CN111818492A - Bluetooth beacon and data transmission method and readable storage medium thereof - Google Patents

Bluetooth beacon and data transmission method and readable storage medium thereof Download PDF

Info

Publication number
CN111818492A
CN111818492A CN202010428264.2A CN202010428264A CN111818492A CN 111818492 A CN111818492 A CN 111818492A CN 202010428264 A CN202010428264 A CN 202010428264A CN 111818492 A CN111818492 A CN 111818492A
Authority
CN
China
Prior art keywords
bluetooth beacon
beacon data
data
broadcast packet
bluetooth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010428264.2A
Other languages
Chinese (zh)
Other versions
CN111818492B (en
Inventor
顾永如
汤钧
吴群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Orange Group Microelectronics Co ltd
Original Assignee
Shanghai Orange Group Microelectronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Orange Group Microelectronics Co ltd filed Critical Shanghai Orange Group Microelectronics Co ltd
Priority to CN202010428264.2A priority Critical patent/CN111818492B/en
Publication of CN111818492A publication Critical patent/CN111818492A/en
Application granted granted Critical
Publication of CN111818492B publication Critical patent/CN111818492B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a Bluetooth beacon and a data transmission method thereof and a readable storage medium. And safely processing the Bluetooth beacon data by adopting a preset algorithm, wherein the method comprises the steps of encrypting plaintext data into a ciphertext, adding a unique tag and adding a dynamic variable, wherein the dynamic variable can be generated according to the address of the broadcasting equipment of the Bluetooth beacon, packaging the safely processed Bluetooth beacon data in a broadcasting packet, and finally sending the broadcasting packet to the beacon receiving equipment through a wireless frame. Based on the method, the use safety of the Bluetooth beacon can be improved, and the method is favorable for preventing the data of the Bluetooth beacon from being illegally cloned, illegally used and illegally tracked.

Description

Bluetooth beacon and data transmission method and readable storage medium thereof
Technical Field
The invention relates to the technical field of Bluetooth wireless communication, in particular to a Bluetooth beacon data transmission method, a Bluetooth beacon based on the method and a readable storage medium.
Background
With the development of short-distance wireless communication technology, Beacon (Beacon) applications are increasingly appearing in front of people. The beacon device mainly works by broadcasting the ID (Identity document) and specific information of the transmitting device to the surroundings, so that the beacon device can be widely applied to occasions such as commercial advertisements, indoor positioning and the like. With the release of the Bluetooth 4.0 specification, the Bluetooth Low Energy (BLE) technology introduced therein is beginning to be popularized in terminals such as smart phones, and more devices also begin to support the BLE technology. The BLE technology is characterized by low power consumption, simpler protocol and lower cost compared with the traditional Bluetooth, Wi-Fi and other technologies, and the broadcasting work mode of the BLE technology is particularly suitable for application of beacons. Thus, bluetooth low energy beacons (hereinafter collectively referred to as bluetooth beacons) are being used in an increasing number of situations.
The bluetooth beacon continuously sends out wireless broadcast signals to the surrounding environment, and the beacon receiving device captures the wireless broadcast signals, so that different applications, such as tracking, logistics storage management, variable monitoring, message pushing and the like, of the bluetooth device are realized.
As bluetooth beacons are rapidly becoming an economically motivated means or medium for data transmission, security in the use of bluetooth beacons is becoming increasingly important. In practical application scenarios, once the bluetooth beacon data is illegally cloned, tampered and illegally tracked by a hacker, the hacker has an opportunity to easily transplant the data into other illegal bluetooth beacons or illegally tamper the data, thereby misleading users and causing huge benefit loss to the users.
Disclosure of Invention
In view of the above, the present invention provides a bluetooth beacon and a data transmission method thereof, and a readable storage medium, so as to solve the problems in the prior art that the use security of the bluetooth beacon is low, and the risk of illegal cloning, illegal tampering and illegal tracking of the beacon data is high.
The invention provides a transmission method of Bluetooth beacon data, which comprises the following steps:
adopting a preset algorithm to perform safety processing on the Bluetooth beacon data;
encapsulating the safely processed Bluetooth beacon data in a broadcast packet;
and sending the broadcast packet to a beacon receiving device through a wireless frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain the Bluetooth beacon data.
Optionally, the performing security processing on the bluetooth beacon data by using a preset algorithm includes: generating a unique tag for the Bluetooth beacon data by adopting a preset algorithm;
the encapsulating of the bluetooth beacon data after the security processing in a broadcast packet includes: and encapsulating the unique tag and the Bluetooth beacon data in a broadcast packet.
Optionally, the performing security processing on the bluetooth beacon data by using a preset algorithm includes: encrypting the Bluetooth beacon data into a ciphertext by adopting a preset algorithm;
the encapsulating of the bluetooth beacon data after the security processing in a broadcast packet includes: and encapsulating the ciphertext into a broadcast packet.
Optionally, the performing security processing on the bluetooth beacon data by using a preset algorithm includes: generating a unique tag for the Bluetooth beacon data by adopting a preset algorithm, and encrypting the Bluetooth beacon data into a ciphertext by adopting the preset algorithm;
the encapsulating of the bluetooth beacon data after the security processing in a broadcast packet includes: and encapsulating the unique tag and the ciphertext into a broadcast packet.
Optionally, the performing security processing on the bluetooth beacon data by using a preset algorithm further includes: generating a dynamic variable, wherein the dynamic variable is a random variable or a variable changing along with time;
the encapsulating of the bluetooth beacon data after the security processing in the broadcast packet further includes: and encapsulating the dynamic variable in a broadcast packet.
Optionally, the generating a dynamic variable includes:
and generating the dynamic variable according to the broadcast equipment address of the Bluetooth beacon, wherein the broadcast equipment address is a random address or an address changing along with time.
Optionally, the dynamic variable is the address of the broadcasting device, or a part of the dynamic variable is the address of the broadcasting device.
Optionally, the preset algorithm comprises an advanced encryption standard AES algorithm.
The invention provides a bluetooth beacon, which comprises a memory and a processor, wherein the memory stores a program, and the program is used for being executed by the processor to execute one or more steps in the transmission method of the bluetooth beacon data in any technical scheme.
The invention provides a readable storage medium, which stores a program, wherein the program is used for being executed by a processor to execute one or more steps of the transmission method of the bluetooth beacon data in any technical scheme.
The Bluetooth beacon and the data transmission method and the readable storage medium thereof provided by the invention adopt the preset algorithm to perform security processing on the Bluetooth beacon data (namely the Bluetooth beacon data) and send the Bluetooth beacon data after the security processing to the beacon receiving equipment, and the unauthorized beacon receiving equipment cannot adopt adaptive measures to obtain the Bluetooth beacon data because the unauthorized beacon receiving equipment does not know the specific key adopted by the security processing, thereby being beneficial to preventing the Bluetooth beacon data from being illegally cloned, illegally tampered and illegally tracked and improving the use security of the Bluetooth beacon.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic network structure diagram of an application scenario according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for transmitting bluetooth beacon data according to a first embodiment of the present invention;
fig. 3 is a flowchart illustrating a method for transmitting bluetooth beacon data according to a second embodiment of the present invention;
fig. 4 is a schematic diagram of a broadcast packet obtained based on the transmission method shown in fig. 3;
fig. 5 is a flowchart illustrating a method for transmitting bluetooth beacon data according to a third embodiment of the present invention;
fig. 6 is a schematic diagram of a broadcast packet obtained based on the transmission method shown in fig. 5;
fig. 7 is a flowchart illustrating a method for transmitting bluetooth beacon data according to a fourth embodiment of the present invention;
fig. 8 is a schematic diagram of a broadcast packet obtained based on the transmission method shown in fig. 7;
fig. 9 is a flowchart illustrating a method for transmitting bluetooth beacon data according to a fifth embodiment of the present invention;
fig. 10 is a schematic diagram of a broadcast packet obtained based on the transmission method shown in fig. 9;
FIG. 11 is a schematic diagram of the comparison of the dynamic variable and the address of the broadcaster in accordance with the present invention;
fig. 12 is a schematic structural diagram of a bluetooth beacon according to an embodiment of the present invention.
Detailed Description
Conventionally, bluetooth beacon data is transmitted in clear text form by a wireless broadcast signal, and all beacon receiving devices can receive the broadcast signal and easily acquire the data, which provides a riding opportunity for illegal operation of illegal receivers. Once the bluetooth beacon data is illegally acquired, hackers have the opportunity to easily perform illegal cloning, illegal tampering and illegal tracking on the bluetooth beacon data, thereby misleading users and causing huge benefit loss to the users.
In view of this, the embodiment of the present invention provides a method for transmitting bluetooth beacon data, so as to solve the problem. Referring to fig. 1, in a network environment applied in the embodiment of the present invention, in a signal transmission range of a bluetooth beacon 11, a bluetooth beacon receiving device 12 and the bluetooth beacon 11 perform data transmission by using a bluetooth communication protocol supported by both sides; the bluetooth beacon receiving device 12 may also interact with a remote server 13 via a mobile communication network 14. In addition, the bluetooth beacon 11 (or the bluetooth beacon transmission device having the bluetooth beacon 11) may also be connected to a mobile communication network for data interaction with a server (not shown in fig. 1). The embodiment of the present invention does not limit the types of the bluetooth beacon receiving device 12 and the bluetooth beacon transmitting device, the protocol and the networking structure of the mobile communication network, and the specific implementation manner of the server.
The bluetooth beacon transmitting device and the bluetooth beacon receiving device 12 are substantially electronic terminals, and the actual entities thereof may be mobile devices such as smart phones, PDAs (Personal Digital assistants or tablet computers), and wearable devices with bluetooth transmission functions, which can be worn on limbs or embedded in clothes, ornaments, accessories, and the like.
As shown in fig. 2, the transmission method of bluetooth beacon data includes the following steps S11 to S13.
S11: and performing safety processing on the Bluetooth beacon data by adopting a preset algorithm.
The bluetooth beacon data referred to herein may refer to a part or all of PDUs (protocol data units) in the bluetooth low energy broadcast. The bluetooth beacon data described throughout the embodiments of the present invention may be designated as the same, and will not be described in detail below.
S12: and encapsulating the safely processed Bluetooth beacon data in a broadcast packet.
S13: and sending the broadcast packet to a beacon receiving device through a wireless frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain Bluetooth beacon data.
The execution subject of each step may be a bluetooth beacon transmission device or a bluetooth beacon (e.g., bluetooth beacon 11 shown in fig. 1) itself, specifically including but not limited to a bluetooth device for tracking, logistics storage management, variable monitoring, message pushing and other application scenarios.
The security processing is equivalent to adding an authentication operation to the bluetooth beacon data, even if an unauthorized beacon receiving device receives a broadcast packet (i.e., a wireless broadcast signal) encapsulated with the bluetooth beacon data, the unauthorized beacon receiving device cannot acquire a reverse algorithm of a preset algorithm without acquiring a specific key adopted by the security processing, and cannot acquire the bluetooth beacon data through authentication, and certainly cannot adopt an adaptive measure, so that the bluetooth beacon data is favorably prevented from being illegally cloned, illegally tampered and illegally tracked, and the use security of the bluetooth beacon can be improved.
Taking an application scenario of order payment as an example, even if malicious beacon receiving equipment receives a broadcast packet, the malicious beacon receiving equipment cannot acquire a reverse algorithm of a preset algorithm, so that adaptive measures cannot be taken to decode the broadcast packet to successfully obtain bluetooth beacon data, and the malicious beacon receiving equipment cannot copy and clone the bluetooth beacon data onto a phishing server (also called an illegal server), so that payment information of a user cannot be cheated by using a false order and payment page, and the user loss is avoided.
For the application scenario of logistics storage management, an illegal beacon receiving device cannot decode the broadcast packet, and certainly cannot obtain the identity information of the bluetooth beacon from the broadcast packet, so that the bluetooth beacon cannot be tracked, that is, the embodiment of the invention can realize anti-tracking.
The preset algorithm refers to an operation method for performing security processing on bluetooth beacon data, and the specific content of the preset algorithm is different in different security processing modes. For example, if the security processing is encryption, the preset algorithm refers to an encryption algorithm; for another example, if the security processing is to generate a unique tag, the preset algorithm refers to a generation algorithm of a unique identifier or a unique ID; for another example, if the security process is to generate dynamic variables, the preset algorithm refers to an algorithm that generates dynamic variables. If the security processing is a combination of the above-mentioned multiple operation modes, the number of the preset algorithms may be multiple, and each algorithm is an algorithm adopted by a corresponding operation mode.
The preset algorithm may be written into the chip by the manufacturer when the bluetooth beacon (or the bluetooth beacon transmission device) is produced, and the execution of the preset algorithm may be performed by itself after the bluetooth beacon is started without depending on other instructions, or may be instructed to execute or stop the execution of the preset algorithm by other means, for example, by separately setting a switch for executing security processing.
The technical solutions of the embodiments of the present invention are clearly and completely described below with reference to the accompanying drawings, and it is obvious that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive step, based on the following individual embodiments, fall within the scope of protection of the present invention. The following embodiments and their technical features may be combined with each other without conflict.
Fig. 3 is a flowchart illustrating a method for transmitting bluetooth beacon data according to a second embodiment of the present invention. Fig. 3 shows a method for transmitting bluetooth beacon data according to the embodiment of fig. 2. The transmission method includes the following steps S21-S23.
S21: a preset algorithm is used to generate a unique tag for the bluetooth beacon data.
S22: the unique tag and bluetooth beacon data are encapsulated in a broadcast packet.
S23: the method comprises the steps that a broadcast packet is sent to a beacon receiving device through a wireless frame, the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain Bluetooth beacon data, the beacon receiving device calculates a unique label according to the obtained Bluetooth beacon data, if the calculated unique label is consistent with the received unique label, the received Bluetooth beacon data are real and not tampered, and the received Bluetooth beacon data can be regarded as authentication of the Bluetooth beacon data.
Bluetooth beacon data is essentially a string of numbers or characters, and the unique tag is a unique identification of the string of numbers or characters. .
The preset algorithm used for generating the unique tag may be a symmetric Encryption algorithm such as an AES (Advanced Encryption Standard) algorithm, a DES (Data Encryption Standard) algorithm, or other asymmetric Encryption algorithms.
The following is an example description taking the AES algorithm as an example. The AES algorithm is also called Rijndael encryption method, Bluetooth beacon data can be regarded as an original matrix, and a key generated by the AES algorithm performs corresponding operation on each byte in the original matrix, so that the unique label is finally obtained.
Referring to fig. 4, the unique tag is a new part of a PDU (protocol data Unit) in the bluetooth low energy protocol broadcast, and is transmitted through a radio frame together with other fields, such as a Preamble (Preamble), an Access code (Access Address), a protocol data Unit (protocol data Unit) (including bluetooth beacon data used for generating the unique tag), and a CRC (cyclic redundancy Check). It should be noted that: the unique tag and the original PDU form a new PDU.
The position of the unique tag in the broadcast packet PDU, for example, whether the unique tag is placed in the middle section or the rear section of the PDU, is not limited in the embodiments of the present invention, and only needs to meet the actual transmission requirement.
In addition to the beacon transmitting device, the key used by the preset algorithm of fig. 4 is known only to the intended beacon receiving device. After receiving a broadcast packet transmitted by a bluetooth beacon, the expected beacon receiving device generates a tag according to the received broadcast packet according to the step of generating the unique tag, that is, the beacon receiving device generates a tag according to the same preset algorithm, and if the generated tag is the same as the received unique tag, it indicates that the bluetooth beacon data has not been tampered. This can also be considered as authentication of the bluetooth beacon data.
Fig. 5 is a flowchart illustrating a method for transmitting bluetooth beacon data according to a third embodiment of the present invention. Fig. 5 shows another method for transmitting bluetooth beacon data according to the embodiment of fig. 2. The transmission method includes the following steps S31-S33.
S31: and encrypting the Bluetooth beacon data into a ciphertext by adopting a preset algorithm.
S32: and encapsulating the ciphertext into a broadcast packet.
S33: and sending the broadcast packet to a beacon receiving device through a wireless frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain Bluetooth beacon data.
In the foregoing embodiments, the bluetooth beacon data is a string of numbers or characters displayed in clear text, which has a problem of low privacy. For this, the plaintext is encrypted into the ciphertext, and the preset algorithm used for generating the ciphertext may be an AES algorithm. The Bluetooth beacon data can be regarded as an original matrix, and a key generated by an AES algorithm performs corresponding operation on each byte in the original matrix, so that a ciphertext corresponding to the Bluetooth beacon data is finally obtained.
The field lengths of the ciphertext and plaintext bluetooth beacon data may be the same or different, and the specific requirement is determined according to the adopted preset algorithm.
As shown in fig. 6, the broadcast that is finally transmitted includes the bluetooth beacon data in the form of ciphertext, but also includes other fields, such as preamble, access code, other parts of PDU, CRC, etc. The position of the cipher text in the broadcast packet may be consistent with the position of the bluetooth beacon data originally expressed in the clear text form in the broadcast packet.
In addition to the beacon transmitting device, the key used by the preset algorithm of fig. 6 is known only to the intended beacon receiving device. After receiving the broadcast packet, only the expected beacon receiving device can successfully decrypt the ciphertext according to the reverse algorithm of the preset algorithm, so that the Bluetooth beacon data can be successfully obtained.
Other embodiments of the present invention may perform the aforementioned authentication and encryption operations on the bluetooth beacon data simultaneously, resulting in another broadcast packet. Fig. 7 is a flowchart illustrating a method for transmitting bluetooth beacon data according to a fourth embodiment of the present invention. Referring to fig. 7, a method for transmitting bluetooth beacon data according to the embodiment of fig. 2 includes the following steps S41-S43.
S41: and encrypting the Bluetooth beacon data into a ciphertext by adopting a preset algorithm, and generating a unique tag for the Bluetooth beacon data by adopting the preset algorithm, wherein the Bluetooth beacon data used for generating the unique tag can be data after encryption or before encryption.
The unique tag may also be encrypted or not encrypted if generated with the bluetooth beacon data prior to encryption.
S42: and encapsulating the unique label and the ciphertext into the broadcast packet.
S43: and sending the broadcast packet to a beacon receiving device through a wireless frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain Bluetooth beacon data.
Based on this, please refer to fig. 8, the finally transmitted broadcast includes not only the bluetooth beacon data expressed in the form of ciphertext, but also a unique tag (which is a new part of PDU in the bluetooth low energy protocol broadcast), and of course, also includes other fields, such as preamble, access code, other parts of PDU, CRC, etc. For the positions of the ciphertext and the unique tag in the broadcast packet, reference may be made to the description of the foregoing embodiments.
In addition to the beacon transmitting device, the key used by the preset algorithm of fig. 8 is known only to the intended beacon receiving device. When the expected beacon receiving device receives a broadcast packet sent by a Bluetooth beacon, the expected beacon receiving device generates a label according to the same preset algorithm, and if the generated label is the same as the received unique label, the expected beacon receiving device indicates that the Bluetooth beacon data is not tampered. And only after the expected beacon receiving equipment receives the broadcast packet, the ciphertext can be decrypted according to the reverse algorithm of the preset algorithm, and the Bluetooth beacon data can be successfully obtained.
Compared with the embodiments respectively described in fig. 3 and fig. 5, this embodiment is equivalent to setting two authentication procedures for the transmission of the bluetooth beacon data, and having security measures of authentication and encryption, which can further improve the security of the use of the bluetooth beacon.
Fig. 9 is a flowchart illustrating a method for transmitting bluetooth beacon data according to a fifth embodiment of the present invention. As shown in fig. 9, the transmission method includes the following steps S51 to S53.
S51: and generating a dynamic variable, wherein the dynamic variable is a random variable or a variable changing along with time, the dynamic variable can be used as an initialization variable or a counter value in an encryption process, the Bluetooth beacon data is encrypted into a ciphertext by using a preset algorithm and the dynamic variable, and a unique tag is generated for the Bluetooth beacon data by using the preset algorithm. The bluetooth beacon data used to generate the unique tag may be data after encryption or before encryption. The unique tag may also be encrypted or not encrypted if generated with the bluetooth beacon data prior to encryption.
S52: and encapsulating the dynamic variable, the unique tag and the ciphertext into a broadcast packet.
S53: and sending the broadcast packet to a beacon receiving device through a wireless frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain Bluetooth beacon data.
The dynamic variable may be a number or a string of characters. The dynamic variable may vary with time (in this case, a variable that varies with time) or aperiodically (in this case, a random variable, and a variable that varies with time) at some fixed period. The embodiment is not limited to the manner of generating the dynamic variable as long as the obtained dynamic variable is changed, and also is not limited to the number of field bits for generating the dynamic variable as long as the data transmission requirement can be satisfied.
In one embodiment, a random variable may be generated every hour, and the last two bits of the 16-ary random variable are used as dynamic variables; for another example, when generating bluetooth signal data, a random string of a fixed number of bits is generated, with the random string as a dynamic variable.
Referring to fig. 10, the broadcast finally transmitted by the bluetooth beacon includes the dynamic variable, the bluetooth beacon data in the form of ciphertext, and the unique tag. Of course, as mentioned above, the broadcast packet may also include other fields, such as a preamble, an access code, other PDU portions, and a CRC. In addition, as two new components in the PDU: the embodiment of the invention is not limited in the position of the PDU by the dynamic variable and the unique label, and only needs to meet the actual transmission requirement.
It should be understood that in other embodiments of the present invention, the broadcast packet finally transmitted by the bluetooth beacon may not include a unique tag, i.e., the broadcast packet may not include a unique tag, but rather include a dynamic variable, bluetooth beacon data in ciphertext form, and other fields as previously described.
In a specific application scenario, according to the specification of the bluetooth protocol, the bluetooth device may generate a random address or an address that changes with time, i.e., a broadcast device address, for external communication without exposing its own unique id, and may set a period for replacing the random address. Therefore, for the bluetooth beacon, a dynamic variable may be generated according to the address of the broadcasting device, for example, a few bit fields of the address of the broadcasting device may be used as the dynamic variable, or the address of the broadcasting device may be subjected to a certain regular mathematical operation or character string conversion to obtain the dynamic variable.
As shown in fig. 11 (a), an embodiment of the present invention may use the entire broadcaster address directly as a dynamic variable. It is understood that the full number of bits of the broadcaster address is directly used as the full number of bits of the dynamic variable, the broadcaster address being the dynamic variable.
As shown in fig. 11 (b), an embodiment of the present invention may use the entire broadcaster address as part of the dynamic variable. It is understood that the total number of bits of the address of the broadcasting device is a part of the number of bits of the dynamic variable, and the number of bits of the address of the broadcasting device is smaller than the number of bits of the dynamic variable.
As shown in (c) of fig. 11, an embodiment of the present invention may use a portion of the broadcaster address as the entire dynamic variable. It is understood that a part of the number of bits of the address of the broadcasting device is taken as the total number of bits of the dynamic variable, and the number of bits of the address of the broadcasting device is greater than the number of bits of the dynamic variable.
As shown in (d) of fig. 11, an embodiment of the present invention may use a part of the address of the broadcasting device as a part of the dynamic variable. It is understood that a part of the bits of the address of the broadcasting device is used as a part of the bits of the dynamic variable, and the bits of the address of the broadcasting device and the bits of the dynamic variable may be equal or unequal, and the embodiment is not limited.
In this embodiment, the bluetooth beacon converts the bluetooth beacon data into dynamic data that changes with time by using the dynamic variable and then transmits the dynamic data, so that an unauthorized beacon receiving device cannot obtain real and stable bluetooth beacon data, thereby being beneficial to preventing the bluetooth beacon data from being illegally cloned, illegally tampered and illegally tracked, and being capable of improving the use security of the bluetooth beacon.
In addition, the dynamic variable is generated according to the originally existing address of the broadcasting equipment, a random variable generation algorithm does not need to be additionally introduced, the calculation amount of generating the dynamic variable can be reduced, and the workload of the Bluetooth beacon is reduced.
Fig. 12 is a schematic structural diagram of a bluetooth beacon according to an embodiment of the present invention. The bluetooth beacon 120 includes a processor 121 and a memory 122, and the processor 121 and the memory 122 may be connected by a communication bus 123 for data or signal transmission.
The processor 121 is a control center of the bluetooth beacon 120, connects various parts of the entire bluetooth beacon 120 using various interfaces and lines, performs various functions of the bluetooth beacon 120 and processes data by running or loading a program stored in the memory 122, and calling data stored in the memory 122, thereby performing overall monitoring of the bluetooth beacon 120.
The processor 121 loads instructions corresponding to one or more processes of the program into the memory 122, and the processor 121 runs the program stored in the memory 122, so as to implement one or more of the following functions:
adopting a preset algorithm to perform safety processing on the Bluetooth beacon data;
encapsulating the safely processed Bluetooth beacon data in a broadcast packet; and
and sending the broadcast packet to a beacon receiving device through a wireless frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain the Bluetooth beacon data.
The security processing is equivalent to adding an authentication operation to the bluetooth beacon data, even if an unauthorized beacon receiving device receives a broadcast packet (i.e., a wireless broadcast signal) encapsulated with the bluetooth beacon data, the unauthorized beacon receiving device cannot acquire a reverse algorithm of a preset algorithm without acquiring a specific key adopted by the security processing, and cannot acquire the bluetooth beacon data through authentication, and certainly cannot adopt an adaptive measure, so that the bluetooth beacon data is favorably prevented from being illegally cloned, illegally tampered and illegally tracked, and the use security of the bluetooth beacon can be improved.
The preset algorithm refers to an operation method for performing security processing on bluetooth beacon data, and the specific content of the preset algorithm is different in different security processing modes. For example, if the security processing is encryption, the preset algorithm refers to an encryption algorithm; for another example, if the security processing is to generate a unique tag, the preset algorithm refers to a generation algorithm of a unique identifier or a unique ID; for another example, if the security process is to generate dynamic variables, the preset algorithm refers to an algorithm that generates dynamic variables. If the security processing is a combination of the above-mentioned multiple operation modes, the number of the preset algorithms may be multiple, and each algorithm is an algorithm adopted by a corresponding operation mode.
For different security processing manners, details of steps executed by the processor 121 to call the program may refer to the foregoing embodiments, and are not described in detail here.
It should be understood that, when implemented in a practical application scenario, the execution bodies of the above steps may not be the processor 121 and the memory 122, but may be implemented by other modules and units respectively, according to the type of the beacon transmission device to which the bluetooth beacon 120 belongs.
It will be understood by those skilled in the art that all or part of the steps in the methods of the above embodiments may be performed by instructions or by related hardware controlled by the instructions, which may be stored in a readable storage medium and loaded and executed by a processor. To this end, the present invention provides a readable storage medium, which stores a plurality of instructions that can be loaded by a processor to execute one or more steps of any method for transmitting bluetooth beacon data provided by the present invention.
The readable storage medium may include a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic or optical disk, and the like.
Since the instructions stored in the readable storage medium can execute the steps in any method for transmitting bluetooth beacon data provided in the embodiment of the present invention, the beneficial effects that can be achieved by any method for transmitting bluetooth beacon data provided in the embodiment of the present invention can be achieved, for details, see the foregoing embodiments, and are not described herein again.
Although the invention has been shown and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art based upon a reading and understanding of this specification and the annexed drawings. The present invention includes all such modifications and variations, and is limited by the scope of the following claims. In particular regard to the various functions performed by the above described components, the terms used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., that is functionally equivalent), even though not structurally equivalent to the disclosed structure which performs the function in the herein illustrated exemplary implementations of the specification.
That is, the above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent structural changes made by using the contents of the present specification and the drawings, such as the combination of technical features between the embodiments, or the direct or indirect application to other related technical fields, are included in the scope of the present invention.
In addition, in the description of the foregoing embodiments, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more features. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.

Claims (10)

1. A method for transmitting bluetooth beacon data, comprising:
adopting a preset algorithm to perform safety processing on the Bluetooth beacon data;
encapsulating the safely processed Bluetooth beacon data in a broadcast packet;
and sending the broadcast packet to a beacon receiving device through a wireless frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain the Bluetooth beacon data.
2. The method of claim 1, wherein the Bluetooth beacon data is transmitted from the mobile device,
the safety processing of the Bluetooth beacon data by adopting the preset algorithm comprises the following steps: generating a unique tag for the Bluetooth beacon data by adopting a preset algorithm;
the encapsulating of the bluetooth beacon data after the security processing in a broadcast packet includes: and encapsulating the unique tag and the Bluetooth beacon data in a broadcast packet.
3. The method of claim 1, wherein the Bluetooth beacon data is transmitted from the mobile device,
the safety processing of the Bluetooth beacon data by adopting the preset algorithm comprises the following steps: encrypting the Bluetooth beacon data into a ciphertext by adopting a preset algorithm;
the encapsulating of the bluetooth beacon data after the security processing in a broadcast packet includes: and encapsulating the ciphertext into a broadcast packet.
4. The method of claim 1, wherein the Bluetooth beacon data is transmitted from the mobile device,
the safety processing of the Bluetooth beacon data by adopting the preset algorithm comprises the following steps: generating a unique tag for the Bluetooth beacon data by adopting a preset algorithm, and encrypting the Bluetooth beacon data into a ciphertext by adopting the preset algorithm;
the encapsulating of the bluetooth beacon data after the security processing in a broadcast packet includes: and encapsulating the unique tag and the ciphertext into a broadcast packet.
5. The method for transmitting Bluetooth beacon data according to any one of claims 1 to 4,
the safety processing of the bluetooth beacon data by adopting the preset algorithm further comprises the following steps: generating a dynamic variable, wherein the dynamic variable is a random variable or a variable changing along with time;
the encapsulating of the bluetooth beacon data after the security processing in the broadcast packet further includes: and encapsulating the dynamic variable in a broadcast packet.
6. The method for transmitting bluetooth beacon data according to claim 5, wherein the generating a dynamic variable comprises:
and generating the dynamic variable according to the broadcast equipment address of the Bluetooth beacon, wherein the broadcast equipment address is a random address or an address changing along with time.
7. The method of claim 6, wherein the dynamic variable is the address of the broadcasting device, or a part of the dynamic variable is the address of the broadcasting device.
8. The method of claim 1, wherein the pre-set algorithm comprises the Advanced Encryption Standard (AES) algorithm.
9. A Bluetooth beacon comprising a memory and a processor, the memory storing a program for execution by the processor to perform one or more steps of the method of transmitting Bluetooth beacon data as claimed in any one of claims 1 to 8.
10. A readable storage medium storing a program for execution by a processor to perform one or more steps of the method of transmitting bluetooth beacon data according to any one of claims 1 to 8.
CN202010428264.2A 2020-05-20 2020-05-20 Bluetooth beacon, data transmission method thereof, and readable storage medium Active CN111818492B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010428264.2A CN111818492B (en) 2020-05-20 2020-05-20 Bluetooth beacon, data transmission method thereof, and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010428264.2A CN111818492B (en) 2020-05-20 2020-05-20 Bluetooth beacon, data transmission method thereof, and readable storage medium

Publications (2)

Publication Number Publication Date
CN111818492A true CN111818492A (en) 2020-10-23
CN111818492B CN111818492B (en) 2024-05-24

Family

ID=72848660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010428264.2A Active CN111818492B (en) 2020-05-20 2020-05-20 Bluetooth beacon, data transmission method thereof, and readable storage medium

Country Status (1)

Country Link
CN (1) CN111818492B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112911569A (en) * 2021-03-15 2021-06-04 苏宁智能终端有限公司 Rope skipping data transmission method, rope skipping data receiving method, rope skipping and terminal
CN115134793A (en) * 2022-06-21 2022-09-30 北京百度网讯科技有限公司 Data processing method, device, equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262334A (en) * 2008-04-17 2008-09-10 中国人民解放军海军工程大学 Encryption method for Bluetooth data transmission
CN103309808A (en) * 2013-06-13 2013-09-18 中国科学院信息工程研究所 Label-based black box detection method and system for privacy disclosure of Android user
CN103621049A (en) * 2011-04-19 2014-03-05 施耐德电气It公司 System and method for automatically addressing devices in multi-drop network
CN104218976A (en) * 2013-06-03 2014-12-17 飞比特公司 Self-adaptive data transmission using Bluetooth
WO2015061673A1 (en) * 2013-10-25 2015-04-30 Roximity, Inc. Beacon security
CN107358087A (en) * 2017-07-07 2017-11-17 北京海泰方圆科技股份有限公司 Information storage means and device for the Bluetooth chip of Bluetooth identities authentication device
CN107666661A (en) * 2017-09-05 2018-02-06 重庆慧联无限科技有限公司 False proof bluetooth with sound detection function sends equipment
US20180249312A1 (en) * 2018-03-22 2018-08-30 Byung Mun Roh Mobile Device as a Form of Identification via Bluetooth
CN110049489A (en) * 2014-06-05 2019-07-23 阿里巴巴集团控股有限公司 Transmit the method and device of bootstrap information

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140133656A1 (en) * 2012-02-22 2014-05-15 Qualcomm Incorporated Preserving Security by Synchronizing a Nonce or Counter Between Systems
CN106971482B (en) * 2017-04-14 2019-04-02 成都流浪科技有限公司 A kind of real-time intelligent anti-theft magnetic snap system based on low-power consumption bluetooth
CN107231627B (en) * 2017-08-10 2020-11-10 乐鑫信息科技(上海)股份有限公司 Bluetooth network and network distribution method
CN107835506B (en) * 2017-10-26 2022-04-22 努比亚技术有限公司 Bluetooth communication method, Bluetooth device and computer readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262334A (en) * 2008-04-17 2008-09-10 中国人民解放军海军工程大学 Encryption method for Bluetooth data transmission
CN103621049A (en) * 2011-04-19 2014-03-05 施耐德电气It公司 System and method for automatically addressing devices in multi-drop network
CN104218976A (en) * 2013-06-03 2014-12-17 飞比特公司 Self-adaptive data transmission using Bluetooth
CN103309808A (en) * 2013-06-13 2013-09-18 中国科学院信息工程研究所 Label-based black box detection method and system for privacy disclosure of Android user
WO2015061673A1 (en) * 2013-10-25 2015-04-30 Roximity, Inc. Beacon security
CN110049489A (en) * 2014-06-05 2019-07-23 阿里巴巴集团控股有限公司 Transmit the method and device of bootstrap information
CN107358087A (en) * 2017-07-07 2017-11-17 北京海泰方圆科技股份有限公司 Information storage means and device for the Bluetooth chip of Bluetooth identities authentication device
CN107666661A (en) * 2017-09-05 2018-02-06 重庆慧联无限科技有限公司 False proof bluetooth with sound detection function sends equipment
US20180249312A1 (en) * 2018-03-22 2018-08-30 Byung Mun Roh Mobile Device as a Form of Identification via Bluetooth

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
蔡云骐: "《基于蓝牙信标的室内位置服务系统设计》", 《中国优秀硕士学位论文全文数据库 信息科技辑》, 16 March 2018 (2018-03-16) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112911569A (en) * 2021-03-15 2021-06-04 苏宁智能终端有限公司 Rope skipping data transmission method, rope skipping data receiving method, rope skipping and terminal
CN115134793A (en) * 2022-06-21 2022-09-30 北京百度网讯科技有限公司 Data processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN111818492B (en) 2024-05-24

Similar Documents

Publication Publication Date Title
EP3698535B1 (en) Privacy preserving tag
CN104852925B (en) Mobile intelligent terminal anti-data-leakage secure storage, backup method
CN104144049B (en) A kind of encryption communication method, system and device
CN107786331B (en) Data processing method, device, system and computer readable storage medium
EP3337088B1 (en) Data encryption method, decryption method, apparatus, and system
CN111245802B (en) Data transmission security control method, server and terminal
CN112287372B (en) Method and apparatus for protecting clipboard privacy
CN104765999A (en) User resource information processing method, terminal and server
CN110401527B (en) Data encryption and decryption method and device and storage medium
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN113114654B (en) Terminal equipment access security authentication method, device and system
CN109194701B (en) Data processing method and device
CN111818492B (en) Bluetooth beacon, data transmission method thereof, and readable storage medium
US20120166801A1 (en) Mutual authentication system and method for mobile terminals
US10985921B1 (en) Systems and methods for out-of-band authenticity verification of mobile applications
CN109756451B (en) Information interaction method and device
CN116455572B (en) Data encryption method, device and equipment
Baek et al. Secure and lightweight authentication protocol for NFC tag based services
US20180176716A1 (en) Dynamic secure messaging
CN101159542B (en) Method and system for saving and/or obtaining authentication parameter on terminal network appliance
CN110855606A (en) User identity authentication method, cloud decoding server, client and system
CN104703175A (en) Mobile terminal data safety protection method and device
US11363455B2 (en) Near field communication forum data exchange format (NDEF) messages with authenticated encryption
KR20130109560A (en) Encryption method of database of mobile communication device
EP3355546B1 (en) Device identification encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant