Java Ring

DOI : 10.17577/IJERTCONV3IS10052

Download Full-Text PDF Cite this Publication

Text Only Version

Java Ring

Sakshi Bhardwaj1 Sonia Tomer2 1,2Department of Computer Science &Engineering, Ganga Institute of Technology and Management,

Kablana, Jhajjar, Haryana, India

Abstract: Java ring is a finger ring in which a small microprocessor was contained with some built-in capabilities for the user, it is a sort of smart card that is easily wearable on the finger. Sun microsystems java ring was introduced at their java one conference in 1998 and it contained an inexpensive microprocessor built in built in a stainless steel ibutton that was running a java virtual machine (jvm)and was preloaded with applets (little applications programs). It was not an ordinary ring that contains the gemstones instead of gem stones it contained the inexpensive microprocessor. It was built by Dallas semiconductor.

Keywords: Rapid zeroization, Personalization, Wearable, Cryptographic iButton, Java virtual machine, Applets, etc.

1. INTRODUCTION

The java ring was an extremely secure java-powered electronic token that has a continuously running, the unalterable real time clock and rugged packaging that was suitable for many applications. The most precious stone or we can say the jewel of the java ring is the java i-button that is a one million transistor, with a single chip trusted micro computer that has a powerful java virtual machine(JVM) that is housed in a rugged and secure stainless steel case. That was designed to be a fully compatible with the java card 2.0 standard. The packaged module has only a single electrical contact and a ground return, confirming to the specifications of the Dallas semiconductor I- Wire bus. In this the Lithium-backed non-volatile SRAM the static random access memory offers the high read and write speed and an unparallel tamper resistance. Through near- instances clearing of all memory when tempring is detected, a feature known as rapid zeroization . The data integrity and the clock function are maintained for more than 10 years. The 16 mili meter diameter stainless steel enclosure accommodates larger chip sizes needed for up to 128 kilobytes of high speed non-volatile static ram. The small and extremely rugged packaging of the module allows it to attach to the accessoryof your choice to match individual lifestyles, such as a key job, wallet , watch, necklace, braclet or finger ring.

Figure 1

  1. BACKGROUND

    In the summer of 1989, Dallas semiconductor corporation produced the first stainless steel encapsulated memory devices utilizing the Dallas semiconductor i-wire communication protocol. By 1990, the protocol had been refined and employed in a variety of self contained memory devices. Originally called touch memory device they were later renamed i-buttons packaged like batteries, i-buttons have only a single active electrical contact on the top surface, with the stainless steel shell serving as ground.

    Data can be read from or written to the memory serially through a simple and inexpensive RS232C serial port adapter, which also supplies the power required to perform the I/O. The i-button memory can be read or written with a momentary contact to the blue dot receptor provided by the adapter. When not connected to the serial port adapted memory data is maintained in non-volatile random access memory (NVRAM) by a lifetime lithium energy suppkly that will maintain the memory content for at least 10 yearas. Unlike electrically erasable programmable read only memory (EEPROM), the NVRAM i-button memory can be erased and rewritten as often as necessary without wearing out. It can also be erased or rewritten at the high speeds typical of complementary metal oxide (CMOS) memory, without requiring time-consuming programming of EEPROM.

    Figure 2

    III. JAVA VIRTUAL MACHINE

    Figure 2

    III. JAVA VIRTUAL MACHINE

    The java virtual machine is the piece of the software that recognizes the java language and translates the byte code.It supports java card 2.0 specification. It allows the java ring to navigate through java operating environment. It provides automatic garbage collection for efficient reuse of memory space.

    Figure 3

    1. iBUTTON

      The i-button device is a micro chip similar to those used in a smart card but housed in a round stainless steel button of 17.35mm. The ibutton is a computer chip that is enclosed in a 16mm thick stainless steel can. Because of this unique and durable container, up-to-date information can travel with a person or object any where they go. It is designed to be fully compatible with the java card 2.0 standard. It is small and portable enough to attach to a key fob, ring, watch, or other personal items.

      Types of i-button:-

      • Memory iButton.

      • Java powered cryptographic iButton.

      • Thermochron iButton.

      Figure 4

    2. JAVA CONNECTION

      The java connection is with the experience designing the E- Commerce operating system and VM for the Crypto iButtom hardware platform. With a java iButton, a vast number of existing java programmers could easily learn to write applets that could be compiled with the standard tools available from sun Microsystems, loaded into the java iButton, and run on demand to support a wide variety of financial applications. The java card 2.0 specifications provided the opportunity to implement a useful version of the JVM and runtime environment with the limited resources available to a small process.

      Figure 5

    3. APPLICATIONS/USES OF JAVA RING

      Access control to buildings and equipments. It secure the network login using challenge/response authentication. Storage vault for user names and passwords. It is the user profile for rapid internet form-filling. It proides the digital signature gor the E-Commerce. United states postal service postal security device for PC postage downlodable over the internet. Digital photo ID and fingerprint biometrics.

      Figure 6

    4. INSIGHT OF JAVA RING

      The todays world is the hunt for the new technology, and has contributed miracles to the world of science, the ever ending stream. The one such contribution is the JAVA RING the finger ring that contains a small microprocessor with a built in caoabilities for the user, a sort of smart card that is wearable on the finger. Well its something new to the world. Since it has not been very popular these days, its really a new opening for sure.

      Introducing more of it we can say that, it contained an inexpensive microprocessor in a stainless steel iButton , this particular is running on a java virtual machine and it is preloaded with applets.

      Figure 7

    5. OPERATING SYSTEM IN JAVA RING

      A special operating system was designed and stored in the ROM of crypto iButton to support cryptography and general purpose financial transaction- such as those required by postal service program. While not a java virtual machine the E-Commerce firmware designed for the application have several points of similarity with java, including an object oriented design and a byte code interpreter to interpret and execute the Dallas semiconductor custom designed E-Commerce script language.

      The compiler was also written to compile the high level language representation of script language to a byte code form that could be interpreted by the E-Commerce VM.

      Although the E-Commerce firmware was intented primarily through the USPS application, the firmware supports a variety of general electronic commerce models that are suitable for many different applications.

    6. SECURITY

      National institute of Standards and technology (NIST) and the Canadian secrity establishment (CSE) have validated the DS1954 cryptographic iButton as meeting federal information processing publications (FIPS 140-I).

      The crypto iButton includes the highest level of physical security ever validated by the FIPS 140-1 program and it does this in an extremely small and durable package. There is no other hardware token like this meeting government and federal requirements and providing rich functionality at a fraction of the cost of similar devices.

      The crypto iButton provides hardware cryptographic services such as long term safe storage of private keys , a high speed math accelarater for 1024- bit public key cryptography and secure message digest.

      Figure 7

    7. ADVANTAGES

      The java ring is a very easy and convinent way for the users. The users are more sure than using the passwords as since the passwords are short or they can be guessed. The java ring provides the authentication to users which is crucial for the many applications. As it is very easier for administrator to maintain the security infrastructure and it will provide the real memory, more power and a capacity for dynamic programming. The java ring was used widely all around the world for the several applications such as the access control, asset management, e-cash and for many other purpose.

      ASSET MANAGEMENT: The java ring provides us the very simple and a secure way of identifying any person or the asset. It will serve us an electronic serial number that can never be duplicated. With an memory up to 32k bytes the java ring can also the give the asset their own personalized database. As the each asset will have the ability to store the unique information permanently fixed to the asset This makes the java ring perfect for the various assets management and data collection function such as equipment maintainance and record and inventory management. By connecting our java ring to a ring receptor to a car and the car knows based on your profile what you are allowed to do.

      Figure 8

      Access Control: The java ring becomes a personalized key to protected assets and information. By touching the correct key to an iButton reader, the desired event such as opening a lock is enabled. Java ring are perfect for various access control functions like access to buildings, computers, vechicles and equipments.

      Figure 9

        1. ash: The Java ring can be an personalized token and acts like a small change for one or multiple applications. It

          enables to complete the transactions, like dispencing a candy bar or metering a prepaid volume of water. By using the java ring it eliminate to carry the small amounts of cash and it can service multiple, independent applications.

          Figure 10

    8. DISADVANTAGES

      Although the java ring can be the most secure storage medium for many industries the cost of implementing the system could be very high. Even though the iButton can be purchased for cheaper price in order to function it needs a receiver such as blue dot receptor which could be very expensive. Also it needs a

      high level tools and method in order to program applications effectively, reliably and securely.

      As such a java ring based system does not automatically allow user mobility. The problems with the java ring that many organization does not even know the existence of java ring. User mobility is only possible if every machine that the user accesses has a iButton.

    9. CONCLUSION

Java has significant advantages not only as a commercial language but also as a teaching language. It allows to learn the object oriented programming to the students without exposing them to the complexity of C++. Java might well be a language that most computer science departments could agree to use as an introductory language. This paper address one of the areas where more power is needed. It extends java with a mechanism for parametric polymorphism which allows the definition and implementation of generic abstractions.

REFERENCES

      1. http://www.maxim-ic.com/products/ibutton/ibuttons

      2. http://www.maxim-ic.com/products/1- wire/flash/overview/index.cfm

      3. http://www.javaworld.com/javaworld/jw-04-1998/jw-04- javadev.html

      4. http://electronics.howstuffworks.com/gadgets/home/digital- jewelry4.htm

      5. http://www.123eng.com/forum/viewtopic.php?p=158456

      6. pdfserv.maxim-ic.com/en/an/AN937.pdf

      7. http://findarticles.com/p/articles/mi m0EIN/is 1998 July 21/ai 20924045/?tag=content;col1

      8. http://en.wikipedia.org/wiki/1-Wire

      9. http://javaring.blogspot.com/

      10. http://www.maxim- ic.com/products/ibutton/software/crypto/fips140- 1l3.pdf.

Figure 11

40 thoughts on “Java Ring

  1. JimmieNeist says:

    rutor.market

    https://rutordarknet.com

    Global Times предупредило о риске ядерной войны в ЕС из-за СВО ВС РФ на Украине
    В публикации крупного издания сообщается о возможном начале войны с применением ядерного оружия в Европе.
    Solenka.info
    Вынужденную спецоперацию по демилитаризации и денацификации на территории Украины президент России Владимир Путин объявил 24 февраля.
    URA.Ru
    Европа активно помогает Украине как финансово, так и поставками оружия.
    URA.Ru
    Также ВС РФ ликвидируют иностранных наемников, сражающихся на стороне Украины, дополняет «Национальная служба новостей».
    URA.Ru
    [url=https://rutordeepkpafpudl22pbbhzm4llbgncunvgcc66kax55sc4mp4kxcid.com]rutorbestyszzvgnbky4t3s5i5h5xp7kj3wrrgmgmfkgvnuk7tnen2yd.onion[/url]

  2. Anthonyspeep says:

    megasb32uvocwnvntsefqbd7onsoeplsplgcp3aszyzhthymk52xjuyd.onion

    https://megadmeovbj6ahqw3reuqu5gbg4meixha2js2in3ukymwkwjqqib6tqd-onion.com/
    Минобороны РФ впервые показало кадры задействованных на Украине БМПТ «Терминатор»
    Минобороны России впервые показало кадры задействованных в специальной военной операции (СВО) на Украине новейших боевых машин поддержки танков (БМПТ) “Терминатор”.
    ТАСС
    Министерство обороны России показало новые видеокадры о применении российского вооружения в ходе военной спецоперации по защите республик Донбасса.
    Российская газета
    На распространенном в четверг видео военного ведомства запечатлено техническое обслуживание “Терминаторов” после выполнения задач в ходе СВО.
    ТАСС
    «В ходе проведения специальной военной операции зенитные ракетные комплексы войсковой противовоздушной обороны круглосуточно продолжают обеспечивать войскам надежную защиту от нападения воздушных объектов противника», – говорится в публикации.
    ANNA-News
    [url=https://mega555kf7lsmb54yd6etzginolhxxi4ytdoma2rf77ngq55fhfcnyid.onion.com]megasbp3kllay57ikxbi35zjgwe4mvytgk6a5bmwjhunddgy74n4j2id.onion[/url]

  3. www.fossil.sbm.pw says:

    I was curious if you ever thought of changing the structure of your website?
    Its very well written; I love what youve got to say. But maybe
    you could a little more in the way of content
    so people could connect with it better. Youve got an awful lot of text for only having one or 2 pictures.
    Maybe you could space it out better?

  4. slot sering jackpot says:

    Hey! I know this is somewhat off topic but I was wondering which
    blog platform are you using for this site? I’m getting sick and tired of WordPress because I’ve had issues with hackers and I’m looking at alternatives for another platform.

    I would be fantastic if you could point me in the direction of a good platform.

  5. super filmy says:

    Excellent beat ! I wish to apprentice at the same
    time as you amend your website, how could i subscribe for a weblog web site?
    The account aided me a acceptable deal.
    I were tiny bit acquainted of this your broadcast offered bright clear concept

  6. WilliamMeW says:

    OVI trickets need all of the highly trained tools most used in criminal law. protecting a DWI is initiated by understanding none of your rights on the constitution have been abused. When a police officer is in front of you, while they are basically the only witnesses most of the time, their directives and MO is of the essence. We all create mistakes, and officers are no exception. The event begins with obvious accusation which can lead to probable cause. An example, someone gets flashed over for driving too slow at 4 am. The police officer takes regular suspicion that you has created a traffic offense, swerving. Now, when the law enforcment begins to make visual contact or moves in towards the auto, he or she may remark you posess red eyes, or there is an odor of beer. This raises the reasonable intuition of speeding to giving the police a reason that someone is driving while drunk. eighty% of police will say smell of liquor, watery eyes, or sloppy talk. The police will also elaborate you are fumbling about getting your id and proof of insurance out. At this point you is likely informed to get out from the car and perform regular driving sobriety checks. These are SFST’s are taught under NHTSA (National road Traffic Safety Administration) standardizations and must be followed per instruction. when you do perform the checks, the police can make mistakes which can have the test, or tests thrown out of from evidence. Things such as physical impairments and optimal field conditions should be factored into results of your test. (example: someone can not perform a walk and pivot test on crooked stret). Someone will also take a analkyzation of the breath test. There are irregularities in these machines also, and they are technolgo that need maintenance and training on all the time. The incarceration is taped from the instance the officer turns on their lights. Through this taped evidence that we are able to base an learned idea if the law enforcement giving of the checks, to the clients performance taking the checks. Whether you consent to the checks or not, you can go to big house. If you have been arrested for Domestic violence or any criminal charges or know some one who needs a criminal defense Lawyer check out my site here: [url=https://www.bouchardcincinnaticriminalduiattorney.com/practice-areas/property-and-theft-crimes/][color=#000_url]best in North Bend OH attorneys[/color][/url] best regards

  7. Najlepsze filmy says:

    Write more, thats all I have to say. Literally, it seems as though you relied on the video to make your
    point. You definitely know what youre talking about,
    why waste your intelligence on just posting videos to your blog when you could be giving us something enlightening
    to read?

  8. polecane filmy says:

    Oh my goodness! Amazing article dude! Thank you, However I am
    experiencing troubles with your RSS. I don’t understand the reason why I can’t subscribe to it.

    Is there anybody getting similar RSS problems? Anybody who knows the answer will you
    kindly respond? Thanx!!

  9. filmy do obejrzenia says:

    I just like the valuable info you provide on your articles.
    I will bookmark your weblog and check again right here regularly.
    I am quite certain I’ll be told many new stuff right right here!
    Good luck for the following!

  10. canadian pharmacy says:

    I’m really inspired along with your writing
    skills as neatly as with the format on your blog.
    Is that this a paid topic or did you modify it your self?
    Either way stay up the nice high quality writing, it’s rare to see a great weblog like this one these days..

  11. Mobgame.Xyz says:

    Hello there! I could have sworn I’ve visited this website before but after browsing through many
    of the posts I realized it’s new to me. Regardless, I’m certainly happy I stumbled upon it and I’ll be book-marking it and checking back frequently!

  12. stookgame says:

    Hey just wanted to give you a quick heads up.
    The text in your post seem to be running off the screen in Internet explorer.

    I’m not sure if this is a formatting issue or something to do with browser compatibility but I figured I’d post to let you know.
    The style and design look great though! Hope you get the
    problem solved soon. Thanks

  13. zotgamers.xyz says:

    Hi there, I found your website by means of Google whilst
    searching for a related topic, your site got here up, it looks great.

    I’ve bookmarked it in my google bookmarks.
    Hello there, just become aware of your blog thru Google, and
    located that it is really informative. I am going to be careful for brussels.
    I’ll be grateful if you continue this in future. Numerous folks
    will probably be benefited from your writing. Cheers!

  14. https://Suegamer.xyz/ says:

    I used to be suggested this website through my cousin. I’m now not positive whether or not this put
    up is written by way of him as no one else realize such exact about my trouble.

    You’re wonderful! Thanks!

  15. unique content writing software says:

    Howdy, i read your blog occasionally and i own a similar one and i
    was just wondering if you get a lot of spam remarks? If so how do you stop it,
    any plugin or anything you can recommend? I get so much lately it’s driving me insane so
    any help is very much appreciated.

  16. Chaturbate says:

    Goood post. I learn something totally new aand challenging
    on blogs I stumbleupon everyday. It’s always interesting too read
    content from other authors and use a little something from their sites.

    Have a look at my webpage … Chaturbate

  17. Charleshaulp says:

    Social Security Disability Insurance, or SSDI, is a city wide program which provides help with finances to everyone before the age of sixty five that are  to join the workforce because of a disability. many legions would hope that the method would be straight forward for every handicapped citizen to be inline for ssdi money. disasterously, the darker side is true in many cases. Out of the infinite amount of ssdi award applications that are given to the ssa every season, a mere thirty three percent are accepted in the preceeding level of the provisioning regimen. This means you will absolutely need an the best ssi Lawyer in Las Cruces, Texas to help someone with the difficulties of your case.  I’ve been an attorney for 6 years and my daughter is also a legal defender and is an expert in similar facets of ssi legalities as parents. In reality father and mother are also lawyers and our entire family are consumated to assisting to shield the benifits of disabled persons here in the USA and helping mexican immigrants in Texas and NM. If you are a unfortunate person from Mexico or have a associate or know of someone that needs assistance about their SSI claim or needs to hire a SSI court attorney please take a moment to view the site as there is a lot outstanding info about it that will help youtrself or co workers.   [url=https://jonsipes.com/about/][color=#000_url]top long term disability lawyers in Santa Fe[/color][/url]

  18. content generator says:

    Thanks on your marvelous posting! I quite enjoyed reading it, you can be a great author.I will remember to bookmark your blog and may come back in the foreseeable future.

    I want to encourage yourself to continue your great job,
    have a nice day!

  19. your xxx video guide says:

    Hello! Quick question that’s totally off topic.

    Do you know how to make your xxx video guide site mobile friendly?
    My web site looks weird whdn browsing from my
    iphone4. I’m trying to find a theme or plugin that might be able to resolve this
    problem. If you have any suggestions, please share.
    Appreciaate it!

  20. amy.network says:

    I don’t even know how I ended up here, but I thought this
    post was great. I don’t know who you are but
    definitely you’re going to a famous blogger if you aren’t already 😉 Cheers!

  21. https://gamind.xyz says:

    What’s Happening i am new to this, I stumbled upon this I have discovered It positively useful and it
    has aided me out loads. I’m hoping to give a contribution & assist other customers like
    its aided me. Good job.

  22. カジノ 仮想通貨 says:

    Oh my goodness! Amazing article dude! Many thanks, However
    I am going through issues with your RSS.
    I don’t understand why I cannot subscribe to it.
    Is there anybody having the same RSS problems? Anybody who knows
    the answer will you kindly respond? Thanx!!

Leave a Reply

Your email address will not be published.