`a2) Patent Application Publication co) Pub. No.: US 2002/0131445 A1
`Skubicet al. Sep. 19, 2002 (43) Pub. Date:
`
`
`
`US 20020131445A1
`
`(54) SYSTEM AND METHOD FOR ANONYMOUS
`BLUETOOTH DEVICES
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/252,828, filed on Nov.
`22, 2000.
`
`(76)
`
`Inventors: Janez Skubic, Hassclby (SE); Paul
`Dent, Pittsboro, NC (US); Nils
`Rydbeck, Cary, NC (US); Christian
`Gehrman, Lund (SE)
`
`Correspondence Address:
`JENKENS & GILCHRIST, P.C.
`1445 Ross Avenue, Suite 3200
`Dallas, TX 75202-2799 (US)
`
`Publication Classification
`(SV) Ute C07ccccscsssessstntsnsntntnsensete H04J 3/16
`(52) US. C1. ieee eee csseesseeeserennesesessnesaneenneess 370/465
`(67)
`ABSTRACT
`A method and apparatus for enabling anonymous commu-
`nications from a first Bluetooth device to a second Bluetooth
`device is disclosed wherein a temporary identification num-
`ber associated with the first Bluetooth device is obtained and
`used in transmissions from the first Bluetooth device to the
`
`21) device.Atemporary identification numberAppl. No.: 5 secon uelooth
`
`
`ppl
`09/802,09
`dBl
`h device. A
`temporary identificati
`b
`provides no clear indication of the particular Bluetooth
`communications device transmitting messages.
`
`
`
`
`
`(22)
`
`Filed:
`
`Mar. 7, 2001
`
` Generate Temporary ID
`
` Transmit Temporary ID
`
`Responsive to Request
`
`Google Exhibit 1010
`Google Exhibit 1010
`Google v. SecCommTech
`Google v. SecCommTech
`
`
`
`Patent Application Publication
`
`Sep. 19,2002 Sheet 1 of 6
`
`US 2002/0131445 Al
`
`LSB
`
`Company_Assigned
`
`MSB
`
`
`
`
`
`
`
`
` 24 = Bits
`
`Ranlom
`
`Bits
`
`16 Bits
`
`Generate 32 Random Bits in LAP
`and UAP Fields
`
`Update Bits in LAP and UAP Fields
`as Necessary
`
`
`
`
`
`
`
`Inquiry Process
`
`FIG. 9
`
`137
`
`142
`
`143
`
`
`
`Patent Application Publication
`
`Sep. 19,2002 Sheet 2 of 6
`
`US 2002/0131445 Al
`
`Bluetooth
`Chi
`PAD
`
`1D
`Tobl
`aa
`
`25
`
`30
`
`Dh
`
`D
`Table
`
`Bluetooth
`Chi
`cio
`
`4,
`
`25
`
`30
`
`Bluetooth Device
`
`Algorithm
`
`Storage
`
`Storage
`
`Algorithm
`
`Generate Temporary |D
`
`
`
`
`
`Transmit Temporary |D
`Responsive to Request
`
`FIG. 3
`
`Generate Temporary ID
`
`Generate Access Code
`
`
`
`
`
`
`
`
`
`
`
`
`Transmit Temporary ID
`and Access Code
`Responsive to Request
`
`FIG. 4
`
`
`
`Patent Application Publication
`
`Sep. 19,2002 Sheet 3 of 6
`
`FIG. 5
`
`US 2002/0131445 Al
`Replace Temporary ID
`
`Establish Connection Using Random ID
`
`Y
`
`FIG. 6
`
`
`
`Patent Application Publication
`
`Sep. 19,2002 Sheet 4 of 6
`
`US 2002/0131445 Al
`
`
`_
`Ss 135
`140
`FIG. 7
`
`130
`
`Establish First Connection
`
`FIG. 10a
`
`Using Random ID
`
`
`FIG. 106
`
`
`
`Patent Application Publication
`
`Sep. 19,2002 Sheet 5 of 6
`
`US 2002/0131445 Al
`
`Request Temporary 'D
`
`
`
`
`Establish Communication
`Using Temporary |D
`
`
`
`
`185
`
`190
`
`FIG. 17
`
`
`
`
`
`
`
`Broadcast
`
`Identity Tokens
`
`Accept Token
`
`
`Establish Communication
`Using Token
`
`
`FIG. 12
`
`195
`
`205
`
`Store Multiple Identifiers
`
`210
`
`215
`
`220
`
`
`
`
`
`
`
`Establish Connection Using
`
`
`Randomly Selected Identifier
`
`
`Randomly Select
`
`Identifiers
`
`FIG. 13
`
`
`
`Patent Application Publication
`
`Sep. 19,2002 Sheet 6 of 6
`
`US 2002/0131445 Al
`
`
`
`
`
`
`Request Temporary ID from
`Independent Source
`
`Receive Temporary ID
`
`Establish Connection
`
`FIG. 14
`
`
`
`
`|
`
`Transmit Temporary !D
`
`
`with Inquiry
`
`
`
`Respond to Inquiry Using
`Temporary ID
`
`245
`
`FIG. 15
`
`
`
`US 2002/0131445 Al
`
`Sep. 19, 2002
`
`SYSTEM AND METHOD FOR ANONYMOUS
`BLUETOOTH DEVICES
`
`TECHNICAL FIELD
`
`[0001] The present invention relates to Bluetooth devices,
`and more particularly,
`to the enablement of anonymous
`communications between devices using the Bluetooth com-
`munications protocol.
`
`BACKGROUND OF THE INVENTION
`
`[0002] The Bluetooth communications protocol (Blue-
`tooth is a trademark of Telefonaktiebolaget LM Ericsson) is
`a wireless radio short
`range communications protocol
`enabling devices such as mobile telephones, computers and
`other electronic devices to communicate with each other
`
`over short ranges. When communicating using this protocol,
`a Bluetooth radio unit transmits over the wireless link a
`
`unique identity numberthat enables other devicesto identify
`and address the Bluetooth radio unit. While use of the unique
`identity numberis necessaryfor operation of units using the
`Bluetooth communications protocol, this requirement rep-
`resents a threat to the security and privacy of people that
`carry a Bluetooth device.
`
`the presence of a
`that
`[0003] This is duc to the fact
`Bluetooth device can be established through identification of
`its unique identity number. If someone can register the
`presence of a specific Bluetooth unit and has also been able
`to identify a particular individual using this device, this
`person may identify through the presence of the Bluetooth
`device that the specific person is present within a particular
`location. In some circumstances this type of identification
`procedure may be highly undesirable. Thus, the need has
`arisen for some method of interaction among Bluetooth
`devices that does not necessarily provide the identity of the
`Bluetooth device, and hence the individual using the device
`is not made readily available.
`
`SUMMARYOF‘THE INVENTION
`
`[0006] FIG. 1 illustrates the format of
`address;
`
`a Bluetooth
`
`{0007] FIG. 2 is a block diagram illustrating Bluetooth
`devices capable of anonymously communicating with each
`other;
`
`FIG.3 illustrates a first embodiment of a method
`[0008]
`for
`the anonymous communication between Bluetooth
`devices;
`
`FIG.4 illustrates an alternative embodiment of a
`[0009]
`method for communicating anonymously between Blue-
`tooth devices;
`
`([0010] FIG. 5 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`tooth devices;
`
`[0011] FIG. 6 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`tooth devices;
`
`FIG.7 illustrates a message transmitted between
`{0012]
`Bluetooth devices using the method of FIG. 5.
`
`[0013]
`address;
`
`FIG.8 illustrates a randomly generated Bluetooth
`
`[0014] FIG. 9 is a flow diagram illustrating one method
`for generating the random Bluetooth address of FIG.8.
`
`{0015] FIGS. 10A and 10B illustrate yet a further
`embodiment of a method for communicating anonymously
`between Bluetooth devices;
`
`(0016] FIG. 11 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`tooth devices;
`
`{0017] FIG. 12 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`tooth devices;
`
`{0018] FIG. 13 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`tooth devices;
`
`
`
`[0019] FIG. 14 illustrates yet a further embodiment of a
`method for communicating anonymously between Blue-
`[0004] The present invention overcomesthe foregoing and
`tooth devices; and
`other problems with a system and mcthod enabling anony-
`mous communications to take place betweenafirst Blue-
`[0020] FIG. 15 illustrates yet a further embodiment of a
`tooth communications device and a second Bluetooth com-
`method for communicating anonymously between Blue-
`munications device. In a first embodiment, a first Bluetooth
`tooth devices.
`communications device generates a temporary identification
`numberwhich is inserted within transmissionsfrom thefirst
`Bluetooth communications device to the second Bluetooth
`communications device. Other embodiments havethe first
`Bluetooth communications device utilizing randomly gen-
`erated identification numbers in order to first establish
`communications with the second Bluetooth communications
`
`device and then receiving a temporary identification number
`from the second Bluetooth device to support communica-
`tion.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0005] A more complete understanding of the method and
`apparatus of the present
`invention may be obtained by
`reference to the following Detailed Description when taken
`in conjunction with the accompanying Drawings wherein:
`
`DETAILED DESCRIPTION
`
`[0021] Referring now to the drawings, and more particu-
`larly to FIG. 1, where there is illustrated an example of a
`Bluetooth device address (BD_addr) according to the
`present format utilized within the Bluetooth communica-
`tions protocol. A Bluetooth device address has a length of 48
`bits. The LAP (lower address part) 2 and the UAP (upper
`address part) 4 form the significant portion of the BD_addr
`and is completed by the NAP (non-significant address part)
`6. The LAP consists of 24 bits, the UAP consists of 8 bits,
`and the NAP consists of 16 bits to provide the 48 bit address.
`
`[0022] The Bluetooth access code comprises thefirst part
`of each packet transmitted within the Bluetooth protocol.
`Some of the access codes used in Bluetooth are uniquely
`
`
`
`US 2002/0131445 Al
`
`Sep. 19, 2002
`
`determined by the LAP in the Bluetooth device address.
`There are four different types of access codes. The Channel
`Access Code (CAC)is derived from the Master’s LAP 2.
`The Device Access Code (DAC)is derived from the Slave’s
`LAP 2. The Inquiry Access Code (IAC) can be of two
`different forms but is derived from the special dedicated
`LAP values not related to any specific BD_addr.
`[0023] Thus, the CAC and DACcanbe used to track the
`location of a specific user. Furthermore, the entire Bluetooth
`address is sent in a special frequency hop synchronization
`(FHS) packet used on certain occasions. The frequency
`hopping scheme in Bluetooth is determined by a hopping
`sequence. The hopping sequence calculation uses different
`input parameters. For the connection state, the LAP and the
`at least four most significant bits in the UAP of the master
`device are used. For the page state, the LAP/UAP of the
`paged unit is used. This makesit theoretically possible to
`obtain information on the LAP and the four mostsignificant
`bits of the UAP based on the observed hopping scheme.
`Significant bits of the master device address in a connection
`may thus be revealed.
`there is illustrated a
`[0024] Referring now to FIG. 2,
`functional block diagram of a system providing anonymous
`Bluetooth communications betweena first Bluetooth device
`10 and a second Bluetooth device 15. Each of the Bluetooth
`
`devices include a Bluetooth chip 20 thereon for enabling
`Bluetooth communications between the first Bluetooth
`device 10 and the second Bluetooth device 15. A numberof
`
`structures and/or algorithms may be implemented within
`each of the Bluetooth chips 20 in order to provide the
`anonymous Bluetooth connection functionality of
`the
`present invention. However, it should be realized that only
`some of these algorithms and/orstructures are necessary for
`implementing the various embodiments described in FIGS.
`2-11, and it is not necessary for cach of the structures or
`algorithms to be present. Furthermore, the described algo-
`rithms and structures may be implemented outside of the
`Bluetooth chip 20, if desired.
`[0025] Each Bluetooth chip 20 includes an algorithm 25
`cnabling the gencration of a temporary identification number
`for a Bluetooth device 10, 15 each time the device sends out
`messages or responses including the identity numberof the
`Bluetooth device. The algorithm 25 for generating a tem-
`porary identification number maybebuilt into the Bluetooth
`chip 20 of a Bluetooth device 10, 15, downloadedinto the
`Bluetooth device 10, 15 or user selected. The particular
`algorithm 25 is not important for the process except to the
`extent of the security and privacy level provided by the
`algorithm. The algorithm 25 must generate a Bluetooth
`identification number which complies with existing and/or
`future identification number formats.
`
`[0026] The Bluetooth chip 20 may additionally include a
`storage area 30 for temporarily storing a temporary identi-
`fication numbergenerated by the algorithm 25. Furthermore,
`anidentification table 55 may be utilized wherein temporary
`identifiers for other Bluetooth devices 15 with which a
`
`Bluetooth device 10 is presently communicating may be
`stored. Finally, a normal fixed identification number 40 is
`stored or associated somewhere with the Bluetooth chip 20
`to be available for operations necessarily requiring the fixed
`identification number.
`
`[0027] As described previously with respect to the algo-
`rithm 25 of FIG. 2, a numberof algorithms may implement
`
`various methods for providing anonymous Bluetooth com-
`munications between a first Bluetooth device 10 and a
`second Bluetooth device 15. A variety of these methods are
`described with respect to FIGS. 3-15. Referring now to FIG.
`3, there is illustrated one embodiment wherein a Bluetooth
`device generates a temporary identification numberat step
`50. The generation of the temporaryidentification numberat
`step 50 may be done on a periodically recurring basis, at
`random time intervals or in response to each transaction
`between the first Bluetooth device 10 and the second Blue-
`tooth device 15. The Bluetooth device 10 transmits using the
`temporary identification numberat step 55 responsive to a
`received request for inquiry from a second Bluetooth device
`15.
`‘The temporary identification number can be stored
`within the temporary storage area 30 mentioned previously
`with respect to FIG. 2. The temporary identification number
`may also be changed during a transaction period. In this
`case, the Bluetooth devices will exchange the new identifi-
`cation numberor instructions on how to gencrate a tempo-
`rary identification number based upon knowledge of the
`existing identification number.
`[0028] Referring now to FIG. 4, there is illustrated an
`alternative embodiment wherein an access code is provided
`along with the temporary identification number responsive
`to a request between a first Bluetooth unit 10 and a second
`Bluetooth unit 15. As in the previous embodiment, the first
`Bluetooth device 10 generates at step 60 a temporary
`identification numberfor the first Bluetooth device 10. The
`first Bluetooth device 10 also generates at step 65 an access
`code including information about the format and category of
`the temporary identity number. Access codes currently
`defined in the Bluetooth specification may be used. The
`access codes provide for the possibility wherein another
`node can handle alternative ID formats. The node can
`
`generate alternative ID formats that may not fully comply to
`the standard specification using the access code. Responsive
`to an inquiry or request,
`the first Bluetooth device 10
`transmits at step 70 the temporary identification numberand
`the access code to a second Bluetooth device 15. The
`
`advantage of this methodis that it prepares for the possibility
`that
`the second Bluetooth device 10 handles alternative
`
`identification number formats that may not comply fully to
`astandard specification. This capability may not be desirable
`because it reduces general interoperability between units,
`but could be desirable in certain applications having high
`privacy requirements. The access codes currently defined
`within the Bluetooth specification (Bluetooth Special Inter-
`est Group, Specification of the Bluetooth System Version
`1.0B, Volumes 1 and 2, which is incorporated herein by
`reference) can be used for this purpose.
`[0029] Referring now to FIG. 5, there is illustrated yet
`anotheralternative embodimentof the methodof the present
`invention. In this embodiment, the first Bluetooth device 10
`initially generates at step 75 a random identification number.
`An inquiry for a particular service or class of device is
`transmitted from thefirst Bluetooth device 10 at step 80. The
`first Bluetooth device 10 receives at step 85 a number of
`replies lo ils inquiry. The first Bluetooth device 10 selects at
`step 90 the desired service or device responsive to the
`received inquiries and establishes a connection with a
`selected unit using the generated randomidentification num-
`ber as the Bluetooth identifier number. Uponthe selection of
`the service or device, the first Bluetooth device 10 transmits
`a request for a temporary identification numberat step 95 to
`
`
`
`US 2002/0131445 Al
`
`Sep. 19, 2002
`
`the second Bluetooth device 15 from whichit is requesting
`a service or device. The request still uses the random
`identification number as the Bluetooth identifier number.
`
`The first Bluetooth device 10 receives and uses a provided
`temporary identification numberat step 100 for the length of
`a transaction betweenthe first Bluetooth device 10 and the
`
`second Bluetooth device 15. At some point during or after
`the transaction, the first Bluetooth device 10 may end use of
`the temporary identification numberat step 105. This may be
`in response by the first Bluetooth device 10 to leaving the
`area or expiration of the temporary identification number
`after a predetermined period of time. If the temporary
`identification number expires during a transaction, a new
`temporary identification number may be obtained byrepeat-
`ing steps 75 through 100.
`
`[0030] Referring now to FIG. 6, there is illustrated yet
`another embodiment wherein the first Bluetooth device 10
`
`first establishes at step 110 a connection using a randomly
`selected identification number as the Bluetooth identifier
`number. Use of the random identification number enables
`
`establishment at step 115 of a connection using a temporary
`identification numberas the Bluetooth identifier number as
`described previously with respect to FIG. 5. Inquiry step
`120 monitors for expiration of the temporary identification
`number established at step 115 and upon expiration of the
`temporary identification number, the temporary identifica-
`tion numberis replaced at step 125. As shownin FIG.7, the
`period of time a temporary identification number may be
`active can be established in a message 130 transmitted from
`a second Bluetooth device 15 to a first Bluetooth device 10
`response to a request from the first Bluetooth device 10.
`Included within the message 130 would be the temporary
`identification number 135 and a message time 140 indicating
`the length of time the temporary identification number 135
`1S active.
`
`[0031] Referring now to FIGS.8 and9, there is illustrated
`one embodiment of a method for generating the random
`Bluetooth address referred to in FIGS. 5 and 6. This method
`utilizes short-lived Bluetooth addresses (BD_addr_active)
`which are chosen al random, but all uniis also include a
`long-lived Bluetooth address
`(BD_addr). The
`active
`address, BD_addr_active, includes the same NAP field 136
`as the BD_addr. The BD_addr_active addressis obtained by
`generating 32 random bits at step 137 when a Bluetooth
`module is powered up. The 32 random bits may be generated
`according to any method. These 32 random bits determine
`the LAP 138 and UAP 139 fields within the BD_addr_active
`address. The LAP 138 and UAP 1389fields are also periodi-
`cally updated at step 141 to resclect the 32 random bits.
`
`[0032] Once a random BD_addr_active address has been
`generated, the Inquiry process will proceed in the same
`fashion as currently designed within the Bluetooth specifi-
`cation at step 142 exceptthat the address used within an FHS
`(Frequency-hopping sequence) packet will comprise the
`BD_addr_active address. A first FHS packet will contain the
`BD_addr_active address of the master. Subsequent FHS
`packets may contain the BD_addrof the master transmitted
`in the clear or mayalternatively transmit the BD_addr ofthe
`master in an encrypted format with a certain anonymity unit
`key belonging to the slave. The paging procedure within the
`Bluetooth communications protocol will proceed according
`to the currently defined Bluetooth specification at step 143
`
`except that the access code (CAC and DAC),as well as the
`frequency-hopping scheme, are based upon the BD_ad-
`dr_active addresses.
`
`[0033] After an inquiry and page have been done between
`a master and slave units using the BD_addr_active
`addresses, the master unit does not know the BD addrof the
`slave and vice versa. Once a connection has been estab-
`
`lished, the master and slave units may perform a security
`pairing procedure to enable an encrypted connection to be
`established between the two units so that the BD_addr
`addresses for each unit may be exchanged.
`
`[0034] Referring now to FIGS. 10A and 10B,there is
`illustrated a further embodiment wherein a connection is
`
`establishedat step 145 using a random identification number
`from the first Bluetooth device 10. Once a connection
`between a first Bluetooth device 10 and a second Bluetooth
`device 15 is established using the random identification
`number, a security pairing may be performed between the
`two devices at step 150. As a result of the security pairing,
`the Bluetooth devices exchange at step 155 encrypted,
`non-temporary Bluetooth identification numbers and an
`index value. Each Bluetooth unit has its own separate index
`value.
`
`[0035] Later when the first and second Bluetooth devices
`wish to contact each other, a pseudo-random identification
`numberis generated at step 160 by the contacting Bluetooth
`device using the non-temporary identification number and
`the index value. The contacting Bluetooth device pages at
`step 165 the other Bluetooth device using the generated
`pseudo-random identification number. The contacting Blue-
`tooth device monitors for a response to the page at step 170.
`Upon receipt of a response to the page, a connection is
`established at step 180 between the Bluetooth devices. If no
`response is received, a connection may be established using
`another method at step 175,
`for example,
`the method
`described in FIG.5.
`
`[0036] Referring now to FIG. 11, there is illustrated an
`alternative embodiment wherein upon entry into communi-
`cation ofa first Bluetooth device 10 with a second Bluetooth
`device 15, the first Bluetooth device 10 requests at 185 a
`temporary identification number from the second Bluetooth
`device 15. Upon receipt of the temporary identification
`number from the second Bluetooth device 15,
`the first
`Bluetooth device 10 establishes communication with the
`second Bluetooth device 15 at step 190 using the provided
`temporary identification number.
`
`In the embodimentillustrated in FIG. 12,at least
`[0037]
`one Bluetooth device within the system broadcasts identity
`tokens at step 195. When a Bluetooth device desires to
`establish communication with another Bluetooth device, the
`device accepts an identity token at step 200 and establishes
`communications using the identity token at 205.
`
`[0038] Referring now to FIG. 13, there is illustrated yet
`another embodiment wherein a Bluetooth device 10 stores at
`
`step 210 multiple temporary identification numbers within,
`for example, the storage area 20 described in FIG. 1. Upon
`the need to establish a connection with a separate Bluetooth
`device 15, one of the multiple identification oumbers ts
`randomly selected at step 215. A connection may then be
`established at step 220 using the randomly selected identi-
`fication number.
`
`
`
`US 2002/0131445 Al
`
`Sep. 19, 2002
`
`[0039] Referring now to FIG. 14, there is illustrated yet
`another embodiment wherein a Bluetooth device requests a
`temporary identification number
`from an independent
`source at step 225. The requesting Bluetooth device receives
`at step 230 a temporary identification number from the
`independent source via, for example, a public wireless
`network or a Bluetooth connection. The Bluetooth device 10
`
`may then establish a connection at step 235 using the
`provided temporary identification number.
`Independent
`sources [rom which the Bluetooth device might receive the
`temporary identification number include, tor example, net-
`work server, wireless network server, Internet server, etc.
`
`8. The method of claim 2, further including the steps of
`generating an access code identifying a format of the tem-
`porary identification number.
`9. The method of claim 8, wherein the step of transmitting
`further includes transmitting information including the tem-
`porary identification number and the access code.
`10. The method of claim 1, further including the step of
`periodically obtaining a new temporary identification num-
`ber to be associated with the first device.
`
`11. The method of claim 1, wherein the step of obtaining
`further comprises the step of receiving a temporary identi-
`fication number from a source located remotely from the
`first device.
`
`[0040] Referring now finally to FIG. 15, there is illus-
`trated yet a further embodiment wherein inquiries and
`12. The method of claim 11, wherein the step of receiving
`communications transmitted fromafirst Bluetooth device 10
`further comprises the steps of:
`
`to a second Bluetooth device 240 include a temporary
`identification number with the inquiry or communication.
`The contacted Bluetooth device 15 responds to the inquiry
`using the provided temporary identification number at step
`245 without going through the process of generating or
`obtaining another temporary identification number.
`
`a
`[0041] Utilizing the above described embodiments,
`Bluetooth device is able to act as an anonymousentity
`enabling communications with other Bluetooth device with-
`out readily providing the identity of the communicating
`device or the user associated with the Bluetooth device. Any
`user identification may be done in a secure fashion on the
`application level independently of the Bluetooth identity.
`Thus, unauthorized individuals may not
`inappropriately
`determine whois using a particular Bluetooth device.
`
`[0042] The previous description is of a preferred embodi-
`ment for implementing the invention, and the scope of the
`invention should not necessarily be limited by this descrip-
`tion. The scope of the present inventionis instead defined by
`the following claims.
`
`Whatis claimedis:
`
`1. A method for enabling anonymous communications
`from a first device using Bluetooth communications proto-
`col, comprising the steps of:
`
`obtaining a temporary identification number for the first
`device; and
`
`transmitting information including the temporary identi-
`fication number from the first device.
`
`2. The method of claim 1, wherein the step of obtaining
`further comprises the step of generating the temporary
`identification numberat the first device.
`
`3. The method of claim 2, wherein the step of generating
`further comprises generating the temporary identification
`number using an algorithm.
`4. The method of claim 2, wherein the step of generating
`further comprises generating the temporary identification
`number at a Bluctooth chip within the first device.
`5. The method of claim 2, wherein the step of generating
`further comprises the step of generating the temporary
`identification number on a periodic basis.
`6. The method of claim 2, wherein the step of generating
`further comprises the step of generating the temporary
`identification number at random intervals.
`
`7. The method of claim 2, wherein the step of generating
`further comprises the step of generating the temporary
`identification number at a beginning of a transaction.
`
`
`
`requesting the temporary identification number from the
`remote source; and
`
`receiving the temporary identification number from the
`remote source responsive to the request.
`13. The method of claim 12, wherein the step of request-
`ing the temporary identification numberfurther includes the
`steps of:
`
`generating a random identification number at the first
`device; and
`
`using the random identification number within the request
`for the temporary identification number.
`14. The method of claim 13, wherein the step of gener-
`ating a random identification number comprises the step of
`randomly generating a portion of bits comprising a Blue-
`tooth address.
`
`15. The method of claim 14, further including the step of
`periodically regenerating the portion of the bits comprising
`the Bluetooth address.
`
`16. The method of claim 13, wherein the step of gener-
`ating a random identification number comprises the step of
`randomly generating 32 bits of the 48 bits of the Bluetooth
`addresses.
`
`17. The method of claim 13, wherein the step of gener-
`ating a random identification number comprises the step of
`randomly generating LAP and UAP fields of a Bluetooth
`address.
`
`18. The method of claim 11, wherein the step of receiving
`a temporaryidentification number further comprises recciv-
`ing an identity token for use as the temporary identification
`number broadcast from the remote source.
`
`19. The method of claim 18, wherein the identity token is
`substantially continuously broadcast.
`20. The method of claim 11, whercin the step of reeciving
`further comprises the step of receiving the temporaryiden-
`tification number responsive to an inquiry from the remote
`source.
`
`21. The method of claim 11, wherein the remote source
`comprises a non Bluetooth device.
`22. The method of claim 11, wherein the remote source
`comprises a Bluetooth device.
`23. The method of claim 1, wherein the step of obtaining
`further comprises the steps of:
`
`storing multiple temporary identification numbers within
`the first device; and
`
`
`
`US 2002/0131445 Al
`
`Sep. 19, 2002
`
`randomly selecting one of the multiple temporary identi-
`fication numbers as the temporary identification num-
`ber.
`
`33. A method for enabling anonymous communications
`between a first Bluetooth device and a second Bluetooth
`device, comprising the steps of:
`
`24. The method of claim 1, wherein the step of obtaining
`further comprises the steps of:
`
`gencrating a random identification number at the first
`Bluetooth device;
`
`establishing a first connection betweenthefirst device and
`a second device;
`
`exchanging data over the first connection betweenthefirst
`and the second devices; and
`
`generating the temporary identification number using the
`exchanged data.
`25. The method of claim 24, wherein the data comprises
`a non-lemporary identification number and an index value.
`26. A method for enabling anonymous communications
`between a first Bluetooth device and a second Bluetooth
`
`transmitting a request including the random identification
`number as a Bluetooth identification number to the
`second Bluetooth device;
`
`transmitting a response to the request including a tempo-
`rary identification number from the second Bluetooth
`device to the first Bluetooth device;
`
`establishing communications between the first and the
`second Bluetooth devices using the temporary identi-
`fication number as a Bluetooth identification number.
`
`34. A method for enabling anonymous communications
`between a first Bluetooth device and a second Bluetooth
`
`device, comprising the steps of:
`
`device, comprising the steps of:
`
`generating a temporary identification numberat the first
`Bluetooth device using an algorithm within the first
`Bluetooth device;
`
`inserting the temporary identification number as a Blue-
`tooth identification number into messages to be trans-
`mitted from the first Bluetooth device; and
`
`broadcasting an identity token from a location;
`
`receiving the identity token at the first Bluetooth device;
`and.
`
`transmitting messages from the first Bluetooth device to
`the second Bluetooth device including the identity
`token therein as a Bluetooth identification number.
`
`transmitting the messages from the first Bluetooth device
`to the second Bluetooth device.
`
`35. A method for enabling anonymous communications
`between a first Bluetooth device and a second Bluetooth
`
`27. The method of claim 26, wherein the step of gener-
`ating further comprises the step of generating the temporary
`identification number on a periodic basis.
`28. The method of claim 26, wherein the step of gener-
`ating further comprises the step of generating the temporary
`identification number at random intervals.
`
`29. The method of claim 26, wherein the step of gener-
`ating further comprises the step of generating the temporary
`identification number at a beginning of a transaction.
`30. The method of claim 26, further including the step of
`periodically obtaming a new temporary identification num-
`ber to be associated with the Bluetooth communications
`
`protocol.
`31. The method of claim 30, further including the step of
`inserting a period of time the temporary identification num-
`ber is valid into the message.
`32. A method for enabling anonymous communications
`between a first Bluetooth device and a second Bluetooth
`device, comprising the steps of:
`
`establishinga first connection betweenthefirst device and
`the second Bluetooth device;
`
`exchanging a non-temporary identification number and an
`index value over the first connection betweenthe first
`Bluctooth and the sccond Bluctooth devices;
`
`generating a temporary identification number using the
`non-temporary identification number and an index
`value; and
`
`establishing a connection between the first Bluetooth
`device and the second Bluetooth device using the
`temporary identification number as a Bluetooth identi-
`fication number.
`
`device, comprising the steps of:
`
`generating a Bluetooth address having randomly gener-
`ated LAP and UAP fields; and
`
`establishing a connection between the first Bluctooth
`device and the second Bluetooth device u



