Method for protecting privacy when using a bluetooth device
First Claim
1. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
- substituting a pseudonym address for the real device address; and
using the pseudonym address in functions of the device that normally use the real device address.
2 Assignments
0 Petitions
Accused Products
Abstract
The user'"'"'s Bluetooth device substitutes a pseudonym address for the Bluetooth Device Address (BD_ADDR). The pseudonym address is a randomized version of the BD_ADDR. The pseudonym address is used in all the functions of the Bluetooth device that normally use the BD_ADDR, including the frequency hopping sequence, the device access code, the initialization key in link encryption, the authentication code, and the various packet addresses. In this manner, the user'"'"'s privacy is protected by preventing the user'"'"'s identity, routes, and activities from being correlated with his/her device'"'"'s address. In addition to the Bluetooth standard, the technique also applies to other wireless standards.
-
Citations
78 Claims
-
1. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
substituting a pseudonym address for the real device address; and
using the pseudonym address in functions of the device that normally use the real device address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A system for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
a generator in the wireless device, for substituting a pseudonym address for the real device address; and
a processor coupled to the generator, for using the pseudonym address in functions of the device that normally use the real device address. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
-
61. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
forming a pseudonym address as a randomized version of the real device address;
substituting the pseudonym address for the real device address; and
using the pseudonym address in functions of the device that normally use the real device address.
-
-
62. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
enabling the user to select a part of the real device address and randomize it to form a first part of a pseudonym address;
combining a remaining part of the real device address with the first part of the pseudonym address to form a complete pseudonym address;
substituting the complete pseudonym address for the real device address; and
using the complete pseudonym address in functions of the device that normally use the real device address.
-
-
63. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
enabling the user to select a parameter to combine with the real device address;
combining the parameter with the real device address and forming a random number as a pseudonym address;
substituting the pseudonym address for the real device address; and
using the pseudonym address in functions of the device that normally use the real device address.
-
-
64. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
forming a pseudonym address as a randomized version of the real device address;
substituting the pseudonym address for the real device address;
using the pseudonym address in functions of the device that normally use the real device address; and
using the pseudonym address for a predetermined time or count.
-
-
65. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
forming a pseudonym address as a randomized version of the real device address;
substituting the pseudonym address for the real device address;
using the pseudonym address in functions of the device that normally use the real device address; and
using the pseudonym address for a duration that at least begins with an inquiry received from another device and ends if no connection is made after the inquiry.
-
-
66. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
forming a pseudonym address as a randomized version of the real device address;
substituting the pseudonym address for the real device address;
using the pseudonym address in functions of the device that normally use the real device address; and
using the pseudonym address for a duration that at least begins with an inquiry by the user'"'"'s device and ends if no connection is made after the inquiry.
-
-
67. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
forming a pseudonym address as a randomized version of the real device address;
substituting the pseudonym address for the real device address;
using the pseudonym address in functions of the device that normally use the real device address; and
using the pseudonym address for a duration that ends when a piconet context changes for the user'"'"'s device.
-
-
68. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
forming a pseudonym address as a randomized version of the real device address;
substituting the pseudonym address for the real device address;
using the pseudonym address in functions of the device that normally use the real device address; and
using the pseudonym address for a duration that at least begins with sensing of a current physical location of the user'"'"'s device, and ends if that physical location changes beyond a predefined distance.
-
-
69. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
forming a pseudonym address as a randomized version of the real device address;
substituting the pseudonym address for the real device address;
using the pseudonym address in functions of the device that normally use the real device address; and
using the pseudonym address for a duration that at least begins with an inquiry that establishes a connection with another device, and ends when that connection is terminated.
-
-
70. A method for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
forming a pseudonym address as a randomized version of the real device address;
comparing the pseudonym address with known addresses of other devices;
notifying the user if there are repeated attempts to generate a pseudonym address that fail because of duplicate addresses of other devices;
enabling the user to specify a modified randomization of the real device address;
performing the modified randomization and generating a new pseudonym address from the real device address; and
using the new pseudonym address in functions of the device that normally use the real device address.
-
-
71. A computer program product for a Bluetooth wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
a computer readable medium;
program code in said computer readable medium for forming a pseudonym address by randomizing at least a portion of the real Bluetooth device address;
program code in said computer readable medium for substituting the pseudonym address for the real Bluetooth device address; and
program code in said computer readable medium for using the pseudonym address in functions of the device that normally use the real Bluetooth device address.
-
-
72. A system for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
a memory storing a plurality of pseudonym addresses, each as a randomized version of the real device address;
a processor coupled to the memory, for substituting one of the pseudonym addresses for the real device address; and
said processor using the one pseudonym address in functions of the device that normally use the real device address.
-
-
73. A system for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
a memory storing a plurality of pseudonym addresses, each as a randomized version of the real device address;
a processor coupled to the memory, for substituting one of the pseudonym addresses for the real device address;
said processor using the one pseudonym address in functions of the device that normally use the real device address; and
said processor using the one pseudonym address for a predetermined time or count.
-
-
74. A system for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
a memory storing a plurality of pseudonym addresses, each as a randomized version of the real device address;
a processor coupled to the memory, for substituting one of the pseudonym addresses for the real device address;
said processor using the one pseudonym address in functions of the device that normally use the real device address; and
said processor using the one pseudonym address for a duration that at least begins with an inquiry received from another device and ends if no connection is made after the inquiry.
-
-
75. A system for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
a memory storing a plurality of pseudonym addresses, each as a randomized version of the real device address;
a processor coupled to the memory, for substituting one of the pseudonym addresses for the real device address;
said processor using the one pseudonym address in functions of the device that normally use the real device address; and
said processor using the one pseudonym address for a duration that at least begins with an inquiry by the user'"'"'s device and ends if no connection is made after the inquiry.
-
-
76. A system for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
a memory storing a plurality of pseudonym addresses, each as a randomized version of the real device address;
a processor coupled to the memory, for substituting one of the pseudonym addresses for the real device address;
said processor using the one pseudonym address in functions of the device that normally use the real device address; and
said processor using the one pseudonym address for a duration that ends when a piconet context changes for the user'"'"'s device.
-
-
77. A system for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
a memory storing a plurality of pseudonym addresses, each as a randomized version of the real device address;
a processor coupled to the memory, for substituting one of the pseudonym addresses for the real device address;
said processor using the one pseudonym address in functions of the device that normally use the real device address; and
said processor using the one pseudonym address for a duration that at least begins with sensing of a current physical location of the user'"'"'s device, and ends if that physical location changes beyond a predefined distance.
-
-
78. A system for a wireless device to prevent the user'"'"'s identity, routes, or activities from being correlated with the user'"'"'s real device address, comprising:
-
a memory storing a plurality of pseudonym addresses, each as a randomized version of the real device address;
a processor coupled to the memory, for substituting one of the pseudonym addresses for the real device address;
said processor using the one pseudonym address in functions of the device that normally use the real device address; and
said processor using the one pseudonym address for a duration that at least begins with an inquiry that establishes a connection with another device, and ends when that connection is terminated.
-
Specification