Abstract:
Systems and methods for generating and using ephemeral identifiers are provided. One example method includes determining, by one or more computing devices, a current time-count. The method includes determining, by the one or more computing devices, a time-modified identifier based at least in part on a static identifier and the current time-count. The method includes determining, by the one or more computing devices, an ephemeral identifier based at least in part on the time-modified identifier and a rotation key. One example system includes a plurality of beacon devices, at least one observing entity, and at least one verifying entity.
Abstract:
Systems and methods for generating and using ephemeral identifiers are provided. One example method includes determining, by one or more computing devices, a current time-count. The method includes determining, by the one or more computing devices, a time-modified identifier based at least in part on a static identifier and the current time-count. The method includes determining, by the one or more computing devices, an ephemeral identifier based at least in part on the time-modified identifier and a rotation key. One example system includes a plurality of beacon devices, at least one observing entity, and at least one verifying entity.
Abstract:
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon devices to detect the received signal strength indicator (“RSSI”) of beacon devices in proximity. Each servant beacon device transmits survey data packets comprising the RSSIs and hardware identifiers of proximate beacon devices to the master beacon device, which constructs a first virtual map of the mesh network. At a later time, each servant beacon device transmits authentication data packets, which are retransmitted, each retransmitting beacon inserting an RSSI and hardware identifier of the beacon device from which the authentication data packet was received, until they reach the master beacon device, which constructs a second virtual map of the mesh network. The master beacon device compares the first virtual map to the second virtual map to determine if the network is secure.
Abstract:
A beacon device establishes a network connection with a user computing device. The beacon device determines the received signal strength indicator of the user computing device (the “reverse RSSI”) and transmits it to the user computing device, which determines the received signal strength indicator (the “RSSI”) of the beacon device, and saves the RSSI with the reverse RSSI as a data pair. At a later time, the beacon device determines a subsequent reverse RSSI and transmits it to the user computing device, which determines a subsequent RSSI, and saves the subsequent RSSI with the subsequent reverse RSSI as a data pair. If the user computing device determines a correspondence in the changes of the RSSI values and reverse RSSI values in the two data pairs, a transaction between the two devices is allowed. If correspondence does not exist, then the user computing device terminates the network connection.
Abstract:
Methods, systems, and media for presenting requested content on public display devices are provided. In some implementations a method for presenting content on a display device is provided, the method comprising: receiving a request from a mobile device to present content, including image data, on a display device; receiving a graphical representation associated with a user; receiving location information associated with the mobile device; receiving display device information associated with display devices, including location information associated with that display device; selecting, without user input, a first display device on which to present the content based on the location information associated with the mobile device and the location information associated with each of the plurality of display devices; and in response to selecting the first display device, causing both the graphical representation associated with the user of the mobile device and the content to be presented by the first display device.
Abstract:
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon devices to detect the received signal strength indicator (“RSSI”) of beacon devices in proximity. Each servant beacon device transmits survey data packets comprising the RSSIs and hardware identifiers of proximate beacon devices to the master beacon device, which constructs a first virtual map of the mesh network. At a later time, each servant beacon device transmits authentication data packets, which are retransmitted, each retransmitting beacon inserting an RSSI and hardware identifier of the beacon device from which the authentication data packet was received, until they reach the master beacon device, which constructs a second virtual map of the mesh network. The master beacon device compares the first virtual map to the second virtual map to determine if the network is secure.
Abstract:
Systems and methods for generating and using ephemeral identifiers are provided. One example method includes determining, by one or more computing devices, a current time-count. The method includes determining, by the one or more computing devices, a time-modified identifier based at least in part on a static identifier and the current time-count. The method includes determining, by the one or more computing devices, an ephemeral identifier based at least in part on the time-modified identifier and a rotation key. One example system includes a plurality of beacon devices, at least one observing entity, and at least one verifying entity.
Abstract:
Methods, systems, and media for presenting requested content on public display devices are provided. In some implementations a method for presenting content on a display device is provided, the method comprising: receiving a request from a mobile device to present content, including image data, on a display device; receiving a graphical representation associated with a user; receiving location information associated with the mobile device; receiving display device information associated with display devices, including location information associated with that display device; selecting, without user input, a first display device on which to present the content based on the location information associated with the mobile device and the location information associated with each of the plurality of display devices; and in response to selecting the first display device, causing both the graphical representation associated with the user of the mobile device and the content to be presented by the first display device.
Abstract:
Systems and methods for generating and using ephemeral identifiers are provided. One example method includes determining, by one or more computing devices, a current time-count. The method includes determining, by the one or more computing devices, a time-modified identifier based at least in part on a static identifier and the current time-count. The method includes determining, by the one or more computing devices, an ephemeral identifier based at least in part on the time-modified identifier and a rotation key. One example system includes a plurality of beacon devices, at least one observing entity, and at least one verifying entity.
Abstract:
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon devices to detect the received signal strength indicator (“RSSI”) of beacon devices in proximity. Each servant beacon device transmits survey data packets comprising the RSSIs and hardware identifiers of proximate beacon devices to the master beacon device, which constructs a first virtual map of the mesh network. At a later time, each servant beacon device transmits authentication data packets, which are retransmitted, each retransmitting beacon inserting an RSSI and hardware identifier of the beacon device from which the authentication data packet was received, until they reach the master beacon device, which constructs a second virtual map of the mesh network. The master beacon device compares the first virtual map to the second virtual map to determine if the network is secure.