Sei sulla pagina 1di 16

Contents

 INTRODUCTION
 HISTORY
 COMPONENTS IN JAVA RING
 ARCHITECHTURE
 WORKING
 SECURITY
 APPLICATION
 CONCLUSION
 REFERENCE
INTRODUCTION
 A Java Ring is a finger ring that contains a small
microprocessor with built-in capabilities for the user.

 It contains an inexpensive microprocessr in a stainless steel


ibutton running a JVM and it is preloaded with applet

 The Java Ring is an extremely secure Java-powered


electronic token .

 .Java Ring could have a number of real-world application.


HISTORY
In the summer of 1989, Dallas Semiconductor Corp.
produced the first stainless-steel-encapsulated
memory device called iButton.

iButton is the main component of java ring.

Java Ring was introduced at their JavaOne Conference


in 1998
Java Ring

Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter,


that houses a 1-million-transistor processor, called an iButton. The ring has
134 KB of RAM, 32 KB of ROM
components
Java Virtual Machine (JVM)
 RAM
 ROM
 real-time clock
iButton
 Blue dot reciptor
iButton
o The jewel of the Java Ring is the Java iButton -- a one-
million transistor, single chip trusted microcomputer
with a powerful Java Virtual Machine (JVM) housed in a
rugged and secure stainless-steel case

o Originally called "touch memory" devices, they were later


renamed "iButtons." Packaged like batteries, iButtons
have only a single active electrical contact on the top
surface, with the stainless steel shell serving as ground.
Architecture
Blue dot reciptor
Blue dot receptor lets you communicate with ibuttons
from pcs to microprocessor and embeded system.
The read/write operation will be done by this blue dot
receptor provided by RS232 serial port adaptor.
Receptor cable connects to the USB port of PC or any
embeded system.
The receptor itself affixes to any accesible spot .
The information is transferred between the ibutton
and pc with momentary touching java ring .
working
 java ring is programmed with the applets acoording
to our application.
For specific class of user specific java applets is
preloaded in to the java ring.
All the information of the user is stored in the java
ring.
User simply presses the signet of the java ring against
the “blue dot” receptor and the system connected to
the receptor performs the function that the applet
instructs to to.
security
This barrier substrate and the triple-layer metal
construction techniques employed in the silicon
fabrication effectively deny access to the data stored
in the NVRAM. If any attempt is made to penetrate
these barriers, the NVRAM data is immediately
erased.
Java rings are authorized through Personal
Identification Numbers (PINs) so that no one can
steal a person's ring and use that ring.
application
Although Java Rings aren't widely used yet, such rings
or similar devices could have a number of real-world
applications, such as starting your car and having all
your vehicle's components (such as the seat, mirrors,
and radio selections) automatically adjust to your
preferences.
Providing security.
Presonalized services.
conclusion
Highly durable
Highly secure
Used in personal computing.
Reference
 www.javaworld.com

http://electronics.howstuffworks.com
 http://people.cs.uchicago.edu
Presented by

Ravi prakash
s-7
roll no-69
Questions?

Potrebbero piacerti anche