SlideShare ist ein Scribd-Unternehmen logo
1 von 14
1
BY
MALINI.M
SOWNDRYA.G
3RD CSE
INTRODUCTION
 Digital jewellery is the fashion jewelry
with embedded intelligence.
 Each piece of jewelry will contain a
fraction of the components found in a
conventional mobile phone.
 Together, the digital-jewelry cell phone
should work just like a conventional cell
phone.
 The digital jewellery are Braclets ,
chains, necklace, ear rings, java ring
etc,..
 Among them java ring is compact and
easy to carry anywhere and it is also
secure the information with unique ID.
2
WHAT IS JAVA RING ?
• Java ring is the finger ring that contain a small
microprocessor with build-in capabilities for the user, a
sort of smart card that is wearable on the finger.
• The main objective of the Java Ring is to maintain security
and portable.
COMPONENTS:
 134KB of RAM
 32KB of ROM
 Real Time Clock
 Java Virtual Machine
 iButton
 Blue Dot Receptor
3
4
WHY JAVA RING ?
Only by JAVA it is supported to all
OS. That why even supported for
Ecommerce OS(e-cash).
By JVM ,it supports automatic
garbage collection for efficient reuse
of memory space.
An applet written to run on the java
ring follows a very simple structure.
IMPLEMENTATION OF JAVA RING
• Java Ring is used for the security
purposes and also used for
authority permissions.
• For example ,in a family son ,
father, mother and other members
are not anticipate about the speed
limits.
• So by the use of java Ring is to
limit the features and speed in car
to avoid accidents.
5
IMPLEMENTATION OF JAVA RING
• By the use of Java Ring the unauthorized
peoples cannot use or access the device.
And there is personal identification
number(PIN).so no one can do
mischievous behaviour can be done, even
it is lost.
• The java Ring is used for the security
purposes.
• In future ,the java Ring is used to start
the car by unique ID.
6
REQUIREMENTS OF JAVA RING
• The Java Ring has 134KB of non volatile Random Access
Memory(RAM),by this it offers high read/write speed.
• Rapid erasing of the SRAM memory is known as zeroization.
When an iButton detects any intrusion, it erases its private
keys leading to zeroization.
• The Java Ring has 32KB of Read Only Memory(ROM) and a
special kind of OS called E-Commerce OS is stored in ROM.
• In Real Time Clock,the frequency of the processor clock is
not constant that ranges from 10-20MHz.This aspects
prohibits the hackers in obtaining the information from
iButton.
7
REQUIREMENTS OF JAVA RING
• Java Ring uses the 1-wire protocol for
communication with the host and the
iButton.
• Java iButton is designed more compatible
in java card 2.0 standard processor.
• The iButton memory can be read or
written with a momentary contact to the
"Blue Dot" receptor provided by the
adapter.
• The lifetime of java Ring is atleast for 10
years.
8
PICTORIAL REPRESENTATION
9
WORKING AND APPLICATION
• Java Ring is programmed with the applets
,whenever the user pushes the ring on the ring
Reader(Blue Dot Receptor) the corresponding
application take place.
• Communication is based on APDU format.
APPLICATIONS:
 To unlock the cars/doors/computers .
 Secure way of identifying the asset.
 Banks , authorized areas
 e-cash
 Useful to carry informations even URL’s.
10
ADVANTAGES AND DISADVANTAGES
ADVANTAGE:
* Many information and passwords carried in different devices is replaced in
single Java Ring.
* Higher durability.
* It functions even in -40C to +70C,in harsher
environment.
* It supports Dynamic programming.
* cost negligible.
* Asset management ,access control,e-cash etc..,
DISADVANTAGE:
* Many peoples don’t aware of it.
* iButton has a limited processor power and memory.
* High level tools and method is required to program application
efficiently and reliablity.
11
CONCLUSION
• The key issue about a wearable
computer (Java Ring ) is that
whether it is a ring or another
form factor : the deciding point
that always that will be with
you.
12
13
REFERENCES
 www.javaworld.com
 www.123seminaronly.com
 www.javaringblogspot.com
THANK YOU
14

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Java Ring
Java RingJava Ring
Java Ring
 
Java ring Engg SEMINAR
Java ring Engg SEMINARJava ring Engg SEMINAR
Java ring Engg SEMINAR
 
Java Ring
Java RingJava Ring
Java Ring
 
Java ring
Java ringJava ring
Java ring
 
Java Ring
Java Ring Java Ring
Java Ring
 
My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
New Ring
New RingNew Ring
New Ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
Presentation1
Presentation1Presentation1
Presentation1
 
java ring
java ringjava ring
java ring
 
Dj ppt
Dj pptDj ppt
Dj ppt
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 
DIGITAL JEWELLERY
DIGITAL JEWELLERYDIGITAL JEWELLERY
DIGITAL JEWELLERY
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 

Andere mochten auch

Robo's in constructions
Robo's in constructionsRobo's in constructions
Robo's in constructionsmkanth
 
Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation   Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation Martin Deal
 
Bio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular BiologyBio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular BiologyBob Eisenberg
 
Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)Vinod Bobade
 
Blue gene technology
Blue gene technologyBlue gene technology
Blue gene technologyVivek Jha
 
ANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONDeepak kango
 
Motion capture technology
Motion capture technologyMotion capture technology
Motion capture technologyArun MK
 
Bio Inspired Computing Final Version
Bio Inspired Computing Final VersionBio Inspired Computing Final Version
Bio Inspired Computing Final VersionThomas Petry
 
Java card technology
Java card technologyJava card technology
Java card technologyAmol Kamble
 
Motion Capturing Technology
Motion Capturing TechnologyMotion Capturing Technology
Motion Capturing TechnologyMurlidhar Sarda
 
MOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGYMOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGYShaik Tanveer
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry reportShruthi K Gowda
 
Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Asiri Wijesinghe
 

Andere mochten auch (18)

Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Robo's in constructions
Robo's in constructionsRobo's in constructions
Robo's in constructions
 
Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation   Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation
 
DIGITAL JEWELERY
DIGITAL JEWELERYDIGITAL JEWELERY
DIGITAL JEWELERY
 
Bio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular BiologyBio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular Biology
 
Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)
 
Blue gene technology
Blue gene technologyBlue gene technology
Blue gene technology
 
ANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATION
 
Motion Capture
Motion CaptureMotion Capture
Motion Capture
 
Motion capture technology
Motion capture technologyMotion capture technology
Motion capture technology
 
Bio Inspired Computing Final Version
Bio Inspired Computing Final VersionBio Inspired Computing Final Version
Bio Inspired Computing Final Version
 
Java card technology
Java card technologyJava card technology
Java card technology
 
Motion Capturing Technology
Motion Capturing TechnologyMotion Capturing Technology
Motion Capturing Technology
 
MOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGYMOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGY
 
Motion capture
Motion captureMotion capture
Motion capture
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
 
Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)
 

Ähnlich wie Digital Jewelry: An Overview of the Java Ring

Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Jana Vontari
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamAnshika Nigam
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital JwelleryJawhar Ali
 
DIGITAL JWELLERY
DIGITAL JWELLERYDIGITAL JWELLERY
DIGITAL JWELLERYMD Ibrahim
 
CocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best PracticesCocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best PracticesMutual Mobile
 
Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Julien SIMON
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptxKDivyaLatha
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellaryAjay kumar
 
Eric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 SlidesEric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 Slidesevetillard
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...CODE BLUE
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecurityOKsystem
 

Ähnlich wie Digital Jewelry: An Overview of the Java Ring (16)

Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Java Ring
Java RingJava Ring
Java Ring
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika Nigam
 
Google glass
Google glassGoogle glass
Google glass
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
DIGITAL JWELLERY
DIGITAL JWELLERYDIGITAL JWELLERY
DIGITAL JWELLERY
 
CocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best PracticesCocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best Practices
 
Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Eric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 SlidesEric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 Slides
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
 

Kürzlich hochgeladen

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Digital Jewelry: An Overview of the Java Ring

  • 2. INTRODUCTION  Digital jewellery is the fashion jewelry with embedded intelligence.  Each piece of jewelry will contain a fraction of the components found in a conventional mobile phone.  Together, the digital-jewelry cell phone should work just like a conventional cell phone.  The digital jewellery are Braclets , chains, necklace, ear rings, java ring etc,..  Among them java ring is compact and easy to carry anywhere and it is also secure the information with unique ID. 2
  • 3. WHAT IS JAVA RING ? • Java ring is the finger ring that contain a small microprocessor with build-in capabilities for the user, a sort of smart card that is wearable on the finger. • The main objective of the Java Ring is to maintain security and portable. COMPONENTS:  134KB of RAM  32KB of ROM  Real Time Clock  Java Virtual Machine  iButton  Blue Dot Receptor 3
  • 4. 4 WHY JAVA RING ? Only by JAVA it is supported to all OS. That why even supported for Ecommerce OS(e-cash). By JVM ,it supports automatic garbage collection for efficient reuse of memory space. An applet written to run on the java ring follows a very simple structure.
  • 5. IMPLEMENTATION OF JAVA RING • Java Ring is used for the security purposes and also used for authority permissions. • For example ,in a family son , father, mother and other members are not anticipate about the speed limits. • So by the use of java Ring is to limit the features and speed in car to avoid accidents. 5
  • 6. IMPLEMENTATION OF JAVA RING • By the use of Java Ring the unauthorized peoples cannot use or access the device. And there is personal identification number(PIN).so no one can do mischievous behaviour can be done, even it is lost. • The java Ring is used for the security purposes. • In future ,the java Ring is used to start the car by unique ID. 6
  • 7. REQUIREMENTS OF JAVA RING • The Java Ring has 134KB of non volatile Random Access Memory(RAM),by this it offers high read/write speed. • Rapid erasing of the SRAM memory is known as zeroization. When an iButton detects any intrusion, it erases its private keys leading to zeroization. • The Java Ring has 32KB of Read Only Memory(ROM) and a special kind of OS called E-Commerce OS is stored in ROM. • In Real Time Clock,the frequency of the processor clock is not constant that ranges from 10-20MHz.This aspects prohibits the hackers in obtaining the information from iButton. 7
  • 8. REQUIREMENTS OF JAVA RING • Java Ring uses the 1-wire protocol for communication with the host and the iButton. • Java iButton is designed more compatible in java card 2.0 standard processor. • The iButton memory can be read or written with a momentary contact to the "Blue Dot" receptor provided by the adapter. • The lifetime of java Ring is atleast for 10 years. 8
  • 10. WORKING AND APPLICATION • Java Ring is programmed with the applets ,whenever the user pushes the ring on the ring Reader(Blue Dot Receptor) the corresponding application take place. • Communication is based on APDU format. APPLICATIONS:  To unlock the cars/doors/computers .  Secure way of identifying the asset.  Banks , authorized areas  e-cash  Useful to carry informations even URL’s. 10
  • 11. ADVANTAGES AND DISADVANTAGES ADVANTAGE: * Many information and passwords carried in different devices is replaced in single Java Ring. * Higher durability. * It functions even in -40C to +70C,in harsher environment. * It supports Dynamic programming. * cost negligible. * Asset management ,access control,e-cash etc.., DISADVANTAGE: * Many peoples don’t aware of it. * iButton has a limited processor power and memory. * High level tools and method is required to program application efficiently and reliablity. 11
  • 12. CONCLUSION • The key issue about a wearable computer (Java Ring ) is that whether it is a ring or another form factor : the deciding point that always that will be with you. 12