[go: up one dir, main page]

CN111818492B - Bluetooth beacon, data transmission method thereof, and readable storage medium - Google Patents

Bluetooth beacon, data transmission method thereof, and readable storage medium Download PDF

Info

Publication number
CN111818492B
CN111818492B CN202010428264.2A CN202010428264A CN111818492B CN 111818492 B CN111818492 B CN 111818492B CN 202010428264 A CN202010428264 A CN 202010428264A CN 111818492 B CN111818492 B CN 111818492B
Authority
CN
China
Prior art keywords
bluetooth beacon
data
bluetooth
beacon data
dynamic variable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010428264.2A
Other languages
Chinese (zh)
Other versions
CN111818492A (en
Inventor
顾永如
汤钧
吴群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Orange Group Microelectronics Co ltd
Original Assignee
Shanghai Orange Group Microelectronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Orange Group Microelectronics Co ltd filed Critical Shanghai Orange Group Microelectronics Co ltd
Priority to CN202010428264.2A priority Critical patent/CN111818492B/en
Publication of CN111818492A publication Critical patent/CN111818492A/en
Application granted granted Critical
Publication of CN111818492B publication Critical patent/CN111818492B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a Bluetooth beacon, a data transmission method thereof and a readable storage medium. The method comprises the steps of carrying out safe processing on Bluetooth beacon data by adopting a preset algorithm, and combining modes of encrypting plaintext data into ciphertext, adding a unique tag and adding a dynamic variable, wherein the dynamic variable can be generated according to a broadcasting equipment address of a Bluetooth beacon, then packaging the Bluetooth beacon data after safe processing in a broadcasting packet, and finally transmitting the broadcasting packet to beacon receiving equipment through a radio frame. Based on the method, the use safety of the Bluetooth beacon can be improved, and the method is beneficial to preventing the Bluetooth beacon data from being illegally cloned, illegally tampered and illegally tracked.

Description

Bluetooth beacon, data transmission method thereof, and readable storage medium
Technical Field
The invention relates to the technical field of Bluetooth wireless communication, in particular to a Bluetooth beacon data transmission method, a Bluetooth beacon based on the method and a readable storage medium.
Background
With the development of short-range wireless communication technology, beacon (Beacon) applications are also increasingly emerging. The main working mode of the beacon device is to broadcast the ID (Identity document, identity) of the transmitting equipment and specific information to the surrounding, so that the beacon device can be widely applied to occasions such as commercial advertisement, indoor positioning and the like. With the release of the bluetooth 4.0 specification, the low energy bluetooth (Bluetooth Low Energy, BLE) technology is spreading on terminals such as smartphones, and more devices are supporting BLE technology. The biggest characteristic of BLE technology is low power consumption, and compared with traditional technical protocols such as Bluetooth, wi-Fi and the like, the method is simpler and lower in cost, and in addition, the method is particularly suitable for application of beacons due to the broadcasting working mode. Thus, bluetooth low energy beacons (hereinafter collectively referred to as bluetooth beacons) are being used in an increasing number of applications.
The bluetooth beacon continuously transmits wireless broadcast signals to the surrounding environment, and the beacon receiving device captures the wireless broadcast signals and thereby realizes different applications, such as tracking of bluetooth devices, logistics warehouse management, variable monitoring, message pushing and the like.
As bluetooth beacons rapidly become an economically motivated means of data transmission or data transmission medium, the security of bluetooth beacons becomes increasingly important. In the practical application scenario, once bluetooth beacon data is illegally cloned, illegally tampered and illegally tracked by a hacker, the hacker has a chance to easily transfer the data into other illegal bluetooth beacons or illegally tamper with the data, thereby misleading the user and causing huge benefit loss to the user.
Disclosure of Invention
In view of this, the invention provides a bluetooth beacon, a data transmission method thereof and a readable storage medium thereof, so as to solve the problems in the prior art that the use security of the bluetooth beacon is low, and the risk of illegal cloning, illegal use and illegal tracking of beacon data is high.
The invention provides a transmission method of Bluetooth beacon data, which comprises the following steps:
carrying out safe processing on the Bluetooth beacon data by adopting a preset algorithm;
packaging the Bluetooth beacon data after the security processing in a broadcast packet;
and transmitting the broadcast packet to a beacon receiving device through a radio frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain the Bluetooth beacon data.
Optionally, the adopting a preset algorithm to perform security processing on the bluetooth beacon data includes: generating a unique tag for the Bluetooth beacon data by adopting a preset algorithm;
The method for encapsulating the bluetooth beacon data after the security processing in the broadcast packet comprises the following steps: the unique tag and bluetooth beacon data are encapsulated in a broadcast packet.
Optionally, the adopting a preset algorithm to perform security processing on the bluetooth beacon data includes: encrypting the Bluetooth beacon data into ciphertext by adopting a preset algorithm;
the method for encapsulating the bluetooth beacon data after the security processing in the broadcast packet comprises the following steps: the ciphertext is encapsulated in a broadcast packet.
Optionally, the adopting a preset algorithm to perform security processing on the bluetooth beacon data includes: generating a unique tag for the Bluetooth beacon data by adopting a preset algorithm, and encrypting the Bluetooth beacon data into a ciphertext by adopting the preset algorithm;
the method for encapsulating the bluetooth beacon data after the security processing in the broadcast packet comprises the following steps: the unique tag and the ciphertext are encapsulated in a broadcast packet.
Optionally, the adopting a preset algorithm to perform security processing on the bluetooth beacon data further includes: generating a dynamic variable, wherein the dynamic variable is a random variable or a variable which changes with time;
The method for encapsulating the bluetooth beacon data after the security processing in the broadcast packet further comprises: the dynamic variables are encapsulated in a broadcast packet.
Optionally, the generating the dynamic variable includes:
and generating the dynamic variable according to the broadcasting equipment address of the Bluetooth beacon, wherein the broadcasting equipment address is a random address or an address changing with time.
Optionally, the dynamic variable is the broadcast device address, or a part of the dynamic variable is a part of the broadcast device address.
Optionally, the preset algorithm comprises an advanced encryption standard AES algorithm.
The invention provides a Bluetooth beacon, which comprises a memory and a processor, wherein the memory stores a program, and the program is used for being executed by the processor to execute one or more steps in the Bluetooth beacon data transmission method according to any one of the technical schemes.
The present invention provides a readable storage medium storing a program for execution by a processor to perform one or more steps of the method for transmitting bluetooth beacon data according to any one of the above-described aspects.
According to the Bluetooth beacon, the data transmission method and the readable storage medium thereof, the Bluetooth beacon data (namely the Bluetooth beacon data) are subjected to security processing by adopting the preset algorithm, and the Bluetooth beacon data after the security processing is sent to the beacon receiving equipment, and the unauthorized beacon receiving equipment cannot adopt the adaptive measures to obtain the Bluetooth beacon data because the specific key adopted by the security processing is not known, so that the Bluetooth beacon data can be prevented from being illegally cloned, illegally tampered and illegally tracked, and the use security of the Bluetooth beacon can be improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a network structure of an application scenario according to an embodiment of the present invention;
fig. 2 is a flowchart of a transmission method of bluetooth beacon data according to a first embodiment of the present invention;
fig. 3 is a flowchart of a transmission method of bluetooth beacon data according to a second embodiment of the present invention;
fig. 4 is a schematic diagram of a broadcast packet obtained based on the transmission method shown in fig. 3;
fig. 5 is a flowchart of a transmission method of bluetooth beacon data according to a third embodiment of the present invention;
Fig. 6 is a schematic diagram of a broadcast packet obtained based on the transmission method shown in fig. 5;
Fig. 7 is a flowchart of a transmission method of bluetooth beacon data according to a fourth embodiment of the present invention;
fig. 8 is a schematic diagram of a broadcast packet obtained based on the transmission method shown in fig. 7;
Fig. 9 is a flowchart of a transmission method of bluetooth beacon data according to a fifth embodiment of the present invention;
fig. 10 is a schematic diagram of a broadcast packet obtained based on the transmission method shown in fig. 9;
FIG. 11 is a schematic diagram of the dynamic variable and broadcaster address of the present invention;
fig. 12 is a schematic diagram of a bluetooth beacon according to an embodiment of the present invention.
Detailed Description
Conventionally, bluetooth beacon data is transmitted in a clear text form through a wireless broadcast signal, and all beacon receiving devices can receive the broadcast signal and easily acquire the data, which provides a multiplicative opportunity for illegal operations of illegal receivers. Once the bluetooth beacon data is illegally acquired, a hacker has an opportunity to easily illegally clone, illegally tamper with, and illegally trace it, thereby misleading the user and causing great loss of benefit to the user.
In this regard, the embodiment of the invention provides a transmission method of bluetooth beacon data to solve the problem. Referring to fig. 1, in a network environment to which the embodiments of the present invention are applied, in a signal transmission range of a bluetooth beacon 11, a bluetooth beacon receiving device 12 and the bluetooth beacon 11 perform data transmission by using bluetooth communication protocols supported by both parties; the bluetooth beacon receiving device 12 may also interact with a remote server 13 via a mobile communications network 14. In addition, the bluetooth beacon 11 (or the bluetooth beacon transmitting device having the bluetooth beacon 11) may also be connected to a mobile communication network, and perform data interaction with a server (not shown in fig. 1). The embodiments of the present invention do not limit the types of the bluetooth beacon receiving device 12 and the bluetooth beacon transmitting device, the protocols and networking structures of the mobile communication network, and the specific implementation manner of the server.
The bluetooth beacon transmitting device and the bluetooth beacon receiving device 12 are essentially an electronic terminal, and the entity thereof may be a mobile device such as a smart phone, a PDA (Personal digital assistant or tablet computer), or a wearable device with bluetooth transmission function, which may be worn on a limb or embedded in clothing, jewelry, accessories, etc.
As shown in fig. 2, the transmission method of bluetooth beacon data includes the following steps S11 to S13.
S11: and adopting a preset algorithm to perform safe processing on the Bluetooth beacon data.
The bluetooth beacon data referred to herein may refer to a portion or all of the PDUs (protocol data unit, data protocol units) in the bluetooth low energy broadcast. The bluetooth beacon data in the embodiments of the present invention may be designated as such, and will not be described in detail below.
S12: and packaging the Bluetooth beacon data after the security processing in a broadcast packet.
S13: and transmitting the broadcast packet to a beacon receiving device through a radio frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain Bluetooth beacon data.
The main execution body of each step may be a bluetooth beacon transmitting device or a bluetooth beacon (such as bluetooth beacon 11 shown in fig. 1) itself, which specifically includes, but is not limited to, a bluetooth device for tracking, logistics warehouse management, variable monitoring, message pushing, and other application scenarios.
The security processing is equivalent to adding an authentication operation to the bluetooth beacon data, and even if an unauthorized beacon receiving device receives a broadcast packet (namely a wireless broadcast signal) which encapsulates the bluetooth beacon data, the unauthorized beacon receiving device cannot learn a specific key adopted by the security processing, namely cannot learn a reverse algorithm of a preset algorithm and cannot pass the authentication, and certainly cannot take an adaptive measure to obtain the bluetooth beacon data, so that the bluetooth beacon data is prevented from being illegally cloned, illegally tampered and illegally tracked, and the use security of the bluetooth beacon can be improved.
Taking an application scenario of order payment as an example, even if a malicious beacon receiving device receives a broadcast packet, a reverse algorithm of a preset algorithm cannot be known, and an adaptive measure cannot be adopted to decode the broadcast packet to successfully obtain bluetooth beacon data, and the malicious beacon receiving device cannot copy and clone the bluetooth beacon data to a phishing server (also called an illegal server), so that false ordering and payment pages cannot be utilized to fraudulently obtain payment information of a user, and user loss is avoided.
For the application scenario of logistics warehouse management, illegal beacon receiving equipment cannot decode the broadcast packet, and certainly cannot obtain the identity information of the Bluetooth beacon from the broadcast packet, so that the Bluetooth beacon cannot be tracked, namely the embodiment of the invention can realize anti-tracking.
The preset algorithm refers to an operation method for carrying out safe processing on Bluetooth beacon data, and the specific content of the preset algorithm is different in different safe processing modes. For example, if the security process is encryption, the preset algorithm refers to an encryption algorithm; for another example, if the security process is to generate a unique tag, the preset algorithm refers to a unique identifier or a unique ID generation algorithm; for another example, where the security process is to generate dynamic variables, the preset algorithm refers to an algorithm that generates dynamic variables. If the security process is a combination of the above multiple operation modes, the number of preset algorithms may be multiple, and each algorithm is an algorithm adopted by a corresponding operation mode.
The preset algorithm may be written into the chip by the manufacturer when the bluetooth beacon (or the bluetooth beacon transmitting device) is produced, and the execution of the preset algorithm may be performed by itself after the bluetooth beacon is started, without depending on other instructions, or may be performed by other means, such as separately setting a switch for performing security processing, and instructing the bluetooth beacon to execute or stop executing the preset algorithm.
The following description of embodiments of the present invention will be made more fully hereinafter with reference to the accompanying drawings, in which it is evident that the embodiments described below are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art without the inventive effort, are intended to be within the scope of the present invention, based on the following embodiments. The various embodiments described below and their technical features can be combined with each other without conflict.
Fig. 3 is a flowchart of a transmission method of bluetooth beacon data according to a second embodiment of the present invention. Fig. 3 shows a transmission method of bluetooth beacon data according to the embodiment of fig. 2. The transmission method includes the following steps S21 to S23.
S21: a preset algorithm is used to generate a unique tag for bluetooth beacon data.
S22: the unique tag and bluetooth beacon data are encapsulated in a broadcast packet.
S23: and sending the broadcast packet to a beacon receiving device through a wireless frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain Bluetooth beacon data, the beacon receiving device calculates a unique tag according to the obtained Bluetooth beacon data, if the calculated unique tag is consistent with the received unique tag, the received Bluetooth beacon data is real and is not tampered, and the method can also be regarded as authentication of the Bluetooth beacon data.
Bluetooth beacon data is essentially a string of numbers or characters, and the unique tag is the unique identity of the string of numbers or characters. .
The preset algorithm used for generating the unique tag can be symmetric encryption algorithm such as AES (Advanced Encryption Standard ) algorithm, DES (Data Encryption Standard, data encryption standard) algorithm and the like, or can be other asymmetric encryption algorithms.
The AES algorithm is exemplified below. The AES algorithm is also called as Rijndael encryption method, bluetooth beacon data can be regarded as an original matrix, and a secret key generated by the AES algorithm carries out corresponding operation on each byte in the original matrix, so that the unique tag is finally obtained.
Referring to fig. 4, the unique tag is transmitted over a radio frame as a new part of a PDU (protocol data unit) in a bluetooth low energy protocol broadcast, along with other fields such as a Preamble (Preamble), an access code (ACCESS ADDRESS), an original PDU (Protocol Data Unit ) (including bluetooth beacon data for generating the unique tag), and a CRC (Cyclic Redundancy Check ), etc. It should be noted that: the unique tag and the original PDU form a new PDU.
The position of the unique tag in the broadcast packet PDU, for example, the middle section or the rear section of the broadcast packet PDU, is not limited, and only needs to meet the actual transmission requirement.
The key employed by the preset algorithm of fig. 4 is known only to the desired beacon receiving device, except for the beacon transmitting device. When the expected beacon receiving device receives a broadcast packet sent by a bluetooth beacon, it generates a tag according to the received broadcast packet according to the step of generating the unique tag, that is, the beacon receiving device generates a tag according to the same preset algorithm, and if the generated tag is the same as the received unique tag, it indicates that the bluetooth beacon data has not been tampered with. This may also be considered as authentication of bluetooth beacon data.
Fig. 5 is a flowchart of a transmission method of bluetooth beacon data according to a third embodiment of the present invention. Fig. 5 shows another transmission method of bluetooth beacon data according to the embodiment of fig. 2. The transmission method includes the following steps S31 to S33.
S31: and encrypting the Bluetooth beacon data into ciphertext by adopting a preset algorithm.
S32: the ciphertext is encapsulated in a broadcast packet.
S33: and transmitting the broadcast packet to a beacon receiving device through a radio frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain Bluetooth beacon data.
In the foregoing embodiment, the bluetooth beacon data is a string of numerals or character strings displayed in a plain text form, which has a problem of low privacy. In this regard, in this embodiment, the plaintext is encrypted into ciphertext, and the preset algorithm used to generate the ciphertext may be an AES algorithm. The bluetooth beacon data can be regarded as an original matrix, and the secret key generated by the AES algorithm carries out corresponding operation on each byte in the original matrix, so that the ciphertext corresponding to the bluetooth beacon data is finally obtained.
The field lengths of the bluetooth beacon data in the ciphertext and plaintext form can be the same or different, and the specific requirement is determined according to the adopted preset algorithm.
Referring to fig. 6, the broadcast finally transmitted includes bluetooth beacon data expressed in ciphertext, and of course includes other fields, such as a preamble, an access code, other parts of a PDU, and CRC. The position of the ciphertext in the broadcast packet may be consistent with the position of the bluetooth beacon data that is originally expressed in a plaintext form in the broadcast packet.
The key employed by the preset algorithm of fig. 6 is known only to the desired beacon receiving device, except for the beacon transmitting device. After the plurality of beacon receiving devices receive the broadcast packet, only the expected beacon receiving device can successfully decrypt the ciphertext according to the reverse algorithm of the preset algorithm, thereby successfully obtaining the Bluetooth beacon data.
Other embodiments of the present invention may perform the aforementioned authentication and encryption operations on bluetooth beacon data simultaneously, resulting in another broadcast packet. Fig. 7 is a flowchart of a transmission method of bluetooth beacon data according to a fourth embodiment of the present invention. Referring to fig. 7, another method for transmitting bluetooth beacon data according to the embodiment of fig. 2 includes the following steps S41 to S43.
S41: encrypting the Bluetooth beacon data into ciphertext by adopting a preset algorithm, and generating a unique tag for the Bluetooth beacon data by adopting the preset algorithm, wherein the Bluetooth beacon data used for generating the unique tag can be data after encryption or data before encryption.
The unique tag may also be encrypted or unencrypted if generated with bluetooth beacon data prior to encryption.
S42: the unique tag and ciphertext are encapsulated in a broadcast packet.
S43: and transmitting the broadcast packet to a beacon receiving device through a radio frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain Bluetooth beacon data.
Based on this, referring to fig. 8, the finally transmitted broadcast includes not only bluetooth beacon data expressed in the form of ciphertext, but also a unique tag (which is a new part of PDU in bluetooth low energy protocol broadcast), and of course, other fields, such as preamble, access code, other parts of PDU, CRC, and the like. Wherein the positions of the ciphertext and the unique tag in the broadcast packet may be as described in the previous embodiments.
The key employed by the preset algorithm of fig. 8 is known only to the desired beacon receiving device, except for the beacon transmitting device. When the expected beacon receiving device receives a broadcast packet sent by a bluetooth beacon, it generates a tag according to the same preset algorithm, and if the generated tag is the same as the received unique tag, it indicates that the bluetooth beacon data has not been tampered with. And only after the expected beacon receiving device receives the broadcast packet, the expected beacon receiving device can decrypt the ciphertext according to the reverse algorithm of the preset algorithm, and then the Bluetooth beacon data can be successfully obtained.
Compared with the embodiments described in fig. 3 and fig. 5, the present embodiment is equivalent to setting two authentication procedures for the transmission of bluetooth beacon data, and has security measures of authentication and encryption, so that the use security of bluetooth beacons can be further improved.
Fig. 9 is a flowchart of a transmission method of bluetooth beacon data according to a fifth embodiment of the present invention. As shown in fig. 9, the transmission method includes the following steps S51 to S53.
S51: generating a dynamic variable, wherein the dynamic variable is a random variable or a variable which changes with time, the dynamic variable can be used as an initialization variable or a counter value in the encryption process, the Bluetooth beacon data is encrypted into ciphertext by using a preset algorithm and the dynamic variable, and a unique label is generated for the Bluetooth beacon data by using the preset algorithm. The bluetooth beacon data used to generate the unique tag may be data after encryption or prior to encryption. The unique tag may also be encrypted or unencrypted if generated with bluetooth beacon data prior to encryption.
S52: the dynamic variable, unique tag and ciphertext are encapsulated in a broadcast packet.
S53: and transmitting the broadcast packet to a beacon receiving device through a radio frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain Bluetooth beacon data.
The dynamic variable may be a number or a string of characters. The dynamic variable may be time-varying (in this case a time-varying variable) with some fixed period, or non-periodic (in this case a random variable, and a time-varying variable). The method of generating the dynamic variable is not limited in this embodiment, as long as the obtained dynamic variable is changed, and the number of field bits for generating the dynamic variable is also not limited, as long as the data transmission requirement can be satisfied.
In one embodiment, a random variable can be generated every hour, and the last two bits of the random variable 16 are used as dynamic variables; for another example, when generating bluetooth signal data, a random string of a fixed number of bits is generated, and the random string is used as a dynamic variable.
Referring to fig. 10, the broadcast finally transmitted by the bluetooth beacon includes a dynamic variable, bluetooth beacon data in ciphertext form, and a unique tag. Of course, as previously described, the broadcast packet also includes other fields such as a preamble, an access code, other PDU portions, and CRC. In addition, as two new components in the PDU: the dynamic variable and the unique tag are not limited in the position of the PDU, and only the actual transmission requirement is met.
It should be understood that in other embodiments of the present invention, the broadcast packet that the bluetooth beacon ultimately transmits may also include no unique tag, i.e., the broadcast packet may include no unique tag, but instead include the bluetooth beacon data in the form of dynamic variables, ciphertexts, and other fields as described above.
In a specific application scenario, according to the specification of the bluetooth protocol, the bluetooth device may generate a random address or an address that varies with time, that is, a broadcast device address, for external communication, without exposing its unique identity, and may set a period for replacing the random address. Therefore, for the bluetooth beacon, a dynamic variable may be generated according to the address of the broadcasting device, for example, a certain bit field of the address of the broadcasting device is used as the dynamic variable, or the address of the broadcasting device is subjected to mathematical operation or character string transformation with a certain rule to obtain the dynamic variable.
