Java Ring
Java Ring
CONTENTS
Introduction Components in Java Ring Working Alternative Identification Technologies Advantages Security Applications Disadvantages of Java Ring Conclusion References
2
2
INTRODUCTION
A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user. It contains an inexpensive microprocessor in a stainless steel ibutton running a JVM and it is preloaded with applet. The Java Ring is an extremely secure Javapowered electronic token .
3
3
4
4
5
5
RAM
Java ring contains 134kb of non-volatile random access memory. Program and data is stored in this NVRAM.
The NVRAM iButton memory can be erased or written as often as necessary without wearing out.
6
6
ROM
The java ring contains 32kb of ROM . A special kind of operating system called Ecommerce operating system which is based on java and JVM is stored in the ROM. This operating system handles all the operation which is happening in the iButton. It is stored in ROM because it is not supposed to be altered by the user.
7
7
IBUTTON
The jewel of the java ring is the java iButton. It contains the one million transistor single chip trusted microprocessor with powerful java virtual machine(JVM) housed in rugged and secure stainless steel case. Each iButton has a 8 byte unique and unalterable address laser etched onto its chip inside the can carries a guaranty that no two IButtons have same number.
8
8
TYPES OF IBUTTON
Mainly three types of iButton are in use:
Thermochrone iButton Crypto iButton Memory iButton
10
CRYPTO IBUTTON
The Crypto iButton addresses both components of secure communication, authentication and safe transmission, making it ideal for Internet commerce and/or banking transactions. The Crypto ibutton provides hardware cryptographic services such as long-term safe storage of private keys, secure message digest (hashing).
11
WORKING
The iButton is a slave device and requires a master to initiate communication to it. A master can be a PC or a microprocessor. communication to iButton can be started by a simple touch to a 1-Wire interface called a Blue Dot Receptor. Every iButton has a unique 64-bit serial number, which gives it a unique 1-Wire network address.
User simply has to press the signet of the java ring against the blue dot receptor and the system connected to the receptor performs the function that the applets instruct it to do.
12
PROTOCOL
1-Wire protocol is used. Half-duplex data transfer. Command word sent to iButton slave from the master.
13
14
15
16
Sunlight or other ambient light affects the read rate. Decoding is necessary as light must be converted to electrical energy.
17
The stripes can be damaged by a brief contact to other magnets. Strong fields can erase or damage data. Any dirt will damage the coil and the reader if present during the swipe. They have to be removed from the object for writing.
18
19
ADVANTAGES
Clam-shell steel container, the Micro can is suitable for harsh environments. Contents of NVRAM can be updated dynamically without wearing it out. Provides authentication to users which is crucial for many applications. Provides real memory and more power.
20
SECURITY
The java ring provides very high degree of security for the confidential data and private keys that are stored in the NVRAM memory. Data travels on the network in the encrypted form makes hacking virtually impossible. Java rings are authorized through Personal Identification Numbers (PINs) so that no one can steal a persons ring and use that ring.
21
21
SECURITY
22
CONTINUEu
It provides temper resistance through instantaneous clearing of all memory when tempering is detected. This process is called rapid zeroization. If an excessive voltage is applied to the sole I/O pin, an electronic fuse renders the chip inoperable to protect the chip. The iButton constantly monitors the switch's contacts, and any separation of the cryptographic chip from the switch perform a complete zeroization .
23
APPLICATIONS
The java ring can be used to hold secret codes, credit cards numbers, driver license, other wallet contents, and even some electronic cash.
Its greatest promise appears to lie in its capacity to interact with Internet applications to support strong remote authentication and remotely authorized financial transactions.
24
APPLICATIONS
For opening the door E-bank application Logging in your PC Providing security in your car.
25
CONCLUSION
A very easy and convenient way for users. It is more secure than using passwords, since passwords are short or can be guessed. A ring is a personal thing that the user and only the user carries along anytime and anywhere, so that he can authenticate himself in every situation. It is also possible to use a tag on the key ring or a watch instead of a ring.
27
REFERENCES
www.maxim-ic.com www.javaworld.com javaring.blogspot.com www.useit.com/papers/javaring.html electronics.howstuffworks.com Beauty depends on size, Mangione-Smith, W.H., Concurrency, IEEE, Volume 6, Issue 2, Apr-Jun 1998, pp : 8 10
28
29