SlideShare ist ein Scribd-Unternehmen logo
1 von 33
JAVA RING
JAVA RING

Figure 1: prototype of stainless steel java ring
CONTENTS
•

INTRODUCTION

•

COMPONENTS

•

WORKING

•

SECURITY

•

APPLICATIONS

•

ADVANTAGES

•

DISADVANTAGES

•

CONCLUSION

•

REFERENCE
INTRODUCTION
• Java ring is a finger ring that contains a small
microprocessor with built in capabilities for the user.
• Java ring is a sort of a smartcard that is wearable on a
finger
• Java ring a stainless-steel ring,16-millimeters (0.6 inches)
in diameter.
CONTINUED…
• It contains an inexpensive microprocessor in a stainless
steel iButton which runs JVM and it is preloaded with applet.
• The java Ring is an extremely secure Java-Powered
electronic token.
• Java Ring have number of real-world application.
THE JAVA RING
• Contains a tiny Java Virtual Machine
• Implements the Java Card 2.0 API
• Stores information in NVRAM ,ROM

• Runs applets
• Includes microprocessor, memory, clock and battery
JAVA RING IN ITS NATURAL
ENVIRONMET..
COMPONENTS
• Java Virtual Machine (JVM)
•

RAM

•

ROM

•

real-time clock

•

iButton

•

Blue dot reciptor
JAVA VIRTUAL MACHINE
The java virtual machine is the piece of software that
recognizes the java language and translates the byte
Code.
RAM
• Java ring contains 134kb of non-volatile random
access memory .
• This non-volatile random access memory offers

high read/write speed.
• It also provides rapid zeroization.
ROM
• The java ring contains 32kb of ROM .
• Special kind of operating system called
e-commerce operating system is stored in the ROM
REAL TIME CLOCK
• Real time clock gives the exact time of the day and it can
run up to 10 years continuously .

• It is driven by a constant 32KHz crystal oscillator.
• In addition ,the frequency of the processor clock is
not constant ,ranges from 10-20MHz.
• This aspect prohibits hackers in obtaining the
information from the iButton.
i BUTTON
i BUTTON…
• The jewel of the java ring is the iButton.
• iButton is a computer chip enclosed in a thick stainless

steel can.
• It is originally called “touch memory devices they were
later renamed as “iButtons”.
• Java ring uses 1-wire protocol for communication
with the host and the iButton.
CONTINUED…
• The iButton is a mechanical packaging standard that
places a 1-Wire component inside a small stainless
steel "button" similar to a disk-shaped battery.
• Each iButton has a unique and unalterable address laser
attached onto its chip inside the can lid.
• The address can be used as a key or identifier for each
iButton.
i BUTTON STRUCTURE
BLUE DOT RECEPTOR
• The Blue Dot Receptors are iButton reader/probes that provide
convenient pipeline into the PC for iButton-to-PC

communication.

• The receptor's cable connects to a USB, serial, or parallel-port

1-Wire adapter, whichever type of port you wish to use.
• The receptor itself easily affixes to any accessible spot on

the front of the PC.

a
BLUE DOT RECEPTOR…
CONTINUED…
• Key features:
• It has a coiled cable for connecting iButtons to 1-Wire
networks .
• Adhesive pad for mounting on objects.
• Supports for up to two iButtons at once.
• Can be used with any Dallas Semiconductor port
adapter
WORKING
• Java Ring is programmed with the applets and
the programming is done according to our application
• Whenever the user pushes his ring on a ring reader(Blue
Dot Receptor), the corresponding application will take
place.
OPENING DOORS
Figure 5.2: Working process of Java Ring(Source: Java Card Technology
CONTINUED…
• Information is transferred between your iButton and a PC
with a momentary contact at up to 142kbps.
• You simply touch your iButton to a Blue Dot receptor or
other iButton probe, which is connected to a PC.
• The Blue Dot receptor is cabled to a 1-Wire adapter that is
attached to a spare PC port. 1-Wire adapters exist for USB,
serial, and parallel ports.
SECURITY
• The barrier substrate and the triple-layer metal construction

techniques employed in the silicon fabrication effectively deny
unauthorized access to the data stored in the NVRAM. If any

attempt is made to penetrate these barriers, the NVRAM data is
immediately erased.
• Java rings are authorized through Personal Identification

Numbers

(PINs) so that no one can steal a person's ring and use that ring.
APPLICATIONS
• The java ring can be used to hold secret codes,
credit cards numbers, driver license, other wallet
contents, and even some electronic cash.
•

Its greatest promise appears to lie in its capacity to
interact with Internet applications to support strong
remote authentication and remotely authorized financial

transactions.
CONTINUED…
• For opening the door
• E-banking application
• Logging in your PC

• Providing security in your car
• Used to fill forms
ADVANTAGES
• The Java Rings are very easy and convenient for
users.
• It can function between -40C to+70C and in much
harsher environment.
• It has higher durability.
CONTINUED…
• Easier for administrator to maintain the security
infrastructure.
• Provides real memory, more power, and a capacity
for dynamic programming .
• Provides authentication to user which is crucial for many
applications.
DISADVANTAGES
• The cost of implementing the system is high.
• It needs a high level tools and method in order to

program

application efficently, reliabily,securily.
• iButton has a limited processor capacity and memory , which
means an individual might need to carry more
Java Ring.

than one
CONCLUSION
• Although Java Rings aren't widely used yet, such rings or
similar devices could have a number of real-world
applications, such as starting your car and automatically
adjust to your preferences.
•

The key issue about a wearable computer (java ring) is not
whether it is a ring or another form factor: the deciding point is
that you will always have it with you.
REFERENCES
• http://www.javaworld.com/
• http://www.people.uchicago.edu/
• http://www.electronics.howstuffworks.com
abhi.globalistic@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

virtual-assistant-160214154006.pdf
virtual-assistant-160214154006.pdfvirtual-assistant-160214154006.pdf
virtual-assistant-160214154006.pdf
HarshKumar534677
 
DIGITAL JEWELLERY
DIGITAL JEWELLERYDIGITAL JEWELLERY
DIGITAL JEWELLERY
veera
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
Aparna Nk
 

Was ist angesagt? (20)

java-ring
 java-ring java-ring
java-ring
 
E ball technology
E ball technologyE ball technology
E ball technology
 
SMART NOTE TAKER
SMART NOTE TAKERSMART NOTE TAKER
SMART NOTE TAKER
 
5 Pen PC technology seminar report
5 Pen PC technology seminar report5 Pen PC technology seminar report
5 Pen PC technology seminar report
 
skinput technology
skinput technologyskinput technology
skinput technology
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
digital jewelry
digital jewelrydigital jewelry
digital jewelry
 
Java ring
Java ring   Java ring
Java ring
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
virtual-assistant-160214154006.pdf
virtual-assistant-160214154006.pdfvirtual-assistant-160214154006.pdf
virtual-assistant-160214154006.pdf
 
DIGITAL JEWELLERY
DIGITAL JEWELLERYDIGITAL JEWELLERY
DIGITAL JEWELLERY
 
Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
COMPUTER CLOTHING
COMPUTER CLOTHINGCOMPUTER CLOTHING
COMPUTER CLOTHING
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 
E ball technology ppt
E ball technology pptE ball technology ppt
E ball technology ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 

Ähnlich wie Java Ring

Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
Yogesh Bhalla
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
Sahithi Naraparaju
 

Ähnlich wie Java Ring (20)

My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
java ring
java ringjava ring
java ring
 
Java ring
Java ringJava ring
Java ring
 
New Ring
New RingNew Ring
New Ring
 
Java ring
Java ringJava ring
Java ring
 
Presentation1
Presentation1Presentation1
Presentation1
 
Java Ring
Java Ring Java Ring
Java Ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
Java ring
Java ringJava ring
Java ring
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
 
Java Ring
Java RingJava Ring
Java Ring
 
How i built my own irrigation controller
How i built my own irrigation controllerHow i built my own irrigation controller
How i built my own irrigation controller
 
java Ring
java Ringjava Ring
java Ring
 
Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.Arduino interfacing with bluetooth.
Arduino interfacing with bluetooth.
 
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
 
IoT and Its Application
IoT and Its ApplicationIoT and Its Application
IoT and Its Application
 
CEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemCEIS101: IoT Home Security System
CEIS101: IoT Home Security System
 

Mehr von Abhishek Abhi

Mehr von Abhishek Abhi (7)

Blue brain
Blue brainBlue brain
Blue brain
 
3d search
3d search3d search
3d search
 
3D Internet
3D Internet 3D Internet
3D Internet
 
Augmented reality The future of computing
Augmented reality The future of computingAugmented reality The future of computing
Augmented reality The future of computing
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Java Ring

  • 2. JAVA RING Figure 1: prototype of stainless steel java ring
  • 4. INTRODUCTION • Java ring is a finger ring that contains a small microprocessor with built in capabilities for the user. • Java ring is a sort of a smartcard that is wearable on a finger • Java ring a stainless-steel ring,16-millimeters (0.6 inches) in diameter.
  • 5. CONTINUED… • It contains an inexpensive microprocessor in a stainless steel iButton which runs JVM and it is preloaded with applet. • The java Ring is an extremely secure Java-Powered electronic token. • Java Ring have number of real-world application.
  • 6. THE JAVA RING • Contains a tiny Java Virtual Machine • Implements the Java Card 2.0 API • Stores information in NVRAM ,ROM • Runs applets • Includes microprocessor, memory, clock and battery
  • 7. JAVA RING IN ITS NATURAL ENVIRONMET..
  • 8. COMPONENTS • Java Virtual Machine (JVM) • RAM • ROM • real-time clock • iButton • Blue dot reciptor
  • 9. JAVA VIRTUAL MACHINE The java virtual machine is the piece of software that recognizes the java language and translates the byte Code.
  • 10.
  • 11. RAM • Java ring contains 134kb of non-volatile random access memory . • This non-volatile random access memory offers high read/write speed. • It also provides rapid zeroization.
  • 12. ROM • The java ring contains 32kb of ROM . • Special kind of operating system called e-commerce operating system is stored in the ROM
  • 13. REAL TIME CLOCK • Real time clock gives the exact time of the day and it can run up to 10 years continuously . • It is driven by a constant 32KHz crystal oscillator. • In addition ,the frequency of the processor clock is not constant ,ranges from 10-20MHz. • This aspect prohibits hackers in obtaining the information from the iButton.
  • 15. i BUTTON… • The jewel of the java ring is the iButton. • iButton is a computer chip enclosed in a thick stainless steel can. • It is originally called “touch memory devices they were later renamed as “iButtons”. • Java ring uses 1-wire protocol for communication with the host and the iButton.
  • 16. CONTINUED… • The iButton is a mechanical packaging standard that places a 1-Wire component inside a small stainless steel "button" similar to a disk-shaped battery. • Each iButton has a unique and unalterable address laser attached onto its chip inside the can lid. • The address can be used as a key or identifier for each iButton.
  • 18. BLUE DOT RECEPTOR • The Blue Dot Receptors are iButton reader/probes that provide convenient pipeline into the PC for iButton-to-PC communication. • The receptor's cable connects to a USB, serial, or parallel-port 1-Wire adapter, whichever type of port you wish to use. • The receptor itself easily affixes to any accessible spot on the front of the PC. a
  • 20. CONTINUED… • Key features: • It has a coiled cable for connecting iButtons to 1-Wire networks . • Adhesive pad for mounting on objects. • Supports for up to two iButtons at once. • Can be used with any Dallas Semiconductor port adapter
  • 21. WORKING • Java Ring is programmed with the applets and the programming is done according to our application • Whenever the user pushes his ring on a ring reader(Blue Dot Receptor), the corresponding application will take place.
  • 23. Figure 5.2: Working process of Java Ring(Source: Java Card Technology
  • 24. CONTINUED… • Information is transferred between your iButton and a PC with a momentary contact at up to 142kbps. • You simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. • The Blue Dot receptor is cabled to a 1-Wire adapter that is attached to a spare PC port. 1-Wire adapters exist for USB, serial, and parallel ports.
  • 25. SECURITY • The barrier substrate and the triple-layer metal construction techniques employed in the silicon fabrication effectively deny unauthorized access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. • Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.
  • 26. APPLICATIONS • The java ring can be used to hold secret codes, credit cards numbers, driver license, other wallet contents, and even some electronic cash. • Its greatest promise appears to lie in its capacity to interact with Internet applications to support strong remote authentication and remotely authorized financial transactions.
  • 27. CONTINUED… • For opening the door • E-banking application • Logging in your PC • Providing security in your car • Used to fill forms
  • 28. ADVANTAGES • The Java Rings are very easy and convenient for users. • It can function between -40C to+70C and in much harsher environment. • It has higher durability.
  • 29. CONTINUED… • Easier for administrator to maintain the security infrastructure. • Provides real memory, more power, and a capacity for dynamic programming . • Provides authentication to user which is crucial for many applications.
  • 30. DISADVANTAGES • The cost of implementing the system is high. • It needs a high level tools and method in order to program application efficently, reliabily,securily. • iButton has a limited processor capacity and memory , which means an individual might need to carry more Java Ring. than one
  • 31. CONCLUSION • Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and automatically adjust to your preferences. • The key issue about a wearable computer (java ring) is not whether it is a ring or another form factor: the deciding point is that you will always have it with you.