20-10-2016, 10:51 AM
1460036366-seminar.docx (Size: 1.05 MB / Downloads: 5)
INTRODUCTION
It seems that everything we access today is under lock and key. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. Dallas Semiconductor is developing a new Java based, computerized ring that will automatically unlockdoorsand log on to computers.In the domain of identification traditional technologies such as thebar codes applied on surfaces, the magnetic stripes, the chip cards, and the RFID labels are used. To these technologies can be added another successful one, which is basedon the 1-wire communication network.
The 1-wire technology has emerged from the evolution of the semiconductortechnology. It was designated to some specific applications to substitute the identification by paper label based on bar codes for the electronic circuits. DallasSemiconductor was the first producer which developed a large used automatedidentification through attached chips to objects or persons.
The iButton technology belongs to the category of the technologies of identification by touching. The simplest identification method can be realized by using amicrosystem with two external electrical wire connexions: signal and ground. This mobile computer can become even more secure. You can keep the iButtonwith you wherever you go by wearing it as a closely guarded accessory a watch, a key chain, a wallet, or a ring.
Java Ring is the digital jewellery that is designed to supplement the personal computer. It is the evolution in digital technology that makes computer elements entirely compatible with the human form.The Java Ring, first introduced at Java One Conference, has been tested at Celebration School. The rings given to students are programmed with Java applets that communicate with host applications on networked systems. Applets are small applications that are designed to be run within another application. The Java Ring is snapped into a reader, called a Blue Dot receptor, to allow communication between a host system and the Java Ring.
The Java ring given at Celebration School was programmed to store electronic cash to pay for lunches, automatically unlock doors, take attendance, store a student's medical information and allow students to check out books. All of this information was stored on the ring's iButton. Students simply press the signet of their Java Ring against the Blue Dot receptor, and the system connected to the receptor performs the function that the applet instructs it to. In the future, the Java Ring may also start a car.
Here are a few reasons to wear the iButton in the accessory that best fits thelife style:
• It is a safe place to keep the private keys to conduct transactions.
• It overcomes the deficiencies of the secret password.
• You eliminate keystroke with a quick, intentional press of the Blue Dot.
• You keep your computer at hand versus lugging your everywhere you roam.
• With this youcan become part of the network economy.
• The reading can be done without expensive optical devices.Reading and Writingis done by means of small-sized portable having reduced energy consumption.
• The hundredfold increased storage of data as compared to a bar code.
• The identification is through a unique serial number which can represent a node in a global network of a practically unlimited dimension.
• It has multifunctionalityby integrating it into the same device. For example it canas function as temperature and humidity sensors on the same device.
HISTORICAL BACKGROUND
In the summer of 1989, Dallas Semiconductor Corp. produced the first stainlesssteelencapsulated memory devices utilizing the Dallas Semiconductor 1-Wire communication protocol. By 1990, this protocol had been refined and employed in a variety of self-contained memory devices. Originally called “touch memory” devices, they were later renamed “iButtons”. Packaged like batteries, iButtons have only a single electrical contact on the top surface, with the stainless steel shell serving as ground. The now famous Java Rings made their appearance at the conference (March 24-27), issued to attendees when they picked up their materials at registration. With one of these rings a user could communicate with the computers at the Hackers Lab thathelped to build a large fractal image at the show, or even get a cup of his or her favourite coffee.
The first time an attendee snapped the ring’s iButton into a ring reader attached to a workstation, an applet on the ring communicated with the host application on the system. The applet in turn downloaded the user’s personal information from the conference registration system and allowed the user to select their preferred type of coffee (a process they called “personalizing” the ring). From there, the user could walk over to a coffee factory, snap the ring into another reader, and the robotic coffee machine would make the brew based on the user’s preference stored in the ring.
Built by Dallas Semiconductor, the durable, wearable Java Ring is practically indestructible but not heavy or clumsy. The jewel of the ring is a relatively inexpensive device called an iButton, which contains a processor that runs a Java Virtual Machine. At the conference, the Java Rings were preloaded with applets that could communicate with corresponding host applications on various networked systems installed at the show.
Data can be read from or written to the memory serially through a simple and inexpensive RS232C serial port adapter, which also supplies the power required to perform the I/O. The iButton memory can be read or written with a momentary contact to the Blue DotReceptor provided by the adapter. When not connected to the serial port adapter, memory data is maintained in NonVolatile Random Access Memory (NVRAM) by a lifetime lithium energy supply that will maintain the memory content for at least 10 years.
Unlike Electrically Erasable Programmable Read-Only Memory (EEPROM), the NVRAMiButton memory can be erased and rewritten as often as necessary without wearing out. It can also be erased or rewritten at the high speeds typical of Complementary Metal Oxide Semiconductor (CMOS) memory, without requiring the time consuming programming of EEPROM.
The Java Ring was arguably the jewel in the crown of the Java One Developer Conference which was held at the MasconCentre in San Francisco in 1998.No other facility garnered quite such excitement, enthusiasm, and overall industry buzz. There were simply no bigger lines to be had than those to obtain the rings, topersonalizethe Java Ring, and then to play the ring based fractal game and enjoy a ring driven respite of custom brewed coffee.
2.1 The postal security device
For over 10 years, Dallas Semiconductor also has been designing, making, and selling a line of highly secure microprocessors that are used in satellite TV descramblers, automatic teller machines, point ofsale terminals, and other similar applications requiring cryptographic security and high resistance to attack by hackers. The U.S. Postal Service's (USPS) Information Based Indicia Program Postal Security Device Specification, intended to permit printing of valid U.S. postage on any PC, provided the first opportunity to combine two areas of expertise when a secure microprocessor was designed into an iButton the resulting product, named the Crypto iButton, combines high processor performance, high speed cryptographic primitives, and exceptional protection against physical and cryptographic attack. For example, the large integer modular exponentiation engine can perform 1024 bit modular exponentiations with a 1024 bit exponent in significantly less than a second. The ability to perform large integer modular exponentiations at high speedis central to RSA encryption,DiffieHellman key exchange, Digital Signature Standard (FIPS 186), and many other modern cryptographic operations.
Java Ring
3.1What is Java Ring?
The Java Ring is a stainless steel ring, 16 millimetres (0.6 inches) in diameter that houses a 1 million transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM, a real time clock and a Java virtual machine, which is a piece of software that recognizes the Java language and translates it for the user's computer system.
3.2Insight to Java Ring
The world today is in hunt for the new technology, and has contributed miracles to the field of science, the ever ending stream. The one such contribution is the JAVA RING, a finger ring that contains a small microprocessor with built in capabilities for the user, a sort of smart card that is wearable on a finger. It contains an inexpensive microprocessor in a stainless steel iButton, this particular ring is running on a Java Virtual Machine and it is preloaded with applets.
The JVM is the“processor architecture” on which java byte code is executed. It is mostly implemented in software, and available for a large variety of hardware platforms, ranging from mainframe computers to mobile phones and small embedded devices.
3.3Operating System in Java Ring
A special operating system was designed and stored in the ROMof the Crypto iButton to support cryptography and general purpose financial transactions such as those required by the Postal Service program. While not a Java virtual machine, the
E-Commerce firmware designed for this application had several points of similarity with Java, including an object oriented design and a byte code interpreter to interpret and execute Dallas Semiconductor’s custom designed E-Commerce Script Language.
A Compiler was also written to compile the high level language representation of the Script Language to a byte code form that could be interpreted by the E-Commerce Virtual Machine .Although the E-Commerce firmware was intended primarily for the USPS application, the firmware supports a variety of general electronic commerce models that are suitable for many different applications. The E-Commerce firmware also supports cryptographic Protocols for secure information exchange such as the Simple Key Management for Internet Protocol (SKIP) developed by Sun Microsystems Inc.
4.Security
National Institute of Standards and Technology (NIST) and the Canadian Security Establishment (CSE) have validated the DS1954 Cryptographic iButton as meeting Federal Information Processing Standards Publications (FIPS PUBS) 140-1, ”Security Requirements for Cryptographic Modules” (FIPS 140-1).
The Crypto iButton includes the highest level of physical security ever validated by the FIPS 140-1 program, and it does this in an extremely small and durable package. There is no other hardware token like this, meeting government and federal requirements and providing rich functionality at a fraction of the cost of similar devices. The Crypto iButton provides hardware cryptographic services such as long-term safe storage of private keys, a high speed math accelerator for 1024 bit public key cryptography, and secure message digest (hashing).
The Crypto iButton consists of a physically secure, million transistor microchip packaged in a 16mm stainless steel can. Not only does the steel protect the silicon chip inside from the hard knocks of everyday use, it also shows clear evidence of tampering by leaving scratch and dent marks of the intruder.This steel case satisfies FIPS 140-1 Level 2 Tamper Evidence requirements for physical security.
Additional physical security measures designed into the Crypto iButton meet the FIPS 140-1 Level 3 Tamper Response requirements. If the steel case is opened, a micro switch triggers a tamper response, which results in rapid zeroization of the chip’s contents, destroying private keys and other sensitive information.
The iButton constantly monitors the switch’s contacts, and any separation of the cryptographic chip from the lithium cell returns the device to on chip capacitor power to perform a complete zeroization as its last powered action. Orchestrated attacks to uncoverthe iButton secret information by subjecting it to extreme temperature or voltage conditions will also generate a tamper response that results in zeroization.
Deliberate exposure to temperatures outside the iButton’s operational range of minus 20 degrees C to 70 degrees C (minus 4 degrees F to 158 degrees F) causes temperature monitors to trigger a cold or high temp response that quickly erases (zeroes) the memory contents. This feature allows the iButton to meet the FIPS 140-1 Level 4 Environmental Failure Protection (EFP) requirements.
If an excessive voltage is applied to the sole I/O pin, an electronic fuse renders the chip inoperable to protect the chip from out of spec voltage stresses.The barrier substrate and the triple layer technique effectively deny access the unauthorized access to the NVRAM confidential data. In the worst case if any unauthorized access penetrates the barrier the security processor detects it and immediately the data which is written in the NVRAM is erased. The Crypto iButton hardware platform offers a unique set of special features expressly designed to prevent private keys and other confidential information from becoming available to hackers.
Individuals maintain control over their Crypto iButton in yet another way bysecret Personal Identification Numbers. If so programmed, the iButton will not perform computations until its PIN is entered, like a bank ATM.
COMPONENTS
The main components of java ring are following:-
• Java Virtual Machine (JVM)
• RAM
• ROM
• Real Time Clock
• IButton
• Blue Dot Receptor
• 1-Wire Interface
5.1Java Virtual Machine (JVM)
Java ring is programmed with java application program and applets that communicate with the host application on the networked system. Applets are the small application that is designed to run on the application system. The java virtual machine is the piece of software that recognizes the java language and translates the byte code, which is used by the system which is connected to the java ring via ring reader.
At Celebration School, the rings have been programmed to store electronic cash to pay for lunches, automatically unlock doors, take attendance, store a student’s medical information and allow students to check out books. All of this information is stored on the ring’s iButton. Students simply press the signet of their Java Ring against the Blue Dot receptor, and the system connected to the receptor performs the function that the applet instructs it to.
5.2RAM
Java ring contains 134kb of Non Volatile Random Access Memory (NVRAM). Program and data is stored in this NVRAM .This Non Volatile Random Access Memory offers high read/write speed and also provides temper resistance through instantaneous clearing of all memory when tempering is detected. This process is called rapid zeroization. The NVRAM iButton memory can be erased or rewritten as often as necessary without wearing out. High security is offered by the ability to erase the content of NVRAM extremely quickly.
The Crypto iButton also provides an excellent hardware platform for executing Java because it utilizes NVRAM for program and data storage. With 6 kilobytes of existing NVRAM and the potential to expand the NVRAM capacity to as much as 128 kilobytes in the existing iButton form factor, the Crypto iButton can execute Java with a relatively large Java stack situated in NVRAM.
This memory acts as conventional high speed RAM when the processor is executing, and the lithium energy preserves the complete state of the machine while the Java Ring is disconnected from the reader. There is therefore no requirement to deal with persistent objects in a special way objects persist or not depending on their scope so the programmer has complete control over object persistence.
As in standard Java, the Java iButton contains a garbage collector that collects any objects that are out of scope and recycles the memory for future use. Applets can be loaded and unloaded from the Java iButton as often as needed. All the applets currently loaded in a Java iButton are effectively executing at zero speed any time the iButton is not in contact with a Blue Dot receptor. As the Java Card 2.0 specification was proposed, Dallas Semiconductor became a Java Soft licensee. The agreement called for the development of a Java Card 2.0 implementation and also for the design of ”plus portions” that take advantage of the unique capabilities afforded by the Crypto iButtons NVRAM, such as the ability to support a true Java stack and garbage collection. With the addition of the continuously running lithium powered time of day clock it has the highspeed, largeinteger modular exponentiation engine.
5.3 ROM
The java ring contains 32kb of ROM .A special kind of operating system called
E-Commerce operating system which is based on java and JVM is stored in the ROM.This operating system handles all the operation which is happening in the iButton. It is stored in ROM because it is not supposed to be altered by the user. The Crypto iButton hardware platform offers a unique set of special features expressly designed to prevent private keys and other confidential information from becoming available to hackers.
A32-kilohertz crystal oscillator is used in the Java iButton to operate the time of day clock at a constant and well-controlled frequency that is independent of the processor clock.
5.4 Real Time Clock
In the java ring real time clock gives the exact time of the day. The real time clock continuously running up to more than 10 years by the energy provided the lithium backup. A 32-kilohertz crystal oscillator is used in the Java iButton to operate the time of day clock at a constant and well controlled frequency that is independent of the processor clock.
In addition, the processor itself is driven by an unstabilized ring oscillator operating over a range of 10 to 20 megahertz, so that the clock frequency of the processor is not constant and cannot be determined by external means. This differs from the design of alternative devices in which the processor clock signal is injected by the reader and is therefore exactly determined by the host processor.
External control of the clock provides a valuable tool to hackers, since they can repetitively cycle such a processor to the same point in its execution simply by applying the same number of clock cycles. Control of the clock also affords a means to induce a calculation error and thereby obtain information that can ultimately reveal secret encryption keys. A 32-kilohertz crystal oscillator is used in the Java iButton to operate the time of day clock at a constant and well controlled frequency that is independent of the processor clock.
5.5 IButton
The jewel of the java ring is the java iButton .It contains one million transistor processor single chip trusted microprocessor with powerful Java Virtual Machine (JVM) housed in rugged and secure stainless steel case. The Crypto iButton hardware platform offers a unique set of special features expressly designed to prevent private keys and other confidential information from becoming available to hackers.
Java powered cryptographic iButton
A microprocessor and high speed arithmetic accelerator generate the large numbers needed to encrypt and decrypt information. The Java powered iButton adds its complete cryptographic circuitry to a Java Virtual Machine (VM) that is Java CardTM 2.0 compliant, enabling the world’s large pool of Java programmers to tap into a powerful development tools to get an application up and running quickly.
The Java powered iButton’s greatest promise lies in its capacity to interact with Internet applications to support strong remote authentication and remotely authorized financial transactions. In practical terms,that means you can jump into the age of electronic commerce with both feet. Your messages are sent over the Internet scrambled and can only be unscrambled at the other end by someone with an authorized iButton. By establishing a means to transmit and protect user identity, the iButton becomes the user’s digital credential.
Thermochron iButton
Thermochron iButton tracks time and temperature, keys to the freshness of many products. The Thermochron integrates a thermometer, a clock or calendar, a thermal history log, and 512 bytes of additional memory to store a shipping manifest.
5.6Blue Dot Receptor
The read/write operation in the java ring is done by the blue dot receptor provided by the RS232 serial port adapter. The DS1402D-DR8 is a part of the DS1402 series. It is a 1-Wire network cable designed to connect any serial or USB 1-Wire port adapter that has a RJ11 jack with up to two iButtons simultaneously. The DS1402D-DR8 Blue Dot receptor cable can touch any iButton for reading, but can only retain the F5 version iButtons.
Key Features:-
• Coiled cable is used for connecting iButtons to 1-Wire networks (8 ft. when fully extended).
• Convenient, off-the-shelf connectivity.
• For momentary (F3/F5 Micro Can) or dwelled contact (F5 Micro Can only).
• It is an adhesive pad for mounting on objects.
• It can support up to two iButtons at once.
• It can be used with any EDS host adapter equipped with a RJ11 jack (HA7Net, HA7E, HA5-xxx-R, and HA4B)
• It can be used with any Dallas Semiconductor port adapter. (DS9097E, DS9097U, DS9490R)
The DS1402 series incorporates four basic types of connectors such as 1-Wire RJ-11, iButton, Touch-and-Hold Probe, and Blue Dot Receptor. The DS1402 series of 1-Wire network cables provides connectivity for iButtons. The cables are designed to connect any USB, serial or parallel port 1-Wire adapter to any iButton. Both, the iButton probe cables and the Blue Dot receptor cables can touch any iButton, but can only hold the F5 version iButtons. The DS1402BR8 is the only cable that connects to the DS1401 iButton Holder. Applications of the DS1402-series 1-Wire network cables range from software protection and access control to asset management and thermal monitoring throughhandheld computers. iButton and 1-Wire are registered trademarks of Dallas Semiconductor Corporation. The DS1402D Blue Dot Receptors are iButton reader or probes that provide a convenient pipeline into the PC for iButton to PC communication. The receptor's cable connects to a USB, serial or parallel port 1- Wire adapter, whichever type of port you wish to use. The receptor itself easily affixes to any accessible spot on the front of the PC. The user can elect a quick information transfer with a momentary touch of the iButton to the Blue Dot. For hands free operation the iButton can be snapped into the Blue Dot and remain there. Each receptor contains two Blue Dots to accommodate instances where multiple Buttons are required for a transaction. A company's policy may, for example, require both an employee and a supervisor to authenticate access to sensitive information stored on a network server.