SlideShare uma empresa Scribd logo
1 de 4
Java Ring
What is Java Ring ?
The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter that houses
a 1-million-transistor processor, called an iButton
The Java Ring is a tiny wearable computer with 134kilobytes of RAM.
RAM has 6KB of data memory and to 32KB 0f program memory
6KB may not sound like much, but it is 20 percent more memory
than the first computer ever used .

Even 6 K is enough to hold our secret codes, our credit card
numbers, our driver license, other wallet contents, and even some electronic cash. The
ring can also store a few important URLs.


The Java Ring is a wearable computer that can be used to authenticate users to services
on the Internet. A user only has to push the ring on his finger on a Java Ring reader for
about a second.

The key issue about a wearable computer is not whether it is a ring
or another form factor: the deciding point is that we will always
have it with us. Many aspects of computing change once there
is no need to go to a special room to get at the computer.

INSIDE JAVARING
A Java Ring is a finger ring that contains à
JAVA VIRTUAL MACHINE
134KB RAM
32KB ROM
REAL TIME CLOCK
IBUTTON
BLUE DOT RECEPTOR

JAVA VIRTUAL MACHINE
JVM is the piece of software that recognises java language and translate into byte code,
which is used by system connected to java ring via reader.

134KB of RAM
It is used to store program and data. The NVRAM offers high R/W speed and also
provides temper resistance through instantaneous clearing of all memory when tempering
is detected.
Energy provided by lithium backup preserves complete state of machine when java ring
is disconnected from user
Performs garbage collection to deal with the objects which are out of scope and recycle
memory. Applets can be loaded or unloaded from java iButton
32KB of ROM
Special kind of operating system called E-commerce based on java and JVM is stored in
the ROM. This is because it is not supposed to be altered by the user. Operating system
handles all operations happening in iButton.
REAL TIME CLOCK
It gives exact time of the day. It can run up to 10 years by energy provided by lithium
backup. Processor clock frequency is not constant and cannot be determined by external
means.

The jewel of the Java Ring is the Java iButton

The iButton is a computer chip enclosed in a 16mm thick stainless steel can. Because of
this unique and durable container, up-to-date information can travel with a person or
object anywhere they go. Designed to be fully compatible with the Java Card 2.0 standard
the processor features a high-speed , large RAM and ROM memory capacity, and an
unalterable real-time clock. It is small and portable enough to attach to a key fob, ring,
watch, or other personal items.

Types of iButtons

• Memory iButton

• Java-powered cryptographic iButton

• Thermochron iButton


iBUTTON COMPONENTS
Can :
It is an electronic communications
interface. Each can has a data contact,
called the 'lid', and a ground contact,
called the 'base'. Each of these contacts
is connected to the silicon chip inside.

Grommet :

The two contacts are separated by a polypropylene grommet .Information is transferred
between iButton and a PC with a momentary contact, at up to 142K bits per second.

To do that one presses iButton to the Blue Dot receptor, a $15 pipeline into PC. The Blue
Dot sticks to any convenient spot on the front of a PC and is cabled to the serial or
parallel port in the back.
By simply touching the iButton to the two contacts described
above ,we can communicate with it through our 1-Wire protocol.
The 1-Wire interface has two communication speeds: standard
mode at 16kbps, and overdrive mode at 142kbps

Information is transferred between an iButton and a PC with a
momentary contact at up to 142kbps. We simply need to touch our
iButton to a Blue Dot receptor or other iButton probe, which is
connected to a PC.

Blue Dot Receptor

The R/W operation in java ring is done by blue dot receptor provided by RS232 serial
port adapter. DS1402D-DR8 is a 1-wire network cable designed to connect to any serial
or USB 1-wire port that has up to two buttons simultaneously.

Information is transferred between an iButton and a PC with a momentary contact, at up
to 142kbps.We just need to touch our iButton to a Blue Dot receptor or other iButton
probe, which is connected to a PC.

The Blue Dot receptor is cabled to a 1-wire adapter that is attached to the PC’s serial or
parallel port.
Each receptor contains two Blue Dots to accommodate instances where multiple iButtons
are required to complete a transaction.

TMEX RUNTIME ENVIRONMENT(RTE)

A layer of software is required to interface iButtons to computers and produce the desired
information in the desired format.

For all iButtons ,iButton-TMEX is a software platform on which to build applications.
TMEX’s architecture follows the International Standards Organization(ISO) reference
model of Open System Interconnection (OSI), a protocol with seven layers denoted as
Physical, Link, Network,Transport,Session , Presentation, and Application.

iButton Viewer
With the TMEX Windows installations we get the iButtons Viewer, an application for
exploring iButton features from our PC.

iButton Viewer automatically finds iButtons on our system and displays their serial
numbers with a description of relevant features and menu options

Java Virtual Machine

Automatic garbage collection for efficient reuse of memory space.

Add or delete applets in a secure manner to update applications.
Java-accessible unique 64 bit registration number supplements IP addresses to make the
intermittent network of roaming iButtons globally addressable.

Security in Java Ring
Confidential data is stored in Non Volatile RAM memory.
Barrier substrate and triple layer technique deny unauthorized access to NVRAM
confidential data.
If any unauthorized access penetrates the two layers, its detected by security processor
and data is erased immediately. This is called as Rapid Zeroization.
The communication between iButton and outside world is limited to single line, provides
security against hard ware attacks.
Processor clock frequency is not constant and cannot be determined by external means

Applications

Some of the applications of Java ring are in:
e-banking to get the account balance of customer.

Configuring our car components according to preferences.

Opening door to prevent entry of unauthorized users.

The Java Ring, therefore, is simply the latest and most complex descendant of a long line
of products that have proven themselves to be highly successful in the marketplace. With
its stainless steel armour, it offers the most durable packaging for a class of products that
likely will suffer heavy use and abuse as personal possessions. The iButton form factor
permits attachment to a wide variety of personal accessories that includes rings,
watchbands, key fobs, wallets, bracelets, and necklaces, so the user can select a variation
that suits his or her lifestyle.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Digitaljewellery presentation
Digitaljewellery presentationDigitaljewellery presentation
Digitaljewellery presentation
 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final report
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
 
E-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTE-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORT
 
Neuralink Seminar ppt
Neuralink Seminar pptNeuralink Seminar ppt
Neuralink Seminar ppt
 
Digital jewellery ppt
Digital   jewellery pptDigital   jewellery ppt
Digital jewellery ppt
 
무선 센서 네트워크 기반 Iot를 위한 통신 기술
무선 센서 네트워크 기반 Iot를 위한 통신 기술무선 센서 네트워크 기반 Iot를 위한 통신 기술
무선 센서 네트워크 기반 Iot를 위한 통신 기술
 
Blockchain
BlockchainBlockchain
Blockchain
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
CLOCKLESS CHIP BY Saurabh singh
CLOCKLESS CHIP BY Saurabh singhCLOCKLESS CHIP BY Saurabh singh
CLOCKLESS CHIP BY Saurabh singh
 
Case studies in io t smart-home
Case studies in io t  smart-homeCase studies in io t  smart-home
Case studies in io t smart-home
 
iTwin
iTwiniTwin
iTwin
 
Millipede presentation
Millipede presentationMillipede presentation
Millipede presentation
 
I twin technology
I twin technologyI twin technology
I twin technology
 
I twin technology
I twin technologyI twin technology
I twin technology
 
Diamond chip
Diamond chipDiamond chip
Diamond chip
 
History Of Cell Phones
History Of Cell PhonesHistory Of Cell Phones
History Of Cell Phones
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Semelhante a Java ring

Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Yogesh Bhalla
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptsowndryaganesh
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAlok Ranjan
 
My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ringarun Prabha
 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Naruin
 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Kyle
 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2ekul
 
IRJET - Eyeblink Controlled Virtual Keyboard using Raspberry Pi
IRJET -  	  Eyeblink Controlled Virtual Keyboard using Raspberry PiIRJET -  	  Eyeblink Controlled Virtual Keyboard using Raspberry Pi
IRJET - Eyeblink Controlled Virtual Keyboard using Raspberry PiIRJET Journal
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Jana Vontari
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESIRJET Journal
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016joebursell
 

Semelhante a Java ring (20)

New Ring
New RingNew Ring
New Ring
 
Java Ring
Java Ring Java Ring
Java Ring
 
Java ring
Java ringJava ring
Java ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
java Ring
java Ringjava Ring
java Ring
 
JAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.pptJAVA RING WITH IMPLEMENTATION.ppt
JAVA RING WITH IMPLEMENTATION.ppt
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
Java ring
Java ringJava ring
Java ring
 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2
 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2
 
Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2Hcs Topic 3 Peripherals V2
Hcs Topic 3 Peripherals V2
 
IRJET - Eyeblink Controlled Virtual Keyboard using Raspberry Pi
IRJET -  	  Eyeblink Controlled Virtual Keyboard using Raspberry PiIRJET -  	  Eyeblink Controlled Virtual Keyboard using Raspberry Pi
IRJET - Eyeblink Controlled Virtual Keyboard using Raspberry Pi
 
java ring
java ringjava ring
java ring
 
Presentation1
Presentation1Presentation1
Presentation1
 
Java Ring
Java RingJava Ring
Java Ring
 
Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
 
IoT Intro and Demo
IoT Intro and DemoIoT Intro and Demo
IoT Intro and Demo
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
 

Último

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Último (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Java ring

  • 1. Java Ring What is Java Ring ? The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter that houses a 1-million-transistor processor, called an iButton The Java Ring is a tiny wearable computer with 134kilobytes of RAM. RAM has 6KB of data memory and to 32KB 0f program memory 6KB may not sound like much, but it is 20 percent more memory than the first computer ever used . Even 6 K is enough to hold our secret codes, our credit card numbers, our driver license, other wallet contents, and even some electronic cash. The ring can also store a few important URLs. The Java Ring is a wearable computer that can be used to authenticate users to services on the Internet. A user only has to push the ring on his finger on a Java Ring reader for about a second. The key issue about a wearable computer is not whether it is a ring or another form factor: the deciding point is that we will always have it with us. Many aspects of computing change once there is no need to go to a special room to get at the computer. INSIDE JAVARING A Java Ring is a finger ring that contains à JAVA VIRTUAL MACHINE 134KB RAM 32KB ROM REAL TIME CLOCK IBUTTON BLUE DOT RECEPTOR JAVA VIRTUAL MACHINE JVM is the piece of software that recognises java language and translate into byte code, which is used by system connected to java ring via reader. 134KB of RAM It is used to store program and data. The NVRAM offers high R/W speed and also provides temper resistance through instantaneous clearing of all memory when tempering is detected. Energy provided by lithium backup preserves complete state of machine when java ring is disconnected from user Performs garbage collection to deal with the objects which are out of scope and recycle memory. Applets can be loaded or unloaded from java iButton
  • 2. 32KB of ROM Special kind of operating system called E-commerce based on java and JVM is stored in the ROM. This is because it is not supposed to be altered by the user. Operating system handles all operations happening in iButton. REAL TIME CLOCK It gives exact time of the day. It can run up to 10 years by energy provided by lithium backup. Processor clock frequency is not constant and cannot be determined by external means. The jewel of the Java Ring is the Java iButton The iButton is a computer chip enclosed in a 16mm thick stainless steel can. Because of this unique and durable container, up-to-date information can travel with a person or object anywhere they go. Designed to be fully compatible with the Java Card 2.0 standard the processor features a high-speed , large RAM and ROM memory capacity, and an unalterable real-time clock. It is small and portable enough to attach to a key fob, ring, watch, or other personal items. Types of iButtons • Memory iButton • Java-powered cryptographic iButton • Thermochron iButton iBUTTON COMPONENTS Can : It is an electronic communications interface. Each can has a data contact, called the 'lid', and a ground contact, called the 'base'. Each of these contacts is connected to the silicon chip inside. Grommet : The two contacts are separated by a polypropylene grommet .Information is transferred between iButton and a PC with a momentary contact, at up to 142K bits per second. To do that one presses iButton to the Blue Dot receptor, a $15 pipeline into PC. The Blue Dot sticks to any convenient spot on the front of a PC and is cabled to the serial or parallel port in the back. By simply touching the iButton to the two contacts described above ,we can communicate with it through our 1-Wire protocol.
  • 3. The 1-Wire interface has two communication speeds: standard mode at 16kbps, and overdrive mode at 142kbps Information is transferred between an iButton and a PC with a momentary contact at up to 142kbps. We simply need to touch our iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. Blue Dot Receptor The R/W operation in java ring is done by blue dot receptor provided by RS232 serial port adapter. DS1402D-DR8 is a 1-wire network cable designed to connect to any serial or USB 1-wire port that has up to two buttons simultaneously. Information is transferred between an iButton and a PC with a momentary contact, at up to 142kbps.We just need to touch our iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. The Blue Dot receptor is cabled to a 1-wire adapter that is attached to the PC’s serial or parallel port. Each receptor contains two Blue Dots to accommodate instances where multiple iButtons are required to complete a transaction. TMEX RUNTIME ENVIRONMENT(RTE) A layer of software is required to interface iButtons to computers and produce the desired information in the desired format. For all iButtons ,iButton-TMEX is a software platform on which to build applications. TMEX’s architecture follows the International Standards Organization(ISO) reference model of Open System Interconnection (OSI), a protocol with seven layers denoted as Physical, Link, Network,Transport,Session , Presentation, and Application. iButton Viewer With the TMEX Windows installations we get the iButtons Viewer, an application for exploring iButton features from our PC. iButton Viewer automatically finds iButtons on our system and displays their serial numbers with a description of relevant features and menu options Java Virtual Machine Automatic garbage collection for efficient reuse of memory space. Add or delete applets in a secure manner to update applications.
  • 4. Java-accessible unique 64 bit registration number supplements IP addresses to make the intermittent network of roaming iButtons globally addressable. Security in Java Ring Confidential data is stored in Non Volatile RAM memory. Barrier substrate and triple layer technique deny unauthorized access to NVRAM confidential data. If any unauthorized access penetrates the two layers, its detected by security processor and data is erased immediately. This is called as Rapid Zeroization. The communication between iButton and outside world is limited to single line, provides security against hard ware attacks. Processor clock frequency is not constant and cannot be determined by external means Applications Some of the applications of Java ring are in: e-banking to get the account balance of customer. Configuring our car components according to preferences. Opening door to prevent entry of unauthorized users. The Java Ring, therefore, is simply the latest and most complex descendant of a long line of products that have proven themselves to be highly successful in the marketplace. With its stainless steel armour, it offers the most durable packaging for a class of products that likely will suffer heavy use and abuse as personal possessions. The iButton form factor permits attachment to a wide variety of personal accessories that includes rings, watchbands, key fobs, wallets, bracelets, and necklaces, so the user can select a variation that suits his or her lifestyle.