SlideShare a Scribd company logo
JAVA RING
JAVA RING

Figure 1: prototype of stainless steel java ring
CONTENTS
•

INTRODUCTION

•

COMPONENTS

•

WORKING

•

SECURITY

•

APPLICATIONS

•

ADVANTAGES

•

DISADVANTAGES

•

CONCLUSION

•

REFERENCE
INTRODUCTION
• Java ring is a finger ring that contains a small
microprocessor with built in capabilities for the user.
• Java ring is a sort of a smartcard that is wearable on a
finger
• Java ring a stainless-steel ring,16-millimeters (0.6 inches)
in diameter.
CONTINUED…
• It contains an inexpensive microprocessor in a stainless
steel iButton which runs JVM and it is preloaded with applet.
• The java Ring is an extremely secure Java-Powered
electronic token.
• Java Ring have number of real-world application.
THE JAVA RING
• Contains a tiny Java Virtual Machine
• Implements the Java Card 2.0 API
• Stores information in NVRAM ,ROM

• Runs applets
• Includes microprocessor, memory, clock and battery
JAVA RING IN ITS NATURAL
ENVIRONMET..
COMPONENTS
• Java Virtual Machine (JVM)
•

RAM

•

ROM

•

real-time clock

•

iButton

•

Blue dot reciptor
JAVA VIRTUAL MACHINE
The java virtual machine is the piece of software that
recognizes the java language and translates the byte
Code.
RAM
• Java ring contains 134kb of non-volatile random
access memory .
• This non-volatile random access memory offers

high read/write speed.
• It also provides rapid zeroization.
ROM
• The java ring contains 32kb of ROM .
• Special kind of operating system called
e-commerce operating system is stored in the ROM
REAL TIME CLOCK
• Real time clock gives the exact time of the day and it can
run up to 10 years continuously .

• It is driven by a constant 32KHz crystal oscillator.
• In addition ,the frequency of the processor clock is
not constant ,ranges from 10-20MHz.
• This aspect prohibits hackers in obtaining the
information from the iButton.
i BUTTON
i BUTTON…
• The jewel of the java ring is the iButton.
• iButton is a computer chip enclosed in a thick stainless

steel can.
• It is originally called “touch memory devices they were
later renamed as “iButtons”.
• Java ring uses 1-wire protocol for communication
with the host and the iButton.
CONTINUED…
• The iButton is a mechanical packaging standard that
places a 1-Wire component inside a small stainless
steel "button" similar to a disk-shaped battery.
• Each iButton has a unique and unalterable address laser
attached onto its chip inside the can lid.
• The address can be used as a key or identifier for each
iButton.
i BUTTON STRUCTURE
BLUE DOT RECEPTOR
• The Blue Dot Receptors are iButton reader/probes that provide
convenient pipeline into the PC for iButton-to-PC

communication.

• The receptor's cable connects to a USB, serial, or parallel-port

1-Wire adapter, whichever type of port you wish to use.
• The receptor itself easily affixes to any accessible spot on

the front of the PC.

a
BLUE DOT RECEPTOR…
CONTINUED…
• Key features:
• It has a coiled cable for connecting iButtons to 1-Wire
networks .
• Adhesive pad for mounting on objects.
• Supports for up to two iButtons at once.
• Can be used with any Dallas Semiconductor port
adapter
WORKING
• Java Ring is programmed with the applets and
the programming is done according to our application
• Whenever the user pushes his ring on a ring reader(Blue
Dot Receptor), the corresponding application will take
place.
OPENING DOORS
Figure 5.2: Working process of Java Ring(Source: Java Card Technology
CONTINUED…
• Information is transferred between your iButton and a PC
with a momentary contact at up to 142kbps.
• You simply touch your iButton to a Blue Dot receptor or
other iButton probe, which is connected to a PC.
• The Blue Dot receptor is cabled to a 1-Wire adapter that is
attached to a spare PC port. 1-Wire adapters exist for USB,
serial, and parallel ports.
SECURITY
• The barrier substrate and the triple-layer metal construction

techniques employed in the silicon fabrication effectively deny
unauthorized access to the data stored in the NVRAM. If any

attempt is made to penetrate these barriers, the NVRAM data is
immediately erased.
• Java rings are authorized through Personal Identification

