1 / 16

Java Ring

Java Ring. Presented by, Mr. Y. AROCKIA RAJ, Assistant Professor, Department of CSE, PSNA CET, Dindigul. Content. Introduction History Working Security Applications Conclusion. Introduction.

ppacheco
Download Presentation

Java Ring

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Java Ring Presented by, Mr. Y. AROCKIA RAJ, Assistant Professor, Department of CSE, PSNA CET, Dindigul. Y. AROCKIA RAJ, AP/CSE

  2. Content • Introduction • History • Working • Security • Applications • Conclusion Y. AROCKIA RAJ, AP/CSE

  3. Introduction • A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user. • The Java Ring is an extremely secure Java-powered electronic token . • Its a sort of smart card that is wearable on a finger. • Its in fact a java smart card based on Java Virtual Machine that was proposed as the Java card 2.0. Y. AROCKIA RAJ, AP/CSE

  4. More… • The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton. • The ring has 134 KB of RAM, 32 KB of ROM, a real-time clock and a Java virtual machine, which is a piece of software that recognizes the Java language and translates it for the user's computer system Y. AROCKIA RAJ, AP/CSE

  5. History • The java ring, which is powered by Java card was introduced at Sun Microsystems's JavaOne Conference, in March 1998. • It was developed by Dallas Semiconductor. • Workstations at the conference had "ring readers" installed on them that downloaded information about the user from the conference registration system. • This information was then used to enable a number of personalized services. Y. AROCKIA RAJ, AP/CSE

  6. More… • Java ring has been tested at School near Florida. The rings are given to students and have been programmed to; • store electronic cash to pay for lunches • automatically unlock doors • take attendance • store medical information • allow students to check out books. Students simply press the signet of their Java Ring, and it performs the desired function. Y. AROCKIA RAJ, AP/CSE

  7. Working • The rings given to students are programmed with Java applets that communicate with host applications on networked systems. • The Java Ring is snapped into a reader, called a Blue Dot receptor, to allow communication between a host system and the Java Ring. Y. AROCKIA RAJ, AP/CSE

  8. Blue Dot receptor Y. AROCKIA RAJ, AP/CSE

  9. More… • Whenever the user pushes his ring on a ring reader(Blue Dot Receptor), the corresponding application will take place. • The jewel of the java ring is the iButton. • iButton is a computer chip enclosed in a thick stainless steel can. • It uses 1-wire protocol for communication with the host and the iButton. Y. AROCKIA RAJ, AP/CSE

  10. Blue Dot receptor reading data from Ring Y. AROCKIA RAJ, AP/CSE

  11. More… • Information is transferred between your iButton and a PC with a speed at up to 142kbps. • You simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. • The Blue Dot receptor is cabled to a 1-Wire adapter that is attached to a spare PC port. 1-Wire adapters exist for USB, serial, and parallel ports. The Blue Dot receptor and 1-Wire Adapter are inexpensive Y. AROCKIA RAJ, AP/CSE

  12. Blue Dot receptor affixes on PC Y. AROCKIA RAJ, AP/CSE

  13. Security • National Institute of Standards and Technology (NIST) and the Canadian Security Establishment (CSE) have validated the DS1954 Cryptographic iButton as meeting Federal Information Processing Standards Publications (FIPS PUBS) 140-1. • Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring. Y. AROCKIA RAJ, AP/CSE

  14. Applications • Electronic Access Control • Time and attendance • eCash • Gaming Systems • Opening the door • Asset management • Configuring car component Y. AROCKIA RAJ, AP/CSE

  15. Conclusion • Java ring is highly durable because of its rugged and secure stainless packing. • Java ring is a small wearable ring with high secured data for easy transition of various kind of data. Y. AROCKIA RAJ, AP/CSE

  16. Thank you Y. AROCKIA RAJ, AP/CSE

More Related