You are on page 1of 20

A Technical Seminar Report

On

DIGITAL JEWELLERY

Submitted to JNTUK, Kakinada in partial fulfillment of the requirements for the award of the
Degree Bachelor of Technology in Computer Science & Engineering.

Submitted By
M VENKATA NAGA SUJIT
07A41A0535

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


LOYOLA INSTITUTE OF TECHNOLOGY AND MANAGEMENT
Affiliated JNTUK, Kakinada
DHULIPALLA-522 403, Guntur Dist.
Academic Year 2010-11
LOYOLA INSTITUTE OF TECHNOLOGY AND MANAGEMENT
(Affiliated JNTUK, Kakinada)
Dhulipalla – 522 403, Guntur Dist.
Department of Computer Science & Engineering

CERTIFICATE

This is to certify that M VENKATA NAGA SUJIT(Regd. No.07A41A0535 ) have


prepared a technical seminar report entitled “ DIGITAL JEWELLERY“ as a partial
fulfillment for the award of the degree of Bachelor of Technology in Computer Science &
Engineering. He worked for a period of one semester under our supervision.

Sri. Y. Suresh Sri. K. Ramesh


Asst.Professor Associate Professor
Technical Seminar Supervisor Head of the Department
Computer Science and Engineering Computer Science and Engineering
Abstract

Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile
devices can still be a bit awkward to carry around. In the next age of computing, there will be an
explosion of computer parts across our bodies, rather than across our desktops. Basically, jewellery
adorns the body, and has very little practical purpose. The combination of microcomputer devices and
increasing computer power has allowed several companies to begin producing fashion jewellery with
embedded intelligence i.e., Digital jewelry. Digital jewellery can best be defined as wireless, wearable
computers that allow you to communicate by ways of e-mail, voicemail, and voice communication.
This paper enlightens on how various computerized jewelry (like ear-rings, necklace, ring, bracelet,
etc.,) will work with mobile embedded intelligence.

Even the devices we use are protected by passwords. It can be frustrating trying to keep with
all of the passwords and keys needed to access any door or computer program. This paper discusses
about a new Java-based, computerized ring that will automatically unlock doors and log on to
computers.
Contents

1 Introduction 1
2 What Is Digital Jewellery 1
2.1 Digital Jewellery and Their Components 1
2.2 Technical Specifications of Digital Jewellery 3
3 Display Technologies 3
3.1 Basic Prototype Of The Digital Jewellery 4
4 The Java Ring 4
4.1 The Postal Security Device Of Dallas 4
4.2 Components Of The Java-Ring 5
4.2.1 Java Virtual Machine 5
4.2.2 RAM 6
4.2.3 ROM 6
4.2.4 Real Time Clock 7
4.2.5 IButton 8
4.2.6 Blue Dot Receptor 10
4.3 Working of Java Ring 11
4.4 Security in Java Ring 12
4.4.1 Security through Java Ring in a car 13
4.5 Application of Java Ring 13
4.6 Highlights of Java Ring 14
5 Conclusion 15
6 Bibliography 15
LIST OF FIGURES

2.1 Digital Jewellery Cell phone 2


2.2 IBM's magic decoder ring 2
2.3 Prototype bracelet display 3
3.1 Alphanumeric or graphic Display Types 3
3.2 Complete HIOX necklace 4
4.1 Prototype of stainless steel java ring. 4
4.2 Blue Dot receptor 4
4.3 Structure of IButton 8
4.4 Types of IButton’s available in the market 10
4.5 Types of Blue dot receptor’s available in the market 11
4.6 Java Ring with Door application 11
4.7 Security through Java Ring in a car 13
4.8 Account balance through internet using Java Ring 14
5.1 Digital Watch 15
1. Introduction health insurance card, corporate security
badge, and loose cash. They can also solve a
The latest computer craze has common dilemma of today’s wired world – the
been to be able to wear wireless computers. forgotten password.
The Computer Fashion Wave, "Digital
Jewellery" looks to be the next sizzling fashion 2.1 Digital Jewellery and Their
trend of the technological wave. The Components
combination of shrinking computer devices
and increasing computer power has allowed Soon, cell phones will take a
several companies to begin producing fashion totally new form, appearing to have no form at
jewellery with embedded intelligence. The all. Instead of one single device, cell phones
whole concept behind this is to be able to will be broken up into their basic components
communicate to others by means of wireless and packaged as various pieces of digital
appliances. The other key factor of this concept jewellery. Each piece of jewellery will contain
market is to stay fashionable at the same time. a fraction of the components found in a
By the end of the decade, we could be wearing conventional mobile phone. Together, the
our computers instead of sitting in front of digital-jewellery cell phone should work just
them. like a conventional cell phone. The various
components that are inside a cell phone:
2. What Is Digital Jewellery Microphone, Receiver, Touch pad, Display,
Circuit board, Antenna, and Battery.
Digital jewelry is the fashion
jewelry with embedded intelligence. “Digital IBM has developed a prototype
jewelry” can help you solve problems like of a cell phone that consists of several pieces
forgotten passwords and security badges. of digital jewellery that will work together
“Digital jewelry” is a nascent catchphrase for wirelessly, possibly with Blue tooth wireless
wearable ID devices that contain personal technology, to perform the functions of the
information like passwords, identification, and above components without interruption signals.
account information. They have the potential to This prototype proved to be the most flexible
be all-in-one replacements for your driver’s accessory released ever. This made this
license, key chain, business cards, credit cards, prototype to be made as soon as possible.

1
altogether -- it's likely that voice-recognition
software will be used to make calls.

Fig 2.1: Digital Jewellery Cell phone

Here are the pieces of computerized-jewelry


phone and their functions: Fig 2.2: IBM's magic decoder rings will flash when
you get a call.
 Earrings - Speakers embedded into these
earrings will be the phone's receiver. The same ring that flashes for
 Necklace - Users will talk into the phone calls could also inform you that e-mail
necklace's embedded microphone. is piling up in your inbox. This flashing alert
 Ring - Perhaps the most interesting piece could also indicate the urgency of the e-mail.
of the phone, this "magic decoder ring” is
The mouse-ring that IBM is
equipped with light-emitting diodes
developing will use the company's Track Point
(LEDs) that flash to indicate an incoming
technology to wirelessly move the cursor on a
call. It can also be programmed to flash
computer-monitor display. (Track Point is the
different colors to identify a particular
little button embedded in the keyboard of some
caller or indicate the importance of a call.
laptops). IBM Researchers have transferred
 Bracelet - Equipped with a video graphics
Track Point technology to a ring, which looks
array (VGA) display, this wrist display
something like a black-pearl ring. On top of the
could also be used as a caller identifier that
ring is a little black ball that users will swivel
flashes the name and phone number of the
to move the cursor, in the same way that the
caller.
TrackPoint button on a laptop is used.
With a jewellery phone, the
This Track Point ring will be
keypad and dialing function could be
very valuable when monitors shrink to the size
integrated into the bracelet, or else dumped
of watch face. In the coming age of ubiquitous

2
computing, displays will no longer be tied to informational aesthetic. A micro controller that
desktops or wall screens. Instead, you'll wear is a surface mounted device (SMD) on a
the display like a pair of sunglasses or a printed circuit board (PCB) with resistors (R)
bracelet. Researchers are overcoming several and capacitors (C) are the internal 'guts' of the
obstacles facing these new wearable displays, jewelry.
the most important of which is the readability
of information displayed on these tiny devices. 3. Display Technologies

The digital jewelry display, for


instance, every alphabet and number system
has found representation within the electronics
realm and 'dot-matrix' (a matrix of single
LEDs) is used to display Chinese and Japanese
and other character sets, as can the alternative
display for LCDs (liquid-crystal-displays) also
be used, as often found in watches.

Fig 2.3: Prototype of bracelet display developed by


IBM

2.2 Technical Specifications of Digital


Jewellery

Digital jewelry devices consist


Fig 3.1: Alphanumeric or graphic Display Types
of a screen or display for information, most
likely consisting of 7-16-segment, or dot Digital Jewelry can be made in
matrix LEDs, LCDs, or other technologies many different sizes and shapes with a variety
such as electroluminescent material (EL) or of materials ranging from plastic and metal to
others, which could become an optional rubber and glass. They utilize electromagnetic
display. So too, an audiovisual or other properties and electronics to display
'display' could consist of a speaker, a single information through a screen or display of
flashing light, a sensor of some kind (such as a some kind. This could range from LED 7-
temperature driven EL display), or other segment, 16-segment, dot matrix, and other
3
LEDs devices to LCDs, OLEDs, and other
displays, which are all driven by the self-
contained jewellery devices themselves

3.1 Basic Prototype of the Digital


Fig 4.2: Blue Dot receptor
Jewellery
The Java Ring is a stainless-steel ring, 16 milli-
meters (0.6 inches) in diameter that houses a 1-
million-transistor processor, called an iButton.
The ring has 134 KB of RAM, 32 KB of ROM,
a real-time clock and a Java virtual machine,
which is a piece of software that recognizes the
Fig 3.2: Complete HIOX necklace showing all 26 Java language and translates it for the user's
letters of the Roman alphabet extended in 4-
computer system.
dimensional space-time.

4.1 The Postal Security Device of


4. The Java Ring
Dallas
It seems that everything we
access today is under lock and key. Even the For over 10 years, Dallas
devices we use are protected by passwords. It Semiconductor also has been designing,
can be frustrating trying to keep with all of the making, and selling a line of highly secure
passwords and keys needed to access any door microprocessors that are used in satellite TV
or computer program. Dallas Semiconductor is descramblers, automatic teller machines, point-
developing a new Java-based, computerized of-sale terminals, and other similar applications
ring that will automatically unlock doors and requiring cryptographic security and high
log on to computers. resistance to attack by hackers. Postal
Service's(USPS) Information Based Indicia
Program Postal Security Device Specification,
intended to permit printing of valid U.S.
postage on any PC, provided the first
opportunity to combine two areas of expertise
Fig 4.1: Prototype of stainless steel java ring.
when a secure microprocessor was designed
4
into an iButton the resulting product, named 4.2 Components of The Java-Ring
the Crypto iButton, combines high processor
performance and high-speed cryptographic The main components of the
primitives, and exceptional protection against java ring are following:-

physical and cryptographic attacks of outsiders.


 JAVA VIRTUAL MACHINE(JVM)
An agreement between Dallas Semiconductor
 134KB OF RAM
and RSA Data Security Inc. provides a paid-up  32KB OF RAM
license for anyone using the Crypto iButton to  REAL TIME CLOCK
perform RSA encryption and digital signatures  IBUTTOON
 BLUE DOT RECEPTOR
so that no more further licensing of the RSA
encryption technology is required so far. High 4.2.1 Java Virtual Machine
security is afforded by the ability to erase the
Java ring is programmed with
contents of NVRAM extremely quickly. This
java application program and applets that
feature, rapid zeroization, is a requirement for
communicate with the host application on the
high security devices that may be subjected to
networked system. applets are the small
attacks by hackers. As a result of its high
application that is designed to run on the
security, the Crypto iButton is expected to win
another application system. The java virtual
the FIPS 140-1 security certification by the
machine is the piece of software that
National Institute of Standards and Technology
recognizes the java language and translate the
(NIST).A special operating system was
byte code ,which is used by the system which
designed and stored in the ROM of the Crypto
is connected to the java ring via ring reader.
iButton to support cryptography and general-
Mobile computing is beginning to break the
purpose financial transactions -- such as those
chains that tie us to our desks, but many of
required by the Postal Service program. While
today's mobile devices can still be a bit
not a Java virtual machine, the Ecommerce
awkward to carry around. In the next age of
firmware designed for this application had
computing, we will see an explosion of
several points of similarity with Java, including
computer parts across our bodies, rather than
an object-oriented design and a byte code
across our desktops. Digital jewelry, designed
interpreter to interpret and execute Dallas
to supplement the personal computer, will be
Semiconductor's custom-designed with the E-
the evolution in digital technology that makes
Commerce Script Language.

5
computer elements entirely compatible with therefore no requirement to deal with persistent
the human form. objects in a special way -- objects persist or not
depending on their scope so the programmer
4.2.2 RAM has complete control over object persistence.
As in standard Java, the Java iButton contains
Java ring contains a 134kb of
a garbage collector that collects any objects
the non-volatile random access memory.
that are out of scope and recycles the memory
Program and data is being stored in this non-
for future use. Applets can be loaded and
volatile random access memory .This non-
unloaded from the Java iButton as often as
volatile random access me- mory offers high
needed. All the applets currently loaded in a
read/write speed and also provides a temper
Java iButton are effectively executing at zero
resistance through an instantaneous clearing of
speed any time the iButton is not in contact
all memory when tempering is detected. This
with a Blue Dot receptor. As the Java Card 2.0
process is called rapid-zeroization. The
specification was proposed, Dallas
NVRAM iButton’s memory can be erased or
Semiconductor became a Java Soft license.
rewritten as often as necessary without wearing
The agreement called for the development of a
out. High security is offered by the ability to
Java Card 2.0 implementation and also for the
erase the content of NVRAM extremely
design of "plus portions" that take advantage of
quickly and easily. The Crypto iButton also
the unique capabilities afforded by the Crypto
provides an excellent hardware platform for
iButtons NVRAM, such as the ability to
executing Java because it utilizes NVRAM for
support a true Java stack and garbage
program and data storage. With 6 kilobytes of
collection. With the addition of continuously
existing NVRAM and the potential to expand
running lithium powered time-of-day clock and
the NVRAM capacity to as much as 128
the high-speed large-integer and modular
kilobytes in the existing iButton form factor,
exponentiation engine.
the Crypto iButton can execute Java with a
relatively large Java stack situated in NVRAM. 4.2.3 ROM
This memory acts as conventional high-speed
RAM when the processor is executing, and the The java ring contains 32kb of
lithium energy preserves the complete state of ROM .A special kind of operating system
the machine while the Java Ring is called Ecommerce operating system which is
disconnected from the reader. There is based on java and JVM is stored in the ROM.

6
This operating system handles all the operation operating over a range of 10 to 20 megahertz,
which is happening in the iButton. It is stored so that the clock frequency of the processor is
in ROM because it is not supposed to be not constant and cannot be determined by
altered by the user. The Crypto iButton external means. This differs from the design of
hardware platform offers a unique set of alternative devices in which the processor
special features expressly designed to prevent clock signal is injected by the reader and is
private keys and the other confidential therefore exactly determined by the host
information from being becoming available to processor. External control of the clock
hackers. The prototype shows a detail of the provides a valuable tool to hackers, since they
internal construction of the Crypto iButton. can repetitively cycle such a processor to the
The silicon die containing the processor, ROM, same point in its execution simply by applying
and NVRAM memory is metallurgically the same number of clock cycles. Control of
bonded to the barrier substrate through which the clock also affords a means to induce a
all electrical contacts are made. This barrier calculation error and hence, thereby obtain
substrate and triple-layer metal construction information that can ultimately reveal secret
techniques employed in the silicon fabrication encryption keys that are available till now. A
effectively deny access to the data stored in the 32-kilohertz crystal oscillator is used in the
NVRAM. If any attempt is made to penetrate Java iButton to operate the time-of-day clock
into these barriers, NVRAM data is being at a constant and well-controlled frequency that
immediately erased by itself. This construction is independent of the processor clock.
technique and the use of NVRAM for the
storage of private keys and other confidential 4.2.4 Real Time Clock
data provides a much higher degree of data
In the java ring real time clock
security than that afforded by EEPROM
gives the exact time of the day. The real time
memory. The fact that the communication path
clock will continuously running up to more
between the Crypto iButton and the outside
than 10 years by the energy provided the
world is limited to a single data line provides
lithium backup. In addition, the processor itself
additional security against hardware attacks by
is driven by an unstabilized ring oscillator
limiting the range of signals accessible to the
operating over a range of 10 to 20 megahertz,
hacker. In addition, the processor itself is
so that the clock frequency of the processor is
driven by an unstabilized ring oscillator
not constant and cannot be determined by

7
external means. This differs from the design of microprocessor with powerful java virtual
alternative devices in which the processor machine (JVM) housed in a rugged and secure
clock signal is injected by the reader and is stainless steel case. The Crypto iButton
therefore exactly determined by the host hardware platform offers a unique set of
processor. External control of the clock special features that are being expressly
provides a valuable tool to hackers, since they designed to prevent private keys and other
can repetitively cycle such a processor to the confidential information from becoming
same point in its execution simply by applying available to hackers. Figure 4.1 shows a detail
the same number of clock cycles. Control of description of the internal construction of the
the clock also affords a means to induce a Crypto iButton. The silicon die containing the
calculation error and thereby to obtain processor, ROM, and NVRAM memory is
information that can ultimately reveal secret metallurgically bonded to the barrier substrate
encryption keys for security. A 32-kilohertz through which all electrical contacts are made.
crystal oscillator is used in the Java iButton to This barrier substrate and the triple-layer metal
operate the time-of-day clock at a constant and construction techniques employed in silicon
well-controlled frequency that is independent fabrication effectively deny access to the data
of the processor clock. stored in the NVRAM. If any attempt is made
to penetrate these barriers, the NVRAM data is
4.2.5 IButton being immediately erased. This construction
technique and the use of NVRAM for the
storage of private keys and other confidential
data provides a much higher degree of data
security than that afforded by EEPROM
memory. The fact that the communication path
between the Crypto iButton and the outside
world is limited to a single data line provides
additional security against hardware attacks by
Fig 4.3 Structure of IButton limiting the range of signals accessible to the
hacker. In addition, the processor itself is
The jewel of the java ring is the
driven by an unstabilized ring oscillator
java iButton .It contains the one million
operating over a range of 10 to 20 megahertz,
transistor processor single chip trusted

8
so that the clock frequency of the processor is but housed in a round stainless steel button of
not constant and cannot be determined by 17.35mm x 3.1mm - 5.89mm in size (depend-
external means. This differs from the design of ing on the function). The iButton was invented
alternative devices in which the processor and is still manufactured exclusively by Dallas
clock signal is injected by the reader and is Semiconductor mainly for applications in harsh
therefore exactly determined by the host and demanding environments.
processor. External control of the clock
Like a smart card, an iButton
provides a valuable tool to hackers, since they
does not have an internal power source. It
can repetitively cycle such a processor to the
requires connection to a reader in order to be
same point in its execution simply by applying
supplied with power and to receive input and
the same number of clock cycles. Control of
send output. Unlike some smart cards, there are
the clock also affords a means to induce a
currently no contactless iButtons: they require
calculation error and thereby obtain the
physical contact with a reader to function.
information that can ultimately reveal the
There are iButtons that can measure
secret encryption keys. A 32-kilohertz crystal
temperature (for food storage and transport);
oscillator is used in the Java iButton to operate
have an electronic ID (for physical access to
the time-of-day clock at a constant and well-
buildings); and store e-cash (for purchases both
controlled frequency that is independent of the
in stores and via the web). For e-commerce
processor clock. It is originally called the touch
applications, the iButton can support Java Card
memory devices they were later renamed as
2.0/Open Card standards in addition to
“iButton’s packaged” like batteries. IButton
proprietary software. iButtons have an
have only a single active electrical contact on
advantage over conventional smart cards in
the top surface and with the stainless steel shell
term of durability and longevity. The stainless
serving as ground. Every iButton product is
steel casing gives iButton a far greater ability
manufactured with unique 8 byte serial number
to survive in a range of temperatures. For e-
and carries a guaranty that no two IButtons
commerce and personal ID usage, iButtons can
have same number. Among the simplest
be mounted on a range of personal accessories:
iButton are memory devices which can hold
watch, ring, key chain, or dog tag and also a
files and directories that can be read and
variety of accessories that are used daily by the
written like small floppy disks. An iButton is a
human being.
microchip similar to those used in smart card

9
 Supports for up to two iButtons at once.
 Can be used with any EDS host adapter
equipped with a RJ11 jack
 Can be used with any Dallas
Semiconductor port adapter of series
(DS9097E, DS9097U, and DS9490R).

The DS1402 series incorporates four basic


types of connectors, 1-Wire RJ-11, iButton,
Fig 4.4 Types of IButton’s available in the market
Touch-and-Hold Probe, and Blue Dot™

4.2.6 Blue Dot Receptor Receptor. The DS1402 series of 1-Wire


network cables provides connectivity for the
The read/write operation in the iButtons. The cables are designed to connect
java ring is done by the blue dot receptor any USB, serial or parallel port 1-Wire adapter
provided by the RS232 serial port adapter. The to any iButton. Both, the iButton probe cables
DS1402D-DR8 is a part of the DS1402 series. and the Blue Dot receptor cables can touch any
It is a 1-Wire network cable designed to iButton, but can only hold the F5 version
connect any serial or USB 1-Wire port adapter iButtons. The DS1402BR8 is the only cable
that has a RJ11 jack with up to two iButtons that connects to the DS1401 iButton Holder.
simultaneously. The DS1402D-DR8 Blue Dot Application of DS1402-series, 1-Wire network
receptor cable can touch any iButton for cables range from software protection and
reading, but can only retain the F5 version access control to asset management and the
iButtons. major thermal monitoring through handheld
computers. IButton and 1-Wire are registered
Key Features:-
trademarks of Dallas Semiconductor Corp. The
DS1402D Blue Dot Receptors are iButton
 Coiled cable for connecting iButtons to
reader/probes that would provide a convenient
1-Wire networks
pipeline into the PC for an iButton-to-PC
 Convenient, off-the-shelf connectivity.
communication. The receptor's cable connects
 For momentary (F3/F5 Micro Can) or
to a USB, serial or a parallel-port 1-Wire
dwelled contact (F5 Micro Can only).
adapter, whichever type of port you wish to
 Adhesive pad for mounting on objects.

10
use. The receptor itself easily affixes to any specific for the specific user. All information
accessible spot on the front of the PC. The user of the user is stored in the java ring.
can elect a quick information transfer with a
momentary touch of the iButton to the Blue
Dot. For hands-free operation the iButton can
be snapped into the Blue Dot and remain there.
Each receptor contains two Blue Dots to
accommodate instances where multiple Fig 4.6 Java Ring with Door application
iButtons are required for a transaction. A
User simply has to press the
company's policy may, for example, require
signet of the java ring against the blue dot
both an employee and a supervisor to
receptor and the system connected to the
authenticate access to sensitive information
receptor performs the function that the applets
stored on a network server.
instruct it to.java ring has the user profile and
the same profile is present in the door
embedded system also, when the user press the
signet of the java ring against the java ring
reader which is embedded at the handle of the
door the data is transferred from the ring to
door system. if the profile is authentic means
user is authentic to open the door the applets
president in the ring instruct the door to open.
Information is transferred between iButton and
a PC with a momentary contact, at up to 142K
Fig 4.5 Types of Blue dot receptor’s available in the
bits per second. To do that one presses iButton
market
to the Blue Dot receptor, a $15 pipeline into

4.3 Working of Java Ring PC. The Blue Dot sticks to any convenient spot
on the front of a PC and is cabled to the serial
Since java ring is programmed or parallel port in the back. Postal service has
with the applets and the programming is done approved the cryptographic iButton as a Postal
according to our application and this will Security Device to be used in its PC Postage

11
program that allows individuals to download confidential data provides a much higher
postage off the Internet and print it from their degree of data security than that afforded by
own printers. EEPROM memory. The fact that the
communication path between the Crypto
4.4 Security in Java Ring iButton and the outside world is limited to a
single data line provides additional security
The java ring provides very
against hardware attacks by limiting the range
high degree of security for the confidential data
of signals accessible to the hacker. In addition,
that is stored in the NVRAM memory. The
the processor itself is driven by an unstabilized
barrier substrate and the triple layer technique
ring oscillator operating over a range of 10 to
effectively deny access the unauthorized access
20 megahertz, so that the clock frequency of
to the NVRAM confidential data. In the worst
the processor is not constant and cannot be
case if any unauthorized access penetrates the
determined by external means. This differs
barrier the security processor detects it and
from the design of alternative devices in which
immediately the data which is written in the
the processor clock signal is injected by the
NVRAM. The Crypto iButton hardware
reader and is therefore exactly determined by
platform offers a unique set of the special
the host processor. External control of the
features expressly designed to prevent private
clock provides a valuable tool to hackers, since
keys and other confidential information from
they can repetitively cycle such a processor to
being becoming available to hackers. The
the same point in its execution simply by
silicon die containing the processor, ROM, and
applying the same number of clock cycles.
NVRAM memory is metallurgically bonded to
Control of the clock also affords a means to
the barrier substrate through which all
induce a calculation error and thereby obtain
electrical contacts are made. This barrier
information that could ultimately reveal the
substrate and the triple-layer metal
secret encryption keys. A 32-kilohertz crystal
construction techniques that are employed in
oscillator is used in the Java iButton to operate
the silicon fabrication effectively deny access
the time-of-day clock at a constant and well-
to the data stored in the NVRAM. If any
controlled frequency that is independent of the
attempt is made to penetrate these barriers, the
processor clock.
NVRAM data is immediately erased. This
construction technique and the use of NVRAM
for the storage of private keys and other

12
4.4.1 Security through Java Ring in a Billing device, rail,bus,air reservations, vehicle

car monitoring, vehicle location, and all of the


other functions are being done via wireless
communication. The net result of this is a very
inexpensive rental car for local use by residents
and tourists. This will create a new business for
rental car companies competing for business
travelers in the saturated airport rental car
market.
Fig 4.7 Security through Java Ring in a car

4.5 Application of Java Ring


The Sun concept car's security
is based on a Java ring that contains a profile of
The java ring is used initially as
the user. You connect the Java ring to a ring
a rugged portable data carriers. Often in very
receptor in the car, and the car knows, based on
harsh environmental conditions. It is used for
your profile, what you are allowed to do. For
many real world application e.g. for opening
example, a ring given to a mechanic or wallet
the door, in the e-banking application for
allows that person to see the dashboard and
getting the balance in your account. Logging
drive 40 miles per hour within the one block
into your personal computer and providing
radius, but no faster or farther than. In a family
security in your car. The IButton memory
where both the husband and wife drive the car,
devices have been deployed in vast quantities
each has individualized settings, so that when
as rugged portable data carriers, often in harsh
they enter the car, their environments are
environmental conditions. Among the large-
configured to the profiles on their rings. The
scale uses that are as transit fare carriers in
Java rings are authorized through the Personal
Istanbul, Turkey; as maintenance record
Identification Numbers (PINs) so that no one
carriers on the sides of Ryder trucks; and as
can steal a person's ring and run off with the
mailbox identifiers that are inside the mail
car. Sun representatives are also talking to the
compartments of the U.S. Postal Service's
automakers, who are developing the automated
outdoor mailboxes. They are worn as earrings
rental cars. In this potential market, a driver
by cows in Canada to hold vaccination records,
can use his or her ring to access a vehicle and
and they are used by agricultural workers in
simply leave it when done with ought a lock.
many areas as rugged substitutes for timecards.

13
A few important facts can be
stated about the use of the Java Ring:

 Authentication is most crucial to most


applications, since billing and privacy
is based on it.
 A very easy and a very convenient way
Fig 4.8 Account balance through internet using Java for users.
Ring  It is more secure than using passwords,
since passwords are short or can be
This demonstration shows how guessed.
 It is easier for the administrators to
an e-banking application (Jini client) tries to
maintain the security infrastructure, sin-
connect to any bank server (Jini service) to ce only password can be forgotten.
retrieve the current account balance of that
 A ring is a personal thing that the user
user. Since all bank data must be treated
and only the user carries along him/her
confidential, the bank server interacts with the anytime and anywhere, so that he/she
security infrastructure that is installed at the can authenticate him/her-self in every
situation.
bank, before it responds to the application
 It is also possible to use a tag on the
present. The bank’s security infrastructure key ring or a watch instead of a ring.
demands that is the user must authenticate
him/her-self to get the permission. Therefore 4.6 Highlights of Java Ring
an authentication scheme is started at user side
 Runs Java better (plus portions
that asks the user to push her Java Ring on the
enhance Java Card 2.0)
Java Ring reader. Inside the Java Ring resides  Careful attention to physical security
a Java interpreter that executes cryptographic (rapid zeroization)
routines to perform that task. After the  Durability to stand up to everyday use
 High memory capacity (up to 134K
authentication process on the Java Ring, the
bytes NV SRAM)
bank knows the identity of the user and that  Retail connectivity to 250 million
he/she is really the one, he/she pretends to be. existing computers (less if designed-in
before manufacturing)
Then the bank service can send the confidential
 Highly secure through the rapid
and personalized data to the e-banking zeroization method and auto erasing
application that displays the current account program on forcible access to the data.
balance.

14
5. Conclusion
6. Bibliography

[1] Mobile Communications by Jochen Schiller

[2] Blue tooth Connect without Cables Jennifer


Bray and Charles F Sturman

[3] Cellular & Mobile Communications by


Fig 5.1: Digital Watch LEE

The basic idea behind the [4] www.IBM.com

digital jewelry concept is to have the [5] www.howstuffworks.com


convenience of wireless, wearable computers
or phones while remaining fashionably sound.
The Java iButton, therefore, is simply the most
latest and most complex descendant of a long
line of products that have proven they to be
highly successful in the marketplace. With its
stainless steel armor, it offers the most durable
packaging for a class of products that likely
will suffer heavy use and abuse as personal
possessions. The iButton form factor permits
attachment to a wide variety of personal
accessories that includes rings, watchbands,
key fobs, wallets, bracelets, and necklaces, so
the user can select a variation that suits his or
her lifestyle. It is hoped to be marketable soon,
however, several bugs remain. Charging
capabilities and cost are just a sample of the
problems that lurk.

15

You might also like