Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure beacons

A security and beacon signal technology, applied in the field of security beacons, can solve the problems of beacon signal imitation and misuse

Pending Publication Date: 2021-08-24
GACUTE RAVISION
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It is generally considered problematic that beacon signals can be mimicked and misused

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure beacons
  • Secure beacons
  • Secure beacons

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In the following examples, Bluetooth Low Energy (BLE) advertising beacons in the form of Packet Data Units (PDUs), as defined in Bluetooth Specification 4.0 and subsequent versions of the Bluetooth standard, will be discussed. The present disclosure is not limited to BLE and can be applied to other types of beacons.

[0033] When a BLE peripheral broadcasts a packet to every device around it, this is called a BLE advertisement. The receiving device can act on the received advertisement information, or be triggered by the advertisement to connect to the BLE peripheral device to receive more information. In principle, BLE advertising is unidirectional.

[0034] Bluetooth's 2.4GHz spectrum extends from 2402MHz to 2480MHz. BLE uses 40 1MHz wide channels, numbered 0 to 39. Each one is separated by 2MHz. Channels 37, 38 and 39 are used for sending advertisement packets.

[0035] BLE advertisements are sent at regular intervals from 20ms to 10.24 seconds with a step size ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for securing a beacon signal in a network comprising a transmitter for broadcasting the beacon signal and one or more receivers for receiving the beacon signal, wherein the beacon signal comprises a data packet (103) including a payload (106) that comprises a first field containing broadcast information from the transmitter and a second field (204) for storing authentication information, the method comprising: computing, using a secret key, a message authentication code over the payload; extracting bytes from the message authentication code to obtain the authentication information; and encrypting the first field using a symmetric cipher which takes as parameter the secret key and a nonce, wherein the nonce comprises the authentication information, the encrypting resulting in an encrypted first field, the resulting secure beacon signal (200) comprising the encrypted first field (203) and the second field (204) with the authentication information.

Description

technical field [0001] The present disclosure relates to a computer-implemented method for securing a beacon signal, a computer-implemented method for processing a received secure beacon signal, a transmitter for securing a beacon signal, a method for processing a received secure beacon signal receivers, and safety beacon signals. Background technique [0002] Bluetooth Low Energy (BLE), as defined in Bluetooth 4.0 and subsequent standard versions, supports the broadcast transmission of beacons, which are small data packets typically intended to notify receivers of the presence of a tag. Typically, a beacon includes an identifier for the tag. Such tags that transmit beacons are used, for example, in supply chain applications to track items, containers, and the like. [0003] Broadcast beacons are usually sent in the clear, i.e. without encryption or authentication mechanisms. Therefore, an attacker can create and send such a beacon in order to mimic a tag. In contrast, B...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W4/80H04L9/06H04L9/32
CPCH04L9/0631H04L9/3242H04W4/80H04W12/06H04W12/03
Inventor 让-菲利普·奥马松
Owner GACUTE RAVISION