As shown in (a) of fig. 11, an embodiment of the present invention may use the entire broadcasting device address directly as a dynamic variable. It is understood that the total number of bits of the broadcaster address is directly the total number of bits of the dynamic variable, i.e. the broadcaster address is the dynamic variable.
As shown in fig. 11 (b), an embodiment of the present invention may use the entire broadcaster address as part of the dynamic variable. It is understood that the total number of bits of the broadcast device address is a fraction of the number of bits of the dynamic variable, and the number of bits of the broadcast device address is less than the number of bits of the dynamic variable.
As shown in (c) of fig. 11, an embodiment of the present invention may use a part of the address of the broadcasting device as the entire dynamic variable. It is understood that a part of the number of bits of the broadcasting device address is the total number of bits of the dynamic variable, and the number of bits of the broadcasting device address is greater than the number of bits of the dynamic variable.
As shown in (d) of fig. 11, an embodiment of the present invention may use a part of the address of the broadcasting device as a part of the dynamic variable. It will be understood that, the number of bits of the broadcasting device address is a part of the number of bits of the dynamic variable, where the number of bits of the broadcasting device address and the number of bits of the dynamic variable may be equal or unequal, and the embodiment is not limited.
In this embodiment, the bluetooth beacon converts bluetooth beacon data into time-varying dynamic data by using a dynamic variable and transmits the data, so that an unauthorized beacon receiving device cannot obtain real and stable bluetooth beacon data, thereby being beneficial to preventing the bluetooth beacon data from being illegally cloned, illegally tampered and illegally tracked, and improving the use security of the bluetooth beacon.
In addition, the dynamic variable is generated according to the original existing broadcasting equipment address, a random variable generation algorithm is not required to be additionally introduced, the calculation amount for generating the dynamic variable can be reduced, and the workload of the Bluetooth beacon is reduced.
Fig. 12 is a schematic diagram of a bluetooth beacon according to an embodiment of the invention. The bluetooth beacon 120 includes a processor 121 and a memory 122, the processor 121 and memory 122 may be coupled by a communication bus 123 for data or signal transmission.
The processor 121 is a control center of the bluetooth beacon 120, connects respective parts of the entire bluetooth beacon 120 using various interfaces and lines, and performs various functions of the bluetooth beacon 120 and processes data by running or loading programs stored in the memory 122 and calling data stored in the memory 122, thereby performing overall monitoring of the bluetooth beacon 120.
The processor 121 loads instructions corresponding to the processes of one or more programs into the memory 122 according to the following steps, and the processor 121 executes the programs stored in the memory 122, so as to implement one or more of the following functions:
carrying out safe processing on the Bluetooth beacon data by adopting a preset algorithm;
packaging the Bluetooth beacon data after the security processing in a broadcast packet; and
And transmitting the broadcast packet to a beacon receiving device through a radio frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain the Bluetooth beacon data.
The security processing is equivalent to adding an authentication operation to the bluetooth beacon data, and even if an unauthorized beacon receiving device receives a broadcast packet (namely a wireless broadcast signal) which encapsulates the bluetooth beacon data, the unauthorized beacon receiving device cannot learn a specific key adopted by the security processing, namely cannot learn a reverse algorithm of a preset algorithm and cannot pass the authentication, and certainly cannot take an adaptive measure to obtain the bluetooth beacon data, so that the bluetooth beacon data is prevented from being illegally cloned, illegally tampered and illegally tracked, and the use security of the bluetooth beacon can be improved.
The preset algorithm refers to an operation method for carrying out safe processing on Bluetooth beacon data, and the specific content of the preset algorithm is different in different safe processing modes. For example, if the security process is encryption, the preset algorithm refers to an encryption algorithm; for another example, if the security process is to generate a unique tag, the preset algorithm refers to a unique identifier or a unique ID generation algorithm; for another example, where the security process is to generate dynamic variables, the preset algorithm refers to an algorithm that generates dynamic variables. If the security process is a combination of the above multiple operation modes, the number of preset algorithms may be multiple, and each algorithm is an algorithm adopted by a corresponding operation mode.
For different security processing modes, the specific contents of the steps executed by the calling program of the processor 121 can be referred to the foregoing embodiments, and will not be described in detail herein.
It should be understood that, when implemented in an actual application scenario, the execution subject of the above steps may be implemented by other modules and units, not the processor 121 and the memory 122, respectively, according to the type of the beacon transmission device to which the bluetooth beacon 120 belongs.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the various methods of the above embodiments may be performed by instructions or by controlling associated hardware, which may be stored on a readable storage medium and loaded and executed by a processor. To this end, an embodiment of the present invention provides a readable storage medium having stored therein a plurality of instructions that can be loaded by a processor to perform one or more steps of any one of the methods for transmitting bluetooth beacon data provided by the embodiments of the present invention.
The readable storage medium may include a Read Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, an optical disk, or the like.
The steps in any one of the methods for transmitting bluetooth beacon data provided by the embodiments of the present invention may be executed due to the instructions stored in the readable storage medium, so that the beneficial effects that any one of the methods for transmitting bluetooth beacon data provided by the embodiments of the present invention may be achieved can be achieved, which are detailed in the previous embodiments and are not described herein.
Although the invention has been shown and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art based upon a reading and understanding of this specification and the annexed drawings. The present invention includes all such modifications and alterations and is limited by the scope of the following claims. In particular regard to the various functions performed by the above described components, the terms used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., that is functionally equivalent), even though not structurally equivalent to the disclosed structure which performs the function in the herein illustrated exemplary implementations of the specification.
That is, the foregoing embodiments of the present invention are not limited to the scope of the invention, and all equivalent structural changes, such as the combination of technical features of the embodiments, or the direct or indirect application in other related technical fields, are included in the scope of the present invention.
Furthermore, in the description of the foregoing embodiments, the terms "first" and "second" are used for descriptive purposes only and are not to be interpreted as indicating or implying a relative importance or an implicit indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more features. In the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.

