SlideShare a Scribd company logo
JAVA RING
JAVA RING

Figure 1: prototype of stainless steel java ring
CONTENTS
•

INTRODUCTION

•

COMPONENTS

•

WORKING

•

SECURITY

•

APPLICATIONS

•

ADVANTAGES

•

DISADVANTAGES

•

CONCLUSION

•

REFERENCE
INTRODUCTION
• Java ring is a finger ring that contains a small
microprocessor with built in capabilities for the user.
• Java ring is a sort of a smartcard that is wearable on a
finger
• Java ring a stainless-steel ring,16-millimeters (0.6 inches)
in diameter.
CONTINUED…
• It contains an inexpensive microprocessor in a stainless
steel iButton which runs JVM and it is preloaded with applet.
• The java Ring is an extremely secure Java-Powered
electronic token.
• Java Ring have number of real-world application.
THE JAVA RING
• Contains a tiny Java Virtual Machine
• Implements the Java Card 2.0 API
• Stores information in NVRAM ,ROM

• Runs applets
• Includes microprocessor, memory, clock and battery
JAVA RING IN ITS NATURAL
ENVIRONMET..
COMPONENTS
• Java Virtual Machine (JVM)
•

RAM

•

ROM

•

real-time clock

•

iButton

•

Blue dot reciptor
JAVA VIRTUAL MACHINE
The java virtual machine is the piece of software that
recognizes the java language and translates the byte
Code.
Java Ring
RAM
• Java ring contains 134kb of non-volatile random
access memory .
• This non-volatile random access memory offers

high read/write speed.
• It also provides rapid zeroization.
ROM
• The java ring contains 32kb of ROM .
• Special kind of operating system called
e-commerce operating system is stored in the ROM
REAL TIME CLOCK
• Real time clock gives the exact time of the day and it can
run up to 10 years continuously .

• It is driven by a constant 32KHz crystal oscillator.
• In addition ,the frequency of the processor clock is
not constant ,ranges from 10-20MHz.
• This aspect prohibits hackers in obtaining the
information from the iButton.
i BUTTON
i BUTTON…
• The jewel of the java ring is the iButton.
• iButton is a computer chip enclosed in a thick stainless

steel can.
• It is originally called “touch memory devices they were
later renamed as “iButtons”.
• Java ring uses 1-wire protocol for communication
with the host and the iButton.
CONTINUED…
• The iButton is a mechanical packaging standard that
places a 1-Wire component inside a small stainless
steel "button" similar to a disk-shaped battery.
• Each iButton has a unique and unalterable address laser
attached onto its chip inside the can lid.
• The address can be used as a key or identifier for each
iButton.
i BUTTON STRUCTURE
BLUE DOT RECEPTOR
• The Blue Dot Receptors are iButton reader/probes that provide
convenient pipeline into the PC for iButton-to-PC

communication.

• The receptor's cable connects to a USB, serial, or parallel-port

1-Wire adapter, whichever type of port you wish to use.
• The receptor itself easily affixes to any accessible spot on

the front of the PC.

a
BLUE DOT RECEPTOR…
CONTINUED…
• Key features:
• It has a coiled cable for connecting iButtons to 1-Wire
networks .
• Adhesive pad for mounting on objects.
• Supports for up to two iButtons at once.
• Can be used with any Dallas Semiconductor port
adapter
WORKING
• Java Ring is programmed with the applets and
the programming is done according to our application
• Whenever the user pushes his ring on a ring reader(Blue
Dot Receptor), the corresponding application will take
place.
OPENING DOORS
Figure 5.2: Working process of Java Ring(Source: Java Card Technology
CONTINUED…
• Information is transferred between your iButton and a PC
with a momentary contact at up to 142kbps.
• You simply touch your iButton to a Blue Dot receptor or
other iButton probe, which is connected to a PC.
• The Blue Dot receptor is cabled to a 1-Wire adapter that is
attached to a spare PC port. 1-Wire adapters exist for USB,
serial, and parallel ports.
SECURITY
• The barrier substrate and the triple-layer metal construction

techniques employed in the silicon fabrication effectively deny
unauthorized access to the data stored in the NVRAM. If any

attempt is made to penetrate these barriers, the NVRAM data is
immediately erased.
• Java rings are authorized through Personal Identification

Numbers

(PINs) so that no one can steal a person's ring and use that ring.
APPLICATIONS
• The java ring can be used to hold secret codes,
credit cards numbers, driver license, other wallet
contents, and even some electronic cash.
•

Its greatest promise appears to lie in its capacity to
interact with Internet applications to support strong
remote authentication and remotely authorized financial

transactions.
CONTINUED…
• For opening the door
• E-banking application
• Logging in your PC

• Providing security in your car
• Used to fill forms
ADVANTAGES
• The Java Rings are very easy and convenient for
users.
• It can function between -40C to+70C and in much
harsher environment.
• It has higher durability.
CONTINUED…
• Easier for administrator to maintain the security
infrastructure.
• Provides real memory, more power, and a capacity
for dynamic programming .
• Provides authentication to user which is crucial for many
applications.
DISADVANTAGES
• The cost of implementing the system is high.
• It needs a high level tools and method in order to

program

application efficently, reliabily,securily.
• iButton has a limited processor capacity and memory , which
means an individual might need to carry more
Java Ring.

than one
CONCLUSION
• Although Java Rings aren't widely used yet, such rings or
similar devices could have a number of real-world
applications, such as starting your car and automatically
adjust to your preferences.
•

The key issue about a wearable computer (java ring) is not
whether it is a ring or another form factor: the deciding point is
that you will always have it with you.
REFERENCES
• http://www.javaworld.com/
• http://www.people.uchicago.edu/
• http://www.electronics.howstuffworks.com
abhi.globalistic@gmail.com

More Related Content

What's hot

Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
Arun Kumar
 
Wireless charging ppt
Wireless charging pptWireless charging ppt
Wireless charging ppt
Manjunath Kareppagoudr
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt
atinav242
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
Ajay kumar
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
Мохаммад Азим
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
PRADEEP Cheekatla
 
Medical mirror
Medical mirrorMedical mirror
Medical mirror
sheena_jain
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
123seminarsonly
 
Blu ray technology
Blu ray technologyBlu ray technology
Blu ray technology
Govind Raj
 
Java ring
Java ring   Java ring
Java ring
Rajanivetha G
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
Lohit Dalal
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
Aparna Nk
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
deepu427
 
5 Pen PC technology seminar report
5 Pen PC technology seminar report5 Pen PC technology seminar report
5 Pen PC technology seminar report
Rituraj Singh Panwar
 
Smart note-taker
Smart note-takerSmart note-taker
Smart note-taker
vikasgarg1609284
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
indianspandana
 
digital jewelry
digital jewelrydigital jewelry
digital jewelry
Shruthi K Gowda
 
Surface computer ppt
Surface computer pptSurface computer ppt
Surface computer ppt
tejalc
 
Touch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATIONTouch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATION
MrQaz996
 
Ppt wearable computer
Ppt wearable computerPpt wearable computer
Ppt wearable computer
Nitesh Nayal
 

What's hot (20)

Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
 
Wireless charging ppt
Wireless charging pptWireless charging ppt
Wireless charging ppt
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Medical mirror
Medical mirrorMedical mirror
Medical mirror
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Blu ray technology
Blu ray technologyBlu ray technology
Blu ray technology
 
Java ring
Java ring   Java ring
Java ring
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
5 Pen PC technology seminar report
5 Pen PC technology seminar report5 Pen PC technology seminar report
5 Pen PC technology seminar report
 
Smart note-taker
Smart note-takerSmart note-taker
Smart note-taker
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
digital jewelry
digital jewelrydigital jewelry
digital jewelry
 
Surface computer ppt
Surface computer pptSurface computer ppt
Surface computer ppt
 
Touch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATIONTouch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATION
 
Ppt wearable computer
Ppt wearable computerPpt wearable computer
Ppt wearable computer
 

Similar to Java Ring

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
arun Prabha
 
java ring
java ringjava ring
Java ring
Java ringJava ring
Java ring
nilpatil
 
New Ring
New RingNew Ring
New Ring
guest768cbf8
 
Java ring
Java ringJava ring
Java ring
Kaushik Banerjee
 
Presentation1
Presentation1Presentation1
Presentation1
vennela venni
 
Presentation of java ring for seminar.ppt
Presentation of java ring for seminar.pptPresentation of java ring for seminar.ppt
Presentation of java ring for seminar.ppt
jbrahmarao8
 
