Digital Jewelry

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 22

DIGITAL JEWELLRY

1. ABSTRACT 2. INTRODUCTION 3. WHAT IS DIGITAL JEWELRY 4. DIGITAL JEWELRY AND ITS COMPONENTS 5. TECHNICAL SPECIFICATIONS OF DIGITAL JEWELRY 6. DISPLAY TECHNOLOGIES 7. ELECTROMAGNETIC BEADS 8. PROTOTYPES OF DIGITAL JEWELRY
9. THE JAVA RING

10.ADVANTAGES 11.CONCLUSION 12.REFERENCES

DIGITAL JEWELLRY

1. ABSTRACT: Many of todays artist-jewelers are seeking to understand and integrate new and innovative technologies into the design and/or manufacture of their work from CAD and CAM systems to Virtual Reality-based tools through to virtual prototyping. What was once expensive and beyond the reach of individual artist-jewelries is now beginning to become financially viable and is serving to kick-start new conceptual approaches to jewelry, its design and its manufacture. More significant for those working in the field, are changing attitudes and relationships between consumers and personal objects. Stand in any high street and watch how people interact with their mobile phones. They are often treated with a degree of preciousness and interactive preening previously reserved for items of jewelry. Digital jewelry is creating a new sub-category of body adornment? This serves as a single example of a rapid cultural osmosis brought about by interaction with recently developed classes of objects.

Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an explosion of computer parts across our bodies, rather than across our desktops. Basically, jewelry adorns the body, and has very little practical purpose. However, researchers are looking to change the way we think about the beads and bobbles we wear. The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewelry with embedded intelligence i.e., Digital jewelry. Digital jewelry can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication. This paper enlightens on how various computerized jewelry (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile embedded intelligence and how we can store passwords by using java based rings that are most essential in our daily life.

2. INTRODUCTION:

The latest computer trend is to prefer wearable wireless computers. The Computer Fashion Wave, "Digital Jewelry" looks to be the next sizzling fashion trend of the technological wave. The combination of shrinking computer devices and increasing computer power has allowed several companies to begin producing fashion jewelry with embedded intelligence. Today s, manufacturers place millions of transistors on a microchip, which can be used to make small devices that store tons of digital data. The whole concept behind this is to be able to communicate to others by means of wireless appliances. The other key factor of this concept market is to stay fashionable at the same time. By the end of the decade, we are provided with computers which can be adorned, instead of sitting in front of them.

3. WHAT IS DIGITAL JEWELRY? : Digital jewelry is the fashion jewelry with embedded intelligence. Digital jewelry can help you solve problems like forgotten passwords and
4

security badges. Digital jewelry is a nascent catchphrase for wearable ID devices that contain personal information like passwords, identification, and account information. They have the potential to be all-in-one replacements for your drivers license, key chain, business cards, credit cards, health insurance card, corporate security badge, and loose cash. They can also solve a common dilemma of todays wired world the forgotten password.

4.

DIGITAL

JEWELRY

AND

ITS

COMPONENTS: Soon, cell phones will take a totally new form, appearing to have no form at all. Instead of one single device, cell phones will be broken up into their basic components and packaged as various pieces of digital jewelry. Each piece of jewelry will contain a fraction of the components found in a conventional mobile phone. Together, the digitaljewelry cell phone should work just like a conventional cell phone.

The various components that are inside a cell phone:


5

Microphone, Receiver, Touch pad, Display, Circuit board, Antenna, and Battery. IBM has developed a prototype of a cell phone that consists of several pieces of digital jewelry that will work together wirelessly, possibly with Blue tooth wireless technology, to perform the functions of the above components.

FIGURE 1 Cell phones may one day be comprised of digital accessories that Work together through wireless connections.

Here are the pieces of computerized-jewelry phone and their functions:

Earrings - Speakers embedded into these earrings acts as the phone's receiver.
6

Necklace - Users will talk into the necklace's embedded microphone. Ring - Perhaps the most interesting piece of the phone, this "magic decoder ring is equipped with light-emitting diodes (LEDs) that flash to indicate an incoming call. It can also be programmed to flash different colors to identify a particular caller or indicate the importance of a call. Bracelet - Equipped with a video graphics array (VGA) display, this wrist display could also be used as a caller identifier that flashes the name and phone number of the caller. With a jewelry phone, the keypad and dialing

function could be integrated into the bracelet, or else dumped altogether -- it's likely that voice-recognition software will be used to make calls, a capability that is already commonplace in many of today's cell phones. Simply say the name of the person you want to call and the phone will connects that persons number. IBM is also working on a miniature rechargeable battery to power these components.

FIGURE 2 IBM's magic decoder rings will flash when you get a call. The same ring that flashes for phone calls could also inform you that e-mail is piling up in your inbox. This flashing alert could also indicate the urgency of the e-mail. The mouse-ring that IBM is developing will use the company's Track Point technology to wirelessly move the cursor on a computer-monitor display. (Track Point is the little button embedded in the keyboard of some laptops). IBM Researchers have transferred Track Point technology to a ring, which looks something like a black-pearl ring. On top of the ring is a little black ball that users will

swivel to move the cursor, in the same way that the Track Point button on a laptop is used.

FIGURE 3 The eyepiece above displays images and data received wirelessly from the Communicator's belt module. The mouse-ring that IBM is developing will use the company's Track Point technology to wirelessly move the cursor on a computer-monitor display. (Track Point is the little button embedded in the keyboard of some laptops). IBM Researchers have transferred TrackPoint technology to a ring, which looks something like a black-pearl ring. On top of the ring is a little black ball that users will
9

swivel to move the cursor, in the same way that the TrackPoint button on a laptop is used. This Track Point ring will be very valuable when monitors shrink to the size of watch face. In the coming age of ubiquitous computing, displays will no longer be tied to desktops or wall screens. Instead, you'll wear the display like a pair of sunglasses or a bracelet. Researchers are overcoming several obstacles facing these new wearable displays, the most important of which is the readability of information displayed on these tiny devices.

FIGURE 4 Prototype bracelet display developed by IBM Charmed Technology is already marketing its digital jewelry, of including the
10

futuristic-looking Charmed

eyepiece display. The eyepiece is the display component company's

Communicator, a wearable, wireless, broadbandInternet device that can be controlled by voice, pen or handheld keypad. The Communicator can be used as an MP3 player, video player and cell phone. The Communicator runs on the company's Linux-based Nanix operating system. 5. TECHNICAL SPECIFICATIONS OF DIGITAL JEWELRY: Digital jewelry devices consist of a screen or display for information, most likely consisting of 716-segment, or dot matrix LEDs, LCDs, or other technologies such as electroluminescent material (EL) or others, which could become an optional display. So too, an audiovisual or other 'display' could consist of a speaker, a single flashing light, a sensor of some kind (such as a temperature driven EL display), or other informational aesthetic. The display layer sits on a face of the device, which is enclosed in some material such as plastic, metal, crystal, or other material. It has external switches and buttons on its side and a data-port for accessing the programmable electronic circuit inside. A micro controller that is a surface mounted device (SMD) on a printed circuit board (PCB) with resistors (R) and capacitors (C) are the internal 'guts' of the jewelry.
11

6. DISPLAY TECHNOLOGIES: The digital jewelry display, for instance, every alphabet and number system has found representation within the electronics realm and 'dotmatrix' (a matrix of single LEDs) is used to display Chinese and Japanese and other character sets, as can the alternative display for LCDs (liquid-crystaldisplays) also be used, as often found in watches.

FIGU RE 5 Digital Jewelry can be made in many different sizes and shapes with a variety of materials ranging from plastic and metal to rubber and glass. They utilize electromagnetic properties and electronics to display information through a screen or display of some kind.

12

This could range from LED 7-segment, 16segment, dot matrix, and other programmable LEDs devices to LCDs, OLEDs, and other displays, which are all driven by the self-contained jewelry devices themselves.

7. ELECTROMAGNETIC BEADS: The closest comparison to this model is that of 'beads' which are strung together to make a custom necklace or bracelet, with interchangeable electromagnetic component systems or devices. One bead may be a capacitor on the inside, and a solar panel on the outside. Another bead may have an internal resistor which feed power into a programmed microcontroller bead which drives an external screen, with other options available in a variety of bead configurations which compose a circuit, including beads with a piezo element, voltage regulator, crystal, or rechargeable battery as part of the modular jewel circuit. The number of data pins on the microcontroller needs to be enough to easily program the display layer plus the switches without overly complex and advanced coding methods

13

The key feature of the device is ability to work effectively and balancing of electronic components within the circuit with a light-duty processing and limited power consumption required for the display (d) layer

FIGURE 6 8. PROTOTYPES OF DIGITAL JEWELRY:

FIGURE 7

Complete HIOX necklace showing all 26 letters of the Roman alphabet extended in 4-dimensional space-time. Metal with leather cord.

14

Programmable HIOX ring with 16-segment LED display FIGURE 8

9. THE JAVA RING: It seems that everything we access today is under lock and key. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. Dallas Semiconductor is developing a new Java-based, computerized ring that will automatically unlock doors and log on to computers.

15

FIGURE 9 The Java Ring can be programmed to give you access to every door and device. The Java Ring is an extremely secure Java-powered electronic token with a continuously running, unalterable realtime clock and rugged packaging, suitable for many applications. The jewel of the Java Ring is the Java iButton -- a one-million transistor, single-chip trusted microcomputer with a powerful Java virtual machine (JVM) housed in a rugged and secure stainless-steel case. Designed to be fully compatible with the Java Card 2.0 standard the processor features a high-speed 1024-bit modular exponentiator for RSA encryption, large RAM and ROM memory capacity, and an unalterable real time clock. The packaged module has only a single electrical contact and a ground return, conforming to the specifications of the Dallas Semiconductor 1Wire bus. Lithium-backed non-volatile SRAM offers high read/write speed and unparalleled tamper resistance through near-instantaneous clearing of all
16

memory when tempering is detected, a feature known as rapid zeroization. Data integrity and clock function are maintained for more than 10 years. The 16-millimeter diameter stainless steel enclosure accommodates the larger chip sizes needed for up to 128 kilobytes of high-speed nonvolatile static RAM. The small and extremely rugged packaging of the module allows it to attach to the accessory of your choice to match individual lifestyles, such as a key fob, wallet, watch, necklace, bracelet, or finger ring.
The Java Ring is snapped into a reader, called a Blue Dot receptor, to allow communication between a host system and the Java Ring.

Fig.10.Blue Dot receptor 9 .The Java connection With experience designing the E-Commerce operating system and VM for the Crypto iButton hardware platform, the firmware design team at Dallas Semiconductor could readily appreciate the advantages of a new operating system for the Crypto iButton based on Java. With a Java iButton, a vast number of existing Java programmers could easily learn to write applets that could be compiled with the
17

standard tools available from Sun Microsystems, loaded into the Java iButton, and run on demand to support a wide variety of financial applications. The Java Card 2.0 specification provided the opportunity to implement a useful version of the JVM and runtime environment with the limited resources available to a small processor.

Java Ring

The Crypto iButton also provides an excellent hardware platform for executing Java because it utilizes NVRAM for program and data storage. With 6 kilobytes of existing NVRAM and the potential to expand the NVRAM capacity to as much as 128 kilobytes in the existing iButton form factor, the Crypto iButton can execute Java with a relatively large Java stack situated in NVRAM. This memory acts as conventional high-speed RAM when the processor is executing, and the lithium energy preserves the complete state of the machine while the Java Ring is disconnected from the reader. There is therefore no requirement to deal with persistent
18

objects in a special way -- objects persist or not depending on their scope so the programmer has complete control over object persistence. As in standard Java, the Java iButton contains a garbage collector that collects any objects that are out of scope and recycles the memory for future use. Applets can be loaded and unloaded from the Java iButton as often as needed. All the applets currently loaded in a Java iButton are effectively executing at zero speed any time the iButton is not in contact with a Blue Dot receptor. As the Java Card 2.0 specification was proposed, Dallas Semiconductor became a JavaSoft licensee. The agreement called for the development of a Java Card 2.0 implementation and also for the design of "plus portions" that take advantage of the unique capabilities afforded by the Crypto iButtons NVRAM, such as the ability to support a true Java stack and garbage collection. With the addition of the continuously running lithium-powered time-ofday clock and the high-speed, large-integer modular exponentiation engine, the Java iButton implementation of Java Card 2.0 with plus portions promises an exciting new feature set for advanced Java Card applications.

19

9.b Highlights of Java Ring Runs Java better (plus portions enhance Java Card 2.0) Careful attention to physical security (rapid zeroization) Durability to stand up to everyday use High memory capacity (up to 134K bytes NV SRAM) Retail connectivity to 250 million existing computers (less if designed-in before manufacturing) 13.ADVANTAGES:

As

Compting

devices

are

embedded it is not necessary to carry cells r computer...hence it is easy to carry everywhere

It provides security for example JAVA RING is used to lock or unlock doors or computers...as we use passwords and keys to lock our doors and computers we don't need to remember all those passwords and carry all those keys. SO java ring is designed to provide security

20

11. CONCLUSION:

The basic idea behind the digital jewelry concept is to have the convenient wireless, wearable computers while remaining fashionably sound. It is hoped to be launched soon in the market. However, sample of the problems that lurk several bugs remain. Charging capabilities and cost are just a

12. REFERENCES: BOOKS: 1. Mobile Communications --Jochen Schiller 2. Bluetooth Connect without Cables--Jennifer Bray and Charles F Sturman
3. Cellular & Mobile Communications-- LEE

21

22

You might also like