Claims (4)

1. A method for transmitting bluetooth beacon data, comprising:
The method comprises the steps of taking a dynamic variable as an initialization variable or a counter value in an encryption process, encrypting Bluetooth beacon data into ciphertext by using a preset algorithm and the dynamic variable, and generating a unique tag for the Bluetooth beacon data by adopting the preset algorithm; the broadcasting equipment address is a random address or a time-varying address, and the dynamic variable is a random variable or a time-varying variable; the dynamic variable is the broadcast device address, or a portion of the dynamic variable is a portion of the broadcast device address;
Encapsulating the dynamic variable, the unique tag and the ciphertext in a broadcast packet;
and transmitting the broadcast packet to a beacon receiving device through a radio frame, wherein the beacon receiving device is used for receiving the broadcast packet and analyzing to obtain the Bluetooth beacon data.
2. The transmission method of bluetooth beacon data according to claim 1, wherein the preset algorithm comprises an advanced encryption standard AES algorithm.
3. A bluetooth beacon comprising a memory and a processor, the memory storing a program for execution by the processor to perform one or more steps in the method of transmitting bluetooth beacon data according to any one of claims 1 to 2.
4. A readable storage medium storing a program for execution by a processor to perform one or more steps in a method of transmitting bluetooth beacon data according to any of the preceding claims 1-2.
CN202010428264.2A 2020-05-20 2020-05-20 Bluetooth beacon, data transmission method thereof, and readable storage medium Active CN111818492B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010428264.2A CN111818492B (en) 2020-05-20 2020-05-20 Bluetooth beacon, data transmission method thereof, and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010428264.2A CN111818492B (en) 2020-05-20 2020-05-20 Bluetooth beacon, data transmission method thereof, and readable storage medium

