Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 34

www.studymafia.

org
Seminar
On
JAVA RING

Submitted To: Submitted By:


www.studymafia.org www.studymafia.org
 What is a java ring?
 History
 Components
 Working
 Security
 Applications
 Advantages
 Disadvantages
 Conclusion
 Is a finger ring that contains a small microprocessor
with built in capabilities for the user.
 Is a sort of a smartcard that is wearable on a finger.
 Is in fact a java smart card based on Java Virtual
Machine that was proposed as the Java card 2.0.
 The Java Ring is a stainless-steel ring, 16-millimeters
(0.6 inches) in diameter, that houses a 1-million-
transistor processor, called an iButton.
 The ring has 134 KB of RAM, 32 KB of ROM, a
real-time clock and a Java virtual machine, which is a
piece of software that recognizes the Java language
and translates it for the user's computer system
 Contains a tiny Java Virtual Machine
 Implements the Java Card 2.0 API
 Stores information in NVRAM (6K)
 Runs applets
 Includes microprocessor, memory, clock and battery
 The java ring, which is powered by Java card was
introduced at Sun Microsystems's JavaOne
Conference, in March 1998.
 It was developed by Dallas Semiconductor.
 Workstations at the conference had "ring readers"
installed on them that downloaded information about
the user from the conference registration system.
 This information was then used to enable a number of
personalized services.
 Java ring has been tested at Celebration School,
an innovative K-12 school, just outside
Orlando, FL. The rings are given to students
and have been programmed to;
 store electronic cash to pay for lunches
 automatically unlock doors
 take attendance
 store medical information
 allow students to check out books.
Students simply press the signet of their
Java Ring, and it performs the desired function.
 The rings given to students are programmed with Java
applets that communicate with host applications on
networked systems. Applets are small applications that
are designed to be run within another application.

 The Java Ring is snapped into a reader, called a Blue


Dot receptor, to allow communication between a host
system and the Java Ring.
 Java Virtual Machine (JVM)
 RAM
 ROM
 real-time clock
 iButton
 Blue dot reciptor
 The java virtual machine is the piece of software that
recognizes the java language and translates the byte
Code.
 Java ring contains 134kb of non-volatile random
access memory .
 This non-volatile random access memory offers high
read/write speed.
 It also provides rapid zeroization.
 The java ring contains 32kb of ROM .
 Special kind of operating system called e-commerce
operating system is stored in the ROM
 Real time clock gives the exact time of the day and it
can run up to 10 years continuously .
 It is driven by a constant 32KHz crystal oscillator.
 In addition ,the frequency of the processor clock is
not constant ,ranges from 10-20MHz.
 This aspect prohibits hackers in obtaining the
information from the iButton.
 The iButton is a mechanical packaging standard that
places a 1-Wire component inside a small stainless steel
"button" similar to a disk-shaped battery.
 Each iButton has a unique and unalterable address laser
etched onto its chip inside the can.
 The address can be used as a key or identifier for each
iButton.
 iButtons are connected to 1-Wire bus systems by
means of a socket with contacts which touch the "lid"
and "base" of the canister.
 The connection can be fleeting, similar to swiping a
credit card through a reader. Semi-permanent
connections are possible with a different socket type.
(The iButton clips into it, but is easily removed).
 Unlike electrically erasable programmable read-only
memory (EEPROM), the NVRAM iButton memory
can be erased and rewritten as often as necessary
without wearing out.
 It can also be erased or rewritten at the high speeds
typical of complementary metal oxide semiconductor
(CMOS) memory, without requiring the time-
consuming programming of EEPROM
 The Blue Dot Receptors are iButton reader/probes
that provide a convenient pipeline into the PC for
iButton-to-PC communication.
 The receptor's cable connects to a USB, serial, or
parallel-port 1-Wire adapter, whichever type of port
you wish to use.
 The receptor itself easily affixes to any accessible
spot on the front of the PC.
 The user can elect a quick information transfer with
a momentary touch of the iButton to the Blue Dot.
 For hands-free operation the iButton can be snapped
into the Blue Dot and remain there.
 Each receptor contains two Blue Dots to
accommodate instances where multiple iButtons are
required for a transaction.
 Whenever the user pushes his ring on a ring
reader(Blue Dot Receptor), the corresponding
application will take place.
 The jewel of the java ring is the iButton.
 iButton is a computer chip enclosed in a thick
stainless steel can.
 It uses 1-wire protocol for communication with the
host and the iButton.
 Information is transferred between your iButton and a
PC with a momentary contact at up to 142kbps.
 You simply touch your iButton to a Blue Dot receptor
or other iButton probe, which is connected to a PC.
 The Blue Dot receptor is cabled to a 1-Wire adapter
that is attached to a spare PC port. 1-Wire adapters
exist for USB, serial, and parallel ports. The Blue Dot
receptor and 1-Wire Adapter are inexpensive
 The Java Card 2.0 architecture has taken client/server
architectures to a new place -- one where the "server"
is a small piece of software on an extremely small
system, and the client is a potentially huge piece of
software on a potentially much larger system.
 The network protocol is encapsulated in packets that
are called application program data units, or APDUs
for short.
 The smart card runtime code gets the first crack at
decoding the APDUs as they arrive on the serial
interface.
 Further, there are predefined APDUs that tell the
runtime to select an applet, delete applets, load
applets, and so on.
 Thus, errant applets are simply deleted by the
developer once it's ascertained that they aren't
responding correctly to the APDUs they receive
 The barrier substrate and the triple-layer metal
construction techniques employed in the silicon
fabrication effectively deny unauthorized access to
the data stored in the NVRAM. If any attempt is
made to penetrate these barriers, the NVRAM data is
immediately erased.
 Java rings are authorized through Personal
Identification Numbers (PINs) so that no one can
steal a person's ring and use that ring.
 Access Control
 Time and attendance
 eCash
 Thermochron Applications
 Gaming Systems
 A very easy and convenient way for users.
 More secure than using passwords.
 Portable.
 Ruggedness.
 Wearable.
 Provides authentication to users which is crucial for
many applications.
 Easier for administrator to maintain the security
infrastructure.
 Provides real memory, more power, and a capacity
for dynamic programming.
 Parents and teachers will have less control over
children and students

 Loss of privacy
 The java powered cryptographic iButton named java
ring can readily support the commerce models that have
traditionally been the province of credit cards.
 Its greatest promise appears to lie in its capacity to
interact with Internet applications to support strong
remote authentication and remotely authorized financial
transactions.
 The use of Java promotes compatibility with these
applications by providing a common language for all
application programming.
 www.google.com
 www.wikipedia.com
 www.studymafia.org

You might also like