Data-Access Rings


Fashion, Finance, and Security at Your Fingertips

Data-access rings are personal wearable devices designed to look like a gemstone ring. The “gemstone” is a manufactured component engineered to store data and run complex firmware while the “ring” incorporates sophisticated biometric sensing devices and is composed of advanced materials resistant to damage.

Most data-access rings are used for identification (verification, authorization codes), financial transactions (payments, monetary transfers, account management), and include an embedded currency account. Additionally, they may be configured to handle access control (restricted areas, information systems, device operation such as a vehicle), and data storage for (credentials, contracts, other essential documents).

Usage

Rings are generally a status symbol, not only showing that the individual is wealthy with high status or standing, but that they also have the leisure to wear decorative items that might interfere with their tasks or responsibilities. For example, a wealthy security officer with high standing would usually wear a wristband or armband rather than a gemstone ring.

For trivial transactions, the ring can be waved at or passed over a data-access node such as a purchase kiosk, and payment is made from the embedded currency account.
For more significant transactions or queries about financial accounts, the ring (while being worn) is inserted into the gem-slot of a data-access terminal, at which point the institution holding the financial account will complete the transaction or respond to the query.

Devices

Data-access rings may be used with nearly all transaction devices. The rings are equipped to connect wirelessly with standardized local networks and are designed to communicate directly when inserted into a gem-slot. Direct connections are the most secure.

Data-access nodes, typically a kiosk, are available in commercial stores. Other types of data-access nodes are available for minor financial transfers (between individuals), other types of payments (e.g., restaurants, personal services), and secure access and identification.
Data-access terminals are situated in data-access stations. Terminals are used for major financial operations like account management, large transfers, or accessing financial services.
Data-access stations are conveniently located throughout cities, settlements, and habitants of nearly all Grand Society worlds. Stations have priority access to communication channels, diligent security, and continuous monitoring.
The ultra-rich and upper-level elites may possess private terminals in their own residences or offices. Since these private devices may not have adequate security, financial institutions utilize advanced security protocols on their end to reduce fraud, theft, and mis-use.

Security

Encryption is used to keep the transactions secure and the data safe — in particular, the embedded currency account and credential/authorization documents.

Authorization and credential protocols (established by the Treaty of Vecu) are used to certify that transactions are legitimate with minimal to zero risk of fraud. For large monetary amounts, most transactions require additional identification and authorization as well as confirmation that the user is not coerced in any manner.
Biometric sensors in the band of the ring guarantee that the ring will only activate when worn by its paired user. In addition, the ring may be configured with the following security features.
  • Require a passphrase or gesture for access. This may be a single action for any access or different actions per function/access level combination.
  • Deny access and shutdown when given a specific passphrase, sound, or gesture. Or even when detecting certain biometric conditions.
  • Issue a security alert to police, private security, financial institutions, etc. The most sophisticated firmware can even fake handling transactions while simultaneously notifying the institution, local authorities, and private security.

Note: The security technology used in data-access rings is regularly updated to counter the latest criminal techniques. The most secure and risk-free financial transactions and accounts are managed by Sancus, who relentlessly hunts down violators. Most thieves avoid anything managed by Sancus. Since not everyone can (or want to) afford Sancus' fees, data-access nodes and terminals managed by other financial institutions are readily available and more frequently utilized.

Key Facts

Type: Jewelry / Valuable
Base Price
If you need to know, you can't afford it.
Rarity
  • High society: routine
  • Upper classes: common
  • Wealthier elites: frequent
  • Wealthier middle classes: occasionally
  • Other classes: rare


Cover image: Data-Access Rings by Tulonsae using MidjourneyAI

Comments

Please Login in order to comment!
Feb 27, 2024 18:53

A useful data carrier that also looks good. I think it's great that you also thought about security, because a ring like this can quickly fall into the wrong hands. Would it be possible to wear something else instead of the ring if you have an allergic reaction to the metal?

Stay imaginative and discover Blue´s Worlds, Elaqitan and Naharin.
Feb 28, 2024 03:22 by Joella Kay

Yes, although there are a lot of different metals that can be used. There's a lot of flexibility in how the rings look.

May 29, 2024 12:58

Very cool device. How is it powered? Do you have to charge it occasionally, or is it drawing power from ambient sources (body heat, bioelectricity, solar, kinetic, or maybe a mix of several options)?

May 29, 2024 20:59 by Joella Kay

Those are good questions. I actually overlooked that. Probably body heat or bioelectricity, but I'll think about it and update the article.

Powered by World Anvil