Invented by Abilash Soundararajan, Michael Reid Tennefoss, Hewlett Packard Enterprise Development LP
The Hewlett Packard Enterprise Development LP invention works as followsIn some examples, electronic devices include a non-transitory medium that stores blockchain information. A processor computes a secure representation based on the blockchain data after applying a cryptographic algorithm. And a transmitter transmits a beacon containing the secure representation.
Background for Transmitting or Receiving Blockchain Information
The proliferation of network-enabled electronic devices, and the availability of new communication and data exchange technologies, have made possible new methods of device-to-device, device-to-user, and device-to-application interactions. Information can be collected from electronic devices directly, for example. Information can also be obtained from other sources, such as data about electronic devices, users, programs, products or other components that are associated with electronic devices.
The term “a” is used in the following disclosure. The term ‘a,? The plural form is also intended, unless it’s clear from the context. The term “includes” is also used. ?including,? ?comprises,? ?comprising,? ?have,? When used in this disclosure, the words ‘have’ or ‘having a’ indicate that certain elements are present. However, they do not exclude other elements. When used in this disclosure, it indicates the presence of certain elements but does not exclude the presence or addition other elements.
A ?constrained device? “A?constrained device? The device may have limited computing resources and/or power. Constrained devices are different from general-purpose computing devices, such as smartphones and tablet computers. “A constrained device can use wired communication (e.g. copper, coaxial cable and/or optical fibre communications) or wireless communications (e.g. radio frequency, infrared and/or ultrasonic and/or infrasonic).
As discussed below, in contexts that use blockchain technologies, a restricted device can be limited in its processing of a Blockchain. Below, we will explain the concept of a Blockchain.
Examples of constrained devices are sensors, actuators and cameras. Constrained devices may include, for example, devices that transmit data according to an advertising protocol using Bluetooth Low Energy or cellular technology. In general, an advertising protocol allows devices, like constrained devices, to advertise data that can be used in a specific way.
In certain examples, electronic devices, such as constrained device, can transmit data that is useful to initiate, automate and/or enhance interactions in a real world between entities (e.g. users, machines or programs). These data are referred to as “beacons”. A beacon is a packet of data, multiple packets of data, a signal and so on.
For example the information contained in a transmitter can be used to perform any of the following actions: purchasing products, getting further information about the product or its attributes; tracking inventory; obtaining healthcare services; detecting thefts, performing law-enforcement activities (e.g. a police officer can get information on a driver using the information from a beacon); purchasing insurance policies and so forth.
The authenticity and transmitted data of the beacon must be verified before using the data in order to avoid the ingestion or malicious, false, deceptive, or other untrustworthy data. Such untrustworthy data can be used to manipulate interactions or to get information that otherwise would not be available. Information transmitted via electronic devices is also susceptible to being copied, played back, or used maliciously by hackers.
According to some implementations, techniques or mechanisms can be provided to enable a device (such a restricted device) to send blockchain information in order to verify that the beacon transmitted is reliable.
In some cases, instead of transmitting the blockchain information (including the address of a wireless device), the electronic device could compute a secret number based on a cryptographic algorithm that would be sent to another device in order to get more information about the electronic device. The secret value represents the blockchain address and/or other blockchain information in a secure way. If a blockchain is used as an identity for entities (e.g. human users, machines or programs), then interactions between them can be protected. If the interactions are not secure (i.e. they do not occur over a secured connection), passive sniffers and other attacking devices could be able gather sensitive information about an organization or personal information. The interactions can be protected from unauthorized entities by using the secure representations of the blockchain addresses (and/or other blockchain information).
The information about the electronic device obtained as a result of the secure representation of blockchain information transmitted can be used for a variety of different interactions, such as those described above. “Information relating to electronic device” is used in this context. Information about a service or entity that is connected to the electronic device can be included. Information can be about an electronic device, for example. The information could also include information on a product that the electronic device has been attached to or is otherwise associated with. In the second example, an electronic device could include a tag that is attached to the product or, alternatively, it could be placed near the product. The ‘product’ can be a product that is to be sold in a retail setting, a product being demonstrated, if it is being transported or if the electronic device is placed near the item. The term “product” can be used to describe a retail product, a demonstration product, a transportable product, an artifact displayed in a museum or building, and so on. Equipment (e.g. surgical equipment) is being tracked. The product could be a car that was pulled over by an officer of the law, or a car for which insurance is being purchased.
In other examples, the information related to the electronic devices can also include information about the user associated with the device. The user could be the driver of a car that was pulled over and a policeman may want to know historical information about drivers (e.g. prior violations tickets, outstanding warrants etc.). Other examples include a user who wants to buy insurance. The information about the person can be used to determine the rate.
The information provided in the examples above can also include other information.
FIG. The block diagram 1 shows an example of a configuration that includes a device constrained 102 with a transmitter 104 that transmits a beacon. In FIG. 1, only one constrained device is shown. “Although only one constrained device 102 is shown in FIG.
Although a reference is made to an electronic device that is constrained, it should be noted that the techniques or mechanisms described in this disclosure can also apply to other types that are capable of transmitting information.
The beacon 106 may be transmitted using any combination of transmission technologies. For wireless constrained devices this includes Bluetooth, BLE (Broadband Low Energy), radio-frequency identification, cellular, 802.11 WiFi, Near Field Communication (NFC), LoRa (Low-Resistance Communication), Sigfox (Short-Range Communication), and others. In examples of wired constrained device usage, beacons may be transmitted via wired links.
The beacon 106 can broadcast information to nearby devices including the client device. ?Nearby? Nearby?
The client device 108 could be any computing device capable of receiving information wirelessly from the constrained electronic device 102 or via a wired connection from another wired device and is capable of communicating over a network. Client device 108 examples can include a smartphone or tablet computer, notebook computer, desktop computer, wearable device such as smart eyeglasses, head-mounted electronic devices, smart watches, etc. “A game appliance, home appliance, vehicle, or other electronic device
In FIG. In other cases, it is possible to have multiple client devices 108. Multiple client devices 108 may receive the beacons 106 from the restricted device 102. Different client devices may be assigned to different users. The client device 108, or multiple client devices can also receive beacons sent by multiple constrained devices.
In certain examples, the network can include a network of wireless devices that allow the client device to communicate wirelessly with other devices. The network 110 may also include a network wired to which the device 108 is wired. The network 110 may also include a wireless network as well as a wired one.
Blockchain technology is used to describe the information. A blockchain is a collection of distributed records (also known as “blocks”) The blocks are cryptographically linked together and secured in a distributed way. A blockchain is also a continuous, unbroken list of blocks. Blocks of the blockchain are distributed over a wide range of computing devices. Each block may include a variety of information including the transaction data for the transaction represented by that block, the timestamp and a reference back to an earlier block in the chain. New blocks are added to the Blockchain as new transactions take place. A blockchain (which is a distributed ledger of transactions) records the transactions between multiple entities in an auditable and permanent manner. “Once a block has been created, and its data recorded, it cannot be changed without altering subsequent blocks.Click here to view the patent on Google Patents.