Publications (2)

Publication Number Publication Date
CN111818492A CN111818492A (en) 2020-10-23
CN111818492B true CN111818492B (en) 2024-05-24

Family

ID=72848660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010428264.2A Active CN111818492B (en) 2020-05-20 2020-05-20 Bluetooth beacon, data transmission method thereof, and readable storage medium

Country Status (1)

Country Link
CN (1) CN111818492B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112911569A (en) * 2021-03-15 2021-06-04 苏宁智能终端有限公司 Rope skipping data transmission method, rope skipping data receiving method, rope skipping and terminal
CN115134793A (en) * 2022-06-21 2022-09-30 北京百度网讯科技有限公司 Data processing method, device, equipment and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262334A (en) * 2008-04-17 2008-09-10 中国人民解放军海军工程大学 Bluetooth data transmission encryption method
CN103309808A (en) * 2013-06-13 2013-09-18 中国科学院信息工程研究所 Label-based black box detection method and system for privacy disclosure of Android user
CN103621049A (en) * 2011-04-19 2014-03-05 施耐德电气It公司 System and method for automatically addressing devices in multi-drop network
CN104218976A (en) * 2013-06-03 2014-12-17 飞比特公司 Self-adaptive data transmission using Bluetooth
CN104247369A (en) * 2012-02-22 2014-12-24 高通股份有限公司 Method and equipment for blurring equipment tags
WO2015061673A1 (en) * 2013-10-25 2015-04-30 Roximity, Inc. Beacon security
CN106971482A (en) * 2017-04-14 2017-07-21 成都流浪科技有限公司 A kind of real-time intelligent anti-theft magnetic snap system based on low-power consumption bluetooth
CN107231627A (en) * 2017-08-10 2017-10-03 乐鑫信息科技(上海)有限公司 A kind of blueteeth network and with network method
CN107358087A (en) * 2017-07-07 2017-11-17 北京海泰方圆科技股份有限公司 Information storage means and device for the Bluetooth chip of Bluetooth identities authentication device
CN107666661A (en) * 2017-09-05 2018-02-06 重庆慧联无限科技有限公司 False proof bluetooth with sound detection function sends equipment
CN107835506A (en) * 2017-10-26 2018-03-23 努比亚技术有限公司 A kind of Bluetooth communication method, bluetooth equipment and computer-readable recording medium
CN110049489A (en) * 2014-06-05 2019-07-23 阿里巴巴集团控股有限公司 Transmit the method and device of bootstrap information

