN CHIP TECHNOLOGY
 
digital jewelry
digital jewelrydigital jewelry
digital jewelry
 
Virtual instrumentation
Virtual instrumentationVirtual instrumentation
Virtual instrumentation
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Internet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPTInternet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPT
 
DIGITAL JEWELLERY
DIGITAL JEWELLERYDIGITAL JEWELLERY
DIGITAL JEWELLERY
 
smart quill pen
smart quill pensmart quill pen
smart quill pen
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 

Similar to Java ring Engg SEMINAR

Java ring
Java ringJava ring
Java ring
Kaushik Banerjee
 
Presentation1
Presentation1Presentation1
Presentation1
vennela venni
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
Jana Vontari
 
java Ring
java Ringjava Ring
java Ring
ranjeetdon
 
Java ring
Java ringJava ring
Java ring
kranthibalagam
 
Java Ring
Java Ring Java Ring
Java Ring
Aradhya Kundu
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
sowndryaganesh
 
My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
arun Prabha
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
KDivyaLatha
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
Krishna Thrideep
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
Arohi Khandelwal
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
Saiteja Kaparthi
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
Jawhar Ali
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika Nigam
Anshika Nigam
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hintsYoga Kkg
 

Similar to Java ring Engg SEMINAR (20)

Java ring
Java ringJava ring
Java ring
 
Presentation1
Presentation1Presentation1
Presentation1
 
New Ring
New RingNew Ring
New Ring
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Java Ring
Java RingJava Ring
Java Ring
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
java Ring
java Ringjava Ring
java Ring
 
Java ring
Java ringJava ring
Java ring
 
Java Ring
Java Ring Java Ring
Java Ring
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
 
My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
java ring
java ringjava ring
java ring
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika Nigam
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Java ring Engg SEMINAR

  • 1. BY : RAJDEEP SATAPATHY BRANCH: CSE Dated: 2011 1
  • 2. o A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user, a sort of smart card that is wearable on a finger. Sun Microsystem's Java Ring was introduced at their JavaOne Conference in 1998 and, instead of a gemstone, contained an inexpensive microprocessor in a stainless-steel iButton running a Java virtual machine and preloaded with applets (little application programs). The rings were built by Dallas Semiconductor. o Workstations at the conference had "ring readers" installed on them that downloaded information about the user from the conference registration system. This information was then used to enable a number of personalized services. For example, a robotic machine made coffee according to user preferences, which it downloaded when they snapped the ring into another "ring reader." o Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences. 2
  • 3.  INTRODUCTION  HISTORY  COMPONENTS IN JAVA RING  ARCHITECTURE  WORKING  SECURITY  COMPARISION WITH SMART CARDS  APPLICATION  DISADVANTAGES  CONCLUSION  REFERENCE 3
  • 4. 4  A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user.  It contains an inexpensive microprocessr in a stainless steel ibutton running a JVM and it is preloaded with applet.  The Java Ring is an extremely secure Java-powered electronic token .  The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an ibutton.  The ring has 134 KB of RAM, 32 KB of ROM, a real-time clock and a Java virtual machine, which is a piece of software that recognizes the Java language and translates it for the user's computer system.
  • 5. Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM. 5
  • 6. In the summer of 1989, Dallas Semiconductor Corp. produced the first stainless-steel-encapsulated memory device called iButton. IButton is the main component of java ring. Java Ring was introduced at their Java One Conference in 1998. 6
  • 7.  Java Virtual Machine (JVM).  RAM.  ROM.  Real-time clock.  iButton.  Blue dot receptor. 7
  • 8. Java ring is programmed with java application program and applets that communicate with the host application on the networked system. Applets are the small application that is designed to run on the another application system. The java virtual machine is the piece of software that recognizes the java language and translates the byte code, which is used by the system which is connected to the java ring via ring reader. 8
  • 9.  Java ring contains 134kb of non-volatile random access memory.  Program and data is stored.  This non-volatile random access memory offers high read/write speed and also provides temper resistance through instantaneous clearing of all memory when tempering is detected. This process is called rapid zeroization.  The NVRAM iButton memory can be erased or rewritten as often as necessary without wearing out. 9
  • 10. The java ring contains 32kb of ROM. A special kind of operating system called E- Commerce operating system which is based on java and JVM is stored in the ROM. This operating system handles all the operation which is happening in the iButton. It is stored in ROM because it is not supposed to be altered by the user. 10
  • 11.  In the java ring real time clock gives the exact time of the day.  The real time clock continuously run up to more than 10 years by the energy provided the lithium backup.  In addition, the processor itself is driven by an unstabilized ring oscillator operating over a range of 10 to 20 megahertz, so that the clock frequency of the processor is not constant and cannot be determined by external means. 11
  • 12. The jewel of the Java Ring is the Java iButton -- a one-million transistor, single chip trusted microcomputer with a powerful Java Virtual Machine (JVM) housed in a rugged and secure stainless-steel case Originally called "touch memory" devices, they were later renamed "iButtons." Packaged like batteries, iButtons have only a single active electrical contact on the top surface, with the stainless steel shell serving as ground. 12
  • 13.  Blue dot receptor lets you communicate with ibutton from pcs to microprocessor and embedded system.  The read/write operation will be done by this blue dot receptor provided by RS232 serial port adaptor.  Receptor cable connects to the USB port of PC or any embedded system.  The information is transferred between the ibutton and pc with momentary touching java ring . 13
  • 14. 14
  • 15.  Java ring is programmed with the applets according to our application.  For specific class of user specific java applets is preloaded in to the java ring.  All the information of the user is stored in the java ring.  User simply presses the signet of the java ring against the “blue dot” receptor and the system connected to the receptor performs the function that the applet instructs to do. 15
  • 16. Information is transferred between your iButton and a PC with a momentary contact at up to 142kbps. You simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. 16
  • 17. This barrier substrate and the triple-layer metal construction techniques employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring. 17
  • 18. iButtons have an advantage over conventional smart cards in term of durability and longevity. iButtons are rugged enough to withstand harsh environments. iButton uses java as a common programming language. 18
  • 19.  Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences.  Providing security.  Personalized services.  Access Control.  Time and attendance.  eCash.  Gaming Systems. 19
  • 20. Parents and teachers will have less control over children and students. Loss of privacy. 20
  • 21.  Java ring is highly durable because of its rugged and secure stainless packing. It is used in personal computing.  With its stainless steel armor, it offers the most durable packaging for a class of products that likely will suffer heavy use and abuse as personal possessions.  The iButton form factor permits attachment to a wide variety of personal accessories that includes rings, watchbands, key fobs, wallets, bracelets, and necklaces, so the user can select a variation that suits his or her lifestyle. 21
  • 23. 23