Presented By MAYA N Roll No: 21 MCA B5

Slides:



Advertisements
Similar presentations
1 Java Card Technology Prepared by:Ali Toyserkani Adopted from: Introduction to Java Card Technology C. Enrique Ortiz.
Advertisements

Presented by : ARJUN.B.M USN: 1RL05CS007 Dept Of CSE RLJIT, Dodballapur Under the guidance of : Basavaraj.S.Pol Asst. Prof Dept of CSE, RLJIT.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 4 The Components of the System Unit
C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.
Objectives Overview Discovering Computers 2014: Chapter 6 See Page 248
SYSTEM UNIT Amy Pierce Comm. 165 MWF System unit components are housed within the system unit or system cabinet Desktop Notebook PDA (personal.
WANs and Routers Routers. Router Description Specialized computer Like a general purpose PC, a router has:  CPU  Memory  System Bus Connecting Internal.
1 Introduction to Computers Day 6. 2 Main Circuit Board of a PC The main circuit board (motherboard or system board) is the central nervous system of.
Parts of a Computer.
Introduction to Databases Transparencies 1. ©Pearson Education 2009 Objectives Common uses of database systems. Meaning of the term database. Meaning.
Your Interactive Guide to the Digital World Discovering Computers 2012.
COMPONENTS OF THE SYSTEM UNIT
Components of a PC. Motherboard. Computer Mother Board Computer Mother board and its constituent components A typical PC mother board with important.
XP Practical PC, 3e Chapter 17 1 Upgrading and Expanding your PC.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Introduction to USB Development. USB Development Introduction Technical Overview USB in Embedded Systems Recent Developments Extensions to USB USB as.
Introduction to Computers Personal Computing 10. What is a computer? Electronic device Performs instructions in a program Performs four functions –Accepts.
4 TYPES OF MEMORY RAM RAM stands for Random Access Memory and is a type of chip used in in primary storage memory.It is also temporary storage, holding.
The Components of the System Unit Chapter 4 By: Janice Colon.
Computer Maintenance Unit Subtitle: Basic Input/Output System (BIOS) Excerpted from 1 Copyright © Texas Education Agency, All.
Fayoum University Faculty of Engineering Electrical Engineering Department E-voting system Using Smart Card Under the supervision Of: Dr. Magdy Amer.
E0001 Computers in Engineering1 The System Unit & Memory.
Introduction to Computing: Lecture 4
DIGITAL JEWELLERY INTRODUCTION In Computer Fashion Wave, "Digital Jewellery" looks to be the next sizzling fashion trend of the technological wave. The.
Chapter 4 The Components of The System Unit Matt Vanacore, Ryan Bratton, Thomas Bender.
Computer Confluence 7/e Chapter 2 Performance 2.The architecture and word size of the processor  Architecture : the design that determines how the individual.
[1] National Institute of Science & Technology Technical Seminar Presentation Presented By : Rajashree Mohapatra (IT ) Technical Seminar.
Copyright © Wondershare Software Java Ring By D.Pradeep kumar(07241A0587) CSE Gokaraju Rangaraju institute of Engineering and Technology.
BIOS Objectives In this chapter, you will: -Learn to define the BIOS and understand how it relates to CMOS -Learn how to determine which BIOS is running.
Discovering Computers 2012: Chapter 4
Java Introduction Lecture 1. Java Powerful, object-oriented language Free SDK and many resources at
Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -1.
Computers Are Your Future Eleventh Edition Chapter 2: Inside the System Unit Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 34 Java Technology for Active Web Documents methods used to provide continuous Web updates to browser – Server push – Active documents.
Smart Card Technology & Features
Java Ring.
Security Solutions from SurfersNet and TimePilot [Overview] [Benefits] [Time Clock] [Security]
Chapter 4 The Components of the System Unit. The System Unit It is a case that contains electronic components of the computer used to process data Sometimes.
Parts of the computer.
1.  RAM is our working memory storage. All the data, which the PC uses and works with during operation, are stored here.  Data are stored on drives,
The Components of the System Unit
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
TUTORIAL 2A PART D  BY : MUHAMMAD HAZIQ BIN RAHIM MUHAMMAD AIDIL FARIS BIN ANUAR.
Academic PowerPoint Computer System – Architecture.
Computer Hardware – System Unit
WEB SERVER SOFTWARE FEATURE SETS
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Chapter 2.
Computer Maintenance I
Lesson 2 Component Overview Core Hardware Fundamentals.
Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Chapter 2: The Linux System Part 5.
Computers Are Your Future Tenth Edition Inside the System Unit 1.
Information Technology INT1001 Lecture 2 1. Computers Are Your Future Tenth Edition Chapter 6: Inside the System Unit Copyright © 2009 Pearson Education,
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
PRESENTED BY-.
Application Sharing Bhavesh Amin Casey Miller Casey Miller Ajay Patel Ajay Patel Bhavesh Thakker Bhavesh Thakker.
JAVA RING By Sowmya B N.
The Components of the System Unit
S . Anil Kumar III year MCA
Components of Computer
Discovering Computers 2011: Living in a Digital World Chapter 4
DIGITAL JEWELLERY.
Chapter5.
Unit 27: Network Operating Systems
Multicultural Social Community Development Institute ( MSCDI)
Presented by: K.SWETHAA LAXMI CSE-2 T EAM NAME:JOLD BATCH NO:4.
Chapter 2: The Linux System Part 5
Java Ring Presented by, Mr. Y. AROCKIA RAJ, Assistant Professor,
Presentation transcript:

Presented By MAYA N Roll No: 21 MCA B5 JAVA RING Presented By MAYA N Roll No: 21 MCA B5

Overview What is a java ring? History Working iButton Blue Dot Receptor Comparison with smart cards Applications Advantages Disadvantages Conclusion

What is a Java Ring ?... Is a finger ring that contains a small microprocessor with built in capabilities for the user. Is a sort of a smartcard that is wearable on a finger. Is in fact a java smart card based on Java Virtual Machine that was proposed as the Java card 2.0.

More… The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM, a real-time clock and a Java virtual machine, which is a piece of software that recognizes the Java language and translates it for the user's computer system

JAVA RING

The Java Ring Contains a tiny Java Virtual Machine Implements the Java Card 2.0 API Stores information in NVRAM (6K) Runs applets Includes microprocessor, memory, clock and battery

Java Ring in its natural environment..

History… The java ring, which is powered by Java card was introduced at Sun Microsystems's JavaOne Conference, in March 1998. It was developed by Dallas Semiconductor. Workstations at the conference had "ring readers" installed on them that downloaded information about the user from the conference registration system. This information was then used to enable a number of personalized services.

Contd… Java ring has been tested at Celebration School, an innovative K-12 school, just outside Orlando, FL. The rings are given to students and have been programmed to; store electronic cash to pay for lunches automatically unlock doors take attendance store medical information allow students to check out books. Students simply press the signet of their Java Ring, and it performs the desired function.

Contd… The rings given to students are programmed with Java applets that communicate with host applications on networked systems. Applets are small applications that are designed to be run within another application. The Java Ring is snapped into a reader, called a Blue Dot receptor, to allow communication between a host system and the Java Ring.

Working… Whenever the user pushes his ring on a ring reader(Blue Dot Receptor), the corresponding application will take place. The jewel of the java ring is the iButton. iButton is a computer chip enclosed in a thick stainless steel can. It uses 1-wire protocol for communication with the host and the iButton.

Contd… Information is transferred between your iButton and a PC with a momentary contact at up to 142kbps. You simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. The Blue Dot receptor is cabled to a 1-Wire adapter that is attached to a spare PC port. 1-Wire adapters exist for USB, serial, and parallel ports. The Blue Dot receptor and 1-Wire Adapter are inexpensive

Contd… The Java Card 2.0 architecture has taken client/server architectures to a new place -- one where the "server" is a small piece of software on an extremely small system, and the client is a potentially huge piece of software on a potentially much larger system. The network protocol is encapsulated in packets that are called application program data units, or APDUs for short

Contd… The smart card runtime code gets the first crack at decoding the APDUs as they arrive on the serial interface. Further, there are predefined APDUs that tell the runtime to select an applet, delete applets, load applets, and so on. Thus, errant applets are simply deleted by the developer once it's ascertained that they aren't responding correctly to the APDUs they receive

iButton The iButton is a mechanical packaging standard that places a 1-Wire component inside a small stainless steel "button" similar to a disk-shaped battery. Each iButton has a unique and unalterable address laser etched onto its chip inside the can. The address can be used as a key or identifier for each iButton.

iButton

More… iButtons are connected to 1-Wire bus systems by means of a socket with contacts which touch the "lid" and "base" of the canister. The connection can be fleeting, similar to swiping a credit card through a reader. Semi-permanent connections are possible with a different socket type. (The iButton clips into it, but is easily removed).

Contd… Unlike electrically erasable programmable read-only memory (EEPROM), the NVRAM iButton memory can be erased and rewritten as often as necessary without wearing out. It can also be erased or rewritten at the high speeds typical of complementary metal oxide semiconductor (CMOS) memory, without requiring the time-consuming programming of EEPROM

iButton Structure

Lay out of iButton

1- Wire Interface

Blue Dot Receptor… The Blue Dot Receptors are iButton reader/probes that provide a convenient pipeline into the PC for iButton-to-PC communication. The receptor's cable connects to a USB, serial, or parallel-port 1-Wire adapter, whichever type of port you wish to use. The receptor itself easily affixes to any accessible spot on the front of the PC.

Blue Dot Receptor..

Contd… The user can elect a quick information transfer with a momentary touch of the iButton to the Blue Dot. For hands-free operation the iButton can be snapped into the Blue Dot and remain there. Each receptor contains two Blue Dots to accommodate instances where multiple iButtons are required for a transaction.

Opening doors…

KEY FOB

Comparison with Smart Cards… iButtons have an advantage over conventional smart cards in term of durability and longevity. iButtons are rugged enough to withstand harsh environments. iButton uses java as a common programming language.

Applications… Access Control Time and attendance eCash Thermochron Applications Gaming Systems

Advantages… A very easy and convenient way for users. More secure than using passwords. Portable. Ruggedness. Wearable.

Contd… Provides authentication to users which is crucial for many applications. Easier for administrator to maintain the security infrastructure. Provides real memory, more power, and a capacity for dynamic programming

Disadvantages… Parents and teachers will have less control over children and students Loss of privacy

Conclusion… The java powered cryptographic iButton named java ring can readily support the commerce models that have traditionally been the province of credit cards. Its greatest promise appears to lie in its capacity to interact with Internet applications to support strong remote authentication and remotely authorized financial transactions. The use of Java promotes compatibility with these applications by providing a common language for all application programming.

THANK YOU