Data protection method, device and system for ibeacon base station

A data protection and base station technology, applied in the field of communication, can solve the problem of fraudulent use of iBeacon data, and achieve the effect of protecting interests, reducing the risk of fraudulent use, and improving security.

Active Publication Date: 2018-07-24
冷杉云(北京)科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In view of this, the present invention aims to provide a data protection method, device and system for iBeacon base stations, to solve the problem of fraudulent use of iBeacon data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method, device and system for ibeacon base station
  • Data protection method, device and system for ibeacon base station
  • Data protection method, device and system for ibeacon base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] The application scenario of this embodiment assumes that 10 iBeacon devices are deployed at different locations in a large store, and the store store map drawn according to the real scene inside the store is stored in the server. Coordinate ID. The corresponding relationship between the position information of the iBeacon base station in the map and the identification information of the iBeacon base station (such as UUID, MajorID, MinorID and other identification information of the iBeacon base station) is stored in the mapping table.

[0058] The corresponding relationship stored in the mapping table is not limited thereto. In other embodiments, the mapping table may also store the corresponding relationship between the location coordinates of the iBeacon base station, the unique identifier of the iBeacon base station, and the identification information of the iBeacon base station.

[0059] In this embodiment, the iBeacon base station has a built-in Bluetooth 4.0 chip,...

Embodiment 2

[0073] The difference between this embodiment and Embodiment 1 is that the mobile phone actively connects to the iBeacon base station and modifies the identification information of the iBeacon base station. After the modification is completed, the modified information is uploaded to the server, and the server performs synchronous update.

[0074] like figure 1 As shown, the method for protecting iBeacon base station data described in this embodiment, the specific steps include:

[0075] 1. The mobile phone actively connects to the iBeacon base station wirelessly through Bluetooth;

[0076] The mobile APP can automatically or manually connect to the iBeacon base station on a regular or irregular basis.

[0077] 2. The mobile APP modifies the identification information of the iBeacon base station;

[0078] The mobile phone APP can read the stored update information from within the APP, or actively request the update information from the server, or automatically generate the up...

Embodiment 3

[0087] The difference between this embodiment and Embodiment 1 is that the control device in this embodiment is a PC computer, and the PC computer has control software for controlling the iBeacon base station, and the iBeacon base station is electrically connected to the PC computer through a USB interface, a serial port or other physical interfaces. The specific steps of the iBeacon base station data protection method in the present embodiment include:

[0088] 1. The iBeacon base station is electrically connected to the PC computer through the interface;

[0089] 2. Modify the identification information of the iBeacon base station through the control software in the PC computer;

[0090] 3. After the modification is completed, the PC computer sends the modification information to the server;

[0091] 4. The server receives the modification information, and updates the corresponding identification information in the mapping table storing the correspondence between the locati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data protection method and system for an iBeacon base station, as well as a control device and a server for data protection of an iBeacon base station. The data protection method includes: after the control device establishes a communication connection with the iBeacon base station, modifying the identification information of the iBeacon base station, and uploading the modification information including the modified identification information to the server; the server according to The modification information is used to update the mapping table storing the correspondence between the location information of the iBeacon base station and the identification information. The present invention regularly or irregularly changes the identification information of the iBeacon base station, and at the same time, the Beacon data server updates and changes the data synchronously, so that the data information of the Beacon device is in a state of regular change, which can reduce the risk of Beacon data being used fraudulently and protect the interests of deployers.

Description

technical field [0001] The present invention relates to the communication field, in particular to a data protection method, device and system for an iBeacon base station. Background technique [0002] iBeacon is a new feature configured on mobile devices (IOS7) released by Apple in September 2013. The way it works is that a device equipped with Bluetooth Low Energy (BLE) communication function can create a signal area through BLE and send its own unique ID information in this signal area. When the device enters this area, the corresponding application software receives After arriving at the ID, some actions will be taken according to the ID. For example, if the iBeacon communication module is installed in the store, the application software running on the iPhone and iPad can inform the server of the customer's entry into the store through mobile communication, or the server can send discount coupons and points for entering the store to the customer. In addition, when the h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/80H04W12/08H04W76/11H04W76/14
Inventor 孙吉平韩勇
Owner 冷杉云(北京)科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products