Thursday, March 26, 2015

Digital Jewellery

 ABSTRACT
The latest computer craze has been to be able to wear wireless computers. The Computer Fashion Wave, "Digital Jewelry" looks to be the next sizzling fashion trend of the technological wave. The combination of shrinking computer devices and increasing computer power has allowed several companies to begin producing fashion jewelry with embedded intelligence. Today’s, manufacturers place millions of transistors on a microchip, which can be used to make small devices that store tons of digital data.. The whole concept behind this is to be able to communicate to others by means of wireless appliances. The other key factor of this concept market is to stay fashionable at the same time.Digital jewellry is the fashion jewelry with embedded intelligence. “Digital jewellery” can help you solve problems like forgotten passwords and security badges. “Digital jewelry” is a nascent catchphrase for wearable ID devices that contain personal information like passwords, identification, and account information. They have the potential to be all-in-one replacements for your driver's license, key chain, business cards, credit cards, health insurance card, corporate security badge, and loose cash. They can also solve a common dilemma of today's wired world – the forgotten password.By the end of the decade, we could be wearing our computers instead of sitting in front of them.

Digital jewellery Components
Each piece of jewelry contains a part of cell phone embedded in them,together works as a normal cellular phone.The various components that are inside cell phone such as Microphone,Receiver,display,touch pad,circuit board,antenna are embedded into different jewelry parts according to their working.IBM has developed a prototypes of cell phone that that consists of several pieces of digital jewelry that will work together wireless.
Here are the pieces of computerized-jewellery phone and their functions:
•Earrings - Speakers embedded into these earrings will be the phone's receiver.
•Necklace - Users will talk into the necklace's embedded microphone.
•Ring - Perhaps the most interesting piece of the phone, this "magic decoder ring” is equipped with light-emitting diodes (LEDs) that flash to indicate an incoming call. It can also be programmed to flash different colors to identify a particular caller or indicate the importance of a call.
•Bracelet -Equipped with a video graphics array (VGA) display, this wrist display could also be used as a caller identifier that flashes the name and phone number of the caller.
With a jewellery phone, the keypad and dialing function could be integrated into the bracelet, or else dumped altogether -- it's likely that voice-recognition software will be used to make calls, a capability that is already commonplace in many of today's cell phones. Simply say the name of the person you want to call and the phone will dial that person. IBM is also working on a miniature rechargeable battery to power these components.
The same ring that flashes for phone calls could also inform you that e-mail is piling up in your inbox. This flashing alert could also indicate the urgency of the e-mail.The mouse-ring that IBM is developing will use the company's Track Point technology to wirelessly move the cursor on a computer-monitor display. (Track Point is the little button embedded in the keyboard of some laptops).
In the coming age no longer you will find the displays on wall or desktops.You can simply view the images or content through your sunglasses or Bracelet.this the main and important advantage of Digital jewelry.Researchers are overcoming several obstacles facing these new wearable displays, the most important of which is the readability of information displayed on these tiny devices.



Prototype bracelet display developed by IBM
Charmed Technology is already marketing its digital jewelry, including a futuristic-looking eyepiece display. The eyepiece is the display component of the company's Charmed Communicator, a wearable, wireless, broadband-Internet device that can be controlled by voice, pen or handheld keypad. The Communicator can be used as an MP3 player, video player and cell phone. The Communicator runs on the company's Linux-based Nanix operating system. 

Technical specifications of Digital Jewelry
Digital jewellery devices consist of a screen or display for information, most likely consisting of 7-16-segment, or dot matrix LEDs, LCDs, or other technologies such as electroluminescent material (EL) or others, which could become an optional display. So too, an audiovisual or other 'display' could consist of a speaker, a single flashing light, a sensor of some kind (such as a temperature driven EL display), or other informational aesthetic. The display layer sits on a face of the device, which is enclosed in some material such as plastic, metal, crystal, or other material. It has external switches and buttons on its side and a data-port for accessing the programmable electronic circuit inside. A micro controller that is a surface mounted device (SMD) on a printed circuit board (PCB) with resistors (R) and capacitors (C) are the internal 'guts' of the jewelry.

Digital Jewellery can be made in many different sizes and shapes with a variety of materials ranging from plastic and metal to rubber and glass. They utilize electromagnetic properties and electronics to display information through a screen or display of some kind. This could range from LED 7-segment, 16-segment, dot matrix, and other programmable LEDs devices to LCDs, OLEDs, and other display devices.


Electro Magnetic Beads
The closest comparison to this model is that of 'beads' which are strung together to make a custom necklace or bracelet, with interchangeable electromagnetic component systems or devices. One bead may be a capacitor on the inside, and a solar panel on the outside. Another bead may have an internal resistor which feed power into a programmed micro controller bead which drives an external screen, with other options available in a variety of bead configurations which compose a circuit, including beads with a piezo element, voltage regulator, crystal, or rechargeable battery as part of the modular jewel circuit. The number of data pins on the micro controller needs to be enough to easily program the display layer plus the switches without overly complex and advanced coding methods.


Java Ring
It seems that everything we access today is under lock and key. Even the devices we use are protected
by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access
any door or computer program. Dallas Semiconductor is developing a new Java-based, computerized
ring that will automatically unlock doors and log on to computers.The Java Ring can be programmed to give you access to every door and device.

The Java Ring is snapped into a reader,called a Blue Dot receptor, to allow communication between a host system and the Java Ring.
 Blue Dot receptor
The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, which houses a 1-
million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM, a real-
time clock and a Java virtual machine, which is a piece of software that recognizes the Java language and translates it for the user's computer system. Digital jewelry, (designed to supplement the personal computer,) will be the evolution in digital technology that makes computer elements entirely compatible with the human form.
Highlights of Java Ring
• Runs Java better (plus portions enhance Java Card 2.0)
• Careful attention to physical security (rapid zeroization)
• Durability to stand up to everyday use
• High memory capacity (up to 134K bytes NV SRAM)
• Retail connectivity to 250 million existing computers (less if designed- in before manufacturing)

Space Mouse


Space Mouse

We describe the Haptic SpaceMouse, an input device based on the SpaceMouse with 2 DOF translational feedback in contrast to the rotational feedback often found in force-feedback joysticks. We use solenoids as motors in our implementation, they facilitate frictionless operation and add little inertia to the Spacemouse. The force-feedback controller is an Atmel ATmega32 microcontroller, which is programmed to decode the device output, thus enabling us to drive the solenoids in a closed loop.A simple host-to-device protocol is developed to specify the haptic forces. Our application-scenario demonstrates rigid-body contact of an user-controlled cursor.


Monday, March 23, 2015

Digital Pickpockets


Abstract on Digital Pickpockets :

The Internet has been a buzz with tales of fraudsters who can now steal your credit card accounts just by walking past you with an electronic scanner.Wireless identity theft, also known as contactless identity theft or RFID identity theft, is a form of identity theft described as "the act of compromising an individual's personal identifying information using wireless (radio frequency) mechanics. Hacker say how easy it is to steal credit card numbers in seconds while you still have them in your hand, Criminals use RFID and NFC wireless communication to steal numbers and The readers can be brought online or downloaded to phone via an app and They have to stand six inches away while a transaction is being made and Within a matter of seconds, the technology can pick up and store data.



How Digital Pickpockets Works:

But digital pickpockets have found a way to use the same technology to line their pockets with goods and services bought with stolen credit cards. The newest smartphones are making it easy for thieves to steal and use stolen credit cards.

In an effort to speed up credit card transactions at the cash register, major credit card companies have adopted a "contactless" payment systems like MasterCard's Paypass. It relies on radio frequency identification or RFID technology. RFID enabled credit cards are embedded with a hidden microchip that stores all the account information necessary to complete a transaction.

It's the same information on a card's magnetic strip. The difference is how it's communicated during the transaction. The RFID enable card uses a hidden antenna to broadcast the information to an electronic credit card reader. The user completes the transaction by tapping the card over and electronic reader at the register. With the traditional card swipe, the account information is read off the magnetic strip.



Now smartphone manufacturers, including Samsung, Nokia, Motorola, LG and HTC are releasing phones that are "NFC" or Near Field Communications enabled. NFC is form of RFID technology that takes advantage of both transmitting and receiving data via the smartphone.

NFC enabled phones have the ability to read the data on microchip credit card but they do not come with the software to actually do it. Software is also needed to translate the information otherwise the credit card data is meaningless.

Enter the hackers or code writers (depending on your point of view) who have not only written software to make the credit card info meaning meaningful, but software that leverages the smartphone's ability to use NFC to transmit data to an electronic reader.

For years, digital pickpockets have built RFID readers that can electronically sniff someone's wallet or purse for account information embedded on an RFID enabled credit card. That step has all but been eliminated by the cell phone manufacturers. The newest versions of Android smartphones have the hardware to do the same thing and more.

With a firmware modification and a free open source application that can easily be found on the internet, the average person can turn their NFC enabled smartphone into a credit card stealing machine and then use the smartphone as that stolen credit card.

The Problem Solvers want to see for ourselves just how easy an NFC enable phone make the job of a digital pickpocket easier.

We modified a Motorola Razr and installed the software to test just how easy it would be scan a RFID enabled credit card and play it back to an electronic reader. 



Referred Links:
http://www.komonews.com/news/local/Digital-pickpockets-using-technology-to-steal-credit-cards-208613001.html
http://www.dailymail.co.uk/sciencetech/article-2948212/Will-victim-digital-pickpockets-Hacker-reveals-easy-steal-credit-card-numbers-air-SECONDS.html