16

Java Ring. Contents INTRODUCTION HISTORY COMPONENTS IN JAVA RING ARCHITECHTURE WORKING SECURITY APPLICATION CONCLUSION REFERENCE

Embed Size (px)

Citation preview

ContentsINTRODUCTION HISTORY COMPONENTS IN JAVA

RING ARCHITECHTUREWORKING SECURITY APPLICATION CONCLUSION REFERENCE

INTRODUCTIONA Java Ring is a finger ring that contains a small

microprocessor with built-in capabilities for the user.

It contains an inexpensive microprocessr in a stainless steel ibutton running a JVM and it is preloaded with applet

The Java Ring is an extremely secure Java-powered electronic token .

.Java Ring could have a number of real-world

application.

HISTORYIn the summer of 1989, Dallas Semiconductor

Corp. produced the first stainless-steel-encapsulated memory device called iButton.

iButton is the main component of java ring.

Java Ring was introduced at their JavaOne Conference in 1998

Java Ring

Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM

componentsJava Virtual Machine (JVM) RAM ROM real-time clockiButton Blue dot reciptor

iButtono The jewel of the Java Ring is the Java iButton -- a

one-million transistor, single chip trusted microcomputer with a powerful Java Virtual Machine (JVM) housed in a rugged and secure stainless-steel case

o Originally called "touch memory" devices, they were later renamed "iButtons." Packaged like batteries, iButtons have only a single active electrical contact on the top surface, with the stainless steel shell serving as ground.

Architecture

Blue dot reciptor

Blue dot receptor lets you communicate with ibuttons from pcs to microprocessor and embeded system.

The read/write operation will be done by this blue dot receptor provided by RS232 serial port adaptor.

Receptor cable connects to the USB port of PC or any embeded system.

The receptor itself affixes to any accesible spot .The information is transferred between the ibutton

and pc with momentary touching java ring .

working java ring is programmed with the applets

acoording to our application.For specific class of user specific java applets

is preloaded in to the java ring.All the information of the user is stored in the

java ring.User simply presses the signet of the java

ring against the “blue dot” receptor and the system connected to the receptor performs the function that the applet instructs to to.

securityThis barrier substrate and the triple-layer

metal construction techniques employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased.

Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.

application

Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences.

Providing security.Presonalized services.

conclusionHighly durableHighly secureUsed in personal computing.

www.javaworld.com http://electronics.howstuffworks.com http://people.cs.uchicago.edu

Reference

Presented by

Ravi prakash

s-7 roll no-

69

Questions?