You are on page 1of 43

DIGITAL JEWELLERY

A Seminar Report Submitted To Sri Padmavathi Mahila Visvavidyalayam, Tirupati In partial fulfilment of the requirements for the award of the Degree of

BACHELOR OF TECHNOLOGY IN INFORMATION TECHNOLOGY By Y.MUNNI CHARISHMA (0873027) Under the guidance of Ms.J. Niharika Department of Information Technology

DEPARTMENT OF INFORMATION TECHNOLOGY SCHOOL OF ENGINEERING & TECHNOLOGY SRI PADMAVATHI MAHILA VISVAVIDYALAYAM (WOMENS UNIVERSITY) TIRUPATI-517502(A.P.), INDIA 2011-2012

DEPARTMENT OF INFORMATION TECHNOLOGY SCHOOL OF ENGINEERING AND TECHNOLOGY SRI PADMAVATI MAHILA VISVA VIDYALAYAM (WOMENS UNIVERSITY) TIRUPATHI-517502(A.P.), INDIA

CERTIFICATE
This is to certify that the seminar report entitled

DIGITAL JEWELLERY
is the bonified record of work carried-out by

Y.MUNNI CHARISHMA (0873027)


in the Department of

INFORMATION

TECHNOLOGY
SRI PADMAVATI MAHILA VISVA VIDYALAYAM, TIRUPATI.
in partial fulfilment of the requirements for the Degree of BACHELOR OF TECHNOLOGY in INFORMATION TECHNOLOGY. The contents of Seminar Report have not been submitted to any other University/institute for the award of the Degree or Diploma.
2

(J.NIHARIKA) Staff-in charge Date:

(DR.S.JYOTHI) Head of the Department

ACKNOWLEDGEMENT

I am greatly indebted to our guide/staff-in-charge MS.J.NIHARIKA for taking keen interest in our Seminar reports and providing invaluable guidance in all the possible areas of improvement.

I express my sincere thanks to the Head of the Department, Information technology, DR.S.JYOTHI for extending support and encouragement to us in all the stages of the Seminar Report.

I would like to heartily thank the Director, School of Engineering & Technology, PRO F. C.ESWARA REDDY for extending the facilities for carrying out the Seminar Report.

We are also thankful to our teaching and Non-teaching staff for their cooperation and help in this regard.

Y.MUNNICHARISHMA (0873027)

Tirupati: Date:

ABSTRACT

ABSTRACT
Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an explosion of computer parts across our bodies, rather than across our desktops. Basically, jewellery adorns the body, and has very little practical purpose. The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewellery with embedded intelligence i.e., Digital jewellery. Digital jewellery can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication. This paper enlightens on how various computerized jewellery (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile embedded intelligence. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. This paper discusses about a new Java-based, computerized ring that will automatically unlock doors and log on to computers.

CONTENTS
Chapter page No 1. 2. 3. 4. 5. 6. 7. 8. INTRODUCTION WHAT IS DIGITAL JEWELLERY DISPLAY TECHNOLOGIES THE JAVA RING FINANCIAL STATUS ADVANTAGES CONCLUSION BIBLIOGRAPHY 9 11 16 21 37 39 41 43 Title

LIST OF FIGURES

2.1Digital Jewellery cell phone.....................................................................................12 2.2 IBMS Magic Decoder Ring....................................................................................13 2.3 Prototype Bracelet Display......................................................................................14 3.1 Alphanumeric or graphic Display Types.................................................................16 3.2 Complete HIOX necklace........................................................................................17 4.1 Prototype of stainless steel java ring.......................................................................18 4.2 Blue Dot receptor ....................................................................................................21 4.3 Structure of I Button ...............................................................................................26 4.4 Types of I Buttons available in the market ............................................................29 4.5 Types of Blue dot receptors available in the market ............................................30 5.1 Digital Watch...........................................................................................................40

INTRODUCTION

CHAPTER-1 INTRODUCTION 1.1 Digital Jewellery

The latest computer craze has been to be able to wear wireless computers. The Computer
Fashion Wave, "Digital Jewellery" looks to be the next sizzling fashion trend of the technological wave. The combination of shrinking computer devices and increasing computer power has allowed several companies to begin producing fashion jewellery with embedded intelligence. The whole concept behind this is to be able to communicate to others by means of wireless appliances. The other key factor of this concept market is to stay fashionable at the same time. By the end of the decade, we could be wearing our computers instead of sitting in front of them. "Digital jewellery" is a nascent catchphrase for wearable ID devices that contain personal information like passwords, identification, and account information. They have the potential to be all-in-one replacements for your driver's license, keychain, business cards, credit cards, health insurance card, corporate security badge, and loose cash. They can also solve a common dilemma of today's wired world - the forgotten password.

WHAT IS DIGITAL JEWELLERY?

10

CHAPTER-2 2. What Is Digital Jewellery

Digital jewellery is the fashion jewellery with embedded intelligence. Digital jewellery can help you solve problems like forgotten passwords and security badges. Digital jewellery is a nascent catchphrase for wearable ID devices that contain personal information like passwords, identification, and account information. They have the potential to be all-in-one replacements for your drivers license, key chain, business cards, credit cards, health insurance card, corporate security badge, and loose cash. They can also solve a common dilemma of todays wired world the forgotten password.

2.1 Digital Jewellery and Their Components

Soon, cell phones will take a totally new form, appearing to have no form at all. Instead of one single device, cell phones will be broken up into their basic components and packaged as various pieces of digital jewellery. Each piece of jewellery will contain a fraction of the components found in a conventional mobile phone. Together, the digitaljewellery cell phone should work just like a conventional cell phone. The various components that are inside a cell phone: Microphone, Receiver, Touch pad, Display, Circuit board, Antenna, and Battery. IBM has developed a prototype of a cell phone that consists of several pieces of digital jewellery that will work together wirelessly, possibly with Blue tooth wireless technology, to perform the functions of the above components without interruption signals. This prototype proved to be the most flexible accessory released ever. This made this prototype to be made as soon as possible.

11

Fig 2.1: Digital Jewellery Cell phone

Here are the pieces of computerized-jewellery phone and their functions: Earrings - Speakers embedded into these earrings will be the phone's receiver. Necklace - Users will talk into the necklace's embedded microphone. Ring - Perhaps the most interesting piece of the phone, this "magic decoder ring is equipped with light-emitting diodes (LEDs) that flash to indicate an incoming call. It can also be programmed to flash different colors to identify a particular caller or indicate the importance of a call. Bracelet - Equipped with a video graphics array (VGA) display, this wrist display could also be used as a caller identifier that flashes the name and phone number of the caller.

12

With a jewellery phone, the keypad and dialing function could be integrated into the bracelet, or else dumped altogether -- it's likely that voice-recognition software will be used to make calls.

Fig 2.2: IBM's magic decoder rings will flash when you get a call.

The same ring that flashes for phone calls could also inform you that e-mail is piling up in your inbox. This flashing alert could also indicate the urgency of the e-mail. The mouse-ring that IBM is developing will use the company's Track Point technology to wirelessly move the cursor on a computer-monitor display. (Track Point is the little button embedded in the keyboard of some laptops). IBM Researchers have transferred Track Point technology to a ring, which looks something like a black-pearl ring. On top of the ring is a little black ball that users will swivel to move the cursor, in the same way that the TrackPoint button on a laptop is used. This Track Point ring will be very valuable when monitors shrink to the size of watch face. In the coming age of ubiquitous computing, displays will no longer be tied to desktops or wall screens. Instead, you'll wear the display like a pair of sunglasses or a
13

bracelet. Researchers are overcoming several obstacles facing these new wearable displays, the most important of which is the readability of information displayed on these tiny devices.

Fig 2.3: Prototype of bracelet display developed by IBM

2.2 Technical Specifications of Digital Jewellery


Digital jewellery devices consist of a screen or display for information, most likely consisting of 7-16-segment, or dot matrix LEDs, LCDs, or other technologies such as electroluminescent material (EL) or others, which could become an optional display. So too, an audiovisual or other 'display' could consist of a speaker, a single flashing light, a sensor of some kind (such as a temperature driven EL display), or other informational aesthetic. A micro controller that is a surface mounted device (SMD) on a printed circuit board (PCB) with resistors (R) and capacitors (C) are the internal 'guts' of the jewellery.

14

DISPLAY TECHNOLOGIES

15

CHAPTER-3 DISPLAY TECHNOLOGIES

The digital jewellery display, for instance, every alphabet and number system has found representation within the electronics realm and 'dot-matrix' (a matrix of single LEDs) is used to display Chinese and Japanese and other character sets, as can the alternative display for LCDs (liquid-crystal-displays) also be used, as often found in watches.

Fig 3.1: Alphanumeric or graphic Display Types Digital Jewellery can be made in many different sizes and shapes with a variety of materials ranging from plastic and metal to rubber and glass. They utilize electromagnetic properties and electronics to display information through a screen or display of some kind. This could range from LED 7-segment, 16-segment, dot matrix, and other LEDs devices to LCDs, OLEDs, and other displays, which are all driven by the self-contained jewellery devices themselves.

16

3.1 Basic Prototype of the Digital Jewellery

Fig 3.2: Complete HIOX necklace showing all 26 letters of the Roman alphabet extended in 4-dimensional space-time.

FIG:Programmable HIOX ring with 16- Segment LED Display

3.2 ELECTROMAGNETIC BEADS


17

The closest comparison to this model is that of 'beads' which are strung together to make a custom necklace or bracelet, with interchangeable electromagnetic component systems or devices. One bead may be a capacitor on the inside, and a solar panel on the outside (1), another bead may have an internal resistor (2), which feed power into a programmed microcontroller bead which drives an external screen (3), with other options available in a variety of bead

configurations which compose a circuit, including beads with a piezo element (4), voltage regulator, crystal, or rechargeable battery (5) as part of the modular jewel circuit. The number of data pins on the microcontroller needs to be enough to easily program the display layer plus the switches without overly complex and advanced coding Methods.

18

FIG: The key to the device's ability to work effectively is a balancing of electronic components within the circuit with a light-duty processing and limited power consumption reqired for the (d) display layer.

19

THE JAVA RING


20

CHAPTER-4 THE JAVA RING

It seems that everything we access today is under lock and key. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. Dallas Semiconductor is developing a new Java-based, computerized ring that will automatically unlock doors and log on to computers.

21

FIG.1: Prototype of stainless steel java ring.

Fig 4.2: Blue Dot receptor

The Java Ring is a stainless-steel ring, 16 milli- meters (0.6 inches) in diameter that houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM, a real-time clock and a Java virtual machine, which is a piece of software that recognizes the Java language and translates it for the user's computer system.

4.1 The Postal Security Device of Dallas


22

For over 10 years, Dallas Semiconductor also has been designing, making, and selling a line of highly secure microprocessors that are used in satellite TV descramblers, automatic teller machines, point-of-sale terminals, and other similar applications requiring cryptographic security and high resistance to attack by hackers. Postal Service's(USPS) Information Based Indicia Program Postal Security Device Specification, intended to permit printing of valid U.S. postage on any PC, provided the first opportunity to combine two areas of expertise when a secure microprocessor was designed into an iButton the resulting product, named the Crypto iButton, combines high processor performance and high-speed cryptographic primitives, and exceptional protection against physical and cryptographic attacks of outsiders. An agreement between Dallas Semiconductor and RSA Data Security Inc. provides a paid-up license for anyone using the Crypto iButton to perform RSA encryption and digital signatures so that no more further licensing of the RSA encryption technology is required so far. High security is afforded by the ability to erase the contents of NVRAM extremely quickly. This feature, rapid zeroization, is a requirement for high security devices that may be subjected to attacks by hackers. As a result of its high security, the Crypto iButton is expected to win the FIPS 140-1 security certification by the National Institute of Standards and Technology (NIST).A special operating system was designed and stored in the ROM of the Crypto iButton to support cryptography and general-purpose financial transactions -- such as those required by the Postal Service program. While not a Java virtual machine, the Ecommerce firmware designed for this application had several points of similarity with Java, including an object-oriented design and a byte code interpreter to interpret and execute Dallas Semiconductor's custom-designed with the E-Commerce Script language.

4.2 Components of The Java-Ring


The main components of the java ring are following: JAVA VIRTUAL MACHINE(JVM) 134KB OF RAM 32KB OF RAM REAL TIME CLOCK
23

IBUTTOON BLUE DOT RECEPTOR

4.2.1 Java Virtual Machine


Java ring is programmed with java application program and applets that communicate with the host application on the networked system. applets are the small application that is designed to run on the another application system. The java virtual machine is the piece of software that recognizes the java language and translate the byte code ,which is used by the system which is connected to the java ring via ring reader. Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, we will see an explosion of computer parts across our bodies, rather than across our desktops. Digital jewellery, designed to supplement the personal computer, will be the evolution in digital technology that makes computer elements entirely compatible with the human form.

