Professional Documents
Culture Documents
DIGITAL JEWELLERY Documentation PDF
DIGITAL JEWELLERY Documentation PDF
On
DIGITAL JEWELLERY
Submitted to JNTUK, Kakinada in partial fulfillment of the requirements for the award of the
Degree Bachelor of Technology in Computer Science & Engineering.
Submitted By
M VENKATA NAGA SUJIT
07A41A0535
CERTIFICATE
Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile
devices can still be a bit awkward to carry around. In the next age of computing, there will be an
explosion of computer parts across our bodies, rather than across our desktops. Basically, jewellery
adorns the body, and has very little practical purpose. The combination of microcomputer devices and
increasing computer power has allowed several companies to begin producing fashion jewellery with
embedded intelligence i.e., Digital jewelry. Digital jewellery can best be defined as wireless, wearable
computers that allow you to communicate by ways of e-mail, voicemail, and voice communication.
This paper enlightens on how various computerized jewelry (like ear-rings, necklace, ring, bracelet,
etc.,) will work with mobile embedded intelligence.
Even the devices we use are protected by passwords. It can be frustrating trying to keep with
all of the passwords and keys needed to access any door or computer program. This paper discusses
about a new Java-based, computerized ring that will automatically unlock doors and log on to
computers.
Contents
1 Introduction 1
2 What Is Digital Jewellery 1
2.1 Digital Jewellery and Their Components 1
2.2 Technical Specifications of Digital Jewellery 3
3 Display Technologies 3
3.1 Basic Prototype Of The Digital Jewellery 4
4 The Java Ring 4
4.1 The Postal Security Device Of Dallas 4
4.2 Components Of The Java-Ring 5
4.2.1 Java Virtual Machine 5
4.2.2 RAM 6
4.2.3 ROM 6
4.2.4 Real Time Clock 7
4.2.5 IButton 8
4.2.6 Blue Dot Receptor 10
4.3 Working of Java Ring 11
4.4 Security in Java Ring 12
4.4.1 Security through Java Ring in a car 13
4.5 Application of Java Ring 13
4.6 Highlights of Java Ring 14
5 Conclusion 15
6 Bibliography 15
LIST OF FIGURES
1
altogether -- it's likely that voice-recognition
software will be used to make calls.
2
computing, displays will no longer be tied to informational aesthetic. A micro controller that
desktops or wall screens. Instead, you'll wear is a surface mounted device (SMD) on a
the display like a pair of sunglasses or a printed circuit board (PCB) with resistors (R)
bracelet. Researchers are overcoming several and capacitors (C) are the internal 'guts' of the
obstacles facing these new wearable displays, jewelry.
the most important of which is the readability
of information displayed on these tiny devices. 3. Display Technologies
5
computer elements entirely compatible with therefore no requirement to deal with persistent
the human form. objects in a special way -- objects persist or not
depending on their scope so the programmer
4.2.2 RAM has complete control over object persistence.
As in standard Java, the Java iButton contains
Java ring contains a 134kb of
a garbage collector that collects any objects
the non-volatile random access memory.
that are out of scope and recycles the memory
Program and data is being stored in this non-
for future use. Applets can be loaded and
volatile random access memory .This non-
unloaded from the Java iButton as often as
volatile random access me- mory offers high
needed. All the applets currently loaded in a
read/write speed and also provides a temper
Java iButton are effectively executing at zero
resistance through an instantaneous clearing of
speed any time the iButton is not in contact
all memory when tempering is detected. This
with a Blue Dot receptor. As the Java Card 2.0
process is called rapid-zeroization. The
specification was proposed, Dallas
NVRAM iButton’s memory can be erased or
Semiconductor became a Java Soft license.
rewritten as often as necessary without wearing
The agreement called for the development of a
out. High security is offered by the ability to
Java Card 2.0 implementation and also for the
erase the content of NVRAM extremely
design of "plus portions" that take advantage of
quickly and easily. The Crypto iButton also
the unique capabilities afforded by the Crypto
provides an excellent hardware platform for
iButtons NVRAM, such as the ability to
executing Java because it utilizes NVRAM for
support a true Java stack and garbage
program and data storage. With 6 kilobytes of
collection. With the addition of continuously
existing NVRAM and the potential to expand
running lithium powered time-of-day clock and
the NVRAM capacity to as much as 128
the high-speed large-integer and modular
kilobytes in the existing iButton form factor,
exponentiation engine.
the Crypto iButton can execute Java with a
relatively large Java stack situated in NVRAM. 4.2.3 ROM
This memory acts as conventional high-speed
RAM when the processor is executing, and the The java ring contains 32kb of
lithium energy preserves the complete state of ROM .A special kind of operating system
the machine while the Java Ring is called Ecommerce operating system which is
disconnected from the reader. There is based on java and JVM is stored in the ROM.
6
This operating system handles all the operation operating over a range of 10 to 20 megahertz,
which is happening in the iButton. It is stored so that the clock frequency of the processor is
in ROM because it is not supposed to be not constant and cannot be determined by
altered by the user. The Crypto iButton external means. This differs from the design of
hardware platform offers a unique set of alternative devices in which the processor
special features expressly designed to prevent clock signal is injected by the reader and is
private keys and the other confidential therefore exactly determined by the host
information from being becoming available to processor. External control of the clock
hackers. The prototype shows a detail of the provides a valuable tool to hackers, since they
internal construction of the Crypto iButton. can repetitively cycle such a processor to the
The silicon die containing the processor, ROM, same point in its execution simply by applying
and NVRAM memory is metallurgically the same number of clock cycles. Control of
bonded to the barrier substrate through which the clock also affords a means to induce a
all electrical contacts are made. This barrier calculation error and hence, thereby obtain
substrate and triple-layer metal construction information that can ultimately reveal secret
techniques employed in the silicon fabrication encryption keys that are available till now. A
effectively deny access to the data stored in the 32-kilohertz crystal oscillator is used in the
NVRAM. If any attempt is made to penetrate Java iButton to operate the time-of-day clock
into these barriers, NVRAM data is being at a constant and well-controlled frequency that
immediately erased by itself. This construction is independent of the processor clock.
technique and the use of NVRAM for the
storage of private keys and other confidential 4.2.4 Real Time Clock
data provides a much higher degree of data
In the java ring real time clock
security than that afforded by EEPROM
gives the exact time of the day. The real time
memory. The fact that the communication path
clock will continuously running up to more
between the Crypto iButton and the outside
than 10 years by the energy provided the
world is limited to a single data line provides
lithium backup. In addition, the processor itself
additional security against hardware attacks by
is driven by an unstabilized ring oscillator
limiting the range of signals accessible to the
operating over a range of 10 to 20 megahertz,
hacker. In addition, the processor itself is
so that the clock frequency of the processor is
driven by an unstabilized ring oscillator
not constant and cannot be determined by
7
external means. This differs from the design of microprocessor with powerful java virtual
alternative devices in which the processor machine (JVM) housed in a rugged and secure
clock signal is injected by the reader and is stainless steel case. The Crypto iButton
therefore exactly determined by the host hardware platform offers a unique set of
processor. External control of the clock special features that are being expressly
provides a valuable tool to hackers, since they designed to prevent private keys and other
can repetitively cycle such a processor to the confidential information from becoming
same point in its execution simply by applying available to hackers. Figure 4.1 shows a detail
the same number of clock cycles. Control of description of the internal construction of the
the clock also affords a means to induce a Crypto iButton. The silicon die containing the
calculation error and thereby to obtain processor, ROM, and NVRAM memory is
information that can ultimately reveal secret metallurgically bonded to the barrier substrate
encryption keys for security. A 32-kilohertz through which all electrical contacts are made.
crystal oscillator is used in the Java iButton to This barrier substrate and the triple-layer metal
operate the time-of-day clock at a constant and construction techniques employed in silicon
well-controlled frequency that is independent fabrication effectively deny access to the data
of the processor clock. stored in the NVRAM. If any attempt is made
to penetrate these barriers, the NVRAM data is
4.2.5 IButton being immediately erased. This construction
technique and the use of NVRAM for the
storage of private keys and other confidential
data provides a much higher degree of data
security than that afforded by EEPROM
memory. The fact that the communication path
between the Crypto iButton and the outside
world is limited to a single data line provides
additional security against hardware attacks by
Fig 4.3 Structure of IButton limiting the range of signals accessible to the
hacker. In addition, the processor itself is
The jewel of the java ring is the
driven by an unstabilized ring oscillator
java iButton .It contains the one million
operating over a range of 10 to 20 megahertz,
transistor processor single chip trusted
8
so that the clock frequency of the processor is but housed in a round stainless steel button of
not constant and cannot be determined by 17.35mm x 3.1mm - 5.89mm in size (depend-
external means. This differs from the design of ing on the function). The iButton was invented
alternative devices in which the processor and is still manufactured exclusively by Dallas
clock signal is injected by the reader and is Semiconductor mainly for applications in harsh
therefore exactly determined by the host and demanding environments.
processor. External control of the clock
Like a smart card, an iButton
provides a valuable tool to hackers, since they
does not have an internal power source. It
can repetitively cycle such a processor to the
requires connection to a reader in order to be
same point in its execution simply by applying
supplied with power and to receive input and
the same number of clock cycles. Control of
send output. Unlike some smart cards, there are
the clock also affords a means to induce a
currently no contactless iButtons: they require
calculation error and thereby obtain the
physical contact with a reader to function.
information that can ultimately reveal the
There are iButtons that can measure
secret encryption keys. A 32-kilohertz crystal
temperature (for food storage and transport);
oscillator is used in the Java iButton to operate
have an electronic ID (for physical access to
the time-of-day clock at a constant and well-
buildings); and store e-cash (for purchases both
controlled frequency that is independent of the
in stores and via the web). For e-commerce
processor clock. It is originally called the touch
applications, the iButton can support Java Card
memory devices they were later renamed as
2.0/Open Card standards in addition to
“iButton’s packaged” like batteries. IButton
proprietary software. iButtons have an
have only a single active electrical contact on
advantage over conventional smart cards in
the top surface and with the stainless steel shell
term of durability and longevity. The stainless
serving as ground. Every iButton product is
steel casing gives iButton a far greater ability
manufactured with unique 8 byte serial number
to survive in a range of temperatures. For e-
and carries a guaranty that no two IButtons
commerce and personal ID usage, iButtons can
have same number. Among the simplest
be mounted on a range of personal accessories:
iButton are memory devices which can hold
watch, ring, key chain, or dog tag and also a
files and directories that can be read and
variety of accessories that are used daily by the
written like small floppy disks. An iButton is a
human being.
microchip similar to those used in smart card
9
Supports for up to two iButtons at once.
Can be used with any EDS host adapter
equipped with a RJ11 jack
Can be used with any Dallas
Semiconductor port adapter of series
(DS9097E, DS9097U, and DS9490R).
10
use. The receptor itself easily affixes to any specific for the specific user. All information
accessible spot on the front of the PC. The user of the user is stored in the java ring.
can elect a quick information transfer with a
momentary touch of the iButton to the Blue
Dot. For hands-free operation the iButton can
be snapped into the Blue Dot and remain there.
Each receptor contains two Blue Dots to
accommodate instances where multiple Fig 4.6 Java Ring with Door application
iButtons are required for a transaction. A
User simply has to press the
company's policy may, for example, require
signet of the java ring against the blue dot
both an employee and a supervisor to
receptor and the system connected to the
authenticate access to sensitive information
receptor performs the function that the applets
stored on a network server.
instruct it to.java ring has the user profile and
the same profile is present in the door
embedded system also, when the user press the
signet of the java ring against the java ring
reader which is embedded at the handle of the
door the data is transferred from the ring to
door system. if the profile is authentic means
user is authentic to open the door the applets
president in the ring instruct the door to open.
Information is transferred between iButton and
a PC with a momentary contact, at up to 142K
Fig 4.5 Types of Blue dot receptor’s available in the
bits per second. To do that one presses iButton
market
to the Blue Dot receptor, a $15 pipeline into
4.3 Working of Java Ring PC. The Blue Dot sticks to any convenient spot
on the front of a PC and is cabled to the serial
Since java ring is programmed or parallel port in the back. Postal service has
with the applets and the programming is done approved the cryptographic iButton as a Postal
according to our application and this will Security Device to be used in its PC Postage
11
program that allows individuals to download confidential data provides a much higher
postage off the Internet and print it from their degree of data security than that afforded by
own printers. EEPROM memory. The fact that the
communication path between the Crypto
4.4 Security in Java Ring iButton and the outside world is limited to a
single data line provides additional security
The java ring provides very
against hardware attacks by limiting the range
high degree of security for the confidential data
of signals accessible to the hacker. In addition,
that is stored in the NVRAM memory. The
the processor itself is driven by an unstabilized
barrier substrate and the triple layer technique
ring oscillator operating over a range of 10 to
effectively deny access the unauthorized access
20 megahertz, so that the clock frequency of
to the NVRAM confidential data. In the worst
the processor is not constant and cannot be
case if any unauthorized access penetrates the
determined by external means. This differs
barrier the security processor detects it and
from the design of alternative devices in which
immediately the data which is written in the
the processor clock signal is injected by the
NVRAM. The Crypto iButton hardware
reader and is therefore exactly determined by
platform offers a unique set of the special
the host processor. External control of the
features expressly designed to prevent private
clock provides a valuable tool to hackers, since
keys and other confidential information from
they can repetitively cycle such a processor to
being becoming available to hackers. The
the same point in its execution simply by
silicon die containing the processor, ROM, and
applying the same number of clock cycles.
NVRAM memory is metallurgically bonded to
Control of the clock also affords a means to
the barrier substrate through which all
induce a calculation error and thereby obtain
electrical contacts are made. This barrier
information that could ultimately reveal the
substrate and the triple-layer metal
secret encryption keys. A 32-kilohertz crystal
construction techniques that are employed in
oscillator is used in the Java iButton to operate
the silicon fabrication effectively deny access
the time-of-day clock at a constant and well-
to the data stored in the NVRAM. If any
controlled frequency that is independent of the
attempt is made to penetrate these barriers, the
processor clock.
NVRAM data is immediately erased. This
construction technique and the use of NVRAM
for the storage of private keys and other
12
4.4.1 Security through Java Ring in a Billing device, rail,bus,air reservations, vehicle
13
A few important facts can be
stated about the use of the Java Ring:
14
5. Conclusion
6. Bibliography
15