Академический Документы
Профессиональный Документы
Культура Документы
Contents
INTRODUCTION HISTORY COMPONENTS IN JAVA RING ARCHITECHTURE WORKING SECURITY APPLICATION CONCLUSION REFERENCE
INTRODUCTION
A Java Ring is a finger ring that contains a small
token .
Java Ring could have a number of real-world application.
HISTORY
In the summer of 2009, Dallas Semiconductor Corp.
in 2010.
Java Ring
Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM
components
Java Virtual Machine (JVM)
RAM ROM real-time clock iButton Blue dot reciptor
iButton
o The jewel of the Java Ring is the Java iButton -- a one-
million transistor, single chip trusted microcomputer with a powerful Java Virtual Machine (JVM) housed in a rugged and secure stainless-steel case
o Originally called "touch memory" devices, they were later renamed "iButtons." Packaged like batteries, iButtons
have only a single active electrical contact on the top surface, with the stainless steel shell serving as ground.
Architecture
from pcs to microprocessor and embeded system. The read/write operation will be done by this blue dot receptor provided by RS232 serial port adaptor. Receptor cable connects to the USB port of PC or any embeded system. The receptor itself affixes to any accesible spot . The information is transferred between the ibutton and pc with momentary touching java ring .
working
java ring is programmed with the applets acoording to
our application. For specific class of user specific java applets is preloaded in to the java ring. All the information of the user is stored in the java ring. User simply presses the signet of the java ring against the blue dot receptor and the system connected to the receptor performs the function that the applet instructs to do.
security
This barrier substrate and the triple-layer metal
construction techniques employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.
application
Although Java Rings aren't widely used yet, such rings
or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences. Providing security. Presonalized services.
conclusion
Highly durable
Highly secure Used in personal computing.
Reference
www.javaworld.com
http://electronics.howstuffworks.com
http://people.cs.uchicago.edu
Thank You!!!