javaring seminars report
#7
[attachment=12418]
ABSTRACT:
A Java Ring is a finger ring that contains a small microprocessor which runs JVM and is preloaded with applets. The jewel of Java Ring is Java iButton, which is a microchip enclosed in a secure package. There are many technologies similar to iButton. But there is no match for this technology. A Java Ring goes beyond a traditional smart card by providing real memory, more power, and a capacity for dynamic programming.
1 INTRODUCTION
A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user, a sort of smart card that is wearable on a finger. Sun Microsystem's Java Ring was introduced at their JavaOne Conference in 1998 and, instead of a gemstone, contained an inexpensive microprocessor in a stainless-steel iButton running a Java virtual machine and preloaded with applets.
Workstations at the conference had "ring readers" installed on them that downloaded information about the user from the conference registration system. This information was then used to enable a number of personalized services. For example, a robotic machine made coffee according to user preferences, which it downloaded when they snapped the ring into another "ring reader." Java Rings could have a number of real-world applications, such as starting your car and having all your vehicle's components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences.
2.HISTORY
In the summer of 1989, Dallas Semiconductor Corp. produced the first stainless-steel-encapsulated memory devices utilising the Dallas Semiconductor 1-Wire communication protocol. By 1990, this protocol had been refined and employed in a variety of self contained memory devices. Originally called touch memory devices, they were later renamed iButtons. Packaged.
like batteries, iButtons have only a single electrical contact on the top surface, with the stainless steel shell serving as ground. With one of these rings a user could communicate with the computers at the Hackers' Lab, help build a large fractal image at the show, or even get a cup of his or her favorite coffee.
Built by Dallas Semiconductor, the durable, wearable Java Ring is practically indestructible but not heavy or clumsy.
The jewel of the ring is a relatively inexpensive device called an iButton, which contains a processor that runs a Java Virtual Machine.
The first time an attendee snapped the ring's iButton into a ring reader attached to a workstation, an applet on the ring communicated with the host application on the system. The applet in turn downloaded the user's personal information from the conference registration system and allowed the user to select their preferred type of coffee (a process they called "personalizing" the ring). From there, the user could walk over to a "coffee factory," snap the ring into another reader, and the robotic coffee machine would make the brew based on the user's preference stored in the ring.
3.COMPONENTS
I-BUTTONS

An iButton is a microchip. The iButton was invented by Dallas Semiconductor mainly for applications in harsh and demanding environments.
On top of these features, the ring provides a rugged environment, wear-tested for 10-year durability. You can drop it on the floor, step on it, forget to take it off while swimming and the data remains safe inside. Today iButtons are primarily used for authentication and auditing types of application.
Every iButton product is manufactured with a unique 8-byte serial number and carries a guarantee that no two parts will ever have the same number. Among the simplest iButtons are memory devices that can hold files and subdirectories and can be read and written like small floppy disks. In addition to these, there are iButtons with password-protected file areas for security applications, iButtons that count the number of times they have been rewritten for securing financial transactions, iButtons with temperature sensors (for food storage and transport), iButtons with continuously running date/time clocks, and even iButtons containing powerful microprocessors. There are iButtons that have an electronic ID and store e-cash .
iButtons have an advantage over conventional smart cards in term of durability and longevity
TYPES OF I-BUTTON:
There are multiple different iButtons available. Each starts with a guaranteed-unique registration number engraved in the silicon. From there, iButtons branch out into three different types:
1. Memory iButton :
2. Java-powered cryptographic iButton 3. Thermochron iButton :
4. Uniqueware iButtons -
5. EEPROM iButtons
a) BLUE DOT RECEPTOR
Information is transferred between your iButton and a PC with a momentary contact, at up to 142kbps. You simply touch your iButton to a Blue Dot receptor or other iButton probe, which is connected to a PC. The Blue Dot receptor is cabled to a 1-Wire adapter that is attached to the PCs serial or parallel port.
The DS1402 Blue Dot receptor provides a convenient pipeline into the PC for iButton-to-PC communication. The receptor's cable connects to either a serial or parallel port, according to which adapter you choose. The receptor itself easily affixes to any accessible spot on the front of the PC. The user can elect a quick information transfer with a momentary touch of the iButton to the Blue Dot. Alternately, the iButton can be snapped into the Blue Dot and remain there, allowing hands-free operation.
Each receptor contains two Blue Dots to accommodate instances where multiple iButtons are required to complete a transaction.
RTE
A layer of software is required to interface iButtons to computers and produce the desired information in the desired format. For all iButtons, iButton-TMEX is a software platform on which to build applications. TMEX removes the tedious low-level programming of drivers and utilities.
The RTE installs the drivers and demo software for all iButtons and 1-Wire devices. TMEX's architecture follows the International Standards Organization (ISO) reference model of Open System Interconnection (OSI), a protocol with seven layers denoted as Physical, Link, Network, Transport, Session, Presentation, and Application.
The current release of TMEX RTE supports Microsoft 32-bit Windows. This includes Windows Me, 2000, 98, 95, NT 4.00.
c) JAVA VIRUAL MACHINE
Java ring is programmed with java application program and applets ,that communicate with the host application on the networked system. applets are the small application that is designed to run on the another application system. The java virtual machine is the piece of software that recognizes the java language and translate the byte code ,which is used by the system which is connected to the java ring via ring reader.
At Celebration School, the rings have been programmed to store electronic cash to pay
for lunches, automatically unlock doors, take attendance, store a student's medical
information and allow students to check out books. All of this information is stored on
the ring's iButton. Students simply press the signet of their Java Ring against the Blue
Dot receptor, and the system connected to the receptor performs the function that the applet instructs it to. In the future, the Java Ring may start your car. Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, we will see an explosion of computer parts across our bodies, rather than across our desktops. Digital jewelry, designed to supplement the personal computer, will be the evolution in digital technology that makes computer elements entirely compatible with the human form.
d)RAM
Java ring contains 134kb of non-volatile random access memory. Program and data is stored in this non-volatile random access memory .This non-volatile random access memory offers high read/write speed and also provides `temper resistance through instantaneous clearing of all memory when tempering is detected. this process is called rapid zeroization. The NVRAM iButton memory can be erased or rewritten as often as necessary without wearing out. High security is offered by the ability to erase the content of NVRAM extremely quickly.
e)ROM
The java ring contains 32kb of ROM .A special kind of operating system called E- Commerce operating system which is based on java and JVM is stored in the ROM. This operating system handles all the operation which is happening in the iButton. It is stored in ROM because it is not supposed to be altered by the user. The Crypto iButton hardware platform offers a unique set of special features expressly designed to prevent private keys and other confidential information from becoming
available to hackers .
4.WORKING
Ring is programmed with the applets and the programming is done according to our application and this will specific for the specific user. All information of the user is stored in the java ring.
simply has to press the signet of the java ring against the blue dot receptor and the system connected to the receptor performs the function that the applets instruct it to.java ring has the user profile and the same profile is present in the door embedded system also, when the user press the signet of the java ring against the java ring reader which is embedded at the handle of the door the data is transferred from the ring to door system. if the profile is authentic means user is authentic to open the door the applets president in the ring instruct the door to open. Information is transferred between iButton and a PC with a momentary contact, at up to 142K bits per second.
5.APPLICATIONS OF JAVA RING
Today iButtons are primarily used for authentication and auditing types of applications.
a)Tracking Snail Mail
For example, the U.S. Post Office uses iButtons affixed to the inside door of every blue postal box standing on curbs across the country so it can track carrier, pick-up location, date, and time of mail retrieval.
b)Sturdy Data Trackers
Since their introduction, iButtons have been deployed as rugged portable data carriers, often in harsh environmental conditions. They are worn as earrings by cows in Canada to hold vaccination records, and they are used by agricultural workers in many areas as sturdy substitutes for timecards.
6. THE JAVA RING EVENT
The primary elements of the Ring Event are:
a)Personalization
b)Playing the fractal game/checking business card Data on the ring
c)Visiting the "Coffee Factory" for an automated cup of custom brewed java
Personalization
The personalization process was as simple as snapping the Java Ring into any nearby Blue Dot ring receptor . For your "first time," the client workstation asked you to enter your JavaOne Conference ID number and last name . With this information, a database record was then created, linking your particular
Fractal Game
Here, the ring was dynamically assigned the x,y coordinates of a randomly placed fractal "tile" (a 3x3 pixel area). The many tile coordinates were stored and allocated using a JavaSpaces data area. Once assigned a tile location, your preloaded, ring-based fractal applet computed the colors of each pixel, uploading the data to the server.The fractal game integrated concepts that are vital to demonstrating the power and the promise of Java technology
Coffee Factory
coffee factory was often just what the doctor ordered. And once again, the ease of use and seeming simplicity of the area often belied the elegance and complexity behind the scenes.
Back when you first personalized your ring, you were asked to select one of eight possible bean-based brews. That selection was then stored within the Java Ring's business card applet. So in order to receive.
7.ADVANTAGES OF JAVA RING
a)an orderly network where evry device has access to the token and the opportunity to transmit.
b)under vheavy network load performs better than a start topology.
c)To manage the connectivity between the computers it doesnot need network server.
8.DISADVANTAGES OF JAVA RING
A)one malfunctioning workstation can throw can throw away the entire network.
b)moves,adds and changes of devices can affect the entire network.
c)It is slower than an Ethernet network.
9.CONCLUSION
Dallas Semiconductor has produced more than 20 million physically-secure memories and computers with hard-shell packaging optimized for personal possession. The Java iButton, therefore, is simply the latest and most complex descendant of a long line of products that have proven themselves to be highly successful in the marketplace

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: pokemon snap, seminar topic javaring, define imouse, thaip param bil, seminario de teoria de la, a z listing infopark, openstep install,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: javaring seminars report - by seminar topics - 17-03-2010, 07:56 AM
RE: javaring seminars report - by seminar topics - 17-03-2010, 10:10 AM
RE: javaring seminars report - by project topics - 01-04-2010, 11:52 AM
RE: javaring seminars report - by seminar class - 04-03-2011, 12:42 PM
RE: javaring seminars report - by seminar class - 11-03-2011, 03:50 PM
RE: javaring seminars report - by seminar class - 19-04-2011, 04:23 PM
RE: javaring seminars report - by seminar paper - 15-03-2012, 02:34 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  blast seminars report electronics seminars 6 16,193 09-09-2017, 04:08 PM
Last Post: jaseela123d
  Electronics seminars lists10 computer science crazy 169 94,972 28-03-2015, 10:07 AM
Last Post: seminar report asees
  gsm pdf and final seminars report suvendu9238 10 12,318 19-11-2014, 09:34 PM
Last Post: jaseela123d
  optical switching seminars report electronics seminars 7 11,051 29-04-2013, 10:55 AM
Last Post: computer topic
  memristor seminars report project report tiger 21 23,441 25-01-2013, 12:02 PM
Last Post: seminar details
Smile smart note taker seminars full report [email protected] 59 32,023 25-01-2013, 12:00 PM
Last Post: seminar details
  iris scanning seminars report electronics seminars 7 12,376 17-12-2012, 11:36 AM
Last Post: seminar details
  IMAGE AUTHENTICATION TECHNIQUES seminars report electronics seminars 6 8,726 15-11-2012, 12:24 PM
Last Post: seminar details
  FOUNDATION FIELDBUS seminars report seminar surveyer 3 3,848 09-11-2012, 11:15 AM
Last Post: seminar details
  NanoTechnology-The Next Science Frontier seminars report electronics seminars 10 10,669 07-06-2012, 05:51 PM
Last Post: seminar details

Forum Jump: