Apparatus and method for securing beacons
First Claim
Patent Images
1. A short-range communication tag comprising:
- a transmitter;
a clock circuit providing a clock value that changes with a period of a clock signal;
a memory configured to contain a unique identification value;
a processor, coupled to the memory, the clock circuit and the transmitter, the processor being configured to;
generate a Salt value;
insert bits of the Salt value into the unique identification value to generate a salted identification value;
calculate a checksum value of the salted identification value;
generate a sequence of encryption keys, wherein the processor is configured to generate new encryption keys in the sequence of encryption keys with a period of K seconds, according to a schedule, where K is an integer; and
for a current encryption key in the sequence of encryption keys;
combine the salted identification value and the checksum value with the current encryption key, according to a predetermined encryption method, to generate an encrypted unique identification value as a tag identification value; and
cause the transmitter to transmit the tag identification value.
2 Assignments
0 Petitions
Accused Products
Abstract
A short-range communication tag includes a transmitter, a clock circuit providing a clock value and a memory containing a unique identification value. The tag further includes a processor which generates encryption keys with a period of K seconds and combines the unique identification value with the encryption key, according to a predetermined encryption method, to generate an obfuscated unique identification value. The tag further includes a short-range transmitter to transmit the tag identification value.
14 Citations
13 Claims
-
1. A short-range communication tag comprising:
-
a transmitter; a clock circuit providing a clock value that changes with a period of a clock signal; a memory configured to contain a unique identification value; a processor, coupled to the memory, the clock circuit and the transmitter, the processor being configured to; generate a Salt value; insert bits of the Salt value into the unique identification value to generate a salted identification value; calculate a checksum value of the salted identification value; generate a sequence of encryption keys, wherein the processor is configured to generate new encryption keys in the sequence of encryption keys with a period of K seconds, according to a schedule, where K is an integer; and for a current encryption key in the sequence of encryption keys; combine the salted identification value and the checksum value with the current encryption key, according to a predetermined encryption method, to generate an encrypted unique identification value as a tag identification value; and cause the transmitter to transmit the tag identification value. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A mobile listening device comprising:
-
a short-range receiver; a memory which holds a plurality of encryption keys; a communications transceiver; and a processor coupled to the short-range receiver, the memory and the communications transceiver, the processor being configured to; receive an encrypted tag value via the short-range receiver; process at least a portion of the encrypted tag value using a predetermined decryption method and one of the plurality of encryption keys to generate a decrypted value including a tag ID value; extract a checksum value from the decrypted value; generate a further checksum value of at least the tag ID value; compare the checksum value and the further checksum value and, if the checksum value does not match the further checksum value process at least the portion of the encrypted tag value using the predetermined decryption method and another one of the plurality of encryption keys to obtain a further decrypted value including the tag ID value, extract the checksum value from the further decrypted value and generate the further checksum value of at least the tag ID value until the checksum matches the further checksum value; when the checksum value matches the further checksum value, remove a Salt from the tag ID value, as identified by predetermined configuration data, to generate a unique tag ID value. - View Dependent Claims (8, 9)
-
-
10. A method for encrypting a tag identifier (ID) of a short-range communications tag comprising:
-
retrieving a unique identification value from a memory; generating a Salt value; inserting bits of the Salt value into the unique identification value to generate a salted identification value; calculating a checksum value of the salted identification value; generating, by a processor of the short-range communications tag, a sequence of encryption keys with a period K seconds, as determined by a clock value; combining, by the processor, a currently generated one of the encryption keys with the salted identification value and the checksum value according to a predetermined encryption algorithm to generate an encrypted unique identification value as the tag identification value; and broadcasting the tag identification value by a transmitter coupled to the processor. - View Dependent Claims (11, 12, 13)
-
Specification