SlideShare uma empresa Scribd logo
1 de 32
JAVA RING
1
Presented by : Etty Mathews
Class : C6
Roll no. : 7
JAVA RING
 A finger ring that contains a small microprocessor
 a sort of smart card that is wearable on a finger
 It’s a stainless steel ring called I-button.
2
HISTORICAL BACKGROUND
 Dallas semiconductor Corp. Produced the first java ring
in 1989
 By 1990 this protocol was refined.
 Sun Microsystems Java ring was introduced at Java One
Conference in 1998.
 Earlier “touch memory”->“I-button”.
3
It is a 1-millon transistors in a single chip.
 The i-button is microcomputer with a
powerful JVM (Java Virtual Machine) in the
steel can.
 I-button is preloaded with applets (Little
Application programs).
 Packaged module has a single electric
contact and a ground return.
Micro chip
WHAT IS JAVA RING
4
 Lithium backed NVRAM offers high read/write speed
 Offers tamper resistance through instantaneous clearing.
 Data integrity and clock function maintained for more than
10 years.
 Tested at Celebration School, Orlando.
 Rings programmed with java applets.
 Operating System -E-commerce was designed
5
SECURITY
6
 Packaged in a 16 mm stainless steel can
 Protects from tampering like hard
knocks
 Rapid Zeroization occurs.
 Extreme temperature or voltage
causes Zeroization.
 A secret “Personal Identification
Number” is maintained.
Stainless-steel can
7
COMPONENTS
 Java Virtual Machine (JVM)
 RAM
ROM
Real Time Clock
 I-button
Blue Dot Receptor
 1 –Wire Interface
8
JAVA VIRTUAL MACHINE
(JVM)
 Its a piece of software, recognizes java language.
 Translates into byte code which can be used by the
system.
 Preloaded with small programs.
9
RAM
 Java ring contains Non-Volatile Random Access
Memory(NVRAM).
 Data stored in this NVRAM.
 Provides r/w & tamper resistance through Zeroization.
 Existing 6Kb can be extended up to 128 Kb.
 Lithium energy preserves the complete state.
 I-buttons when not contact with receptor has zero executing
speed.
10
ROM
 Contains 32 Kb of ROM
 E-Commerce & Java Virtual Machine
stored in the ROM.
 Not supposed to be altered by the user.
 Operating system handles operations in
i-button.
11
REAL TIME CLOCK
 It gives the exact time of the day.
32 Kilohertz crystal oscillator operates the time
 Energy provided by lithium backup
 Inconsistent clock frequency makes it safer
 It runs for more than 10 years with the lithium energy.
12
I-BUTTON
 Jewel of the java ring.
 Contains 1-million transistor processors in single
chip
I-button
13
 ROM,NVRAM is bonded to barrier substrate.
 Barrier substrate and triple layer deny access to data.
This helps to keep private keys and confidential data.
Barrier Substrate
Triple layer
14
 Figure shows a type of i-button
Lithium cell- for backup power
 Energy reservoir
 Quartz- for real time clock
15
 Has single data contact on front
 Does reading, writing and power applied to the module
 Lid is the data contact.
 This contact is connected to
Chip inside.
 Each button has unique
Registration number.
Some have it on the ROM also
64-bit registration number
16
 These numbers are globally unique.
No two i-buttons share the same number
 Needs physical contact with reader to function
 Button will stand up to harsh conditions.
 Zeroization occurs in case of
tampering.
Microchip in stainless-steel can
17
TYPES OF I-BUTTON
 Memory i-button
Stores typed text ,digitized photos.
 Java Powered Cryptographic i-button
Stores encrypted and decrypted data in JVM.
 Themochron i-button
Tracks time ,temperature and calendar etc.
18
BLUE DOT RECEPTOR
 Read /Write operation is done by RS232C serial port.
 Information is transferred through a momentary contact.
 Just touch the i-button to the receptor for data transfer.
 Has Speed up to 142Kbps.
Blue Dot
Receptor
19
1-WIRE INTERFACE
 Used for the communication between PC & I-button.
 Has different communication speeds.
 Every device has unique serial number.
 Bus master issues a reset
 A specific Slave device is selected by unique serial number.
 All other devices are ignored
 After selection data are read and written into button.
20
 Unique serial number is laser etched on to the chip.
64 bit registration number can be divided into three parts
 First 8 bit identify the family of i-button
Middle 48 bit identify the serial number
Last 8bit for error free reading
21
TMEX RUNTIME ENVIRONMENT (TRTE)
 Its a software to interface i-button and computer.
 It installs all drivers and software needed for the i-button.
 It supports Windows 32 bit
22
WORKING OF JAVA RING
 Java ring is programmed with applets that is specific for different users.
 Information transfers with a momentary contact at up to 142Kbps.
 Signet of the i-button is touched to the receptor.
 The receptor is cabled to the serial port which is attached to system.
23
 Signet of i-button is pressed to the receptor.
 System connected performs the necessary functions as instructed.
 Both ring and receptor have the user profile.
 It checks both the profile
 If authentication satisfies, the door
Opens.
Opening door using java ring
24
APPLICATIONS
 Store data such as secret code, credit card numbers etc.
 Can be affixed to badge ,watch ,keychain or ring.
 Can be used to store cash.
 Used to open doors.
25
 To get the account balance.
 Used in cars for security
Java ring used to unlock door
26
COMPARISON
 Can be compared to a credit/debit card.
 It has a magnetic strip which can be tampered.
 Transactions won’t be accepted.
 But i-button stand up the harsh conditions.
27
ADVANTAGES
 Ideal where information need to travel with person.
Replace many password protected devices for financial
transactions.
 More secure than using passwords.
 Withstand harsh conditions.
 Provide authentication to users with the PIN.
 Data transferred by electric conductivity, no radio frequency
needed.
28
DISADVANTAGES
 Java ring being most secure but receptor could be very
expensive.
 Many organization doesn’t know the existence of java ring.
 I-button have limited memory.
 Limited amount of information can be stored.
29
CURRENT LIFE USAGE
 Used by the students at Celebration School,
Orlando.
 In Istanbul, people use for e-cash transactions
 In U.S also it is used
30
CONCLUSION
 It is highly durable ( secure stainless steel packing)
It can be attached to a wide variety of accessories
like keychain etc.
In near future it will be widely used.
31
32

Mais conteúdo relacionado

Mais procurados

Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein TechnologyPapun Papun
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry reportShruthi K Gowda
 
Microprocessor & Micro-controller
Microprocessor & Micro-controllerMicroprocessor & Micro-controller
Microprocessor & Micro-controllerOm Bheda
 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final reportDuggirala Madhu
 
Digital jewellery by SH
Digital jewellery by SHDigital jewellery by SH
Digital jewellery by SHshhajira
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eyeChand Pasha
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Walletjolly9293
 
Clockless Chips - an Introduction
Clockless Chips - an Introduction Clockless Chips - an Introduction
Clockless Chips - an Introduction Ginoy Joy
 
Biochips seminar report
Biochips seminar reportBiochips seminar report
Biochips seminar reportGolam Murshid
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry Arohi Khandelwal
 

Mais procurados (20)

Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
 
Microprocessor & Micro-controller
Microprocessor & Micro-controllerMicroprocessor & Micro-controller
Microprocessor & Micro-controller
 
Java ring
Java ringJava ring
Java ring
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final report
 
Digital jewellery by SH
Digital jewellery by SHDigital jewellery by SH
Digital jewellery by SH
 
Smart memories
Smart memoriesSmart memories
Smart memories
 
I twin technology
I twin technologyI twin technology
I twin technology
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Wallet
 
Clockless Chips - an Introduction
Clockless Chips - an Introduction Clockless Chips - an Introduction
Clockless Chips - an Introduction
 
Money pad ppt
Money pad pptMoney pad ppt
Money pad ppt
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
 
Biochips seminar report
Biochips seminar reportBiochips seminar report
Biochips seminar report
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 

Semelhante a Java ring

Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Yogesh Bhalla
 
Introduction to Microcontrollers
Introduction to MicrocontrollersIntroduction to Microcontrollers
Introduction to Microcontrollersmike parks
 
ATmega8 based password controlled home appliance
ATmega8 based password controlled home applianceATmega8 based password controlled home appliance
ATmega8 based password controlled home applianceSusmit Sircar
 
Boimetric using 8051
Boimetric  using 8051 Boimetric  using 8051
Boimetric using 8051 Shilpa Nayak
 
Arduino PAPER ABOUT INTRODUCTION
Arduino PAPER ABOUT INTRODUCTION  Arduino PAPER ABOUT INTRODUCTION
Arduino PAPER ABOUT INTRODUCTION NAGASAI547
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptxKDivyaLatha
 
IoT and embedded systems.pptx
IoT and embedded systems.pptxIoT and embedded systems.pptx
IoT and embedded systems.pptxDanishKhan894003
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security systemNIT srinagar
 
Embedded System for begners and good for seminar
 Embedded System for begners and good for seminar Embedded System for begners and good for seminar
Embedded System for begners and good for seminarSwaraj Nayak
 
electronic voting machine by rfid
electronic voting machine by rfidelectronic voting machine by rfid
electronic voting machine by rfidSaurabh Uniyal
 
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptx
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptxINDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptx
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptxMeghdeepSingh
 
Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...Claude Ndayisenga
 
microcontroller and embedded system
microcontroller and embedded systemmicrocontroller and embedded system
microcontroller and embedded systempradeep rana
 

Semelhante a Java ring (20)

New Ring
New RingNew Ring
New Ring
 
Java ring
Java ringJava ring
Java ring
 
Java ring
Java ringJava ring
Java ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
Introduction to Microcontrollers
Introduction to MicrocontrollersIntroduction to Microcontrollers
Introduction to Microcontrollers
 
ATmega8 based password controlled home appliance
ATmega8 based password controlled home applianceATmega8 based password controlled home appliance
ATmega8 based password controlled home appliance
 
Smart cards
Smart cards Smart cards
Smart cards
 
Java Ring
Java Ring Java Ring
Java Ring
 
Presentation1
Presentation1Presentation1
Presentation1
 
java Ring
java Ringjava Ring
java Ring
 
Boimetric using 8051
Boimetric  using 8051 Boimetric  using 8051
Boimetric using 8051
 
Arduino PAPER ABOUT INTRODUCTION
Arduino PAPER ABOUT INTRODUCTION  Arduino PAPER ABOUT INTRODUCTION
Arduino PAPER ABOUT INTRODUCTION
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
IoT and embedded systems.pptx
IoT and embedded systems.pptxIoT and embedded systems.pptx
IoT and embedded systems.pptx
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
 
Embedded System for begners and good for seminar
 Embedded System for begners and good for seminar Embedded System for begners and good for seminar
Embedded System for begners and good for seminar
 
electronic voting machine by rfid
electronic voting machine by rfidelectronic voting machine by rfid
electronic voting machine by rfid
 
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptx
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptxINDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptx
INDUSTRIAL TRAINING REPORT EMBEDDED SYSTEM.pptx
 
Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...
 
microcontroller and embedded system
microcontroller and embedded systemmicrocontroller and embedded system
microcontroller and embedded system
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Java ring

  • 1. JAVA RING 1 Presented by : Etty Mathews Class : C6 Roll no. : 7
  • 2. JAVA RING  A finger ring that contains a small microprocessor  a sort of smart card that is wearable on a finger  It’s a stainless steel ring called I-button. 2
  • 3. HISTORICAL BACKGROUND  Dallas semiconductor Corp. Produced the first java ring in 1989  By 1990 this protocol was refined.  Sun Microsystems Java ring was introduced at Java One Conference in 1998.  Earlier “touch memory”->“I-button”. 3
  • 4. It is a 1-millon transistors in a single chip.  The i-button is microcomputer with a powerful JVM (Java Virtual Machine) in the steel can.  I-button is preloaded with applets (Little Application programs).  Packaged module has a single electric contact and a ground return. Micro chip WHAT IS JAVA RING 4
  • 5.  Lithium backed NVRAM offers high read/write speed  Offers tamper resistance through instantaneous clearing.  Data integrity and clock function maintained for more than 10 years.  Tested at Celebration School, Orlando.  Rings programmed with java applets.  Operating System -E-commerce was designed 5
  • 6. SECURITY 6  Packaged in a 16 mm stainless steel can  Protects from tampering like hard knocks  Rapid Zeroization occurs.  Extreme temperature or voltage causes Zeroization.  A secret “Personal Identification Number” is maintained. Stainless-steel can
  • 7. 7 COMPONENTS  Java Virtual Machine (JVM)  RAM ROM Real Time Clock  I-button Blue Dot Receptor  1 –Wire Interface
  • 8. 8 JAVA VIRTUAL MACHINE (JVM)  Its a piece of software, recognizes java language.  Translates into byte code which can be used by the system.  Preloaded with small programs.
  • 9. 9 RAM  Java ring contains Non-Volatile Random Access Memory(NVRAM).  Data stored in this NVRAM.  Provides r/w & tamper resistance through Zeroization.  Existing 6Kb can be extended up to 128 Kb.  Lithium energy preserves the complete state.  I-buttons when not contact with receptor has zero executing speed.
  • 10. 10 ROM  Contains 32 Kb of ROM  E-Commerce & Java Virtual Machine stored in the ROM.  Not supposed to be altered by the user.  Operating system handles operations in i-button.
  • 11. 11 REAL TIME CLOCK  It gives the exact time of the day. 32 Kilohertz crystal oscillator operates the time  Energy provided by lithium backup  Inconsistent clock frequency makes it safer  It runs for more than 10 years with the lithium energy.
  • 12. 12 I-BUTTON  Jewel of the java ring.  Contains 1-million transistor processors in single chip I-button
  • 13. 13  ROM,NVRAM is bonded to barrier substrate.  Barrier substrate and triple layer deny access to data. This helps to keep private keys and confidential data. Barrier Substrate Triple layer
  • 14. 14  Figure shows a type of i-button Lithium cell- for backup power  Energy reservoir  Quartz- for real time clock
  • 15. 15  Has single data contact on front  Does reading, writing and power applied to the module  Lid is the data contact.  This contact is connected to Chip inside.  Each button has unique Registration number. Some have it on the ROM also 64-bit registration number
  • 16. 16  These numbers are globally unique. No two i-buttons share the same number  Needs physical contact with reader to function  Button will stand up to harsh conditions.  Zeroization occurs in case of tampering. Microchip in stainless-steel can
  • 17. 17 TYPES OF I-BUTTON  Memory i-button Stores typed text ,digitized photos.  Java Powered Cryptographic i-button Stores encrypted and decrypted data in JVM.  Themochron i-button Tracks time ,temperature and calendar etc.
  • 18. 18 BLUE DOT RECEPTOR  Read /Write operation is done by RS232C serial port.  Information is transferred through a momentary contact.  Just touch the i-button to the receptor for data transfer.  Has Speed up to 142Kbps. Blue Dot Receptor
  • 19. 19 1-WIRE INTERFACE  Used for the communication between PC & I-button.  Has different communication speeds.  Every device has unique serial number.  Bus master issues a reset  A specific Slave device is selected by unique serial number.  All other devices are ignored  After selection data are read and written into button.
  • 20. 20  Unique serial number is laser etched on to the chip. 64 bit registration number can be divided into three parts  First 8 bit identify the family of i-button Middle 48 bit identify the serial number Last 8bit for error free reading
  • 21. 21 TMEX RUNTIME ENVIRONMENT (TRTE)  Its a software to interface i-button and computer.  It installs all drivers and software needed for the i-button.  It supports Windows 32 bit
  • 22. 22 WORKING OF JAVA RING  Java ring is programmed with applets that is specific for different users.  Information transfers with a momentary contact at up to 142Kbps.  Signet of the i-button is touched to the receptor.  The receptor is cabled to the serial port which is attached to system.
  • 23. 23  Signet of i-button is pressed to the receptor.  System connected performs the necessary functions as instructed.  Both ring and receptor have the user profile.  It checks both the profile  If authentication satisfies, the door Opens. Opening door using java ring
  • 24. 24 APPLICATIONS  Store data such as secret code, credit card numbers etc.  Can be affixed to badge ,watch ,keychain or ring.  Can be used to store cash.  Used to open doors.
  • 25. 25  To get the account balance.  Used in cars for security Java ring used to unlock door
  • 26. 26 COMPARISON  Can be compared to a credit/debit card.  It has a magnetic strip which can be tampered.  Transactions won’t be accepted.  But i-button stand up the harsh conditions.
  • 27. 27 ADVANTAGES  Ideal where information need to travel with person. Replace many password protected devices for financial transactions.  More secure than using passwords.  Withstand harsh conditions.  Provide authentication to users with the PIN.  Data transferred by electric conductivity, no radio frequency needed.
  • 28. 28 DISADVANTAGES  Java ring being most secure but receptor could be very expensive.  Many organization doesn’t know the existence of java ring.  I-button have limited memory.  Limited amount of information can be stored.
  • 29. 29 CURRENT LIFE USAGE  Used by the students at Celebration School, Orlando.  In Istanbul, people use for e-cash transactions  In U.S also it is used
  • 30. 30 CONCLUSION  It is highly durable ( secure stainless steel packing) It can be attached to a wide variety of accessories like keychain etc. In near future it will be widely used.
  • 31. 31
  • 32. 32