Upload
sowndryaganesh
View
282
Download
0
Tags:
Embed Size (px)
Citation preview
1
BY
MALINI.M
SOWNDRYA.G
3RD CSE
INTRODUCTION Digital jewellery is the fashion jewelry
with embedded intelligence.
Each piece of jewelry will contain a fraction of the components found in a conventional mobile phone.
Together, the digital-jewelry cell phone should work just like a conventional cell phone.
The digital jewellery are Braclets , chains, necklace, ear rings, java ring etc,..
Among them java ring is compact and easy to carry anywhere and it is also secure the information with unique ID.
2
WHAT IS JAVA RING ?
• Java ring is the finger ring that contain a small
microprocessor with build-in capabilities for the user, a
sort of smart card that is wearable on the finger.
• The main objective of the Java Ring is to maintain security
and portable.
COMPONENTS:
134KB of RAM
32KB of ROM
Real Time Clock
Java Virtual Machine
iButton
Blue Dot Receptor
3
4
WHY JAVA RING ?
Only by JAVA it is supported to all
OS. That why even supported for
Ecommerce OS(e-cash).
By JVM ,it supports automatic
garbage collection for efficient reuse
of memory space.
An applet written to run on the java
ring follows a very simple structure.
IMPLEMENTATION OF JAVA RING
• Java Ring is used for the security
purposes and also used for
authority permissions.
• For example ,in a family son ,
father, mother and other members
are not anticipate about the speed
limits.
• So by the use of java Ring is to
limit the features and speed in car
to avoid accidents.
5
IMPLEMENTATION OF JAVA RING
• By the use of Java Ring the unauthorized
peoples cannot use or access the device.
And there is personal identification
number(PIN).so no one can do
mischievous behaviour can be done, even
it is lost.
• The java Ring is used for the security
purposes.
• In future ,the java Ring is used to start
the car by unique ID.
6
REQUIREMENTS OF JAVA RING
• The Java Ring has 134KB of non volatile Random Access
Memory(RAM),by this it offers high read/write speed.
• Rapid erasing of the SRAM memory is known as zeroization.
When an iButton detects any intrusion, it erases its private
keys leading to zeroization.
• The Java Ring has 32KB of Read Only Memory(ROM) and a
special kind of OS called E-Commerce OS is stored in ROM.
• In Real Time Clock,the frequency of the processor clock is
not constant that ranges from 10-20MHz.This aspects
prohibits the hackers in obtaining the information from
iButton.
7
REQUIREMENTS OF JAVA RING
• Java Ring uses the 1-wire protocol for
communication with the host and the
iButton.
• Java iButton is designed more compatible
in java card 2.0 standard processor.
• The iButton memory can be read or
written with a momentary contact to the
"Blue Dot" receptor provided by the
adapter.
• The lifetime of java Ring is atleast for 10
years.
8
PICTORIAL REPRESENTATION
9
WORKING AND APPLICATION
• Java Ring is programmed with the applets
,whenever the user pushes the ring on the ring
Reader(Blue Dot Receptor) the corresponding
application take place.• Communication is based on APDU format.
APPLICATIONS:
To unlock the cars/doors/computers .
Secure way of identifying the asset.
Banks , authorized areas
e-cash
Useful to carry informations even URL’s.
10
ADVANTAGES AND DISADVANTAGES
ADVANTAGE:* Many information and passwords carried in different devices is replaced in
single Java Ring. * Higher durability.* It functions even in -40C to +70C,in harsher
environment.* It supports Dynamic programming. * cost negligible.* Asset management ,access control,e-cash etc..,
DISADVANTAGE:* Many peoples don’t aware of it.
* iButton has a limited processor power and memory.
* High level tools and method is required to program application
efficiently and reliablity.
11
CONCLUSION
• The key issue about a wearable
computer (Java Ring ) is that
whether it is a ring or another
form factor : the deciding point
that always that will be with
you.
12
13
REFERENCES
www.javaworld.com
www.123seminaronly.com
www.javaringblogspot.com
THANK YOU
14