CN106664523A - Proximity application discovery and provisioning - Google Patents

Proximity application discovery and provisioning Download PDF

Info

Publication number
CN106664523A
CN106664523A CN201580046665.9A CN201580046665A CN106664523A CN 106664523 A CN106664523 A CN 106664523A CN 201580046665 A CN201580046665 A CN 201580046665A CN 106664523 A CN106664523 A CN 106664523A
Authority
CN
China
Prior art keywords
degree
approach
message
emitter
central server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201580046665.9A
Other languages
Chinese (zh)
Inventor
B·雷丁
J·B·林斯基
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/474,367 external-priority patent/US10419907B2/en
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN106664523A publication Critical patent/CN106664523A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0261Targeted advertisements based on user location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Abstract

Methods, non-transitory processor-readable storage media, systems, and devices for provisioning devices associated with wireless identity transmitters. An embodiment method performed by a proximity broadcast receiver may include operations for receiving a broadcast message including a secure identifier from a wireless identity transmitter, transmitting to a central server a sighting message that includes the secure identifier and an identity of the proximity broadcast receiver, receiving from the central server a return message that includes identification information related to the received broadcast message and that is authorized to be distributed to the proximity broadcast receiver based on data stored on the central server, and provisioning a device associated with the received broadcast message based on the identification information from the received return message. The method may also include identifying a software source from the received return message, requesting the software from the identified software source, and installing the received software.

