SlideShare a Scribd company logo
1 of 14
1
BY
MALINI.M
SOWNDRYA.G
3RD CSE
INTRODUCTION
 Digital jewellery is the fashion jewelry
with embedded intelligence.
 Each piece of jewelry will contain a
fraction of the components found in a
conventional mobile phone.
 Together, the digital-jewelry cell phone
should work just like a conventional cell
phone.
 The digital jewellery are Braclets ,
chains, necklace, ear rings, java ring
etc,..
 Among them java ring is compact and
easy to carry anywhere and it is also
secure the information with unique ID.
2
WHAT IS JAVA RING ?
• Java ring is the finger ring that contain a small
microprocessor with build-in capabilities for the user, a
sort of smart card that is wearable on the finger.
• The main objective of the Java Ring is to maintain security
and portable.
COMPONENTS:
 134KB of RAM
 32KB of ROM
 Real Time Clock
 Java Virtual Machine
 iButton
 Blue Dot Receptor
3
4
WHY JAVA RING ?
Only by JAVA it is supported to all
OS. That why even supported for
Ecommerce OS(e-cash).
By JVM ,it supports automatic
garbage collection for efficient reuse
of memory space.
An applet written to run on the java
ring follows a very simple structure.
IMPLEMENTATION OF JAVA RING
• Java Ring is used for the security
purposes and also used for
authority permissions.
• For example ,in a family son ,
father, mother and other members
are not anticipate about the speed
limits.
• So by the use of java Ring is to
limit the features and speed in car
to avoid accidents.
5
IMPLEMENTATION OF JAVA RING
• By the use of Java Ring the unauthorized
peoples cannot use or access the device.
And there is personal identification
number(PIN).so no one can do
mischievous behaviour can be done, even
it is lost.
• The java Ring is used for the security
purposes.
• In future ,the java Ring is used to start
the car by unique ID.
6
REQUIREMENTS OF JAVA RING
• The Java Ring has 134KB of non volatile Random Access
Memory(RAM),by this it offers high read/write speed.
• Rapid erasing of the SRAM memory is known as zeroization.
When an iButton detects any intrusion, it erases its private
keys leading to zeroization.
• The Java Ring has 32KB of Read Only Memory(ROM) and a
special kind of OS called E-Commerce OS is stored in ROM.
• In Real Time Clock,the frequency of the processor clock is
not constant that ranges from 10-20MHz.This aspects
prohibits the hackers in obtaining the information from
iButton.
7
REQUIREMENTS OF JAVA RING
• Java Ring uses the 1-wire protocol for
communication with the host and the
iButton.
• Java iButton is designed more compatible
in java card 2.0 standard processor.
• The iButton memory can be read or
written with a momentary contact to the
"Blue Dot" receptor provided by the
adapter.
• The lifetime of java Ring is atleast for 10
years.
8
PICTORIAL REPRESENTATION
9
WORKING AND APPLICATION
• Java Ring is programmed with the applets
,whenever the user pushes the ring on the ring
Reader(Blue Dot Receptor) the corresponding
application take place.
• Communication is based on APDU format.
APPLICATIONS:
 To unlock the cars/doors/computers .
 Secure way of identifying the asset.
 Banks , authorized areas
 e-cash
 Useful to carry informations even URL’s.
10
ADVANTAGES AND DISADVANTAGES
ADVANTAGE:
* Many information and passwords carried in different devices is replaced in
single Java Ring.
* Higher durability.
* It functions even in -40C to +70C,in harsher
environment.
* It supports Dynamic programming.
* cost negligible.
* Asset management ,access control,e-cash etc..,
DISADVANTAGE:
* Many peoples don’t aware of it.
* iButton has a limited processor power and memory.
* High level tools and method is required to program application
efficiently and reliablity.
11
CONCLUSION
• The key issue about a wearable
computer (Java Ring ) is that
whether it is a ring or another
form factor : the deciding point
that always that will be with
you.
12
13
REFERENCES
 www.javaworld.com
 www.123seminaronly.com
 www.javaringblogspot.com
THANK YOU
14

More Related Content

What's hot (20)

Java Ring
Java RingJava Ring
Java Ring
 
Java ring Engg SEMINAR
Java ring Engg SEMINARJava ring Engg SEMINAR
Java ring Engg SEMINAR
 
Java Ring
Java RingJava Ring
Java Ring
 
Java ring
Java ringJava ring
Java ring
 
Java Ring
Java Ring Java Ring
Java Ring
 
My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
New Ring
New RingNew Ring
New Ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
Presentation1
Presentation1Presentation1
Presentation1
 
java ring
java ringjava ring
java ring
 
Dj ppt
Dj pptDj ppt
Dj ppt
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 
DIGITAL JEWELLERY
DIGITAL JEWELLERYDIGITAL JEWELLERY
DIGITAL JEWELLERY
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 

Viewers also liked

Robo's in constructions
Robo's in constructionsRobo's in constructions
Robo's in constructionsmkanth
 
Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation   Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation Martin Deal
 
Bio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular BiologyBio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular BiologyBob Eisenberg
 
Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)Vinod Bobade
 
Blue gene technology
Blue gene technologyBlue gene technology
Blue gene technologyVivek Jha
 
ANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONDeepak kango
 
Motion capture technology
Motion capture technologyMotion capture technology
Motion capture technologyArun MK
 
Bio Inspired Computing Final Version
Bio Inspired Computing Final VersionBio Inspired Computing Final Version
Bio Inspired Computing Final VersionThomas Petry
 
Java card technology
Java card technologyJava card technology
Java card technologyAmol Kamble
 
Motion Capturing Technology
Motion Capturing TechnologyMotion Capturing Technology
Motion Capturing TechnologyMurlidhar Sarda
 
MOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGYMOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGYShaik Tanveer
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry reportShruthi K Gowda
 
Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Asiri Wijesinghe
 

Viewers also liked (18)

Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Robo's in constructions
Robo's in constructionsRobo's in constructions
Robo's in constructions
 
Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation   Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation
 
DIGITAL JEWELERY
DIGITAL JEWELERYDIGITAL JEWELERY
DIGITAL JEWELERY
 
Bio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular BiologyBio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular Biology
 
Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)
 
Blue gene technology
Blue gene technologyBlue gene technology
Blue gene technology
 
ANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATION
 
Motion Capture
Motion CaptureMotion Capture
Motion Capture
 
Motion capture technology
Motion capture technologyMotion capture technology
Motion capture technology
 
Bio Inspired Computing Final Version
Bio Inspired Computing Final VersionBio Inspired Computing Final Version
Bio Inspired Computing Final Version
 
Java card technology
Java card technologyJava card technology
Java card technology
 
Motion Capturing Technology
Motion Capturing TechnologyMotion Capturing Technology
Motion Capturing Technology
 
MOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGYMOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGY
 
Motion capture
Motion captureMotion capture
Motion capture
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
 
Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)
 

Similar to Digital Jewelry: An Overview of the Java Ring

Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Jana Vontari
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamAnshika Nigam
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital JwelleryJawhar Ali
 
DIGITAL JWELLERY
DIGITAL JWELLERYDIGITAL JWELLERY
DIGITAL JWELLERYMD Ibrahim
 
CocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best PracticesCocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best PracticesMutual Mobile
 
Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Julien SIMON
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptxKDivyaLatha
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellaryAjay kumar
 
Eric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 SlidesEric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 Slidesevetillard
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...CODE BLUE
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecurityOKsystem
 

Similar to Digital Jewelry: An Overview of the Java Ring (16)

Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Java Ring
Java RingJava Ring
Java Ring
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika Nigam
 
Google glass
Google glassGoogle glass
Google glass
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
DIGITAL JWELLERY
DIGITAL JWELLERYDIGITAL JWELLERY
DIGITAL JWELLERY
 
CocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best PracticesCocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best Practices
 
Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Eric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 SlidesEric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 Slides
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Digital Jewelry: An Overview of the Java Ring

  • 2. INTRODUCTION  Digital jewellery is the fashion jewelry with embedded intelligence.  Each piece of jewelry will contain a fraction of the components found in a conventional mobile phone.  Together, the digital-jewelry cell phone should work just like a conventional cell phone.  The digital jewellery are Braclets , chains, necklace, ear rings, java ring etc,..  Among them java ring is compact and easy to carry anywhere and it is also secure the information with unique ID. 2
  • 3. WHAT IS JAVA RING ? • Java ring is the finger ring that contain a small microprocessor with build-in capabilities for the user, a sort of smart card that is wearable on the finger. • The main objective of the Java Ring is to maintain security and portable. COMPONENTS:  134KB of RAM  32KB of ROM  Real Time Clock  Java Virtual Machine  iButton  Blue Dot Receptor 3
  • 4. 4 WHY JAVA RING ? Only by JAVA it is supported to all OS. That why even supported for Ecommerce OS(e-cash). By JVM ,it supports automatic garbage collection for efficient reuse of memory space. An applet written to run on the java ring follows a very simple structure.
  • 5. IMPLEMENTATION OF JAVA RING • Java Ring is used for the security purposes and also used for authority permissions. • For example ,in a family son , father, mother and other members are not anticipate about the speed limits. • So by the use of java Ring is to limit the features and speed in car to avoid accidents. 5
  • 6. IMPLEMENTATION OF JAVA RING • By the use of Java Ring the unauthorized peoples cannot use or access the device. And there is personal identification number(PIN).so no one can do mischievous behaviour can be done, even it is lost. • The java Ring is used for the security purposes. • In future ,the java Ring is used to start the car by unique ID. 6
  • 7. REQUIREMENTS OF JAVA RING • The Java Ring has 134KB of non volatile Random Access Memory(RAM),by this it offers high read/write speed. • Rapid erasing of the SRAM memory is known as zeroization. When an iButton detects any intrusion, it erases its private keys leading to zeroization. • The Java Ring has 32KB of Read Only Memory(ROM) and a special kind of OS called E-Commerce OS is stored in ROM. • In Real Time Clock,the frequency of the processor clock is not constant that ranges from 10-20MHz.This aspects prohibits the hackers in obtaining the information from iButton. 7
  • 8. REQUIREMENTS OF JAVA RING • Java Ring uses the 1-wire protocol for communication with the host and the iButton. • Java iButton is designed more compatible in java card 2.0 standard processor. • The iButton memory can be read or written with a momentary contact to the "Blue Dot" receptor provided by the adapter. • The lifetime of java Ring is atleast for 10 years. 8
  • 10. WORKING AND APPLICATION • Java Ring is programmed with the applets ,whenever the user pushes the ring on the ring Reader(Blue Dot Receptor) the corresponding application take place. • Communication is based on APDU format. APPLICATIONS:  To unlock the cars/doors/computers .  Secure way of identifying the asset.  Banks , authorized areas  e-cash  Useful to carry informations even URL’s. 10
  • 11. ADVANTAGES AND DISADVANTAGES ADVANTAGE: * Many information and passwords carried in different devices is replaced in single Java Ring. * Higher durability. * It functions even in -40C to +70C,in harsher environment. * It supports Dynamic programming. * cost negligible. * Asset management ,access control,e-cash etc.., DISADVANTAGE: * Many peoples don’t aware of it. * iButton has a limited processor power and memory. * High level tools and method is required to program application efficiently and reliablity. 11
  • 12. CONCLUSION • The key issue about a wearable computer (Java Ring ) is that whether it is a ring or another form factor : the deciding point that always that will be with you. 12