Click here to load reader


  • View

  • Download

Embed Size (px)


java ring

Text of Java-ring

Presented by :MITESH KUMAR Dept Of ISE, S.I.T. TUMKUR




In the summer of 1989, Dallas Semiconductor Corp. produced the first stainless-steel-encapsulated memory devices utilizing the Dallas Semiconductor 1-Wire communication protocol. By 1990, this protocol had been refined and employed in a variety of self-contained memory devices. Originally called "touch memory" devices, they were later renamed "iButtons."

One of the first impressive devices powered by the Java Card technology came in the form of now famous Java Rings at the Sun's JavaOne conference, in March 1998.

The JavaRing is a tiny wearable computer with 6 kilobytes of RAM. Six K may not sound like much, but it is 20 percent more memory than the first computer ever used . Even 6 K is enough to hold your secret codes, your credit cards numbers, your driver license, other wallet contents, and even some electronic cash. The ring can also store a few important URLs.

The Java Ring is a wearable computer that can be used to authenticate users to services on the Internet. A user only has to push the ring on his/her finger on a Java Ring reader for about a second. The key issue about a wearable computer is not whether it is a ring or another form factor: the deciding point is that we will always have it with us. Many aspects of computing change once there is no need to go to a special room to get at the computer.

Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM

A Java Ring is a finger ring that contains small microprocessor with built-in capabilities for the user. stainless-steel iButton Java virtual machine

applets (little application programs) Real Time Clock The rings were built by Dallas Semiconductor.

A Small Microprocessor

Consist of 32k ROM

6K of RAM and can be extended upto 134k RAM

JAVA Powered iButton

The jewel of the Java Ring is the Java iButton The iButton is a computer chip enclosed in a 16mm thick stainless steel can. Because of this unique and durable container, up-to-date information can travel with a person or object anywhere they go.

Designed to be fully compatible with the Java Card 2.0 standard. It is small and portable enough to attach to a key fob, ring, watch, or other personal items

iButton ComponentsAn iButton uses its stainless steel

can :

It is an electronic communications interface. Each can has a data contact, called the 'lid', and a ground contact, called the 'base'. Each of these contacts is connected to the silicon chip inside.

Grommet :The two contacts are separated by a polypropylene grommet.

Layout of iButton

Types of iButton Memory iButton Java Powered Cryptographic iButton Thermochron iButton

Cryptographic iButtonInternal details

Blue Dot Receptor

Information is transferred between iButton and a PCthrough Blue Dot Receptor

You simply touch iButton to a Blue Dot Receptor These receptors uses 1-wire communication protocolfor data transfer

Blue Dot Receptors Serial Port Adapter

Parallel Port Adapter

USB Port Adapter

1-Wire Communication Protocol

Reset synchronizes the entire bus

Select a slave device is selected for communication

Once a specific device is selected all other devices are ignored

JVM It supports Java card 2.0 specification It allows the Java Ring to navigate through Java

Operating environment

Provides Automatic garbage Collection for efficient

reuse of memory space

WORKING Java ring is programmed with the applets acoording

to our application. For specific class of user specific java applets is preloaded in to the java ring. All the information of the user is stored in the java ring. User simply presses the signet of the java ring against the blue dot receptor and the system connected to the receptor performs the function that the applet instructs to .

SECURITY This barrier substrate and the triple-layer metal

construction techniques employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.

Java Connection With experience designing the E-Commerce operatingsystem and VM for the Crypto iButton hardware platform. With a Java iButton, a vast number of existing Java programmers could easily learn to write applets that could be compiled with the standard tools available from Sun Microsystems, loaded into the Java iButton, and run on demand to support a wide variety of financial applications. The Java Card 2.0 specification provided the opportunity to implement a useful version of the JVM and runtime environment with the limited resources available to a small processor.

Uses / Applications of Java Ring Access control to buildings and equipment Secure network login using challenge/response

authentication Storage vault for user names and passwords User profile for rapid Internet form-filling Digital signatures for e-commerce United States Postal Service Postal Security Device for PC Postage downloadable over the Internet Digital photo ID and fingerprint biometrics Thermochron applications

Advantages Java ring is wearable

Completely controlled by the user Rapid Zeroization Personalization

Conclusions Latest Technology

Can be highly successful in market in future More durable because of its stainless steel armour Can be attached to various personal accessories


http://www.people.uchicago.ed. Products iButton

Search related