SlideShare une entreprise Scribd logo
1  sur  14
1
BY
MALINI.M
SOWNDRYA.G
3RD CSE
INTRODUCTION
 Digital jewellery is the fashion jewelry
with embedded intelligence.
 Each piece of jewelry will contain a
fraction of the components found in a
conventional mobile phone.
 Together, the digital-jewelry cell phone
should work just like a conventional cell
phone.
 The digital jewellery are Braclets ,
chains, necklace, ear rings, java ring
etc,..
 Among them java ring is compact and
easy to carry anywhere and it is also
secure the information with unique ID.
2
WHAT IS JAVA RING ?
• Java ring is the finger ring that contain a small
microprocessor with build-in capabilities for the user, a
sort of smart card that is wearable on the finger.
• The main objective of the Java Ring is to maintain security
and portable.
COMPONENTS:
 134KB of RAM
 32KB of ROM
 Real Time Clock
 Java Virtual Machine
 iButton
 Blue Dot Receptor
3
4
WHY JAVA RING ?
Only by JAVA it is supported to all
OS. That why even supported for
Ecommerce OS(e-cash).
By JVM ,it supports automatic
garbage collection for efficient reuse
of memory space.
An applet written to run on the java
ring follows a very simple structure.
IMPLEMENTATION OF JAVA RING
• Java Ring is used for the security
purposes and also used for
authority permissions.
• For example ,in a family son ,
father, mother and other members
are not anticipate about the speed
limits.
• So by the use of java Ring is to
limit the features and speed in car
to avoid accidents.
5
IMPLEMENTATION OF JAVA RING
• By the use of Java Ring the unauthorized
peoples cannot use or access the device.
And there is personal identification
number(PIN).so no one can do
mischievous behaviour can be done, even
it is lost.
• The java Ring is used for the security
purposes.
• In future ,the java Ring is used to start
the car by unique ID.
6
REQUIREMENTS OF JAVA RING
• The Java Ring has 134KB of non volatile Random Access
Memory(RAM),by this it offers high read/write speed.
• Rapid erasing of the SRAM memory is known as zeroization.
When an iButton detects any intrusion, it erases its private
keys leading to zeroization.
• The Java Ring has 32KB of Read Only Memory(ROM) and a
special kind of OS called E-Commerce OS is stored in ROM.
• In Real Time Clock,the frequency of the processor clock is
not constant that ranges from 10-20MHz.This aspects
prohibits the hackers in obtaining the information from
iButton.
7
REQUIREMENTS OF JAVA RING
• Java Ring uses the 1-wire protocol for
communication with the host and the
iButton.
• Java iButton is designed more compatible
in java card 2.0 standard processor.
• The iButton memory can be read or
written with a momentary contact to the
"Blue Dot" receptor provided by the
adapter.
• The lifetime of java Ring is atleast for 10
years.
8
PICTORIAL REPRESENTATION
9
WORKING AND APPLICATION
• Java Ring is programmed with the applets
,whenever the user pushes the ring on the ring
Reader(Blue Dot Receptor) the corresponding
application take place.
• Communication is based on APDU format.
APPLICATIONS:
 To unlock the cars/doors/computers .
 Secure way of identifying the asset.
 Banks , authorized areas
 e-cash
 Useful to carry informations even URL’s.
10
ADVANTAGES AND DISADVANTAGES
ADVANTAGE:
* Many information and passwords carried in different devices is replaced in
single Java Ring.
* Higher durability.
* It functions even in -40C to +70C,in harsher
environment.
* It supports Dynamic programming.
* cost negligible.
* Asset management ,access control,e-cash etc..,
DISADVANTAGE:
* Many peoples don’t aware of it.
* iButton has a limited processor power and memory.
* High level tools and method is required to program application
efficiently and reliablity.
11
CONCLUSION
• The key issue about a wearable
computer (Java Ring ) is that
whether it is a ring or another
form factor : the deciding point
that always that will be with
you.
12
13
REFERENCES
 www.javaworld.com
 www.123seminaronly.com
 www.javaringblogspot.com
THANK YOU
14

Contenu connexe

Tendances (20)

Java Ring
Java RingJava Ring
Java Ring
 
Java ring Engg SEMINAR
Java ring Engg SEMINARJava ring Engg SEMINAR
Java ring Engg SEMINAR
 
