Secure beacons
A security and beacon signal technology, applied in the field of security beacons, can solve the problems of beacon signal imitation and misuse
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] In the following examples, Bluetooth Low Energy (BLE) advertising beacons in the form of Packet Data Units (PDUs), as defined in Bluetooth Specification 4.0 and subsequent versions of the Bluetooth standard, will be discussed. The present disclosure is not limited to BLE and can be applied to other types of beacons.
[0033] When a BLE peripheral broadcasts a packet to every device around it, this is called a BLE advertisement. The receiving device can act on the received advertisement information, or be triggered by the advertisement to connect to the BLE peripheral device to receive more information. In principle, BLE advertising is unidirectional.
[0034] Bluetooth's 2.4GHz spectrum extends from 2402MHz to 2480MHz. BLE uses 40 1MHz wide channels, numbered 0 to 39. Each one is separated by 2MHz. Channels 37, 38 and 39 are used for sending advertisement packets.
[0035] BLE advertisements are sent at regular intervals from 20ms to 10.24 seconds with a step size ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