Description

Degree of approach application finds and arranges
Background technology
Honeycomb and Wireless Telecom Equipment have obtained in the past few years the growth advanced by leaps and bounds.The growth is by more excellent communication Hardware, bigger network and more reliable agreement are promoted.Smart phone of today can include camera, GPS,Transceiver, is also included for enabling a device to set up the cellular communication capability with the data link of internet certainly (for example, LTE, 3G and/or 4G network insertion).Now, the various assemblies and ability in smart phone are can to afford very much , therefore now in society, the smart phone mobile device similar with other is widely disposed.
However, the complexity of modern mobile devices may make, and installation and configuration are applied and ancillary equipment is for a user Difficult.Specifically, arranging smart phone may need to be answered for downloading for interacting with sensor or ancillary equipment Authorized with, certification user, request and input document a large amount of operations, to access correlation function.For example, in order to allow friend's Tablet computer mobile device accesses family's WiFi routers, and house-owner may need to provide password and for friend's to friend Tablet computer arranges other access considerations and (for example, arranges and be individually allowed for accessing equipment, the adjustment router on LAN On media access control (MAC) address filtering arrange etc.).Another example is lifted, the guest of family may be needed in online app Scan for controlling neighbouring thermostat to find appropriate application (or app) in shop, and it may also be desirable to family Owner's inquiry password accessing the thermostat.
The content of the invention
Each embodiment is provided for being improved based on the degree of approach at the system of setting of equipment, equipment, non-transitory Reason device readable storage medium storing program for executing and method.Generally, miniaturization wireless identity emitter (WIT) being associated with user can be configured Be via short range radio (such asLow energy (LE) transceiver) regularly broadcast including unique and safety post Know the message of code.Wireless identity emitter may be coupled to equipment (such as router or application (for example, TV, router, refrigerator, Thermostat etc.)), be integrated in equipment, be associated by device emulation or otherwise with equipment.For example, wireless identity is sent out The machine of penetrating may be located in the Wi-Fi routers in family.
Broadcast from wireless identity emitter can be by physically immediate degree of approach broadcasting receiver (PBR) Receive, the PBR can be special receiver, be configured with the mobile device of degree of approach broadcasting receiver software and static reception Machine, only enumerates several examples.When wireless identity emitter in range of receiving (for example, in 0 to 25 feet) when, broadcast Can the reception of degree of being approached broadcasting receiver.Because wireless identity transmitter broadcasts short range, wireless signals, therefore wireless identity Position of the approximate location of emitter by degree of approach broadcasting receiver when broadcast is received is providing.
Degree of approach broadcasting receiver can by the broadcast for receiving together with other information (for example, time stamp data, connect Recency information etc.) to aim at message in the form of be relayed to central server.Such central server can be used and disappeared in aiming The information received in breath is recognizing wireless identity emitter.For example, central server can process (for example, decoding etc.) and aim at and disappear Safe identification code in breath searches the user being associated with equipment using the identity to recognize wireless identity emitter. Central server is also based on the aiming message that receives and (for example, is configured with receiver recognizing degree of approach broadcasting receiver Using smart phone).In each example, central server can be stored and connect with wireless identity emitter, degree of approach broadcast Receipts machine and it is associated with these equipment or is connected to the profile that the user of these equipment is associated.Such profile can include Identify with regard to user and equipment information and can how and when in shared profile information with regard to controlling central server Any profile information license.
Degree of approach broadcasting receiver can be received for arranging what is be associated with wireless identity emitter from central server The information of equipment.Specifically, in response to reporting broadcast, degree of approach broadcast from wireless identity emitter to central server Receiver can receive the identification information for being communicated with equipment, such as access credentials (for example, log-on message, password Deng).Only when being authorized to based on related license (such as user-defined for distributing passwords to access the rule of Wi-Fi routers) When, the identification information for receiving just can be sent to equipment or degree of approach broadcasting receiver by central server.Further, since in Centre server can utilize the profile information related to degree of approach broadcasting receiver, and the identification information for receiving is wide for the degree of approach It can also be especially suitable to broadcast receiver.For example, smart phone degree of moving closer to broadcasting receiver can be received for from special Note and download application to make operating system or platform (for example, Android, iOS etc.) transport on smart phone in the app shops of software Capable URI.In this way, degree of approach broadcasting receiver can receive authorized relevant information, and be taken based on central authorities are received The broadcast that solved of business device is finding the appropriate application for arranging equipment nearby.
In certain embodiments, degree of approach broadcasting receiver can receive configuration data, the configuration number from central server According to the equipment to be set may be transferred to.For example, data can be received for based on device type and for the type Equipment pre-stored configuration, configure equipment using few user mutual.In certain embodiments, central server can Authorization requests are sent to be configured to the equipment possessed to the user being associated with wireless identity emitter, it is close to obtain Degree broadcasting receiver is used for setting or the approval on demand of access equipment.
Description of the drawings
Be expressly incorporated herein and constitute the part of this specification accompanying drawing show the present invention exemplary embodiment, and with Overall description given above and detailed description given below are used to illustrate the feature of the present invention together.
Fig. 1 shows the system diagram of the networking component suitable for using in various embodiments.
Fig. 2 shows the communication system figure of the networking component suitable for using in various embodiments.
Fig. 3 A are showed for from the process flow of the embodiment method of wireless identity transmitter broadcasts secure identifier Figure.
Fig. 3 B are showed and the embodiment that configuration is arranged are received after start-up operation is performed for wireless identity emitter The process flow diagram flow chart of method.
Fig. 4 is showed for degree of approach broadcasting receiver in response to receiving broadcast to send out from wireless identity emitter Send the process flow diagram flow chart of the embodiment method for aiming at message.
Fig. 5 shows the embodiment method of the aiming message sent for server process degree of approach broadcasting receiver Process flow diagram flow chart.
Fig. 6 shows the modules in degree of the moving closer to broadcasting receiver suitable for using in various embodiments Component drawings.
Fig. 7 shows degree of moving closer to broadcasting receiver and sends aiming message with the mark of relay wireless identity emitter Process flow diagram flow chart of the symbol together with the embodiment method of other data of such as time or position.
Fig. 8 is for responding to the user's request of the position for wireless identity emitter according to each embodiment Call flow diagram.
Fig. 9 is showed and the action or code indicated in the broadcast for receiving is performed for degree of approach broadcasting receiver Embodiment method process flow diagram flow chart.
Figure 10 is showed for degree of moving closer to broadcasting receiver in response to coming with the degree of approach of wireless identity emitter Send and aim at message, the process flow diagram flow chart of the embodiment method of instruction is received from central server.
Figure 11 is showed to be sent to central server for degree of moving closer to broadcasting receiver and is aimed at message and therefrom Centre server receives the process flow diagram flow chart of the embodiment method for returning message.
Figure 12 shows the component drawings of the modules in the central server suitable for using in various embodiments.
Figure 13 shows the figure of the registration process suitable for using in various embodiments.
Figure 14 and 15 is showed for central server process from the aiming message of degree of approach broadcasting receiver reception The process flow diagram flow chart of embodiment method.
Figure 16 is, according to each embodiment, to show wireless identity emitter, degree of approach broadcasting receiver and central service The process flow diagram flow chart of the communication between device.
Figure 17 shows to receive to aim at message and send from degree of approach broadcasting receiver for central server to be included The process flow diagram flow chart of the embodiment method of the return message of various data.
Figure 18 is showed and is determined whether degree of approach broadcasting receiver has been out wireless identity and send out for central server Penetrate the process flow diagram flow chart of the embodiment method of machine.
Figure 19 shows the process flow diagram flow chart of the embodiment method that identifier is rolled for central server process.
That Figure 20 is showed is being carried out by wireless identity emitter and central server, for sending and process using encryption The process flow diagram flow chart that the embodiment of rolling identifier of the algorithm to encrypt is operated.
Figure 21 A show generated using AES for wireless identity emitter and broadcasted rolling identifier it is effective The process flow diagram flow chart of the embodiment method of load.
Figure 21 B are showed and are received and processed rolling identifier payload using AES for central server Embodiment method process flow diagram flow chart.
That Figure 22 is showed is being carried out by wireless identity emitter and central server, for being sent out using pseudo-random function Send and process the process flow diagram flow chart of the embodiment operation for rolling identifier.
Figure 23 A show generated using pseudo-random function for wireless identity emitter and broadcasted rolling identifier have The process flow diagram flow chart of the embodiment method of effect load.
Figure 23 B show received using pseudo-random function for central server and processed rolling identifier effectively carry The process flow diagram flow chart of the embodiment method of lotus.
Figure 24 A are showed to generate and broadcast to have for wireless identity emitter and are rolled the random of identifier and warp knit code The process flow diagram flow chart of the embodiment method of the message of number or counter.
Figure 24 B-24C show for central server receive and process include rolling identifier and warp knit code it is random The process flow diagram flow chart of the embodiment method of the message of number or counter.
Figure 25 is showed and come in response to receiving the aiming message related to wireless identity emitter for central server Calculate the process flow diagram flow chart of the embodiment method of incentive plan information.
Figure 26 is showed and sent out in response to receiving the wireless identity in the degree of approach with reward region for central server Penetrate the related aiming message of machine to calculate the process flow diagram flow chart of the embodiment method of incentive plan information.
Figure 27 A-27B be according to each embodiment, show degree of approach broadcasting receiver (for example, mobile device) arrange with The figure of the associated router of wireless identity emitter.
Figure 28 A-28D be according to each embodiment, show degree of approach broadcasting receiver (for example, mobile device) be based on from It is coupled to broadcast that the wireless identity emitter of household electrical appliances receives to arrange the figure of the household electrical appliances.
Figure 29 shows the reality for arranging the equipment being associated with wireless identity emitter for degree of approach broadcasting receiver Apply the process flow diagram flow chart of a method.
Figure 30 to be showed and process the aiming message from degree of approach broadcasting receiver for central server and send For arranging the process flow diagram flow chart of the embodiment method of the data of equipment.
Figure 31 A are showed and are returned message to set up in response to receiving from central server for degree of approach broadcasting receiver For arranging the process flow diagram flow chart of the embodiment method of the function of equipment.
Figure 31 B are showed and come from number in response to receiving return message from central server for degree of approach broadcasting receiver According to source software is asked to set up the process flow diagram flow chart for arranging the embodiment method of the function of equipment.
Figure 31 C show the embodiment side for degree of approach broadcasting receiver to configured equipment send configuration data The process flow diagram flow chart of method.
Figure 31 D are showed and are shown the available function to be used together with neighbouring equipment for degree of approach broadcasting receiver The process flow diagram flow chart of embodiment method.
Figure 31 E show suitable for use in various embodiments, can be selected for access and wireless identity The exemplary display figure of the available software (for example, app) of the associated neighbouring equipment of emitter.
Figure 31 F are showed and extra certification letter are sent when by central server requests for degree of approach broadcasting receiver The process flow diagram flow chart of the embodiment method of breath.
Figure 32 A are showed and are received the mark that is associated with wireless identity emitter to being authorized to be for central server The degree of approach broadcasting receiver of information sends the process flow diagram flow chart of the embodiment method of message.
Figure 32 B show for central server send have be used for in the degree of approach broadcasting receiver degree of approach The process flow diagram flow chart of the embodiment method of the message of the configuration data of the associated equipment of wireless identity emitter.
Figure 32 C show to receive to authorize from user for central server to be had to send to degree of approach broadcasting receiver The process flow diagram flow chart of the embodiment method of the message of identification information.
Figure 32 D show the enforcement that extra authentication information is asked from degree of approach broadcasting receiver for central server The process flow diagram flow chart of example method.
Figure 33 is the block component diagram of the wireless identity emitter according to each embodiment.
Figure 34 applies to the block component diagram of the mobile device for using in various embodiments.
Figure 35 applies to the block component diagram of the server apparatus for using in various embodiments.
Specific embodiment
Will be described in detail with reference to the accompanying drawings each embodiment.In any possible place, will be joined using identical throughout accompanying drawing Examine mark to refer to same or similar part.The reference of particular example and implementation is for illustrative purposes, and not It is intended to limit the scope of the present invention or claim.
Word " exemplary " used herein means " as an example, example or explanation ".Here depicted as " example Any implementation of property " is not necessarily to be construed as being preferable over other implementations or more advantageous than other implementations.
Term " mobile device " is used to refer to any one or whole in the following herein:Cell phone, intelligence Energy phone is (for example,), upper web plate, tablet computer, the cell phone with internet function, with WiFi work( Can electronic equipment, personal digital assistant (PDA), laptop computer, personal computer and be equipped with short-distance wireless list Unit is (for example,Radio-cell,Radio-cell, WiFi radio-cells etc.) and/or wide area network connection is (for example, LTE, 3G or 4G wireless wide area network transceiver or the wired connection to internet) similar electronic equipment.By certain types of meter Calculation equipment is cited as mobile device and is not intended to limit the scope of claim, unless described in the claims certain types of Mobile device.
Term " broadcast " is used to refer to by the short distance of (defined below) wireless identity transmitter broadcasts herein From radio broadcasting signal, it can include the identifier being associated with wireless identity emitter and/or its user.Such mark Symbol can regularly be changed with it is encrypted, be encoded or be otherwise blurred (that is, roll identifier).In each enforcement In example, broadcast can include other identification informations, such asMedia access control (MAC) address and random number or meter Device is calculated, it can also be encrypted.In addition, broadcast can include metadata and other data, such as send wireless identity and send out Penetrate characteristic (for example, device type), sensing data, and/or the order or other instructions of machine.In various embodiments, broadcast Message can be via wireless communication protocol (such asLow energy, WiFi, WiFi be direct-connected, With other RF agreements) come what is sent.In various embodiments, due to the high unreliability of some short-distance transmission channels, extensively Broadcasting message can be limited to single packet transmission of certain size (for example, 80 bits, 10 bytes, 20 bytes etc.). For example, the payload of embodiment broadcast can be 80 bits altogether, including indicate 4 bits of battery status information With 76 bits for indicating to roll identifier.Another example is lifted, embodiment broadcast can be included for representing random number Or counter 20 bits and roll identifier (such as generating using pseudo-random function or AES) for representing 60 bits.
Term " wireless identity emitter " is used to refer to be configured to determine via short-distance wireless emitter herein The compact apparatus of phase ground transmission broadcast.Wireless identity emitter can be mobile, such as when by mobile people or item When mesh carries or depend on mobile people or project, or can be alternatively static, such as when being installed in building.Nothing Line identity emitter can store unique device identifier (that is, " deviceID (device id) ") (such as factory ID) or with its phase Association.Individual in one embodiment, unique device identifier can be the code that length is 56 bits.In each embodiment In, for safety purposes, when the unique device identifier is together with other data (for example, random number or Counter Value) conducts When " rolling identifier " is included in broadcast, it can be encoded, encrypted or be otherwise blurred.Wireless body Part emitter can be configured to such as carry out maintenance time (for example, as clock by using 30ppm 16kHz crystal oscillators UTC) information.Specific components and requirement possibly pin-point accuracy of such ability of clocking according to given wireless identity emitter Or may not be pin-point accuracy.In one embodiment, wireless identity emitter can in mobile device or can be Mobile device, or alternatively, the operation similar with the operation of wireless identity emitter can be performed by mobile device.Example Such as, smart phone can perform software, and the smart phone is configured to utilize it by the softwareRadio-cell is sending bag Include the broadcast of safe unique identifier.Wireless identity emitter is described in further detail below with reference to Figure 33.In this public affairs In opening each accompanying drawing and figure of content, wireless identity emitter can be referred to as " WIT ".
Term " degree of approach broadcasting receiver " is used to refer to herein to be configured to receive such as to be launched by wireless identity The equipment of the broadcast that machine sends.In various embodiments, degree of approach broadcasting receiver can be permanently placed at time And the static equipment (or " static degree of approach broadcasting receiver ") at each place (for example, building, retail shop etc.) place, or substitute Mobile device that ground can be configured as being operated as degree of approach broadcasting receiver (or " degree of moving closer to broadcast reception Machine ").For example, smart phone can be configured to receive broadcast and as degree of moving closer to broadcasting receiver operating. In various embodiments, degree of approach broadcasting receiver (for example, smart phone degree of moving closer to broadcasting receiver etc.) can be matched somebody with somebody It is equipped with the application that user can download or can be incorporated into by the manufacturer of equipment in equipment.Using the popularization of smart phone, lead to Cross using such application to configure many mobile devices, little cost or cost free can be spent come dispose the degree of approach broadcast The widely distributed network of receiver.Furthermore, it is possible to dispose static degree of approach broadcast in each place (such as throughout retail shop) Receiver is supplementing the network of smart phone.For example, degree of approach broadcasting receiver by chance (can such as be sold positioned at a certain place The merchandise display area in shop), in the presumptive area in the place or be otherwise positioned within the place presumptive area be close to In degree.Certain types of computing device is cited as into degree of approach broadcasting receiver to be not intended to limit the scope of claim, unless Certain types of equipment is described in the claims.Additionally, unless otherwise indicated, broadcasting the degree of approach throughout present disclosure The reference of receiver is not intended to for any method or system to be limited to certain types of degree of approach broadcast receiver device (for example, It is wireless or static).Degree of approach broadcasting receiver is described in more detail below.Present disclosure each accompanying drawing and In figure, degree of approach broadcasting receiver can be referred to as " PBR ", and degree of moving closer to broadcasting receiver can be claimed in the accompanying drawings For " MPBR ".
Term " identity transceiver " and " wireless identity transceiver " are used to refer to be configured to receive and transmit herein The equipment of broadcast.In other words, identity transceiver can come as both degree of approach broadcasting receiver and identity emitter Work.For example, smart phone can be configured to broadcast the short-range signal that includes its unique identifier and from neighbouring Wireless identity emitter receives broadcast.Throughout present disclosure, each operation can be described as significantly by wireless body Part emitter or degree of approach broadcasting receiver performing, however, skilled artisan recognize that, be configured as Identity transceiver can be configured to perform any or all operation in same operation the equipment that operates, and therefore with regard to Wireless identity emitter or degree of approach broadcasting receiver can be interchangeable.
Term " aiming message " is used to refer to by degree of approach broadcasting receiver in response to launching from wireless identity herein Machine receives broadcast to be sent to report, signal and/or the message of central server.It can include being encoded to aim at message Information in the broadcast for receiving (it is blurred and encrypted information including any, such as wireless identity emitter Identifier) in some or all information transmission.In addition, aiming at message can include that metadata and other information are (or " related The data of connection "), such as send the identification information (for example, device id, third-party relationships etc.) of degree of approach broadcasting receiver, be close to Whether degree broadcasting receiver (for example, aims at message with report with the pairing of wireless identity emitter, transmission contextual information for instruction The related code of alert or chartered service), with regard to the information (example of the software that performs on degree of approach broadcasting receiver or application Such as, app ID), positional information, with regard to the degree of approach information and time stamp data of the known region in a certain place.At one In embodiment, aiming at message can also include authentication information (for example, key, the pass, special code, digital certificate etc.), its Can be used for confirming the mark (or identification information) of the degree of approach broadcasting receiver that transmission aims at message by central server.Example Such as, aiming message can include the code from hash function, and it can be decoded to guarantee to send the degree of approach by central server Broadcasting receiver is associated with specific registration service.In various embodiments, aiming at message can receive broadcast (example Such as, when related to warning) sent immediately, be buffered or be scheduled together with other scheduled transmission afterwards.
Term " license " and " license is arranged " are used to refer to the user for indicating with central server registration herein Central server and each side (such as businessman, retailer and be associated other sides of (or registration) with central server) is authorized to be total to Enjoy the information of its identification information (for example, its identity, with regard to the information etc. of its equipment) or the condition of other related user data. When customer registers wireless identity emitter and/or during degree of moving closer to broadcasting receiver to central server, customer can arrange, There is provided or otherwise indicate license.Central server can check storage with user-dependent license and with other sides Related profile information, to determine whether the message of data of shared user is authorized by user.For example, central server can be by Characteristic or attribute in first stored profile is compared with the license in the second profile, to determine whether and be associated with first The collaborative share of profile is associated with the Uniform Resource Identifier (URI) of the second profile (or the equipment indicated by the second profile).Change Sentence is talked about, if user has been provided for identification information or other sensitivities for allowing to have the stored profile from register user The license of the message of information, then central server can only send such message.
Term " registration service " can be used for referring to herein chartered, certified, effective or with other sides Formula known to central server and can to aim at the related user of message, a side or service.For example, registration service can be wrapped Include businessman, retailer, service, shop (for example, huge retailer, local cafe etc.) and with central server registration it is each Plant other third parties.Another example is lifted, registration service can have registered degree of approach broadcast reception with warp-wise central server The developer user of machine is corresponding.In certain embodiments, registration service can also be included by known to central server is managed Routine, action or service, it is such as specific to search for or enliven alarm, or alternatively include that what is can performed on the mobile apparatus answers With (for example, third party app).In certain embodiments, using in response to from other wireless identity emitters (for example, businessman Static identity emitter in retail shop) receive broadcast to send the note of the degree of approach broadcasting receiver for aiming at message Volume user (for example, user) can also be considered registration service by central server.
Each embodiment can be connect using one or more wireless identity emitters, one or more degree of approach broadcast are included The system of receipts machine and central server.As described above, wireless identity emitter can be compact apparatus, its be configured to Can by short-distance wireless broadcast in the range of the form that receives of any degree of approach broadcasting receiver sending with safety post Know the packet of code (that is, rolling identifier).Because wireless identity emitter relies on the wireless signaling of relatively short distance (for example, short Range radio signals,RF、WiFi、Low energy signal, optical signal, acoustical signal etc.) come Transmission includes the broadcast of its identifier, therefore the degree of approach broadcasting receiver only in the degree of approach of emitter can receive this The broadcast of sample.Therefore, degree of approach broadcasting receiver can provide wireless identity in the position of oneself when broadcast is received The approximate location of emitter.Wireless identity emitter can be by each side (the such as individual consumer, government registered with central server Mechanism, businessman, retailer, shop etc.) deployment.In one embodiment, the broadcasting area of wireless identity emitter can be from three Foot is smaller to 100 feet, while in building (such as retail shop).
Each can such as by sending from the degree of approach broadcasting receiver that wireless identity emitter receives broadcast Including the aiming message of the rolling identifier of wireless identity emitter, to central server transmission information for process.Connect Recency broadcasting receiver is sent to the aiming message of central server can be included being coded in from immediate wireless identity sending out The information penetrated in the broadcast of machine reception (including any rolling related to wireless identity emitter, is blurred or encrypted Information) in some or all information.Aiming at message can include metadata, header information or for indicating various number of reports According to other coding.For example, aim at message can include be directed to particular registered user code metadata, and therefore Can indicate that the aiming message is sent by the degree of approach broadcasting receiver in the place being associated with the register user.Lift another One example, aiming message can include the metadata of the code of the smart phone for instruction user, and therefore connect Recency broadcasting receiver can be belonging to degree of the moving closer to broadcasting receiver of the user.In alternate embodiments, centre sets Standby (such as local router, server or other computing devices) can be received from degree of approach broadcasting receiver and aim at message, and And can be then by each aiming message transmission to central server.
When aiming message is received, central server can be decoded, decrypts or otherwise accessed and aim in message Fuzzy message (for example, roll identifier).For example, central server can decode the broadcast in aiming message and make The user being associated with broadcast is recognized with the data of registration database memory storage.Based on the degree of approach for sending aiming message The position of broadcasting receiver, central server can determine the degree of approach of the broadcast of correlation or approximately spend.For example, by In sending the static degree of approach broadcasting receiver for aiming at message when broadcast is received in the wireless identity emitter of user In the degree of approach, therefore central server can determine that the wireless identity emitter of user disappears in the aiming of degree of approach broadcasting receiver Known to indicate in breath or central server (in the case of fixed degree of approach broadcasting receiver) gps coordinate some English In chi.Central server can be configured to respond to receive and process aiming message to perform various operations.For example, central authorities' clothes Business device can be to various equipment (the such as desktop PC, meter on knee being associated with the user of degree of approach broadcasting receiver Calculation machine, smart phone, tablet computer etc.) send return message.
Using above-mentioned framework, each embodiment is provided and arranged and wireless identity emitter for degree of approach broadcasting receiver The system of associated equipment, equipment, non-transitory processor readable storage medium and method.In various embodiments, wirelessly Identity emitter can couple with equipment (herein referred to as " target device "), be included equipment in, be integrated in equipment, And/or be otherwise associated with equipment.Target device can be household electrical appliances, WiFi routers or the use that can be directed to user Other similar devices being set.For example, Wi-Fi routers can include be configured to perform wireless identity emitter except with The processor and other components of the operation outside other related operations of Wi-Fi networkings.Lift another example, wireless identity transmitting Machine can be attached to the shell of refrigerator.
Neighbouring degree of moving closer to broadcasting receiver (for example, is configured to be grasped as degree of moving closer to broadcasting receiver Smart phone of work etc.) rolling identifier or other safety codes can be received in the signal by wireless identity transmitter broadcasts. Degree of approach broadcasting receiver such as can come to send aiming message to central server via cellular connection or WiFi network, and this is taken aim at Quasi- message includes the identifier and other data (for example, positional information, receiver ID etc.) from the broadcast singal for receiving.
Message is aimed in response to receiving, central server can decode relayed identifier (its from the aiming message It is can roll identifier, as described below) to recognize wireless identity emitter, and can be based on the data that aim in message come Identification degree of approach broadcasting receiver, the information in the header portion of identification message etc..Central server can be by equipment Identifier is matched with the stored profile of registration side or is otherwise associated.For example, central server can be by It is configured to determine degree of approach broadcasting receiver and the first register user, service or a side (for example, retail shop etc.) correlation and nothing Line identity emitter is related with another register user, service or a side (for example, house-owner user).Can be wireless with what is recognized Target device in the associated stored information of identity emitter.For example, profile can be with target device (for example, road By device) possessed by the owner of wireless identity emitter.
Used as further instruction, degree of the moving closer to broadcasting receiver carried by the user for paying a call on a friend (for example, is matched somebody with somebody The smart phone for being set to as degree of approach broadcasting receiver to operate) from the household electrical appliances top in the friend family or can be wrapped Include the wireless identity emitter in household electrical appliances and receive and there is the broadcast for rolling identifier, and therefore can be to central service Device sends and aims at message.When aiming message is received, central server can be based on the Jing corresponding with identifier is rolled and deposit Storage profile belongs to the friend determining wireless identity emitter, and based on the degree of approach included in the metadata in aiming information The identifier of broadcasting receiver is associated determining degree of moving closer to broadcasting receiver with the stored profile of user.Based on rolling The associated stored profile of dynamic identifier, central server can also recognize that household electrical appliances are associated (example with wireless identity emitter Such as, both possessed by the friend).
Based on degree of approach broadcasting receiver and the mark of the wireless identity emitter being associated with target device, central service Device can perform the lookup to stored data (for example, profile information) the to determine whether there is target device and degree of approach The related any ability of broadcasting receiver.Specifically, central server can be identified sets degree of approach broadcasting receiver Put or function (for example, application, configuration etc.) that otherwise possibility of access target equipment needs.Central server can be known Other degree of approach broadcasting receiver may need the application (also referred to as " application finds ") of download for access target equipment.Central authorities It is any based on the mandate of user, license or rule control letter to recognize that server can also carry out the lookup to stored data Cease to access degree of approach broadcasting receiver and/or access target equipment.Such license (for example, approved or known intelligence The identifier list of phone) can be by particular device manufacturer or Platform Type, user identity, classification and/or qualified The personnel of access target equipment are defined to guarantee anonymity and the control to target device.
According to stored information, when degree of approach broadcasting receiver (or its identity) is authorized to be receive information, central authorities' clothes Business device can send return message, and the return message includes being authorized to be the information shared with degree of approach broadcasting receiver.Each In individual embodiment, returning message can be included for downloading the software (for example, application or " app ") for access target equipment Link (or URI).Such information can be based on degree of approach broadcasting receiver platform and/or other abilities, such as its Operating system or hardware specification.For example, returning message can be included for downloading the URI that Android or iOS are applied in app shops.
Additionally, based on stored mandate or rule, central server can be sent for degree of approach broadcasting receiver such as The voucher (for example, password etc.) of target device is accessed via related app.Voucher can be time-based (for example, certain Expire after the time of amount), based on (for example, the expiring when degree of approach broadcasting receiver goes beyond the scope) of the degree of approach, based on visit Receive customers several (for example, expire after a number of access), and/or permanent (for example expiring when, only in revocation).Example Such as, voucher can be provided, so that the access to target device is broadcasted after a certain amount of time and/or in response to the degree of approach The geo-fence (for example, outside house) that receiver is left around predefined region is automatically withdrawn.In various embodiments, Voucher can on the target device locally, by the computing device (for example, smart phone) from owner order, and/or by Central server is revoked by internet via message (when target device is connected to internet).In certain embodiments, Mandate can (what is indicated in such as contact list (for example, address book on smart phone etc.) be all to a group of people or equipment Personnel and/or equipment) permit access credentials.
In various embodiments, central server (such as be able to will be installed with sending data to degree of approach broadcasting receiver Configuration data or updated information on equipment), the data can be passed down or be otherwise used for behaviour then Marking device look as far as one's eyes can see without many user mutuals.For example, configuration data can include firmware renewal, script or set for target Other useful datas of standby operation.In this way, degree of approach broadcasting receiver can serve as the agency of central server, its to The equipment sending data that otherwise can not be communicated with central server.
Used as explanation, the degree of approach identity emitter that the smart phone of guest can be from neighbouring thermostat receives broadcast simultaneously And by this broadcast in identifier aim at message in relay to central server.The server for receiving aiming message can determine The stored profile being associated with sender unit identification symbol indicates that guest is authorized to be with the limited access to thermostat.As Response, central server can send the URI for downloading for controlling the app of thermostat to smart phone.Smart phone can To show inquiry guest, whether he/her is ready to install the prompting of app.Agree in response to guest, smart phone can be using URI certainly App is downloaded dynamicly and app is installed.As a part for the process, smart phone can automatically and safely by its from Oneself is configured to be used together relevant information from server, such as Wi-Fi network voucher, user account information, language with app With usability preferences etc., so that it can control thermostat.For example, after installing and running app, smart phone can be with Allow to enter the temperature adjustment that trip temperature shows and is limited by LAN (LAN) using voucher.Another example is lifted, is being installed And after running app, smart phone can allow temperature to adjust using voucher, such as by activation cooling routine.Central authorities Server can be so that via smart phone, to thermostat send configuration data, (for example, two enter such as encrypted payload System, script, configuration routine etc.).
Used as another explanation, the smart phone of house-owner can be via being downloaded based on the URI sent by server App is relaying the broadcast of the WiFi routers from new purchase and perform authenticating step.WiFi routers can be via intelligence Phone to server sends credential information, and used as return, the smart phone can send back the WiFi configurations of the pre-stored of house-owner Data (for example, device name, SSID, password, DNS are arranged, IP is arranged etc.).Receive in response to the smart phone from guest and aim at Message, server can determine that smart phone is authorized to be on access LAN and/or LAN based on stored profile data Particular device.Server can send the voucher for accessing LAN then to smart phone.
Central server can be based on aim at message in data (such as with central server on profile memory storage body The device identifier that matches of part) carry out the identity of certification degree of approach broadcasting receiver.However, identification information can be released to Before degree of approach broadcasting receiver, the user of certification degree of approach broadcasting receiver may be also needed to, this is because different users The equipment may be occupied.Therefore, in various embodiments, Double Factor Authentication Technology can be provided, with by otherwise awarding Jing The identification information of power is delivered to transmission certification message before degree of approach broadcasting receiver, carrys out the use of certification degree of approach broadcasting receiver Family.For example, determine that degree of approach broadcasting receiver is known (that is, being instructed in user profiles) in response to central server, Central server can send following prompting:The active user for making degree of approach broadcasting receiver is receiving attached for automatically logging in Before the voucher of near WiFi routers, input personal identification number (PIN) or touch fingerprint sensor are his/her to determine Identity.
In various embodiments, central server can be configured to the aiming message based on receiving various has to generate With data, such as analysis, statistics, trend and other measurement results.For example, based on from smart phone degree of moving closer to broadcast reception The aiming message that machine is received, central server can track smart phone (and therefore its user) with the time to target device Frequency and the analysis of length of the degree of approach and structure of (for example, household electrical appliances) to the degree of approach to the target device.It is such to have Whom is determined for more frequently using target device and can how frequently using the equipment with data, this with how It is similar using cookies (information record program) in the browser application of computing device.Additionally, such useful data is for It is possibly valuable for tripartite (such as retailer or other companies related to consumer), this is because these data can For improving Consumer's Experience.For example, if useful data instruction user possesses the smart phone of particular brand and positioned at same Near another equipment of one brand, then central server can send message, and the message indicates to the user that setting for same brand It is standby using software is similar to and/or can be applied in combination.
In various embodiments, degree of approach broadcasting receiver can be display configured to in preset time in the degree of approach The relevant function (for example, software, app etc.) of target device.For example, degree of approach broadcasting receiver can be wide based on what is received Broadcast message to render the display of all applications (or app) that can be loaded or run, to access the target being confirmed as nearby Equipment.The function being displayed can provide the Consumer's Experience of improvement, this is because there may be a large amount of degree of approach broadcast connecing The application that receipts machine may have been arranged with the time, and only will can reduce user's access using the target device near presenting to and exist The time quantum that preset time nigh target device may spend.
In certain embodiments, central server can send mandate and disappear to the equipment that the owner with target device is associated Breath, to ask owner to ratify to send voucher to degree of approach broadcasting receiver.For example, click on his smart phone in response to guest The Wi-Fi network listed, dialog box can be presented on the tablet computer of house-owner, and dialog box prompting house-owner clicks on ' being ' Automatically to the smart phone of guest to provide the appropriate voucher for logging in Wi-Fi network.
Used as explanation, house can include WiFi access points (for example, router), and it may be coupled to wireless identity transmitting Machine or including wireless identity emitter.Her smart phone can be taken in the broadcasting area of access point and receive wide by guest Broadcast message.Smart phone can be relayed to via the identifier that cellular network connection includes broadcast as message is aimed at Central server.Such aiming message can also include various information (for example, device id, the Zhu Renming with regard to smart phone Word etc.) and current location (for example, gps coordinate etc.).Central server can determine smart phone and exist based on message is aimed at In house and in the degree of approach of access point, and central server can be based on it is related to both access point and smart phone Connection stored profile data come determine smart phone be authorized to be receive for from Android app shop, for accessing The URI of the application of access point.Central server can send URI to smart phone.When URI is received, smart phone can be with Prompting guest installs app, and after mounting, can automatically run app.Smart phone can be configured to from central authorities' clothes Business device is automatically asked such voucher or can alternatively point out guest's request for the access credentials of access point.Central authorities' clothes Business device can receive request, and as response, can send for guest to the tablet computer equipment that house-owner is used Smart phone be able to access that the authorization requests of access point.Tablet computer equipment can point out house-owner to allow or refusal is directed to The mandate of the smart phone of guest.Such mandate can be for various types of access credentials, such as time-based (example Such as, expire after the predetermined time period), it is location-based, permanent, based on access etc..In response to from the flat of owner Board type computer equipment is received and authorized (or authorizing approval), and central server can send voucher to permit to the smart phone of guest Perhaps LAN and internet are accessed via access point, wherein, voucher can be configured so that based on time-out, when smart phone exceeds Expire during scope, and/or when smart phone is alreadyd exceed to the access of the predefined quantity of access point.
Each embodiment is provided for providing for being arranged based on the context-aware of the degree of approach and equipment and with it The unique technology of the sensitive information of its mode access target equipment.Because the technology is using in response to receiving relay message come right The central server that Predefined information (for example, the stored profile of register user) is estimated is recognizing any Jing to be distributed Authorization data, degree of approach broadcasting receiver can be received for obtaining based on the predefined characteristic of its (or its user) and relation Take personalized voucher and/or the instruction of appropriate software.In other words, each user and/or degree of approach broadcasting receiver can To come to receive different information from central server from the secure identifier of wireless identity emitter in response to relaying, therefore enable Enough realize different app, access rights and experience.For example, guest can receive the interim visit to the WiFi routers in house Ask authority;However, house-owner can receive the completely administrator access to WiFi routers.Another example is lifted, no matter Neighbouring household electrical appliances from the first apartment unit receive broadcast, and the stranger in the second adjacent apartment unit may not It is directed to download the app for controlling the household electrical appliances.
In various embodiments, wireless identity emitter can be configured to be periodically generated new mark data and (be claimed To roll identifier), the new mark data can be decoded to show uniquely setting for wireless identity emitter by central server Standby identifier and other identification informations.For example, wireless identity emitter can be configured to regularly broadcastPacket, its Including the warp knit code version of the device identifier (that is, deviceID) of wireless identity emitter.Broadcast middle finger may be needed The identifier for showing be encrypted in such a way that central server can reliably recognize send broadcast wireless identity emitter, Force third party (for example, passive attack person) that the origin of broadcast is determined by guessing simultaneously.For example, if identifier is Static, then third party such as by pretending to be degree of approach broadcasting receiver come sniff to the identifier, and can subsequently use The identifier is tracking wireless identity emitter.If third party rolls not used for the unit for generating encrypted identifier Identifier can make this attack become impossible.
Due to the cryptogram of the asymmetric-key encryption that single multicasting message may not be supported can be adapted to conventional Payload, therefore in various embodiments, the private/public key of standard is possibly disabled to encrypting.In addition, wireless body Part emitter is typically only broadcasting equipment, therefore there is no the backward channel for generally needing in conventional encipherment scheme.Therefore, In various embodiments, central server can be unique common by pre-setting for each wireless identity emitter Enjoy key to process encrypted message.At central server, such key can be with each wireless identity emitter only One device identifier is associated and can be used for entering the data (for example, identifier) by each wireless identity transmitter coding Row decoding.
A kind of embodiment method is performed, wireless identity emitter can use the AES (example similar to stream transmission Such as, AES-CTR) being encrypted to its device identifier, shared key and random number or counter, broadcast includes encrypted Data and unencrypted random number or counter payload.Perform another kind of embodiment method, wireless identity transmitting Machine can be encrypted using pseudo-random function to device identifier, shared key and random number or counter, broadcast packet Include encrypted data and do not include the payload of unencrypted random number or counter.Another kind of embodiment method is performed, Wireless identity emitter can use similar to the encryption of stream transmission and the combination of pseudo-random function encryption to generate for wide The payload broadcast.In one embodiment, wireless identity emitter and central server can have and be used for when common The PRNG or algorithm of safety on password for generating identifier is put on, so that in any given time, central authorities Server can calculate the identifier that specific wireless identity emitter is sending.
In various embodiments, wireless identity emitter can safeguard the process regularly increased to represent the time and can With random number or counter (or clock data) in each AES.When wireless identity emitter is powered (or battery Changed) when, random number or counter can be configured so that known initial value, such as 0.As wireless identity emitter is transported OK, one) random number or counter can regularly increase (for example, increases per some seconds/minute/hour.If wireless identity is sent out Opportunity is penetrated to inconsistent power (for example, battery is taken out or changed), then random number or counter can reset.Using so Random number or counter, wireless identity emitter can be configured to regularly broadcast disappearing with encrypted payload Breath, wherein encrypted payload includes change and encrypted device identification.In one embodiment, it is encrypted effective Load can include equipment unique identifier (that is, deviceID) with for the wireless identity emitter current random number or The cascade of Counter Value.In one embodiment, wireless identity emitter can be encrypted using key to cascade data. Payload can be broadcasted with different frequencies and can be received to enter by degree of approach broadcasting receiver or central processing unit Row is processed.
In one embodiment, central server can be by by the encrypted payload for receiving and corresponding to Jing The payload (or model payload) for previously generating of the wireless identity emitter of registration is matched to recognize wireless body Part emitter.The information obtained during based on the registration operation between central server and wireless identity emitter, central authorities' clothes Business device can store the unique information with regard to each wireless identity emitter.For example, central server can be with based on log-on message Know key, device identifier (or deviceID) and random number or the Counter Value of wireless identity emitter.Using so Stored information, central server can generate wireless identity emitter and be expected to (or may) in a time period (such as 24 The hour period) a series of interior model payload broadcasted.If in central server reception and these model payload The payload that any model payload matches, then central server can determine the identity for originating wireless identity emitter And not strict accurately (loosely-accurate) random number or the Counter Value in wireless identity emitter.Model is effective Load can be generating based on the random number or counter of the current sync for each chartered wireless identity emitter (that is, "current" model payload).In one embodiment, central server can also pass through to keep model payload Window come adjust wireless identity transmitter clock skew.For example, central server can using representing in desired random number or The random number or Counter Value of the time before and after counter is generating payload.Central server can also be by prison The payload that receives of survey is over time determining cycle of wireless identity transmitter clock.In one embodiment, Central server can track wireless identity emitter it is reported that random number or Counter Value change, and can report How inaccurate equipment clock be in special time period.
Model payload can also be based on each chartered wireless identity emitter report during registering at the beginning of Beginning random number or Counter Value are come (that is, the initial model payload) that generate.Lead to when the power-off of wireless identity emitter and again (for example, rest, change battery etc.) when electric, wireless identity emitter can reset to original or initial random number or counter Value.If the encrypted payload received at central server is not matched that with any "current" model payload, Central server can be compared the encrypted payload for receiving with stored initial model payload.When Initial model payload (for example, the wireless body that central server finds and the encrypted payload that receives matches Part emitter is reset) when, central server can update the data storehouse to indicate the random number of corresponding wireless identity emitter Or counter is reset, therefore re-synchronization is carried out with the clock of the wireless identity emitter for resetting.
Wherein wireless identity emitter suspends a period of time but not resetting it is used to generate encrypted effective load In the random number of lotus or the situation of counter, the payload that wireless identity emitter is subsequently generated may with central server in The expectation payload of storage is not matched that (for example, "current" model payload and initial model payload).In order to solve This situation, when model payload and/or random number or Counter Value and the encrypted payload for receiving not phase Timing, central server can determine and there occurs time-out.Central server can be by owning that execution is represented in database The brute-force search of known and/or chartered wireless identity emitter recognizing wireless identity emitter, and based on recorded Key and device identification decoding to the encrypted payload for receiving.In one embodiment, brute-force search Can only include not broadcasting the wireless identity emitter of the payload that central server is received recently.
For the purpose of present disclosure, for decoding, decrypting and otherwise accessing the identification information being blurred The various embodiment methods of (for example, roll identifier) are described as being performed with by such information and registration by central server User and/or registration equipment are associated.However, skilled artisan recognize that, with any calculating for authorizing Equipment can be configured to perform such operation to decrypt by the identification information being blurred of wireless identity transmitter broadcasts.Example Such as, degree of the moving closer to broadcasting receiver (for example, smart phone) that user uses can be decrypted using various methods, decode with And otherwise access the rolling identifier that the wireless identity emitter that possessed with the user is associated.
For defence security breach, (hacker of the such as pair database being associated with central server attacks for extra prevention Hit) and feel at ease and confidence to what register user (for example, businessman, father and mother, children etc.) provided that its privacy can be fully protected For be probably it is important.Can by by identification information (for example, name, address, financial information, medical information etc.) and with Track equipment what/or the related other information of degree of approach information of user be stored separately, to each side with embodiment system registry Such secret protection is provided.Specifically, in order to avoid the nothing of the personal information to registering businessman, customer, children or individuality Meaning leakage, embodiment system can utilize " double blinding (double-blind) " framework.This can be single using first with double blinding framework Unit's (for example, server, database or other calculating hubs), the first module is stored and with to setting with register user The degree of approach information of standby (for example, wireless identity emitter, degree of approach broadcasting receiver, identity transceiver, mobile device etc.) or The access of the related information of other location-based data.In other words, first module can access and various users are set The information that the aiming message that standby approximate location/degree of approach is indicated is associated.However, first module can not be stored uniquely Ground mark personal information, such as user name, address and/or SSN.Alternatively, second unit can store mark People's information and be not adapted to access any position/degree of approach information for being used of first module.Unit first and second can be with Using anonymous identifier, the Jing that it can connect the data being stored in two units and not indicate to be stored in any cell is protected The information of shield.In one embodiment, Unit first and second can be tieed up by single entity (for example, ISP) Shield, and further, at least one of such entity entity can be provided the register user of identification information and trust.
Each embodiment can utilize the Large Infrastructure Projects of the mobile device for having existed.Many modern mobile devices (such as smart phone) has been equipped with multiple radio-cells, including short-distance wireless unit is (such asRadio-cell), And therefore can be configured to perform as degree of moving closer to broadcasting receiver and from the transmitting of immediate wireless identity Machine receives identification code.For example, carry and be configured to be grasped as degree of moving closer to broadcasting receiver (or mobile identity transceiver) The customer of the smart phone of work can be from retail shop wireless identity emitter receive broadcast.Mobile device also Jing is often filled Clock and GPS are had, wherein whenever wireless identity sender unit identification symbol is received, clock can provide current time And GPS can provide current location.Mobile device can pass through more remote network connection (such as cellular radio Connection), send these identification codes, time and position to central server via message is aimed at.Therefore, using or be Many mobile devices in a large amount of mobile devices for being used can be merged in expand as degree of moving closer to broadcasting receiver Open up the scope of various embodiment systems.
By the long range radio-cell by degree of approach broadcasting receiver and other services come to central server report The position of the broadcast (or " aiming ") for receiving and time, wireless identity emitter can be it is smaller, not expensive and Easy equipment, it only includes short-distance wireless unit, such asLE transceivers and battery.In various embodiments, nothing Line identity emitter can also include extra short-distance wireless unit, such asRadio-cell.In each embodiment In, wireless identity emitter can not include user interface, multiple radio-cells, global positioning system (GPS) receiver or shifting Other common functions on dynamic equipment.Embodiment wireless identity emitter can also consume considerably less power, thus allow it Need not be frequently recharged or be deployed in the case of replacing.It is extensive various that these characteristics are ideally used to them Using with various physical configurations in realization.For example, wireless identity emitter can easily be hidden or is incorporated into many not In same personal object, button, wrist-watch, footwear, briefcase, both shoulders bag, ID badges, clothes, product packaging etc..
In a further embodiment, wireless identity emitter and degree of approach broadcasting receiver can be configured with respectively Plant wireless technology (LTE-D, WiFi and WiFi are direct-connected for such as LTE-D, equity) to exchange transmission.In one embodiment, wirelessly Identity emitter can be configured to carry out broadcast via WiFi radio-cells, so that the degree of approach with WiFi transceiver Broadcasting receiver can receive broadcast.In such embodiments, it is similar with broadcast WiFi access point broadcasting announcements, wirelessly Identity emitter can be transmitted come broadcast identification information using WiFi.For example, including WiFi radio-cells wireless identity send out The machine of penetrating can be configured to send broadcast via transmitting with lower powered WiFi, so that range of receiving is limited, Thus provide withThe short range, wireless signals of the similar scope of scope of LE transmission.Sending out with wireless identity Machine is penetrated together using various wireless broadcast technologies and during communication protocol, the degree of approach broadcasting receiver with limited capability still can It is enough to receive and process the broadcast from wireless identity emitter.For example, it is configured to as degree of moving closer to broadcast reception Machine is operated and including WiFi transceiver but not includedThe smart phone of LE radio-cells can receive and process from It is configured to, with WiFi radio-cells to broadcast the broadcast of the wireless identity emitter of short-range signal.In an enforcement In example, wireless identity emitter can be by multiple radio-cells (such asLE transceivers and low-power WiFi transceiver) To be broadcasted, so that the degree of approach broadcasting receiver (for example, further types of smart phone) for making more polytypic can be received Aim at relaying.
Throughout present disclosure, wireless identity emitter and degree of approach broadcasting receiver are described as exchange and include short distance RF signals are (such asLow energy, Peanut, Zigbee etc.) short range, wireless signals.However, this short Short distance RF signals are not only restricted to apart from wireless signal, and wireless identity emitter can use the wireless signal of other forms (such as infrared light, visible ray, vibration, heat, can not listening and sub-audible sound and radio frequency (RF) signal and non-RF signals Combination) carry out broadcast.For example, wireless identity emitter can use infrarede emitting diode or be capable of emitting infrared radiation Other components are launching thermal signal (such as infrared light).In addition, wireless identity emitter can be using vibrating motor and can giving birth to Launch vibration signal into the other machinery component of controlled vibration.Wireless identity emitter can be with from multiple common emitters (such as light emitting diode, incandescent lamp and projecting apparatus) launches optical signal.Optical signal can be on degree of being approached broadcasting receiver light Sensor (for example, camera) is received, and can include vision, such as light, color and image (for example, picture, project, regard Frequently, symbol etc.).Wireless identity emitter can with or alternatively from loudspeaker (for example, piezoelectric speaker) launch audible or not Audible (that is, infrasonic sound or ultrasound) voice signal.Voice signal can the microphone of degree of being approached broadcasting receiver receive, and can With including muli-sounds, such as beeping sound, voice, noise, click sound, ultrasound, tone and note.
Wireless identity emitter can be configured to come with specific sequence, pattern, mode, duration or the form of expression Various short range, wireless signals are broadcasted, so that degree of approach broadcasting receiver can be with RF signals (for example,LE believes Number) embodiment described herein in the similar mode of the mode how to be explained converting the signal into data.For example, nothing Line identity emitter can broadcast specific modulation visible signal or voice signal (such as different note string, the images of change Or passage of scintillation light) sequence, degree of approach broadcasting receiver can with these signal sequences and convert thereof into including wireless identity transmitting The data of the identity of machine.In one embodiment, degree of approach broadcasting receiver can be based on signal sequence and predefined association Such wireless signal is converted into data (vice versa) by the patterns match in view.Lift an illustrated examples, attachment Wireless identity emitter outside children clothes can regularly launch flash of light sequence using embedded light sources (for example, LED) Row, the flashing sequence can degree of being approached broadcasting receiver receive, be converted into data and relay to central server for It is determined that the identification information relevant with the children.Another example is lifted, the wireless identity emitter in shop can be installed in day Flashing sequence can be launched on card and regularly using embedded light sources, the flashing sequence can degree of being approached broadcast connect Receipts machine receives, is converted into data and relays to central server to obtain reward voucher, notice or customer (on condition that having and customer The motivation of association).
Each embodiment is described as including wide in wireless identity emitter, the degree of approach for providing in present disclosure Broadcast profit of the receiver (for example, degree of moving closer to broadcasting receiver and static degree of approach broadcasting receiver) and central server between (such as utilized with short distance messagingLE signals) intermediate communication communication system, the short distance messaging It is based only upon signal to receive to realize proximity detection.However, each embodiment is not only restricted to described communication system and method, And other communication systems, agreement, equipment, method and message transmission protocol can be used for transmitting information to central server, with Realize identification to customer in the degree of approach of predefined region so that central server can distribute the market information of correlation and For example, the transceiver in retail shop can be configured to monitor the mobile device or predetermined from customer the identity of underground client The WiFi of the radio broadcasting equipment in the degree of approach in adopted region,And/or other radio frequencies Signal, and degree of approach information is relayed to the central server that reward voucher is delivered to customer.Additionally, embodiment may not be needed Determine the exact position of wireless identity emitter and/or degree of approach broadcasting receiver, but alternatively can determine equipment each other Between substantially and/or relative position.Therefore, throughout present disclosure, the reference of pair determination position and/or distance is probably In it is determined that the purpose of the degree of approach between signaling equipment.
Fig. 1 shows can be with example system 100 in various embodiments.Generally, central server 120 can be by It is configured to receive, store and otherwise process the data corresponding with wireless identity emitter 110.Central server 120 Can be configured to via internet 103 come with such as degree of approach broadcasting receiver 142, degree of moving closer to broadcasting receiver 138, Third party system 101 and the various devices exchanges communication of other support systems and/or service 102.Wireless identity emitter 110 Can broadcast via short range, wireless signals can be wide by neighbouring degree of approach broadcasting receiver 142 and/or degree of moving closer to Broadcast the message of the reception of receiver 138.Degree of approach broadcasting receiver 142,138 can be wide by what is received using long haul communication Broadcast message and relay to central server 120 as aiming message, via internet 103.For example, degree of approach broadcasting receiver 142 Central server 120 can be sent to degree of moving closer to broadcasting receiver by message is aimed at using cellular network 121.3rd Method, system 101 can include the computing device that dealer help's device, retail shop computing device are associated with emergency services.Its Its support system and/or service 102 can include the computing device being associated with various technologies, such as be used by the user to provide note The computing device of volume information, delivering and system (for example, high pass Gimbal of user-dependent contentTM) and provide specific to position Service (for example, high pass IZat of the information putTM)。
Central server 120 can include some component 104-109, and it is used to perform for processing data (such as from connecing The data that recency broadcasting receiver 142,138, Third party system 101 or other support systems and/or service 102 are received) Various operations.Specifically, central server 120 can include data warehouse component 104, and it can store long term data (example Such as, archived user data, past positional information etc.).Central server 120 can also include operation, perform and manage (or OA&M) component 105, it can manage, process and/or store and portal user access, script, instrument (for example, software reality With program, routine etc.) associated software and any other element for performing central server 120.Central server 120 can also include developer's portal assembly 106, and it can store developer's account data and perform registration, account management And be associated with developer's (such as register interacted with the user with wireless identity emitter 110 supplier or businessman) Warning (or notify) supervisory routine.Central server 120 can also include that rolling identifier (or ID) decomposes device assembly 107, It can be stored in factory's key for being associated with wireless identity emitter 110 and the aiming message for performing for receiving Encrypted, warp knit code, roll or behaviour that otherwise Jing fuzzy identification information is matched with attached user data Work, software or routine.Central server 120 can also include portal user component 109, its can store user account data with And perform the registration associated with user (personnel being such as associated with wireless identity emitter 110), account management and search Routine.Central server 120 can also include core component 108, and it can process aiming message, perform and report to the police or notification engine Module, process API (API) order and with central server 120 in other exchange datas.Hereafter join Core component 108 is described according to Figure 12.
In various embodiments, each system component 104-109 can be included in central server 120, connect Computing device, server, software and/or the electricity to central server 120 or being otherwise associated with central server 120 Road.For example, core component 108 can be included in blade server or computing unit in central server 120.Lift another Individual example, data warehouse component 104 can be long-distance cloud storage device, wherein central server 120 via Internet protocol with Long-distance cloud storage device is communicated.
In one embodiment, degree of approach broadcasting receiver 142 and degree of moving closer to broadcasting receiver 138 can be configured To perform core customer end module 115, core customer end module 115 can enable degree of approach broadcasting receiver 142,138 Process receive from immediate wireless identity emitter 110 the software of broadcast, instruction, routine, application, operation or other Circuit.Core customer end module 115 can also be processed between degree of approach broadcasting receiver 142,138 and central server 120 Communication, such as sends and aims at message and receive return message from central server 120.Additionally, degree of moving closer to broadcasting receiver 138 can be configured to perform third-party application module 116, and third-party application module 116 can be with execution by various third parties Software instruction, routine, application or other operations that (for example, businessman app) is provided are related.In one embodiment, when being configured When the service registered with central server 120, third-party application module 116 can be received respectively from core customer end module 115 Plant data.For example, can be configured to the third-party application of the registration of central server 120:When degree of moving closer to broadcast reception When the user of machine 138 enters, stays in and/or leave locality (for example, geo-fence, retail shop etc.), from core client Module 115 is received and notified.
In another embodiment, degree of moving closer to broadcasting receiver 138 can be configured to receive and transmit broadcast and disappear Cease and be also referred to as " wireless identity transceiver ".For example, user can use smart phone, and it can be configured to: The letter of the identification information that broadcast and broadcast include being associated with user is received from neighbouring wireless identity emitter 110 Number.
Fig. 2 shows can be with example communication system 200 in various embodiments.Communication system 200 effectively makes Wireless identity emitter 110 is (for example,LE emitters) can via multiple degree of moving closer to broadcasting receivers 138 and/ Or static degree of approach broadcasting receiver 142 will be sent to central server 120 including the broadcast of identification information, without Consult DCL.This broadcast can automatically by the degree of approach (or broadcasting area) of wireless identity emitter Any degree of approach broadcasting receiver collect.For example, degree of the moving closer to broadcasting receiver 138 in the degree of approach can be received by nothing In line identity emitter 110The broadcast that radio-cell sends.
Communication system 200 can include wireless identity emitter 110.Wireless identity emitter 110 can be with various objects Coupling.For example, it can be embedded in the object of bangle or such as household electrical appliances.Wireless identity emitter 110 can send short distance Wireless signal 114, it is all such as above-mentioned broadcast.For example, the short range, wireless signals 114 can be the periodic broadcasting of packet, should Packet includes the identification code of wireless identity emitter.Alternatively, short range, wireless signals 114 can be and can serve as the degree of approach Any mobile device 138 in multiple mobile devices 138 of broadcasting receiver sets up the trial of wireless communication link.Short distance without Line signal 114 can be by immediate degree of approach broadcasting receiver (such as static degree of approach broadcasting receiver 142 and/or movement Degree of approach broadcasting receiver 138) receive.
Short range, wireless signals 114 can be any communication protocol in various communications protocols, various communications Agreement is such asLE, Wi-Fi, infrared radio, induction wireless, ultra broadband (UWB), radio universal serial bus (USB)、Or have been modified to or can be modified to (for example, by limit to transmission power) will Its efficient communication scope is limited to other short distance wireless technicals or agreement of relatively short distance (for example, in about 100 meters). In certain embodiments, wireless identity emitter 110 can be usedIt is standardized in 4.0 agreements (or version later) Low energy technology.For example, in some embodiment systems, wireless identity emitter 110 may be configured to as4.0 Notice device described in agreement carrys out regularly broadcast identification packet, and immediate degree of approach broadcasting receiver 142,138 can To be configured to act as the scanner according to the agreement.
Agreement andEquipment is (for example,LE equipment) there is relatively short effective communication distance, quilt In being widely used in the communication and computing device of deployment, the standard with the discovery and reporting requirements for meeting each embodiment it is logical Process is accused or matched, and shows low-power consumption, it is preferable for many applications of each embodiment that this makes the agreement.For this Individual reason, refer to for illustration purposes in many examples in exemplified hereWithLE agreements and set It is standby.However, unless being expressly recited in the claims, the scope of no person's claim should not be limited toOr LE equipment.For example,Transceiver can be included in wireless identity emitter 110 and can be used for sending with It is configured to, withThe two-way communication of the degree of approach broadcasting receiver 142,138 of short range wireless transmission.
Communication system 200 can include multiple static degree of approach broadcasting receivers 142, and it can be by official, businessman or each Third party is planted throughout region, building or place to dispose.Such static degree of approach broadcasting receiver 142 can be designed as specially Door (or also includes for wireless identity emitter 110 in addition to other major functions (traffic lights, practical transformer etc.) This following function).Static degree of approach broadcasting receiver 142 may be located at local strategic location, such as be formed with regard to community Circumference and/or positioned at high flow volume region (passageway for example, along retail shop, the porch in building, main crossing and Ring road on highway).Static degree of approach broadcasting receiver 142 can be communicated with LAN 202 (such as WiFi network), should LAN 202 can include the Internet access service device 140 provided to the connection 148 of internet 103.Static degree of approach broadcast Receiver 142 can be connected to LAN 202 by wired or wireless link 146.In various embodiments, the static degree of approach is wide Broadcast receiver 142 to can be contained in the Internet access service device 140 or near the Internet access service device 140.Example Such as, static degree of approach broadcasting receiver 142 can be the component in the Internet access service device 140, or alternatively can be by It is placed on the top or side of the Internet access service device 140.In one embodiment, static degree of approach broadcasting receiver 142 can With with extra function.For example, static degree of approach broadcasting receiver 142 is also used as the cashier's machine in retail shop, sale Point device and/or display unit are every interior to operate or be included in the above.
Communication system 200 can also include be configured to act as degree of moving closer to broadcasting receiver 138 one or more Mobile device.Degree of moving closer to broadcasting receiver 138 can be typical mobile device or smart phone, and it can be via to one The remote-wireless link 136 of individual or multiple base stations 134 being communicated with cellular network 121, wherein one or more base stations 134 are coupled to one or more network operation centers 132 by wired or wireless connection 158.Such cellular network 121 can be with Using various technologies, such as 3G, 4G and LTE.Network operation center 132 can by cellular network 121 manage audio call and Data service, and can generally include one or more servers 130 or can be connected by wired or wireless connection 156 To one or more servers 130.Server 130 can be provided to the connection 154 of internet 103.In various embodiments, move Dynamic degree of approach broadcasting receiver 138 can be employed or other software modules are configured to perform the mobile device of following operation: By the report relay of the broadcast received from wireless identity emitter 110 (that is, aim at message) to being connected to internet 103 Central server 120.In one embodiment, static degree of approach broadcasting receiver 142 can also be via to the remote of base station 134 Communicated with cellular network 121 apart from Radio Link 136.
As described above, degree of approach broadcasting receiver 138,142 can be configured to the connection with wireless identity emitter 110 System's (or aiming) is reported to central server 120 via internet 103.For example, degree of approach broadcasting receiver 142 can be to central authorities Server 120 sends and aims at message, and the aiming message includes the rolling corresponding with the identity of the user of wireless identity emitter 110 Dynamic identifier.Every time degree of approach broadcasting receiver 138,142 from wireless identity emitter 110 receive identifier when, the identifier Can be associated with the position of the time of connection and degree of approach broadcasting receiver 138,142, and the information can such as taken aim at Central server 120 is sent in quasi- message.In certain embodiments, identifier, the time of contact and position can be deposited Store up in the memory of degree of approach broadcasting receiver 138,142 (or intermediate server 130,140) for reporting after a while, such as In response to the query messages by the broadcast or multicast of central server 120.Additionally, central server 120 can will aim at message institute The positional information of report is stored in database, and the database can be used for positioning, track or otherwise monitoring wireless body The motion of part emitter 110.
In one embodiment, degree of moving closer to broadcasting receiver 138 can be configured to be connect with the broadcast of the static degree of approach Receipts machine 142 exchanges short range, wireless signals 189.In other words, degree of moving closer to broadcasting receiver 138 can be configured to conduct Operating, the wireless identity transceiver can receive short-distance wireless letter to wireless identity transceiver from wireless identity emitter 110 Number 114 (that is, broadcasts) and short range, wireless signals 189 are sent so that degree of approach broadcasting receiver 142 is received.
In one embodiment, degree of approach broadcasting receiver 138,142 can be via (the such as office of wireless communication link 188 A part for domain net 202) wireless signal is sent to wireless router 185, the LAN 202 can be provided to internet 103 Connection 187.For example, static degree of approach broadcasting receiver 142 can send to WiFi wireless routers 185 and aim at message, and this is taken aim at Quasi- message includes the data from the broadcast sent by wireless identity emitter 110.
Thus central server 120 can allow to be close to be connected to internet 103 via wired or wireless connection 123 Communication between degree broadcasting receiver 142,138 and central server 120.As described above, central server 120 can include using In multiple components, blade or other modules for processing the aiming message and data received from degree of approach broadcasting receiver 142,138. Further embodiment can be provided in central server 120 and mobile device networking component (such as network operation center 132) Any mobile device networking component between be directly connected to (not shown), so as to more directly by degree of approach broadcasting receiver 142, 138 are connected with central server 120.
Communication system 200 can also include computing terminal 124 (personal computer in such as family or in unit), calculate eventually End 124 is connected to internet 103 via wired or wireless connection 125, and user can be by computing terminal 124 via interconnection Net 103 is communicated with central server 120.These terminals 124 can allow user (such as father and mother, police, fireman, shield Scholar and other authorized officials) register equipment (for example, wireless identity emitter 110 etc.), access on central server 120 Track record, and/or request central server 120 initiate the search for particular wireless identity emitter 110.In an enforcement In example, user can register wireless identity emitter 110, degree of approach broadcasting receiver 142,138 using these terminals 124 (for example, being configured to perform the smart phone of the client software being associated with central server), and/or identity transceiver (not shown), such as by accessing the Web portal and/or user account that are associated with central server 120.Similarly, each side Wireless identity emitter 110, degree of approach broadcasting receiver 142,138 can be registered with using terminal 124 (for example, to be configured to Perform client software and to the stationary receivers of central server repeat broadcast), and/or identity transceiver (not shown).
Based on position of the degree of approach broadcasting receiver 138,142 in a place, multiple degree of approach broadcasting receivers 138, 142 can be in the broadcast area of wireless identity emitter 110 and can be with concurrently receive broadcast.Central server 120 can detect when concomitantly (or in special time period) sends aiming message to degree of approach broadcasting receiver 138,142, should Aim at the reception that message indicates the broadcast from wireless identity emitter 110.Such message that concurrently aims at can be used for It is determined that the more accurate degree of approach information related to wireless identity emitter 110 in broadcast.
Communication system 200 can be operated under Passive Information Gathering pattern and/or active search pattern.Receive in passive information Under integrated mode, degree of approach broadcasting receiver 138,142 can persistently monitor the broadcast from any wireless identity emitter 110, And report all marks to central server 120 via the message transmission of identifier, time and position (for example, including) is aimed at Symbol reception event.When underway (that is, nobody is finding specific wireless identity emitter 110) is not actively searched for, The aiming of wireless identity emitter 110 or the broadcast received from wireless identity emitter 110 can be stored in the degree of approach For the access of time after a while in the memory of broadcasting receiver 138,142 or central server 120.In order to protect privacy, These stored data can be stored with the time period of limit, and such as one day, one week or one month, this depended on tracked people Member or assets.Then, if personnel or assets are found lost, stored data can be immediately accessed to position and track Associated wireless identity emitter 110, or at least determine its position finally reported.
In the modification of passive tracking pattern, each degree of approach broadcasting receiver 138,142 can store with from wireless body The corresponding ID of broadcast (or contact) that part emitter 110 is received, time and position reach the limited time period.Alternatively, These information can be stored in the server 130,140 for being connected to these degree of approach broadcasting receivers 138,142.Subsequently, If the personnel being associated with wireless identity emitter 110 or assets are found lost, can be by central server 120 The search of inquiry degree of approach broadcasting receiver 138,142 (or server 130,140) is played, to download its stored data (for example, Indicate and the database for contacting of wireless identity emitter 110) for the analysis in the database of central server 120 and deposit Storage.
In one embodiment, in order to limit to being configured to what is operated as degree of moving closer to broadcasting receiver 138 The demand of common people's mobile device, passive tracking pattern only can be realized on static degree of approach broadcasting receiver 142.Although less This equipment of quantity mean may not be to the tracking of wireless identity emitter 110 so effectively, but the present embodiment Can realize receiving by high flow capacity area (such as crossroad, highway sail into/exit ramp, bus stop, airport Deng) broadcast and the therefore tracking to wireless identity emitter 110.
In Passive Information Gathering pattern/embodiment, user can ask specific wireless body using communication system 200 The position of part emitter 110, such as by sending request from terminal 124 to central server 120.For example, mother can log in The position of wireless identity emitter 110 of the computer and request in its family in the knapsack of her child.Request can include The sequence number corresponding with wireless identity emitter 110, code or other identifiers.Central server 120 may search for being directed to The stored mark message of the sequence number, code or other identifiers, and via the information for aiming at message return and be input into The time that any position reported for matching is reported together with these positions.In a further embodiment, the mother is defeated It is that the sequence number for entering or code can be transmitted with the wireless identity emitter 110 asked in broadcast and by being close to The identifier of central server 120 is relayed in the aiming message that degree broadcasting receiver 138,142 is submitted to carries out cross reference. In this way, only authorized user (i.e., it is known that the access code that is associated with specific wireless identity emitter 110, password or Other secret identification codes someone) can obtain with regard to give wireless identity emitter 110 information, even if data are to be continued Collect.
In active search pattern/embodiment, central server 120 can indicate degree of approach broadcasting receiver 138,142 Actively search for specific wireless identity emitter 110 (that is, " target " wireless identity emitter).Actively search can be in response to Initiate in the request received from terminal 124.The request can include specific wireless identity emitter 110 identifier, Or the identifier as wireless identity emitter 110 or the identifier of wireless identity emitter 110 can be cross-linked to Account/account name.Central server 120 such as can come to degree of approach broadcasting receiver 138,142 via broadcast or multicast Activate message is sent, the activate message can indicate that degree of approach broadcasting receiver 138,142 searches for specific wireless identity emitter 110 and can include the identifier (that is, target device ID) of wireless identity emitter 110 as target.For example, with to make Corresponding activate message of actively searching for for the wireless identity emitter 110 of target can be including rolling identifier, wireless body Part emitter 110 regularly changes the rolling identifier in an unpredictable manner and the rolling identifier is central server Known to 120.In one embodiment, sent by central server 120, the activate message of broadcast or multicast can only be sent To the degree of approach broadcasting receiver 138,142 in particular sector or in the given range of ad-hoc location.Alternatively, activate message can To recognize particular sector or the distance away from ad-hoc location, so that degree of approach broadcasting receiver 138,142 can determine based on it certainly Oneself known location is determining whether activate message can be applicable to them.In this way, search can concentrate on given area, all Such as the sector that the position comprising wireless identity emitter 110 known to last or witness aim at.Concentrate by this way Search, it is not necessary to activation degree of approach broadcasting receiver 138,142 not in search sector.
In active search pattern/embodiment, in response to receiving the activation for including target device ID from central server 120 Message and determine degree of approach broadcasting receiver 138,142 in the search sector for being recognized, degree of approach broadcasting receiver 138, 142 can be by its short-distance wireless unit (for example, Radio-cell) it is configured to monitor the broadcast with identifier. In other words, degree of approach broadcasting receiver 138,142 be considered be activated for search and can with or and identifier Pairing attempt, to find the identifier (that is, target device ID) that activate message includes.Not against launching with wireless identity In the embodiment that machine is matched, the identifier in the broadcast for receiving is carried out with the target device ID in activate message The degree of approach broadcasting receiver 138,142 of matching can be by event via being sent by link 146 or remote-wireless link 136 Aiming message be immediately reported to central server 120.By between wireless identity emitter and degree of approach broadcasting receiver Pairing or message exchange embodiment in, degree of approach broadcasting receiver 138,142 can monitor and be only completed and broadcast mesh The communication handshake of the equipment of marking device ID or pairing, and ignore other pairing trials.In the alternative embodiment, the degree of approach Can be protected from being matched with undelegated equipment when broadcasting receiver 138,142 is under the search pattern that has the initiative. Additionally, degree of approach broadcasting receiver 138,142 can change the pairing process under active search pattern, equipment is received so as to one ID just terminates communication link, thus further avoids being matched with undelegated equipment under active search pattern.Actively In search pattern/embodiment, the degree of approach broadcasting receiver 138,142 for receiving target device ID can be by the event via to mutually The wired or wireless link of networking 103 is immediately reported to central server 120.As described above, this report can include the degree of approach The time that the position of broadcasting receiver 138,142 and identifier are received (if report is without immediately by transmission). In active search pattern/embodiment, each aiming message that central server 120 is received can such as to show on map The form of the webpage of location pointer is reported to personnel interested or official.
Additionally, in active search pattern/embodiment, authorized user (such as police, FBI, fireman/rescue people Member or other officials) search to specific wireless identity emitter 110 can be activated using communication system 200, it is all The searching position for such as providing target device ID to central server 120 and being searched for by using terminal 124 or sector.Example Such as, it is found that mother that her child loses can call police and be hidden in their offers wireless in the clothes of her child The identifier of identity emitter 110.After activation search, central server 120 can be to positioned at the search as initial target Degree of approach broadcasting receiver 138,142 in sector sends and reports to the police and (or indicates to swash the search of wireless identity emitter Message living).Central server 120 can subsequently activate webpage, and the webpage is presented the map of region of search and can be connect Safeguard near real-time ground so that when the aiming message of correlation is received, the positional information of report is included on map.It is authorized User can subsequently access webpage (or server provide other information) to coordinate search efforts in person.
Of course, it is possible to use in the initiation of active search in degree of approach broadcasting receiver 138,142 or under Passive Mode Central server database in the information collecting and store so that identification initial searching position or sector, tracking are recent Position and motion and offer/display are gone through by the position that can merge with the scout report of near real-time of aiming message report History.
In another embodiment, communication system 200 can also include the multiple wireless identities transmitting placed throughout building Machine (not shown in FIG. 2).In this case, multiple broadcast areas can cover most of closed area in the building.Example Such as, building can be that retail shop and multiple wireless identity emitters can be permanently installed at sale throughout building Layer.With degree of moving closer to broadcasting receiver 138 (such as customer carry smart phone) move throughout building and When in the broadcast area of multiple wireless identity emitters, degree of moving closer to broadcasting receiver 138 can be received and is associated with building Broadcast.In another embodiment, the Internet access service device 140 can be configured to store, receive and with other Mode processes the information related to building.For example, the Internet access service device 140 can be configured to as retail shop Home server is alternatively configured to the software performed for carrying out with the transaction of customer and the point of sale device for operating To perform.For example, the Internet access service device 140 can be configured to perform it is related to the customer's purchase in retail shop building Operation.
Fig. 3 A show the operation for be performed by wireless identity emitter 110 (being also referred to as in figure 3 a " WIT ") Embodiment method 300.In various embodiments, in method 300 operation can combine it is describing below with respect to Figure 4 and 5, divide The operation not performed by degree of approach broadcasting receiver 138 and central server 120 is performing.In block 302, wireless identity transmitting Machine 110 can broadcast the message including identifier, broadcast such as above.For example, wireless identity emitter 110 can To broadcastLE notice packets, it includes rolling identifier as described herein.This can in block 302 by wireless identity Processor (for example, microcontroller) in emitter 110 is completed, and the processor determines broadcasts in time its identifier, configuration Appropriate broadcast (for example, such as existsIt is directed in 4.0 agreementsNotice that LE equipment specifies packet), Yi Jijing The packet is sent by short-distance wireless unit.
In various embodiments, identifier can be included by the message (that is, broadcast) of wireless identity transmitter broadcasts Section, such as rolls identifier.In various embodiments, broadcast can also include extra section, such as type section. Type section can indicate the type of wireless identity emitter.For example, wireless identity transmitting can for various purposes be promoted Machine, such as child safety, dog collar or the safety label for shop.Wireless identity emitter can be based on expected purpose And there is different type section (code for example, for child safety, for the second code etc. of dog collar). Type section can be static and can be arranged by manufacturer, and the remainder of identifier can for each equipment To be unique, and can roll, it is as described below.Type section can be to be changed, such as when for different purposes by user Or during application replacement wireless identity emitter.
In other embodiments, broadcast can also include have will degree of being approached broadcasting receiver realize instruction or One or more either statically or dynamically sections of order.Such order section can also be passed down to instruct central server Or other network equipments.Order section can be set or static state (similar to type area), or can be based on various Situation (the such as pairing from one or more degree of approach broadcasting receivers or data) is changed over.Such order is arranged Can also be configured by the user of wireless identity emitter.Second section or extra section also can indicate that wireless identity is launched The state of machine.For example, the second section can indicate the remaining time estimated before dump power or dead battery.The degree of approach is broadcasted Receiver or central server can explain the state and correspondingly respond.
Fig. 3 A are returned to, in block 304, wireless identity emitter 110 can enter sleep pattern.For example, in broadcast tool After having the broadcast of identifier, wireless identity emitter 110 can be configured to ingoing power and save state, and power is saved State can continue predetermined time period.In various embodiments, wireless identity emitter 110 can sleep up to it is predetermined when Between, never sleep or sleep up to based on it is various input determine the different times.In frame 306, wireless identity emitter 110 Can wake up from sleep pattern, such as after the predetermined duration expires.In frame 308, wireless identity emitter 110 New device identifier can be generated according to algorithm (such as rolling identifier algorithm).For example, wireless identity emitter 110 can It is as follows to generate rolling identifier using pseudo-random function or similar to the AES (for example, AES-CTR) of stream transmission It is described.Subsequently, wireless identity emitter 110 may return to frame 302 and be broadcasted again.In one embodiment, broadcast disappears Breath can include timing, random number or counter, count down or indicate for receive message wireless identity emitter it is available The schedule information of property.For example, broadcast can indicate that wireless identity emitter will receive input in specified time window Configuration message.In various embodiments, the operation in frame 302-308 (for example, can be configured to conduct by identity transceiver Both identity emitter and degree of approach broadcasting receiver are come the smart phone that operates) performing.
As described above, the algorithm (or rolling identifier algorithm) used in frame 308 can generate such rolling and identify Symbol:It is difficult not known wireless identity emitter 110 identity (for example, MAC orID), key, and/or use are decoded In the equipment or system prediction or identification that generate the algorithm for rolling identifier.It is as described below, it is configured with algorithm (or decoding algorithm) Or decode key and occupy the central server 120 of the identity of wireless identity emitter 110 can be using rolling identifier really Fixed corresponding account or equipment identities.Although the rolling identifier that method 300 will change with each wake-up and broadcast cycle An example is shown as, but in other embodiments, identifier can infrequently be changed, it is such as per minute to change one It is secondary, change per hour once, etc..In such embodiments, the operation that new identifier is generated in frame 308 can only to refer to Fixed interval is waking up the other time of (that is, frame 306) performing, and wireless identity emitter 110 may return to frame 302 carry out broadcast identifier.Below and in entitled " Preserving Security By Synchronizing a The related application U.S. Patent application No.13/773/ of Nonce or Counter Between Systems ", discusses in 336 For generating the various algorithms for rolling identifier or other warp knit code identifiers, for for generating, sending and decoding mark is rolled Know symbol and the purpose of other data, be by way of reference expressly incorporated herein the full content of above-mentioned application.
Fig. 4 shows have and (can for example, be configured to wide as degree of moving closer in degree of approach broadcasting receiver 138 The smart phone for broadcasting receiver to operate) in realize operation embodiment 400.In frame 402, degree of approach broadcasting receiver 138 can receive broadcast from wireless identity emitter 110.Degree of approach broadcasting receiver 138 can work as to be sent out in wireless identity Broadcast is received when penetrating in the degree of approach of machine 110 (that is, in communication range).There is the identifier being included when receiving Broadcast when, degree of approach broadcasting receiver 138 can analyze header or metadata in the broadcast for receiving, and Parse and assess the various data in broadcast.In one embodiment, broadcast can connect comprising degree of approach broadcast Receipts machine 138 may or may not be configured to encryption and the non-encrypted data decrypted or otherwise access.In frame 404, Degree of approach broadcasting receiver 138 can send to central server 120 and aim at message, and it includes relative with the reception of broadcast Identifier, positional information and the time answered.The transmission (can such as be coupled to the cellular data of internet via wireless wide area network Net) completing.In various embodiments, the operation in frame 402 and 404 can be connect by static degree of approach broadcasting receiver, movement Recency broadcasting receiver or alternatively identity transceiver (for example, is configured to what is operated as both transmitter and receivers Smart phone) performing.
Generally, metadata or header information that message can include being described the following are aimed at:Receive Broadcast (for example, designator of message size, theme etc.), degree of approach broadcasting receiver 138 (such as the degree of approach broadcast connect Receipts machine identify (for example, code, user name etc.)), to degree of approach broadcasting receiver 138 with regard to the service affiliated by server finger Show that (for example, degree of approach broadcasting receiver 138 participates in the tracking project to specific supplier, businessman, region etc.) and broadcast disappear The situation during reception of breath.For example, the signal strength information of the broadcast that message can include receiving is aimed at.In a reality In applying example, aim at message and may each comprise code, mark or the general topic for aiming at message, theme or reason are retouched Other designators stated.For example, aiming at message can include the mark indicated with the relation of initiative alarming.
In addition, aiming at message can include the positional information of degree of approach broadcasting receiver 138.Specifically, message is aimed at The information specific to network related to position can be indicated.For example, aiming at message can be with indicating cell website (for example, cell Site ID), cellular network tower (for example, cell tower ID) or degree of moving closer to broadcasting receiver when broadcast is received with Other wireless networks for being communicated.Additionally, aim at message can include be based on from global positioning system (GPS) or including The positional information for more refining of the data of the chip in degree of approach broadcasting receiver 138.For example, degree of approach broadcasting receiver 138 can determine GPS information (that is, gps coordinate) of the degree of approach broadcasting receiver 138 when broadcast is received, including corresponding Aiming message in coordinate.In one embodiment, aiming at message can also be included in degree of approach broadcasting receiver 138 Various sensors (such as accelerometer, gyroscope and magnetometer) sensing data.Additionally, aiming at message can include certification Information, the authentication information can confirm that aiming message as from known, chartered or be otherwise effectively close to The legitimacy of degree broadcasting receiver 138.For example, the authentication information that aiming message includes can be included in degree of approach broadcast reception Secret identification code, certificate or the hash shared between machine and central server 120.
In various embodiments, degree of approach broadcasting receiver 138 can be by the way that data and various information be attached to from nothing The broadcast that line identity emitter 110 is received is generating aiming message.In one embodiment, aiming message can include whole In the individual broadcast for receiving, or the broadcast for alternatively only including receiving, degree of approach broadcasting receiver 138 is true Surely it is part and parcel.For example, degree of approach broadcasting receiver 138 can be before corresponding aiming message be generated from broadcast Extract particular header or metadata information.Another example is lifted, degree of approach broadcasting receiver 138 can compress, shortens, truncate And/or the data in summary broadcast.In another embodiment, degree of approach broadcasting receiver 138 simply will can connect The broadcast for receiving redirects, relays or resend to central server.
It can (such as wireless cellular network, be configured to via mutual via wirelessly or non-wirelessly communication link to aim at message LAN, long range wireless communication link or short-distance wireless unit that networking protocol is communicated) send.For example, it is close to Degree broadcasting receiver 138 can be sent to central server via internet by cellular network by message is aimed at.Lift another Example, degree of approach broadcasting receiver 138 can send aiming message via wired Ethernet connection.
Fig. 5 shows the embodiment method 500 with the operation that can be performed by central server 120.In frame 502, Central server 120 can be received from degree of approach broadcasting receiver 138 and aim at message.In frame 504, central server 120 can So that the identifier indicated by aiming message to be associated with wireless identity emitter 110.Central server 120 will can be aimed at Identifier in message be associated by the account of user's registration/establishment.By identifier and specific wireless identity emitter 110 or user account be associated and can be completed by following operation:By identifier and corresponding to wireless identity emitter 110 Or the code database of user account is compared, so that determine should be by from the information (for example, positional information) for aiming at message The data-base recording being stored therein.Because in certain embodiments, the identifier of wireless identity emitter 110 is frequently changed (rolling), therefore the process may relate to:By the identifier received in message is aimed at and by PRNG algorithm Or some possible sequence generated using algorithm for inversion (it is using the identifier for receiving as being input into and export corresponding account) Code is compared.In block 506, central server 120 can be by from data (the such as positional information and time for aiming at message Data) it is stored in database.For example, the aiming message that central server 120 can be based on to receiving is estimated come really Determine position of the degree of approach broadcasting receiver 138 when broadcast is received, and the data storage can be linked to nothing In the database of line identity emitter 110 or its user/owner.In various embodiments, central server can be based on from Each received with the time aims at the stored data of message generating various useful datas, such as analyzes.For example, central service Device can be generated for indicating interacting (for example, between distance/degree of approach, equipment of each equipment with other connectable devices Connection etc.) and equipment between relation (for example, common owner or user etc.) statistics.In certain embodiments, Tripartite's (such as retail shop or other companies) can learn more about the consumer in shop using this useful data, such as Distance (for example, WITS in display etc.) in walking mode in shop, the consumer come before predefined object etc..
In frame 508, central server 120 can perform action in response to aiming at message, such as send to recipient Message, transmission reward voucher, and/or calculating reward.In one embodiment, central server 120 (can such as connect to recipient Recency broadcasting receiver 138) send and return message, the return message is included for indicating that degree of approach broadcasting receiver 138 can be with Instruction, software or the code how broadcast for receiving is responded.For example, returning message can indicate that the degree of approach is wide Broadcast the transmission link notice message of receiver 138 or download software from specific URI.From the reception of this message of central server Person can include various equipment and each side, including computing device (for example, businessman, ambulance paramedic etc.), the use of registration service The mobile device and degree of approach broadcasting receiver (for example, receiving the degree of approach broadcasting receiver 138 of broadcast) at family. In another embodiment, central server 120 can use stored data to recognize when wireless identity emitter 110 enters Enter designated area, in designated area, and/or leave designated area.In other words, central server 120 can be recognized wirelessly When identity emitter 110 is come in the degree of approach of degree of approach broadcasting receiver 138, stays in degree of approach broadcasting receiver 138 The degree of approach is interior or leaves the degree of approach of degree of approach broadcasting receiver 138, and or vice versa.
Fig. 3 B to show and performing being followed by for start-up operation for wireless identity emitter (being referred to as in figure 3b " WIT ") Receive the embodiment method 350 that configuration is arranged.Generally, wireless identity emitter can only perform one-way communication, and broadcast supplies the degree of approach The signal that broadcasting receiver is received.However, wireless identity emitter can be configured to optionally to carry out with similar short Apart from wireless signaling ability miscellaneous equipment (for example,LE transceivers) two-way communication.Specifically, as initialization behaviour When making (or " startup "), wireless identity emitter can be configured to from degree of approach broadcasting receiver receives input short-distance wireless Communication.For example, when battery is changed or is inserted into for the first time, wireless identity emitter can receive inputPacket reaches Predetermined time period, such as 60 seconds.Alternatively, wireless identity emitter can receive the defeated of the part as power cycle Enter message (for example, receiving 60 seconds after wireless identity emitter is restarted).
This input short-distance wireless communication can be included for arranging the configuration parameter that wireless identity emitter is utilized Value performing instruction, software, firmware, order or other codes of various functions.Specifically, input communication can include nothing Line identity emitter can be used to pair and send the configuration parameter being set up that broadcast is associated and be configured or change Configuration arranges (or value), and wherein broadcast includes the identification information of wireless identity emitter.In one embodiment, including matching somebody with somebody The input communication for installing can be not require the pairing behaviour between sender and recipient's (that is, wireless identity emitter) MakeSignal (for example, setting person (setter) or obtain taker (getter)).In other words, input communication can be with right and wrong PairingNotice.
Configuration parameter can include for send broadcast transmission be spaced (that is, wireless identity emitter should multifrequency The packet including its identity is broadcasted numerously) and for sending the transmit power of broadcast (that is, in broadcast using which type of Signal strength signal intensity).For example, the configuration for receiving is arranged can be same to be configured to contribute to the accurate tracking of wireless identity emitter Time saves the mode of the power of battery to change interval (that is, the broadcast frequency that wireless identity transmitter broadcasts its identifiers is adopted Rate).This is probably important, because arranging transmit power configuration parameter may affect the battery service longevity of wireless identity emitter Life (for example, longer interval can include longer sleep pattern and therefore reduction power consumption).In one embodiment, configure Parameter can also include the tuning parameter that can be arranged or be changed by manufacturer or manager's (for example, central server).Debugging Parameter can be utilized and when can be indicated wireless identity emitter by the software performed by wireless identity emitter or algorithm New identifier should be generated broadcasting (for example, for generate new rolling identifier orBetween MAC Address identifier Every).In another embodiment, can include indicating that wireless identity emitter changes broadcast with the input communication that configuration is arranged The order of the data represented in message, such as by into/out coding mode.Alternatively, input communication can include for Wireless identity emitter shortens its broadcast signal range to emulate the instruction of near-field communication (NFC).
In frame 352, wireless identity emitter can start.In other words, wireless identity emitter can be energized, quilt Initialize and be otherwise configured to from hibernation, sleep, dormancy or otherwise deactivation status operation.In each embodiment In, start-up operation can be in response to be inserted in user input (for example, pressing the button), by battery in wireless identity emitter, Or receive what short range, wireless signals (for example, activation signal) were performed.In certain embodiments, when wireless identity emitter is opened When dynamic, random number or Counter Value can be initialised.For example, wireless identity emitter can from null value start increase represent when Between process value.
In frame 353, the short-distance wireless unit of wireless identity emitter can be activated.The activation can be by timing Device or its processor (for example, microcontroller) determine that the duration has expired since start-up operation has been performed or grasped with starting Concomitantly completing.In one embodiment, the activation of short-distance wireless unit can be in the start-up operation in frame 352 Routine.
In frame 354, wireless identity emitter can be with broadcast configuration message, and it is used to indicate that presence can be in wireless identity The configuration parameter being configured in emitter.For example, configuration parameter can include wireless identity emitter identity (or mark Symbol) and with regard to specific quantity or type configuration parameter can by follow-up short range, wireless signals arrange, modification or initialize Instruction.In one embodiment, configuration parameter (such as the sending interval) row that message can include can be used to be set are configured Table.
In alternative embodiments, configuring message can include can be used to receive what configuration was arranged with regard to wireless identity emitter Designator.In such embodiments, any response apparatus (such as immediate degree of approach broadcasting receiver) can send and ask Ask the response of configuration parameter list (for example,LE signals).In response to receiving the request, degree of moving closer to broadcasting receiver The second message including configuration parameter list can be sent.
In decision block 356, wireless identity emitter can such as from immediate degree of approach broadcasting receiver or Determine that configuration is arranged in the short range, wireless signals of identity transceiver whether to be received.Wireless identity emitter can monitor short distance From radio-cell with determine whether from immediate equipment receive respond.Response can be with wireless identity emitter microcontroller The simple respond packet being capable of identify that or pulse or alternatively basisThe form of the notice of LE agreements.If configuration Setting is received (that is, decision block 356="Yes"), then in frame 358, wireless identity emitter can be based on received configuration Arrange and carry out arrange parameter.For example, wireless identity emitter can be to indicating that its value for how frequently sending broadcast sets Put.If it were configured without parameter to be received (that is, decision block 356="No"), or if wireless identity emitter would perform frame 358 In operation, then in decision block 360, wireless identity emitter can determine configuration the period whether pass by.For example, wirelessly Identity emitter assesses counter or timer to determine since start-up operation has been performed the second (for example, 60 seconds) of predetermined quantity Whether pass by.If the configuration period not yet passes by (that is, decision block 360="No"), then in optional frame 361, wirelessly Identity emitter can wait a period (several milliseconds, several seconds etc.), and can subsequently continue the operation in frame 404.
However, if the configuration period passes by (that is, decision block 360="Yes"), then in frame 302 ', wireless identity is sent out The machine of penetrating can broadcast the message including identifier based on configuration parameter.In frame 362, wireless identity emitter can be based on matches somebody with somebody Put parameter to enter sleep up to a period, and as described above, in frame 308, new equipment mark can be generated according to algorithm Know symbol.Wireless identity emitter can continue thereafter with the operation in frame 302 '.
In alternative embodiments, wireless identity emitter can be configured to:Based on clock timing (or clock signal), inspection Information in the input (for example what is, detected presses the button) from user for measuring or previously received signal is (for example, The message received from degree of approach broadcasting receiver can indicate that wireless identity emitter becomes available in specific future time Subsequent message) come from degree of approach broadcasting receiver receives input message.
Fig. 6 shows the modules in degree of moving closer to broadcasting receiver 138.As described above, degree of approach broadcast reception Machine can include that static degree of approach broadcasting receiver (being such as placed on the special equipment near building) and degree of moving closer to are wide Broadcast receiver 138 (to be such as configured to perform operation to receive broadcast and via long distance from wireless identity emitter 110 The movement for aiming at message is sent to central server 120 by internet 103 (for example, via WiFi or cellular network) from communication Equipment).Hereafter modules and component are described in the context of the element in degree of moving closer to broadcasting receiver 138, so And in various embodiments, any degree of approach broadcasting receiver (such as static degree of approach broadcasting receiver) can include similar Module and/or component.
Degree of moving closer to broadcasting receiver 138 can include core customer end module 115, and it could be for processing from most The software of the broadcast that close wireless identity emitter 110 is received, instruction, routine, application, operation or other circuits.Core Heart client modules 115 can also process the communication between degree of approach broadcasting receiver 142,138 and central server 120, all Such as send the return message for aiming at message and reception from central server 120.For example, core customer end module 115 can be made Operate to perform the background service of operation (such as upload or send and aim at message), without the interaction from user.
Core customer end module 115 can include and be associated with broadcast and/or aim at the API of message The corresponding API component 606 of data, code or other orders.For example, degree of approach broadcasting receiver can be being monitored from wireless body Part emitter 110 is receivedAPI component 606 is used during LE notice packets.Lift another example, API component 606 can be with For registering degree of moving closer to broadcasting receiver 138 to receive the notice corresponding with wireless identity emitter 110, report to the police or it It communicates.Core customer end module 115 can also include the authoring system component 608 for processing the broadcast for receiving. For example, degree of moving closer to broadcasting receiver 138 can be supported for the oAuth of authorization requests and the communication parter for ratifying XAuth.Core customer end module 115 can also be included specific to wireless aiming receiver module 610 (for example, for locating ReasonLE, LTE-D, WiFi and other communication component), operation, perform and management module 612, wireless identity emitter The event registration component 616 related to the prediction identifier of storage of network management device assembly 614 and aiming manager component 618.In one embodiment, event registration component 616 can store it is a large amount of downloading from central server 120 and with it is specific The corresponding rolling identifier of wireless identity emitter 110, such as can be with wireless identity emitter 110 in special time window The possibility broadcasted during mouthful rolls the rolling set of identifiers of match identifiers.
As many modern mobile devices, degree of moving closer to broadcasting receiver 138 can be configured to perform third party Using (or " app "), and therefore can include third-party application module 116, it can perform, manages and otherwise hold The software instruction and routine of the application correlation that row is provided with each third party (for example, businessman, developer etc.).For example, the 3rd Square application module 116 can receive the various data to be used by each third-party application from core customer end module 115.In order to Illustration purpose, the third-party application related to the department store registered to central server 120 can be configured to:When movement connects The user of recency broadcasting receiver 138 enters, stays in and/or leave department store (for example, the geo-fence in shop) Shi Conghe Heart client modules 115 are received and notified.In one embodiment, for optimization purposes, perform via third-party application module 116 Application or app can register or otherwise be configured to:By specific degree of approach broadcasting receiver in the degree of approach or Receive from core customer end module 115 when alternatively leaving the degree of approach and notify.For example, application can shift to an earlier date and core client mould Block 115 register with receive with regard to specific wireless identity emitter degree of entering proximal to broadcasting receiver the degree of approach, stay in it is close (for example, nearby stand and do not move) in the degree of approach of degree broadcasting receiver and still leave being close to for degree of approach broadcasting receiver Degree, or vice versa.
Degree of moving closer to broadcasting receiver 138 can also include operating system and console module 620, and it is used to performing various Operation and management circuit (such as short-range signal receiver circuit).Specifically, operating system and console module 620 can be wrapped Include for utilizingLE agreements are processing communicationLow energy module 624, for process and various honeycombs and class As the corresponding communication of remote-wireless network (for example, LTE-D etc.) cellular network module 626.Operating system and platform Module 620 can also include tracking the time and generating the Time Service component 628 of time stamp data, can safeguard low essence Degree position data or alternatively the location-based service component 630 of more accurate GPS (or A-GPS) position data, storage assembly 632, And for realizing the wireless wide area network/wireless local screen component 622 via the communication of WiFi or other wireless networks.
In one embodiment, core customer end module 115 can be from central server requests wireless identity emitter mark Know symbol set (for example, the mark of all emitters that the rolling identifier of all emitters in list interested, user are possessed Know symbol etc.).These set can with currently using and be expected to use the wireless identity emitter phase of certain time Correspondence.
Fig. 7 shows can be in degree of approach broadcasting receiver (such as static degree of approach broadcasting receiver or degree of moving closer to Broadcasting receiver) on realize embodiment method 700.In decision block 702, degree of approach broadcasting receiver can determine that broadcast disappears Whether breath is received.For example, degree of approach broadcasting receiver can begin listening for broadcasting announcements packet or wireless identity emitter enters Capable pairing is attempted.In certain embodiments, degree of approach broadcasting receiver can constantly under monitoring pattern, or in response to Unique identifier is begun listening for from the warning (or search activate message) of central server reception.There is the reality matched wherein In applying example, if degree of approach broadcasting receiver is arranged to be matched with any wireless identity emitter, key can not be used To automatically set up pairing;Can be by using from the key for being previously paired preservation with wireless identity emitter or by making Pairing is set up with the key received from central server.If degree of approach broadcasting receiver do not receive broadcast (that is, it is determined that Frame 702="No"), then degree of approach broadcasting receiver can continue the operation in decision block 702.
If degree of approach broadcasting receiver receives broadcast (that is, decision block 702="Yes"), then in block 704, it is close to Degree broadcasting receiver can generate aiming and disappear based on the information from the broadcast for being received and other associated data Breath.Specifically, aiming at message can include the mark of the wireless identity emitter specific to the received broadcast of transmission Symbol, such as rolls identifier (that is, the device identifier of warp knit code), MAC Address or can be used for identifying specific wireless identity The unique code of other of emitter.In alternative embodiments, the identifier of wireless identity emitter can be used as the one of pairing process Part is received.
Other associated data can include the various information related to the reception of broadcast, such as degree of approach broadcast Receiver receives time, positional information, the identification information of degree of approach broadcasting receiver, the related service (example of broadcast Such as, associated businessman) and signal strength information.In other words, degree of approach broadcasting receiver can be by with regard to present situation Data (for example, timestamp, gps coordinate, cell ID of nearest base station etc.) and broadcast and/or wireless identity emitter Identifier is associated.The data can be stored in any kind of data structure in polytype data structure, Such as there is the array of one or more identifiers being associated with timestamp and gps coordinate, wherein from the timestamp and GPS There is the aiming corresponding to each identifier in coordinate.In one embodiment, aim at message can include can be by central service Device is used for the authentication data of the identity for confirming degree of approach broadcasting receiver, such as digital certificate or code.For example, message is being aimed at Metadata in, it is special known to only degree of being approached broadcasting receiver and central server that degree of approach broadcasting receiver can include Hash codes.
In frame 706, degree of approach broadcasting receiver can such as via honeycomb (for example, LTE, 3G or 4G network) or as above Described other networks and internet to send aiming message to central server.When aiming at message reporting contact by sending During event, degree of approach broadcasting receiver can be immediately returned to the operation performed in decision block 702 and wait from wireless body The further broadcast of part emitter.This enables degree of approach broadcasting receiver constantly to central server report contact thing Part.
Fig. 8 shows the call flow diagram 800 of the communication during each embodiment.Wireless identity emitter can be to connecing Recency broadcasting receiver (such as degree of moving closer to broadcasting receiver (for example, mobile device, cell phone etc.) or as above Various other degree of approach broadcasting receivers) send short distance broadcast 802 (for example,LE signals).Broadcast 802 The identifier of wireless identity emitter can be included.Degree of approach broadcasting receiver can connect the identifier of wireless identity emitter (or upload) is sent with any associated data (for example, timestamp, gps coordinate, cell ID etc.) extremely as message 804 is aimed at Central server 120.Central server 120 can receive aiming message 804 and store wide from one or more degrees of approach Broadcast many different identifier of receiver.
In certain embodiments, identifier and associated data can be sent without the personal data of any user (or upload) is to central server to protect privacy.In each embodiment using personal mobile phone is attempted, telephone subscriber Can participate in as degree of moving closer to broadcasting receiver.If however, these telephone subscribers fear personal recognizable data Central server will be sent to, then they can refuse to participate in.Therefore, installed in these people's mobile devices, (that is, movement connects Recency broadcasting receiver) on the application for uploading identifier may prevent personal data or can recognize that degree of moving closer to is wide Broadcast the transmission of other data of receiver.
Central server 120 can be used from user equipment (such as terminal 124 or mobile device) receive user request 806 Family request 806 is used to ask the position of wireless identity emitter.The request can signed in and specific wireless body by user Send after the associated account of part emitter.For example, each wireless identity emitter can be registered with authenticated user entities, so that The user's request 806 that chartered wireless identity emitter must be directed to only can be after authenticated user entities sign in secured account Sent.
After user's request 806 is received, central server 120 may search for via the previous report for aiming at message sink The wireless identity sender unit identification symbol of announcement, is matched with finding with any of identifier of the wireless identity emitter asked.Appoint What matching can be reported to user in response 808.Response 808 can also include aiming at the associated number in message 804 According to (for example, timestamp, gps coordinate, cell ID).User can help position or track wirelessly using the associated data (for example, mother can find what is lost to identity emitter at the latest position that the wireless identity emitter for child is reported Child).
Fig. 9 to show and perform action based on the type in broadcast or order section for degree of approach broadcasting receiver Embodiment method 900.In box 902, degree of approach broadcasting receiver (can in fig .9 be referred to as from wireless identity emitter " WIT ") receive broadcast, such as broadcasting announcements packet.In alternative embodiments, the message can be by matching or being used as Sent in the connection that a part for pairing process is set up.Broadcast can comprising identifier section and extra section or Code, such as type section or order section.In frame 904, degree of approach broadcasting receiver can be based on the broadcast for receiving and disappear The code in breath is performing action.In various embodiments, the action can be able to carry out including degree of approach broadcasting receiver Any operation.For example, degree of approach broadcasting receiver can be based on type section or order section come to message or identifier point With different grades of priority (for example, safety label of the child safety ratio from shop has higher priority).Connect The message with higher priority for receiving or identifier can be sent to central server or last quilt with first Delete from the local record of degree of approach broadcasting receiver.
Degree of approach broadcasting receiver can in a different manner process broadcast or mark based on type or order section Know symbol.For example, message can before central server is sent to it is locally stored up to special time (for example, depending on area Each time of the value of section).Alternatively, message or identifier can together with associated data (such as timestamp and gps coordinate) To be sent to multiple positions.
Another example is lifted, degree of approach broadcasting receiver can initiate various communications based on type and/or order section. Degree of approach broadcasting receiver can contact specific URI, send SMS message, initiates call or set up new network connection. In various embodiments, some actions in these actions can alternatively be disabled to protect privacy of user.
In a further embodiment, degree of approach broadcasting receiver can be configured to send volume to another network equipment Outer section or other message takes certain action for other network equipments.For example, degree of approach broadcasting receiver can be by Message is together with associated data forwarding to central server.Central server can based on message in extra section holding Action is made, such as automatically to user's transmission message without waiting for user's request.
Figure 10 to show and provide content based on the degree of approach to wireless identity emitter for degree of approach broadcasting receiver Embodiment method 1000.In frame 1002, degree of approach broadcasting receiver (can in Fig. 10 be claimed from wireless identity emitter For " WIT ") receive the broadcast comprising authentication code and/or the second section.In decision block 1005, degree of approach broadcast reception It is (for example, wide in the degree of approach that machine can determine whether the action being associated with authentication code and/or the second section is locally stored In broadcasting the memory of receiver).If locally finding associated action (that is, decision block 1005=is), then in frame 1008 In, can be by degree of approach broadcasting receiver execution action.
If locally not finding associated action (that is, decision block 1005=is no), then in frame 1010, then it is close to Degree broadcasting receiver can send the aiming message with identifier and/or the second section to central server.In an enforcement In example, degree of approach broadcasting receiver can send message to another equipment (such as user equipment).In frame 1012, the degree of approach Broadcasting receiver can receive instruction message.The instruction can be in response to the aiming message with identifier and/or the second section To be sent by central server or miscellaneous equipment.In frame 1014, degree of approach broadcasting receiver can be based on received instruction Message such as accesses content performing action by going to webpage or other online resources.In alternative embodiments, the degree of approach Broadcasting receiver can skip decision block 1005 and automatically continue with frame 1010 send aim at message or attempt or Perform locally stored action.
Extensive activity can be used for based on the content public address system of the degree of approach.For example, teenager can carry with nothing (for example, line identity emitter, point to its social network page).As their close friends, the page can be promptly It is interviewed in degree of approach broadcasting receiver (that is, being configured to the mobile phone operated as degree of moving closer to broadcasting receiver) Ask.Realtor can arrange the webpage for house and the wireless identity emitter for pointing to webpage is fixed to into house Direction board on so that any people for crossing the house can access the information.Shop can by wireless identity emitter with Product is included, the link, Consumer Reports or extra nutritional information to provide Dynamic Announce, such as to reward voucher.Such as The dog that fruit is lost has wireless identity emitter on its neck set, then degree of approach broadcasting receiver can simply access wireless identity Emitter and message or calling owner are sent, rather than with dog fight accessing its neck set.
Each feature and alternative acts can enable the system to enough with flexible and extendible function.Subsequently can add Plus function, this is because the action taken is by can control with the application that the time updates in degree of approach broadcasting receiver 's.
Figure 11 shows and broadcast is relayed to into central server and from central authorities' clothes for degree of approach broadcasting receiver Business device receives the embodiment method 1100 for returning message.Degree of approach broadcasting receiver can be mobile (for example, smart phone) Or it is static, therefore may be coupled to the equipment such as house, shop, gymnasium, school and be configured to perform and those The various operations of device-dependent.For example, degree of approach broadcasting receiver can be included in the equipment for performing software routines.So Degree of approach broadcasting receiver can be configured to respond to from wireless identity emitter (being referred to as in fig. 11 " WIT ") receive Broadcast is performing particular routine.For example, degree of approach broadcasting receiver can change the execution of operation to be adapted to wireless identity The preference of the user of emitter.
However, as described above, wireless identity emitter can be obscured, encoded or encrypted to the data in broadcast To protect the privacy and identity of wireless identity transceiver user.For example, broadcast cannot send the body of unencrypted user Part.For the related identity information of the broadcast for determining to receive, degree of approach broadcasting receiver can be by broadcast After information that to central server, central server can be based in message (for example, camouflage, roll or encrypted set Standby ID) recognizing wireless identity emitter and its user.As described above, central server can store it is secret (for example, key, Code etc.) being decrypted to the message that wireless identity emitter sends.Message is aimed in response to receiving, central server can be with Send to degree of approach broadcasting receiver and return message, it includes the identification information of wireless identity emitter.
In one embodiment, central server can also store and be associated with the behaviour of the equipment of degree of approach broadcasting receiver Make related extraneous information.For example, central server can be Information Hub, residing for its storage and degree of approach broadcasting receiver Equipment the related Proprietary Information of operation.Another example is lifted, central server can be comprising for degree of approach broadcast reception The instruction that machine is performed based on the identity of wireless identity emitter.Therefore, central server can send return message, the return Message can with the nonrecognition wireless identity emitter relevant with message is aimed at, but can be alternatively to include launching with wireless identity The related data of machine.In various embodiments, based on wireless identity emitter user preference and/or with the degree of approach broadcast connect The associated service of receipts machine, returning message can include or not include data or identification information.For example, degree of approach broadcasting receiver Can be registered as related to the trust service of the user for wireless identity emitter, and therefore central server can be with Send the return message of identifying user.Another example is lifted, the user of wireless identity emitter may be during registration process Configured privacy license (or setting), it enables anonymous data to be distributed to degree of approach broadcasting receiver.It is hereafter further Discuss privacy license.
In decision block 702, degree of approach broadcasting receiver can determine such as from the broadcast of wireless identity emitter Whether message is received.If being received (that is, decision block 702="No") without broadcast, then degree of approach broadcasting receiver The operation in decision block 702 can be continued.If broadcast is received (that is, decision block 702="Yes"), then in frame 706, Degree of approach broadcasting receiver can send to central server and aim at message.For example, aiming at message can send out including wireless identity Penetrate the identification information and associated data of machine, the such as position of degree of approach broadcasting receiver and timestamp.
In decision block 1101, degree of approach broadcasting receiver can determine from central server return message whether by Receive.In one embodiment, degree of approach broadcasting receiver can record the identification information with regard to aiming at message and believe this Breath is compared with the message for receiving and is matched with finding.If not returning message is received (that is, decision block 1101= "No"), then degree of approach broadcasting receiver can continue the operation in decision block 702.Alternatively, connect if not returning message Receive (that is, decision block 1101="No"), then in frame 706, degree of approach broadcasting receiver alternatively can think highly of to central service New transmission aims at message.In one embodiment, when not returning message and being received, degree of approach broadcasting receiver can be one Aiming message pre-determined number is resend in the section time.
When return message is received (that is, decision block 1101="Yes"), in decision block 1102, degree of approach broadcast reception Machine can determine whether return message includes wireless identity transmitter identification information.For example, identification information can include user name, Address, sensitive information (for example, SSN, bank information, password etc.) and to wireless identity emitter and/or wireless Other data that the user of identity emitter is described.If returning message package (that is, decision block 1102=containing identification information "Yes"), then in optional frame 1104, degree of approach broadcasting receiver can send to local device (such as home server) and use In the message for processing.In other words, the identification information returned in message can be relayed to and be close to by degree of approach broadcasting receiver The associated local device of degree broadcasting receiver and/or facility therein at degree of approach broadcasting receiver.For example, the degree of approach The identification information of wireless identity emitter can be sent to gymnasium, retail shop, school or other third parties by broadcasting receiver Local computing device, these equipment can determine the instruction for degree of approach broadcasting receiver based on identification information then. In one embodiment, local device can store identification information and/or by information and date database data association, for set The various relevant devices applied further are used.
If returning message does not include that identification information (that is, decision block 1102="No") or degree of approach broadcasting receiver exist Message is sent to local device in optional frame 1104, then in frame 1106, degree of approach broadcasting receiver can determine that return disappears Breath whether include using for such as degree of approach broadcasting receiver or the miscellaneous equipment being associated with degree of approach broadcasting receiver its Its data.For example, order or instruction that message can include being performed for degree of approach broadcasting receiver are returned.In addition, data can Can be used for adapting to the configuration of the user preference of wireless identity emitter and/or wireless identity emitter by various equipment to include Data (or configuration information).For example, return message can include for degree of approach broadcasting receiver use or be transferred to local device, The software instruction of wireless identity emitter or various other associated equipment.If return message includes the data for using (that is, decision block 1106="Yes"), then in frame 1108, degree of approach broadcasting receiver can use the data returned in message. For example, degree of approach broadcasting receiver can perform and operate (for example, equipment to be arranged using the configuration data from return message To be adapted to the preference of user).If returning message not comprising data (that is, the decision block used for degree of approach broadcasting receiver 1106="No"), then degree of approach broadcasting receiver can continue the operation in decision block 702.
Lift a nonrestrictive illustrated examples:Degree of approach broadcasting receiver can be connected to and central server note An exercise apparatus in the health-care facilities (that is, facility is related to registration service) of volume.When degree of approach broadcasting receiver is from wanting When the wireless identity emitter entrained by user performed physical exercise on the exercise apparatus receives broadcast, degree of approach broadcast reception Machine can send to central server and aim at message.Degree of approach broadcasting receiver can be received from central server and return message, The return message include can be used for being configured to exercise apparatus the anatomic dimensions for being adapted to the user of wireless identity emitter and Data of the preference without shared user identity.For example, degree of approach broadcasting receiver can adjust the seat of equipment using data The height of chair or pedal.Another example is lifted, data can define the exercise routine to perform on exercise apparatus.Alternatively, Returning message can include that the health-care facilities of user are identified, and degree of approach broadcasting receiver can identify the health-care facilities of the user It is sent to home server (for example, gymnasium execute server).Home server can by the health-care facilities of user mark with Local data base is compared, and can come to send individual to degree of approach broadcasting receiver and exercise apparatus in response to comparative result Property configuration-direct.But returning other non-limiting illustrative applications of message data can include being sent out for wireless identity Penetrate machine user personalization using come configure taxi (for example, seat position, arrangement etc.) and computation module (for example, mouse, Keyboard light).
In one embodiment, the mark letter of the user that message can include can be used to recognize wireless identity emitter is returned Breath, such as photographs.For example, in response to receiving the return message for recognizing the user of wireless identity emitter, the degree of approach Broadcasting receiver can show the sample (for example, signing) of the image of user or the person's handwriting of user.It is ambulance paramedic, vigilant Citizen or businessman are attempting rapidly verifying the personnel's for being equipped with wireless identity emitter (for example, losing children, customer etc.) This function can be used during identity.In another embodiment, the degree of approach broadcasting receiver (example of the businessman of business transaction is participated in Such as, with the point of sale device of embedded degree of approach broadcasting receiver) aiming message can be sent, the aiming message includes most connecing The information that the wireless identity emitter of near user is broadcasted.Return message as a result can include being sent out with regard to wireless identity (that is, the personnel in shop are instructed to in central server for the confirmation that the identity and user for penetrating the register user of machine matches For wireless identity emitter, related user matches).In addition, if identity is identical, then returning message can include using In the extraneous information of auxiliary transaction, such as payment information, signal card number or the contact details for subsequent communications.
In another embodiment, the return message from central server can include degree of approach broadcast can be caused to connect Receive component, sensor, feature, software and/or function that machine maintenance changes, adjusts, removes, activates or disable degree of approach broadcasting receiver Software instruction and/or data.For example, returning message can include that degree of approach broadcasting receiver is held when receiving and returning message Capable or triggering degree of approach broadcasting receiver performs Preload routine or the software instruction into certain operational modes.It is such Operation that degree of approach broadcasting receiver can be performed, that degree of approach broadcasting receiver is configured that software instruction can be defined, Activation (or deactivation) CCD camera assembly, cellular network modem, speaker system, WiFi transceiver etc..Lift another One example, returning message can indicate that degree of approach broadcasting receiver (is such as configured to as degree of moving closer to broadcast reception Machine is come the smart phone that operates) perform application, send message (for example, Email, SMS, short range, wireless signals etc.) or will Turn itself off.Software instruction in such return message can include timing information, and the timing information indicates when to match somebody with somebody Put and/or reconfigure impacted component, sensor, feature, software and/or function.For example, returning message can include making Degree of approach broadcasting receiver disabling microphone is obtained up to the instruction of certain time period.In one embodiment, degree of approach broadcast reception Machine can be configured to:Over time and/or when degree of approach broadcasting receiver no longer to return related wireless of message When identity emitter receives broadcast, any modification identified in message is returned, adjustment, operator scheme is reversed to select or it It is configured.For example, as long as degree of approach broadcasting receiver receives broadcast, degree of approach broadcasting receiver from wireless identity emitter Just disable the loudspeaker on degree of approach broadcasting receiver.In another embodiment, degree of approach broadcasting receiver can be based on and connect The information in broadcast for receiving change, adjust, remove, activate or disable degree of approach broadcasting receiver component, sensing Device, feature, software and/or function.For example, degree of approach broadcasting receiver can process the broadcast that receives and perform inspection The software instruction for measuring, the software instruction indicates degree of approach broadcasting receiver disabling sensor (such as camera).
Figure 12 shows Figure 120 0 of the modules in central server 120.The hereafter mould in central server 120 Modules and component are described in the context of block, component and/or element.However, in various embodiments, central server 120 can include or be connected to can perform the operation being associated with following modules and/or component independent computing device, Blade server or other units.
As with reference to Fig. 1 descriptions, central server 120 can be configured to receive, store and otherwise process and The corresponding data of wireless identity emitter.For example, central server 120 can be configured to via internet 103 with it is each The equipment of kind (degree of approach broadcasting receiver 142 for such as being communicated via cellular network 121 and degree of moving closer to broadcasting receiver 138th, 102) Third party system 101 and other support systems and/or service exchange communication.
Central server 120 can include some component 104-109, and it is used to perform for processing data (such as from connecing The data that recency broadcasting receiver 142,138, Third party system 101 or other support systems and/or service 102 are received) Various operations.Specifically, central server 120 can include core component 108, and it can process aiming message, perform report Alert or notification engine module, process API (API) are ordered and handed over other components in central server 120 Change data.Core component 108 can include data layer module 1202, and it can be included for storing short-term data and specific to the The unit of the data of tripartite.Core component 108 can also include warning engine modules 1204, and it is used for generation and is transferred to the degree of approach Search of the warning message and initiation of broadcasting receiver to various Target Wireless identity emitters.Core component 108 can be with Including data anonymous device module 1206, it can generate extensive, anonymous or otherwise based on privacy policy or user The processed data of profile preference.For example, data anonymous device module 1206 can be from being sent to connecing of being associated with shop Personal information is removed in the return message of recency broadcasting receiver, so that not to the customer of store identification wireless identity emitter User, but will user in shop the fact report to shop.Core component 108 can also include privacy manager module 1208, it can safeguard privacy License Info for various users.For example, privacy manager module 1208 can include user in note The database of the privacy parameters provided during volume.In one embodiment, data anonymous device module 1206 and/or privacy manager Module 1208 can utilize following licenses.
Core component 108 can also include search manager module 1210 and authoring system module 1212, wherein search pipe Reason device module 1210 is used for aid in tissue and performs search.Core component 108 can also include aiming at splitter module 1214, its Identification can be used to by central server 120 to report with the aiming message received from degree of approach broadcasting receiver 142,138 The associated wireless identity emitter of broadcast.Core component 108 can include:API module 1216, it can include using In the function and interface of initiating operation;Polymerizer module 1218 is aimed at, it is used to synthesize each aiming message in a period of time For being transferred to businessman, third party and other services in the form of merging.Core component 108 can also include mixed-media network modules mixed-media 1220, it is used to send and receive via internet and equipment (such as degree of approach broadcasting receiver 142,138 and third party system System various communications 101).
Central server 120 can also include data warehouse component 104, and it is (for example, archived that it can store long term data User data, past positional information etc.).Data warehouse component 104 can be included for storage and wireless identity emitter The relevant information (profile information that such as user provides via registration of website) of user various databases.Data warehouse component 104 can be configured to the exchange data of data layer module 1202 with core component 108.Central server 120 can also include Operation, execution and management assembly 105, it can process and/or store and portal user access, script and instrument (for example, software Utility program, routine etc.) associated software.Operation, execution and management assembly 105 can be configured to and core component 108 Exchange data.
Central server 120 can also include developer's portal assembly 106, its can store developer's account data and Perform registration, account management and (such as register the confession that interacts with the user with wireless identity emitter 110 with developer Answer business or businessman) associated warning (or notice) supervisory routine.Central server 120 can also include portal user component 109, it can store user account data and perform and user (personnel being such as associated with wireless identity emitter 110) Associated registration, account management and search routine.Portal user component 109 and developer's portal assembly 106 can be configured It is the exchange data of authoring system module 1212 with core component 108.Central server 120 can also include rolling identifier (or ID) decomposes device assembly 107, and it can store factory's key for being associated with wireless identity emitter 110 and perform is used for By encrypted, the warp knit code in the aiming message for receiving, roll or otherwise Jing fuzzy identification information with it is attached Operation, software or routine that user data is matched.Roll identifier (or ID) decompose device assembly 107 can be configured to The exchange data of aiming splitter module 1214 of core component 108.
In various embodiments, modules and component (such as roll ID and decompose device assembly 107) can by software instruction, Using, routine, thread, circuit or hardware cell perform or otherwise realize.
Figure 13 shows the registration process for using in various embodiments.Generally, in the number related to broadcast According to before being processed by central server, central server may require wireless identity emitter, and (and/or degree of approach broadcast connects Receipts machine) and its user and central server registration.For example, any tracking related to wireless identity emitter, search or its Before its location-based activity is initiated, central server must be able to determine what is be associated with various wireless identity emitters User circulates in the world.Registration can create identifier, the wireless identity that wireless identity emitter sends in broadcast The link penetrated between machine and its user.For example, lead to regard to the children are found to send to the father and mother for losing children Know, the identifier of repeated Jing fuzzy (or warp knit code) must be with the cell-phone number of instruction father and mother as with regard to register user account institute The accounts information of storage matches.
Specifically, by registration, can between each wireless identity emitter and central server synchronization timing machine System (that is, random number or counter).Using such random number or counter, wireless identity emitter and central server can be with It is separately encoded (or rolling) identifier and decoding identifier, the body that thus will be associated with wireless identity emitter (and its user) Part remains hiding and privately owned.The optimal time of synchronous such timing mechanism or random number or counter can be It is as described below during facility registration and/or account creation process.For the purpose of Figure 13, mobile device (such as intelligence electricity Words) be described as being used by the user to performing account creation and registration operation (for example, mobile device access portal website with central authorities Server registration etc.).However, being connected to internet and communication being exchanged with central server via registration portal website Any computing device can be related.
In frame 1302, the mobile device (for example, iPhone, Android, tablet computer equipment etc.) of user can pacify Fill the application for being used together with wireless identity emitter.Such application (or " app ") can move as background service The selectivity that user is performed or alternatively can be activated on the processor of dynamic equipment is used.Such as throughout present disclosure Description, such application can enable mobile device process the short distance broadcast from immediate wireless identity emitter Message, such as by being broadcast and as responding the aiming message with positional information using the signal identification for receiving Relay to central server.In other words, the mobile device of user can be configured to:In addition to conventional calculating activity, Also perform the operation of degree of approach broadcasting receiver.
In frame 1304, mobile device can be sent with user profile (for example, equipment identities or " deviceID ") Registration request.Log-on message can be via with central server control or be otherwise accessible by portal website, website Or the internet communication of Website server is being sent to central server.In other words, mobile device can call registered Journey passes through to provide device id (deviceID) and central authorities by providing user profile (for example, device id) via the app for installing The other information that server can be used binds registration request and account.For example, the mobile device of user can access note Volume website, from user's receives input and using user input as data is activation to registration of website so that central server is used, As discussed above concerning Figure 12 descriptions.In one embodiment, user profile can include the personal information with regard to user, such as surname Name, address, contact details (for example, social network site, cell-phone number, e-mail address, phone number etc.), age and other people Mouth statistical information and the wireless identity emitter with regard to being associated with the account of user and/or degree of approach broadcast reception The identification information of machine.For example, it is sent to the sequence number that the user profile of central server can be included on wireless identity emitter And/or mobile device using in frame 1302 in response to operating the confirmation code for installing application to generate.User profile can also be wrapped Include preference information, the retail shop of such as user's preferences, product line and the region eaten or consume.It is right that user profile can also include How personal information is can be by central server distribution or using the privacy license for being indicated.In one embodiment, user Anonymous can be registered as, so that central server does not store any identification information with regard to user.For example, can register Account, the account be linked to non-descriptive P.O. Box, disposable cellular telephone number or directly identify account user or Other contact details of holder.This is for the service that may select to be provided using central server but concern about disclosure is private Or for those people of identification information be probably it is important.In frame 1312, the mobile device of user can store accounts information, Such as it is associated from the authentication information (for example, code, message) of central server or with the wireless identity emitter for possessing Device id.
In frame 1306, central server can receive the user profile for Account Registration.In frame 1308, central authorities' clothes Business device can be user's registration account.For example, central server can deposit the information (device identification including providing) of user Storage is in the database of all register users.In frame 1310, central server can provide a user with account creation information.Account Family creates information can include that authentication code or the mobile device of user can be stored for the other information for using in the future.For example, Central server can show on the addressable website of the mobile device of user the confirmation of account creation or alternatively to The mobile device at family sends confirmation signal, text message, Email or other communications.
In frame 352, wireless identity emitter can start.When wireless identity emitter starts, random number or counting Device value can be initialised.For example, wireless identity emitter can start the value of the process for increasing the expression time from null value.
In frame 1313, wireless identity emitter can broadcast the message of (or rolling) identifier including warp knit code (i.e., Broadcast).For example, wireless identity emitter can start often to send broadcast every few seconds.Wireless identity emitter can be with Rolling identifier is generated using embodiment as described below method.Generally, broadcast can include payload, and it can be with Including by performing the data that pseudo-random function is generated.For example, wireless identity emitter can be based on wireless identity emitter Device id, random number or Counter Value and key, seed or only for known to wireless identity emitter and central server The input value of other values is using pseudo-random function to generate encoded data.In one embodiment, pseudo-random function can To be polynomial time calculable functions, it can be utilized only for random known to wireless identity emitter and central server The seed of selection so that pseudo-random function can be computationally can not be defined in same domain with same pseudo-random function, What the random function of the output with same range was distinguished.In one embodiment, Keyed-Hash Message authentication code (HMAC) or Message authentication code (CMAC) based on password is used as pseudo-random function.
In one embodiment, wireless identity emitter may need to start using the operation in frame 1304 in mobile device It is activated in the second of predetermined quantity in the time of registration process.In other words, once wireless identity emitter start increase its with Machine number or Counter Value, user just must register in specific time period with central server.This makes central server in the waiting period Between attempt determining random number at wireless identity emitter or can only attempt certain amount of value during Counter Value.
In one embodiment, wireless identity emitter can by adjust broadcast payload in data come Indicate initial broadcast.For example, wireless identity emitter can change the bit in broadcast, and central server can compare this Spy is identified as indicating the initialization period of wireless identity emitter.If initialization designator, central service in payload Device can by avoid with central server searching data table in registration (or identification) wireless identity emitter phase The comparison of corresponding payload is come the comparison between accelerating the payload that receives and stored payload.
In frame 1314, the mobile device of user can receive broadcast.In other words, mobile device can be based on peace The application (or app) of dress is used as the running of degree of moving closer to broadcasting receiver.In response to initiating and central authorities' clothes via registration request The registration operation of business device, the application (app installed using the operation in frame 1302) of installation can wait to be received such Broadcast.In frame 1316, mobile device can send the rolling identifier and other information of wireless identity emitter, such as Stored device id and authentication information.In one embodiment, mobile device can be extracted from the broadcast for receiving The information of warp knit code, such as compares and/or parses operation by practical text.For example, can to perform highest effective for mobile device Bit operating.
In frame 1318, central server can receive disappearing for the information with warp knit code and authentication information and device id Breath.In frame 1320, central server can verify the authentication information such as in the message received from mobile device.It is concrete and Speech, central server can be compared authentication information with the information of generation in the operation in frame 1308-1310.In frame In 1322, central server can generate rolling set of identifiers using device id and possible random number or Counter Value. Central server can be compared the identifier of the warp knit code of the set with the rolling identifier received from mobile device. In one embodiment, central server can by using all pseudo-random function described above together with device id and it is multiple with Machine number or Counter Value are calculating encoded data set.For example, central server can be utilized and wireless identity emitter Device id and many indicated by shared seed, mobile device perform from 0 random number for starting or Counter Value it is pseudo- with Machine function.
In frame 1324, when central server identifies the identifier that rolls for receiving with the rolling in the set for being generated One in symbol when rolling match identifiers, central server can store the associated random number related to WIT or meter Number device value and time.Central server can using for generate matching roll identifier random number or Counter Value come with nothing The random number run on line identity emitter or counter synchronisation.In one embodiment, central server can be stored nothing Line identity emitter is described as by successful registration and/or the designator of synchronization.
In optional frame 1326, central server can then to user send registering result message, such as by Mobile device sends message.Registering result message can indicate whether central server can be by the mark of the warp knit code for receiving Symbol and the match identifiers for generating.In optional frame 1328, mobile device can receive registering result message.In a reality In applying example, registering result message indicate registration process failure (for example, receive by mobile device receive broadcast not with The wireless identity emitter of user is corresponding), mobile device can again taste by receiving and relaying another broadcast Injection test volume.
Aforesaid operations (the especially operation in frame 1313-1324) assume the Message Processing that performed by each equipment operate with And any propagation delay can than increase required by the random number or Counter Value at (or update) wireless identity emitter when Between it is much smaller.This may insure that wireless identity emitter and the difference of the random number at central server or Counter Value are not more than 1.
Figure 14 shows the embodiment of the aiming message received from degree of approach broadcasting receiver for central server process Method 1400.As described above, central server can be configured to, with modules, component, circuit and software taking aim to process Quasi- message.In decision block 1402, central server can determine whether aiming message is received.Central server can be docked Receive circuit, buffer, queue or other designators to be estimated to determine when from (the such as degree of approach broadcast reception of each equipment Machine) receive message.In one embodiment, central server can determine aiming and disappear using mixed-media network modules mixed-media as above Whether breath is received.Generally, it can (such as be sent via cellular network by internet via telecommunication to aim at message Packet) received.If central server is not received by aiming at message (that is, decision block 1402="No"), then central authorities Server can proceed the operation in decision block 1402.
If central server receives aiming message (that is, decision block 1402="Yes"), then in frame 1404, central authorities' clothes Business device can recognize wireless identity transmitter information, degree of approach broadcast reception machine information and associated number based on message is aimed at According to.Central server can be estimated, parse and with it to the various data and information section in the aiming message that receives Its mode becomes addressable.For example, central server can parse aim at message with recognize include from wireless body The broadcast of part emitter.Another example is lifted, central server can recognize the warp knit code corresponding with the following Data:Wireless identity transmitter identity (that is, rolling identifier), degree of approach broadcast receiver identification information (for example, receiver ID), positional information, timestamp information, sensing data (for example, accelerometer sensor data etc.) and degree of approach broadcast reception Identifier (for example, the list of application of installation, the execution on degree of approach broadcasting receiver of the associated application (or app) of machine Identifier of related app etc.).In one embodiment, central server can aim at splitter module using as above To perform the operation of frame 1404.
In frame 1406, central server can obtain wireless identity transmitting based on the rolling identifier in message is aimed at Identity.Central server can perform operation rolling identifier is decoded, descrambled, decrypted or it is otherwise made Become addressable.For example, central server can perform operation and be sent out with obtaining wireless identity using key or decoding algorithm Penetrate the identity of machine.In one embodiment, the operation of frame 1406 can roll ID point by central server by as above The mode of solution device assembly is performing.For example, central server can be caused to aim at splitter module and roll ID decomposition device assemblies Exchange data is obtaining decoded wireless identity sender unit identification symbol.Described below is includes rolling identifier for being based on The embodiment that message is aimed to recognize wireless identity emitter is operated.
In frame 1408, central server can obtain wireless identity based on obtained wireless identity transmitter identity Transceiver user information.For example, central server can obtain the user account information related to wireless identity emitter, such as Demographic information, the data (for example, take action path, position history etc.) for indicating previous behavior of storage.In a reality In applying example, the operation of frame 1408 can be performed by central server by way of authoring system module as above.Example Such as, central server can cause authoring system module to exchange wireless identity transmitter identity information to obtain with portal user component Obtain the user profile preserved such as in user registry database.
In frame 1410, central server can obtain the degree of approach based on recognized degree of approach broadcast reception machine information The service of broadcast receiver identification information, such as degree of approach broadcasting receiver user profile and correlation.For example, central server can Businessman's identity, the degree of approach broadcast reception being associated with the degree of approach broadcasting receiver for obtaining with send received aiming message Follow-up service and any other information related to degree of approach broadcasting receiver that machine registration is participated in.Central server can be with Obtained based on the information in message is aimed to the user-dependent e-mail address of related degree of approach broadcasting receiver, MAC Address, phone number and other contact details.For example, central server can determine related to degree of approach broadcasting receiver Connection, the user contact infonnation that can be used for from the subsequent transmission of central server, such as indicate to be close to item of interest purpose The Email or SMS text of degree.In one embodiment, central server can determine and be configured to perform mobile connecing The identity of the user of the smart phone of the operation of recency broadcasting receiver.In one embodiment, the operation of frame 1410 can be by Central server is performed by way of authoring system module as above.For example, central server can cause to authorize System module exchanges degree of approach broadcasting receiver identity information to obtain with regard to such as in exploitation with developer (user) portal assembly The information of the related registration service (for example, businessman, shop, supplier, service etc.) preserved in person's registration database.
In optional frame 1411, central server can authenticate aiming message.Based in the aiming message for receiving Authentication information, central server can perform authentication operation, and authentication operation confirms as the legitimacy for aiming at message from known Or otherwise effective degree of approach broadcasting receiver.As described above, aim at message can include having can be used to confirm that The data of the identity of the degree of approach broadcasting receiver of effect, such as secret identification code, certificate or hash.Because third party may taste The degree of approach broadcasting receiver that is associated with registration service is pretended to be in examination, and (for example, the spammer of malice may attempt to lead to Cross and send fraudulent aiming message to imitate the shop degree of approach broadcasting receiver of businessman), therefore central server can examine Authentication information is looked into, the authentication information confirms that the information aimed in message is useful and (it is legal for example, to dispose with registration service The registration businessman of degree of approach broadcasting receiver, effective developer or other sides) it is related.For example, central server can be examined Survey the header letter that the Jing related to the businessman set up as registration developer in central server aimed in message is obscured Breath.(all degrees of approach broadcast in such as certain building of the desired authentication information of central server is not included when message is aimed at The special code that receiver is owned by) or include the authentication information not matched that with the information stored in central server really When, central server can ignore aim at message and it is all including information.For example, believe with out-of-date or incomplete certification The aiming message of breath can be ignored by central server, or alternatively be stored in potential duplicity degree of approach broadcast reception In the list of machine.
In optional frame 1412, central server can generate Hash number based on the data that institute obtains and/or obtains According to.In one embodiment, the operation of frame 1412 can be by central server by data anonymous device module as above Mode is performing.In frame 1414, central server can based on the aiming message related to wireless identity transmitter identity come Data storage.For example, central server will can be recognized from aim at the associated data storage of message with it is wireless In the database of the decoded identity correlation of identity emitter.In one embodiment, the operation of frame 1414 can be by central authorities Server is performed by way of data layer module as above.
Figure 15 shows the embodiment of the aiming message received from degree of approach broadcasting receiver for central server process Method 1500.Similar to said method 1400, difference is that central server can perform method 1500 to method 1500 Send the message that the third-party application for performing on the mobile device that user carries is used.As described above, central server can With to various recipients (mobile device being such as associated with user) send various message (such as, return message, report to the police (or Search activate message)).For example, central server can be wide to the tablet computer of user, smart phone, degree of moving closer to Broadcast receiver or other computing devices send message.Recipient is additionally may included in the application or app performed on mobile device. In one embodiment, central server can be with to other third party recipients or equipment sending message, such registration service Can include suddenly asking medical worker (EMT), fireman, local police, retail shop, businessman's computing device or Advertisement Server.
Central server can be sent in response to receiving the message for aiming at message to send so that (such as user carries to equipment Mobile phone or degree of moving closer to broadcasting receiver) notify known wireless identity emitter the degree of approach position.For example, When degree of approach broadcasting receiver (the static degree of approach broadcasting receiver in such as retail shop) is relayed from being associated with user During the broadcast of wireless identity emitter, central server can be by sending back for indicating to use to the mobile device of user Message of the family near the degree of approach broadcasting receiver in shop is being responded.Additionally, the run on the equipment of user the 3rd Fang Yingyong can use the information in message.For example, on the smart phone of user run retail shop app can receive with regard to User is moved into the notice in the degree of approach of the viewing area in the degree of approach in retail shop building.In each other embodiments In, third-party application can be used for tracking the project being associated with wireless identity emitter for possessing.For example, specific third party Applying can perform the tinkle of bells when user is in the degree of approach of the loss children of search.
In decision block 1402, central server can determine whether aiming message is received.If central server does not have Aiming message (that is, decision block 1402="No") is received, then central server can proceed in decision block 1402 Operation.If central server receives aiming message (that is, decision block 1402="Yes"), then in frame 1404, central service Device can recognize wireless identity transmitter information, degree of approach broadcast reception machine information and associated number based on message is aimed at According to.In frame 1406, central server can obtain wireless identity transmitting fuselage based on the rolling identifier in message is aimed at Part.In frame 1408, central server can obtain wireless identity transmitting based on obtained wireless identity transmitter identity Machine user profile.In frame 1410, central server can be connect based on recognized degree of approach broadcast reception machine information to obtain The service of recency broadcast receiver identification information, such as degree of approach broadcasting receiver user profile and correlation.In optional frame In 1412, central server can generate hash based on the data that institute obtains and/or obtains.In frame 1414, central authorities Server can be based on the aiming message related to wireless identity transmitter identity come data storage.
In decision block 1502, central server can determine whether third-party application (or app) is allowed to have and obtain Degree of approach broadcast reception machine information.In other words, based on user store in central server and wireless identity emitter Associated data, any registration service or third-party application that central server can be associated with the equipment of user.For example, Central server can assess database information so that whether identifying user is mounted with and zero on his/her smart phone Sell shop corresponding third-party application.(for example, degree of approach broadcast reception machine information can include degree of approach broadcast receiver identification ID codes or identifier) and degree of approach broadcasting receiver user identity.In one embodiment, central server can be based on Third-party developer's right (such as indicating when third-party registration is developer or registration service) is based instead on The license of user as described below arranges to recognize whether third-party application is allowed to such information.In one embodiment, Central server can be using the application identification information provided in the aiming message for receiving come the on the equipment for determining user Whether tripartite's application can receive degree of approach broadcast reception machine information.For example, aiming at message can be comprising corresponding with message is aimed at And therefore be allowed to from central server receive any degree of approach broadcast reception machine information application designator (for example, app ID)。
If third party app is not allowed to have obtained degree of approach broadcast reception machine information (that is, decision block 1502= "No"), then in frame 1506, central server can send the wireless identity only included from message is aimed to the equipment of user The message of transmitter identification information and associated data.For example, the message that central server sends can include from aiming disappearing Wireless identity transmitter identity, user profile, time stamp data and positional information that breath is obtained.If third party app is allowed to With the degree of approach broadcast reception machine information (that is, decision block 1502="Yes") for being obtained, then in frame 1504, central server Wireless identity transmitter identification information, the degree of approach broadcasting receiver included from message is aimed at can be sent to the equipment of user The message of information and associated data.For example, central server can include institute to the message that the smart phone of user sends Obtain the designator (for example, sequence number, attached, businessman's classification of group etc.) of degree of approach broadcast receiver identification.Subsequently, central authorities' clothes Business device can proceed the operation in decision block 1402.In one embodiment, central server can be using such as above The warning engine modules of description are sending and/or generate the message for being transferred to each equipment.
Figure 16 shows embodiment call flow diagram 1600, it illustrates wireless identity emitter, degree of approach broadcast reception Communication between machine and central server.As described above, wireless identity emitter can be via short-distance wireless unit regularly Send short distance broadcast 802.When degree of approach broadcasting receiver is in the range of signal of broadcast 802, the degree of approach is wide Broadcasting receiver can receive broadcast 802 using similar short-distance wireless unit.Broadcast 802 can degree of being approached The data of broadcasting receiver process and correlation can be relayed to central server as aiming message 804.In an enforcement In example, aiming at message 804 can include that the mark of broadcast, degree of approach broadcasting receiver and/or wireless identity emitter is believed Breath, the encrypted information that degree of approach broadcasting receiver can decode that and other letters related to the reception of broadcast 802 Breath.In one embodiment, aim at message 804 can be by can be configured to via Internet protocol communicated it is each Kind wirelessly or non-wirelessly network is sending.
Central server can receive and process aiming message 804.When central server is based on the letter aimed in message Breath (for example, the metadata of request response aiming message related to the wireless identity emitter for receiving firmware updating is needed etc.) During determining that aiming at message 804 requires response, central server can generate return message 1602 and send it to close Degree broadcasting receiver.In various embodiments, returning message 1602 can include configuration information, wireless identity emitter is carried out The identification information of description or other data as above.Degree of approach broadcasting receiver can receive and process return message 1602.Based on the data returned in message 1602, degree of approach broadcasting receiver selectively can be sent out to wireless identity emitter Message 1604 is sent, the message 1604 includes the configuration information and other data from central server.Wireless identity emitter can Optionally to receive transmission, such as message 1604 using operation as above.
Used as another scheme, degree of approach broadcasting receiver can be sent based on message 1602 is returned to home server Message 1606.Message 1606 can be included from returning the wireless identity transmitter identification information of message 1602, configuration information, soft Part routine and various other data, the storage carried out for home server, are processed and additionally using otherwise.Base In message 1606, home server can send optional response message 1608, the response to degree of approach broadcasting receiver then Message 1608 can include software instruction, configuration data or other data generated in response to receiving message 1606.
In one embodiment, central server directly can also send to home server (not shown) and include with confidence The message of breath and other data.For example, the aiming message 804 from degree of approach broadcasting receiver can be with the contact of home server The contact details can be used for subsequent communications by information, central server.
Figure 17 shows the embodiment of the aiming message received from degree of approach broadcasting receiver for central server process Method 1700.Generally, based on the information aimed in message, central server can recognize that wireless identity emitter (and related is used Family), determine whether there is relation between degree of approach broadcasting receiver and wireless identity emitter (that is, with registration service phase Close) and send the return message having based on the various data and/or information for aiming at message.Therefore, it can wide to the degree of approach Broadcast receiver and return message is provided, so that not including the identification information with regard to wireless identity emitter.This can make the degree of approach Equipment as above, equipment or other facility individual characteies are anonymously turned to and are beneficial to wireless identity emitter by broadcasting receiver User and underground his/her identity.For example, the return message from central server can include the user of an equipment Configuration data and not including user identity.In one embodiment, method 1700 can be combined by central server and is used for Execution is performed as discussed above concerning the degree of approach broadcasting receiver of the operation of the method 1100 of Figure 11 descriptions.In each embodiment In, such message that returns can be sent to the wireless of any equipment related to the aiming message for receiving and/or correlation Identity emitter, the third party's (for example, emergency services, retail shop etc.) being such as associated with aiming message or user.
In decision block 1402, central server can determine whether aiming message is received.If being not received by taking aim at Quasi- message (that is, decision block 1402="No"), then central server can proceed the operation in decision block 1402.If connect Aiming message (that is, decision block 1402="Yes") is received, then in decision block 1702, central server can determine wireless identity Whether transmitter identity is known.In other words, central server can perform the frame 1404- as discussed above concerning Figure 14 descriptions Operation in 1410, the data in the aiming message for receiving to be estimated, being decoded, being decrypted and otherwise to be carried out Access determine if to include with to central server registration and therefore the wireless identity that is associated of user already authenticated send out Penetrate identity (or identifier).For example, central server can be solved to the rolling identifier in the aiming message that receives It is close, with recognize wireless identity emitter device identifier and can by the identifier with storage represent all register users And/or the information of equipment is matched.
If wireless identity emitter is not known (that is, decision block 1702="No"), then central server can be Ignore aiming message in frame 1703 and continue executing with the operation in decision block 1402.If wireless identity emitter is known (that is, decision block 1702="Yes"), then in frame 1414, central server can be stored and wireless identity based on message is aimed at The related data of transmitter identity, the position data aimed in message is such as stored in the user's phase with wireless identity emitter In the database of pass.
In decision block 1704, central server can determine whether the aiming message for receiving is related to registration service. In other words, central server can be compared the information obtained from aiming message with registration service list, be taken aim at determining Quasi- message be whether effective (or certified) and whether with the third party, businessman registered to central server or other clothes Business is corresponding.In order to make the determination, central server can be analyzed and mark is connect to the aiming message for receiving Any metadata of recency broadcasting receiver or header information, the theme for aiming at information or with regard to degree of approach broadcasting receiver and/ Or send and aim at other descriptive informations of the wireless identity emitter of broadcast that message is reported and be estimated.For example, Aiming at message can include the metadata that instruction aiming message is in response to be sent by degree of approach broadcasting receiver in activity warning.Replace Dai Di, aiming at message can be comprising instruction and specific supplier's facility or the header information of the correlation of service.For example, aiming disappears Breath can include metadata (for example, the retail shop for indicating that degree of approach broadcasting receiver is associated with specific third-party application app).Another example is lifted, central server can be estimated to aiming at the metadata in message, to detect mark and market The associated registration businessman of marketing service or data collection plan or the code of retail shop.If sending degree of approach broadcasting receiver Not by central server registration, certification or otherwise, it is known that then aiming message can not be related to registration service.
If aiming at, message is not related to registration service (that is, decision block 1704="No"), then central server can be after The continuous operation being determined in frame 1402.
If it is really related (i.e., really to registration service (such as effective provider service or activity are reported to the police) to aim at message Determine frame 1704="Yes"), then in frame 1706, central server can generate return message.Returning message can be included to taking aim at What quasi- message, degree of approach broadcasting receiver, related service, the time for receiving aiming message and other information data were indicated Information.
In decision block 1708, central server can determine whether degree of approach broadcasting receiver is allowed to receive mark letter Breath.In other words, central server can determine whether degree of approach broadcasting receiver has license or whether be authorized to be and connect Receive the identification information of wireless identity emitter.For example, based on aim at message in for indicate degree of approach broadcasting receiver with supply The metadata for answering business or registration service associated, central server can determine the mark of wireless identity emitter (or its user) Can be not included in returning in message.In one embodiment, central server can be based on degree of approach broadcasting receiver Identity and its associated service to the database that stored description information is permitted being estimated.For example, database can be with Indicate that degree of approach broadcasting receiver is associated with service of the reception with regard to the identification information of wireless identity emitter is allowed to.Lift another One example, using based on the user totem information that message is obtained is aimed at, central server can search user's license to recognize Whether user authorizes the shared user data of registration service.
If degree of approach broadcasting receiver is allowed to receive identification information (that is, decision block 1708="Yes"), then central authorities' clothes Identification information can be attached to return message by business device in frame 1710.For example, returning message can include user name, customer ID, the address of the user of wireless identity emitter and/or name.
If degree of approach broadcasting receiver be not allowed to receive identification information (that is, decision block 1708="No") or if Identification information is attached to return message by central server in frame 1710, then in frame 1712, central server can determine With the presence or absence of the stored data related to wireless identity emitter and registration service.Central server can be disappeared based on aiming Cease to be estimated database, and recognize degree of approach broadcasting receiver, its associated equipment or service (for example, locally Server) and/or wireless identity emitter whether require data.The example of such data can include firmware, software instruction, Configuration information, Proprietary Information (for example, customer ID), action message are (for example, to nothing related to degree of approach broadcasting receiver in the recent period The information that line identity emitter activity is described) or any other relevant information.Central server can use wireless body Part transmitter identification information inquires about database with reference to degree of approach broadcast receiver identification information, with Test database can be with It is included in the data returned in message.For example, return message can include will degree of being approached broadcasting receiver use it is wireless The customized information of the user of identity emitter.In one embodiment, database can indicate degree of approach broadcasting receiver with The service (for example, supplier, businessman etc.) proprietary data being stored in central server database is associated.
If there is stored data (that is, decision block 1712=related to wireless identity emitter and registration service "Yes"), then in frame 1714, central server can be returned being attached to regard to the data of registration service and wireless identity emitter Return message.If there is no stored data (that is, decision block 1712=related to wireless identity emitter and registration service "No") or if data have been attached, then in frame 1716, central server can be to such as degree of approach broadcasting receiver Send and return message.Subsequently, central server can continue executing with the operation in decision block 1402.
Figure 18 to show and determine whether degree of approach broadcasting receiver has been out wireless identity transmitting for central server The embodiment method 1800 of machine.In central server, degree of approach broadcasting receiver can be associated with wireless identity emitter. For example, degree of approach broadcasting receiver can be with it is wireless in assets (for example, wallet, handbag, luggage, medicine bag, clothes etc.) The smart phone of the associated user of identity emitter.In response to cannot from connecing that specific wireless identity emitter is associated Recency broadcasting receiver is received and aims at message, and central server can be configured to send for indicating wireless identity emitter (and its be connected to object) lose, not, pass out of mind or otherwise not disappearing near degree of approach broadcasting receiver Breath, such as alerts.The embodiment method 1800 can be used for fettering some assets, such as property, pet and child.For example, when Child runs from father and mother, and the broadcast from the wireless identity emitter of child no longer may be connect by the degree of approach broadcast of father and mother Receipts machine is received.As a result, the degree of approach broadcasting receiver of father and mother may not send to central server and aim at message, and central authorities' clothes Business device can determine that child has wandered away or run.
In frame 1802, central server can register the pass between degree of approach broadcasting receiver and wireless identity emitter System, such as by storing information in database.In various embodiments, each degree of approach broadcasting receiver and wireless identity Emitter may relate to big magnitude relation.Furthermore it is possible to be based on via user input data from portal website to central server come Storage relation information (for example, user can access website and indicate his/her all wireless identity emitters).So Registration during, central server can point out user provide central server wireless identity emitter lose or with other sides Formula should send the condition of message when beyond the degree of approach of degree of approach broadcasting receiver.For example, user can be input into central clothes The configuration data that business device is stored, if the configuration data indicates degree of approach broadcasting receiver between some of one day hour Without broadcast is received from wireless identity emitter, then central server should send alert message.
In decision block 1804, central server may determine whether to be close to from related to wireless identity emitter Degree broadcasting receiver receives aiming message.In other words, based on whether receiving such aiming message, central server can To determine wireless identity emitter whether near degree of approach broadcasting receiver.Central server can also be within a time period The aiming message of reception is estimated to determine wireless identity emitter connecing in (or crossing in the recent period) degree of approach broadcasting receiver In recency.In one embodiment, central server can determine whether it receives each nothing for registering in relation The aiming message of line identity emitter.For example, if registration relation includes multiple wireless identity emitters, central server can Can expect from degree of approach broadcasting receiver to receive the aiming message with regard to all wireless identity emitters.If central server connects Receive the aiming message (that is, decision block 1804="Yes") related to wireless identity emitter, then in optional frame 1805, in Centre server can wait a period and can proceed the operation in decision block 1804.In various embodiments, central authorities Server regularly (such as per every few seconds, a few minutes or a few houres) can perform operation in decision block 1804.
If central server is not received by aiming message (that is, the decision block 1804 related to wireless identity emitter ="No"), then in frame 1806, central server can be sent for indicating the message that wireless identity emitter is lost.Each In individual embodiment, what central server can be associated to degree of approach broadcasting receiver with the user of degree of approach broadcasting receiver Miscellaneous equipment (for example, smart phone, tablet computer), and/or any other equipment related to wireless identity emitter Send such message.For example, when wireless identity emitter is lost and is associated with children, central server can be to police Examine server and send alert message.
Figure 19 shows the embodiment method 1900 that can be realized in central server.Method 1900 can be by central authorities' clothes Business device in response to receiving from degree of approach broadcasting receiver in response to aiming at message to perform, wherein aim at message including by wireless body The data of the warp knit code of part emitter initially broadcast, rolling or its alternate manner protection.Can be by for each wireless body Part emitter protects wireless identity emitter using the identifier (therefore identifier is changed over) for rolling or changing at random User privacy.Can be regularly or based on particular event (such as when wireless identity transmitter broadcasts identifier is up to specific time Number or up to when special time period (for example a, hour) or after one or more pairings) generating new identifier.Mark This rolling of symbol can be coordinated with central server, so that wireless identity emitter still can be tracked.For example, wireless body Part emitter and central server can have for generate on common time the puppet of safety on password of identifier with Machine number maker algorithm, so that in any given time, central server can calculate specific wireless identity emitter just In the identifier for sending.
It is important to generate and roll other methods of identifier or obfuscation identifier, and reason is that it can be prevented from the The Sniffing Attack of tripartite.For example, if identifier is static, third party can such as by pretending to be degree of approach broadcast reception Machine carrys out sniff to the identifier, and subsequently tracks using the identifier wireless identity emitter.If third party is without puppet Random number generator or other units for generating newest rolling identifier, then rolling identifier can make this attack into For impossible.
In frame 1902, central server can receive the wireless body in the aiming message of degree of approach broadcasting receiver The rolling identifier of part emitter.In frame 1904, central server can roll identifier and by sending out with wireless identity The code for penetrating shared algorithm (such as pseudo-random function or the AES with the shared key) calculating of machine is compared.Algorithm Can be used for calculating the rolling mark for being expected to generate within a period with wireless identity emitter and broadcast by central server Know software instruction, routine, algorithm, circuit or the module of the code of symbol alignment.In various embodiments, central server can be by The identifier for receiving is compared with ensuing some codes, in case missing some identifiers.If the mark for receiving Symbol is generated or desired any code match with central server, then in frame 1906, central server can be by matching mark Know symbol and any associated data to be associated with the sequence code corresponding to wireless identity emitter.So, if central authorities' clothes Business device receives after a while the user's request of the sequence code with wireless identity emitter and (such as localizing children is carried from father and mother Wireless identity emitter request), then central server can find all preceding match and any associated data, and Need not search for each previous rolling identifier.
In one embodiment, when the search to Target Wireless identity emitter is initiated, central server can be used Shared algorithm and information (for example, key) are generating the target device ID sent in warning message.In this embodiment, often When Target Wireless identity emitter is scheduled as rolling its identifier, can resend with updated target device ID Warning message.Be discussed herein below various algorithms for generating the identifier for rolling identifier or other warp knit codes and other Decoding algorithm.
Figure 20-24C are shown for synchronous random number or counter between wireless identity emitter and central server To realize sending and receiving the various embodiment methods of the fuzzy information of Jing.Wireless identity emitter can be performed for broadcast packet The various methods of the message of the fuzzy identifiers of Jing and data (that is, payload) are included, identifier and data that wherein Jing is obscured To central server marks wireless identity emitter and to the relative reading of offer wireless identity transmitter clock.Equally, in Centre server can perform the message fuzzy for processing the Jing corresponding with wireless identity emitter in the message for receiving Various methods.As described above, the broadcast from wireless identity emitter can be by directly or through intermediate equipment (such as sending the degree of approach broadcasting receiver for aiming at message) is sent to central server.
Because the privacy for being not intended to tracking with regard to the said equipment is worried, wireless identity emitter can be by only to central authorities' clothes Measure (encryption that for example, pseudo-random data is generated) is obscured known to business device and wireless identity emitter and carrys out fuzzy sent disappearing Message in breath.In one embodiment, wireless identity emitter can safeguard it is being represented by random number or Counter Value and Once can the clock that begins to of equipment operable (for example, being activated by the insertion of battery) or timer mechanism.Clock can Being relative low quality and therefore (such as central server is (for example, by cycle atomic clock reading school unlike more accurately clock Accurate clock)) can drift about.Counter or random number can be the non-duplicate numbers that wireless identity emitter is generated, and can Change when being encoded to its identifier for broadcast with each wireless identity emitter, such as change per hour once or very To each broadcast message variation once.In various embodiments, it is possible to use pseudo-random function or other AESs are (for example, AES) random number or counter (or Counter Value) are encrypted or be encoded.For example, wireless identity emitter can be utilized AES-CTR block encryptions are generating the rolling for including broadcast encoding to random number or Counter Value to produce The random number used during the payload of dynamic identifier.Another example is lifted, can be by by linear feedback shift register (LFSR) it is applied to random number or Counter Value to generate random number.
As described in throughout present disclosure, wireless identity emitter can also store unique device identification number or equipment mark Know number (that is, device identifier or ' deviceID ') and be predetermined and be equipped with every collaborative share key (or K), wherein being total to per equipment Enjoy key to be associated with the unique identifier at central server.For example, central server can by unique device identifier and Key storage in database and can safeguard with central server registration all wireless identity emitters deviceID Table with K pair.Central server can be using device identifier and key together with other information (random number such as reported or meter Number device value) it is identified, decodes and otherwise processes come the message fuzzy to the Jing from wireless identity emitter. In one embodiment, in order or device identifier (or deviceID) can be randomly generated.
Figure 20 show recognize for central server it is encrypted in the message broadcasted by wireless identity emitter The embodiment method 2000 of the wireless identity emitter that data are indicated.In frame 2002, wireless identity emitter can be received altogether Enjoy key (that is, " K ").In other words, wireless identity emitter can be predetermined and be equipped with every collaborative share key (K), such as exist During manufacture.In another embodiment, wireless identity emitter can receive wide from immediate degree of approach broadcasting receiver Key in the message broadcast.The key can be with the unique device identifier of the wireless identity emitter at central server (i.e., DeviceID) it is associated.
In frame 2004, wireless identity emitter can be via AES (for example, the AES- similar to stream transmission CTR is encrypted) being encoded to generate rolling to device identifier (deviceID), key (K) and random number or Counter Value Identifier." AES-CTR " is in the secret pattern for realizing Advanced Encryption Standard (AES) that National Standards Technical association is recommended One kind.In one embodiment, wireless identity emitter can include that the AES associations for being configured to support " CTR " pattern are processed Device.In one embodiment, rolling identifier can be represented by below equation:
Rolling identifier=(deviceID | | data) XOR (MSB_N (AES_K (t)))
Wherein t is the value (for example, 20 bit value) of the random number of wireless identity emitter or counter, and ' XOR ' indicates to press Position XOR, ' AES_K () ' is the AES block encryptions for utilizing key ' K ', and ' MSB_N () ' means that ' N ' individual highest has Effect bit (for example, 60 bit).The rolling identifier can subsequently be included in the broadcast that wireless identity emitter periodically sends In message.In one embodiment, miscellaneous equipment data (for example, electricity can be sent in broadcast packe together with identifier is rolled Water is flat, temperature etc.).
In a further embodiment, other information can be included in rolling identifier.Therefore, it is wireless except providing Outside the Jing of identity emitter fuzzy identifier, roll what identifier field be able to can be recovered including only central server Jing fuzzy data.Method for completing this point is (such as indicating battery status (bat_stat) by extraneous information Several bits) with device identifier (deviceID) cascade and XOR function is applied to into the cascade.Rolling can be included in Amount (that is, the ratio of information of (that is, rolling what the Jing in the identical data field of identifier the was obscured) extraneous information in dynamic identifier Special quantity) limited by length N for rolling the significant bit in identifier field.Therefore, if in the number for carrying rolling identifier According to there is more bits to be available in part, then more such data can be included in encrypted rolling identifier In.Roll the data in identifier and may change over due to being included in, therefore the method can further obscuring device Identity.
Desire to sending more data in broadcast, then there can be data to carry the number with unencryption or encryption Some data according in.There are various methods in broadcast including data (for example, battery levels, temperature etc.).Remove It is as above to include data outside rolling in identifier, can using data with roll the ending cascade of identifier as Data payload specific to manufacturer, before or after identifier is rolled, as unencrypted sensing data adding Plus data.Therefore, if there is more bits to be available in the data payload specific to manufacturer, these bits can For transmitting unencrypted data.Alternatively, it is possible to use with for generate roll identifier key identical key or Replacement key or such data field come to data known to the central server that person will be associated with wireless identity emitter Encoded.In the alternative, roll identifier in information enable the server to determination equipment real identifier and For the encryption key that other data included to message are encrypted.In a further embodiment, can be used in combination in These options of other data are carried, so that some data in data are included in rolling identifier, some data quilts Unencrypted carry and/or some data can be with encrypted and be included in broadcast.
In frame 2006, wireless identity emitter can subsequent broadcast, the message includes random number and rolls mark Symbol only includes rolling identifier (that is, not including random number).In one embodiment, broadcast can be single packet Length bluetoothWarble message.In various embodiments, the random number that broadcast includes can be 20 bits and rolling Dynamic identifier can be 60 bits, therefore whole broadcast is 80 bits.
Embodiment as one example, wherein, battery status is included in rolling identifier, broadcast (or broadcast disappears The payload of breath) can be represented by below equation:
Payload=t | | (deviceID | | bat_stat) XOR (MSB_N (AES_K (t)))
Wherein t is the value of the random number of wireless identity emitter, and it can only be random number or counter (for example, 20 ratio Paricular value), ' bat_stat ' is the battery status information (for example, 4 bit code) of equipment, ' | | ' mean cascade, ' XOR ' indicates to press Position XOR, ' AES_K () ' is the AES block encryptions for utilizing key ' K ', and ' MSB_N () ' means that ' N ' individual highest has Effect bit (for example, 60 bit).In other words, in addition to the scroll indicator including battery level indicator, embodiment is wide Broadcasting message can also include unencrypted (that is, without encrypted) random number.In another embodiment, battery levels are indicated Symbol (that is, bat_stat) can not be encrypted, and can be included in another field of broadcast, is such as included In service general unique identifier (UUID) part of message.
In another embodiment, payload can not include random number t, and in this case, payload can be with Represented by below equation:
Payload=(deviceID | | bat_stat) XOR (MSB_N (AES_K (t)))
In frame 2010, central server can be received such as during the account creation described above with reference to Figure 13 is operated Shared key (K).For example, central server can receive Account Registration information in response to the user from wireless identity emitter (for example, deviceID and registration information) is generating key.In frame 2012, central server can be by shared key (that is, K) is associated with the device identifier (that is, deviceID) of wireless identity emitter.For example, central server can be by DeviceID and K are stored in the tables of data of registration equipment.
In frame 2014, central server can receive including random number or counter and roll the message of identifier. For example, the message for receiving can be from the aiming message of degree of approach broadcasting receiver, and it includes wireless identity emitter profit With the information of the operation broadcast in frame 2006.In frame 2016, central server can be extracted at random from the message for receiving Number or counter, and rolling identifier can be extracted in frame 2018.In frame 2019, central server can select to comment The wireless identity emitter (that is, the wireless identity emitter of selection) estimated.In other words, central server can be obtained in Centre server be it is known registration wireless identity emitter stored deviceID, K and random number or counter, such as from For obtaining in the database or tables of data that store this information of all registration wireless identity emitters.In frame 2020, in Centre server can be via the identical with random number or the key (K) of counter and selected wireless identity emitter Decode similar to the AES (for example, AES-CTR) of stream transmission and roll identifier to generate decoded device identification Symbol (or M).For example, central server can be operated based on AES-CTR algorithms come perform decoding, wherein, AES-CTR algorithms are used Roll the key (K) of selected wireless identity emitter that identifier includes as input together with the message for receiving and with Machine number or counter.
In one embodiment, decoded device identifier (M) can be represented by below equation:
M=(rolling identifier) XOR (MSB_ { N-a } (AES_K (t)))
Wherein t is the value (for example, 20 bit value) of the random number of wireless identity emitter or counter, and ' XOR ' indicates to press Position XOR, ' AES_K () ' is the AES block encryptions for utilizing key ' K ', and ' MSB_ { N-a } ' means that ' N-a ' is individual most High significant bit (being for example, 56 bits when a is 4 bits and N is 60 bit).
In decision block 2022, central server can determine whether are decoded device identifier (M) and deviceID Matching.In other words, for its key (K) is used to obtain decoded device identifier (M) together with AES-CTR algorithm operatings Selection wireless identity emitter, central server can be compared decoded device identifier (M) with deviceID Compared with.If M matches (that is, decision block 2022="Yes") with deviceID really, then in frame 2024, central server can be by Broadcast is identified as what is originated from the wireless identity emitter for selecting.If M and deviceID do not match that (that is, it is determined that Frame 2022="No"), then in frame 2026, central server can utilize the key being associated with other wireless identity emitters To decode rolling identifier.For example, central server can select next registration wireless identity emitter and using corresponding Stored key (K) and corresponding deviceID pair.In this way, central server can be attempted for all registration nothings All K of user's storage of line identity emitter and/or system and deviceID pair, originate until finding identification broadcast Till the matching of person.
Figure 21 A show for wireless identity emitter generate and broadcast for central server receive/use it is encrypted Message (that is, roll identifier) embodiment method 2100.
In frame 2102, the user of wireless identity emitter can register equipment with central server.Wireless identity is launched The service that machine is used may require the registration of all vehicular equipments that user (for example, consumer, owner etc.) uses.Registered Journey can include the initial synchronisation with central server that wireless identity emitter is carried out.For example, the use of wireless identity emitter Family can be come by the Web applications that can receive wireless identity emitter message and in mobile device or PC by user operation Equipment and central server are registered.Can require wireless identity emitter from equipment activation special time period in Central server is registered.Can require that wireless identity emitter starts in equipment and (for example, battery is placed on into wireless identity emitter It is interior) after first 24 hours in register.Registration operation is further described above with reference to Figure 13.
In frame 2104, wireless identity emitter can initialize internal random number or counter, such as by by random Number or counter are set to null value.Random number or counter initialization may be because trigger event be (in such as wireless identity emitter Battery or power supply placement) and occur.For example, once wireless identity emitter is activated or is powered, random number or counter Just can start to increase.Alternatively, initialization can be in response to what is occurred in above-mentioned registration process.Random number or counter can be with From ' 0 ' (or any other initial value, such as ' 1 ') start and can regularly be increased by wireless identity emitter.At one In embodiment, when the battery of wireless identity emitter changed (for example, due to battery failures) or wireless identity emitter with When alternate manner is reset/restarts/restarts, random number or counter may return to initial value (for example, ' 0 ').Random number Or counter can not repeat the value of its expression, unless wireless identity emitter is reset/restarts/restarts.Implement substituting In example, during the initialization of random number or counter, wireless identity emitter can from flash memory read it is predefined it is initial with Machine number or Counter Value.For example, wireless identity emitter can utilize value arranging in factory or by the applying the update installed To initialize random number or counter.
In one embodiment, it is possible to use method well known in the art initialize in the way of randomly or pseudo-randomly and Adjustment counter or random number.Random number or counter can be the values being pseudo-randomly generated, and it can launch in wireless identity It is replicated in both machine and central server.In another embodiment, random number or counter can be sent out by wireless identity Machine is penetrated using linear feedback shift register (LFSR) come what is generated, wherein LFSR has the life-span for being configured to establishment in equipment The appropriate cycle of period unduplicated random number or Counter Value.This random number derived according to LFSR or counter also may be used Being pseudorandom.
In frame 2106, wireless identity emitter can be used for central server is known key and AES To be encrypted to the data that Jing is cascaded.For example, wireless identity emitter can be using AES-CTR block encryptions come to random number Or counter and/or device identifier (that is, deviceID) are encoded.For encryption and the purpose decrypted, AES can To use key, this is because key is that both central server and wireless identity emitter are known.AES can be with Produce the data of encrypted (or the warp knit code) of particular size.For example, encrypted using AES-CTR, wireless identity emitter can be with Generate the encoded data of 128 bits.In one embodiment, wireless identity emitter can be generated and represented by below equation Encrypted data:
(deviceID||bat_stat)XOR(MSB_N(AES_K(t)))
Wherein t is the value (for example, 20 bit value) of the random number of wireless identity emitter or counter, and ' bat_stat ' is The battery status information (for example, 4 bit code) of wireless identity emitter, ' | | ' mean cascade, ' XOR ' indicates step-by-step XOR fortune Calculate, ' AES_K () ' is the AES block encryptions for utilizing key ' K ', and ' MSB_N () ' means ' N ' individual highest significant bit (example Such as, 60 bit).In other words, in addition to the scroll indicator including battery level indicator, embodiment broadcast may be used also With including unencrypted (that is, without encrypted) random number or counter.
In another embodiment, encrypted data can be represented by below equation:
(deviceID)XOR(AES_K(t))
Wherein deviceID is unique device identifier, and t is the value (example of the random number of wireless identity emitter or counter Such as, 20 bit value), ' XOR ' indicates step-by-step XOR, ' AES_K () ' is the AES block encryptions for utilizing key ' K ', and ' MSB_N () ' means ' N ' individual highest significant bit (for example, 60 bit).
Due to the limited communication capacity of wireless identity emitter, payload (for example, the bluetooth LE broadcast of broadcast The supported payload of packet) whole encrypted message may be included, but alternatively only including encrypted one A part for data.Therefore, in frame 2108, wireless identity emitter truncates data to generate the rolling that cannot be cracked mark Symbol.In other words, by truncating encrypted data, wireless identity emitter can be created will be placed on broadcast (or effectively Load) in identifier so that communication format (such as bluetooth LE) that the size of identifier can be utilized is supported.Example Such as, wireless identity emitter can truncate encrypted data to be adapted in 80 bit payload largest amounts.As Jing plus When close data are truncated, decryption of the data in central server is impossible.However, central server still can be with Using incomplete encrypted data, referring below to Figure 21 B descriptions.In one embodiment, it is possible to use such as most The function of high significant bit computing come complete truncate.In another embodiment, the data that Jing is truncated can be by below equation table Show:
TRUNC(deviceID XOR AES_K(t))
Wherein t is the value (for example, 20 bit value) of the random number of wireless identity emitter or counter, and ' XOR ' indicates to press Position XOR, ' AES_K () ' is the AES block encryptions for utilizing key ' K ', and ' TRUNC () ' indicates to create specific The truncation operation of the bit or byte (for example, 56 bits or 7 bytes) of quantity.
In frame 2110, the data cascade that wireless identity emitter can truncate current random number or counter and Jing To form message payload.For example, wireless identity emitter can be by current wireless identity transmitter system clock value (example Such as, 20 bit long) combine with the exclusive identification code for being truncated to 60 bit longs of wireless identity emitter.In one embodiment In, payload can include encrypted data and not encrypted data (or " unencryption " data).For example, payload The many bits and the battery of expression wireless identity emitter for representing the data that encrypted and/or Jing is truncated can be included Some other bits of state or random number or Counter Value.
In frame 2112, wireless identity emitter can be regularly sent including with the payload for rolling identifier Broadcast, such as by being broadcasted via short-distance wireless communication technology as above.The transmitting pin of broadcast Rate can be arranged according to system configuration, user or be transmitted related scheduling via wireless signal to wireless identity emitter Change with any other source of timing.For example, wireless identity emitter can every few seconds broadcast rolling identifier with every.
In decision block 2114, wireless identity emitter can determine whether are predefined random number or counter time section Expire.The random number or counter time section can be set with broadcasting frequency cycle similar mode as above. For example, manufacturer can be built using various technologies (the hard coded variable in the such as processor circuit of wireless identity emitter) Vertical random number or counter time section.
If random number or counter time section not yet expire (that is, decision block 2114="No"), then wireless identity transmitting Machine can proceed the operation in frame 2112.For example, wireless identity emitter can be via short range wireless transmission with several seconds Frequency come broadcast payload up to many minutes time period.
If equipment determines that random number or counter time section have expired (that is, decision block 2114="Yes"), then in frame In 2116, wireless identity emitter such as can increase random number or Counter Value by increasing by 1.In frame 2117, wirelessly Identity emitter can reset random number or counter time section.For example, it has been expired in random number or counter time section Afterwards, random number or counter can be increased by 1 value and reset to random number or counter time section by wireless identity emitter 0.Wireless identity emitter can proceed operation in frame 2106, and (for example, wireless identity emitter can be created and new had Imitate load and be broadcasted up to another random number or counter time section).
Figure 21 B to show and receive message and based on payload information come synchronization timing random number for central server Or the embodiment method 2150 of counter.In frame 2152, central server can set up data base entries, and it has equipment mark The key data that knowledge symbol (that is, deviceID), random number or counter and wireless identity emitter are used when it is registered. Central server can be safeguarded comprising each the wireless body being associated with the subordinated service of central server and/or central server The database of the data record of part emitter.Database can be filled with and the information for obtaining is operated via above-mentioned registration.Therefore, may be used With the data record that there is each the wireless identity emitter being associated with central server, and each record can include table Show mark, its current random number or the counter (for example, clock value) of particular device and related to wireless identity emitter The information of the key of connection.In one embodiment, key is for next with each wireless identity emitter that central server is registered Say it can is unique.In one embodiment, central server can also store with central server registration each is wireless The initial random number or Counter Value of identity emitter.
In various embodiments, when wireless identity emitter is registered, central server can store wireless identity and send out Penetrate the initial random number or Counter Value of machine.Depending on wireless identity emitter activation (for example, when insertion battery and equipment When being changed into operable) time and registration of equipment between, the initial random number or counter of wireless identity emitter can be 0 Or can not be 0.If wireless identity emitter with the registration of central server occurs that battery is inserted into into wireless body in user After some hours after part emitter, then initial random number or counter can not be 0.In one embodiment, central authorities Server can also indicate the login state of wireless identity emitter by arranging registered symbol or other designators, and can With the information that the wireless identity emitter stored to being not yet registered is described.In one embodiment, central server can There is the number with regard to its initial value whether being registered provided for all known wireless identity emitters to safeguard According to storehouse.For example, based on manufacture record, central server can include the letter with each the wireless identity emitter with regard to creating The database of breath.
Central server can use the operation similar with those operations described above with reference to frame 2106-2110 to generate With storage model payload.Model payload can be key, device identifier of the central server based on storage And random number or counter information are come the payload expecting to be received from wireless identity emitter (deviceID).For example, it is right In each registration wireless identity emitter, central server can create model payload by following operation:By equipment DeviceID and random number or Counter Value cascade;Using the cryptographic protocol of the key using wireless identity emitter come to Jing The data of cascade are encrypted;And the encrypted data of truncation.Each model payload can be stored in and be used to give birth to (or look into into the corresponding deviceID of corresponding model payload related to random number or Counter Value central server tables of data Look for table) in.For example, for each model payload of each wireless identity emitter, central server can have on model Effect load, time offset value (for example, -2, -1,1,2 etc.) and random number or counter (its all with wireless identity emitter DeviceID it is related) be stored in tables of data.
In frame 2154, central server can generate and store the wireless identity for predefined initialization period The initial model payload of emitter.For example, with initial random number or Counter Value (for example, 0 or for equipment and central authorities Known pseudorandom values for server) start, central server can use with wireless identity emitter it is actual just Beginning random number or counter it is identical, less than and/or actual initial random number higher than wireless identity emitter or counter Random number or Counter Value carry out generation model payload, during so that these model random numbers or counter covering initialization Section.In one embodiment, initialization period can be a hour, some hours, some days etc..Central server can be deposited Storage initial model payload in the case of the registration of wireless identity emitter/reset/restart for using.
In frame 2155, central server can also generate and store wireless identity emitter it is desirable that predefined Time window in the "current" model payload that received.Possible clock drift in order to illustrate wireless identity emitter Move, central server can by using the multiple derivative random number for representing a range of possible random number or counter or Counter is generating and store the model payload for predefined time window (or time period).In other words, spread out Raw random number or Counter Value can be the skews of the current random number for the storage of wireless identity emitter or Counter Value.Example Such as, central server can generate random number currently stored in pin comparison database or low and high derivative random of Counter Value The model payload of number or Counter Value.Derivative random number or Counter Value can be for wireless identity transmitting to storage The result of the random number of machine or Counter Value addition deviant (for example, -2, -1,1,2 etc.).Central server can be with generation model Payload come represent increase represent window periods storage random number or Counter Value and derivative random number or meter Number device value.For example, model payload can be represented increases little time value (such as one hour) and covers the big time The random number or counter of section (such as multiple hours).Another example is lifted, central server can be stored and be directed to wireless body The previous nonce or counter of the corresponding payload of the current random number or Counter Value of the storage of part emitter and equipment The corresponding payload of value and the payload corresponding with next random number of equipment or Counter Value.
In one embodiment, can be with for giving the "current" model payload that firstly generates of wireless identity emitter It is identical for the initial model payload of wireless identity emitter, this is because the two payload set can be central authorities Server is generated based on identical initial random number or Counter Value.In one embodiment, initialization period can with it is pre- The time window of definition occurs simultaneously.For example, initialization period can be related to quantity similar with predefined time window day, Hour, minute etc..
In decision block 2156, wireless identity emitter can determine whether random number or counter time section have arrived Phase.Central server can be initialized to random number at any time or alternatively when receiving wireless identity emitter and registering Or the assessment of timer periods section.Random number or counter time section can be as discussed above concerning the wireless of the description of decision block 2114 Identical time period time period that identity emitter is used.
If random number or counter time section have expired (that is, decision block 2156="Yes"), then in frame 2155 ', Central server can generate and store the updated "current" model payload for registration wireless identity emitter.Jing The "current" model payload of renewal can replace previous "current" model payload and can be based on each corresponding Wireless identity emitter data-base recording in the random number that stores or Counter Value.
If random number or counter time section expire above (that is, decision block 2156="No") or if random number or Counter time section has expired and central server has generated updated "current" model payload, then in decision block In 2160, central server may determine whether to have been received by any payload.In one embodiment, payload can Being directly to be delivered to central server or alternatively from degree of approach broadcasting receiver via aiming from wireless identity emitter Message is delivered to central server indirectly, includes (or relaying) from the transmitting of immediate wireless identity wherein aiming at message The rolling identifier payload of machine.If not yet receiving payload (that is, decision block 2160="No"), then central service Device can proceed the operation in decision block 2156.
If having been received by payload (that is, decision block 2160="Yes"), then in frame 2162, central server can To be configured with the "current" model payload for storing (such as the current of each registration wireless identity emitter storage Model payload) assessing the payload for receiving.As described above, central server can safeguard two for each note The model payload set of volume wireless identity emitter storage:Initial model payload set, its can include be based on across The more initial random number or counter and derivative random number or the model payload of counter of initialization period;"current" model has Effect load set, it is the current random number or counting based on the data-base recording memory storage for each wireless identity emitter Device value.In one embodiment, central server can arrange system variable, and the system variable is used to indicate central server The payload for receiving should be compared with the "current" model payload of storage.System variable can be configured so that finger Show that central server is estimated to the current or initial model payload of wireless identity emitter.
In frame 2164-2172, central server can perform operable circulation, and wherein central server will can be received The payload (that is, the data of wireless identity transmitter broadcasts) that arrives and storage for all registration wireless identity emitters Model payload is compared, until find matching till.In frame 2164, central server can select next registration Wireless identity emitter.During operation in frame 2164-2172, central server can be based on registration wireless identity emitter Database determining next registration equipment, and be iterating through each equipment according to priority.In frame 2166, central service Device can based on system configuration (in the operation such as in frame 2162 arrange configuration) come by the payload for receiving with deposit The model payload for selected wireless identity emitter of storage is compared.For example, based on using in frame 2162 Operation is arranged to the system variable of ' current ', central server can by the payload for receiving with store for selected The "current" model payload of the wireless identity emitter selected is compared.Encrypted number based on the payload for receiving According to form, it can be pattern match routine to compare, wherein central server can by the data of model payload with receive To payload be compared.For example, central server can be carried out the bit value of storage with the payload for receiving Relatively.
In decision block 2168, central server can determine that any model in the model payload of storage is effectively carried Whether lotus matches with the payload for receiving.If in the model payload of storage without model payload whether with The payload for receiving matches (that is, decision block 2168="No"), then in decision block 2170, central server can be true Surely whether there is another the registration wireless identity emitter to be assessed.In other words, central server may determine whether to deposit The model payload of all registration wireless identity emitters of storage is evaluated.If there is another note to be assessed Volume wireless identity emitter (that is, decision block 2170="Yes"), then central server can be by selecting next registration wireless Identity emitter to proceed frame 2164 in operation.
If central server have evaluated the model payload of all registration wireless identity emitters of storage (that is, decision block 2170="No"), then in frame 2172, the initial model that central server can be configured with storing has (initial model for such as storing at the hour of log-on of equipment for each registration wireless identity emitter is effectively carried effect load Lotus) assessing the payload for receiving.For example, central server can arrange system variable, and the system variable is used to indicate Central server should be initial with the storage for evaluated registration wireless identity emitter by the payload for receiving Model payload is compared (for example, system variable can be configured so that ' initial ').Subsequently, operable circulation can continue Carry out the operation in frame 2164-2168, wherein central server can select each registration wireless identity emitter and should The initial model payload of the equipment of selection is compared with the payload for receiving.
If it is stored with registration wireless identity emitter that central server finds the payload for receiving really The matching (that is, decision block 2168="Yes") between any model payload in model payload (current or initial), Then in frame 2174, central server can determine wireless identity transmitter identity based on matching.In other words, central service Device can be recognized and connect based on the identification information (for example, deviceID) of the model payload of the storage with regard to matching storage The corresponding wireless identity emitter of the payload that receives.In frame 2176, central server can be based on having for receiving Effect load, using the random number or counter of the wireless identity emitter of identification storehouse is updated the data.Based on the storage for matching The corresponding data-base recording of model payload, central server can determine corresponding with the payload for receiving Derivative random number or Counter Value, and the random number of storage or Counter Value can be updated to represent derivative random number or meter Number device values, therefore by the random number or counter of the wireless identity emitter for being recognized and central server random number or counter It is synchronous.In one embodiment, central server can also be received central server the central authorities of received payload During server random number or counter (or time) are stored in database.
In one embodiment, central server can safeguard the message and the transmitting of corresponding wireless identity for receiving in the recent period The list (or tables of data) of machine mark.For example, central server can record what is received in specific time period in tables of data The deviceID and payload information of message.Central server can be by any subsequently received payload and tables of data It is compared, with subsequently received to determine based on the payload from same wireless identity emitter for receiving in the recent period Payload whether redundancy.For example, subsequently received payload can represent from particular wireless identity emitter, The random number for having been received and having been processed by central server before a few minutes or Counter Value.This can be with the process of quickening method 2150 And reduce the search time of the operation in frame 2164-2172.In one embodiment, central server can be wiped (or clear It is empty) in the recent period the tables of data of the payload of identification and can with as similarly dispatched null clear operation described in frame 2176 (for example, Recent data table can be emptied when being confirmed as expired in each random number or counter time section).
Figure 22 show recognize for central server it is encrypted in the message broadcasted by wireless identity emitter Another embodiment method 2200 for the wireless identity emitter that data are indicated.In the operation of method 2200, can be never Include random number or Counter Value in broadcast to increase the security that wireless identity emitter sends its identity.For example, Because random number or Counter Value can be different between different wireless identity emitters, therefore disappear with capture broadcast The attacker of the ability of breath can easily predict the value of future from wireless identity emitter in broadcast.However, not having Have the unencrypted random number or counter data of transmission, can preferably hinder malice spammer follow from The broadcast of particular wireless identity emitter.
In frame 2002, wireless identity emitter can receive shared key (that is, " K ").For example, wireless identity emitter Can be predetermined and be equipped with every collaborative share key, wherein the wireless identity emitter per collaborative share key and at central server Unique device identifier (or deviceID) be associated.In frame 2204, wireless identity emitter can by random number or Counter.Can be in registration of the wireless identity emitter at central server by random number or counter and central server It is synchronous.Synchronized random number or Counter Value can with the tables of data that stores in central server (for example, with storage ID and K values to table) in deviceID and K it is associated.
In frame 2206, random number or counter can be increased to working as wireless identity emitter by wireless identity emitter The front equipment time.For example, random number or meter can be increased after the second (for example, one second, a hour etc.) of predefined quantity Number device.Another example is lifted, wireless identity emitter can be worth so that random number or counter are increased into 1 per 3600 seconds.In this way, Random number or counter can change the current time that oscillator is calculated on such as wireless identity emitter.In frame 2208, Wireless identity emitter can via pseudo-random function come to device identifier (that is, deviceID), shared key (that is, K) with And random number or counter are encoded to generate rolling identifier.In this way, it is possible to random number or Counter Value Change to generate rolling identifier.In one embodiment, pseudo-random function can be with seed (' s ') and input variable The polynomial time calculable functions of (' x '), so that when seed is randomly selected and for observer is not known When, pseudo-random function (for example, PRF (s, x)) computationally can be defined in same domain, with same range What the random function of output was distinguished.For example, Keyed-Hash Message authentication code (HMAC) or the message authentication code based on password (CMAC) it is used as pseudo-random function.
In frame 2210, wireless identity emitter can be broadcasted including message (for example, 1 block length for rolling identifier Bluetooth LE warble message).In one embodiment, broadcast (or payload of broadcast) can be by below equation Represent:
Payload=MSB_N (PRF (K, (and deviceID | | t)))
Wherein t is the value of the random number of wireless identity emitter or counter, and ' | | ' means cascade, ' PRF () ' be it is pseudo- with Machine function, and ' MSB_N () ' means ' N ' individual highest significant bit (for example, 80 bit).In other words, wireless identity transmitting Machine can intentionally obscure (or skew) device identifier and random number or counter information, therefore the payload of broadcast Unencrypted device identifier or random number or counter information can not be included.
In frame 2010, central server can receive shared key (K).In frame 2212, central server can be same Step random number or counter.For example, random number or counter can be configured so that expression was previously related to wireless identity emitter The value that includes of message (such as registration message).In frame 2214, central server can by shared key (that is, K) and with Machine number or counter are associated with the device identifier (that is, deviceID) of wireless identity emitter.For example, central server DeviceID, K and random number or counter can be stored in the tables of data of registration equipment and (for example, be stored in database In tuple record).In one embodiment, central server can also be stored and be used to indicate whether each wireless identity emitter The designator for being all registered or having activated or mark.
In frame 2216, central server can be received including the message for rolling identifier.For example, the message for being received can To be the aiming message from degree of approach broadcasting receiver, it includes wireless identity emitter using the operation broadcast in frame 2210 Rolling identifier.In frame 2018, central server such as can be parsed to recognize rolling by the message to receiving The payload of dynamic identifier is extracting rolling identifier.
In frame 2019, central server can select the wireless identity emitter to be assessed (that is, the wireless identity of selection Emitter).In other words, central server can be obtained for central server is known registration wireless identity emitter Stored deviceID, K and random number or counter, such as from for storing this of all registration wireless identity emitters Obtain in the database or tables of data of information.In frame 2218, central server can be by the wireless identity emitter for selecting Random number or counter increase the current time for server.In one embodiment, central server can subsequently increase and deposit The random number or Counter Value of storage is illustrating since the random number or Counter Value of storage is by synchronization onwards past time.Lift One example, central server can will using in frame 2216 operation it is current with central server to receive the time of message Time is compared (for example, via central server clock or time mechanism).It can be increased based on wireless identity emitter The given frequency (for example, per hour once) of respective random number or counter, central server can increase the random of selection Count or Counter Value is to illustrate the time difference.
In one embodiment, the random number for selecting or counter only can be increased expression wireless identity by central server The amount of the time between the broadcast that emitter is carried out.In other words, central server can not increase the random number or meter of selection Number devices to be included in frame 2216 in operation in receive message and degree of approach broadcasting receiver receive broadcast time it Between time.For example, degree of approach broadcasting receiver will aim at message relay to central server before may to broadcast Message is buffered.Central server can be calculated based on the metadata in the message received using the operation in frame 2216 The time difference.For example, the aiming message from degree of approach broadcasting receiver can indicate when broadcast is received.Therefore, The amount that the random number of selection or counter are increased can when practically receive broadcast based on degree of approach broadcasting receiver Message rather than when received by central server based on the message from degree of approach broadcasting receiver.
In frame 2220, central server can carry out the device identification to wireless identity emitter via pseudo-random function Symbol, key and random number or counter are encoded to generate the data (that is, C ') of Jing server for encrypting.The pseudo-random function Can be identical with the pseudo-random function that the operation in frame 2208 is utilized.In one embodiment, the Jing server for encrypting for being generated Data can be represented by below equation:
C '=MSB_N (PRF (sel_K, (and sel_deviceID | | sel_t))))
Wherein sel_K is the value of the key of the wireless identity emitter of selection, and sel_deviceID is the wireless body of selection The value of the unique device identifier of part emitter, sel_t is the value of the random number of wireless identity emitter or counter, ' | | ' meaning Refer to cascade, ' PRF () ' be pseudo-random function, and ' MSB_N () ' mean ' N ' individual highest significant bit (for example, 60 bits, 74 Bit, 80 than top grade).
In decision block 2222, central server can determine the data (C ') of generated Jing server for encrypting whether with The rolling identifier for receiving is identical.In other words, central server can roll what is received identifier and generated The data of Jing server for encrypting are compared to determine whether they match.If rolling identifier with the Jing services for being generated The data match (that is, decision block 2222="Yes") of device encryption, then in frame 2024, central server will can be received Message be identified as from select wireless identity emitter originate (for example, with select wireless identity emitter unique mark Know symbol corresponding).
If roll identifier not matching that (that is, decision block 2222="No") with the data for being generated, then in frame 2224 In, central server can be carried out to the device identifier of other wireless identity emitters, key and random number or counter Encode to recognize the originator of the message for receiving.In other words, central server can select the next one to deposit from database The deviceID of storage, random number or counter and K groups, increase the random number or Counter Value of the selection, to what is selected DeviceID, random number or counter and K are encoded, and by the encoded data for being generated and the rolling for receiving Identifier is compared, until the identity of the originator for finding the rolling identifier matched and in the known message for receiving is Only.
In one embodiment, when battery that is removed or reinstalling wireless identity emitter, newest is random Several or Counter Value can be remained in the nonvolatile memory of wireless identity emitter, so that work as and removing battery and inciting somebody to action Can read back random number or Counter Value from the nonvolatile memory of wireless identity emitter when it is put back to.Alternatively, if Without nonvolatile memory it is available or is not used, then wireless identity emitter can reinstalls it in battery After return to initial random number or Counter Value.Central server may be needed slightly to change come " counter is same as adapting to Step ".More specifically, when " counter synchronisation " is performed, except attempting than precalculated random number or counter list most Outside the big value of big random number or Counter Value, central server can also attempt to the value of such as (counter+i), wherein i= 0,…n.In this case, when " counter synchronisation " repeatedly fails, it may be necessary to notify to wireless identity transceiver user Need to reinstall battery.
Figure 23 A show the rolling identifier generated using pseudo-random function for wireless identity emitter for broadcast Embodiment method 2300.Operation in method 2300 can be similar with above-described embodiment method 2100.However, method 2300 can To generate payload based on the application of pseudo-random function, rather than using AES-CTR AESs come to data (such as with Machine number or Counter Value) it is encrypted.As described above, for wireless identity emitter pseudo-random function and key for corresponding Wireless identity emitter and both central servers can be known so that both can be based on similar data next life Into similar payload.
In frame 2102, the user of wireless identity emitter can register equipment with central server.In frame 2104, nothing Line identity emitter can initialize internal random number or counter, such as by the way that random number or counter are set to into null value. In frame 2302, wireless identity emitter can be by current random number or the Unique Device mark of counter and wireless identity emitter Know symbol (that is, deviceID) cascade.In frame 2304, wireless identity emitter can use what pseudo-random function and Jing were cascaded Data and key have the payload for rolling identifier to generate.For example, the data that pseudo-random function can cascade Jing (that is, deviceID+ random numbers/counter) is as input and can use the key of wireless identity emitter as randomness Seed variable.The output data from pseudo-random function can be included with the payload for rolling identifier.In an enforcement In example, the unencryption letter of the other side with regard to wireless identity emitter can also be included with the payload for rolling identifier Breath.For example, wireless identity emitter can be by some ratios of the information being described to the battery status of wireless identity emitter Special (for example, 4 bit) is attached to payload.In one embodiment, pseudo-random function can be that polynomial time can be calculated Function, its be computationally can not be defined in same domain with same pseudo-random function, the random letter of the output with same range What number was distinguished.For example, Keyed-Hash Message authentication code (HMAC) or the message authentication code (CMAC) based on password are used as Pseudo-random function.In one embodiment, wireless identity emitter can pair or the rolling identifier for being generated can not be had Effect load is performed and truncates operation.For example, can be that the result to pseudo-random function is performed with the payload for rolling identifier The result of highest significant bit operation.
In frame 2112, wireless identity emitter can be regularly sent including with the payload for rolling identifier Broadcast, such as by being broadcasted via short-distance wireless communication technology as above.In decision block 2114, nothing Line identity emitter can determine whether predefined random number or counter time section have expired.If random number or counting The device time period not yet expires (that is, decision block 2114="No"), then wireless identity emitter can proceed in frame 2112 Operation.If equipment determines that random number or counter time section have expired (that is, decision block 2114="Yes"), then in frame 2116 In, wireless identity emitter such as can increase random number or Counter Value by increasing by 1.In frame 2117, wireless identity Emitter can reset random number or counter time section, and can proceed the operation in frame 2302.
Figure 23 B show that the message for rolling identifier comprising pseudo-random function for central server to receiving is carried out The embodiment method 2350 of response.The operation of embodiment method 2350 can be similar with the operation described above with reference to Figure 21 B, different Part be:Central server can enter the output of pseudo-random function with the time synchronization information being stored in central server Row compares to match the payload from the message of wireless identity emitter reception.
In frame 2352, central server can set up data-base recording, and it has for each the wireless body in system The device identifier (that is, deviceID) of part emitter, random number or counter, the time, login state (that is, reg_stat) with And key (that is, ' K ') information.It is relative with specific wireless identity emitter that time can indicate that central server is finally received The time of the message (for example, for the aiming message of repeat broadcast message) answered, or in other words, wireless identity can be indicated The random number or Counter Value of emitter by receiving/recording in database when central server clock value.Assume that nothing There is line identity transmitter broadcasts the message for rolling identifier (or rolling identifier payload) to receive with central server The period rolled between identifier is very short.Therefore, the random number or counter and time value of storage can be assumed to be establishment The clock status of substantially accurate wireless identity emitter.
In addition, once wireless identity emitter sends log-on message, central server just can be by setting in database Put the registered symbol (for example, ' reg_stat ') for the wireless identity emitter to indicate active registration.Central server can Database is inquired about to have carried out all wireless identity emitters record of active registration for wherein reg_stat instructions, and And can be created based on reg_stat values only including the tables of data of registration wireless identity emitter.
In frame 2354, central server can be via receiving rolling from the aiming message of degree of approach broadcasting receiver Identifier payload.Aiming at message can have the temporal information for being attached to payload, and the temporal information describes the degree of approach Broadcasting receiver runs into the time of payload via the broadcast from corresponding wireless identity emitter.For example, effectively Load can be received by smart phone degree of approach broadcasting receiver, and the smart phone degree of approach broadcasting receiver then can be by it The system clock reading of oneself is attached to payload information and data is sent to into central server as message is aimed at.Connect The time measurement result that recency broadcasting receiver is provided can be substantially synchronous with the central server system time.In an enforcement In example, degree of approach broadcasting receiver can (such as the positional information of degree of approach broadcasting receiver be (for example, by other extraneous informations Gps coordinate)) it is attached to aiming message.In frame 2356, central server can obtain degree of approach broadcast from aiming message and connect The receipts machine time (that is, ' ir_time '), such as aiming at what is indicated in message.For example, central server can parse aiming message And extraction time is worth, the time value is used to indicate when degree of approach broadcasting receiver receives and roll identifier payload Corresponding broadcast.
In frame 2164-2374, central server can perform operable circulation, and wherein central server can be to central authorities All registration wireless identity emitters of the databases storage of server are estimated, with the rolling mark found with received The equipment record that symbol payload matches.In frame 2164, central server can select next registration wireless identity to send out Penetrate machine.For example, central server can be selected iteratively in the reg_stat variables with the registration for being set to indicate that generation All wireless identity emitters tables of data in represent next wireless identity emitter.Central server can be in frame It is iterating through the such tables of data for each equipment or list during operation in 2164-2374 in order.In a reality In applying example, central server can access it is stored it is corresponding with registration wireless identity emitter that is selecting, comprising being directed to The data-base recording of the currency of the information set up using the registration operation in frame 2352.
In frame 2360, central server can calculate the note for aiming at the time (ir_time) indicated in message and selecting Time difference (that is, ' t_diff ') between the time of the data-base recording memory storage of volume wireless identity emitter.For example, t_diff Value can be nonzero value or null value.The time difference can be that central server receives effectively load from the wireless identity emitter for selecting The measurement of the desired time in the past between the example of lotus.
In frame 2362, clock drift skew (that is, ' offset ') can be set to next value by central server.It is logical Often, central server can illustrate the clock drift of possible wireless identity emitter by arranging clock drift deviant (for example, inaccurate device systems clock readings).Clock drift deviant can represent such skew:It is random when being employed Number or during Counter Value, random number or counter can be expressed as being less than by such skew, same or higher than desired Random number or Counter Value are low.In other words, clock drift skew can represent for selection registration equipment it is current with The time before, during or after time represented by machine number or counter.Clock drift deviant can be that clock drift is inclined The clock drift deviant moved in value sequence.In one embodiment, clock drift deviant can be 0.In a reality In applying example, possible clock drift deviant can include the number in set {-N ..., -1,0,1 ..., N }, and wherein N is any Number.
In frame 2364, central server can use the random number or counting of the storage of the wireless identity emitter of selection Device value, the time difference for being calculated (that is, t_diff) and the deviant (that is, offset) that arranges are calculating desired random number or meter Number device value (that is, ' new_ctr ').As described above, the registration wireless identity that random number or counter can be stored in selection is sent out Penetrate in machine data-base recording.For example, central server can by by t_diff values with storage random number or Counter Value it And calculate new_ctr with clock drift deviant phase Calais.
In decision block 2366, central server can carry out the wireless identity emitter to selecting via pseudo-random function The random number or counter (that is, new_ctr) of device identifier, key and calculating is encoded to generate Jing server for encrypting Data (that is, C ').The pseudorandom that the pseudo-random function can be utilized with the wireless identity emitter described as discussed above concerning Figure 23 A Function is identical.
In decision block 2222, central server can determine the data (C ') of generated Jing server for encrypting whether with The rolling identifier for receiving is identical.In other words, central server can roll what is received identifier and generated The data of Jing server for encrypting are compared to determine whether they match.If rolling identifier with the Jing services for being generated The data match (that is, decision block 2222="Yes") of device encryption, then central server can be identified as the message for receiving Be from select wireless identity emitter originate (for example, with select wireless identity emitter unique identifier it is relative Should).In one embodiment, key (K) can be the seed of pseudo-random function.In one embodiment, central server The data that the deviceID of the wireless identity emitter of the selection and new_ctr for being calculated can be cascaded and cascade the Jing It is supplied to pseudo-random function.Pseudo-random function can return (or output) to be had and the rolling identifier payload for receiving The encrypted data of the similar structure of structure.
If rolling identifier (the rolling identifier for such as receiving in message is aimed at) and the Jing servers for being generated The data (that is, C ') of encryption match (that is, decision block 2222="Yes"), then in frame 1276, central server can be utilized Random number or counter and temporal information (such as new_ctr and ir_time) are updating the number of the wireless identity emitter of selection Record according to storehouse.For example, central server can be updated to the time of data-base recording represent in degree of approach broadcasting receiver The time (for example, ir_time) of the reception of payload and also the random number of storage or Counter Value can be updated to New_ctr values.Central server can proceed the operation in frame 2354.
If rolling identifier (the rolling identifier for such as receiving in message is aimed at) and the Jing servers for being generated The data (that is, C ') of encryption do not match that (that is, decision block 2222="No"), then in decision block 2370, central server can To determine whether there is next clock drift deviant.In other words, central server may determine whether to be used for All possible clock drift deviant (for example, -1,0,1 etc.) calculates new_ctr values.If there is next clock drift Deviant (that is, decision block 2370="Yes"), then central server can proceed the operation in frame 2362.If however, In the absence of a clock drift deviant (that is, decision block 2370="No"), then in decision block 2170, central server can To determine whether there is another the registration wireless identity emitter to be assessed.It is wireless if there is another registration to be assessed Identity emitter (that is, decision block 2170="Yes"), then central server can proceed the operation in frame 2164.However, If there is no other registrations wireless identity emitter (that is, decision block 2170="No"), then in frame 2374, central server Can be that the initial random number or Counter Value for each registration wireless identity emitter storage is commented by system configuration Estimate.In one embodiment, above-described registration database can also include representing and each registration wireless identity emitter Corresponding initial random number or the data of Counter Value.If/restart or otherwise when each wireless identity emitter When resetting its random number or counter, it is possible to use the initial random number or Counter Value.For example, resetting because of battery replacement Before its internal random number or counter, wireless identity emitter can operate and deliver to enter non-initial random number or counter The payload of row description is up to a period of time.In such scene, wireless identity emitter can be based on the random number for resetting Or counter information come broadcast including roll identifier payload message.
In another embodiment, for individually registration choosing during operable circulation that can be in frame 2362-2370 The equipment selected performs the operation in frame 2374, wherein it is possible to replace frame using the random number or Counter Value of initial storage The random number or Counter Value of the storage in 2364.For example, central server is once it is determined that the registration wireless identity transmitting for selecting The random number or Counter Value of the storage of machine are not used to generate and identify with the rolling for receiving with each clock drift deviant The encrypted data that symbol payload matches, central server can just select next registration wireless identity emitter Before to select wireless identity emitter initial storage random number or Counter Value be estimated.
Figure 24 A show and generate for wireless identity emitter and broadcast with rolling the random of identifier and warp knit code The embodiment method 2400 of the message of number or counter.Method 2400 can have performed by wireless identity emitter and on Text operates similar operation with reference to those that Figure 20,20A, 22 and 23A are described.However, method 2400 can be related to broadcast including The random number or the message of counter of identifier (that is, the device identifier of warp knit code) and warp knit code are rolled, wherein can be by Central server separately assesses the random number or meter for rolling identifier and warp knit code using the operation described below with reference to Figure 24 B Number device.In this way, it is possible to unencrypted not send the random number of wireless identity emitter in the payload of broadcast Or Counter Value (or random number).
In frame 2102, the user of wireless identity emitter can register equipment with central server.For example, wireless identity Emitter can provide unique device identifier (that is, deviceID) for storage in registration wireless identity to central server In the database of emitter.In frame 2402, wireless identity emitter can be stored for first is close known to central server Key (K) and the second key (K ') and initial random number or counter.The registration operation phase that can be described in this disclosure Between between central server and wireless identity emitter share these values.In frame 2404, wireless identity emitter can lead to Cross and be set to initial random number or Counter Value to initialize current random number or counter by current random number or counter.
Similar with what is described above with reference to Figure 20, in frame 2406, wireless identity emitter can be via similar to streaming The AES (for example, AES-CTR) of transmission comes to device identifier (deviceID), first key (K) and current random number Or counter is encoded to generate rolling identifier.In frame 2408, wireless identity emitter can be via pseudo-random function To be encoded to generate the random number or counter of warp knit code to current random number or counter and the second key (K ').One In individual embodiment, the random number or counter of warp knit code can be represented by below equation:
Random number/counter=MSB_M (PRF (K ', t)) of warp knit code
Wherein ' K ' is the key of every equipment second (being typically different than first per device keyses K), and ' t ' is without current random number Or counter, ' PRF () ' is pseudo-random function, and ' MSB_N () ' means ' N ' individual highest significant bit (for example, 20 ratio It is special).
In frame 2410, wireless identity emitter can regularly send including with roll identifier and warp knit code with The broadcast of the payload of machine number or counter.In decision block 2114, wireless identity emitter can determine predefined Random number or counter time section whether expired.(that is, the decision block if random number or counter time section not yet expire 2114="No"), then wireless identity emitter can proceed the operation in frame 2410.If equipment determines random number or meter The number device time period has expired (that is, decision block 2114="Yes"), then in frame 2412, wireless identity emitter can such as lead to Cross increase by 1 to increase current random number or Counter Value.In frame 2117, wireless identity emitter can reset random number or meter Count the device time period and the operation in frame 2406 can be proceeded.
Figure 24 B show receive for central server and process including the random number for rolling identifier and warp knit code or The embodiment method 2450 of the message of counter.Central server can with reference to or in response to wireless identity emitter perform it is above-mentioned Method 2400 is performing the operation of method 2450.The method can include two and pass through (pass):First passes through, wherein, central authorities Random number of the server based on warp knit code interior in the message (for example, aim at message) for receiving or counter are attempting recognizing nothing Line identity emitter;And second pass through, wherein, central server is attempted based on the rolling identifier in the message for receiving Identification.
In frame 2452, central server can set up data base entries, its all wireless body in having for system The device identifier (that is, deviceID) of part emitter, initial random number or counter, current random number or counter and close Key (K and K ').Initial random number or counter phase when current random number or counter can be registered with wireless identity emitter Together.In frame 2454, for all wireless identity emitters, central server can use pseudo-random function, the second key (K ') and current random number or Counter Value are precalculating the random number or counter of warp knit code.For example, for each is registered Wireless identity emitter, central server can generate the random number or Counter Value of multiple warp knit codes, and such as one is to be based on Current random number or Counter Value, another be based on bigger than present counter value 1 value, etc..In one embodiment In, for each registration wireless identity emitter, central server can precalculate the random number or counting of 24 warp knit codes Device.In one embodiment, central server can store the precalculated Jing for all registration wireless identity emitters The random number of coding or the independent list (or tables of data) of counter, the independent list also includes and precalculating that each is stored Random number or the associated device identifier of counter.
In frame 2456, central server can be received including (aiming that such as Approach phase broadcasting receiver is sent disappears In breath) random number of warp knit code or counter and roll the message of identifier.In frame 2458, central server can be from connecing The random number or counter of warp knit code are extracted in the message for receiving, and in frame 2018, rolling is extracted from the message for receiving Dynamic identifier.In decision block 2460, central server can determine whether are extracted random number or counter (or ' ctr ') With any random number or counters match in precalculated random number or counter.For example, central server can be by The random number or Counter Value of the warp knit code extracted from the message for receiving registers wireless identity emitter with for each The random number or Counter Value of multiple Jing central servers codings is compared to recognize any matching.If that what is extracted is random Number or counter and precalculated random number or counters match (that is, decision block 2460="Yes"), then in frame 2462, Central server can recognize candidate's wireless identity emitter based on the precalculated random number of matching or counter.Change sentence Talk about, central server by candidate be identified as in the tables of data for being stored in central server with precalculated random number or meter The related deviceID of number device.In frame 2464, central server can be via the AES (example similar to stream transmission Such as, identical AES-CTR that wireless identity emitter is used in the operation in performing Figure 24 A) use candidate's wireless identity to send out The information (for example, deviceID, key etc.) for penetrating the storage of machine rolls identifier to generate decoded device identification to decode Symbol (or M).In decision block 2466, central server can determine whether decoded device identifier (M) is wireless with candidate The deviceID of identity emitter matches.The rolling mark that such matching is capable of identify that can central server and receive Know the associated wireless identity emitter of symbol, carry out without the random number or Counter Value to rolling identifier or warp knit code Decoding.If deviceID matches (that is, decision block 2466="Yes") with decoded identifier (M), then in frame 2470, The message for receiving can be identified as what is originated from candidate's wireless identity emitter by central server.In frame 2472, in Centre server can update the random number or counter of current random number or counter and precalculated warp knit code.For example, Can using the random number or counter of new current random number or counter information and new precalculated warp knit code come Update the data base entries of the wireless identity emitter of the originator for being directed to the message for being identified as receiving.In addition, any deposit The random number of the precalculated warp knit code of storage or the list of counter can be relative with the wireless identity emitter for being recognized While the random number or counter of the warp knit code of the new calculating answered are added to list, by older precalculated warp knit code Random number or counter remove.In another embodiment, if the originator of message for being identified as receiving it is wireless Identity emitter is indicated as " not being activated " (that is, being not provided with mark) in the database of central server, then central authorities' clothes Business device can also adjust database to reflect that recognized wireless identity emitter is activated (for example, arrange mark) now.With Afterwards, central server can proceed the operation in frame 2456.
If deviceID does not match that (that is, decision block 2466="No") with decoded identifier (M), then in frame In 2468, central server may determine whether other candidates, other registrations such as not yet assessed by central server Wireless identity emitter.If there is other candidates's (that is, decision block 2468="Yes"), then central server can proceed Operation in frame 2462, such as will be with regard to rolling the next wireless identity emitter that identifier is estimated by identification.
If there is no other candidates's (that is, decision block 2468="No"), or if the random number extracted or counting Device does not match that (that is, decision block 2460="No") with precalculated random number or counter, then central server can lead to Cross the identifier that rolls that will be extracted to be compared to the information of all registration wireless identity emitters being associated with system Attempt the originator of the message that identification is received.Therefore, in decision block 2170, central server may determine whether separately The one registration wireless identity emitter to be assessed.For example, central server can iteratively use all registration wireless identities The information of emitter.If there is no another the registration wireless identity emitter to be assessed (that is, decision block 2170="No"), Then central server can proceed the operation in frame 2456.
If there is another the registration wireless identity emitter to be assessed (that is, decision block 2170="Yes"), then in frame In 2164, central server can select next registration wireless identity emitter.In frame 2474, central server can be with Jing By similar to the initial random of the AES (for example, AES-CTR) and selected wireless identity emitter transmitted as a stream Number or counter and first key (K) being decoded to find decoded device identifier (M ') to rolling identifier, with It is as described above similar.In decision block 2476, whether central server can determine decoded device identifier (M ') Match with the deviceID of the wireless identity emitter for selecting.If identifier does not match that (that is, decision block 2476= "No"), then central server can proceed the operation in decision block 2170.If however, match identifiers are (i.e., really Determine frame 2476="Yes"), then in frame 2478, central server can be identified as the message for receiving wireless from what is selected Identity emitter is originated, and can proceed the operation in frame 2472.
Figure 24 C show receive for central server and process including the random number for rolling identifier and warp knit code or The embodiment method 2480 of the message of counter.The operation of method 2480 is similar to the operation with method 2450, and difference is: Central server can be performed method 2480 as one by process, rather than be performed such as the discussion in Figure 24 B above Two pass through process.Specifically, for each registration wireless identity emitter, it is central that central server can generate multiple Jing The random number or Counter Value of server for encrypting and the device identifier of multiple Jing central servers encryption are (i.e., deviceID).Central server can use the data (example stored in the database for each wireless identity emitter Such as, deviceID, K, K ', initial random number or counter, current random number or counter) and for the multiple of each equipment Precalculated random number or Counter Value come random number or Counter Value and multiple to the encryption of multiple Jing central servers The device id of Jing server for encrypting is encoded.When central server receive include rolling identifier and warp knit code random number or During the aiming message of counter, central server can by multiple Jing central servers encrypt random number or Counter Value and The device id of multiple Jing central servers coding and the rolling identifier and warp knit code obtained from the aimings message for receiving with Machine number or counter are compared.Subsequently, the precalculated random number of matching or Counter Value and equipment can be based entirely on Identifier produces the device identifier of the wireless identity emitter for rolling identifier to recognize, without rolling identifier itself Actual decoding.
In frame 2452, central server can set up data base entries, its all wireless body in having for system The device identifier (that is, deviceID) of part emitter, initial random number or counter, current random number or counter and close Key (K and K ').In frame 2454, for all wireless identity emitters, central server can using pseudo-random function, second Key (K ') and current random number or Counter Value are precalculating the random number or counter of warp knit code.It is right in frame 2482 In all wireless identity emitters, central server can use AES (for example, the AES-CTR similar to stream transmission Block encryption), the equipment of device identifier, current random number or counter and first key (K) to precalculate warp knit code Identifier.In other words, for each registration wireless identity emitter, central server can such as by using current random Number or counter and predefined skew random number or Counter Value are generating the device identifier of multiple warp knit codes, or substitute Ground, is based only upon the current random number or counter of central server memory storage only to generate the device identifier of a warp knit code.
In frame 2456, central server can be received including (aiming that such as Approach phase broadcasting receiver is sent disappears In breath) random number of warp knit code or counter and roll the message of identifier.In frame 2458, central server can be from connecing The random number or counter of warp knit code are extracted in the message for receiving, and in frame 2018, rolling is extracted from the message for receiving Dynamic identifier.In decision block 2460, central server can determine whether are extracted random number or counter (or ' ctr ') With any random number or counters match in precalculated random number or counter.If the random number extracted or meter Number device and precalculated random number or counters match (that is, decision block 2460="Yes"), then in frame 2462, central authorities' clothes Business device can recognize candidate's wireless identity emitter based on the precalculated random number of matching or counter.In decision block In 2484, central server can determine whether extracted rolling identifier (is such as counted in advance with precalculated identifier The device identifier of candidate's wireless identity emitter of calculation) in any match identifiers.
If extracted roll identifier really with the identifier of precalculated candidate's wireless identity emitter in Any match identifiers (that is, decision block 2484="Yes"), then in frame 2470, central server can be by disappearing for receiving Breath is identified as what is originated from candidate's wireless identity emitter.In frame 2472 ', central server can update current random number Or the device identifier of the random number or counter and precalculated warp knit code of counter and precalculated warp knit code.Example Such as, it is possible to use new current random number or the random number or counter of counter information and new precalculated warp knit code The wireless body of the originator for being directed to the message for being identified as receiving is updated with the device identifier of precalculated warp knit code The data base entries of part emitter.In addition, the list of the random number of the precalculated warp knit code of any storage or counter can With in the random number of the warp knit code of the new calculating corresponding with the wireless identity emitter for being recognized or counter or device identification While symbol is added to list, by the random number of older precalculated warp knit code or the equipment mark of counter or warp knit code Know symbol to remove.In another embodiment, if the wireless identity emitter of the originator of message for being identified as receiving exists " not being activated " (that is, being not provided with mark) is indicated as in the database of central server, then central server can also be adjusted Entire data storehouse is activated (for example, arrange mark) now with reflecting recognized wireless identity emitter.Subsequently, central server The operation in frame 2456 can be proceeded.
If extracted roll identifier not with the identifier of precalculated candidate's wireless identity emitter in appoint What match identifiers (that is, decision block 2484="No"), then in frame 2468, central server may determine whether it Its candidate, other the registration wireless identity emitters such as not yet assessed by central server.If there is other candidates (i.e., Decision block 2468="Yes"), then central server can proceed the operation in frame 2462, such as will be with regard to rolling by identification The next wireless identity emitter that dynamic identifier is estimated.
If there is no other candidates's (that is, decision block 2468="No"), or if the random number extracted or counting Device does not match that (that is, decision block 2460="No") with precalculated random number or counter, then central server can lead to Cross the identifier that rolls that will be extracted to be compared to the information of all registration wireless identity emitters being associated with system Attempt the originator of the message that identification is received.Therefore, in decision block 2170, central server may determine whether separately The one registration wireless identity emitter to be assessed.For example, central server can iteratively use all registration wireless identities The information of emitter.If there is no another the registration wireless identity emitter to be assessed (that is, decision block 2170="No"), Then central server can proceed the operation in frame 2456.
If there is another the registration wireless identity emitter to be assessed (that is, decision block 2170="Yes"), then in frame In 2164, central server can select next registration wireless identity emitter.In frame 2474, central server can be with Jing By similar to the initial random of the AES (for example, AES-CTR) and selected wireless identity emitter transmitted as a stream Number or counter and first key (K) to rolling identifier being decoded to find decoded device identifier (M '). In decision block 2476, central server can determine whether decoded device identifier (M ') is launched with the wireless identity for selecting The deviceID of machine matches.If identifier does not match that (that is, decision block 2476="No"), then central server can be after The continuous operation being determined in frame 2170.If however, match identifiers (that is, decision block 2476="Yes"), then in frame In 2478, the message for receiving can be identified as what is originated from the wireless identity emitter for selecting by central server, and The operation in frame 2472 ' can be proceeded.
Figure 25 is shown by central server in response to receiving based on the aiming message related to wireless identity emitter comes Calculate the embodiment method 2500 of incentive message.Central server can be in response to receiving the aiming message of the behavior of instruction user To calculate or otherwise determine reward.Specifically, the wireless identity emitter of user can include various sensors, all Such as it is configured to measure the accelerometer of exercise data.Wireless identity emitter can be included from degree of approach broadcasting receiver via taking aim at Quasi- message is delivered to the sensing data in the broadcast of central server.Once it is detected in aiming message, in Centre server can be calculating the incentive message related to the incentive plan that central server is safeguarded using sensing data. For example, indicate that high momental accelerometer data can be used for assessing activity of the children within a period of time.Based on the activity, in Centre server can calculate the children and obtain ' congratulation ' because reaching the specific daily activity level of body-building incentive plan defined SMS message is rewarded.
In frame 2501, central server can store the reward meter being defined to bonus requirements and associated reward The information of drawing.Specifically, central server can store the condition for operating incentive plan, wherein can be via central service Device is performed incentive plan as service, process, thread or other routines.Such condition can include time window, geography Region (for example, gps coordinate) with frequency (for example, per hour, daily, weekly etc. specific times), and can with various prizes, Excitation or benefit are linked or are associated.For example, the first reward voucher can be with the first geo-fence condition in restaurant (for example, The geo-fence of porch) it is associated, and the second reward voucher can be with (for example, the meal of the second geo-fence condition in restaurant The geo-fence at bar desk in shop) it is associated.Such incentive plan information can be affected in central server by expectation Registration service, user or each side's offer of the behavior of the user of (or known) are provided.The incentive plan information for being stored may be used also To include formula and/or regular collection for calculating the reward of incentive plan.For example, the information for being stored can be indicated:When When wireless identity emitter is detected during time for school in the degree of approach of the school of junior middle school of user, this can be awarded to (for example, the TV time of a hour) is trusted in one reward of user of wireless identity emitter.In one embodiment, central authorities Server can be stored to how frequently rewarding the information that particular bonus or reward how many times are indicated to user.Example Such as, central server can be stored only can receive to each unique subscriber when into specific region in market or amusement park The rule that one reward voucher is indicated.
In decision block 1402, central server can determine whether aiming message is received, as mentioned above.Central service Device can be estimated to determine when from each equipment (to be such as close to receiving circuit, buffer, queue or other designators Degree broadcasting receiver) receive message.In one embodiment, central server can using mixed-media network modules mixed-media as above come It is determined that aiming at whether message is received.Generally, it can be (such as by internet via honeybee via telecommunication to aim at message The packet that nest network sends) received.As described above, receiving from wireless identity emitter in response to degree of approach broadcasting receiver Broadcast, central server can be received from degree of approach broadcasting receiver and aim at message.Such degree of approach broadcasting receiver The smart phone of user's carrying of wireless identity emitter can be included, (for example, family, school, day care etc.) is attached positioned at a place Near static degree of approach broadcasting receiver, smart phone of father and mother etc., and wireless identity emitter can be by children, old age People, pet or other individualities carry to be tracked.If central server is not received by aiming at message (that is, decision block 1402="No"), then central server can proceed the operation in decision block 1402.
If central server is actually received aiming message (that is, decision block 1402="Yes"), then in decision block 1702 In, central server can determine wireless identity transmitter identity be whether it is known, as mentioned above.In other words, central authorities' clothes Business device can be performed to operate and aim at the wireless body whether message indicates to be associated with the user registered to central server to determine Part transmitter identity (or identifier).If wireless identity emitter is not known (that is, decision block 1702="No"), then exist In frame 1703, central server can ignore aiming message and continue executing with the operation in decision block 1402.If wireless body Part emitter is known (that is, decision block 1702="Yes"), then in decision block 2502, central server can determine aiming Whether message is related to incentive plan (plan such as related with the incentive plan information using the operation storage in frame 2501). For example, central server can by the identification information of wireless identity emitter (for example the rolling identifier of, decrypted/decoding) with The user list for having registered participation activity incentive plan is compared.Alternatively, central server can be based on instruction reward The metadata (for example, indicating the metadata code of the incentive plan for being attached to specific businessman) of plan is determining whether aim at message It is related to incentive plan.In one embodiment, the metadata that central server is also based on aiming in message (for example, is used The metadata of the degree of approach broadcasting receiver for aiming at message is sent in identification) carry out the aiming message that certification is received.
If message (that is, decision block 2502="No") not related to incentive plan, then central server can continue into Operation in row frame 1703.If however, message (that is, decision block 2502="Yes") related to incentive plan, then in frame 2504 In, unit that is that central server can be indicated such as from aiming message or being otherwise in aiming message interior coding or encryption Data extract sensing data.For example, central server can detect that aiming message includes broadcast, and the broadcast is indicated Accelerometer sensor data, thermostat sensing data and/or pulse sensor data in its payload.In frame 2506 In, central server can store the sensing data related to wireless identity emitter for being extracted, such as by sensing Device data storage is in the data base entries of the device identifier of the wireless identity emitter of user or user are linked to.Lift another Individual example, central server can safeguard the database for incentive plan, the sensing of the database purchase each register user Device data.As described above, in frame 2508, central server can also store the various information related to message is aimed at, such as That aims at message receives positional information (for example, the GPS seats of time and degree of approach broadcasting receiver when broadcast is received Mark).In one embodiment, central server can generate statistical information, the sensing of the wireless identity emitter such as reported The median of device, mean value, minimum of a value and maximum, and be also based on special time period (for example, the moon, year, day, daytime, Evening etc.) and condition (for example, in the sensing data of the reports such as school, the inside, outside, room) calculating sensing data Tendency information.In other embodiments, central server can safeguard any equipment for being associated with incentive plan Statistical information.For example, central server can be generated and indicate how much equipment realizes the statistics rewarded within a period.
In frame 2510, central server can calculate the reward of the user being associated with wireless identity emitter and/or Incentive plan status information.Central server can be by some or all of users in the user profile of storing up databases Information is compared to calculate reward and/or reward status information with the incentive plan information for being stored.For example, central server The currently stored sensing data of user and the plan threshold value of storage can be compare to determine if to realize reward. Incentive plan status information (or state) can be to user towards the progress of specific objective or achievement assessment.For example, central authorities Server can calculate being nearly completed user more he as body-building incentive plan defined daily body movement target (for example, Percent Complete).Another example is lifted, central server can calculate state of the of that month activity of instruction user than last monthly error Information.
In one embodiment, central server can be based on biography storing, receiving within a period of time for user Sensor data are rewarded and/or progressive designator to determine.Based on the incentive plan information for being stored, central server can be by The reward of specified quantitative is attributed in special time period the progress of the calculating towards the specific rank of a target.For example, Yong Huke To be awarded some rewards " integration ", reward voucher or privilege because completing the moving target on the same day.Another example is lifted, works as user Activity data when occurring without rather than in the room of user, central server can authorize extra reward.
In frame 2512, central server can send the message of the incentive plan status information for instruction user.Example Such as, when the sensing data related to incentive plan is received, central server can send to the smart phone of user and disappear Breath.Message can be the communication of Email, SMS text, telephone message or other Program Generatings.It is right that message can include Towards the instruction of the progress or state for realizing a target or reward, (for example, " you have been completed the 50% of training!" or " you just Obtain that cookies!"), user is relative to the statistics of the performance of time period or condition, with regard to for calculating the variable of state Information and the explanation with regard to how realizing target, rewarding or how to be awarded more reward points.In one embodiment, Message can also include to realize reward instruction, such as reward voucher, prize, encourage message, benefit, honor, special price and User is set to be continuing with other encouragement of the incentive plan.For example, based on the moving target for having reached the same day, user can receive The Email of the reward that the TV of the extra hour in for indicating his/her house is used.Another example is lifted, Jump under due to jumping on during fitness class up to a period of time, children can obtain the school's pass for eating out lunch.One In individual embodiment, can access, render by the application, software and/or the service that perform on the mobile device of user and with it Its mode utilizes message.For example, message can be with formatted, so that the retail shop app run on the smart phone of user Store coupons can be displayed to the user that.
In decision block 2513, central server can determine whether it is authorized to the data of shared user, such as user Identity and/or incentive plan status information.In other words, arranged based on the license being associated with user, central server can With determine user for should be for other sides (for example, businessman, father and mother etc.) related to incentive plan anonymity or can Identification.Central server can be based on the determination and the License Info stored in user-dependent central server, such as The License Info being linked in the profile of the identity of user (or identity of the wireless identity emitter of user).For example, Yong Huke Can will indicate him/her during registration process only authorizes central server that his reward meter is shared with his/her father and mother The state of drawing.If central server is not authorized to shared user data (that is, decision block 2513="No"), then central server The operation in decision block 1402 can be proceeded.It is important that the mandate determines, this is because it can make central server Reward can be distributed to user anonymity, such as reward voucher, promotion is anonymously sent to customer, given a discount or other are attractive Information, without to customer merchant identification being associated with the reward.
If central server is authorized to shared user data (that is, decision block 2513="Yes"), then in frame 2514, in Centre server can be with to each side's transmission message being associated with incentive plan.These each side can include exploitation incentive plan with Distribution reward voucher retailer or businessman or alternatively with user-dependent support side.Support side can be included in central service Anyone of incentive plan state indicate in device, that notified user may be needed, such as nursing staff, father and mother, teacher, coach And trainer.For example, if incentive plan is relevant in the sports of school with child, central server can teach to body-building Teacher sends the message that the information to the participation with regard to user in incentive plan is indicated.The message can include the prize of user Encourage projected state information, progress and the user any reward (example that have been received by of the such as user towards a target or prize Such as, user has been received by reward voucher or franchise code) designator.In one embodiment, the message can also include closing In the instruction for how aiding in user to realize incentive plan target.For example, for example, body-building teacher can receive and he/her should be gone Encourage the text message that sluggish user is indicated during fitness class.Central server can proceed decision block Operation in 1402.
Figure 26 is shown for central server in response to receiving the wireless identity transmitting in the degree of approach with reward region The related aiming message of machine is calculating the embodiment method 2600 of reward.Method 2600 similar to said method 2500, difference Place is:Method 2600 can be executed for being carried in the degree of approach of predefined region (that is, rewarding region) based on user For, calculate, otherwise distribution reward (for example, reward voucher, prize, information, message etc.).For example, central server is safeguarded Incentive plan can indicate to exist and reward the prize that is associated of region with retail shop so that any region of coming into Customer in the degree of approach can receive reward voucher, promotion or other are tempting preferential.Reward region can be retail shop, school, The particular room in special modality or end-rack, house in library or any other place being associated with incentive plan.When When predefined geo-fence is broken or simply when degree of approach broadcasting receiver is in reward region from the wireless of user When identity emitter receives broadcast, can calculate and reward and send it to user.This reward based on the degree of approach Can order about in customer environment and guide flow of the people and encourage other user behaviors.For example, father and mother can be his/her Child configures incentive plan, the incentive plan provide to child go to locality (for example, school, library, grandmother's, Dustbin etc.) when using household electronic equipment (for example, iPad, tablet computer, television set, internet device etc.) credit (or permission).
In frame 2501, central server can store the reward meter being defined to bonus requirements and associated reward The information of drawing.Bonus requirements can indicate the reward region being associated with particular bonus, so that the connecing in reward region as user In recency, it is possible to obtain, be awarded or otherwise realize associated reward.Reward region can be by mark locality Data (unique identities of the degree of approach broadcasting receiver in such as geo-fence information, gps coordinate, and/or locality) To define.In one embodiment, central server can be stored each gps coordinate set and different prizes, reward voucher Or the tables of data of benefit link.For example, central server can store by store coupons (that is, reward) with enter corresponding to shop The incentive plan tables of data of the gps coordinate link of mouth (that is, rewarding region).Furthermore, it is possible to combine each with regard to particular bonus Condition.For example, central server can store the permission credit of the geo-fence coordinate of the school by child is come for child With the reward meter that the Schools Work time links (that is, when child can authorize permission when school's time school is accessed to him/her) Draw tables of data.
In decision block 1402, central server can determine whether aiming message is received.If central server does not have Aiming message (that is, decision block 1402="No") is received, then central server can proceed in decision block 1402 Operation.If central server is actually received aiming message (that is, decision block 1402="Yes"), then in decision block 1702, Central server can determine whether wireless identity transmitter identity is known.If wireless identity emitter is not known (that is, decision block 1702="No"), then in frame 1703, central server can ignore aiming message and continue executing with determination Operation in frame 1402.If wireless identity emitter is known (that is, decision block 1702="Yes"), then in decision block 2502 In, central server can determine whether aiming message is related to incentive plan.If message is not related to incentive plan (i.e., Decision block 2502="No"), then central server can proceed the operation in frame 1703.
If however, message (that is, decision block 2502="Yes") related to incentive plan, then in frame 2508, central authorities take Business device can also store the various information related to message is aimed at, and such as aim at reception time and the degree of approach broadcast of message Positional information (for example, gps coordinate) of the receiver when broadcast is received.In decision block 2602, central server can be with Determine wireless identity emitter whether in the degree of approach in reward region.As noted previously, as it is by wireless identity to aim at message What the degree of approach broadcasting receiver in the degree of approach (or broadcasting area) of emitter sent, therefore central server can be by inciting somebody to action The positional information of the degree of approach broadcasting receiver of the aiming message that transmission is received is known with the operation storage using frame 2501 Reward regional location be compared to determine wireless identity emitter whether in the degree of approach in reward region.In a reality In applying example, central server (for example, can connect the positional information in the aiming message for receiving for indicating degree of approach broadcast The metadata of the gps coordinate of receipts machine) it is compared with the list of locations corresponding to the reward region being associated with incentive plan. In wherein deploying another embodiment of static degree of approach broadcasting receiver, central server is quiet as can storing Only the positional information of degree of approach broadcasting receiver is compared to determine that the aiming message for receiving is with known reward region It is no corresponding with reward region.In one embodiment, when between the position for sending the degree of approach broadcasting receiver for aiming at message Distance to reward region degree of approach thresholding in when, central server can determine wireless identity emitter reward region The degree of approach in (or near).
In various embodiments, central server can be it is determined that whether wireless identity emitter be when areas adjacent is rewarded Extraneous information can be utilized.Specifically, the location estimation of wireless identity emitter can be to take aim in transmission by central server In the border circular areas of the degree of approach broadcasting receiver of quasi- message.The border circular areas can have flat equal to wireless identity emitter The radius of equal broadcasting area.Central server can also aim at description the signal strength information of the broadcast reported in message It is estimated to determine the degree of approach information of more accurate wireless identity emitter.For example, connect based on the broadcast of the known degree of approach The signal strength signal intensity of the ability of receipts machine and associated broadcast, central server can determine that wireless identity emitter is sending Aim at message in broadcast when in the specific range away from degree of approach broadcasting receiver.In one embodiment, central authorities' clothes Business device can indicate (or " RSSI ") information to determine wireless identity using what is received from the signal strength signal intensity aimed in message Approximate distance of the emitter away from degree of approach broadcasting receiver.In one embodiment, central server can also use schematic diagram Or other plans or source data come determine degree of approach broadcasting receiver and therefore wireless identity emitter it is more accurate Positional information.For example, central server can be surrounded based on the north and west that indicate degree of approach broadcasting receiver by exterior wall Plan is determining the east side or southern side of wireless identity emitter degree of being located adjacent to broadcasting receiver.In one embodiment, in Centre server can perform and operate to determine the more accurate positional information of wireless identity emitter.For example, central server can More concurrently to aim at the information in message to define exact position of the wireless identity emitter in a place.In another reality In applying example, central server can determine customer's (and wireless identity using dead reckoning and other estimation routines or algorithm Emitter) whether in the near future may be in reward areas adjacent.For example, central server can be to the recent motion of customer Pattern is estimated to determine that he/her may be before the product introduction of retail shop in several seconds.
Return Figure 26, if wireless identity emitter not reward region the degree of approach in (that is, decision block 2602= "No"), then central server can proceed the operation in decision block 1402.If however, wireless identity emitter is in prize Encourage (that is, decision block 2602="Yes") in the degree of approach in region, then in frame 2604, central server can be based on wireless identity Emitter calculates the reward of the user of wireless identity emitter and/or incentive plan state letter in the degree of approach in reward region Breath.Central server can be estimated with searching and the nothing closest to user to the bonus requirements for storing and the reward of being associated The reward that the reward region of line identity emitter matches.For example, central server can determine can to user authorize for The reward voucher of the internet access of 20 minutes is carried out via private network, this is because the wireless identity emitter of user is in business In the degree of approach in the special counter reward region in.Another example is lifted, central server can determine can be authorized separately to user One reward (for example, extra dollar subsidy), this is because the wireless identity emitter of user is upper in non-vacation jobs day In the degree of approach of the degree of approach broadcasting receiver during the noon in schoolhouse.
In one embodiment, when wireless identity emitter is determined to be in the degree of approach in multiple reward regions, in Centre server can recognize the reward for all reward regions.Alternatively, central server can be recognized and made a reservation for nearest The corresponding reward in adopted region.For example, central server can be based on the aiming message (or concurrent aiming message) for receiving The interior signal strength information reward region nearest to determine wireless identity emitter.
In optional frame 2606, central server can be used for based on calculated incentive plan status information to send Indicate the message of activation equipment.In other words, central server can be to (or wireless identity is sent out with incentive plan and/or user Penetrate machine) associated equipment sending message, the message includes the instruction for activating software, routine or function to realize rewarding. For example, the message can be to home videos, tablet computer (for example, iPad), wireless router, phone or meter on knee The signal of calculation machine, the signal unlocker device is with the specific time period for users to use.In another embodiment, the message can be with Be sent to reward region in display device and the prize for having obtained/having realized with user for display device pair can be included Encourage the instruction that the information of correlation is rendered.For example, the message can indicate the LCD display wash with watercolours at the end-rack that retail shop passes through Dye coupon code.In another embodiment, the letter of the scratch-off element during the message can be included with regard to activating user interface Number or instruction.
In frame 2512, central server can send the message of the incentive plan status information for instruction user.Example Such as, central server can send SMS text to the mobile device being associated with user, and its instruction user has been awarded For entering the reward voucher in reward region.Lift another example, central server can send instruction user need to go to it is another Individual site/area is to realize the message of reward voucher.
In decision block 2513, central server can determine whether it is authorized to the data of shared user, such as user Identity and/or incentive plan status information.In other words, arranged based on the license for user's storage, central server can With determine user for should be for other sides (for example, businessman, father and mother etc.) related to incentive plan anonymity or can Identification.If central server is not authorized to shared user data (that is, decision block 2513="No"), then central server The operation in decision block 1402 can be proceeded.If central server is authorized to shared user data (that is, decision block 2513 ="Yes"), then in frame 2514, central server can be sending for instruction user to each side being associated with incentive plan Status information message.Central server can proceed the operation in decision block 1402.
For purposes of illustration, central server can be configured to execution method 2600 and (or seek come game of realizing looking for something Treasured game) incentive plan.Can develop with the businessman of central server registration and look for something game reward plan to encourage and businessman's phase Flow of the people in the retail shop of association.Central server can store the positional information of the reward zone list in retail shop.Prize Encouraging region can include degree of approach broadcasting receiver, and it is configured as when customer is come in the degree of approach from the wireless identity of customer Emitter is received and repeat broadcast message.Central server can also store businessman's offer, indicator in retail shop The information of the specific coupon in each reward region, and indicate that incentive plan is effective condition only in Black Friday.This Outward, incentive plan storage information can include indicating to authorize special preferential treatment to the customer in the degree of approach for coming into all reward regions The condition of certificate.For example, the customer in each reward region is accessed during Black Friday can receive offer in retail shop The reward voucher of the significantly discount of expensive goods.Therefore, during Black Friday, central server can be based on customer and zero Sell the degree of approach for rewarding region in shop to send disappearing for the reward voucher for indicating that the customer is awarded to his/her mobile device Breath.Central server can be with disappearing to other the reward regions in the mobile device of customer transmission instruction not yet access retail shop Breath, thus encourages customer to continue to explore that more and more preferable reward vouchers may be received.
Figure 27 A-27B and 28A-28C show exemplary scenario, wherein, smart phone degree of moving closer to broadcasting receiver 138 (hereinafter referred to as mobile devices 138) can be based on and be received from the wireless identity emitter 110 being associated with target device Broadcast arranging target device.Go Anywhere to him/her because user can carry mobile device 138, therefore Mobile device 138 can be used to providing user and to central server registration or otherwise between known various equipment nearby Interaction.For example, when being carried near the registration computing device for belonging to another user, mobile device 138 can be used " public " data (for example, be authorized to be for central server share data) come automatically carry out software (for example, app) and/ Or the operation that execution is related to neighbouring computing device.In various embodiments, mobile device 138 can be wide using one or more Domain net transceiver is (for example, for logging in the WiFi radio-cells of LAP LAN Access Point, the honeycomb for logging in Cellular Networks access point Net radio-cell etc.) and for receiving one or more short range transceivers of short-range signal, such as bluetooth radio-cell.
Figure 27 A-27B show that mobile device 138 arranges the router 185 being associated with wireless identity emitter 110, all Such as WiFI routers.In various embodiments, router 185 can include circuit and/or otherwise be configured to conduct Wireless identity emitter 110 (that is, regularly broadcast includes the message of secure identifier etc.) operating, or alternatively, wirelessly Identity emitter 110 can be the specific installation for simply depending on router 185.Additionally, mobile device 138 can utilize nothing Line connection 2711 (for example, cellular network connection etc.) comes and remote equipment (such as central server, not shown) exchange data.
As shown in fig. 27 a, mobile device 138 can be in the region with available network (for example, LAN), for institute Available network is stated, router 185 can serve as WAP.Mobile device 138 can be from router 185 (for example, WiFi) Receiving data signal, such as indicating that (for example, WiFi protections are accessed the security protocol of service set (SSID) and network (WPA) signal etc.).However, in the case of the voucher without approval, mobile device 138 is possibly cannot be via router 185 It is connected to network.Therefore, mobile device 138 can show message 2702, and message 2702 indicates to need password to come via router 185 logging in network.
It is mobile when interior in the degree of approach (or broadcasting area) of the wireless identity emitter 110 being associated with router 185 Equipment 138 can receive the broadcast 2710 for including secure identifier via short range, wireless signals.For example, mobile device 138 can receive the packet of bluetooth LE, and it is by the periodic broadcasting of wireless identity emitter 110 and including rolling identifier.Such as It is upper described, mobile device 138 can using from the data of such broadcast 2710 as aiming at message automatically via nothing Line connection 2711 (is not illustrated) to central server by internet relay in Figure 27 A.In response to receiving such aiming Message, central server can perform operation to recognize the letter related to wireless identity emitter 110 and/or mobile device 138 Breath.Specifically, central server can recognize the logging on authentication of network for being associated with router 185 and by these Voucher sends back mobile device 138 by wireless connection 2711 via message is returned.Figure 27 B show that mobile device 138 is responded Return message as receiving from central server to be connected to router 185 via wireless communication link 188.Additionally, moving Dynamic equipment 138 can show message 2752, and message 2752 indicates the connection via router 185 to LAN.
In certain embodiments, wireless identity emitter 110 can be configured to all as in response to mobile device 138 connects To router 185, the transmission via short-range signal to broadcast 2710 is disabled.
In certain embodiments, new target device can be set based on the degree of approach.Used as an explanation, user can be with The new router 185 (for example, WiFi access points) for including wireless identity emitter 110 is installed in his/her house, is such as schemed Shown in 27A-27B.Because router 185 is new, therefore it may not be to associate in advance with user.In other words, central authorities Server can not store the profile for linking router 185 with user and/or his various equipment (such as mobile device 138) Information.Factory-configured by default, router 185 can be initially configured as preventing inside and outside internet access with And limited wireless access is only provided.When activation (for example, when be inserted into supply socket), router 185 can start via Including wireless identity emitter 110 regularly sending broadcast.The mobile device 138 that user carries can be received to be had The broadcast 110 of secure identifier and via cellular network connection 2711 to central server send aim at message.Central authorities Server can process aiming message, decoding security identifier and router 185 is recognized based on the identifier for being decoded. Central server can determine that the identifier is the new access point in user family, such as by will storage profile data with aim at Positional information and other data (for example, the identifier of mobile device 138, gps coordinate etc.) in message is compared.As sound Should, central server can to user mobile device 138 send be used for it is corresponding with the app that router 138 is communicated App shops URI.Mobile device 138 can point out user installation app, and after mounting, can automatically run app. The step of app can lead user by initial authentication with router 138.After the initial authentication of user, router 138 can send credential information to relay to central server in the profile that is associated with user to mobile device 138 Storage.For example, central server can be by the device identifier of router 138 (for example, MAC Address etc.) and user and/or use The position link in the house at family.Central server can send to mobile device 138 and be stored in user by central server Profile in user standard WiFi configuration data (for example, device name, SSID, password, DNS arrange, IP arrange etc.).Move Dynamic equipment 138 can send WiFi configuration datas via app to router 185, and router 185 can be utilized configuration then Data are connected to internet after being configured.If necessary, mobile device 138 can also be configured to access router 185 by app (for example, store SSID, WiFi password, perform voucher etc.).
Figure 28 A-28D show mobile device 138 based on from the wireless identity transmitting for being coupled to household electrical appliances 2802 (that is, refrigerator) The broadcast that machine 110 is received is arranging household electrical appliances 2802.Although household electrical appliances 2802 are illustrated as refrigerator in Figure 28 A-28D, should When it is appreciated that household electrical appliances 2802 can be any smart machine or intelligent appliance, such as TV, audio amplifier, washing machine, dish-washing machine Deng, and therefore should not be considered limited to refrigerator.
In various embodiments, household electrical appliances 2802 can include circuit and/or otherwise be configured to as wireless body Part emitter 110 operating (that is, regularly broadcast includes the message of secure identifier etc.), or alternatively, wireless identity It can be the specific installation for simply depending on household electrical appliances 2802 or being included in household electrical appliances 2802 to penetrate machine 110.Additionally, household electrical appliances 2802 The various assemblies for transmission and processing data can be included.Specifically, household electrical appliances 2802 can include processor (not in figure Illustrate in 28A-28D) and the display unit 2810 of processor is coupled to, such as light-emitting diode display or monitor.For example, show Unit 2810 could be for the screen of the reading for rendering the Current Temperatures in household electrical appliances 2802.
Household electrical appliances 2802 can also include being coupled to the transceiver and antenna 2804 of processor for coming via wireless signal Exchange data.Household electrical appliances 2802 can be configured to be connected to router 185 via wireless communication link 2806, and router 185 can To serve as the WAP of LAN.Therefore, household electrical appliances 2802 can exchange communication with the miscellaneous equipment on LAN.It is similar Ground, mobile device 138 can be communicated via wireless communication link 188 with router 185.Mobile device 138 and/or household electrical appliances 2802 may have been carried out various login process to access LAN via router 185.In various embodiments, household electrical appliances 2802 and mobile device 138 can be configured to via wireless signal 2811 (such as via WiFi is direct-connected, bluetooth and/or other The component of agreement and correlation) directly exchange data.
In Figure 28 A, mobile device 138 can be not adapted to be docked with household electrical appliances 2802.For example, mobile device may be still Appropriate software (for example, app) and/or voucher (example required for being communicated with the software performed on household electrical appliances 2802 is not installed Such as, login, password etc.).In this case, mobile device 138 can show message 2820, and message 2820 does not have for instruction App can be used to be interacted with household electrical appliances 2802.
In Figure 28 B, mobile device 138 can be via short range, wireless signals from the wireless body being associated with household electrical appliances 2802 Part emitter 110 receives the broadcast 2822 for including secure identifier.As described above, such broadcast 2822 can be The bluetooth LE packet with the secure identifier (for example, roll code etc.) related to household electrical appliances 2802 of periodic broadcasting.As above institute State, mobile device 138 can using from the data of such broadcast 2722 as aim at message automatically by internet Relay to central server (not illustrating in Figure 28 B).For example, mobile device 138 can be via router 185 or alternatively Jing Sent to central server from cellular network connection (not illustrating in Figure 28 A-28D) and aim at message.
In response to receive aim at message, central server can perform operation with recognize with wireless identity emitter 110 and/ Or the information of the correlation of mobile device 138.Specifically, central server can recognize the software for docking with household electrical appliances 2802 (or app), and to mobile device 138 instruction can be sent with regard to how to obtain and/or configure the instruction of such software Return message (that is, routeing via router 185 or via cellular network connection delivering etc.).For example, returning message can indicate For downloading application shop (or " App shops ") position, Uniform Resource Identifier for accessing the software of household electrical appliances 2802 (URI), URL (URL), Internet protocol (IP) address or other DSNs or position.Lift another to show Example, return message can include port numbers, form, agreement, user name and/or the password for accessing household electrical appliances 2802.Return disappears Breath can include being applied to the information of mobile device 138, such as be designed for the specific operation system run on mobile device 138 The application store locations of the application that system (for example, iOS, Android etc.) is used.
Figure 28 C show that mobile device 138 is matched somebody with somebody in response to receiving such message that returns from central server to perform Put the software 2830 for docking with household electrical appliances 2802.Specifically, software 2830 can be configured as only connecing from household electrical appliances 2802 Collect mail the app for ceasing.In other words, based on the information received in message is returned, mobile device 138 can only be enabled as holding Row can be inquired about from household electrical appliances 2802 or otherwise receive information still cannot its configuration of the change of order household electrical appliances 2802 or behaviour Make the application of state.For example, software 2830 can provide the data to household electrical appliances 2802 to mobile device 138 and action (is such as used In the information (for example, " temperature is arranged to 67 ") for rendering Current Temperatures measurement result) it is " read-only " access.Can be via passing through The transmission of LAN and router 185 or alternatively directly by wireless signal between mobile device 138 and household electrical appliances 2802 2811 come receive from household electrical appliances 2802 receive for the information that is used together with software 2830.In certain embodiments, due to soft Part 2830 is only configured to provide " read-only " access or alternatively because the voucher provided in message is returned only is realized to household electrical appliances 2802 " read-only " access, therefore mobile device 138 may only can be from the receive information of household electrical appliances 2802.
Example as an alternative, Figure 28 D show that mobile device 138 disappears in response to receiving such return from central server Cease to perform the software 2840 for being arranged to be docked with household electrical appliances 2802.Specifically, software 2840 can be configured as connecing Collect mail breath and/or the app to the offer order of household electrical appliances 2802.In other words, it is mobile based on the information received in message is returned Equipment 138 can be enabled as performing the application of the operation that can completely control household electrical appliances 2802.For example, software 2840 can include Graphical user-interface element 2842,2842 ', its can cause being raised and lowered of temperature in household electrical appliances 2802 (for example, from 67 degree to 52 degree etc.) and can control via touch input via the finger 2844 of user.Can be via by LAN and route The transmission of device 185 or alternatively directly exchanged by the wireless signal 2811 between mobile device 138 and household electrical appliances 2802 from Household electrical appliances 2802 receive for the information that is used together with software 2840 and/or from mobile device 138 for controlling household electrical appliances 2802 order.
In the following description, wireless identity emitter can be referred to as being associated with single target device, otherwise also So.For example, wireless identity emitter may be coupled to household electrical appliances as above.However, in various embodiments, target device and Its associated wireless identity emitter can be same equipment.
Figure 29 A-30A are shown for including wireless identity emitter, being coupled to wireless identity emitter or with other The embodiment operation that the target device that mode is associated with wireless identity emitter is configured.As discussed above concerning Figure 27 A-28D Illustrate, (movement for for example, being configured to be operated as degree of moving closer to broadcasting receiver sets degree of approach broadcasting receiver It is standby) broadcast can be received from the neighbouring target device that can be set, and in response to by from the data of those message Central server is relayed to, information and/or software for arranging target device nearby can be received.By to central server The information for solving is sent, degree of approach broadcasting receiver only can obtain identification information when authorized, and thus protecting can With the anonymity of the target device being set and maintain equipment to such target device can be arranged and/or user's collection The patent rights of conjunction.In other words, central server can be sent out by only providing information to control when authorized with wireless identity Penetrate the setting of the associated target device of machine.For example, mobile device only can be in the mobile device (or its user) based on central authorities The data stored at server recognized during pre-authorization nearby target device (for example, refrigerator, router etc.) can be set with And receive password or app for arranging the neighbouring target device.
(for example, can be configured to be grasped as degree of moving closer to broadcasting receiver by degree of approach broadcasting receiver respectively The smart phone of work) and central server independently performing the embodiment method 2900 and 3000 for arranging target device. In various embodiments, method 2900,3000 can concomitantly and be in combination performed.It is to be appreciated that method 2900, 3000 operable frame is visually arranged in Figure 29-30 to provide to the mutual of degree of approach broadcasting receiver and central server Connect more preferably illustrating for characteristic;However, the timing not being explicitly indicated in the following description or other dependences should not be inferred.
Method 2900 can be similar to the method 700 and 1100 for respectively referring to the descriptions of Fig. 7 and 11 above.Specifically, side Operation in the frame 702,706,1101-1102 of method 2900 can be similar in the frame 702,706,1101-1102 of method 1100 Operation, difference support be:Method 2900 can be included for arranging target based on the information received from central server The operation of equipment.Additionally, method 3000 can be similar to the method 1400 and 1700 for respectively referring to the descriptions of Figure 14 and 17 above.Tool For body, the operation in the frame 1402,1702,1704 ', 1708,1706 ' of method 3000 can be similar to the frame of method 1700 1402nd, the operation in 1702,1704,1708,1706.
With reference to Figure 30, in frame 3002, the processor of central server can be received between the waiting period and stored to be had It is all as discussed above concerning Figure 13 descriptions from the profile information of the license of each user.For example, central server can be via door Family website receives profile information, and the profile information indicates owner, his/her contact details and the master of wireless identity emitter The equipment (for example, wireless identity emitter, degree of approach broadcasting receiver, laptop computer, smart phone etc.) that people is associated Identifier, the type (for example, mobile device, desktop PC, WIT, PBR etc.) of equipment that possesses of owner and and owner Related other information.Database can be stored in for the profile information of each party in each side as profile or Data Entry In.In various embodiments, profile may be coupled to user unique identities (that is, device identifier or deviceID) or with It is associated.
The profile information of storage can include can be used for accessing, contact the registration wireless identity transmitting being associated with profile Machine, degree of approach broadcasting receiver and/or target device or the information otherwise docked with above-mentioned items (are referred to as " mark Knowledge information ").Identification information can include the identity of the wireless identity emitter of non-fuzzy, and send out for accessing wireless identity Penetrate the information of machine and/or its associated target device.For example, identification information can include the SSID of access point and log in close Code, and/or for downloading the position of the data source of the software for access points (for example, for downloading the app shops of app Position, network address etc.).
As described above, the profile information of each side can also include how and when profile information being authorized to for dividing Issue the License Info (or profile license) that other sides are indicated.For example, can indicate can be with receive user for License Info Either party, the identity of businessman or other entities of the specific part of the data stored in profile.In certain embodiments, profile License can indicate that the specific part of profile information is public or privately owned.For example, central server can store instruction The name of user is not share the License Info of private information by entirety, and the home router password of instruction user can be only Arrange with another license for being known as the collaborative share that friend or household possess.In certain embodiments, every profile number Indicate whether central server can send the data to particular device, equipment group, another user according to having Label, rule, mark or designator or other characteristics that authorized user is defined.For example, storage for specific use The license at family can indicate central server can only be known as in ad-hoc location (for example, the family of user is medium) its Its collaborative share profile information (for example, router login password etc.).In various embodiments, can be by the profile information of storage Classification, such as personal data and device data, and each class can be associated from different licenses.
With reference to Figure 29 and as described above, in decision block 702, the processor of degree of approach broadcasting receiver can be determined that It is no to receive broadcast from wireless identity emitter.For example, degree of approach broadcasting receiver can enter to incoming message buffer Row assessment is grouped with determining whether the bluetooth notice for having been received by the rolling identifier for including wireless identity emitter.In response to It is determined that not yet receiving broadcast (that is, decision block 702="No"), then in decision block 702, degree of approach broadcasting receiver can To continue to monitor the reception to broadcast.Broadcast (that is, decision block 702="Yes") is had been received by response to determining, Then in frame 706, the processor of degree of approach broadcasting receiver can be based on the broadcast received from wireless identity emitter To be sent to central server and aim at message.For example, degree of approach broadcasting receiver can connect to central authorities' clothes via cellular network Business device sends and aims at message, and the aiming message includes that its mark and the data from the broadcast for receiving (for example, are rolled Identifier etc.).
With reference to Figure 30 and as described above, in decision block 1402, the processor of central server may determine whether to connect Receive aiming message, the aiming message for such as being sent by degree of approach broadcasting receiver using the operation in the frame 706 of Figure 29.Response In it is determined that being not received by aiming at message (that is, decision block 1402="No"), then in decision block 1402, central server can be with Continue to monitor the reception to aiming at message.
Receive aiming message (that is, decision block 1402="Yes") in response to determining, then in decision block 1702, central authorities' clothes The processor of business device can determine whether wireless identity emitter is known based on the aiming message for receiving.For example, in Centre server can be decoded to determine device identifier, and to depositing to the rolling identifier in the aiming message that receives The profile information of storage is estimated (for example, to be sought so that any profile in the profile for determining whether storage is related to device identifier The profile for looking for instruction equipment identifier to be registered).In response to determining the wireless identity indicated by the aiming message for receiving Emitter is not known (that is, decision block 1702="No"), central server can return monitor in decision block 1402 it is right Another aims at the reception of message.
In response to determining that the wireless identity emitter indicated by aiming message is known (that is, decision block 1702= "Yes"), in decision block 1704 ', the processor of central server can determine whether aiming message is wide with the known degree of approach Receiver is broadcast related, similar to the operation in the decision block 1704 described above with reference to Figure 17.In other words, central server The aiming message that receives can be estimated to detect the degree of approach broadcasting receiver of the aiming message that transmission is received Identity, and the profile of the storage related to the identity can be recognized using the identity.When the profile that there is matching (that is, is wrapped Include such as the degree of approach broadcasting receiver indicated in aiming at message identity profile) when, degree of approach broadcasting receiver can be with It is considered as known to central server and therefore is certified degree of approach broadcasting receiver.For example, aiming at message can To include indicating that it is that (it is previously via registration door and central server registration by the equipment in house location to aim at message Profile) metadata that sends.In response to determine aim at message it is not related to known degree of approach broadcasting receiver (that is, it is determined that Frame 1704 '="No"), central server can return the reception monitored in decision block 1402 to another aiming message.
It is related to known degree of approach broadcasting receiver (that is, decision block 1704 '="Yes") in response to determining aiming message, In decision block 1708, the processor of central server can determine whether degree of approach broadcasting receiver is allowed to, and (or mandate) connects The identification information related to the wireless identity emitter for being associated with aiming message is received, as mentioned above.For example, central server can be with Determine degree of approach broadcasting receiver whether be authorized to receive SSID, for " App shops " position (for example, URI of related software Deng), fetcher code, and/or for the related target router equipment of wireless identity emitter indicated in description message Other information.Central server can be by by profile information (for example, the Yong Hushen related to degree of approach broadcasting receiver Part, device type and the relation of target device etc.) with the profile information related with wireless identity emitter (for example, permit etc.) It is compared to any such authorized identification information of identification.For example, central server can be by degree of approach broadcast reception The approved behaviour that the type of the operating system of machine operation is stored with the target device with regard to being associated with wireless identity emitter It is compared as system list.Compared using such profile, central server can be from related to wireless identity emitter Identification in profile information is authorized to be shared information.In various embodiments, central server can be based on degree of approach thresholding (for example, 1 meter etc.) and/or aim at message signal strength threshold come determine degree of approach broadcasting receiver can be authorized to reception letter Breath.
As explanation, central server can recognize and the aiming message that receives indicated by wireless identity emitter First associated profile of (or its user), such as by using from the decoded of the wireless identity emitter for aiming at message Roll identifier and to be performed in profiles database lookup.First profile can include identification information, and the identification information can be wrapped Include for downloading the web addresses of the application for docking with household electrical appliances (for example, refrigerator etc.), for logging in household electrical appliances to come using application Obtain " read-only " first password for accessing (for example, only receive measurement result data, control command etc. is not provided) and for stepping on Record household electrical appliances to obtain the second password for controlling " complete " access of the function of household electrical appliances using application.Central server can be with The second profile being associated with the degree of approach broadcasting receiver for sending the aiming message for receiving is recognized, such as by using aiming The device identifier of the degree of approach broadcasting receiver that message includes to be performed in profiles database lookup.Central server can With to information (for example, the class of the equipment that the owner of degree of approach broadcasting receiver is associated with the second profile from the second profile Type, owner are friend or kinsfolk etc.) and the license together with the various information Stores of the first profile be estimated It is total to the owner of degree of approach broadcasting receiver and/or degree of approach broadcasting receiver with determining whether that any identification information is authorized to be Enjoy.Used as response, central server can determine that degree of approach broadcasting receiver is authorized to receive information, and the information is included under Carry the web addresses of application and the first password for logging in household electrical appliances to obtain " read-only " access using application.
Identification information (that is, decision block is received in response to determining that degree of approach broadcasting receiver is not allowed to (or mandate) 1708="No"), central server can return the reception monitored to another aiming message.In response to determining degree of approach broadcast Receiver is allowed to (or mandate) and receives identification information (that is, decision block 1708="Yes"), in frame 1706 ', central server Processor can generate return message, the return message have it is related to known wireless identity emitter, be authorized to be The identification information shared with degree of approach broadcasting receiver.For example, the return message for being generated can include from aim at message All public profiles information of the associated profile of indicated wireless identity emitter.In certain embodiments, identification information Can include for access will degree of being approached broadcasting receiver arrange target device voucher, such as user name, password, PIN Deng.Additionally, the operation in frame 1706 ' can be similar to the operation as discussed above concerning the frame 1706-1714 descriptions in Figure 17.In frame In 3004, the processor of central server can send the return with authorized identification information to degree of approach broadcasting receiver Message, and the operation in decision block 1402 can be proceeded aim at message monitoring follow-up input.
Figure 29 is returned, as described above, in decision block 1101, the processor of degree of approach broadcasting receiver may determine whether The return message from central server is received, is such as supervised by the message of the form for including being used in return message Survey incoming message buffer.Return message (that is, decision block 1101="No") is not yet received in response to determining, degree of approach broadcast Receiver can proceed the operation in decision block 1101, or in certain embodiments, can continue in decision block 702 Monitor the input broadcast from wireless identity emitter.
Have been received by returning message (that is, decision block 1101="Yes") in response to determining, in decision block 1102, be close to The processor of degree broadcasting receiver can determine whether return message includes the identification information related to wireless identity emitter, all Such as by can be used for what is docked with the target device for being associated with wireless identity emitter to recognize to returning message and being estimated Any data.In response to determining that returning message does not include identification information (that is, decision block 1102="No"), degree of approach broadcast reception Machine can continue to monitor the input broadcast from wireless identity emitter in decision block 702.
In response to determining that return message includes identification information (that is, decision block 1102="Yes") really, degree of approach broadcast connects The processor of receipts machine can use the mark message from return message to carry out pair target being associated with wireless identity emitter and set It is standby to be configured.For example, degree of approach broadcasting receiver can log in router or download using the identification information for receiving For accessing the application of the annex household electrical appliances being associated with wireless identity emitter.In optional frame 2904, degree of approach broadcast connects The processor of receipts machine can exchange signal with set target device.For example, degree of approach broadcasting receiver can send and be used for The order of the set target device of control, such as activation command, deactivation command, for the life of inquiry operation status information Order, and/or the order for causing the change of the behavior of set target device.Subsequently, degree of approach broadcasting receiver can be with Proceed the operation for monitoring and processing input broadcast in decision block 702.
Figure 31 A show and return message to set up use in response to receiving from central server for degree of approach broadcasting receiver In the embodiment method 3100 of the function of arranging target device.Method 3100 is similar to said method 2900, difference: Method 3100 is included for determining whether degree of approach broadcasting receiver requires further configuration and/or ability to arrange target The operation of equipment.For example, the return message of the Bluetooth address of the household electrical appliances to be set is included in response to reception, degree of approach broadcast connects Receipts machine can activate bluetooth radio-cell.In various embodiments, the return message from central server can include instructing Degree of approach broadcasting receiver sets up the instruction or order for arranging the function of target device.For example, returning message can include Script, the script can degree of being approached broadcasting receiver perform should for be configured to be communicated with neighbouring router device With.
Operation in frame 702-1102 can be as described above.In response to determine receive including with receive The return message (that is, decision block 1102="Yes") of the related identification information of broadcast, in decision block 3102, the degree of approach is wide The processor for broadcasting receiver can determine whether it is configured with for pair target device being associated with wireless identity emitter The function of the requirement being configured.Specifically, based on indicate for arrange target device requirement function specification or its Its communicative data, degree of approach broadcasting receiver can determine and dock whether required software is in the degree of approach with target device It is obtainable (that is, the software of installation) on broadcasting receiver, it is described in more detail referring below to Figure 31 B.For example, return The identification information of message can indicate the type (for example, app) of software, the data source (for example, URI) for obtaining software and/ Or will by the instruction that degree of approach broadcasting receiver is performed so as to set up for arrange and/or access target equipment requirement work( Energy.In certain embodiments, it is desirable to function can include activation radio-cell and/or other communication units, such as camera And/or lamp.For example, when return message indicates that bluetooth messages are required for arranging target device, degree of approach broadcasting receiver Can determine whether it have activated bluetooth radio-cell.
In response to determining that degree of approach broadcasting receiver is not configured with for pair being associated with wireless identity emitter The function (that is, decision block 3102="No") of the requirement that equipment is configured, in frame 3104, the place of degree of approach broadcasting receiver Reason device can be based on the instruction returned in message and degree of approach broadcasting receiver is configured with into the function that (or foundation) requires.For example, Degree of approach broadcasting receiver can be configured or set with activation component (for example, radio-cell, thread, routine, application etc.) and/or realization Put adjustment.Another example is lifted, degree of approach broadcasting receiver can be downloaded, installed, and/or performed in the return message for receiving The application of instruction.In various embodiments, degree of approach broadcasting receiver can pass through to perform to include in the return message for receiving Script, instruction set or other orders function that (or foundation) requires configuring.For example, degree of approach broadcasting receiver can be performed For the series of orders for opening and arranging specific wireless, application and/or arrange.
In response to determining that degree of approach broadcasting receiver is configured with for pair target being associated with wireless identity emitter The function (that is, decision block 3102="Yes") of the requirement that equipment is configured, or if performing the operation in frame 3104, then exist In frame 3106, the processor of degree of approach broadcasting receiver can be utilized from the identification information and use requirement for returning message Function is such as logged in or otherwise access equipment arranging target device by using specific app and/or password.Connect Recency broadcasting receiver can perform the operation in optional frame 2904 described above.
In optional frame 3107, the processor of degree of approach broadcasting receiver can be (all to central server transmission information The information (for example, target device identifier, confirmation code, setting etc.) for such as receiving from set target device) to be stored in In related profile.For example, the device identifier of set target device can be relayed to central server for depositing Store up in the profile being associated with user, so that set target device is designated into the new equipment that user possesses now.Connect Recency broadcasting receiver can continue to subsequent broadcast message in decision block 702.
Figure 31 B show and come to data in response to receiving return message from central server for degree of approach broadcasting receiver Software is asked so that degree of approach broadcasting receiver to be configured with (or foundation) for arranging the embodiment of the function of target device in source Method 3150.Method 3150 is similar to said method 3100, difference:Method 3150 is included for obtaining from remote source Software is to have the specific operation for arranging the function of the requirement of target device.For example, URI addresses are included in response to receiving Return message, degree of approach broadcasting receiver can from application server request and received data file.
Operation in frame 702-1102 and 3102 can be as described above.In response to determining degree of approach broadcast reception Machine is not configured with the function of the requirement being configured for pair target device related to wireless identity emitter (i.e., really Determine frame 3102="No"), in frame 3152, the processor of degree of approach broadcasting receiver can be from return message identification software source. For example, degree of approach broadcasting receiver can be parsed to recognize URI, URL, IP address, " App shops " name to returning message Claim or indicate the other information for obtaining the position of the application for docking with the target device to be set.At some In embodiment, login and/or accounts information that message can also include being associated with software source are returned, such as applied for accessing The username and password of the agent-protected file folder on server or network drive.
In frame 3154, the processor of degree of approach broadcasting receiver can be sent to returning message to the software source for being recognized The request of indicated software.For example, degree of approach broadcasting receiver can send message via IP agreement, the message request from Download application-specific or " app " in App shops.The request can include the other information for verifying the request, such as account letter Breath, payment information, and/or can be used for verifying other data of the request by software source.In frame 3156, degree of approach broadcast connects The processor of receipts machine can receive and install the software of the software source request to identification.In certain embodiments, the degree of approach is wide Broadcasting receiver can decompress, decompresses or otherwise change the software for receiving, to make it be directed to installation and/or to configure It is addressable.
In various embodiments, degree of approach broadcasting receiver can be configured to receive more than one from central server Message, the more than one message includes the information that can be used for arranging target device.For example, the first return message can include Can include for using the voucher of the app to the URI of app, and the second return message.Therefore, in optional frame 3158, The processor of degree of approach broadcasting receiver can be sent to the volume for being used together with the software for receiving to central server The request of outer identification information.In various embodiments, such request can send via the software for receiving, such as Jing Sent by the message by software format.In optional frame 3160, degree of approach broadcasting receiver can be from central server The extra identification information that reception is asked.For example, degree of approach broadcasting receiver can be received for making together with the application installed Login and/or cryptographic token.
In frame 3162, the processor of degree of approach broadcasting receiver can be matched somebody with somebody based on the information received from central server The software for receiving is put, is such as logged in by using the voucher for returning instruction in message.Degree of approach broadcasting receiver can make Connect with the various settings provided in the return message received using the operation in decision block 1101 and/or in optional frame 3160 Extra identification information (the such as communications setting (for example, port, destination address, proxy server information, agreement of activity etc.) received With log-on message (for example, user name, password etc.)) carry out configuration software.Degree of approach broadcasting receiver can proceed frame 3106 In operation.
Figure 31 C show the embodiment for degree of approach broadcasting receiver to configured target device send configuration data Method 3175.Method 3175 is similar to said method 3100, difference:Once method 3175 also includes being set for target It is standby that the operation for being just sent to configuration data is set.The technology can be used for by from the patch of central server, update and/ Or other data distributions are given to the associated various target devices of each side of central server registration.For example, configuration data can With including may be mounted at updated code on configured target device, its be used to limiting external equipment (for example, other Degree of approach broadcasting receiver etc.) type of access that set target device is carried out and/or frequency.In other words, no matter Whether target device is connected to internet, can come to target device offer via the degree of approach broadcasting receiver for serving as agency From the configuration data of central server.
Operation in frame 702-3106 is as described above.In frame 3176, the process of degree of approach broadcasting receiver Device can be sent from the configuration data for returning message to set target device.For example, degree of approach broadcasting receiver can be with Configuration file and/or order to change its behavior that transmission can be performed by set target device.In some embodiments In, configuration data can include the setting that can be realized by set target device, so that degree of approach broadcasting receiver can With the more or less control to set target device.For example, configuration data can cause the target device being configured Increase or decrease via using obtainable function, the app performed such as on degree of approach broadcasting receiver.Lift another to show Example, configuration data can include set target device is removed based on past time, the degree of approach and/or access times The instruction of the voucher that pin joint recency broadcasting receiver is used.In certain embodiments, configuration data can cause set Target device prevents equipment from accessing simultaneously, the target device that docking and/or control are set.Degree of approach broadcasting receiver can be after The continuous operation being determined in frame 702.
Figure 31 D are showed and are shown the work(that can be used for being used together with neighbouring target device for degree of approach broadcasting receiver The embodiment method 3180 of energy.Method 3180 is similar to said method 3100, difference:Method 3180 also include for The operation of spatial cue, described information is used to indicate to be based on to use in preset time to the degree of approach of related target device Which function of degree of approach broadcasting receiver.For example, in response to receiving from the first wireless identity transmitting being associated with refrigerator The broadcast of machine and the second wireless identity emitter being associated with thermostat, can render on degree of approach broadcasting receiver First application installed and the display of the second application installed.In other words, degree of approach broadcasting receiver can be configured to base In to the current degree of approach of each target device indicating the function of related receiver.In certain embodiments, the degree of approach is wide Broadcasting receiver can utilize the intelligent file folder or screen being updated based on the broadcast that receives so that file or The content of screen only includes the designator of the function related to neighbouring target device.
Operation in frame 702-3106 is as described above.In response to determining that degree of approach broadcasting receiver is configured with The function (that is, decision block 3102="Yes") of the requirement being configured for pair target device related to wireless identity emitter Or when the operation in having performed frame 3104, in frame 3182, the processor of degree of approach broadcasting receiver can show with It is associated with all related functions of target device nearby of wireless identity emitter.(for example, the time of several seconds within a period of time Section etc.), degree of approach broadcasting receiver can receive multiple broadcasts from multiple wireless identity emitters nearby, and due to Jing Broadcast is sent by short range, wireless signals (for example, bluetooth etc.), therefore emitter can be recognized nearby.
If degree of approach broadcasting receiver is configured with the function (example of the target device for being associated with neighbouring emitter Such as, software), then display can be updated to represent these functions.For example, degree of approach broadcasting receiver can render graphic element Show, the display is represented for nearby and multiple functions of all household electrical appliances for being authorized to of degree of approach broadcasting receiver (for example, applying).Figure 31 E show the example of such display.In various embodiments, in order to user is convenient, the degree of approach is wide Broadcast receiver and can be additionally configured to show that being directed in the degree of approach and be previously possible or not yet degree of being approached broadcast connects The function (for example, app etc.) of the target device that receipts machine is arranged.
In frame 3184, degree of approach broadcasting receiver can be with receiving user's input, and the user input is used to select for right What the target device related to the wireless identity emitter that the broadcast for receiving is sent in decision block 1402 was configured The function of requirement.For example, user input can select the app to be run.Degree of approach broadcasting receiver can proceed frame Operation in 3106 ' can be proceeded in optional frame 2904 so that target device is provided with into selected function Operate to exchange signal with set target device.
Figure 31 E show can be selected for access be associated with wireless identity emitter neighbouring target device can With the exemplary display of software 3190.As discussed above concerning Figure 31 D descriptions, degree of approach broadcasting receiver 138 can be configured to Display 3190 is rendered, shows that 3190 show (or being otherwise accessible by) installed on degree of approach broadcasting receiver 138 Various applications.Show that 3190 can point out the user of degree of approach broadcasting receiver 138 to select a button in following button:With It is used to access (for example, graphic user interface (GUI) of the first button 3191 of an app of bread baker equipment nearby in operation Button), for operation for accessing second button 3192 of the 2nd app of thermostat device nearby and be used for for operation Access the 3rd button 3193 of the 3rd app of refrigerator apparatus nearby.
Figure 31 F show and extra authentication information is sent when by central server requests for degree of approach broadcasting receiver Embodiment method 3195.Method 3195 is similar to said method 2900, difference:Method 3195 is also included for ringing Should in receive to authentication information request come to central server send additional message operation.Using the technology, the degree of approach is wide Broadcast receiver can be authorized to only provide additional authentication information after from central server receive identification information, thus further Guarantee that central server safeguards anonymity and Information Security.
Operation in frame 702-2904 is as described above.In response to sending aiming using the operation in frame 706 Message, in frame 3196, the processor of degree of approach broadcasting receiver can receive certification request from central server, such as be directed to Can with it is customer-furnished for verify his/her identity and therefore he/her whether be authorized to receive and receive with transmission Broadcast the related identification information of wireless identity emitter PIN or the prompting of other information.In this way, it is possible to real Existing double factor (or two steps) verification process, so that may not individually cause central server to send out from the information for aiming at message Send the identification information and/or other data for arranging nearby required for target device.In frame 3198, degree of approach broadcasting receiver Processor can send the response message to certification request, and the response message includes user input, such as close via being coupled to The PIN that user input on the touch-screen (for example, smart phone touch-screen) of degree broadcasting receiver is received.In decision block 1101 In, degree of approach broadcasting receiver can continue to monitor the subsequent message from central server.For example, send certification message it Afterwards, degree of approach broadcasting receiver can wait identification information to be included and/or the information that arranges required for target device subsequently to return Return message.
Figure 32 A show and be associated with wireless identity emitter and target device to authorized reception for central server Identification information degree of approach broadcasting receiver send message embodiment method 3200.Method 3200 is similar to said method 3000, difference is:Method 3200 also includes for sending degree of approach broadcasting receiver being caused to obtain and/or configure For arranging the operation of the data (for example, instruction, script, order etc.) of the function of target device.For example, except including mark letter Outside breath (for example, device identifier, logging on authentication etc.), central server can also send return message, the return message package Include the URI for accessing the application of the household electrical appliances being associated with wireless identity emitter.In this way, central server can be sent out Now suitable for the application of both neighbouring target device and wireless identity emitter, thus enable degree of approach broadcasting receiver seamless Obtain appropriate application for arranging, controlling target device nearby and/or be in communication with.
Operation in frame 3002,1402-1706 ' is as described above.In decision block 3202, central server Processor can determine the degree of approach broadcasting receiver of the aiming message that transmission is received whether be configured with for pair with it is known The function of requirement that is configured of the associated target device of wireless identity emitter.The determination can be based on and determine with utilizing The information of the related profile memory storage of the wireless identity emitter of the operation identification in frame 1702 and with using decision block 1704 ' In operation identification the related profile memory storage of degree of approach broadcasting receiver information.Specifically, central server can be with By for access be associated with wireless identity emitter target device require information (it is all apply as required, communication protocol, Scheduling disciplines etc.) with for indicating information (for example, the program of installation, available of the current ability of degree of approach broadcasting receiver Networked capabilities etc.) it is compared.Central server can be during the registration process of relevant device (or its user) and/or regular Ground receives such requirement and current ability information.For example, during degree of approach broadcasting receiver can be configured to be updated periodically The data in its profile information stored on the server of centre, the data indicate that application is presently installed at degree of approach broadcasting receiver On.Another example is lifted, degree of approach broadcasting receiver can be configured to the data being updated periodically in its profile information, the number According to the configuration of the application for indicating to install, arrange and/or other operating parameters (time for for example, finally using etc.).
The quilt in the profile related to degree of approach broadcasting receiver is lost in the profile being associated with wireless identity emitter When being designated as desired function, central server can determine that the function of requirement is unavailable at degree of approach broadcasting receiver 's.For example, when the profile of wireless identity emitter indicates that " App A " is required for and target device (for example, the family being associated Electricity) docking when, when related to degree of approach broadcasting receiver profile instruction is only loaded with " App on degree of approach broadcasting receiver During B ", central server can determine that degree of approach broadcasting receiver does not include desired function.Another example is lifted, when wireless body When the profile of part emitter indicates that bluetooth connection is required for being docked with the target device being associated, connect when broadcasting with the degree of approach When the related profile of receipts machine indicates that the bluetooth radio-cell of degree of approach broadcasting receiver is currently deactivated, central server can be with Determine that degree of approach broadcasting receiver does not include desired function.
In response to determine degree of approach broadcasting receiver be not configured with for pair with known wireless identity emitter phase The function (that is, decision block 3202="No") of the requirement that the target device of pass is configured, in frame 3204, central server Processor can by can degree of being approached broadcasting receiver for by their own be configured with for pair with known wireless identity send out The information for penetrating the requirement function that the associated target device of machine is configured is attached to return message.For example, information can include Can degree of being approached broadcasting receiver for downloading, install, load, configure and/or activate the software (example related to target device Such as, application, app etc.) instruction, script, order, code or other information.Lift another example, information can include will be by connecing Radio-cell that recency broadcasting receiver is performed, for activating or being configured to be communicated with the target device to be set Instruction.Another example is lifted, information can be included for accessing on remote data source (for example, application server, website etc.) The URL of data, URI, the network address, file path and other positions information.
In response to determining that degree of approach broadcasting receiver is configured with for pair related to known wireless identity emitter The function (that is, decision block 3202="Yes") of the requirement that target device is configured, or when the operation in performing frame 3204, Central server can continue to send return message to degree of approach broadcasting receiver in frame 3004, as mentioned above.
In various embodiments, central server can receive mark in response to determining that degree of approach broadcasting receiver is authorized to Information (that is, decision block 1708="Yes") is sending multiple return message.For example, central server can connect to degree of approach broadcast Receipts machine sends and indicates the first return message for being used for the URI for downloading app and set including the target being associated with app for login Second return message of standby voucher.In various embodiments, such multiple return message can be in response in from the degree of approach Broadcasting receiver receives what multiple message were sent.For example, the first return message with the URI for app can be in response to Aim at what message was sent in receiving first from degree of approach broadcasting receiver, and with the voucher to be used together with app Second return message can be in response to be sent in receiving second from same degree of approach broadcasting receiver and aim at message.
In optional frame 3206, the processor of central server can be via desired function (for example, degree of approach broadcast The URI that receiver is provided based on central server is come the app that obtains or other softwares) receive right from degree of approach broadcasting receiver The request of the extraneous information (or identification information) to be used together with function.For example, request can for for be provided for The additional credentials and/or configuration information of the application that target device is communicated.In optional frame 3208, the place of central server Reason device can send asked extraneous information to degree of approach broadcasting receiver.For example, central server can send for Using the cryptographic token being used together.Central server can proceed the operation in decision block 1402.
Used as explanation, the thermostat that the smart phone degree of approach broadcasting receiver of house nurse can be from house receives wide Message is broadcast, and first can be sent to central server as response and aim at message.In response to determining smart phone in constant temperature Previously indicating intelligent phone had been authorized to thermostat to the owner in the degree of approach (or degree of approach thresholding) of device and house, Central server can send the first return message including the app shops URI for thermostat app.Smart phone download, After installation and operation thermostat app, smart phone can be sent for being used to access the function of thermostat to central server (for example, temperature show and be limited temperature adjustment access etc.) app request.Preconfigured being close to for permission to thermostat Smart phone in degree (for example, in 1 meter) accesses temperature and shows and adjust temperature (for example, higher or lower than in 3 degree of existing program Deng), central server can send voucher to allow smart phone via the local IP access using app (for example, only by local Connection/LAN and not via internet) receiving temperature display data and with limited temperature adjustment function.
Figure 32 B to show and send tool to the degree of approach broadcasting receiver of authorized reception identification information for central server There is the embodiment method 3250 of the message of configuration data for target device.Method 3250 similar to said method 3000, no It is with part:Method 3250 also includes to be delivered to and neighbouring wireless identity via degree of approach broadcasting receiver for sending The operation of the configuration data (for example, instruction, script, order etc.) of the associated target device of emitter.For example, configuration data can So that setting, instruction and/or the code of configured target device can be sent to including degree of approach broadcasting receiver to change The behavior of the configured target device.The technology can be used for from the patch of central server, renewal and/or other numbers The various equipment being associated according to each side being distributed to register to central server, especially when those various equipment not with central authorities When server carries out direction communication.For example, configuration data can include that application-specific can be used by degree of approach broadcasting receiver It is sent to the updated code of configured target device.
Operation in frame 3002,1402-1706 ' is as described above.In decision block 3252, central server Processor may be determined for that whether the configuration data of the target device being associated with known wireless identity emitter is available 's.For example, when be provided with the profile information being associated with known wireless identity emitter renewal mark or other During designator, central server can recognize that fresh information is available.Send out with known wireless identity in response to determining to be directed to The configuration data for penetrating the associated target device of machine is available (that is, decision block 3252="Yes"), in frame 3254, central authorities' clothes Business device processor can will be directed to be associated with wireless identity emitter, will via the degree of approach broadcasting receiver delivering matching somebody with somebody Put data and be attached to return message.Configuration data can be cause will degree of being approached broadcasting receiver arrange target device The payload of change, binary system, software, code, instruction and/or any other data.
In response to determining that the configuration data of the equipment for being associated with known wireless identity emitter is not available (that is, decision block 3252="No"), or when the operation in having performed frame 3254, central server can be in frame 3004 Continue to be sent to degree of approach broadcasting receiver and return message, as described above, and proceeding the operation in decision block 1402.
Figure 32 C show to receive to authorize from user for central server have mark to send to degree of approach broadcasting receiver The embodiment method 3275 of the message of knowledge information.Method 3275 is similar to said method 3000, difference:Method 3275 Also include for sending to the user equipment (and therefore target device to be set) being associated with wireless identity emitter Request message authorizes to arrange the operation of target device on demand to receive for degree of approach broadcasting receiver.In other words, When degree of approach broadcasting receiver is arranged and/or access target equipment (for example, household electrical appliances, router without otherwise authorized Deng) when, central server can contact the owner of target device to ask the mandate to degree of approach broadcasting receiver.For example, when When degree of approach broadcasting receiver is not predefined as the authorized user of router, central server can be to the owner of router Smart phone send message (for example, SMS/MMS texts, Email, automatic call etc.) whether inquiring owner Degree of approach broadcasting receiver will be allowed to log in router.
Operation in frame 3002,1402-1708 is as described above.In response to determining that degree of approach broadcasting receiver does not have Have and be allowed to (or mandate) reception identification information (that is, decision block 1708="No") related to wireless identity emitter, in frame In 3276, the processor of central server can recognize that degree of approach broadcasting receiver is based on and known wireless identity emitter phase The profile information of association (that is, is contacted come the contact details for attempting the owner of the wireless identity emitter and/or target device for arranging Address).For example, central server can recognize that the owner that can contact wireless identity emitter is authorized used electronics Addresses of items of mail or Mobile Directory Number.In frame 3278, the processor of central server can use recognized contact details To send authorization requests to the user equipment of owner.For example, the intelligence that central server can be carried to the owner of target device Phone send Email, with indicate degree of approach broadcasting receiver currently without be authorized to but can be allowed to arrange target set It is standby.
In decision block 3280, the processor of central server may determine whether from the owner of wireless identity emitter to connect Receive mandate approval.For example, central server can monitor incoming message buffer with recognize including with for authorization requests Any message for receiving of the corresponding code of similar code or designator or other designators.Additionally, central server can Determine that message includes approval or authorize still to refuse to be estimated to any message received from owner's equipment.For example, in Centre server can determine message response in the authorization requests quilt for being sent based on the identifier included in the message for receiving Receive, and the refusal code (for example, " approval ", " disapproving ") included in the message for being also based on receiving is to determine It is no to have been given by authorizing.
Mandate approval (that is, decision block 3280="No") is not yet received in response to determining, central server can continue The operation being determined in frame 1402.Have been received by authorizing approval (that is, decision block 3280="Yes"), central authorities in response to determining Server can proceed the operation in frame 1706 ' to generate the return message with authorized identification information, and Send to degree of approach broadcasting receiver in frame 3004 and return message, as mentioned above.
Figure 32 D show the embodiment method that Additional Verification is asked from degree of approach broadcasting receiver for central server. Method 3285 is similar to said method 3000, difference:Method 3285 is also included for degree of approach broadcasting receiver Send the operation of authentication request message.In other words, central server can carry out double factor authentication process to guarantee the degree of approach The user of broadcasting receiver is authorized to reception identification information.Due to smart phone can with it is stolen or otherwise by except owner it Outer each side uses, therefore method 3285 receives sensitive information for not only guaranteeing authorized equipment, and is ensured that Jing The equipment of mandate may be probably important for unknown or potentially malice the side acquisition of abuse sensitive information.
Operation in frame 3002,1402-3004 is as described above.In response to determine the aiming message that receives with Known degree of approach broadcasting receiver correlation (that is, decision block 1704 '="Yes"), in frame 3286, the process of central server Device can send certification request to degree of approach broadcasting receiver.Certification request can point out user's profit of degree of approach broadcasting receiver Responded with the information for verifying his/her identity.For example, request can be SMS text or Email, and it is required Cipher code, PIN that the user of degree of approach broadcasting receiver will appreciate that using the actual owner of only degree of approach broadcasting receiver Or other data are being responded.In frame 3288, the processor of central server can be received from degree of approach broadcasting receiver The response message with user input to certification request.For example, certification message can include the use of degree of approach broadcasting receiver The PIN of family input.Similar to above-described embodiment, in decision block 1708, central server can determine degree of approach broadcast reception Whether machine is allowed to receive the identification information related to wireless identity emitter.Specifically, central server can be to receiving To certification message be estimated to determine included authentication information whether in the profile information with degree of approach broadcasting receiver The data match of storage.For example, central server can meet the PIN received in certification message with degree of approach broadcast 2nd PIN of the profile memory storage of the user of receipts machine is compared.
As described above, in response to determining that degree of approach broadcasting receiver is allowed to receive identification information (that is, decision block 1708= "Yes"), central server can be generated in frame 1706 ' and return message, and in response to determining that degree of approach broadcasting receiver does not have It is allowed to receive identification information (that is, decision block 1708="No"), central server can determine in decision block 1402 is It is no to receive other aiming message.
Figure 33 shows the component of example wireless identity emitter 110.Wireless identity emitter 110 can include micro-control Device processed 3302, it is coupled to the short-distance wireless unit 3304 of antenna 3306 (for example,Radio-cell or transceiver), storage Device 3308 and battery 3310.Can be come mutual in many ways although these components are shown to pass through commonly connected linked Connect and configure these components.For example, wireless identity emitter 110 can be configured, so that microcontroller 3302 can be with Determine when to send message based on the content of memory 3308.In one embodiment, microcontroller 3302 can beSystem on chip unit.Memory 3308 can also include being based on from microcontroller by short-distance wireless unit 3304 One or more message or message part that 3302 order sends via antenna 3306.Battery 3310 can provide other components Required power.Additionally, in some implementations, microcontroller 3302, short-distance wireless unit 3304 and/or memory 3308 can be integrated as single integrated circuit.Because these components can be micro- with standard or existing configuration Chip, therefore they are expressed as in fig. 33 the frame consistent with the structure of example embodiment.
Wireless identity emitter 110 can couple or be built in various objects with various objects (such as bangle or household electrical appliances) In.For example, in the way of example wireless identity emitter 110 can be to be easily attached to belt (such as watchband or dog collar). Alternate embodiment can be incorporated into wireless identity emitter 110 in any other mobile object that may need tracking.
Wireless identity emitter 110 can save power by regularly ingoing power save mode or into sleep, Such as regularly replace between sleep and the packet of identification code of the broadcast with wireless identity emitter 110.Each embodiment Different broadcast and sleep cycle can be included, such as some embodiment broadcast ground are frequent or less frequent, such as in sleep Per every few seconds or a few minutes are waking up and broadcast between period.
In one embodiment, battery 3310 can be interchangeable button cell.In another embodiment, wireless body Part emitter 110 can be received renewal software, instruction or other data using antenna 3306 and be grasped for storage and in configuration Used in making (such as configure transmission intercal and/or through-put power).Wireless identity emitter 110 can also be stored and performed to be used for Software, algorithm, instruction code or other routines for rolling code or identifier are generated, as mentioned above.In one embodiment, nothing Line identity emitter can not maintenance time (for example, UTC) information, but can be alternatively to use 30ppm16kHz crystal conducts Clock.This timing wander for using crystal that substantially annual 40 seconds can be produced as clock.
Figure 34 applies to the system block diagram of the smart phone type of mobile device being used together with each embodiment.Intelligence Phone 3400 can include being coupled to internal storage 3402 processor 3401, display you 3403 and loudspeaker 3454.Separately Outward, smart phone 3400 can include the antenna 3404 for sending and receiving electromagnetic radiation, and antenna 3404 may be coupled to nothing Line data link and/or cell phone transceiver 3405 (that is, remote transceiver), cell phone transceiver 3405 is coupled everywhere Manage device 3401 and can be communicated by wide area wireless communication network.Smart phone can include sending out with wireless identity The single short-distance wireless transceiver 3424 that the machine of penetrating is communicated or matched.Smart phone 3400 generally can also include for The menu selection buttons or lever type switch 3408 of receiving user's input.
Figure 35 applies to realize the system block diagram of the server 3500 of each embodiment of present disclosure.Server 3500 can be commercially available server apparatus.Such server 3500 generally includes to be coupled to volatile memory 3502 With the processor 3501 of Large Copacity nonvolatile memory (such as disc driver 3503).Server 3500 can also include coupling Close floppy disk, compact disk (CD) or the DVD disc driver 3506 of processor 3501.Server 3500 can also include coupling The network interface (such as network access port 3504) for closing processor 3501 (is such as coupled to for setting up with network 3505 The LAN of other broadcast system computers and server) data cube computation.
Processor 3401,3501 can be configured to perform by processor executable instruction or software instruction (application) Any programmable microprocessor of various functions (including the function of each embodiment described below), microcomputer or multiple places Reason device chip.In some degree of moving closer to broadcasting receivers, multiple processors 3401 can be provided, such as one processor is special It is exclusively used in running other application for radio communication function and a processor.Generally, in access software application and by its Before being loaded in processor 3401,3501, software application can be stored in memory 3402,3502.Processor 3401, 3501 can include being enough to store the internal storage of application software instructions.
What preceding method description and procedure graph were provided only as illustrative example, and be not intended to require or dark Show that each embodiment must be performed by the order for providing.As skilled in the art will recognize, in previous embodiment The step of order can perform by any order." thereafter ", the word of " subsequent ", " following " etc. is not intended to limit The order of step;These words are only used for guiding the description of reader browsers' method.Additionally, it is any in the singular to right will The reference of element is sought, for example, is not construed as limiting element using article " (a) ", " one (an) " or " (the) " For singulative.
Various illustrative box, module, circuit and algorithm steps with reference to embodiment disclosed herein description can be with It is embodied as electronic hardware, computer software or combination.In order to clearly demonstrate this interchangeability of hardware and software, on Text has carried out general description around the function of various illustrative components, frame, module, circuit and step to them.Extremely Hardware or software are implemented as in such function, depending on specific application and applying design over the whole system about Beam.Those skilled in the art can be directed to each specific application, realize described function in the way of accommodation, but this Sample is realized that decision-making should not be interpreted as causing a departure and is departed from the scope of the present invention.
For realizing the various illustrative logical block, box, module and the electricity that describe with reference to aspect disclosed herein The hardware on road can be utilized and be designed to perform the general processor of functions described herein, digital signal processor (DSP), specially With integrated circuit (ASIC), field programmable gate array (FPGA) or other PLDs, discrete gate or transistor Logical device, discrete hardware components or its any combination are realizing or perform.General processor can be microprocessor, but In the mode for substituting, processor can be any conventional processor, controller, microcontroller or state machine.Processor The combination of computing device can also be implemented as, for example, the combination of DSP and microprocessor, multi-microprocessor, one or more The combination of microprocessor and DSP core, or any other such configuration.Alternatively, some steps and method can be by spies Perform due to the circuit of given function.
In one or more exemplary aspects, described function can be in hardware, software, firmware or its any group Realize in conjunction.If realized in software, the function can be stored in computer as one or more instructions or code It is transmitted on computer-readable recording medium or by it.The step of method disclosed herein or algorithm can be embodied in processor can perform it is soft In part module, it may be located on tangible non-transitory processor readable storage medium.Tangible non-transitory processor can It can be any usable medium that can be accessed by computer or processor to read storage medium.Side nonrestrictive by way of example Formula, such non-transitory processor readable medium can include RAM, ROM, EEPROM, CD-ROM or other optical disc storages, magnetic Disk storage or other magnetic storage apparatus or can be used for instruct or data structure in the form of the desired program code of storage with And any other medium that can be accessed by computer.As it is used herein, disk and CD include compact disk (CD), The usual magnetically replicate data of laser-optical disk, CD, digital versatile disc (DVD), floppy disk and Blu-ray Disc, wherein disk, And CD then utilizes laser to optically replicate data.Combinations of the above should also be as being included in non-transitory processor readable medium In the range of.In addition, the operation of method or algorithm can (for example the processor for, being stored can perform used as code and/or instruction Instruction) any combinations or set be located on tangible non-transitory machine readable media and/or processor readable medium, it is non-temporarily When property machine readable media and/or processor readable medium can be incorporated in computer program.
There is provided to the described above of the disclosed embodiments, so that any person skilled in the art can realize or use The present invention.Various modifications to these embodiments will be readily apparent to those of skill in the art, and without departing from In the case of the spirit or scope of the present invention, generic principles defined herein may apply in other embodiments.Therefore, originally Invention is not intended to be limited to the embodiments shown herein, and is to fit to and claims below and original disclosed herein The then most wide scope consistent with novel features.

Claims (29)

1. a kind of method that equipment being associated with wireless identity emitter for degree of approach broadcasting receiver pair is configured, bag Include:
Receiving from wireless identity emitter includes the broadcast of secure identifier;
Send to central server and aim at message, the aiming message includes that the secure identifier and degree of approach broadcast connect The identity of receipts machine;
Receive from the central server and return message, the return message includes the mark related to the broadcast for being received Information and based on the central server store data be authorized to be distributed to the degree of approach broadcasting receiver;And
Based on the identification information from the return message for being received, pair equipment being associated with the broadcast for being received enters Row is arranged.
2. method according to claim 1, wherein, the identification information include the voucher for accessing the equipment and One or more of information that the function of the requirement for arranging the equipment is indicated.
3. method according to claim 2, wherein, the function of the requirement includes the wireless list of the software installed and activation One or more of unit, and
Wherein, the described information for being indicated the function of the requirement includes Uniform Resource Identifier (URI) and will be by institute State one or more of instruction of degree of approach broadcasting receiver execution.
4. method according to claim 2, also includes:
Determine whether the degree of approach broadcasting receiver is configured with the function for arranging the requirement of the equipment;And
In response to determining that the degree of approach broadcasting receiver is not configured with the work(for arranging the requirement of the equipment Can, the degree of approach broadcasting receiver is configured with into the function of the requirement.
5. method according to claim 4, wherein, in response to determining that the degree of approach broadcasting receiver is not configured with The function of the requirement, the function that the degree of approach broadcasting receiver is configured with the requirement is included:
From the return message identification software source for being received;
The request of the software to being indicated by the return message for being received is sent to the software source for being recognized;
The software is received from the software source for being recognized;And
Received software is installed.
6. method according to claim 5, also includes:Installed software is configured based on the identification information.
7. method according to claim 1, wherein, the return message for being received includes the configuration for set equipment Data, and
Methods described also includes:The configuration data is sent to set equipment.
8. method according to claim 1, wherein;
The broadcast for being received is the degree of approach broadcasting receiver from the multiple of multiple wireless identity emitters nearby reception A broadcast in broadcast;And
Methods described also includes:In response to receiving the plurality of broadcast from the plurality of wireless identity emitter nearby, show Show multiple functions.
9. method according to claim 1, also includes:
The request to Additional Verification is received from the central server;And
Sending to the central server includes the certification message of personal identification number (PIN),
Wherein, receiving from the central server includes that the return message of the identification information includes:In response to sending institute Certification message is stated, receiving from the central server includes the return message of the identification information.
10. method according to claim 1, wherein:
The degree of approach broadcasting receiver is smart phone;
Set equipment is one of household electrical appliances and router;And
The wireless identity emitter is set equipment.
The method that a kind of setting of 11. equipment being associated with wireless identity emitter for central server pair is controlled, Including:
Received from degree of approach broadcasting receiver by the central server and aim at message, the aiming message is sent out including wireless identity Penetrate the secure identifier of machine;
In response to receiving the aiming message, based on stored with the secure identifier and the degree of approach broadcasting receiver Corresponding profile information come determine the degree of approach broadcasting receiver whether be authorized to receive for pair with the wireless identity The identification information that the associated equipment of emitter is configured;And
The identification information is received in response to determining that the degree of approach broadcasting receiver is authorized to, is sent and is returned message, it is described to return Return the identification information that message includes for arranging the equipment.
12. methods according to claim 11, wherein, the identification information is included for so that degree of approach broadcast connects Receipts machine at least one of is obtained with the instruction of the device-dependent software, script, order, URI and code.
13. methods according to claim 11, wherein, the identification information includes and the device-dependent voucher, its In, the voucher includes at least one of username and password.
14. methods according to claim 11, also include:
In response to determining that the degree of approach broadcasting receiver is not authorized to receive the mark letter for arranging the equipment Breath, to the user equipment being associated with the equipment authorization requests are sent;
In response to sending the authorization requests, it is determined whether receive mandate approval from the user equipment;And
In response to determining that receiving described mandate from the user equipment ratifies, and sends the return message, the return message Including for arranging the identification information of the equipment.
15. methods according to claim 11, also include:
Certification request is sent to the degree of approach broadcasting receiver;
In response to sending the certification request, response message is received;And
Based on the response message for being received, determine whether the user of the degree of approach broadcasting receiver is certified,
Wherein, the identification information is received in response to determining that the degree of approach broadcasting receiver is authorized to, transmission is included for setting Putting the return message of the identification information of the equipment includes:In response to determining that the degree of approach broadcasting receiver is awarded Power receives the identification information and the use in response to determining the degree of approach broadcasting receiver based on received response message Family is certified, and transmission includes the return message for arranging the identification information of the equipment.
A kind of 16. computing devices, including:
Processor, it is configured with the processor executable for performing the operation for including the following:
Receiving from wireless identity emitter includes the broadcast of secure identifier;
Send to central server and aim at message, the aiming message includes the body of the secure identifier and the computing device Part;
Receive from the central server and return message, the return message includes the mark related to the broadcast for being received Information and based on the central server store data be authorized to be distributed to the computing device;And
Based on the identification information from the return message for being received, pair equipment being associated with the broadcast for being received enters Row is arranged.
17. computing devices according to claim 16, wherein, the identification information include for access the equipment with One or more of information that card and the function to the requirement for arranging the equipment are indicated.
18. computing devices according to claim 17, wherein, the function of the requirement includes the software installed and activation One or more of radio-cell, and
Wherein, the described information for being indicated the function of the requirement includes Uniform Resource Identifier (URI) and will be by institute State one or more of instruction of computing device.
19. computing devices according to claim 17, wherein, the processor is configured with for performing also including following The processor executable of every operation:
Determine whether the computing device is configured with the function for arranging the requirement of the equipment;And
In response to determining that the computing device is not configured with the function of the requirement, the computing device is configured with into described The function of requirement.
20. computing devices according to claim 19, wherein, the processor is configured with the process for performing operation Device executable instruction, so that in response to determining that the computing device is not configured with the function of the requirement, by the meter The function that calculating device configuration has the requirement includes:
From the return message identification software source for being received;
The request of the software to being indicated by the return message for being received is sent to the software source for being recognized;
The software is received from the software source for being recognized;And
Received software is installed.
21. computing devices according to claim 20, wherein, the processor is configured with for performing also including following The processor executable of every operation:Installed software is configured based on the identification information.
22. computing device according to claim 16, wherein;
The broadcast for being received is the computing device from multiple multiple broadcasts that nearby wireless identity emitter is received In a broadcast;And
Wherein, the processor is configured with the processor executable for performing the operation also including the following:Ring The plurality of wireless identity emitters nearby of Ying Yucong receive the plurality of broadcast, show multiple functions.
23. computing devices according to claim 16, wherein, the processor is configured with for performing also including following The processor executable of every operation:
The request to Additional Verification is received from the central server;And
Sending to the central server includes the certification message of personal identification number (PIN), and
Wherein, the processor is configured with the processor executable for performing operation, so that from central authorities' clothes Business device is received and includes that the return message of the identification information includes:In response to sending the certification message, from the central authorities Server receives the return message for including the identification information.
24. computing devices according to claim 19, wherein:
The computing device is smart phone;
Set equipment is one of household electrical appliances and router;And
The wireless identity emitter is set equipment.
25. a kind of computing device, including:
Processor, it is configured with the processor executable for performing the operation for including the following:
Receive from degree of approach broadcasting receiver and aim at message, the aiming message includes the secure ID of wireless identity emitter Symbol;
In response to receiving the aiming message, based on stored with the secure identifier and the degree of approach broadcasting receiver Corresponding profile information come determine the degree of approach broadcasting receiver whether be authorized to receive for pair with the wireless identity The identification information that the associated equipment of emitter is configured;And
The identification information is received in response to determining that the degree of approach broadcasting receiver is authorized to, is sent and is returned message, it is described to return Return the identification information that message includes for arranging the equipment.
26. computing devices according to claim 25, wherein, the identification information is included for causing the degree of approach wide Broadcast receiver at least one of to obtain with the instruction of the device-dependent software, script, order, URI and code.
27. computing devices according to claim 25, wherein, the identification information include with it is described it is device-dependent with Card, wherein, the voucher includes at least one of username and password.
28. computing devices according to claim 25, wherein, the return message includes being connect by degree of approach broadcast Receipts machine is sent to the configuration data of the equipment.
29. computing devices according to claim 25, wherein, the processor is configured with for performing also including following The processor executable of every operation:
In response to determining that the degree of approach broadcasting receiver is not authorized to receive the mark letter for arranging the equipment Breath, to the user equipment being associated with the equipment authorization requests are sent;
In response to sending the authorization requests, it is determined whether receive mandate approval from the user equipment;And
In response to determining that receiving described mandate from the user equipment ratifies, and sends the return message, the return message Including for arranging the identification information of the equipment.
CN201580046665.9A 2014-09-02 2015-07-30 Proximity application discovery and provisioning Pending CN106664523A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/474,367 2014-09-02
US14/474,367 US10419907B2 (en) 2012-02-22 2014-09-02 Proximity application discovery and provisioning
PCT/US2015/042872 WO2016036453A1 (en) 2014-09-02 2015-07-30 Proximity application discovery and provisioning

Publications (1)

Publication Number Publication Date
CN106664523A true CN106664523A (en) 2017-05-10

Family

ID=53872160

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580046665.9A Pending CN106664523A (en) 2014-09-02 2015-07-30 Proximity application discovery and provisioning

Country Status (3)

Country Link
EP (1) EP3189643A1 (en)
CN (1) CN106664523A (en)
WO (1) WO2016036453A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108958825A (en) * 2017-05-19 2018-12-07 腾讯科技(深圳)有限公司 A kind of information configuring methods and device
CN111194010A (en) * 2019-12-31 2020-05-22 上海感悟通信科技有限公司 Method, system and medium for transmitting data to target number of devices by radio
CN112106388A (en) * 2018-03-09 2020-12-18 科智库普若西玛公司 Method, system and device for causing proximity dependent activity by mobile device
US20210035083A1 (en) * 2019-08-02 2021-02-04 Mastercard International Incorporated System and method to support payment acceptance capability for merchants
CN112596756A (en) * 2020-09-08 2021-04-02 天地(常州)自动化股份有限公司 Multi-label program upgrading method, device and system
CN114374567A (en) * 2017-06-02 2022-04-19 苹果公司 Accessory communication control

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10382929B2 (en) 2016-04-17 2019-08-13 Sonular Ltd. Communication management and communicating between a mobile communication device and another device
EP3282638A1 (en) * 2016-08-11 2018-02-14 Gemalto Sa A method for provisioning a first communication device by using a second communication device
EP3698491A4 (en) * 2017-10-16 2021-06-02 Sonular Ltd. Communication management and communicating between a communication device and another device
EP3796695B1 (en) 2018-04-23 2022-05-18 Spotify AB Association via broadcast
US11641563B2 (en) * 2018-09-28 2023-05-02 Apple Inc. System and method for locating wireless accessories
WO2020175836A1 (en) * 2019-02-25 2020-09-03 엘지전자 주식회사 Refrigerator for entrance gate
WO2020175834A1 (en) 2019-02-25 2020-09-03 엘지전자 주식회사 Refrigerator
US11863671B1 (en) 2019-04-17 2024-01-02 Apple Inc. Accessory assisted account recovery
US11889302B2 (en) 2020-08-28 2024-01-30 Apple Inc. Maintenance of wireless devices

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188613A (en) * 2011-12-30 2013-07-03 国民技术股份有限公司 System and method of broadcast data communication
US20130282438A1 (en) * 2012-04-24 2013-10-24 Qualcomm Incorporated System for delivering relevant user information based on proximity and privacy controls
WO2013163333A2 (en) * 2012-04-24 2013-10-31 Qualcomm Incorporated Retail proximity marketing
EP2693360A2 (en) * 2012-07-30 2014-02-05 NCR Corporation Location aware authentication

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007235586A (en) * 2006-03-01 2007-09-13 Nec Corp Advertisement viewing and listening confirmation system, broadcast receiving terminal, advertisement viewing and listening confirmation terminal, advertisement viewing and listening confirmation method, and program
US9544075B2 (en) * 2012-02-22 2017-01-10 Qualcomm Incorporated Platform for wireless identity transmitter and system using short range wireless broadcast
US8665744B2 (en) * 2012-05-18 2014-03-04 Gainspan Corporation Convenient provisioning of embedded devices with WiFi capability
CN103581239B (en) * 2012-07-27 2019-01-22 中兴通讯股份有限公司 A kind of discovery method, apparatus of equipment and service

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188613A (en) * 2011-12-30 2013-07-03 国民技术股份有限公司 System and method of broadcast data communication
US20130282438A1 (en) * 2012-04-24 2013-10-24 Qualcomm Incorporated System for delivering relevant user information based on proximity and privacy controls
WO2013163333A2 (en) * 2012-04-24 2013-10-31 Qualcomm Incorporated Retail proximity marketing
EP2693360A2 (en) * 2012-07-30 2014-02-05 NCR Corporation Location aware authentication

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108958825A (en) * 2017-05-19 2018-12-07 腾讯科技(深圳)有限公司 A kind of information configuring methods and device
CN114374567A (en) * 2017-06-02 2022-04-19 苹果公司 Accessory communication control
CN112106388A (en) * 2018-03-09 2020-12-18 科智库普若西玛公司 Method, system and device for causing proximity dependent activity by mobile device
US20210035083A1 (en) * 2019-08-02 2021-02-04 Mastercard International Incorporated System and method to support payment acceptance capability for merchants
US11868981B2 (en) * 2019-08-02 2024-01-09 Mastercard International Incorporated System and method to support payment acceptance capability for merchants
CN111194010A (en) * 2019-12-31 2020-05-22 上海感悟通信科技有限公司 Method, system and medium for transmitting data to target number of devices by radio
CN111194010B (en) * 2019-12-31 2022-04-01 上海感悟通信科技有限公司 Method, system and medium for transmitting data to target number of devices by radio
CN112596756A (en) * 2020-09-08 2021-04-02 天地(常州)自动化股份有限公司 Multi-label program upgrading method, device and system

Also Published As

Publication number Publication date
WO2016036453A1 (en) 2016-03-10
EP3189643A1 (en) 2017-07-12

Similar Documents

Publication Publication Date Title
CN106664523A (en) Proximity application discovery and provisioning
CN104246529B (en) Wireless identification emitter is positioned using short-distance wireless broadcast
US10419907B2 (en) Proximity application discovery and provisioning
CN106465115B (en) The verifying of indicator is currently moved based on safety
US20130217333A1 (en) Determining rewards based on proximity of devices using short-range wireless broadcasts
US10073960B1 (en) Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
US20130282438A1 (en) System for delivering relevant user information based on proximity and privacy controls
US10360593B2 (en) Retail proximity marketing
JP6290104B2 (en) Method and device for obscuring device identifiers
CN104365122A (en) System for delivering relevant user information based on proximity and privacy controls
US20130214909A1 (en) Airplane mode for wireless transmitter device and system using short-range wireless broadcasts
JP6284927B2 (en) Airplane mode for wireless transmitter devices and systems using short range wireless broadcast
US20130103946A1 (en) Location-aware Mobile Connectivity and Information Exchange System
CN105557031A (en) Interleaving advertising packets for improved detectability and security
WO2013163338A2 (en) Determining rewards based on proximity of devices using short-range wireless broadcasts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170510