 WHAT IS A JAVA RING?
Is a finger ring that contains a small microprocessor
with built in capabilities for the user. The java ring is
an extremely secure java-powered electronic token.
 The Java Ring is a stainless-steel ring, 16-millimeters
(0.6 inches) in diameter, that houses a 1-million-
transistor processor, called an iButton.
 The Ring has 134 kb of RAM, 32 kb of ROM, a real-time
clock and a java virtual machine, which is a piece of
software that recognizes the java language and translates it
for the user's computer system.
JAVA RING
 The INSIDE Java Ring Contains
 Small micro processor with
built-in capabilities for the
user.
 Stainless steel iButton.
 Java Virtual Machine.
 applets
 Real Time Clock
JAVA RING IN ITS NATURAL ENVIRONMENT..
 HISTORY :
 The java ring was developed by Dallas Semiconductor in
1989..
 Java ring has been tested at Celebration School (United
States) to students and have been programmed to
 automatically unlock doors
 take attendance
 store medical information
 The rings given to students are programmed with
Java applets that communicate with applications on
networked systems.
 WORKING :
 This java applets application is preloaded into
java ring.
 Java ring is programmed with the applets
according to our application.
 User simply presses the signal of the java ring
against the "BLUE DOT" receptor and the system
is connected to the receptor that performs the
function that the applet instructs to it.
iButton Blue Dot Receptor
 Simply touch your iButton to a Blue Dot receptor or
other iButton probe, which is connected to a PC.
Ground content called "base" Data content called "LID“.
 COMPONENTS :
 Java Virtual Machine
 RAM
 ROM
 Real-time clock
 iButton
 Blue dot receptor.
 APPLICATIONS :
 Although Java Rings aren't widely used yet, such
rings have real-world applications,such as starting
vehicles that automatically adjust to your
preferences.
 Provides Security.
 Personalised services.(manual work performed
by a service provider by serving to a customer).
 Java ring provides high degree of security for the
confidential data that is stored.
 Java rings are authorised through Personal
Identification Numbers (PINs) so that no one can
steal a persons ring and use that ring.
 SECURITY :
 ADVANTAGES :
Java Ring is Wearable Completely Controlled by the
user.
 10 years of durability.
 It can be used anywhere in the world.
 It can be used even as a key without passwords.
 CONCLUSION:
 Latest Technology.
 It can be attached to various personal accessories.
 A very easy and convenient way for users.
 It is more secure than using passwords,since
passwords are short or can be guessed.
Presentation1
Presentation1

Presentation1

  • 3.
     WHAT ISA JAVA RING? Is a finger ring that contains a small microprocessor with built in capabilities for the user. The java ring is an extremely secure java-powered electronic token.  The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million- transistor processor, called an iButton.  The Ring has 134 kb of RAM, 32 kb of ROM, a real-time clock and a java virtual machine, which is a piece of software that recognizes the java language and translates it for the user's computer system.
  • 4.
  • 5.
     The INSIDEJava Ring Contains  Small micro processor with built-in capabilities for the user.  Stainless steel iButton.  Java Virtual Machine.  applets  Real Time Clock
  • 6.
    JAVA RING INITS NATURAL ENVIRONMENT..
  • 7.
     HISTORY : The java ring was developed by Dallas Semiconductor in 1989..  Java ring has been tested at Celebration School (United States) to students and have been programmed to  automatically unlock doors  take attendance  store medical information  The rings given to students are programmed with Java applets that communicate with applications on networked systems.
  • 8.
     WORKING : This java applets application is preloaded into java ring.  Java ring is programmed with the applets according to our application.  User simply presses the signal of the java ring against the "BLUE DOT" receptor and the system is connected to the receptor that performs the function that the applet instructs to it.
  • 9.
  • 10.
     Simply touchyour iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. Ground content called "base" Data content called "LID“.
  • 11.
     COMPONENTS : Java Virtual Machine  RAM  ROM  Real-time clock  iButton  Blue dot receptor.
  • 12.
     APPLICATIONS : Although Java Rings aren't widely used yet, such rings have real-world applications,such as starting vehicles that automatically adjust to your preferences.  Provides Security.  Personalised services.(manual work performed by a service provider by serving to a customer).
  • 13.
     Java ringprovides high degree of security for the confidential data that is stored.  Java rings are authorised through Personal Identification Numbers (PINs) so that no one can steal a persons ring and use that ring.  SECURITY :
  • 14.
     ADVANTAGES : JavaRing is Wearable Completely Controlled by the user.  10 years of durability.  It can be used anywhere in the world.  It can be used even as a key without passwords.
  • 16.
     CONCLUSION:  LatestTechnology.  It can be attached to various personal accessories.  A very easy and convenient way for users.  It is more secure than using passwords,since passwords are short or can be guessed.