APPARATUS AND METHOD FOR SECURING BEACONS
First Claim
Patent Images
1. A short-range communication tag comprising:
- a transmitter;
a clock circuit providing a clock value that changes with a period of a clock signal;
a memory configured to contain a unique identification value;
a processor, coupled to the memory, the clock circuit and the transmitter, the processor being configured to;
generate a sequence of encryption keys, wherein the processor is configured to generate new encryption keys in the sequence of encryption keys with a period of K seconds, according to a schedule, where K is an integer; and
for a current encryption key in the sequence of encryption keys;
combine the unique identification value with the current encryption key, according to a predetermined encryption method, to generate an encrypted unique identification value as a tag identification value;
and cause the transmitter to transmit the tag identification value.
1 Assignment
0 Petitions
Accused Products
Abstract
A short-range communication tag includes a transmitter, a clock circuit providing a clock value and a memory containing a unique identification value. The tag further includes a processor which generates encryption keys with a period of K seconds and combines the unique identification value with the encryption key, according to a predetermined encryption method, to generate an obfuscated unique identification value. The tag further includes a short-range transmitter to transmit the tag identification value.
-
Citations
20 Claims
-
1. A short-range communication tag comprising:
-
a transmitter; a clock circuit providing a clock value that changes with a period of a clock signal; a memory configured to contain a unique identification value; a processor, coupled to the memory, the clock circuit and the transmitter, the processor being configured to; generate a sequence of encryption keys, wherein the processor is configured to generate new encryption keys in the sequence of encryption keys with a period of K seconds, according to a schedule, where K is an integer; and for a current encryption key in the sequence of encryption keys; combine the unique identification value with the current encryption key, according to a predetermined encryption method, to generate an encrypted unique identification value as a tag identification value; and cause the transmitter to transmit the tag identification value. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A mobile listening device comprising:
-
a short-range receiver; a memory which holds a plurality of encryption keys; a communications transceiver; and a processor coupled to the short-range receiver, the memory and the communications transceiver, the processor being configured to; receive an encrypted tag value via the short-range receiver; process at least a portion of the encrypted tag value using a predetermined decryption method and one of the plurality of encryption keys to generate a decrypted value including a tag ID value; extract a checksum value from one of the encrypted tag value or the decrypted value; generate a further checksum value of at least the tag ID value; compare the checksum value and the further checksum value and, if the checksum value matches the further checksum value, remove a Salt from the tag ID value, as identified by predetermined configuration data, to generate a unique tag ID value - View Dependent Claims (7)
-
-
8. A method for encrypting a tag identifier (ID) of a short-range communications tag comprising:
-
retrieving a unique identification value from a memory; generating, by a processor of the short-range communications tag, a sequence of encryption keys with a period K seconds, as determined by a clock value; combining, by the processor, a currently generated one of the encryption keys with the unique identification value according to a predetermined encryption algorithm to generate an encrypted unique identification value as the tag ID; and broadcasting the tag ID by a transmitter coupled to the processor. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. Apparatus comprising:
-
a clock generator having a clock value that changes in response to a clock signal; a transceiver; a memory; a processor coupled to the transceiver, the clock signal generator and the memory, the processor being configured to; generate a sequence of encryption keys and seed values including, a current encryption key and a current seed value and store at least a portion of the sequence of encryption keys and seed values in the memory; retrieve from the memory the current seed value and the current clock value; establish a transmission connection with a field service application via the transceiver; and transmit the current seed value and current clock value to the field service application via the transmission connection. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification