22
Presented by santhosh surya prakash g 08981a0434, raghu engg. college. Under the esteemed guidance of Mrs.G.Deepthi,M.Tech, Associate Prof.

Seminar Ppt

Embed Size (px)

Citation preview

Page 1: Seminar Ppt

Presented by santhosh surya prakash g 08981a0434, raghu engg. college.Under the esteemed guidance of

Mrs.G.Deepthi,M.Tech,Associate Prof.

Page 2: Seminar Ppt

ContentsINTRODUCTION HISTORY COMPONENTS IN JAVA

RING ARCHITECHTUREWORKING SECURITY APPLICATION CONCLUSION

Page 3: Seminar Ppt

Introduction A Java Ring is a finger ring that contains a small

microprocessor with built-in capabilities for the user.

It contains an inexpensive microprocessr in a stainless steel ibutton running a JVM and it is preloaded with applet

The Java Ring is an extremely secure Java-powered electronic token .

Java Ring could have a number of real-world

application.

Page 4: Seminar Ppt

HistoryIn the summer of 1989, Dallas Semiconductor

Corp. produced the first stainless-steel-encapsulated memory device called iButton.

iButton is the main component of java ring.

Java Ring was introduced at their JavaOne Conference in 1998

Page 5: Seminar Ppt

Java Ring

Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM

Page 6: Seminar Ppt

Components Java Virtual Machine (JVM) RAM ROM real-time clockiButton Blue dot reciptor

Page 7: Seminar Ppt

Java virtual machineJava ring is programmed with java application

program and applets ,that communicate with the host application on the networked system.

applets are the small application that is designed to run on the another application system.

The java virtual machine is the piece of software that recognizes the java language and translate the byte code ,which is used by the system which is connected to the java ring via ring reader.

Page 8: Seminar Ppt

Java virtual machine

Large Java Stack supports complex Computation

Automatic garbage collection for efficient reuse of memory space.

Page 9: Seminar Ppt

RAMJava ring contains 134kb of non-volatile

random access memory. offers high read/write speed and also

provides temper resistance through instantaneous clearing of all memory when tempering is detected. This process is called rapid zeroization.

High security is offered by the ability to erase the content of NVRAM extremely quickly.

Page 10: Seminar Ppt

ROMThe java ring contains 32kb of ROM.A special kind of operating system called

Ecommerce operating system which is based on java and JVM is stored in the ROM.

The silicon die containing the processor, ROM, and NVRAM memory is metallurgically bonded to the barrier substrate through which all electrical contacts are made

Page 11: Seminar Ppt

Real time clockdriven by an unstabilized ring oscillator

operating over a range of 10 to 20 megahertz.The real time clock continuously running up

to more than 10 years by the energy provided the lithium backup.

A 32 kilohertz crystal oscillator is used in the Java iButton to operate the time-of-day clock at a constant and well-controlled frequency that is independent of the processor clock.

Page 12: Seminar Ppt

iButtono The jewel of the Java Ring is the Java iButton -- a

one-million transistor, single chip trusted microcomputer with a powerful Java Virtual Machine (JVM) housed in a rugged and secure stainless-steel case

o Originally called "touch memory" devices, they were later renamed "iButtons." Packaged like batteries, iButtons have only a single active electrical contact on the top surface, with the stainless steel shell serving as ground.

Page 13: Seminar Ppt

Blue dot reciptor

Blue dot receptor lets you communicate with ibuttons from pcs to microprocessor and embeded system.

The read/write operation will be done by this blue dot receptor provided by RS232 serial port adaptor.

Receptor cable connects to the USB port of PC or any embeded system.

The receptor itself affixes to any accesible spot .The information is transferred between the ibutton

and pc with momentary touching java ring .

Page 14: Seminar Ppt

Architecture

Page 15: Seminar Ppt

Working java ring is programmed with the applets

acoording to our application.For specific class of user specific java applets

is preloaded in to the java ring.All the information of the user is stored in the

java ring.User simply presses the signet of the java

ring against the “blue dot” receptor and the system connected to the receptor performs the function that the applet instructs to to.

Page 16: Seminar Ppt

Working The java ring is infact a java smart card,

which is capable of running java programs.A serial reader connects to a computer’s

serial port. Communication with a smart card is based on the ADPU format.

System Architecture on java card

Page 17: Seminar Ppt

Working An applet written to run on java ring follows

a very simple structure.The methods are as follows:

Deselect – Another applet, or possibly this one, is abou to be selected.

Install – Installs the applet.Process – Incoming ADPUs arrive here.Select – Called when a select command is

received.

Page 18: Seminar Ppt

Security This barrier substrate and the triple-layer

metal construction techniques employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased.

Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a person's ring and use that ring.

Page 19: Seminar Ppt

Application

Although Java Rings aren't widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences.

Providing security.Presonalized services.

Page 20: Seminar Ppt

Disadvantages of java ringThe cost of implementing the java ring could

be very high.The problem with the java ring is that many

of the organisation don’t even know the existence of java ring.

Only limited amount of information can be stored, so an individual might have to carry more than one java ring.

Carrying the java ring everywhere could arise to theft issue.

Page 21: Seminar Ppt

Conclusion Highly durableHighly secureUsed in personal computing.

Page 22: Seminar Ppt