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180249312A1 (en) * 2018-03-22 2018-08-30 Byung Mun Roh Mobile Device as a Form of Identification via Bluetooth

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262334A (en) * 2008-04-17 2008-09-10 中国人民解放军海军工程大学 Bluetooth data transmission encryption method
CN103621049A (en) * 2011-04-19 2014-03-05 施耐德电气It公司 System and method for automatically addressing devices in multi-drop network
CN104247369A (en) * 2012-02-22 2014-12-24 高通股份有限公司 Method and equipment for blurring equipment tags
CN104218976A (en) * 2013-06-03 2014-12-17 飞比特公司 Self-adaptive data transmission using Bluetooth
CN103309808A (en) * 2013-06-13 2013-09-18 中国科学院信息工程研究所 Label-based black box detection method and system for privacy disclosure of Android user
WO2015061673A1 (en) * 2013-10-25 2015-04-30 Roximity, Inc. Beacon security
CN110049489A (en) * 2014-06-05 2019-07-23 阿里巴巴集团控股有限公司 Transmit the method and device of bootstrap information
CN106971482A (en) * 2017-04-14 2017-07-21 成都流浪科技有限公司 A kind of real-time intelligent anti-theft magnetic snap system based on low-power consumption bluetooth
CN107358087A (en) * 2017-07-07 2017-11-17 北京海泰方圆科技股份有限公司 Information storage means and device for the Bluetooth chip of Bluetooth identities authentication device
CN107231627A (en) * 2017-08-10 2017-10-03 乐鑫信息科技(上海)有限公司 A kind of blueteeth network and with network method
CN107666661A (en) * 2017-09-05 2018-02-06 重庆慧联无限科技有限公司 False proof bluetooth with sound detection function sends equipment
CN107835506A (en) * 2017-10-26 2018-03-23 努比亚技术有限公司 A kind of Bluetooth communication method, bluetooth equipment and computer-readable recording medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《基于蓝牙信标的室内位置服务系统设计》;蔡云骐;《中国优秀硕士学位论文全文数据库 信息科技辑》;20180316;全文 *

Also Published As

Publication number Publication date
CN111818492A (en) 2020-10-23

Similar Documents

Publication Publication Date Title
US10826707B2 (en) Privacy preserving tag
CN111245802B (en) Data transmission security control method, server and terminal
WO2021218088A1 (en) Communication data processing method and apparatus, and computer system and storage medium
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN104717198A (en) Updating software on a secure element
CN109194701B (en) Data processing method and device
CN113114654B (en) Terminal equipment access security authentication method, device and system
US10419212B2 (en) Methods, systems, apparatuses, and devices for securing network communications using multiple security protocols
CN108989309A (en) Encryption communication method and its encrypted communication device based on narrowband Internet of Things
CN111818492B (en) Bluetooth beacon, data transmission method thereof, and readable storage medium
CN109756451B (en) Information interaction method and device
CN113158218B (en) Data encryption method and device and data decryption method and device
CN116455572B (en) Data encryption method, device and equipment
Baek et al. Secure and lightweight authentication protocol for NFC tag based services
CN113795023B (en) Bluetooth data transmission encryption method based on chaotic sequence and packet encryption
Asaduzzaman et al. A security-aware near field communication architecture
JP6720558B2 (en) Information processing system and encryption communication method
CN103249035A (en) Wireless sensor network data encryption transmission method
CN113037760B (en) Message sending method and device
CN112910630B (en) Method and device for replacing expanded key
Rahnama et al. Securing RFID-based authentication systems using ParseKey+
US11363455B2 (en) Near field communication forum data exchange format (NDEF) messages with authenticated encryption
CN115242389A (en) Data confusion transmission method and system based on multi-level node network
CN113950049B (en) Quantum security method, system, device and medium of Internet of things based on SIM card
CN119814382B (en) Tag sharing method, system, electronic device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant