Java Ring 1
Java Ring 1
1. INTRODUCTION
The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter that
houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM,
32 KB of ROM, a real-time clock and a Java virtual machine, which is a piece of
software that recognizes the Java language and translates it for the user's computer
system.
At Celebration School, the rings have been programmed to store electronic cash
to pay for lunches, automatically unlock doors, take attendance, store a student's
medical information and allow students to check out books. All of this information is
stored on the ring's iButton. Students simply press the signet of their Java Ring against
the Blue Dot receptor, and the system connected to the receptor performs the function
that the applet instructs it to. In the future, the Java Ring may start your car. Mobile
computing is beginning to break the chains that tie us to our desks, but many of today's
mobile devices can still be a bit awkward to carry around. In the next age of computing,
we will see an explosion of computer parts across our bodies, rather than across our
desktops. Digital jewelry, designed to supplement the personal computer, will be the
evolution in digital technology that makes computer elements entirely compatible with
the human form.
The Java Ring, first introduced at Java One Conference, has been tested at
Celebration School, an innovative K-12 school just outside Orlando; FL.The rings given
to students are programmed with Java applets that communicate with host applications
on networked systems. Applets are small applications that are designed to be run within
another application. The Java Ring is snapped into a reader, called a Blue Dot receptor,
to allow communication between a host system and the Java Ring.
2.HISTORY
In the summer of 1989, Dallas Semiconductor Corp. produced the first
stainlesssteelencapsulated memory devices utilizing the Dallas Semiconductor 1-Wire
communication protocol. By 1990, this protocol had been refined and employed in a
variety of self-contained memory devices. Originally called "touch memory" devices,
they were later renamed "iButtons." Packaged like batteries, iButtons have only a single
active electrical contact on the top surface, with the stainless steel shell serving as
ground.
Data can be read from or written to the memory serially through a simple and
inexpensive RS232C serial port adapter, which also supplies the power required to
perform the I/O. The iButton memory can be read or written with a momentary contact to
the "Blue Dot" receptor provided by the adapter. When not connected to the serial port
adapter, memory data is maintained in non-volatile random access memory (NVRAM)
by a lifetime lithium energy supply that will maintain the memory content for at least 10
years. Unlike electrically erasable programmable read-only memory (EEPROM), the
NVRAM iButton memory can be erased and rewritten as often as necessary without
wearing out. It can also be erased or rewritten at the high speeds typical of
complementary metal oxide semiconductor (CMOS) memory, without requiring the time-
consuming programming of EEPROM.
Since their introduction, iButton memory devices have been deployed in vast quantities
as rugged portable data carriers, often in harsh environmental conditions. Among the
large-scale uses are as transit fare carriers in Istanbul, Turkey; as maintenance record
carriers on the sides of Ryder trucks; and as mailbox identifiers inside the mail
compartments of the U.S. Postal Service's outdoor mailboxes. They are worn as
earrings by cows in Canada to hold vaccination records, and they are used by
agricultural workers in many areas as rugged substitutes for timecards.
The iButton product line and its many applications are described at Dallas
Semiconductor's iButton Web site, which is listed in the Resources section. Every
iButton product is manufactured with a unique 8-byte serial number and carries a
guarantee that no two parts will ever have the same number. Among the simplest
iButtons are memory devices that can hold files and subdirectories and can be read and
written like small floppy disks. In addition to these, there are iButtons with
passwordprotected file areas for security applications, iButtons that count the number of
times they have been rewritten for securing financial transactions, iButtons with
temperature sensors, iButtons with continuously running date/time clocks, and even
iButtons containing powerful microprocessors. The java ring was first introduced in the
year 1998, in the java one conference .the ring was built by the Dalas semiconductor
corporation.
3.COMPONENTS
The main components of the java ring are following:-
_ JAVA VIRTUAL MACHINE(JVM)
_ 134KB OF RAM
_ 32KB OF RAM
_ REAL TIME CLOCK
_ IBUTTOON
_ BLUE DOT RECEPTOR
At Celebration School, the rings have been programmed to store electronic cash
to pay for lunches, automatically unlock doors, take attendance, store a student's
medical information and allow students to check out books. All of this information is
stored on the ring's iButton. Students simply press the signet of their Java Ring against
the Blue Dot receptor, and the system connected to the receptor performs the function
that the applet instructs it to. In the future, the Java Ring may start your car.
Mobile computing is beginning to break the chains that tie us to our desks, but
many of today's mobile devices can still be a bit awkward to carry around. In the next
age of computing, we will see an explosion of computer parts across our bodies, rather
than across our desktops. Digital jewelry, designed to supplement the personal
computer, will be the evolution in digital technology that makes computer elements
entirely compatible with the human form.
3.2 RAM
Java ring contains 134kb of non-volatile random access memory. Program and data is
stored in this non-volatile random access memory .This non-volatile random access
memory offers high read/write speed and also provides temper resistance through
instantaneous clearing of all memory when tempering is detected. This process is called
rapid zeroization.The NVRAM iButton memory can be erased or rewritten as often as
necessary without wearing out. High security is offered by the ability to erase the
content of NVRAM extremely quickly.
The Crypto iButton also provides an excellent hardware platform for executing
Java because it utilizes NVRAM for program and data storage. With 6 kilobytes of
existing NVRAM and the potential to expand the NVRAM capacity to as much as 128
kilobytes in the existing iButton form factor, the Crypto iButton can execute Java with a
relatively large Java stack situated in NVRAM. This memory acts as conventional high
speed RAM when the processor is executing, and the lithium energy preserves the
complete state of the machine while the Java Ring is disconnected from the reader.
There is therefore no requirement to deal with persistent objects in a special way --
objects persist or not depending on their scope so the programmer has complete control
over object persistence. As in standard Java, the Java iButton contains a garbage
collector that collects any objects that are out of scope and recycles the memory for
future use. Applets can be loaded and unloaded from the Java iButton as often as
needed. All the applets currently loaded in a Java iButton are effectively executing at
zero speed any time the iButton is not in contact with a Blue Dot receptor. As the Java
Card 2.0 specification was proposed, Dallas Semiconductor became a JavaSoft
licensee. The agreement called for the development of a Java Card 2.0 implementation
and also for the design of "plus portions" that take advantage of the unique capabilities
afforded by the Crypto iButtons NVRAM, such as the ability to support a true Java stack
and garbage collection. With the addition of the continuously running lithium-powered
time-ofday clock and the high-speed, large-integer modular exponentiation engine.
3.3 ROM
The java ring contains 32kb of ROM .A special kind of operating system called
Ecommerce operating system which is based on java and JVM is stored in the
ROM.This operating system handles all the operation which is happening in the iButton.
It is stored in ROM because it is not supposed to be altered by the user. The Crypto
iButton hardware platform offers a unique set of special features expressly designed to
prevent private keys and other confidential information from becoming available to
hackers. Figure 1 shows a detail of the internal construction of the Crypto iButton. The
silicon die containing the processor, ROM, and NVRAM memory is metallurgically
bonded to the barrier substrate through which all electrical contacts are made. This
barrier substrate and the triple-layer metal construction techniques employed in the
silicon fabrication effectively deny access to the data stored in the NVRAM. If any
attempt is made to penetrate these barriers, the NVRAM data is immediately erased.
This construction technique and the use of NVRAM for the storage of private keys and
other confidential data provides a much higher degree of data security than that
afforded by EEPROM memory. The fact that the communication path between the
Crypto iButton and the outside world is limited to a single data line provides additional
security against hardware attacks by limiting the range of signals accessible to the
hacker.
clock cycles. Control of the clock also affords a means to induce a calculation error and
thereby obtain information that can ultimately reveal secret encryption keys. A 32
kilohertz crystal oscillator is used in the Java iButton to operate the time-of-day clock at
a constant and well-controlled frequency that is independent of the processor clock.
crystal oscillator is used in the Java iButton to operate the time-of-day clock at a
constant and well-controlled frequency that is independent of the processor clock.
3.5 i-BUTTON
The jewel of the java ring is the java iButton .It contains the one million transistor
processor single chip trusted microprocessor with powerful java virtual machine(JVM)
housed in rugged and secure stainless steel case. The Crypto iButton hardware
platform offers a unique set of special features expressly designed to prevent private
keys and other confidential information from becoming available to hackers. Figure 1
shows a detail of the internal construction of the Crypto iButton. The silicon die
containing the processor, ROM, and NVRAM memory is metallurgically bonded to the
barrier substrate through which all electrical contacts are made. This barrier substrate
and the triple-layer metal construction techniques employed in the silicon fabrication
effectively deny access to the data stored in the NVRAM. If any attempt is made to
penetrate these barriers, the NVRAM data is immediately erased. This construction
technique and the use of NVRAM for the storage of private keys and other confidential
data provides a much higher degree of data security than that afforded by EEPROM
memory. The fact that the communication path between the Crypto iButton and the
outside world is limited to a single data line provides additional security against
hardware attacks by limiting the range of signals accessible to the hacker. In addition,
the processor itself is driven by an unstabilized ring oscillator operating over a range of
10 to 20 megahertz, so that the clock frequency of the processor is not constant and
cannot be determined by external means. This differs from the design of alternative
devices in which the processor clock signal is injected by the reader and is therefore
exactly determined by the host processor. External control of the clock provides a
valuable tool to hackers, since they can repetitively cycle such a processor to the same
point in its execution simply by applying the same number of clock cycles. Control of the
clock also affords a means to induce a calculation error and thereby obtain information
that can ultimately reveal secret encryption keys. A 32-kilohertz crystal oscillator is used
in the Java iButton to operate the time-of-day clock at a constant and well-controlled
frequency that is independent of the processor clock. It is originally called touch memory
devices they were later renamed as “iButtons packaged” like batteries. IButton have
only a single active electrical contact on the top surface and with the stainless steel shell
serving as ground. Every iButton product is manufactured with unique 8 byte serial
number and carries a guaranty that no two IButtons have same number. Among the
simplest iButton are memory devices which can hold files and directories that can be
read and written like small floppy disks. An iButton is a microchip similar to those used
in smart card but housed in a round stainless steel button of 17.35mm x 3.1mm -
5.89mm in size (depending on the function). The iButton was invented and is still
manufactured exclusively by Dallas Semiconductor mainly for applications in harsh and
demanding environments.
Like a smart card, an iButton does not have an internal power source. It requires
connection to a reader (known as a Blue Dot Receptor) in order to be supplied with
power and to receive input and send output. Unlike some smart cards, there are
currently no contactless iButtons: they require physical contact with a reader to function.
There are iButtons that measure temperature (for food storage and transport);
have an electronic ID (for physical access to buildings); and store e-cash (for purchases
both in stores and via the web). For e-commerce applications, the iButton can support
Java Card 2.0/OpenCard standards in addition to proprietary software.
Among the major successes for the iButton have been its use in Turkey as an
epurse for the mass transit system; in Argentina and Brazil for parking meters; and in
the United States as Blue Mailbox attachments that improve postal efficiency.
the Blue Dot receptor cables can touch any iButton, but can only hold the F5 version
iButtons. The DS1402BR8 is the only cable that connects to the DS1401 iButton Holder.
Applications of the DS1402-series 1-Wire network cables range from software
protection and access control to asset management and thermal monitoring through
handheld computers.IButton and 1-Wire are registered trademarks of Dallas
Semiconductor Corporation. The DS1402D Blue Dot Receptors are iButton
reader/probes that provide a convenient pipeline into the PC for iButton-to-PC
communication. The receptor's cable connects to a USB, serial or parallel-port 1- Wire
adapter, whichever type of port you wish to use. The receptor itself easily affixes to any
accessible spot on the front of the PC. The user can elect a quick information transfer
with a momentary touch of the iButton to the Blue Dot. For hands-free operation the
iButton can be snapped into the Blue Dot and remain there. Each receptor contains two
Blue Dots to accommodate instances where multiple Buttons are required for a
transaction. A company's policy may, for example, require both an employee and a
supervisor to authenticate access to sensitive information stored on a network server.
4. WORKING
Since java ring is programmed with the applets and the programming is done according
to our application and this will specific for the specific user. All information of the user is
stored in the java ring.
User simply has to press the signet of the java ring against the blue dot receptor and the
system connected to the receptor performs the function that the applets instruct it
to.java ring has the user profile and the same profile is present in the door embedded
system also, when the user press the signet of the java ring against the java ring reader
which is embedded at the handle of the door the data is transferred from the ring to door
system. if the profile is authentic means user is authentic to open the door the applets
president in the ring instruct the door to open. Information is transferred between iButton
and a PC with a momentary contact, at up to 142K bits per second. To do that one
presses iButton to the Blue Dot receptor, a $15 pipeline into PC. The Blue Dot sticks to
any convenient spot on the front of a PC and is cabled to the serial or parallel port in the
back. According to the Dallas Superconductor's information, over 41 million iButtons are
currently in circulation. List of the major users include the U.S. Post Office, entire truck
fleet fitted with iButtons that track vehicle maintenance; Citizens of Istanbul, Turkey, who
store digital cash in the iButton, using the device as a small change purse on their mass
transit system. it was also said that the U.S. Postal service has approved the
cryptographic iButton as a Postal Security Device to be used in its PC Postage program
that allows individuals to download postage off the Internet and print it from their own
printers
Since their introduction, iButton memory devices have been deployed in vast
quantities as rugged portable data carriers, often in harsh environmental conditions.
Among the large-scale uses are as transit fare carriers in Istanbul, Turkey; as
maintenance record carriers on the sides of Ryder trucks; and as mailbox identifiers
inside the mail compartments of the U.S. Postal Service's outdoor mailboxes. They are
worn as earrings by cows in Canada to hold vaccination records, and they are used by
agricultural workers in many areas as rugged substitutes for timecards.
The iButton product line and its many applications are described at Dallas
Semiconductor's iButton Web site, which is listed in the Resources section. Every
iButton product is manufactured with a unique 8-byte serial number and carries a
guarantee that no two parts will ever have the same number. Among the simplest
iButtons are memory devices that can hold files and subdirectories and can be read and
written like small floppy disks. In addition to these, there are iButtons with password
protected file areas for security applications, iButtons that count the number of times
they have been rewritten for securing financial transactions, iButtons with temperature
sensors, iButtons with continuously running date/time clocks, and even iButtons
containing powerful microprocessors.
5.SECURITY
The java ring provides very high degree of security for the confidential data that is stored
in the NVRAM memory. The barrier substrate and the triple layer technique effectively
deny access the unauthorized access to the NVRAM confidential data. In the worst case
if any unauthorized access penetrates the barrier the security processor detects it and
immediately the data which is written in the NVRAM. The Crypto iButton hardware
platform offers a unique set of special features expressly designed to prevent private
keys and other confidential information from becoming available to hackers. Figure 1
shows a detail of the internal construction of the Crypto iButton. The silicon die
containing the processor, ROM, and NVRAM memory is metallurgically bonded to the
barrier substrate through which all electrical contacts are made. This barrier substrate
and the triple-layer metal construction techniques employed in the silicon fabrication
effectively deny access to the data stored in the NVRAM. If any attempt is made to
penetrate these barriers, the NVRAM data is immediately erased. This construction
technique and the use of NVRAM for the storage of private keys and other confidential
data provides a much higher degree of data security than that afforded by EEPROM
memory. The fact that the communication path between the Crypto iButton and the
outside world is limited to a single data line provides additional security against
hardware attacks by limiting the range of signals accessible to the hacker. In addition,
the processor itself is driven by an unstabilized ring oscillator operating over a range of
10 to 20 megahertz, so that the clock frequency of the processor is not constant and
cannot be determined by external means. This differs from the design of alternative
devices in which the processor clock signal is injected by the reader and is therefore
exactly determined by the host processor. External control of the clock provides a
valuable tool to hackers, since they can repetitively cycle such a processor to the same
point in its execution simply by applying the same number of clock cycles. Control of the
clock also affords a means to induce a calculation error and thereby obtain information
that can ultimately reveal secret encryption keys. A 32-kilohertz crystal oscillator is used
in the Java iButton to operate the time-of-day clock at a constant and well-controlled
frequency that is independent of the processor clock.
The Sun concept car's security is based on a Java ring that contains a profile of the
user. You connect the Java ring to a ring receptor in the car, and the car knows, based
on your profile, what you are allowed to do. For example, a ring given to a mechanic or
valet allows that person to see the dashboard and drive 40 miles per hour within a one
block radius, but no faster or farther. In a family where both the husband and wife drive
the car, each has individualized settings, so that when they enter the car, their
environments are configured to the profiles on their rings. Java rings are authorized
through Personal Identification Numbers (PINs) so that no one can steal a person's ring
and run off with the car.
Sun representatives are also talking to automakers who are developing
automated rental cars. In this potential market, a driver can use his or her ring to access
a vehicle and simply leave it when done. Billing, reservations, vehicle monitoring,
vehicle location, and all other functions are done via wireless communication. The net
result is a very inexpensive rental car for local use by residents and tourists. This will
create a new business for rental car companies competing for business travelers in the
saturated airport rental car market.
6.APPLICATION
The java ring is used initially as rugged portable data carriers. often in harsh
environmental condition. it is used for many real world application e.g for opening the
door ,in the e-banking application for getting the balance in your account. Logging in
your personal computer. Providing security in your car. iButton memory devices have
been deployed in vast quantities as rugged portable data carriers, often in harsh
environmental conditions. Among the large-scale uses are as transit fare carriers in
Istanbul, Turkey; as maintenance record carriers on the sides of Ryder trucks; and as
mailbox identifiers inside the mail compartments of the U.S. Postal Service's outdoor
mailboxes. They are worn as earrings by cows in Canada to hold vaccination records,
and they are used by agricultural workers in many areas as rugged substitutes for
timecards.
Figure 6: application of java ring for getting account balance of an user through internet
This demonstration shows how an e-banking application (Jini client) tries to connect to a
bank server (Jini service) to retrieve the current account balance of that user. Since all
bank data must be treated confidential, the bank server interacts with the security
infrastructure that is installed at the bank, before it responds to the application. The
bank’s security infrastructure demands that the user must authenticate herself to get the
permission. Therefore an authentication scheme is started at user side that asks the
user to push her Java Ring on the Java Ring reader. Inside the Java Ring resides a
Java interpreter that executes cryptographic routines to perform that task. After the
authentication process on the Java Ring, the bank knows the identity of the user and
that she is really the one, she pretends to be. Then the bank service can send the
confidential and personalized data to the e-banking application that displays the current
account balance. This demonstration shows how an e-banking application (Jini client)
tries to connect to a bank server (Jini service) to retrieve the current account balance of
that user. Since all bank data must be treated confidential, the bank server interacts with
the security infrastructure that is installed at the bank, before it responds to the
application. The bank’s security infrastructure demands that the user must authenticate
herself to get the permission. Therefore an authentication scheme is started at user side
that asks the user to push her Java Ring on the Java Ring reader. Inside the Java Ring
resides a Java interpreter that executes cryptographic routines to perform that task.
After the authentication process on the Java Ring, the bank knows the identity of the
user and that she is really the one, she pretends to be. Then the bank service can send
the confidential and personalized data to the e-banking application that displays the
current account balance.
Figure 6.2: application of java ring for configuring your car component according to
preferences
.
The Sun concept car's security is based on a Java ring that contains a profile of the
user. You connect the Java ring to a ring receptor in the car, and the car knows, based
on your profile, what you are allowed to do. For example, a ring given to a mechanic or
valet allows that person to see the dashboard and drive 40 miles per hour within a one
block radius, but no faster or farther. In a family where both the husband and wife drive
the car, each has individualized settings, so that when they enter the car, their
environments are configured to the profiles on their rings. Java rings are authorized
through Personal Identification Numbers (PINs) so that no one can steal a person's ring
and run off with the car. Sun representatives are also talking to automakers who are
developing automated rental cars. In this potential market, a driver can use his or her
ring to access a vehicle and simply leave it when done. Billing, reservations, vehicle
monitoring, vehicle location, and all other functions are done via wireless
communication. The net result is a very inexpensive rental car for local use by residents
and tourists. This will create a new business for rental car companies competing for
business travelers in the saturated airport rental car market.
User simply has to press the signet of the java ring against the blue dot receptor and the
system connected to the receptor performs the function that the applets instruct it
to.java ring has the user profile and the same profile is present in the door embedded
system also, when the user press the signet of the java ring against the java ring reader
which is embedded at the handle of the door the data is transferred from the ring to door
system. If the profile is authentic means user is authentic to open the door the applets
present in the ring instruct the door to open. Information is transferred between iButton
and a PC with a momentary contact, at up to 142K bits per second. To do that one
presses iButton to the Blue Dot receptor, a $15 pipeline into PC. The Blue Dot sticks to
any convenient spot on the front of a PC and is cabled to the serial or parallel port in the
back. According to the Dallas Superconductor's information, over 41 million iButtons are
currently in circulation. List of the major users include the U.S. Post Office, entire truck
fleet fitted with iButtons that track vehicle maintenance; Citizens of Istanbul, Turkey, who
store digital cash in the iButton, using the device as a small change purse on their mass
transit system. it was also said that the U.S. Postal service has approved the
cryptographic iButton as a Postal Security Device to be used in its PC Postage program
that allows individuals to download postage off the Internet and print it from their own
printers.
A few important facts can be stated about the use of the Java Ring:
• Authentication is crucial to most applications, since billing and privacy is based on it.
• A very easy and convenient way for users.
• It is more secure than using passwords, since passwords are short or can be
guessed.
• It is easier for administrators to maintain the security infrastructure, since only
password can be forgotten.
• A ring is a personal thing that the user and only the user carries along anytime and
anywhere, so that she can authenticate herself in every situation.
• It is also possible to use a tag on the key ring or a watch instead of a ring.
7.CONCLUSION
Java ring is highly durable because of its rugged and secure stainless packing. It is used
in personal computing. Dallas Semiconductor has produced more than 20 million
physically-secure memories and computers with hard-shell packaging optimized for
personal possession. The Java iButton, therefore, is simply the latest and most complex
descendant of a long line of products that have proven they to be highly successful in
the marketplace. With its stainless steel armor, it offers the most durable packaging for a
class of products that likely will suffer heavy use and abuse as personal possessions.
The iButton form factor permits attachment to a wide variety of personal accessories
that includes rings, watchbands, key fobs, wallets, bracelets, and necklaces, so the user
can select a variation that suits his or her lifestyle.
REFERENCES
[1] http://www.javaworld.com
[2] http://www.electronics.howstuffworks.com
[3] http://www.people.uchicago.edu