ABSTRACT

Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an explosion of computer parts across our bodies, rather than across our desktops. Basically, jewellery adorns the body, and has very little practical purpose. The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewellery with embedded intelligence i.e., Digital jewelry. Digital jewellery can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail,voicemail, and voice communication .This paper enlightens on how various computerized jewelry (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile embedded intelligence. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. This paper discusses about a new Java-based, computerized ring that will automatically unlock doors and log on to computers.

CONTENTS
1. INTRODUCTION 2. WHAT IS DIGITAL JEWELLERY 2.1 Digital Jewellery and Their Components 2.2 Technical Specifications of Digital Jewellery 3 .DISPLAY TECHNOLOGIES 3.1 Basic Prototype Of The Digital Jewellery 4 .THE JAVA RING 4.1 Components Of The Java-Ring 4.2 Working of Java Ring 4.3 Security in Java Ring 4.4 Application of Java Ring 4.5 Highlights of Java Ring 5 .CONCLUSION 6 .BIBLIOGRAPHY

business cards. They can also solve a common dilemma of today’s wired world – the forgotten password. 2. Together. cell phones will be broken up into their basic components and packaged as various pieces of digital jewellery. corporate security badge. and loose cash. appearing to have no form at all. and account information. identification. 2. INTRODUCTION The latest computer craze has been to be able to wear wireless computers. The Computer Fashion Wave. Each piece of jewellery will contain a fraction of the components found in a conventional mobile phone. we could be wearing our computers instead of sitting in front of them.“Digital jewelry” is a nascent catch phrase for wearable ID devices that contain personal information like passwords. cell phones will take a totally new form.1. WHAT IS DIGITAL JEWELLERY Digital jewelry is the fashion jewelry with embedded intelligence. The whole concept behind this is to be able to communicate to others by means of wireless appliances. By the end of the decade. The other key factor of this concept market is to stay fashionable at the same time.“Digital jewelry” can help you solve problems like forgotten passwords and security badges. The various components that are inside a cell phone are as follows: • • • Microphone Receiver Touch pad. credit cards . Instead of one single device. "Digital Jewellery" looks to be the next sizzling fashion trend of the technological wave.1 Digital Jewellery and TheirComponents Soon. key chain.health insurance card. The combination of shrinking computer devices and increasing computer power has allowed several companies to begin producing fashion jewellery with embedded intelligence. They have the potential to be all-in-one replacements for your driver’s license. . the digital-jewellery cell phone should work just like a conventional cell phone.

Fig: Digital Jewellery Cell phone Fig: IBM's magic decoder rings will flash when you get a call. possibly with Blue tooth wireless technology. to perform the functions of the above components without interruption signals. This prototype proved to be the most flexible accessory released ever. .• • • • Display Circuit board Antenna Battery IBM has developed a prototype of a cell phone that consists of several pieces of digital jewellery that will work together wirelessly. This made this prototype to be made as soon as possible.

This flashing alert could also indicate the urgency of the e-mail. Researchers are overcoming several obstacles facing these new wearable displays. the most important of which is the readability of information displayed on these tiny devices. the keypad and dialing function could be integrated into the bracelet. It can also be programmed to flash different colors to identify a particular caller or indicate the importance of a call. or else dumped altogether -. With a jewellery phone. Instead.  Ring Perhaps the most interesting piece of the phone. On top of the ring is a little black ball that users will move the cursor. this wrist display could also be used as a caller identifier that flashes the name and phone number of the caller. In the coming age of ubiquitous computing. in the same way that the Track Point button on a laptop is used. IBM Researchers have transferred Track Point technology to a ring. (Track Point is the little button embedded in the keyboard of some laptops).  Bracelet Equipped with a video graphics array (VGA) display. The mouse-ring that IBM is developing will use the company's Track Point technology to wirelessly move the cursor on a computer-monitor display.Here are the pieces of computerized-jewellery phone and their functions:  Earrings Speakers embedded into these earrings will be the phone's receiver. which looks something like a black-pearl ring. displays will no longer be tied to desktops or wall screens.it's likely that voice-recognition software will be used to make calls.  Necklace Users will talk into the necklace's embedded microphone. this "magic decoder ring” is equipped with light-emitting diodes(LEDs) that flash to indicate an incoming call. . This Track Point ring will be very valuable when monitors shrink to the size of watch face. The same ring that flashes for phone calls could also inform you that e-mail is piling up in your inbox. you'll wear the display like a pair of sunglasses or a bracelet.

So too. an audiovisual or other' display' could consist of a speaker. LCDs.2. or other technologies such as electroluminescent material (EL) or others. A micro controller that is a surface mounted device (SMD) on a printed circuit board (PCB) with resistors (R) and capacitors (C) are the internal 'guts' of the jewellery. most likely consisting of 7-16-segment. Fig: Prototype of bracelet display developed by IBM Fig: Alphanumeric or graphic Display Types .2 Technical Specifications of Digital Jewellery Digital jewelry devices consist of a screen or display for information. a sensor of some kind (such as a temperature driven EL display). or other informational aesthetic. or dot matrix LEDs. which could become an optional display. a single flashing light.

3. They utilize electromagnetic properties and electronics to display information through a screen or display of some kind. 3. every alphabet and number system has found representation within the electronics realm and 'dot-matrix' (a matrix of single LEDs) is used to display Chinese and Japanese and other character sets. which are all driven by the self-contained jewellery devices themselves. for instance. 16-segment. as can the alternative display for LCDs (liquid-crystal-displays) also be used.2: Complete HIOX necklace showing all 26letters of the Roman alphabet extended in 4dimensional space-time. and other displays.1 Basic Prototype of the Digital Jewellery Fig 3. dot matrix. as often found in watches. This could range from LED 7-segment. . and other 4LEDs devices to LCDs. DISPLAY TECHNOLOGIES The digital jewellery display. OLEDs. Digital Jewellery can be made in many different sizes and shapes with a variety of materials ranging from plastic and metal to rubber and glass.

computerized ring that will automatically unlock doors and log on to computers. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program . THE JAVA RING It seems that everything we access today is under lock and key. Fig : Blue Dot receptor . Fig : Prototype of stainless steel java ring. Even the devices we use are protected by passwords.Dallas Semiconductor is developing a new Java-based.4.

which is used by the system which is connected to the java ring via ring reader. .6 inches) in diameter that houses a 1million-transistor processor. The java virtual machine is the piece of software that recognizes the java language and translate the byte code . 4. rather than across our desktops.The Java Ring is a stainless-steel ring. Digital jewelry.a real-time clock and a Java virtual machine . 32 KB of ROM .which is a piece of software that recognizes the Java language and translates it for the user's computer system. 16 milli-meters (0. Mobile computing is beginning to break the chains that tie us to our desks. called an iButton. we will see an explosion of computer parts across our bodies. In the next age of computing. The ring has 134 KB of RAM. will be the evolution in digital technology that makes6computer elements entirely compatible with the human form. but many of today's mobile devices can still be a bit awkward to carry around. applets are the small application that is designed to run on the another application system. designed to supplement the personal computer.1 Components of The Java-Ring The main components of the java ring are following: JAVA VIRTUAL MACHINE(JVM)  134KB OF RAM  32KB OF RAM  REAL TIME CLOCK  IBUTTOON  BLUE DOT RECEPTOR JAVA VIRTUAL MACHINE(JVM) Java ring is programmed with java application program and applets that communicate with the host application on the networked system.

A special kind of operating system called Ecommerce operating system which is based on java and JVM is stored in the ROM. Program and data is being stored in this non-volatile random access memory . ROM The java ring contains 32kb of ROM . so that the clock frequency of the processor is not constant and cannot be determined by external means. since they can repetitively cycle such a processor to the same point in its execution simply by applying the same number of clock cycles. In addition. The NVRAM iButton’s memory can be erased or rewritten as often as necessary without wearing out. . It is stored in ROM because it is not supposed to be altered by the user. REAL TIME CLOCK In the java ring real time clock gives the exact time of the day. This operating system handles all the operation which is happening in the iButton.This non-volatile random access memory offers high read/write speed and also provides a temper resistance through an instantaneous clearing of all memory when tempering is detected. External control of the clock provides a valuable tool to hackers. This differs from the design of alternative devices in which the processor clock signal is injected by the reader and is therefore exactly determined by the host processor. This process is called rapidzeroization. High security is offered by the ability to erase the content of NVRAM extremely quickly and easily.RAM Java ring contains a 134kb of the non-volatile random access memory. the processor itself is driven by an un stabilized ring oscillator operating over a range of 10 to 20 megahertz. The Crypto iButton hardware platform offers a unique set of special features expressly designed to prevent private keys and the other confidential information from being becoming available to hackers. The real time clock will continuously running up to more than 10 years by the energy provided the lithium backup.

It contains the one million transistor processor single chip trusted microprocessor with powerful java virtual machine (JVM) housed in a rugged and secure stainless steel case. The Crypto iButton hardware platform offers a unique set of special features that are being expressly designed to prevent private keys and other confidential information from becoming available to hackers.IBUTTON Fig 4.3 Structure of IButton The jewel of the java ring is the java iButton . Fig: Types of IButton’s available in the market .

TheDS1402D-DR8 is a part of the DS1402 series. Key Features: Coiled cable for connecting iButtons to1-Wire networks  Convenient.BLUE DOT RECEPTOR The read/write operation in the java ring is done by the blue dot receptor provided by the RS232 serial port adapter.It is a 1-Wire network cable designed to connect any serial or USB 1-Wire port adapter that has a RJ11 jack with up to two iButtons simultaneously.  For momentary (F3/F5 Micro Can) ordwelled contact (F5 Micro Can only).  Supports for up to two iButtons at once. off-the-shelf connectivity. but can only retain the F5 version iButtons. Fig:Types of Blue dot receptor’s available in the market .  Adhesive pad for mounting on objects. The DS1402D-DR8 Blue Dot receptor cable can touch any iButton for reading.

if the profile is authentic means user is authentic to open the door the applets president in the ring instruct the door to open. In the worst case if any unauthorized access penetrates the barrier the security processor detects it and immediately the data which is .2 WORKING OF JAVA RING Since java ring is programmed with the applets and the programming is done according to our application and this will specific for the specific user.4.3 SECURITY IN JAVA RING The java ring provides very high degree of security for the confidential data that is stored in the NVRAM memory. at up to 142Kbitspersecond. when the user press the signet of the java ring against the java ring reader which is embedded at the handle of the door the data is transferred from the ring to door system. Information is transferred between iButton and a PC with a momentary contact. The barrier substrate and the triple layer technique effectively deny access the unauthorized access to the NVRAM confidential data. Fig: Java Ring with Door application User simply has to press the signet of the java ring against the blue dot receptor and the system connected to the receptor performs the function that the applets instruct it to.java ring has the user profile and the same profile is present in the door embedded system also. 4. All information of the user is stored in the java ring.

The silicon die containing the processor. The Crypto iButton hardware platform offers a unique set of the special features expressly designed to prevent private keys and other confidential information from being becoming available to hackers. Sun representatives are also talking to the automakers. so that when they enter the car. In a family where both the husband and wife drive the car . and the car knows. You connect the Java ring to a ring receptor in the car. their environments are configured to the profiles on their rings. a driver can use his or her ring to access a vehicle and simply leave it when done with out a lock. ROM. In this potential market. If any attempt is made to penetrate these barriers. This construction technique and the use of NVRAM for the storage of private keys and other confidential data provides a much higher degree of data security than that afforded by EEPROM memory.each has individualized settings. who are developing the automated rental cars. a ring given to a mechanic or wallet allows that person to see the dashboard and drive 40 miles per hour within the one block radius. and NVRAM memory is metallurgically bonded to the barrier substrate through which all electrical contacts are made. Fig 4.7 Security through Java Ring in a car The Sun concept car's security is based on a Java ring that contains a profile of the user. based on your profile. For example.written in the NVRAM. The Java rings are authorized through the Personal Identification Numbers (PINs) so that no one can steal a person's ring and run off with the car. This barrier substrate and the triple-layer metal construction techniques that are employed in the silicon fabrication effectively deny access to the data stored in the NVRAM. the NVRAM data is immediately erased. . but no faster or farther than. what you are allowed to do.

Among the large-scale uses that are as transit fare carriers in Istanbul. in the e-banking application forgetting the balance in your account.  It is also possible to use a tag on the key ring or a watch instead of a ring.  A ring is a personal thing that the user and only the user carries along him/her anytime and anywhere. so that he/she can authenticate him/her-self in every situation. It is used for many real world application e. Turkey. and they are used by agricultural workers in many areas as rugged substitutes for timecards.  A very easy and a very convenient way for users. Logging into your personal computer and providing security in your car. for opening the door.4 APPLICATION OF JAVA RING The java ring is used initially as a rugged portable data carriers.g.4. They are worn as earrings by cows in Canada to hold vaccination records.  It is easier for the administrators to maintain the security infrastructure. Postal Service's outdoor mailboxes. and as mailbox identifiers that are inside the mail compartments of the U. since passwords are short or can be guessed. .S.  It is more secure than using passwords. since only password can be forgotten. as maintenance record carriers on the sides of Ryder trucks. A few important facts can be stated about the use of the Java Ring:  Authentication is most crucial to most applications. since billing and privacy is based on it. Often in very harsh environmental conditions.

BIBLIOGRAPHY [1] Cellular & Mobile Communications by LEE [2] www. CONCLUSION Fig 5. 6. it offers the most durable packaging for a class of products that likely will suffer heavy use and abuse as personal possessions.1: Digital Watch The basic idea behind the digital jewelry concept is to have the convenience of wireless. It is hoped to be marketable soon. The iButton form factor permits attachment to a wide variety of personal accessories that includes rings. several bugs remain. and necklaces. however.5. therefore.howstuffworks.com [3] www. is simply the most latest and most complex descendant of a long line of products that have proven they to be highly successful in the marketplace. sothe user can select a variation that suits his or her lifestyle. wallets. key fobs. watch bands. The Java iButton.com . With its stainless steel armor.IBM. wearable computers or phones while remaining fashionably sound. bracelets. Charging capabilities and cost are just a sample of the problems that lurk.