Numbers

(PINs) so that no one can steal a person's ring and use that ring.
APPLICATIONS
• The java ring can be used to hold secret codes,
credit cards numbers, driver license, other wallet
contents, and even some electronic cash.
•

Its greatest promise appears to lie in its capacity to
interact with Internet applications to support strong
remote authentication and remotely authorized financial

transactions.
CONTINUED…
• For opening the door
• E-banking application
• Logging in your PC

• Providing security in your car
• Used to fill forms
ADVANTAGES
• The Java Rings are very easy and convenient for
users.
• It can function between -40C to+70C and in much
harsher environment.
• It has higher durability.
CONTINUED…
• Easier for administrator to maintain the security
infrastructure.
• Provides real memory, more power, and a capacity
for dynamic programming .
• Provides authentication to user which is crucial for many
applications.
DISADVANTAGES
• The cost of implementing the system is high.
• It needs a high level tools and method in order to

program

application efficently, reliabily,securily.
• iButton has a limited processor capacity and memory , which
means an individual might need to carry more
Java Ring.

than one
CONCLUSION
• Although Java Rings aren't widely used yet, such rings or
similar devices could have a number of real-world
applications, such as starting your car and automatically
adjust to your preferences.
•

The key issue about a wearable computer (java ring) is not
whether it is a ring or another form factor: the deciding point is
that you will always have it with you.
REFERENCES
• http://www.javaworld.com/
• http://www.people.uchicago.edu/
• http://www.electronics.howstuffworks.com
abhi.globalistic@gmail.com

More Related Content

What's hot

Smart Door locking system using arduino
Smart Door locking system using arduinoSmart Door locking system using arduino
Smart Door locking system using arduino
BhawnaSingh351973
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
Lohit Dalal
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
Lovely Professional University
 
Pill camera presentation
Pill camera presentationPill camera presentation
Pill camera presentation
Leelakh Sachdeva
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
karthikaramkumar1
 
Java ring
Java ring   Java ring
Java ring
Rajanivetha G
 
I twin technology
I twin technologyI twin technology
I twin technology
Chandra Mohan AD
 
Smart shopping trolley.
Smart shopping trolley.Smart shopping trolley.
Smart shopping trolley.
Professional Presentation designer
 
Virtual keyboard seminar ppt
Virtual keyboard seminar pptVirtual keyboard seminar ppt
Virtual keyboard seminar ppt
Shruti Maheshwari
 
SMART NOTE TAKER
SMART NOTE TAKERSMART NOTE TAKER
SMART NOTE TAKER
suresh8500472367
 
Night vision technology
Night vision technologyNight vision technology
Night vision technology
PRADEEP Cheekatla
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
Saumya Ranjan Behura
 
Light tree
Light treeLight tree
Light tree
Jitendra31291
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
Shruthi K Gowda
 
Presentation on Raspberry pi
Presentation on Raspberry piPresentation on Raspberry pi
Presentation on Raspberry pi
OpenDev
 
E-Paper Display
E-Paper DisplayE-Paper Display
E-Paper Display
Rajesh Dunna
 
electronics seminar ppt
electronics seminar pptelectronics seminar ppt
electronics seminar ppt
Vibhu Mishra
 
Screenless Display PPT
Screenless Display PPTScreenless Display PPT
Screenless Display PPT
Vikas Kumar
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
jyothsna vanka
 
RFID Shopping System
RFID Shopping SystemRFID Shopping System
RFID Shopping System
Aayush Tuladhar
 

What's hot (20)

Smart Door locking system using arduino
Smart Door locking system using arduinoSmart Door locking system using arduino
Smart Door locking system using arduino
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
Pill camera presentation
Pill camera presentationPill camera presentation
Pill camera presentation
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
 
Java ring
Java ring   Java ring
Java ring
 
I twin technology
I twin technologyI twin technology
I twin technology
 
Smart shopping trolley.
Smart shopping trolley.Smart shopping trolley.
Smart shopping trolley.
 
Virtual keyboard seminar ppt
Virtual keyboard seminar pptVirtual keyboard seminar ppt
Virtual keyboard seminar ppt
 
SMART NOTE TAKER
SMART NOTE TAKERSMART NOTE TAKER
SMART NOTE TAKER
 
Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 
Light tree
Light treeLight tree
Light tree
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
 
Presentation on Raspberry pi
Presentation on Raspberry piPresentation on Raspberry pi
Presentation on Raspberry pi
 
E-Paper Display
E-Paper DisplayE-Paper Display
E-Paper Display
 
electronics seminar ppt
electronics seminar pptelectronics seminar ppt
electronics seminar ppt
 
Screenless Display PPT
Screenless Display PPTScreenless Display PPT
Screenless Display PPT
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 
RFID Shopping System
RFID Shopping SystemRFID Shopping System
RFID Shopping System
 

Similar to Java Ring

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
arun Prabha
 
java ring
java ringjava ring
Java ring
Java ringJava ring
Java ring
nilpatil
 
New Ring
New RingNew Ring
New Ring
guest768cbf8
 
Java ring
Java ringJava ring
Java ring
Kaushik Banerjee
 
Presentation1
Presentation1Presentation1
Presentation1
vennela venni
 
Java Ring
Java Ring Java Ring
Java Ring
Aradhya Kundu
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
Yogesh Bhalla
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
sowndryaganesh
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
Jana Vontari
 
Java ring
Java ringJava ring
Java ring
kranthibalagam
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
Sahithi Naraparaju
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
Prachi Jain
 
Java Ring
Java RingJava Ring
Java Ring
Haku Hikaru
 
How i built my own irrigation controller
How i built my own irrigation controllerHow i built my own irrigation controller
How i built my own irrigation controller
Shree Kumar
 
java Ring
java Ringjava Ring
java Ring
ranjeetdon
 
Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.
Nitish Kumar
 
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
Jonathan Engelsma
 
IoT and Its Application
IoT and Its ApplicationIoT and Its Application
IoT and Its Application
Dun Automation Academy
 
CEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemCEIS101: IoT Home Security System
CEIS101: IoT Home Security System
BillBlanco
 

Similar to Java Ring (20)

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
java ring
java ringjava ring
java ring
 
Java ring
Java ringJava ring
Java ring
 
New Ring
New RingNew Ring
New Ring
 
Java ring
Java ringJava ring
Java ring
 
Presentation1
Presentation1Presentation1
Presentation1
 
Java Ring
Java Ring Java Ring
Java Ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
Java ring
Java ringJava ring
Java ring
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
 
Java Ring
Java RingJava Ring
Java Ring
 
How i built my own irrigation controller
How i built my own irrigation controllerHow i built my own irrigation controller
How i built my own irrigation controller
 
java Ring
java Ringjava Ring
java Ring
 
Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.
 
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
 
IoT and Its Application
IoT and Its ApplicationIoT and Its Application
IoT and Its Application
 
CEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemCEIS101: IoT Home Security System
CEIS101: IoT Home Security System
 

More from Abhishek Abhi

Blue brain
Blue brainBlue brain
Blue brain
Abhishek Abhi
 
3d search
3d search3d search
3d search
Abhishek Abhi
 
3D Internet
3D Internet 3D Internet
3D Internet
Abhishek Abhi
 
Augmented reality The future of computing
Augmented reality The future of computingAugmented reality The future of computing
Augmented reality The future of computing
Abhishek Abhi
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
Abhishek Abhi
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Abhishek Abhi
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
Abhishek Abhi
 

More from Abhishek Abhi (7)

Blue brain
Blue brainBlue brain
Blue brain
 
3d search
3d search3d search
3d search
 
3D Internet
3D Internet 3D Internet
3D Internet
 
Augmented reality The future of computing
Augmented reality The future of computingAugmented reality The future of computing
Augmented reality The future of computing
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
 

Recently uploaded

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 

Recently uploaded (20)

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 

Java Ring

  • 2. JAVA RING Figure 1: prototype of stainless steel java ring
  • 4. INTRODUCTION • Java ring is a finger ring that contains a small microprocessor with built in capabilities for the user. • Java ring is a sort of a smartcard that is wearable on a finger • Java ring a stainless-steel ring,16-millimeters (0.6 inches) in diameter.
  • 5. CONTINUED… • It contains an inexpensive microprocessor in a stainless steel iButton which runs JVM and it is preloaded with applet. • The java Ring is an extremely secure Java-Powered electronic token. • Java Ring have number of real-world application.
  • 6. THE JAVA RING • Contains a tiny Java Virtual Machine • Implements the Java Card 2.0 API • Stores information in NVRAM ,ROM • Runs applets • Includes microprocessor, memory, clock and battery
  • 7. JAVA RING IN ITS NATURAL ENVIRONMET..
  • 8. COMPONENTS • Java Virtual Machine (JVM) • RAM • ROM • real-time clock • iButton • Blue dot reciptor
  • 9. JAVA VIRTUAL MACHINE The java virtual machine is the piece of software that recognizes the java language and translates the byte Code.
  • 10.
  • 11. RAM • Java ring contains 134kb of non-volatile random access memory . • This non-volatile random access memory offers high read/write speed. • It also provides rapid zeroization.
  • 12. ROM • The java ring contains 32kb of ROM . • Special kind of operating system called e-commerce operating system is stored in the ROM
  • 13. REAL TIME CLOCK • Real time clock gives the exact time of the day and it can run up to 10 years continuously . • It is driven by a constant 32KHz crystal oscillator. • In addition ,the frequency of the processor clock is not constant ,ranges from 10-20MHz. • This aspect prohibits hackers in obtaining the information from the iButton.
  • 15. i BUTTON… • The jewel of the java ring is the iButton. • iButton is a computer chip enclosed in a thick stainless steel can. • It is originally called “touch memory devices they were later renamed as “iButtons”. • Java ring uses 1-wire protocol for communication with the host and the iButton.
  • 16. CONTINUED… • The iButton is a mechanical packaging standard that places a 1-Wire component inside a small stainless steel "button" similar to a disk-shaped battery. • Each iButton has a unique and unalterable address laser attached onto its chip inside the can lid. • The address can be used as a key or identifier for each iButton.
  • 18. BLUE DOT RECEPTOR • The Blue Dot Receptors are iButton reader/probes that provide convenient pipeline into the PC for iButton-to-PC communication. • The receptor's cable connects to a USB, serial, or parallel-port 1-Wire adapter, whichever type of port you wish to use. • The receptor itself easily affixes to any accessible spot on the front of the PC. a
  • 20. CONTINUED… • Key features: • It has a coiled cable for connecting iButtons to 1-Wire networks . • Adhesive pad for mounting on objects. • Supports for up to two iButtons at once. • Can be used with any Dallas Semiconductor port adapter
  • 21. WORKING • Java Ring is programmed with the applets and the programming is done according to our application • Whenever the user pushes his ring on a ring reader(Blue Dot Receptor), the corresponding application will take place.
  • 23. Figure 5.2: Working process of Java Ring(Source: Java Card Technology
  • 24. CONTINUED… • Information is transferred between your iButton and a PC with a momentary contact at up to 142kbps. • You simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. • The Blue Dot receptor is cabled to a 1-Wire adapter that is attached to a spare PC port. 1-Wire adapters exist for USB, serial, and parallel ports.
  • 25. SECURITY • The barrier substrate and the triple-layer metal construction techniques employed in the silicon fabrication effectively deny unauthorized access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. • Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.
  • 26. APPLICATIONS • The java ring can be used to hold secret codes, credit cards numbers, driver license, other wallet contents, and even some electronic cash. • Its greatest promise appears to lie in its capacity to interact with Internet applications to support strong remote authentication and remotely authorized financial transactions.
  • 27. CONTINUED… • For opening the door • E-banking application • Logging in your PC • Providing security in your car • Used to fill forms
  • 28. ADVANTAGES • The Java Rings are very easy and convenient for users. • It can function between -40C to+70C and in much harsher environment. • It has higher durability.
  • 29. CONTINUED… • Easier for administrator to maintain the security infrastructure. • Provides real memory, more power, and a capacity for dynamic programming . • Provides authentication to user which is crucial for many applications.
  • 30. DISADVANTAGES • The cost of implementing the system is high. • It needs a high level tools and method in order to program application efficently, reliabily,securily. • iButton has a limited processor capacity and memory , which means an individual might need to carry more Java Ring. than one
  • 31. CONCLUSION • Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and automatically adjust to your preferences. • The key issue about a wearable computer (java ring) is not whether it is a ring or another form factor: the deciding point is that you will always have it with you.