Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data protection method, device and system for iBeacon base station

A data protection and base station technology, applied in the field of communication, can solve the problems of fraudulent use of iBeacon data, and achieve the effect of protecting interests, reducing the risk of fraudulent use, and improving security.

Active Publication Date: 2014-09-17
冷杉云(北京)科技股份有限公司
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In view of this, the present invention aims to provide a data protection method, device and system for iBeacon base stations, to solve the problem of fraudulent use of iBeacon data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method, device and system for iBeacon base station
  • Data protection method, device and system for iBeacon base station
  • Data protection method, device and system for iBeacon base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] The application scenario of this embodiment assumes that 10 iBeacon devices are deployed at different locations in a large store, and the store store map drawn according to the real scene inside the store is stored in the server. Coordinate ID. The corresponding relationship between the position information of the iBeacon base station in the map and the identification information of the iBeacon base station (such as UUID, MajorID, MinorID and other identification information of the iBeacon base station) is stored in the mapping table.

[0058] The corresponding relationship stored in the mapping table is not limited thereto. In other embodiments, the mapping table may also store the corresponding relationship between the location coordinates of the iBeacon base station, the unique identifier of the iBeacon base station, and the identification information of the iBeacon base station.

[0059] In this embodiment, the iBeacon base station has a built-in Bluetooth 4.0 chip,...

Embodiment 2

[0073] The difference between this embodiment and Embodiment 1 is that the mobile phone actively connects to the iBeacon base station and modifies the identification information of the iBeacon base station. After the modification is completed, the modified information is uploaded to the server, and the server performs synchronous update.

[0074] Such as figure 1 As shown, the method for protecting iBeacon base station data described in this embodiment, the specific steps include:

[0075] 1. The mobile phone actively connects to the iBeacon base station wirelessly through Bluetooth;

[0076] The mobile APP can automatically or manually connect to the iBeacon base station on a regular or irregular basis.

[0077] 2. The mobile APP modifies the identification information of the iBeacon base station;

[0078] The mobile phone APP can read the stored update information from within the APP, or actively request the update information from the server, or automatically generate the...

Embodiment 3

[0087] The difference between this embodiment and Embodiment 1 is that the control device in this embodiment is a PC computer, and the PC computer has control software for controlling the iBeacon base station, and the iBeacon base station is electrically connected to the PC computer through a USB interface, a serial port or other physical interfaces. The specific steps of the iBeacon base station data protection method in the present embodiment include:

[0088] 1. The iBeacon base station is electrically connected to the PC computer through the interface;

[0089] 2. Modify the identification information of the iBeacon base station through the control software in the PC computer;

[0090] 3. After the modification is completed, the PC computer sends the modification information to the server;

[0091] 4. The server receives the modification information, and updates the corresponding identification information in the mapping table storing the correspondence between the locati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data protection method and system for an iBeacon base station and a control device and a server for data protection of the iBeacon base station. The data protection method includes the steps that after the control device is in communication with the iBeacon base station, identification information of the iBeacon base station is modified, and modified information comprising the modified identification information is uploaded to the server; the server is used for updating and storing a mapping table storing the correspondence relation between the position information and the identification information of the iBeacon base station according to the modified information. Due to the fact that the identification information of the iBeacon base station is modified regularly or irregularly and meanwhile the Beacon data server synchronously updates or modifies data, the Beacon device data information is in a regularly-changed state, the risks that the Beacon data are illegally used can be reduced, and the interests of a deployer are ensured.

Description

technical field [0001] The present invention relates to the communication field, in particular to a data protection method, device and system for an iBeacon base station. Background technique [0002] iBeacon is a new feature configured on mobile devices (IOS7) released by Apple in September 2013. The way it works is that a device equipped with Bluetooth Low Energy (BLE) communication function can create a signal area through BLE and send its own unique ID information in this signal area. When the device enters this area, the corresponding application software receives After arriving at the ID, some actions will be taken according to the ID. For example, if the iBeacon communication module is installed in the store, the application software running on the iPhone and iPad can inform the server of the customer's entry into the store through mobile communication, or the server can send discount coupons and points for entering the store to the customer. In addition, when the h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W76/02
Inventor 孙吉平韩勇
Owner 冷杉云(北京)科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products