Java Ring
Java RingJava Ring
Java Ring
 
Java ring
Java ringJava ring
Java ring
 
Java Ring
Java Ring Java Ring
Java Ring
 
My ppt java ring
My ppt java ringMy ppt java ring
My ppt java ring
 
New Ring
New RingNew Ring
New Ring
 
Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02Javaringppt 130921072916-phpapp02
Javaringppt 130921072916-phpapp02
 
Presentation1
Presentation1Presentation1
Presentation1
 
java ring
java ringjava ring
java ring
 
Dj ppt
Dj pptDj ppt
Dj ppt
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery hints
Digital jewellery hintsDigital jewellery hints
Digital jewellery hints
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Presentation on Digital jewelry
Presentation on Digital jewelry Presentation on Digital jewelry
Presentation on Digital jewelry
 
DIGITAL JEWELLERY
DIGITAL JEWELLERYDIGITAL JEWELLERY
DIGITAL JEWELLERY
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 

En vedette

Robo's in constructions
Robo's in constructionsRobo's in constructions
Robo's in constructionsmkanth
 
Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation   Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation Martin Deal
 
Bio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular BiologyBio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular BiologyBob Eisenberg
 
Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)Vinod Bobade
 
Blue gene technology
Blue gene technologyBlue gene technology
Blue gene technologyVivek Jha
 
ANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONDeepak kango
 
Motion capture technology
Motion capture technologyMotion capture technology
Motion capture technologyArun MK
 
Bio Inspired Computing Final Version
Bio Inspired Computing Final VersionBio Inspired Computing Final Version
Bio Inspired Computing Final VersionThomas Petry
 
Java card technology
Java card technologyJava card technology
Java card technologyAmol Kamble
 
Motion Capturing Technology
Motion Capturing TechnologyMotion Capturing Technology
Motion Capturing TechnologyMurlidhar Sarda
 
MOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGYMOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGYShaik Tanveer
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry reportShruthi K Gowda
 
Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Asiri Wijesinghe
 

En vedette (18)

Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Robo's in constructions
Robo's in constructionsRobo's in constructions
Robo's in constructions
 
Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation   Bejewell - gems & jewelry presentation
Bejewell - gems & jewelry presentation
 
DIGITAL JEWELERY
DIGITAL JEWELERYDIGITAL JEWELERY
DIGITAL JEWELERY
 
Bio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular BiologyBio-Molecular Engineering is the Future of Molecular Biology
Bio-Molecular Engineering is the Future of Molecular Biology
 
Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)Rocket singh film review for managment (vinod bobade)
Rocket singh film review for managment (vinod bobade)
 
Blue gene technology
Blue gene technologyBlue gene technology
Blue gene technology
 
ANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATION
 
Motion Capture
Motion CaptureMotion Capture
Motion Capture
 
Motion capture technology
Motion capture technologyMotion capture technology
Motion capture technology
 
Bio Inspired Computing Final Version
Bio Inspired Computing Final VersionBio Inspired Computing Final Version
Bio Inspired Computing Final Version
 
Java card technology
Java card technologyJava card technology
Java card technology
 
Motion Capturing Technology
Motion Capturing TechnologyMotion Capturing Technology
Motion Capturing Technology
 
MOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGYMOTION CAPTURE TECHNOLOGY
MOTION CAPTURE TECHNOLOGY
 
Motion capture
Motion captureMotion capture
Motion capture
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
 
Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)
 

Similaire à Digital Jewelry: An Overview of the Java Ring

Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Jana Vontari
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamAnshika Nigam
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital JwelleryJawhar Ali
 
DIGITAL JWELLERY
DIGITAL JWELLERYDIGITAL JWELLERY
DIGITAL JWELLERYMD Ibrahim
 
CocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best PracticesCocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best PracticesMutual Mobile
 
Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Julien SIMON
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptxKDivyaLatha
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellaryAjay kumar
 
Eric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 SlidesEric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 Slidesevetillard
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...CODE BLUE
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecurityOKsystem
 

Similaire à Digital Jewelry: An Overview of the Java Ring (16)

Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02Java ring-110920020424-phpapp02
Java ring-110920020424-phpapp02
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Java Ring
Java RingJava Ring
Java Ring
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika Nigam
 
Google glass
Google glassGoogle glass
Google glass
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
DIGITAL JWELLERY
DIGITAL JWELLERYDIGITAL JWELLERY
DIGITAL JWELLERY
 
CocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best PracticesCocoaConf Austin 2014 | Demystifying Security Best Practices
CocoaConf Austin 2014 | Demystifying Security Best Practices
 
Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Eric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 SlidesEric Vétillard's Cardis2010 Slides
Eric Vétillard's Cardis2010 Slides
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
 

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Digital Jewelry: An Overview of the Java Ring

  • 2. INTRODUCTION  Digital jewellery is the fashion jewelry with embedded intelligence.  Each piece of jewelry will contain a fraction of the components found in a conventional mobile phone.  Together, the digital-jewelry cell phone should work just like a conventional cell phone.  The digital jewellery are Braclets , chains, necklace, ear rings, java ring etc,..  Among them java ring is compact and easy to carry anywhere and it is also secure the information with unique ID. 2
  • 3. WHAT IS JAVA RING ? • Java ring is the finger ring that contain a small microprocessor with build-in capabilities for the user, a sort of smart card that is wearable on the finger. • The main objective of the Java Ring is to maintain security and portable. COMPONENTS:  134KB of RAM  32KB of ROM  Real Time Clock  Java Virtual Machine  iButton  Blue Dot Receptor 3
  • 4. 4 WHY JAVA RING ? Only by JAVA it is supported to all OS. That why even supported for Ecommerce OS(e-cash). By JVM ,it supports automatic garbage collection for efficient reuse of memory space. An applet written to run on the java ring follows a very simple structure.
  • 5. IMPLEMENTATION OF JAVA RING • Java Ring is used for the security purposes and also used for authority permissions. • For example ,in a family son , father, mother and other members are not anticipate about the speed limits. • So by the use of java Ring is to limit the features and speed in car to avoid accidents. 5
  • 6. IMPLEMENTATION OF JAVA RING • By the use of Java Ring the unauthorized peoples cannot use or access the device. And there is personal identification number(PIN).so no one can do mischievous behaviour can be done, even it is lost. • The java Ring is used for the security purposes. • In future ,the java Ring is used to start the car by unique ID. 6
  • 7. REQUIREMENTS OF JAVA RING • The Java Ring has 134KB of non volatile Random Access Memory(RAM),by this it offers high read/write speed. • Rapid erasing of the SRAM memory is known as zeroization. When an iButton detects any intrusion, it erases its private keys leading to zeroization. • The Java Ring has 32KB of Read Only Memory(ROM) and a special kind of OS called E-Commerce OS is stored in ROM. • In Real Time Clock,the frequency of the processor clock is not constant that ranges from 10-20MHz.This aspects prohibits the hackers in obtaining the information from iButton. 7
  • 8. REQUIREMENTS OF JAVA RING • Java Ring uses the 1-wire protocol for communication with the host and the iButton. • Java iButton is designed more compatible in java card 2.0 standard processor. • The iButton memory can be read or written with a momentary contact to the "Blue Dot" receptor provided by the adapter. • The lifetime of java Ring is atleast for 10 years. 8
  • 10. WORKING AND APPLICATION • Java Ring is programmed with the applets ,whenever the user pushes the ring on the ring Reader(Blue Dot Receptor) the corresponding application take place. • Communication is based on APDU format. APPLICATIONS:  To unlock the cars/doors/computers .  Secure way of identifying the asset.  Banks , authorized areas  e-cash  Useful to carry informations even URL’s. 10
  • 11. ADVANTAGES AND DISADVANTAGES ADVANTAGE: * Many information and passwords carried in different devices is replaced in single Java Ring. * Higher durability. * It functions even in -40C to +70C,in harsher environment. * It supports Dynamic programming. * cost negligible. * Asset management ,access control,e-cash etc.., DISADVANTAGE: * Many peoples don’t aware of it. * iButton has a limited processor power and memory. * High level tools and method is required to program application efficiently and reliablity. 11
  • 12. CONCLUSION • The key issue about a wearable computer (Java Ring ) is that whether it is a ring or another form factor : the deciding point that always that will be with you. 12