SlideShare a Scribd company logo
JAVA RING
1
Presented by : Etty Mathews
Class : C6
Roll no. : 7
JAVA RING
 A finger ring that contains a small microprocessor
 a sort of smart card that is wearable on a finger
 It’s a stainless steel ring called I-button.
2
HISTORICAL BACKGROUND
 Dallas semiconductor Corp. Produced the first java ring
in 1989
 By 1990 this protocol was refined.
 Sun Microsystems Java ring was introduced at Java One
Conference in 1998.
 Earlier “touch memory”->“I-button”.
3
It is a 1-millon transistors in a single chip.
 The i-button is microcomputer with a
powerful JVM (Java Virtual Machine) in the
steel can.
 I-button is preloaded with applets (Little
Application programs).
 Packaged module has a single electric
contact and a ground return.
Micro chip
WHAT IS JAVA RING
4
 Lithium backed NVRAM offers high read/write speed
 Offers tamper resistance through instantaneous clearing.
 Data integrity and clock function maintained for more than
10 years.
 Tested at Celebration School, Orlando.
 Rings programmed with java applets.
 Operating System -E-commerce was designed
5
SECURITY
6
 Packaged in a 16 mm stainless steel can
 Protects from tampering like hard
knocks
 Rapid Zeroization occurs.
 Extreme temperature or voltage
causes Zeroization.
 A secret “Personal Identification
Number” is maintained.
Stainless-steel can
7
COMPONENTS
 Java Virtual Machine (JVM)
 RAM
ROM
Real Time Clock
 I-button
Blue Dot Receptor
 1 –Wire Interface
8
JAVA VIRTUAL MACHINE
(JVM)
 Its a piece of software, recognizes java language.
 Translates into byte code which can be used by the
system.
 Preloaded with small programs.
9
RAM
 Java ring contains Non-Volatile Random Access
Memory(NVRAM).
 Data stored in this NVRAM.
 Provides r/w & tamper resistance through Zeroization.
 Existing 6Kb can be extended up to 128 Kb.
 Lithium energy preserves the complete state.
 I-buttons when not contact with receptor has zero executing
speed.
10
ROM
 Contains 32 Kb of ROM
 E-Commerce & Java Virtual Machine
stored in the ROM.
 Not supposed to be altered by the user.
 Operating system handles operations in
i-button.
11
REAL TIME CLOCK
 It gives the exact time of the day.
32 Kilohertz crystal oscillator operates the time
 Energy provided by lithium backup
 Inconsistent clock frequency makes it safer
 It runs for more than 10 years with the lithium energy.
12
I-BUTTON
 Jewel of the java ring.
 Contains 1-million transistor processors in single
chip
I-button
13
 ROM,NVRAM is bonded to barrier substrate.
 Barrier substrate and triple layer deny access to data.
This helps to keep private keys and confidential data.
Barrier Substrate
Triple layer
14
 Figure shows a type of i-button
Lithium cell- for backup power
 Energy reservoir
 Quartz- for real time clock
15
 Has single data contact on front
 Does reading, writing and power applied to the module
 Lid is the data contact.
 This contact is connected to
Chip inside.
 Each button has unique
Registration number.
Some have it on the ROM also
64-bit registration number
16
 These numbers are globally unique.
No two i-buttons share the same number
 Needs physical contact with reader to function
 Button will stand up to harsh conditions.
 Zeroization occurs in case of
tampering.
Microchip in stainless-steel can
17
TYPES OF I-BUTTON
 Memory i-button
Stores typed text ,digitized photos.
 Java Powered Cryptographic i-button
Stores encrypted and decrypted data in JVM.
 Themochron i-button
Tracks time ,temperature and calendar etc.
18
BLUE DOT RECEPTOR
 Read /Write operation is done by RS232C serial port.
 Information is transferred through a momentary contact.
 Just touch the i-button to the receptor for data transfer.
 Has Speed up to 142Kbps.
Blue Dot
Receptor
19
1-WIRE INTERFACE
 Used for the communication between PC & I-button.
 Has different communication speeds.
 Every device has unique serial number.
 Bus master issues a reset
 A specific Slave device is selected by unique serial number.
 All other devices are ignored
 After selection data are read and written into button.
20
 Unique serial number is laser etched on to the chip.
64 bit registration number can be divided into three parts
 First 8 bit identify the family of i-button
Middle 48 bit identify the serial number
Last 8bit for error free reading
21
TMEX RUNTIME ENVIRONMENT (TRTE)
 Its a software to interface i-button and computer.
 It installs all drivers and software needed for the i-button.
 It supports Windows 32 bit
22
WORKING OF JAVA RING
 Java ring is programmed with applets that is specific for different users.
 Information transfers with a momentary contact at up to 142Kbps.
 Signet of the i-button is touched to the receptor.
 The receptor is cabled to the serial port which is attached to system.
23
 Signet of i-button is pressed to the receptor.
 System connected performs the necessary functions as instructed.
 Both ring and receptor have the user profile.
 It checks both the profile
 If authentication satisfies, the door
Opens.
Opening door using java ring
24
APPLICATIONS
 Store data such as secret code, credit card numbers etc.
 Can be affixed to badge ,watch ,keychain or ring.
 Can be used to store cash.
 Used to open doors.
25
 To get the account balance.
 Used in cars for security
Java ring used to unlock door
26
COMPARISON
 Can be compared to a credit/debit card.
 It has a magnetic strip which can be tampered.
 Transactions won’t be accepted.
 But i-button stand up the harsh conditions.
27
ADVANTAGES
 Ideal where information need to travel with person.
Replace many password protected devices for financial
transactions.
 More secure than using passwords.
 Withstand harsh conditions.
 Provide authentication to users with the PIN.
 Data transferred by electric conductivity, no radio frequency
needed.
28
DISADVANTAGES
 Java ring being most secure but receptor could be very
expensive.
 Many organization doesn’t know the existence of java ring.
 I-button have limited memory.
 Limited amount of information can be stored.
29
CURRENT LIFE USAGE
 Used by the students at Celebration School,
Orlando.
 In Istanbul, people use for e-cash transactions
 In U.S also it is used
30
CONCLUSION
 It is highly durable ( secure stainless steel packing)
It can be attached to a wide variety of accessories
like keychain etc.
In near future it will be widely used.
31
32