4.2.2 RAM
Java ring contains a 134kb of the non-volatile random access memory. Program and data is being stored in this non-volatile random access memory .This non-volatile random access me- mory offers high read/write speed and also provides a temper resistance through an instantaneous clearing of all memory when tempering is detected. This process is called rapid-zeroization. The NVRAM iButtons memory can be erased or rewritten as often as necessary without wearing out. High security is offered by the ability to erase the content of NVRAM extremely quickly and easily. The Crypto iButton also provides an excellent hardware platform for executing Java because it utilizes NVRAM for program and data storage. With 6 kilobytes of existing NVRAM and the potential to

expand the NVRAM capacity to as much as 128 kilobytes in the existing iButton form factor, the Crypto iButton can execute Java with a relatively large Java stack situated in NVRAM. This memory acts as conventional high-speed RAM when the processor is executing, and the lithium energy preserves the complete state of the machine while the Java Ring is disconnected from the reader.

24

Therefore no requirement to deal with persistent objects in a special way objects persist or not depending on their scope so the programmer has complete control over object persistence. As in standard Java, the Java iButton contains a garbage collector that collects any objects that are out of scope and recycles the memory for future use. Applets can be loaded and unloaded from the Java iButton as often as needed. All the applets currently loaded in a Java iButton are effectively executing at zero speed any time the iButton is not in contact with a Blue Dot receptor. As the Java Card 2.0 specification was proposed, Dallas Semiconductor became a Java Soft license. The agreement called for the development of a Java Card 2.0 implementation and also for the design of "plus portions" that take advantage of the unique capabilities afforded by the Crypto iButtons NVRAM, such as the ability to support a true Java stack and garbage collection. With the addition of continuously running lithium powered timeof-day clock and the high-speed large-integer and modular exponentiation engine
. 4.2.3

ROM

The java ring contains 32kb of ROM .A special kind of operating system called Ecommerce operating system which is based on java and JVM is stored in the ROM. This operating system handles all the operation which is happening in the iButton. It is stored in ROM because it is not supposed to be altered by the user. The Crypto iButton hardware platform offers a unique set of special features expressly designed to prevent private keys and the other confidential information from being becoming available to hackers. The prototype shows a detail of the internal construction of the Crypto iButton. The silicon die containing the processor, ROM, and NVRAM memory is metallurgically bonded to the barrier substrate through which all electrical contacts are made. This barrier substrate and triple-layer metal construction techniques employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate into these barriers, NVRAM data is

being immediately erased by itself. This construction technique and the use of NVRAM for the storage of private keys and other confidential data provides a much higher degree of data security than that afforded by EEPROM memory. The fact that the communication path between the Crypto iButton and the outside world is limited to a single data line provides additional security against hardware attacks by limiting the range of signals accessible to the hacker.
25

In addition, the processor itself is driven by an unstabilized ring oscillator operating over a range of 10 to 20 megahertz, so that the clock frequency of the processor is not constant and cannot be determined by external means. This differs from the design of alternative devices in which the processor clock signal is injected by the reader and is therefore exactly determined by the host processor. External control of the clock provides a valuable tool to hackers, since they can repetitively cycle such a processor to the same point in its execution simply by applying the same number of clock cycles. Control of the clock also affords a means to induce a calculation error and hence, thereby obtain information that can ultimately reveal secret encryption keys that are available till now. A 32-kilohertz crystal oscillator is used in the Java iButton to operate the time-of-day clock at a constant and well-controlled frequency that is independent of the processor clock.

4.2.4 Real Time Clock


In the java ring real time clock gives the exact time of the day. The real time clock will continuously running up to more than 10 years by the energy provided the lithium backup. In addition, the processor itself is driven by an unstabilized ring oscillator operating over a range of 10 to 20 megahertz, so that the clock frequency of the processor is not constant and cannot be determined by external means. This differs from the design of alternative devices in which the processor clock signal is injected by the reader and is therefore exactly determined by the host processor. External control of the clock provides a valuable tool to hackers, since they can repetitively cycle such a processor to the same point in its execution simply by applying the same number of clock cycles. Control of the clock also affords a means to induce a calculation error and thereby to obtain information that can ultimately reveal secret encryption keys for

security. A 32-kilohertz crystal oscillator is used in the Java iButton to operate the timeof-day clock at a constant and well-controlled frequency that is independent of the processor clock.

26

4.2.5 IButton

Fig 4.3 Structure of IButton


The jewel of the java ring is the java iButton .It contains the one million transistor processor single chip trusted microprocessor with powerful java virtual machine (JVM) housed in a rugged and secure stainless steel case. The Crypto iButton hardware platform offers a unique set of special features that are being expressly designed to prevent private keys and other confidential information from becoming available to hackers. Figure 4.1 shows a detail description of the internal construction of the Crypto iButton. The silicon die containing the processor, ROM, and NVRAM memory is metallurgically bonded to the barrier substrate through which all electrical contacts are made. This barrier substrate and the triple-layer metal construction techniques employed in silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is being immediately erased. This construction technique and the use of NVRAM for the storage of private keys and other confidential data provides a much higher degree of data security than that afforded by EEPROM memory.

The fact that the communication path between the Crypto iButton and the outside world is limited to a single data line provides additional security against hardware attacks by limiting the range of signals accessible to the hacker. In addition, the processor itself is
27

driven by an unstabilized ring oscillator operating over a range of 10 to 20 megahertz, so that the clock frequency of the processor is not constant and cannot be determined by external means. This differs from the design of alternative devices in which the processor clock signal is injected by the reader and is therefore exactly determined by the host processor. External control of the clock provides a valuable tool to hackers, since they can repetitively cycle such a processor to the same point in its execution simply by applying the same number of clock cycles. Control of the clock also affords a means to induce a calculation error and thereby obtain the information that can ultimately reveal the secret encryption keys. A 32-kilohertz crystal oscillator is used in the Java iButton to operate the time-of-day clock at a constant and well-controlled frequency that is independent of the processor clock. It is originally called the touch memory devices they were later renamed as iButtons packaged like batteries. IButton have only a single active electrical contact on the top surface and with the stainless steel shell serving as ground. Every iButton product is manufactured with unique 8 byte serial number and carries a guaranty that no two IButtons have same number. Among the simplest iButton are memory devices which can hold files and directories that can be read and written like small floppy disks. An iButton is a microchip similar to those used in smart card but housed in a round stainless steel button of 17.35mm x 3.1mm - 5.89mm in size (depending on the function). The iButton was invented and is still manufactured exclusively by Dallas Semiconductor mainly for applications in harsh and demanding environments. Like a smart card, an iButton does not have an internal power source. It requires connection to a reader in order to be supplied with power and to receive input and send output. Unlike some smart cards, there are currently no contactless iButtons: they require physical contact with a reader to function. There are iButtons that can measure temperature (for food storage and transport); have an electronic ID (for physical access to buildings); and store e-cash (for purchases both in stores and

28

via the web). For e-commerce applications, the iButton can support Java Card 2.0/Open Card standards in addition to proprietary software. iButtons have an advantage over conventional smart cards in term of durability and longevity. The stainless steel casing gives iButton a far greater ability to survive in a range of temperatures. For e-commerce and personal ID usage, iButtons can be mounted on a range of personal accessories watch, ring, key chain, or dog tag and also a variety of accessories that are used daily by the human being.

Fig 4.4 Types of I Buttons available in the market

4.2.6 Blue Dot Receptor


The read/write operation in the java ring is done by the blue dot receptor provided by the RS232 serial port adapter. The DS1402D-DR8 is a part of the DS1402 series. It is a 1Wire network cable designed to connect any serial or USB 1-Wire port adapter that has a RJ11 jack with up to two iButtons simultaneously. The DS1402D-DR8 Blue Dot receptor cable can touch any iButton for reading, but can only retain the F5 version iButtons. Key Features: Coiled cable for connecting iButtons to 1-Wire networks Convenient, off-the-shelf connectivity.

29

For momentary (F3/F5 Micro Can) or dwelled contact (F5 Micro Can only). Adhesive pad for mounting on objects.
Supports for up to two iButtons at once. Can be used with any EDS host adapter equipped with a RJ11 jack

Can be used with any Dallas Semiconductor port adapter of series (DS9097E, DS9097U, and DS9490R).

The DS1402 series incorporates four basic types of connectors, 1-Wire RJ-11, iButton, Touch-and-Hold Probe, and Blue Dot Receptor. The DS1402 series of 1-Wire network cables provides connectivity for the iButtons. The cables are designed to connect any USB, serial or parallel port 1-Wire adapter to any iButton. Both, the iButton probe cables and the Blue Dot receptor cables can touch any iButton, but can only hold the F5 version iButtons. The DS1402BR8 is the only cable that connects to the DS1401 iButton Holder. Application of DS1402-series, 1-Wire network cables range from software protection and access control to asset management and the major thermal monitoring through handheld computers. IButton and 1-Wire are registered trademarks of Dallas Semiconductor Corp. The DS1402D Blue Dot Receptors are iButton reader/probes that would provide a convenient pipeline into the PC for an iButton-to-PC communication. The receptor's cable connects to a USB, serial or a parallel-port 1-Wire adapter, whichever type of port you wish to use. The receptor itself easily affixes to any accessible spot on the front of the PC. The user can elect a quick information transfer with a momentary touch of the iButton to the Blue Dot. For hands-free operation the iButton canbe snapped into the Blue Dot and remain there.Each receptor contains two Blue Dots to accommodate instances where multiple iButtons are required for a transaction. A company's policy may, for example, require both an employee and a supervisor to authenticate access to sensitive information stored on a network server.

30

Fig 4.5 Types of Blue dot receptors available in the market

4.3 Working of Java Ring


Since java ring is programmed with the applets and the programming is done according to our application and this will specific for the specific user. All information of the user is stored in the java ring. User simply has to press the signet of the java ring against the blue dot receptor and the system connected to the receptor performs the function that the applets instruct it to.java ring has the user profile and the same profile is present in the door embedded system also, when the user press the signet of the java ring against the java ring reader which is embedded at the handle of the door the data is transferred from the ring to door system. if the profile is authentic means user is authentic to open the door the applets president in the ring instruct the door to open. Information is transferred between iButton and a PC with a momentary contact, at up to 142K bits per second. To do that one presses iButton to the Blue Dot receptor, a $15 pipeline into PC. The Blue Dot sticks to any convenient spot on the front of a PC and is cabled to the serial or parallel port in the back. Postal service has approved the cryptographic iButton as a Postal Security Device to be used in its PC Postage program

31

that allows individuals to download postage off the Internet and print it from their own printers.

4.4 Security in Java Ring


The java ring provides very high degree of security for the confidential data that is stored in the NVRAM memory. The barrier substrate and the triple layer technique effectively deny access the unauthorized access to the NVRAM confidential data. In the worst case if any unauthorized access penetrates the barrier the security processor detects it and immediately the data which is written in the NVRAM. The Crypto iButton hardware platform offers a unique set of the special features expressly designed to prevent private keys and other confidential information from being becoming available to hackers. The silicon die containing the processor, ROM, and NVRAM memory is metallurgically bonded to the barrier substrate through which all electrical contacts are made. This barrier substrate and the triple-layer metal construction techniques that are employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. If any attempt is made to penetrate these barriers, the NVRAM data is immediately erased. This construction technique and the use of NVRAM for the storage of private keys and other confidential data provides a much higher degree of data security than that afforded by EEPROM memory. The fact that the communication path between the Crypto iButton and the outside world is limited to a single data line provides additional security against hardware attacks by limiting the range of signals accessible to the hacker. In addition, the processor itself is driven by an unstabilized ring oscillator operating over a range of 10 to 20 megahertz, so that the clock frequency of the processor is not constant and cannot be determined by external means. This differs from the design of alternative devices in which the processor clock signal is injected by the reader and is therefore exactly determined by the host processor. External control of the clock provides a valuable tool to hackers, since they can repetitively cycle such a processor to the same point in its execution simply by applying the same number of clock cycles. Control of the clock also affords a means to induce a calculation error and thereby obtain information that could ultimately reveal the secret encryption keys. A 32-kilohertz crystal oscillator is used in
32

the Java iButton to operate the time-of-day clock at a constant and well-controlled frequency that is independent of the processor clock. 4.4.1 Security through Java Ring in a Car The Sun concept car's security is based on a Java ring that contains a profile of the user. You connect the Java ring to a ring receptor in the car, and the car knows, based on your profile, what you are allowed to do. For example, a ring given to a mechanic or wallet allows that person to see the dashboard and drive 40 miles per hour within the one block radius, but no faster or farther than. In a family where both the husband and wife drive the car,each has individualized settings, so that when they enter the car, their environments are configured to the profiles on their rings. The Java rings are authorized through the Personal Identification Numbers (PINs) so that no onecan steal a person's ring and run off with the car. Sun representatives are also talking to the automakers, who are developing the automated rental cars. In this potential market, a driver can use his or her ring to access a vehicle and simply leave it when done with ought a lock. Billing device, rail,bus,air reservations, vehicle monitoring, vehicle location, and all of the other functions are being done via wireless communication. The net result of this is a very inexpensive rental car for local use by residents and tourists. This will create a new business for rental car companies competing for business travelers in the saturated airport rental car market.

4.5 Application of Java Ring


The java ring is used initially as a rugged portable data carriers. Often in very harsh environmental conditions. It is used for many real world application e.g. for opening the door, in the e-banking application for getting the balance in your account. Logging into your personal computer and providing security in your car. The IButton memory devices have been deployed in vast quantities as rugged portable data carriers, often in harsh environmental conditions. Among the largescale uses that are as transit fare carriers in Istanbul, Turkey; as maintenance record carriers on the sides of Ryder trucks;
33

and as mailbox identifiers that are inside the mail compartments of the U.S. Postal Service's outdoor mailboxes. They are worn as earrings by cows in Canada to hold vaccination records, and they are used by agricultural workers in many areas as rugged substitutes for timecards.

This demonstration shows how an e-banking application (Jini client) tries to connect to any bank server (Jini service) to retrieve the current account balance of that user. Since all bank data must be treated confidential, the bank server interacts with the security infrastructure that is installed at the bank, before it responds to the application present. The banks security infrastructure demands that is the user must authenticate him/her-self to get the permission. Therefore an authentication scheme is started at user side that asks the user to push her Java Ring on the Java Ring reader. Inside the Java Ring resides a Java interpreter that executes cryptographic routines to perform that task. After the authentication process on the Java Ring, the bank knows the identity of the user and that he/she is really the one, he/she pretends to be. Then the bank service can send the confidential and personalized data to the e-banking application that displays the current account balance. A few important facts can be stated about the use of the Java Ring: Authentication is most crucial to most applications, since billing and privacy is based on it. A very easy and a very convenient way for users. It is more secure than using passwords,since passwords are short or can be guessed.

It is easier for the administrators to maintain the security infrastructure, sinceonly password can be forgotten.

A ring is a personal thing that the user and only the user carries along him/her anytime and anywhere, so that he/she can authenticate him/her-self in every situation.

It is also possible to use a tag on the key ring or a watch instead of a ring.

34

4.6 Highlights of Java Ring

Runs Java better (plus portions enhance Java Card 2.0). Careful attention to physical security(rapid zeroization) Durability to stand up to everyday use High memory capacity (up to 134K bytes NV SRAM) Retail connectivity to 250 million existing computers (less if designed-in before manufacturing)

Highly secure through the rapid zeroization method and auto erasing program on forcible access to the data.

35

FINANCIAL STATUS

36

CHAPTER-5
FINANCIAL STATUS

1.Rings,pendants from $20.00 2.Necklaces from $20.00 3.Diamond Bracelets from $20.00 4.Gold Bracelets from $20.00 5.Earrings,watches from $17.00

37

ADVANTAGES

38

CHAPTER-6 ADVANTAGES

1.It Provides Security for example JAVA RING is used to lock or unlock doors or computers.as we use passwords and keys to lock our doors and computers we don't need to remember all those passwords and carry all those keys.So java ring is designed to providesecurity. 2. As Computing Devices are embedded it is not necessary to carry Cells or Computers. hence it is easy to carry everywhere.

39

CONCLUSION

40

CHAPTER-7 CONCLUSION

Fig 5.1: Digital Watch

The basic idea behind the digital jewellery concept is to have the convenience of wireless, wearable computers or phones while remaining fashionably sound. The Java iButton,
41

therefore, is simply the most latest and most complex descendant of a long line of products that have proven they to be highly successful in the marketplace. With its stainless steel armor, it offers the most durable packaging for a class of products that likely will suffer heavy use and abuse as personal possessions. The iButton form factor permits attachment to a wide variety of personal accessories that includes rings, watchbands, key fobs, wallets, bracelets, and necklaces, so the user can select a variation that suits his or her lifestyle. It is hoped to be marketable soon, however, several bugs remain. Charging capabilities and cost are just a sample of the problems that lurk.

BIBILIOGRAPHY

42

CHAPTER-8 BIBILIOGRAPHY

BOOKS: 1. 2. 3.
Mobile Communications by Jochen Schiller .
Blue tooth Connect without Cables by Jennifer Bray and Charles F Sturman . Cellular and mobile communications by LEE.

REFERENCES: 1. WWW.IBM.COM 2. WWW.how stuff works .com

43

You might also like