摘要 |
The methodology described herein provides a process of interaction between a Bluetooth beacon or other wireless beacon and a user-device. Embodiments of the method may allow the user-device to cryptographically verify the identity and provider of the beacon. Only if the user-device has a record of trust with the beacon provider may the beacon be considered trustworthy. The process may be automatic and may be convenient for the user who can then assess the trustworthiness of a beacon for further ad-hoc interaction without compromising the user-experience. This may be achieved without the need for a third-party, making it robust to situations where a user-device internet-connection is unavailable, unreliable or undesirable. |