SlideShare ist ein Scribd-Unternehmen logo
1 von 23
BY : RAJDEEP SATAPATHY
BRANCH: CSE
Dated: 2011
1
o A Java Ring is a finger ring that contains a small microprocessor with built-in
capabilities for the user, a sort of smart card that is wearable on a finger. Sun
Microsystem's Java Ring was introduced at their JavaOne Conference in 1998
and, instead of a gemstone, contained an inexpensive microprocessor in a
stainless-steel iButton running a Java virtual machine and preloaded with
applets (little application programs). The rings were built by Dallas
Semiconductor.
o
Workstations at the conference had "ring readers" installed on them that
downloaded information about the user from the conference registration
system. This information was then used to enable a number of personalized
services. For example, a robotic machine made coffee according to user
preferences, which it downloaded when they snapped the ring into another
"ring reader."
o
Although Java Rings aren't widely used yet, such rings or similar devices
could have a number of real-world applications, such as starting your car and
having all your vehicle's components (such as the seat, mirrors, and radio
selections) automatically adjust to your preferences.
2
 INTRODUCTION
 HISTORY
 COMPONENTS IN JAVA RING
 ARCHITECTURE
 WORKING
 SECURITY
 COMPARISION WITH SMART CARDS
 APPLICATION
 DISADVANTAGES
 CONCLUSION
 REFERENCE
3
4
 A Java Ring is a finger ring that contains a small
microprocessor with built-in capabilities for the user.
 It contains an inexpensive microprocessr in a stainless
steel ibutton running a JVM and it is preloaded with
applet.
 The Java Ring is an extremely secure Java-powered
electronic token .
 The Java Ring is a stainless-steel ring, 16-millimeters (0.6
inches) in diameter, that houses a 1-million-transistor
processor, called an ibutton.
 The ring has 134 KB of RAM, 32 KB of ROM, a real-time
clock and a Java virtual machine, which is a piece of
software that recognizes the Java language and translates
it for the user's computer system.
Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in
diameter, that houses a 1-million-transistor processor, called an
iButton. The ring has 134 KB of RAM, 32 KB of ROM.
5
In the summer of 1989, Dallas Semiconductor Corp.
produced the first stainless-steel-encapsulated memory
device called iButton.
IButton is the main component of java ring.
Java Ring was introduced at their Java One Conference
in 1998.
6
 Java Virtual Machine (JVM).
 RAM.
 ROM.
 Real-time clock.
 iButton.
 Blue dot receptor.
7
Java ring is programmed with java application
program and applets that communicate with the
host application on the networked system.
Applets are the small application that is designed
to run on the another application system.
The java virtual machine is the piece of software
that recognizes the java language and translates
the byte code, which is used by the system which
is connected to the java ring via ring reader.
8
 Java ring contains 134kb of non-volatile random access
memory.
 Program and data is stored.
 This non-volatile random access memory offers high
read/write speed and also provides temper resistance
through instantaneous clearing of all memory when
tempering is detected. This process is called rapid
zeroization.
 The NVRAM iButton memory can be erased or rewritten
as often as necessary without wearing out.
9
The java ring contains 32kb of ROM.
A special kind of operating system called E-
Commerce operating system which is based on
java and JVM is stored in the ROM.
This operating system handles all the operation
which is happening in the iButton.
It is stored in ROM because it is not supposed to
be altered by the user.
10
 In the java ring real time clock gives the exact time
of the day.
 The real time clock continuously run up to more
than 10 years by the energy provided the lithium
backup.
 In addition, the processor itself is driven by an
unstabilized ring oscillator operating over a range of
10 to 20 megahertz, so that the clock frequency of
the processor is not constant and cannot be
determined by external means.
11
The jewel of the Java Ring is the Java iButton -- a
one-million transistor, single chip trusted
microcomputer with a powerful Java Virtual
Machine (JVM) housed in a rugged and secure
stainless-steel case
Originally called "touch memory" devices, they
were later renamed "iButtons." Packaged like
batteries, iButtons have only a single active
electrical contact on the top surface, with the
stainless steel shell serving as ground.
12
 Blue dot receptor lets you communicate with ibutton
from pcs to microprocessor and embedded system.
 The read/write operation will be done by this blue
dot receptor provided by RS232 serial port adaptor.
 Receptor cable connects to the USB port of PC or
any embedded system.
 The information is transferred between the ibutton
and pc with momentary touching java ring .
13
14
 Java ring is programmed with the applets according
to our application.
 For specific class of user specific java applets is
preloaded in to the java ring.
 All the information of the user is stored in the java
ring.
 User simply presses the signet of the java ring against
the “blue dot” receptor and the system connected to
the receptor performs the function that the applet
instructs to do.
15
Information is transferred between your iButton
and a PC with a momentary contact at up to
142kbps.
You simply touch your iButton to a Blue Dot
receptor or other iButton probe, which is
connected to a PC.
16
This barrier substrate and the triple-layer metal
construction techniques employed in the silicon
fabrication effectively deny access to the data
stored in the NVRAM. If any attempt is made to
penetrate these barriers, the NVRAM data is
immediately erased.
Java rings are authorized through Personal
Identification Numbers (PINs) so that no one can
steal a person's ring and use that ring.
17
iButtons have an advantage over conventional
smart cards in term of durability and longevity.
iButtons are rugged enough to withstand harsh
environments.
iButton uses java as a common programming
language.
18
 Although Java Rings aren't widely used yet, such rings or
similar devices could have a number of real-world
applications, such as starting your car and having all your
vehicle's components (such as the seat, mirrors, and radio
selections) automatically adjust to your preferences.
 Providing security.
 Personalized services.
 Access Control.
 Time and attendance.
 eCash.
 Gaming Systems.
19
Parents and teachers will have less
control over children and students.
Loss of privacy.
20
 Java ring is highly durable because of its rugged and
secure stainless packing. It is used in personal
computing.
 With its stainless steel armor, it offers the most
durable packaging for a class of products that likely
will suffer heavy use and abuse as personal
possessions.
 The iButton form factor permits attachment to a
wide variety of personal accessories that includes
rings, watchbands, key fobs, wallets, bracelets, and
necklaces, so the user can select a variation that suits
his or her lifestyle.
21
www.javaworld.com
http://electronics.howstuffworks.com
http://people.cs.uchicago.edu
22
23

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
E ball technology
E ball technologyE ball technology
E ball technology
 
smart note taker
smart note takersmart note taker
smart note taker
 
Digitaljewellery presentation
Digitaljewellery presentationDigitaljewellery presentation
Digitaljewellery presentation
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
SMART NOTE TAKER REPORT
SMART NOTE TAKER REPORTSMART NOTE TAKER REPORT
SMART NOTE TAKER REPORT
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 
digital jewelry
digital jewelrydigital jewelry
digital jewelry
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Computer clothing
Computer clothingComputer clothing
Computer clothing
 
EyeRing PowerPoint Presentation
EyeRing PowerPoint PresentationEyeRing PowerPoint Presentation
EyeRing PowerPoint Presentation
 
Smart note-taker
Smart note-takerSmart note-taker
Smart note-taker
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
Silverlight
SilverlightSilverlight
Silverlight
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Holographic memory
Holographic memoryHolographic memory
Holographic memory
 
3D OPTICAL STORAGE TECHNOLOGY technical seminar 4B.pptx
3D OPTICAL STORAGE TECHNOLOGY technical seminar 4B.pptx3D OPTICAL STORAGE TECHNOLOGY technical seminar 4B.pptx
3D OPTICAL STORAGE TECHNOLOGY technical seminar 4B.pptx
 
Digital Jewellery ppt
Digital Jewellery  pptDigital Jewellery  ppt
Digital Jewellery ppt
 
Diamond chip
Diamond chipDiamond chip
Diamond chip
 

Ähnlich wie Java ring Engg SEMINAR

Ähnlich wie Java ring Engg SEMINAR (20)

Java ring
Java ringJava ring
Java ring
 
Presentation1
Presentation1Presentation1
Presentation1
 
New Ring
New RingNew Ring
New Ring
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Java Ring
Java RingJava Ring
Java Ring
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
java Ring
java Ringjava Ring
java Ring
 
Java ring
Java ringJava ring
Java ring
 
Java Ring
Java Ring Java Ring
Java Ring
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
 
My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
java ring
java ringjava ring
java ring
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika Nigam
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Java ring Engg SEMINAR

  • 1. BY : RAJDEEP SATAPATHY BRANCH: CSE Dated: 2011 1
  • 2. o A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user, a sort of smart card that is wearable on a finger. Sun Microsystem's Java Ring was introduced at their JavaOne Conference in 1998 and, instead of a gemstone, contained an inexpensive microprocessor in a stainless-steel iButton running a Java virtual machine and preloaded with applets (little application programs). The rings were built by Dallas Semiconductor. o Workstations at the conference had "ring readers" installed on them that downloaded information about the user from the conference registration system. This information was then used to enable a number of personalized services. For example, a robotic machine made coffee according to user preferences, which it downloaded when they snapped the ring into another "ring reader." o Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences. 2
  • 3.  INTRODUCTION  HISTORY  COMPONENTS IN JAVA RING  ARCHITECTURE  WORKING  SECURITY  COMPARISION WITH SMART CARDS  APPLICATION  DISADVANTAGES  CONCLUSION  REFERENCE 3
  • 4. 4  A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user.  It contains an inexpensive microprocessr in a stainless steel ibutton running a JVM and it is preloaded with applet.  The Java Ring is an extremely secure Java-powered electronic token .  The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an ibutton.  The ring has 134 KB of RAM, 32 KB of ROM, a real-time clock and a Java virtual machine, which is a piece of software that recognizes the Java language and translates it for the user's computer system.
  • 5. Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM. 5
  • 6. In the summer of 1989, Dallas Semiconductor Corp. produced the first stainless-steel-encapsulated memory device called iButton. IButton is the main component of java ring. Java Ring was introduced at their Java One Conference in 1998. 6
  • 7.  Java Virtual Machine (JVM).  RAM.  ROM.  Real-time clock.  iButton.  Blue dot receptor. 7
  • 8. Java ring is programmed with java application program and applets that communicate with the host application on the networked system. Applets are the small application that is designed to run on the another application system. The java virtual machine is the piece of software that recognizes the java language and translates the byte code, which is used by the system which is connected to the java ring via ring reader. 8
  • 9.  Java ring contains 134kb of non-volatile random access memory.  Program and data is stored.  This non-volatile random access memory offers high read/write speed and also provides temper resistance through instantaneous clearing of all memory when tempering is detected. This process is called rapid zeroization.  The NVRAM iButton memory can be erased or rewritten as often as necessary without wearing out. 9
  • 10. The java ring contains 32kb of ROM. A special kind of operating system called E- Commerce operating system which is based on java and JVM is stored in the ROM. This operating system handles all the operation which is happening in the iButton. It is stored in ROM because it is not supposed to be altered by the user. 10
  • 11.  In the java ring real time clock gives the exact time of the day.  The real time clock continuously run up to more than 10 years by the energy provided the lithium backup.  In addition, the processor itself is driven by an unstabilized ring oscillator operating over a range of 10 to 20 megahertz, so that the clock frequency of the processor is not constant and cannot be determined by external means. 11
  • 12. The jewel of the Java Ring is the Java iButton -- a one-million transistor, single chip trusted microcomputer with a powerful Java Virtual Machine (JVM) housed in a rugged and secure stainless-steel case Originally called "touch memory" devices, they were later renamed "iButtons." Packaged like batteries, iButtons have only a single active electrical contact on the top surface, with the stainless steel shell serving as ground. 12
  • 13.  Blue dot receptor lets you communicate with ibutton from pcs to microprocessor and embedded system.  The read/write operation will be done by this blue dot receptor provided by RS232 serial port adaptor.  Receptor cable connects to the USB port of PC or any embedded system.  The information is transferred between the ibutton and pc with momentary touching java ring . 13
  • 14. 14
  • 15.  Java ring is programmed with the applets according to our application.  For specific class of user specific java applets is preloaded in to the java ring.  All the information of the user is stored in the java ring.  User simply presses the signet of the java ring against the “blue dot” receptor and the system connected to the receptor performs the function that the applet instructs to do. 15
  • 16. Information is transferred between your iButton and a PC with a momentary contact at up to 142kbps. You simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. 16
  • 17. This barrier substrate and the triple-layer metal construction techniques employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring. 17
  • 18. iButtons have an advantage over conventional smart cards in term of durability and longevity. iButtons are rugged enough to withstand harsh environments. iButton uses java as a common programming language. 18
  • 19.  Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences.  Providing security.  Personalized services.  Access Control.  Time and attendance.  eCash.  Gaming Systems. 19
  • 20. Parents and teachers will have less control over children and students. Loss of privacy. 20
  • 21.  Java ring is highly durable because of its rugged and secure stainless packing. It is used in personal computing.  With its stainless steel armor, it offers the most durable packaging for a class of products that likely will suffer heavy use and abuse as personal possessions.  The iButton form factor permits attachment to a wide variety of personal accessories that includes rings, watchbands, key fobs, wallets, bracelets, and necklaces, so the user can select a variation that suits his or her lifestyle. 21
  • 23. 23