Java Ring
Java Ring Java Ring
Java Ring
Aradhya Kundu
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
Yogesh Bhalla
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
sowndryaganesh
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
Jana Vontari
 
Java ring
Java ringJava ring
Java ring
kranthibalagam
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
Sahithi Naraparaju
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
Prachi Jain
 
Java Ring
Java RingJava Ring
Java Ring
Haku Hikaru
 
How i built my own irrigation controller
How i built my own irrigation controllerHow i built my own irrigation controller
How i built my own irrigation controller
Shree Kumar
 
java Ring
java Ringjava Ring
java Ring
ranjeetdon
 
Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.
Nitish Kumar
 
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
Jonathan Engelsma
 
IoT and Its Application
IoT and Its ApplicationIoT and Its Application
IoT and Its Application
Dun Automation Academy
 

Similar to Java Ring (20)

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
java ring
java ringjava ring
java ring
 
Java ring
Java ringJava ring
Java ring
 
New Ring
New RingNew Ring
New Ring
 
Java ring
Java ringJava ring
Java ring
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation of java ring for seminar.ppt
Presentation of java ring for seminar.pptPresentation of java ring for seminar.ppt
Presentation of java ring for seminar.ppt
 
Java Ring
Java Ring Java Ring
Java Ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
Java ring
Java ringJava ring
Java ring
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
 
Java Ring
Java RingJava Ring
Java Ring
 
How i built my own irrigation controller
How i built my own irrigation controllerHow i built my own irrigation controller
How i built my own irrigation controller
 
java Ring
java Ringjava Ring
java Ring
 
Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.
 
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
 
IoT and Its Application
IoT and Its ApplicationIoT and Its Application
IoT and Its Application
 

More from Abhishek Abhi

Blue brain
Blue brainBlue brain
Blue brain
Abhishek Abhi
 
3d search
3d search3d search
3d search
Abhishek Abhi
 
3D Internet
3D Internet 3D Internet
3D Internet
Abhishek Abhi
 
Augmented reality The future of computing
Augmented reality The future of computingAugmented reality The future of computing
Augmented reality The future of computing
Abhishek Abhi
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
Abhishek Abhi
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Abhishek Abhi
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
Abhishek Abhi
 

More from Abhishek Abhi (7)

Blue brain
Blue brainBlue brain
Blue brain
 
3d search
3d search3d search
3d search
 
3D Internet
3D Internet 3D Internet
3D Internet
 
Augmented reality The future of computing
Augmented reality The future of computingAugmented reality The future of computing
Augmented reality The future of computing
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
 

Recently uploaded

Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
shanihomely
 
It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
Zilliz
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
janagijoythi
 
Acumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptxAcumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptx
BrainSell Technologies
 
Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024
Michael Price
 
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
FIDO Alliance
 
Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1
DianaGray10
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
David Wilson
 
The Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - CoatueThe Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - Coatue
Razin Mustafiz
 
Sonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdfSonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdf
SubhamMandal40
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
shyamraj55
 
How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...
DianaGray10
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
Baishakhi Ray
 
Redefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI CapabilitiesRedefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3
DianaGray10
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
Bhajan Mehta
 
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdfLeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
SelfMade bd
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Nicolás Lopéz
 

Recently uploaded (20)

Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
 
It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
 
Acumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptxAcumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptx
 
Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024
 
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
 
Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
 
The Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - CoatueThe Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - Coatue
 
Sonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdfSonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdf
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
 
How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
 
Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
 
Redefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI CapabilitiesRedefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI Capabilities
 
Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
 
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdfLeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
 

Java Ring

  • 2. JAVA RING Figure 1: prototype of stainless steel java ring
  • 4. INTRODUCTION • Java ring is a finger ring that contains a small microprocessor with built in capabilities for the user. • Java ring is a sort of a smartcard that is wearable on a finger • Java ring a stainless-steel ring,16-millimeters (0.6 inches) in diameter.
  • 5. CONTINUED… • It contains an inexpensive microprocessor in a stainless steel iButton which runs JVM and it is preloaded with applet. • The java Ring is an extremely secure Java-Powered electronic token. • Java Ring have number of real-world application.
  • 6. THE JAVA RING • Contains a tiny Java Virtual Machine • Implements the Java Card 2.0 API • Stores information in NVRAM ,ROM • Runs applets • Includes microprocessor, memory, clock and battery
  • 7. JAVA RING IN ITS NATURAL ENVIRONMET..
  • 8. COMPONENTS • Java Virtual Machine (JVM) • RAM • ROM • real-time clock • iButton • Blue dot reciptor
  • 9. JAVA VIRTUAL MACHINE The java virtual machine is the piece of software that recognizes the java language and translates the byte Code.
  • 11. RAM • Java ring contains 134kb of non-volatile random access memory . • This non-volatile random access memory offers high read/write speed. • It also provides rapid zeroization.
  • 12. ROM • The java ring contains 32kb of ROM . • Special kind of operating system called e-commerce operating system is stored in the ROM
  • 13. REAL TIME CLOCK • Real time clock gives the exact time of the day and it can run up to 10 years continuously . • It is driven by a constant 32KHz crystal oscillator. • In addition ,the frequency of the processor clock is not constant ,ranges from 10-20MHz. • This aspect prohibits hackers in obtaining the information from the iButton.
  • 15. i BUTTON… • The jewel of the java ring is the iButton. • iButton is a computer chip enclosed in a thick stainless steel can. • It is originally called “touch memory devices they were later renamed as “iButtons”. • Java ring uses 1-wire protocol for communication with the host and the iButton.
  • 16. CONTINUED… • The iButton is a mechanical packaging standard that places a 1-Wire component inside a small stainless steel "button" similar to a disk-shaped battery. • Each iButton has a unique and unalterable address laser attached onto its chip inside the can lid. • The address can be used as a key or identifier for each iButton.
  • 18. BLUE DOT RECEPTOR • The Blue Dot Receptors are iButton reader/probes that provide convenient pipeline into the PC for iButton-to-PC communication. • The receptor's cable connects to a USB, serial, or parallel-port 1-Wire adapter, whichever type of port you wish to use. • The receptor itself easily affixes to any accessible spot on the front of the PC. a
  • 20. CONTINUED… • Key features: • It has a coiled cable for connecting iButtons to 1-Wire networks . • Adhesive pad for mounting on objects. • Supports for up to two iButtons at once. • Can be used with any Dallas Semiconductor port adapter
  • 21. WORKING • Java Ring is programmed with the applets and the programming is done according to our application • Whenever the user pushes his ring on a ring reader(Blue Dot Receptor), the corresponding application will take place.
  • 23. Figure 5.2: Working process of Java Ring(Source: Java Card Technology
  • 24. CONTINUED… • Information is transferred between your iButton and a PC with a momentary contact at up to 142kbps. • You simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. • The Blue Dot receptor is cabled to a 1-Wire adapter that is attached to a spare PC port. 1-Wire adapters exist for USB, serial, and parallel ports.
  • 25. SECURITY • The barrier substrate and the triple-layer metal construction techniques employed in the silicon fabrication effectively deny unauthorized access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. • Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.
  • 26. APPLICATIONS • The java ring can be used to hold secret codes, credit cards numbers, driver license, other wallet contents, and even some electronic cash. • Its greatest promise appears to lie in its capacity to interact with Internet applications to support strong remote authentication and remotely authorized financial transactions.
  • 27. CONTINUED… • For opening the door • E-banking application • Logging in your PC • Providing security in your car • Used to fill forms
  • 28. ADVANTAGES • The Java Rings are very easy and convenient for users. • It can function between -40C to+70C and in much harsher environment. • It has higher durability.
  • 29. CONTINUED… • Easier for administrator to maintain the security infrastructure. • Provides real memory, more power, and a capacity for dynamic programming . • Provides authentication to user which is crucial for many applications.
  • 30. DISADVANTAGES • The cost of implementing the system is high. • It needs a high level tools and method in order to program application efficently, reliabily,securily. • iButton has a limited processor capacity and memory , which means an individual might need to carry more Java Ring. than one
  • 31. CONCLUSION • Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and automatically adjust to your preferences. • The key issue about a wearable computer (java ring) is not whether it is a ring or another form factor: the deciding point is that you will always have it with you.