throbber
as United States
`a2) Patent Application Publication co) Pub. No.: US 2002/0131445 A1
`Skubicet al. Sep. 19, 2002 (43) Pub. Date:
`
`
`
`US 20020131445A1
`
`(54) SYSTEM AND METHOD FOR ANONYMOUS
`BLUETOOTH DEVICES
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/252,828, filed on Nov.
`22, 2000.
`
`(76)
`
`Inventors: Janez Skubic, Hassclby (SE); Paul
`Dent, Pittsboro, NC (US); Nils
`Rydbeck, Cary, NC (US); Christian
`Gehrman, Lund (SE)
`
`Correspondence Address:
`JENKENS & GILCHRIST, P.C.
`1445 Ross Avenue, Suite 3200
`Dallas, TX 75202-2799 (US)
`
`Publication Classification
`(SV) Ute C07ccccscsssessstntsnsntntnsensete H04J 3/16
`(52) US. C1. ieee eee csseesseeeserennesesessnesaneenneess 370/465
`(67)
`ABSTRACT
`A method and apparatus for enabling anonymous commu-
`nications from a first Bluetooth device to a second Bluetooth
`device is disclosed wherein a temporary identification num-
`ber associated with the first Bluetooth device is obtained and
`used in transmissions from the first Bluetooth device to the
`
`21) device.Atemporary identification numberAppl. No.: 5 secon uelooth
`
`
`ppl
`09/802,09
`dBl
`h device. A
`temporary identificati
`b
`provides no clear indication of the particular Bluetooth
`communications device transmitting messages.
`
`
`
`
`
`(22)
`
`Filed:
`
`Mar. 7, 2001
`
` Generate Temporary ID
`
` Transmit Temporary ID
`
`Responsive to Request
`
`Google Exhibit 1010
`Google Exhibit 1010
`Google v. SecCommTech
`Google v. SecCommTech
`
`

`

`Patent Application Publication
`
`Sep. 19,2002 Sheet 1 of 6
`
`US 2002/0131445 Al
`
`LSB
`
`Company_Assigned
`
`MSB
`
`
`
`
`
`
`
`
` 24 = Bits
`
`Ranlom
`
`Bits
`
`16 Bits
`
`Generate 32 Random Bits in LAP
`and UAP Fields
`
`Update Bits in LAP and UAP Fields
`as Necessary
`
`
`
`
`
`
`
`Inquiry Process
`
`FIG. 9
`
`137
`
`142
`
`143
`
`

`

`Patent Application Publication
`
`Sep. 19,2002 Sheet 2 of 6
`
`US 2002/0131445 Al
`
`Bluetooth
`Chi
`PAD
`
`1D
`Tobl
`aa
`
`25
`
`30
`
`Dh
`
`D
`Table
`
`Bluetooth
`Chi
`cio
`
`4,
`
`25
`
`30
`
`Bluetooth Device
`
`Algorithm
`
`Storage
`
`Storage
`
`Algorithm
`
`Generate Temporary |D
`
`
`
`
`
`Transmit Temporary |D
`Responsive to Request
`
`FIG. 3
`
`Generate Temporary ID
`
`Generate Access Code
`
`
`
`
`
`
`
`
`
`
`
`
`Transmit Temporary ID
`and Access Code
`Responsive to Request
`
`FIG. 4
`
`

`

`Patent Application Publication
`
`Sep. 19,2002 Sheet 3 of 6
`
`FIG. 5
`
`US 2002/0131445 Al
`Replace Temporary ID
`
`Establish Connection Using Random ID
`
`Y
`
`FIG. 6
`
`

`

`Patent Application Publication
`
`Sep. 19,2002 Sheet 4 of 6
`
`US 2002/0131445 Al
`
`
`_
`Ss 135
`140
`FIG. 7
`
`130
`
`Establish First Connection
`
`FIG. 10a
`
`Using Random ID
`
`
`FIG. 106
`
`

`

`Patent Application Publication
`
`Sep. 19,2002 Sheet 5 of 6
`
`US 2002/0131445 Al
`
`Request Temporary 'D
`
`
`
`
`Establish Communication
`Using Temporary |D
`
`
`
`
`185
`
`190
`
`FIG. 17
`
`
`
`
`
`
`
`Broadcast
`
`Identity Tokens
`
`Accept Token
`
`
`Establish Communication
`Using Token
`
`
`FIG. 12
`
`195
`
`205
`
`Store Multiple Identifiers
`
`210
`
`215
`
`220
`
`
`
`
`
`
`
`Establish Connection Using
`
`
`Randomly Selected Identifier
`
`
`Randomly Select
`
`Identifiers
`
`FIG. 13
`
`

`

`Patent Application Publication
`
`Sep. 19,2002 Sheet 6 of 6
`
`US 2002/0131445 Al
`
`
`
`
`
`
`Request Temporary ID from
`Independent Source
`
`Receive Temporary ID
`
`Establish Connection
`
`FIG. 14
`
`
`
`
`|
`
`Transmit Temporary !D
`
`
`with Inquiry
`
`
`
`Respond to Inquiry Using
`Temporary ID
`
`245
`
`FIG. 15
`
`

`

`US 2002/0131445 Al
`
`Sep. 19, 2002
`
`SYSTEM AND METHOD FOR ANONYMOUS
`BLUETOOTH DEVICES
`
`TECHNICAL FIELD
`
`[0001] The present invention relates to Bluetooth devices,
`and more particularly,
`to the enablement of anonymous
`communications between devices using the Bluetooth com-
`munications protocol.
`
`BACKGROUND OF THE INVENTION
`
`[0002] The Bluetooth communications protocol (Blue-
`tooth is a trademark of Telefonaktiebolaget LM Ericsson) is
`a wireless radio short
`range communications protocol
`enabling devices such as mobile telephones, computers and
`other electronic devices to communicate with each other
`
`over short ranges. When communicating using this protocol,
`a Bluetooth radio unit transmits over the wireless link a
`
`unique identity numberthat enables other devicesto identify
`and address the Bluetooth radio unit. While use of the unique
`identity numberis necessaryfor operation of units using the
`Bluetooth communications protocol, this requirement rep-
`resents a threat to the security and privacy of people that
`carry a Bluetooth device.
`
`the presence of a
`that
`[0003] This is duc to the fact
`Bluetooth device can be established through identification of
`its unique identity number. If someone can register the
`presence of a specific Bluetooth unit and has also been able
`to identify a particular individual using this device, this
`person may identify through the presence of the Bluetooth
`device that the specific person is present within a particular
`location. In some circumstances this type of identification
`procedure may be highly undesirable. Thus, the need has
`arisen for some method of interaction among Bluetooth
`devices that does not necessarily provide the identity of the
`Bluetooth device, and hence the individual using the device
`is not made readily available.
`
`SUMMARYOF‘THE INVENTION
`
`[0006] FIG. 1 illustrates the format of
`address;
`
`a Bluetooth
`
`{0007] FIG. 2 is a block diagram illustrating Bluetooth
`devices capable of anonymously communicating with each
`other;
`
`FIG.3 illustrates a first embodiment of a method
`[0008]
`for
`the anonymous communication between Bluetooth
`devices;
`
`FIG.4 illustrates an alternative embodiment of a
`[0009]
`method for communicating anonymously between Blue-
`tooth devices;
`
`([0010] FIG. 5 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`tooth devices;
`
`[0011] FIG. 6 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`tooth devices;
`
`FIG.7 illustrates a message transmitted between
`{0012]
`Bluetooth devices using the method of FIG. 5.
`
`[0013]
`address;
`
`FIG.8 illustrates a randomly generated Bluetooth
`
`[0014] FIG. 9 is a flow diagram illustrating one method
`for generating the random Bluetooth address of FIG.8.
`
`{0015] FIGS. 10A and 10B illustrate yet a further
`embodiment of a method for communicating anonymously
`between Bluetooth devices;
`
`(0016] FIG. 11 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`tooth devices;
`
`{0017] FIG. 12 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`tooth devices;
`
`{0018] FIG. 13 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`tooth devices;
`
`
`
`[0019] FIG. 14 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`[0004] The present invention overcomesthe foregoing and
`tooth devices; and
`other problems with a system and mcthod enabling anony-
`mous communications to take place betweenafirst Blue-
`[0020] FIG. 15 illustrates yet a further embodiment of a
`tooth communications device and a second Bluetooth com-
`method for communicating anonymously between Blue-
`munications device. In a first embodiment, a first Bluetooth
`tooth devices.
`communications device generates a temporary identification
`numberwhich is inserted within transmissionsfrom thefirst
`Bluetooth communications device to the second Bluetooth
`communications device. Other embodiments havethe first
`Bluetooth communications device utilizing randomly gen-
`erated identification numbers in order to first establish
`communications with the second Bluetooth communications
`
`device and then receiving a temporary identification number
`from the second Bluetooth device to support communica-
`tion.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0005] A more complete understanding of the method and
`apparatus of the present
`invention may be obtained by
`reference to the following Detailed Description when taken
`in conjunction with the accompanying Drawings wherein:
`
`DETAILED DESCRIPTION
`
`[0021] Referring now to the drawings, and more particu-
`larly to FIG. 1, where there is illustrated an example of a
`Bluetooth device address (BD_addr) according to the
`present format utilized within the Bluetooth communica-
`tions protocol. A Bluetooth device address has a length of 48
`bits. The LAP (lower address part) 2 and the UAP (upper
`address part) 4 form the significant portion of the BD_addr
`and is completed by the NAP (non-significant address part)
`6. The LAP consists of 24 bits, the UAP consists of 8 bits,
`and the NAP consists of 16 bits to provide the 48 bit address.
`
`[0022] The Bluetooth access code comprises thefirst part
`of each packet transmitted within the Bluetooth protocol.
`Some of the access codes used in Bluetooth are uniquely
`
`

`

`US 2002/0131445 Al
`
`Sep. 19, 2002
`
`determined by the LAP in the Bluetooth device address.
`There are four different types of access codes. The Channel
`Access Code (CAC)is derived from the Master’s LAP 2.
`The Device Access Code (DAC)is derived from the Slave’s
`LAP 2. The Inquiry Access Code (IAC) can be of two
`different forms but is derived from the special dedicated
`LAP values not related to any specific BD_addr.
`[0023] Thus, the CAC and DACcanbe used to track the
`location of a specific user. Furthermore, the entire Bluetooth
`address is sent in a special frequency hop synchronization
`(FHS) packet used on certain occasions. The frequency
`hopping scheme in Bluetooth is determined by a hopping
`sequence. The hopping sequence calculation uses different
`input parameters. For the connection state, the LAP and the
`at least four most significant bits in the UAP of the master
`device are used. For the page state, the LAP/UAP of the
`paged unit is used. This makesit theoretically possible to
`obtain information on the LAP and the four mostsignificant
`bits of the UAP based on the observed hopping scheme.
`Significant bits of the master device address in a connection
`may thus be revealed.
`there is illustrated a
`[0024] Referring now to FIG. 2,
`functional block diagram of a system providing anonymous
`Bluetooth communications betweena first Bluetooth device
`10 and a second Bluetooth device 15. Each of the Bluetooth
`
`devices include a Bluetooth chip 20 thereon for enabling
`Bluetooth communications between the first Bluetooth
`device 10 and the second Bluetooth device 15. A numberof
`
`structures and/or algorithms may be implemented within
`each of the Bluetooth chips 20 in order to provide the
`anonymous Bluetooth connection functionality of
`the
`present invention. However, it should be realized that only
`some of these algorithms and/orstructures are necessary for
`implementing the various embodiments described in FIGS.
`2-11, and it is not necessary for cach of the structures or
`algorithms to be present. Furthermore, the described algo-
`rithms and structures may be implemented outside of the
`Bluetooth chip 20, if desired.
`[0025] Each Bluetooth chip 20 includes an algorithm 25
`cnabling the gencration of a temporary identification number
`for a Bluetooth device 10, 15 each time the device sends out
`messages or responses including the identity numberof the
`Bluetooth device. The algorithm 25 for generating a tem-
`porary identification number maybebuilt into the Bluetooth
`chip 20 of a Bluetooth device 10, 15, downloadedinto the
`Bluetooth device 10, 15 or user selected. The particular
`algorithm 25 is not important for the process except to the
`extent of the security and privacy level provided by the
`algorithm. The algorithm 25 must generate a Bluetooth
`identification number which complies with existing and/or
`future identification number formats.
`
`[0026] The Bluetooth chip 20 may additionally include a
`storage area 30 for temporarily storing a temporary identi-
`fication numbergenerated by the algorithm 25. Furthermore,
`anidentification table 55 may be utilized wherein temporary
`identifiers for other Bluetooth devices 15 with which a
`
`Bluetooth device 10 is presently communicating may be
`stored. Finally, a normal fixed identification number 40 is
`stored or associated somewhere with the Bluetooth chip 20
`to be available for operations necessarily requiring the fixed
`identification number.
`
`[0027] As described previously with respect to the algo-
`rithm 25 of FIG. 2, a numberof algorithms may implement
`
`various methods for providing anonymous Bluetooth com-
`munications between a first Bluetooth device 10 and a
`second Bluetooth device 15. A variety of these methods are
`described with respect to FIGS. 3-15. Referring now to FIG.
`3, there is illustrated one embodiment wherein a Bluetooth
`device generates a temporary identification numberat step
`50. The generation of the temporaryidentification numberat
`step 50 may be done on a periodically recurring basis, at
`random time intervals or in response to each transaction
`between the first Bluetooth device 10 and the second Blue-
`tooth device 15. The Bluetooth device 10 transmits using the
`temporary identification numberat step 55 responsive to a
`received request for inquiry from a second Bluetooth device
`15.
`‘The temporary identification number can be stored
`within the temporary storage area 30 mentioned previously
`with respect to FIG. 2. The temporary identification number
`may also be changed during a transaction period. In this
`case, the Bluetooth devices will exchange the new identifi-
`cation numberor instructions on how to gencrate a tempo-
`rary identification number based upon knowledge of the
`existing identification number.
`[0028] Referring now to FIG. 4, there is illustrated an
`alternative embodiment wherein an access code is provided
`along with the temporary identification number responsive
`to a request between a first Bluetooth unit 10 and a second
`Bluetooth unit 15. As in the previous embodiment, the first
`Bluetooth device 10 generates at step 60 a temporary
`identification numberfor the first Bluetooth device 10. The
`first Bluetooth device 10 also generates at step 65 an access
`code including information about the format and category of
`the temporary identity number. Access codes currently
`defined in the Bluetooth specification may be used. The
`access codes provide for the possibility wherein another
`node can handle alternative ID formats. The node can
`
`generate alternative ID formats that may not fully comply to
`the standard specification using the access code. Responsive
`to an inquiry or request,
`the first Bluetooth device 10
`transmits at step 70 the temporary identification numberand
`the access code to a second Bluetooth device 15. The
`
`advantage of this methodis that it prepares for the possibility
`that
`the second Bluetooth device 10 handles alternative
`
`identification number formats that may not comply fully to
`astandard specification. This capability may not be desirable
`because it reduces general interoperability between units,
`but could be desirable in certain applications having high
`privacy requirements. The access codes currently defined
`within the Bluetooth specification (Bluetooth Special Inter-
`est Group, Specification of the Bluetooth System Version
`1.0B, Volumes 1 and 2, which is incorporated herein by
`reference) can be used for this purpose.
`[0029] Referring now to FIG. 5, there is illustrated yet
`anotheralternative embodimentof the methodof the present
`invention. In this embodiment, the first Bluetooth device 10
`initially generates at step 75 a random identification number.
`An inquiry for a particular service or class of device is
`transmitted from thefirst Bluetooth device 10 at step 80. The
`first Bluetooth device 10 receives at step 85 a number of
`replies lo ils inquiry. The first Bluetooth device 10 selects at
`step 90 the desired service or device responsive to the
`received inquiries and establishes a connection with a
`selected unit using the generated randomidentification num-
`ber as the Bluetooth identifier number. Uponthe selection of
`the service or device, the first Bluetooth device 10 transmits
`a request for a temporary identification numberat step 95 to
`
`

`

`US 2002/0131445 Al
`
`Sep. 19, 2002
`
`the second Bluetooth device 15 from whichit is requesting
`a service or device. The request still uses the random
`identification number as the Bluetooth identifier number.
`
`The first Bluetooth device 10 receives and uses a provided
`temporary identification numberat step 100 for the length of
`a transaction betweenthe first Bluetooth device 10 and the
`
`second Bluetooth device 15. At some point during or after
`the transaction, the first Bluetooth device 10 may end use of
`the temporary identification numberat step 105. This may be
`in response by the first Bluetooth device 10 to leaving the
`area or expiration of the temporary identification number
`after a predetermined period of time. If the temporary
`identification number expires during a transaction, a new
`temporary identification number may be obtained byrepeat-
`ing steps 75 through 100.
`
`[0030] Referring now to FIG. 6, there is illustrated yet
`another embodiment wherein the first Bluetooth device 10
`
`first establishes at step 110 a connection using a randomly
`selected identification number as the Bluetooth identifier
`number. Use of the random identification number enables
`
`establishment at step 115 of a connection using a temporary
`identification numberas the Bluetooth identifier number as
`described previously with respect to FIG. 5. Inquiry step
`120 monitors for expiration of the temporary identification
`number established at step 115 and upon expiration of the
`temporary identification number, the temporary identifica-
`tion numberis replaced at step 125. As shownin FIG.7, the
`period of time a temporary identification number may be
`active can be established in a message 130 transmitted from
`a second Bluetooth device 15 to a first Bluetooth device 10
`response to a request from the first Bluetooth device 10.
`Included within the message 130 would be the temporary
`identification number 135 and a message time 140 indicating
`the length of time the temporary identification number 135
`1S active.
`
`[0031] Referring now to FIGS.8 and9, there is illustrated
`one embodiment of a method for generating the random
`Bluetooth address referred to in FIGS. 5 and 6. This method
`utilizes short-lived Bluetooth addresses (BD_addr_active)
`which are chosen al random, but all uniis also include a
`long-lived Bluetooth address
`(BD_addr). The
`active
`address, BD_addr_active, includes the same NAP field 136
`as the BD_addr. The BD_addr_active addressis obtained by
`generating 32 random bits at step 137 when a Bluetooth
`module is powered up. The 32 random bits may be generated
`according to any method. These 32 random bits determine
`the LAP 138 and UAP 139 fields within the BD_addr_active
`address. The LAP 138 and UAP 1389fields are also periodi-
`cally updated at step 141 to resclect the 32 random bits.
`
`[0032] Once a random BD_addr_active address has been
`generated, the Inquiry process will proceed in the same
`fashion as currently designed within the Bluetooth specifi-
`cation at step 142 exceptthat the address used within an FHS
`(Frequency-hopping sequence) packet will comprise the
`BD_addr_active address. A first FHS packet will contain the
`BD_addr_active address of the master. Subsequent FHS
`packets may contain the BD_addrof the master transmitted
`in the clear or mayalternatively transmit the BD_addr ofthe
`master in an encrypted format with a certain anonymity unit
`key belonging to the slave. The paging procedure within the
`Bluetooth communications protocol will proceed according
`to the currently defined Bluetooth specification at step 143
`
`except that the access code (CAC and DAC),as well as the
`frequency-hopping scheme, are based upon the BD_ad-
`dr_active addresses.
`
`[0033] After an inquiry and page have been done between
`a master and slave units using the BD_addr_active
`addresses, the master unit does not know the BD addrof the
`slave and vice versa. Once a connection has been estab-
`
`lished, the master and slave units may perform a security
`pairing procedure to enable an encrypted connection to be
`established between the two units so that the BD_addr
`addresses for each unit may be exchanged.
`
`[0034] Referring now to FIGS. 10A and 10B,there is
`illustrated a further embodiment wherein a connection is
`
`establishedat step 145 using a random identification number
`from the first Bluetooth device 10. Once a connection
`between a first Bluetooth device 10 and a second Bluetooth
`device 15 is established using the random identification
`number, a security pairing may be performed between the
`two devices at step 150. As a result of the security pairing,
`the Bluetooth devices exchange at step 155 encrypted,
`non-temporary Bluetooth identification numbers and an
`index value. Each Bluetooth unit has its own separate index
`value.
`
`[0035] Later when the first and second Bluetooth devices
`wish to contact each other, a pseudo-random identification
`numberis generated at step 160 by the contacting Bluetooth
`device using the non-temporary identification number and
`the index value. The contacting Bluetooth device pages at
`step 165 the other Bluetooth device using the generated
`pseudo-random identification number. The contacting Blue-
`tooth device monitors for a response to the page at step 170.
`Upon receipt of a response to the page, a connection is
`established at step 180 between the Bluetooth devices. If no
`response is received, a connection may be established using
`another method at step 175,
`for example,
`the method
`described in FIG.5.
`
`[0036] Referring now to FIG. 11, there is illustrated an
`alternative embodiment wherein upon entry into communi-
`cation ofa first Bluetooth device 10 with a second Bluetooth
`device 15, the first Bluetooth device 10 requests at 185 a
`temporary identification number from the second Bluetooth
`device 15. Upon receipt of the temporary identification
`number from the second Bluetooth device 15,
`the first
`Bluetooth device 10 establishes communication with the
`second Bluetooth device 15 at step 190 using the provided
`temporary identification number.
`
`In the embodimentillustrated in FIG. 12,at least
`[0037]
`one Bluetooth device within the system broadcasts identity
`tokens at step 195. When a Bluetooth device desires to
`establish communication with another Bluetooth device, the
`device accepts an identity token at step 200 and establishes
`communications using the identity token at 205.
`
`[0038] Referring now to FIG. 13, there is illustrated yet
`another embodiment wherein a Bluetooth device 10 stores at
`
`step 210 multiple temporary identification numbers within,
`for example, the storage area 20 described in FIG. 1. Upon
`the need to establish a connection with a separate Bluetooth
`device 15, one of the multiple identification oumbers ts
`randomly selected at step 215. A connection may then be
`established at step 220 using the randomly selected identi-
`fication number.
`
`

`

`US 2002/0131445 Al
`
`Sep. 19, 2002
`
`[0039] Referring now to FIG. 14, there is illustrated yet
`another embodiment wherein a Bluetooth device requests a
`temporary identification number
`from an independent
`source at step 225. The requesting Bluetooth device receives
`at step 230 a temporary identification number from the
`independent source via, for example, a public wireless
`network or a Bluetooth connection. The Bluetooth device 10
`
`may then establish a connection at step 235 using the
`provided temporary identification number.
`Independent
`sources [rom which the Bluetooth device might receive the
`temporary identification number include, tor example, net-
`work server, wireless network server, Internet server, etc.
`
`8. The method of claim 2, further including the steps of
`generating an access code identifying a format of the tem-
`porary identification number.
`9. The method of claim 8, wherein the step of transmitting
`further includes transmitting information including the tem-
`porary identification number and the access code.
`10. The method of claim 1, further including the step of
`periodically obtaining a new temporary identification num-
`ber to be associated with the first device.
`
`11. The method of claim 1, wherein the step of obtaining
`further comprises the step of receiving a temporary identi-
`fication number from a source located remotely from the
`first device.
`
`[0040] Referring now finally to FIG. 15, there is illus-
`trated yet a further embodiment wherein inquiries and
`12. The method of claim 11, wherein the step of receiving
`communications transmitted fromafirst Bluetooth device 10
`further comprises the steps of:
`
`to a second Bluetooth device 240 include a temporary
`identification number with the inquiry or communication.
`The contacted Bluetooth device 15 responds to the inquiry
`using the provided temporary identification number at step
`245 without going through the process of generating or
`obtaining another temporary identification number.
`
`a
`[0041] Utilizing the above described embodiments,
`Bluetooth device is able to act as an anonymousentity
`enabling communications with other Bluetooth device with-
`out readily providing the identity of the communicating
`device or the user associated with the Bluetooth device. Any
`user identification may be done in a secure fashion on the
`application level independently of the Bluetooth identity.
`Thus, unauthorized individuals may not
`inappropriately
`determine whois using a particular Bluetooth device.
`
`[0042] The previous description is of a preferred embodi-
`ment for implementing the invention, and the scope of the
`invention should not necessarily be limited by this descrip-
`tion. The scope of the present inventionis instead defined by
`the following claims.
`
`Whatis claimedis:
`
`1. A method for enabling anonymous communications
`from a first device using Bluetooth communications proto-
`col, comprising the steps of:
`
`obtaining a temporary identification number for the first
`device; and
`
`transmitting information including the temporary identi-
`fication number from the first device.
`
`2. The method of claim 1, wherein the step of obtaining
`further comprises the step of generating the temporary
`identification numberat the first device.
`
`3. The method of claim 2, wherein the step of generating
`further comprises generating the temporary identification
`number using an algorithm.
`4. The method of claim 2, wherein the step of generating
`further comprises generating the temporary identification
`number at a Bluctooth chip within the first device.
`5. The method of claim 2, wherein the step of generating
`further comprises the step of generating the temporary
`identification number on a periodic basis.
`6. The method of claim 2, wherein the step of generating
`further comprises the step of generating the temporary
`identification number at random intervals.
`
`7. The method of claim 2, wherein the step of generating
`further comprises the step of generating the temporary
`identification number at a beginning of a transaction.
`
`
`
`requesting the temporary identification number from the
`remote source; and
`
`receiving the temporary identification number from the
`remote source responsive to the request.
`13. The method of claim 12, wherein the step of request-
`ing the temporary identification numberfurther includes the
`steps of:
`
`generating a random identification number at the first
`device; and
`
`using the random identification number within the request
`for the temporary identification number.
`14. The method of claim 13, wherein the step of gener-
`ating a random identification number comprises the step of
`randomly generating a portion of bits comprising a Blue-
`tooth address.
`
`15. The method of claim 14, further including the step of
`periodically regenerating the portion of the bits comprising
`the Bluetooth address.
`
`16. The method of claim 13, wherein the step of gener-
`ating a random identification number comprises the step of
`randomly generating 32 bits of the 48 bits of the Bluetooth
`addresses.
`
`17. The method of claim 13, wherein the step of gener-
`ating a random identification number comprises the step of
`randomly generating LAP and UAP fields of a Bluetooth
`address.
`
`18. The method of claim 11, wherein the step of receiving
`a temporaryidentification number further comprises recciv-
`ing an identity token for use as the temporary identification
`number broadcast from the remote source.
`
`19. The method of claim 18, wherein the identity token is
`substantially continuously broadcast.
`20. The method of claim 11, whercin the step of reeciving
`further comprises the step of receiving the temporaryiden-
`tification number responsive to an inquiry from the remote
`source.
`
`21. The method of claim 11, wherein the remote source
`comprises a non Bluetooth device.
`22. The method of claim 11, wherein the remote source
`comprises a Bluetooth device.
`23. The method of claim 1, wherein the step of obtaining
`further comprises the steps of:
`
`storing multiple temporary identification numbers within
`the first device; and
`
`

`

`US 2002/0131445 Al
`
`Sep. 19, 2002
`
`randomly selecting one of the multiple temporary identi-
`fication numbers as the temporary identification num-
`ber.
`
`33. A method for enabling anonymous communications
`between a first Bluetooth device and a second Bluetooth
`device, comprising the steps of:
`
`24. The method of claim 1, wherein the step of obtaining
`further comprises the steps of:
`
`gencrating a random identification number at the first
`Bluetooth device;
`
`establishing a first connection betweenthefirst device and
`a second device;
`
`exchanging data over the first connection betweenthefirst
`and the second devices; and
`
`generating the temporary identification number using the
`exchanged data.
`25. The method of claim 24, wherein the data comprises
`a non-lemporary identification number and an index value.
`26. A method for enabling anonymous communications
`between a first Bluetooth device and a second Bluetooth
`
`transmitting a request including the random identification
`number as a Bluetooth identification number to the
`second Bluetooth device;
`
`transmitting a response to the request including a tempo-
`rary identification number from the second Bluetooth
`device to the first Bluetooth device;
`
`establishing communications between the first and the
`second Bluetooth devices using the temporary identi-
`fication number as a Bluetooth identification number.
`
`34. A method for enabling anonymous communications
`between a first Bluetooth device and a second Bluetooth
`
`device, comprising the steps of:
`
`device, comprising the steps of:
`
`generating a temporary identification numberat the first
`Bluetooth device using an algorithm within the first
`Bluetooth device;
`
`inserting the temporary identification number as a Blue-
`tooth identification number into messages to be trans-
`mitted from the first Bluetooth device; and
`
`broadcasting an identity token from a location;
`
`receiving the identity token at the first Bluetooth device;
`and.
`
`transmitting messages from the first Bluetooth device to
`the second Bluetooth device including the identity
`token therein as a Bluetooth identification number.
`
`transmitting the messages from the first Bluetooth device
`to the second Bluetooth device.
`
`35. A method for enabling anonymous communications
`between a first Bluetooth device and a second Bluetooth
`
`27. The method of claim 26, wherein the step of gener-
`ating further comprises the step of generating the temporary
`identification number on a periodic basis.
`28. The method of claim 26, wherein the step of gener-
`ating further comprises the step of generating the temporary
`identification number at random intervals.
`
`29. The method of claim 26, wherein the step of gener-
`ating further comprises the step of generating the temporary
`identification number at a beginning of a transaction.
`30. The method of claim 26, further including the step of
`periodically obtaming a new temporary identification num-
`ber to be associated with the Bluetooth communications
`
`protocol.
`31. The method of claim 30, further including the step of
`inserting a period of time the temporary identification num-
`ber is valid into the message.
`32. A method for enabling anonymous communications
`between a first Bluetooth device and a second Bluetooth
`device, comprising the steps of:
`
`establishinga first connection betweenthefirst device and
`the second Bluetooth device;
`
`exchanging a non-temporary identification number and an
`index value over the first connection betweenthe first
`Bluctooth and the sccond Bluctooth devices;
`
`generating a temporary identification number using the
`non-temporary identification number and an index
`value; and
`
`establishing a connection between the first Bluetooth
`device and the second Bluetooth device using the
`temporary identification number as a Bluetooth identi-
`fication number.
`
`device, comprising the steps of:
`
`generating a Bluetooth address having randomly gener-
`ated LAP and UAP fields; and
`
`establishing a connection between the first Bluctooth
`device and the second Bluetooth device u

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket