18231566. OBFUSCATION IN PRIVACY BEACON simplified abstract (Apple Inc.)

From WikiPatents
Jump to navigation Jump to search

OBFUSCATION IN PRIVACY BEACON

Organization Name

Apple Inc.

Inventor(s)

Jarkko L. Kneckt of Los Gatos CA (US)

Debashis Dash of San Jose CA (US)

Elliot S. Briggs of Carmel CA (US)

Nisan Reuven of Rehovot (IL)

Qi Wang of Sunnyvale CA (US)

Sidharth R. Thakur of San Jose CA (US)

Su Khiong Yong of Palo Alto CA (US)

Yong Liu of Campbell CA (US)

Tianyu Wu of Monterey CA (US)

OBFUSCATION IN PRIVACY BEACON - A simplified explanation of the abstract

This abstract first appeared for US patent application 18231566 titled 'OBFUSCATION IN PRIVACY BEACON

Simplified Explanation

The patent application describes techniques for obfuscation in a privacy beacon. The method involves a first device receiving a beacon frame from a second communication device. The beacon frame includes a medium access control (MAC) header and an encrypted beacon frame field. The MAC header contains an obfuscated timing synchronization field (TSF).

To de-obfuscate the TSF, the first device selects a key based on information associated with the beacon frame. The TSF is then de-obfuscated using the key. The first device can also decrypt the encrypted beacon frame field based on information associated with the de-obfuscated TSF.

  • The first device receives a beacon frame from a second communication device.
  • The beacon frame includes a MAC header and an encrypted beacon frame field.
  • The MAC header contains an obfuscated TSF.
  • The first device selects a key to de-obfuscate the TSF based on information associated with the beacon frame.
  • The TSF is de-obfuscated using the key.
  • The first device decrypts the encrypted beacon frame field based on information associated with the de-obfuscated TSF.

Potential applications of this technology:

  • Privacy protection in wireless communication systems.
  • Secure transmission of beacon frames in IoT devices.
  • Obfuscation techniques for enhancing the security of wireless networks.

Problems solved by this technology:

  • Protects the privacy of beacon frame information.
  • Prevents unauthorized access to sensitive data in beacon frames.
  • Enhances the security of wireless communication systems.

Benefits of this technology:

  • Improved privacy and security in wireless networks.
  • Enhanced protection against eavesdropping and unauthorized access.
  • Efficient and effective obfuscation techniques for beacon frames.


Original Abstract Submitted

Techniques are disclosed for obfuscation in a privacy beacon. An example method includes the first device receiving, from a second communication device, a beacon frame comprising a medium access control (MAC) header and an encrypted beacon frame field, the MAC header comprising an obfuscated timing synchronization field (TSF). The first device can select a key for de-obfuscating the TSF based at least in part on information associated with the beacon frame. The first device can de-obfuscate the TSF based at least in part on the key. The first device can decrypt the encrypted beacon frame field of the beacon frame based at least in part on information associated with the de-obfuscated TSF.