More Related Content

PPTX
Java Ring
PPTX
Java ring Engg SEMINAR
PPT
Java ring ppt
PPT
java-ring
PPTX
Java ring
PPTX
Boimetric using 8051
PPTX
digital jewelry
Java Ring
Java ring Engg SEMINAR
Java ring ppt
java-ring
Java ring
Boimetric using 8051
digital jewelry

What's hot (20)

PPTX
I twin technology
PPTX
Digital jewellary
PPTX
5 pen pc technology
PPT
Brain chips seminar ppt
PPTX
BRAIN GATE (in nutshell)
PPTX
Presentation for Apple M1 chip
PDF
5 Pen PC technology seminar report
PPTX
5 pen-pc-technology complete ppt
PDF
Biochips seminar report
DOCX
Final digital jewelry report
PPT
Digital jewellery ppt
PPTX
Atm with an eye
PPTX
Digital jewellery ppt
DOCX
5 pen pc technology
PPT
Digital jewelry
PPTX
Digital jewellery
PPT
ATM Security by using Fingerprint Recognition And GSM
PPTX
Palm vein technology
PPTX
5 pen technology ppt
PPTX
an atm with an eye
I twin technology
Digital jewellary
5 pen pc technology
Brain chips seminar ppt
BRAIN GATE (in nutshell)
Presentation for Apple M1 chip
5 Pen PC technology seminar report
5 pen-pc-technology complete ppt
Biochips seminar report
Final digital jewelry report
Digital jewellery ppt
Atm with an eye
Digital jewellery ppt
5 pen pc technology
Digital jewelry
Digital jewellery
ATM Security by using Fingerprint Recognition And GSM
Palm vein technology
5 pen technology ppt
an atm with an eye
Ad

Similar to Java ring (20)

PPTX
Java ring
PPTX
Javaringppt 130921072916-phpapp02
PPT
66913017 java-ring-1217949449014046-9 (1)
PPT
Java Ring
PPT
java Ring
PPTX
PPTX
Java ring
DOC
Java ring
PPT
Java ring-110920020424-phpapp02
PPTX
Presentation1
PPT
New Ring
PPTX
JAVA RING WITH IMPLEMENTATION.ppt
PPTX
My ppt java ring
PPT
Java Ring
PPT
Presentation of java ring for seminar.ppt
PPT
Java ring
PPT
Unit Nexus offering Java ring training
PPTX
Digital jewellery ppt
PPTX
Ibutton
PPTX
35.digital jewellery
Java ring
Javaringppt 130921072916-phpapp02
66913017 java-ring-1217949449014046-9 (1)
Java Ring
java Ring
Java ring
Java ring
Java ring-110920020424-phpapp02
Presentation1
New Ring
JAVA RING WITH IMPLEMENTATION.ppt
My ppt java ring
Java Ring
Presentation of java ring for seminar.ppt
Java ring
Unit Nexus offering Java ring training
Digital jewellery ppt
Ibutton
35.digital jewellery
Ad

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Spectroscopy.pptx food analysis technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Digital-Transformation-Roadmap-for-Companies.pptx
Machine Learning_overview_presentation.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Empathic Computing: Creating Shared Understanding
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TLE Review Electricity (Electricity).pptx
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectroscopy.pptx food analysis technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A comparative study of natural language inference in Swahili using monolingua...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
SOPHOS-XG Firewall Administrator PPT.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
MIND Revenue Release Quarter 2 2025 Press Release
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

Java ring

  • 1. JAVA RING 1 Presented by : Etty Mathews Class : C6 Roll no. : 7
  • 2. JAVA RING  A finger ring that contains a small microprocessor  a sort of smart card that is wearable on a finger  It’s a stainless steel ring called I-button. 2
  • 3. HISTORICAL BACKGROUND  Dallas semiconductor Corp. Produced the first java ring in 1989  By 1990 this protocol was refined.  Sun Microsystems Java ring was introduced at Java One Conference in 1998.  Earlier “touch memory”->“I-button”. 3
  • 4. It is a 1-millon transistors in a single chip.  The i-button is microcomputer with a powerful JVM (Java Virtual Machine) in the steel can.  I-button is preloaded with applets (Little Application programs).  Packaged module has a single electric contact and a ground return. Micro chip WHAT IS JAVA RING 4
  • 5.  Lithium backed NVRAM offers high read/write speed  Offers tamper resistance through instantaneous clearing.  Data integrity and clock function maintained for more than 10 years.  Tested at Celebration School, Orlando.  Rings programmed with java applets.  Operating System -E-commerce was designed 5
  • 6. SECURITY 6  Packaged in a 16 mm stainless steel can  Protects from tampering like hard knocks  Rapid Zeroization occurs.  Extreme temperature or voltage causes Zeroization.  A secret “Personal Identification Number” is maintained. Stainless-steel can
  • 7. 7 COMPONENTS  Java Virtual Machine (JVM)  RAM ROM Real Time Clock  I-button Blue Dot Receptor  1 –Wire Interface
  • 8. 8 JAVA VIRTUAL MACHINE (JVM)  Its a piece of software, recognizes java language.  Translates into byte code which can be used by the system.  Preloaded with small programs.
  • 9. 9 RAM  Java ring contains Non-Volatile Random Access Memory(NVRAM).  Data stored in this NVRAM.  Provides r/w & tamper resistance through Zeroization.  Existing 6Kb can be extended up to 128 Kb.  Lithium energy preserves the complete state.  I-buttons when not contact with receptor has zero executing speed.
  • 10. 10 ROM  Contains 32 Kb of ROM  E-Commerce & Java Virtual Machine stored in the ROM.  Not supposed to be altered by the user.  Operating system handles operations in i-button.
  • 11. 11 REAL TIME CLOCK  It gives the exact time of the day. 32 Kilohertz crystal oscillator operates the time  Energy provided by lithium backup  Inconsistent clock frequency makes it safer  It runs for more than 10 years with the lithium energy.
  • 12. 12 I-BUTTON  Jewel of the java ring.  Contains 1-million transistor processors in single chip I-button
  • 13. 13  ROM,NVRAM is bonded to barrier substrate.  Barrier substrate and triple layer deny access to data. This helps to keep private keys and confidential data. Barrier Substrate Triple layer
  • 14. 14  Figure shows a type of i-button Lithium cell- for backup power  Energy reservoir  Quartz- for real time clock
  • 15. 15  Has single data contact on front  Does reading, writing and power applied to the module  Lid is the data contact.  This contact is connected to Chip inside.  Each button has unique Registration number. Some have it on the ROM also 64-bit registration number
  • 16. 16  These numbers are globally unique. No two i-buttons share the same number  Needs physical contact with reader to function  Button will stand up to harsh conditions.  Zeroization occurs in case of tampering. Microchip in stainless-steel can
  • 17. 17 TYPES OF I-BUTTON  Memory i-button Stores typed text ,digitized photos.  Java Powered Cryptographic i-button Stores encrypted and decrypted data in JVM.  Themochron i-button Tracks time ,temperature and calendar etc.
  • 18. 18 BLUE DOT RECEPTOR  Read /Write operation is done by RS232C serial port.  Information is transferred through a momentary contact.  Just touch the i-button to the receptor for data transfer.  Has Speed up to 142Kbps. Blue Dot Receptor
  • 19. 19 1-WIRE INTERFACE  Used for the communication between PC & I-button.  Has different communication speeds.  Every device has unique serial number.  Bus master issues a reset  A specific Slave device is selected by unique serial number.  All other devices are ignored  After selection data are read and written into button.
  • 20. 20  Unique serial number is laser etched on to the chip. 64 bit registration number can be divided into three parts  First 8 bit identify the family of i-button Middle 48 bit identify the serial number Last 8bit for error free reading
  • 21. 21 TMEX RUNTIME ENVIRONMENT (TRTE)  Its a software to interface i-button and computer.  It installs all drivers and software needed for the i-button.  It supports Windows 32 bit
  • 22. 22 WORKING OF JAVA RING  Java ring is programmed with applets that is specific for different users.  Information transfers with a momentary contact at up to 142Kbps.  Signet of the i-button is touched to the receptor.  The receptor is cabled to the serial port which is attached to system.
  • 23. 23  Signet of i-button is pressed to the receptor.  System connected performs the necessary functions as instructed.  Both ring and receptor have the user profile.  It checks both the profile  If authentication satisfies, the door Opens. Opening door using java ring
  • 24. 24 APPLICATIONS  Store data such as secret code, credit card numbers etc.  Can be affixed to badge ,watch ,keychain or ring.  Can be used to store cash.  Used to open doors.
  • 25. 25  To get the account balance.  Used in cars for security Java ring used to unlock door
  • 26. 26 COMPARISON  Can be compared to a credit/debit card.  It has a magnetic strip which can be tampered.  Transactions won’t be accepted.  But i-button stand up the harsh conditions.
  • 27. 27 ADVANTAGES  Ideal where information need to travel with person. Replace many password protected devices for financial transactions.  More secure than using passwords.  Withstand harsh conditions.  Provide authentication to users with the PIN.  Data transferred by electric conductivity, no radio frequency needed.
  • 28. 28 DISADVANTAGES  Java ring being most secure but receptor could be very expensive.  Many organization doesn’t know the existence of java ring.  I-button have limited memory.  Limited amount of information can be stored.
  • 29. 29 CURRENT LIFE USAGE  Used by the students at Celebration School, Orlando.  In Istanbul, people use for e-cash transactions  In U.S also it is used
  • 30. 30 CONCLUSION  It is highly durable ( secure stainless steel packing) It can be attached to a wide variety of accessories like keychain etc. In near future it will be widely used.
  • 31. 31
  • 32. 32