SlideShare a Scribd company logo
1 of 12
Download to read offline
BLUETOOTH LOW ENERGY, BEACONS AND RETAIL
Announcements by Apple® and PayPal® have generated a frenzy and massive speculation
within the industry about how they will change retail payments.
Both certainly have the potential for disruption and new applications, but the reality is more
complex. This white paper explains the technology and some of the factors which will shape
their use and determine their eventual success.

Erik Vlugt
VP, Product Marketing
Twitter: @ErikVlugt

VERIFONE HEADQUARTERS
2099 Gateway Place, Suite 600, San Jose CA 95131
Phone 408.232.7800 • Fax 408.232.7811 • www.verifone.com

© 2013 VeriFone. All rights reserved. VeriFone and the VeriFone Logo are either trademarks or registered trademarks of VeriFone
in the United States and/or other countries. All other trademarks or brand names are the properties of their respective holders. All
features and specifications are subject to change without notice. Reproduction or posting of this document without prior VeriFone
approval is prohibited.
TABLE OF CONTENTS

Bluetooth Low Energy – the Background .............................................................................. 3
Beacons – the Underlying Technology .................................................................................. 4
PayPal Beacon ......................................................................................................................... 7
iOS7 .......................................................................................................................................... 7
Beacon Suppliers and Practical Issues .................................................................................. 8
Indoor Location and Mapping ................................................................................................10
Geofencing ..............................................................................................................................10
Proximity .................................................................................................................................10
Notification ..............................................................................................................................11
Limitations...............................................................................................................................11
Conclusion ..............................................................................................................................12

Page 2

October 23, 2013
BLUETOOTH LOW ENERGY, BEACONS AND RETAIL
BLUETOOTH LOW ENERGY – THE BACKGROUND
®

The specification for Bluetooth Smart, also known as Bluetooth low energy (BLE), was released in June
of 2010. Although bearing the Bluetooth name, it is a completely new specification, designed to enable
very low-power devices which can run for months or even years off small batteries such as coin cells. Its
®

history dates back to 2001, when Nokia attempted to have it selected as the core technology for the
IEEE 802.15.4 initiative for a low-power, short-range radio. The IEEE group chose the proposal that was
®

to become ZigBee , but the Nokia effort continued internally, eventually emerging as their Wibree
standard.
The Bluetooth SIG struggled for several years trying to find a way to reduce the overall power of classic
Bluetooth, and failed to reach a compromise that met the conflicting criteria for a truly low-power wireless
standard. When Nokia offered the SIG the Wibree standard as a basis for this next generation, low-power
solution in 2007, they used it as a starting point for what was to become BLE.
It is important to realize that BLE is an entirely new standard. It is effectively a “blank sheet of paper
design,” drawing on Nokia’s expertise, low-power radio techniques that had been developed by Nordic
Semiconductor for the ANT™+ standard and the input of most of the world’s leading experts in low-power
radio and protocols. The standards architects also took advantage of developments in wireless from the
previous decade, with the aim of achieving a cost/performance point that would enable a market of
hundreds of billions of accessory products. BLE’s connection with Bluetooth is that its design allows it to
be implemented as an increment to the existing Bluetooth chips that are in mobile phones, laptops and
tablets, sharing the same radio and a modified protocol stack. Although a new generation of chip is
required to run BLE, these became available at the same time as a reduction in process geometry,
meaning that these “dual-mode” chips are cheaper than the previous generation of single-mode Bluetooth
classic chips.
Although the chips in phones and tablets support both Bluetooth standards, BLE allows for the design of
single-mode chips for use in low cost, battery powered peripheral devices. These are far simpler chips,
which are increasingly highly integrated, containing the BLE radio, a processor running the BLE stack,
and an additional processor and memory to run an application. All that’s needed to turn these into
complete devices is the application code, a battery, a sensor and an enclosure.

Page 3

October 23, 2013
Since 2010, dual mode chips have been built into in an increasing number of smartphones, tablets and
®

®

laptops. Apple has incorporated them in all products since the iPhone 4s and iPad 3, they are in most
®

new Android™ phones and Nokia has included them within all of its Windows phones. Both Apple and
®

Google (Android) have released APIs for application developers. This has stimulated a renaissance in
®

hardware design, including crowd-funded projects on sites like Kickstarter , where the majority of shortrange wireless projects now use BLE.
BLE is already present in hundreds of millions of devices. That number is projected to increase by 1
billion additional devices each year for the next few years as smartphone and tablet penetration
increases.

BEACONS – THE UNDERLYING TECHNOLOGY
Since Bluetooth’s launch, various companies have looked at the possibility of using Bluetooth for
advertising – pushing information to phones when the phone comes within range of a fixed transmitter.
Although several companies exist within this area, it is an awkward experience that leverages classic
Bluetooth technology and it is poorly supported across phones. A major drawback is that classic
Bluetooth cannot broadcast messages to unfamiliar phones – instead it needs to identify the presence of
each individual phone and then send a targeted message. To prevent multiple messages appearing, the
transmitter needs to keep a log of which phones it has previously sent messages to, incurring a
considerable level of complexity and cost.
BLE changes this by including a range of broadcast advertising modes. These are fundamental to the
technology and used for the discovery and pairing process, essentially creating a much better user
experience when pairing & connecting. However, they can also be used for general, unacknowledged
advertisements that can be detected by any phone with its Bluetooth receiver turned on. It is this which
makes low cost Beacons possible.

PERIPHERALS AND CENTRALS
The BLE standard defines two types of devices – a Peripheral device, which is assumed to be a lowpower device that exposes state or information, and a Central device. The Central is usually either a
powered device, or one with significantly greater processing capability and a rechargeable battery, e.g. a
phone or tablet. Unlike classic Bluetooth, the Peripheral and Central are very asymmetric in their resource
needs, with the standard being designed to minimize the complexity, power requirements and costs of the
Peripheral. In most cases, a Peripheral device spends the majority of its life asleep, only waking when it
needs to send data.

Page 4

October 23, 2013
SCANNERS AND ADVERTISERS
Advertising is the first thing that BLE devices do when they’re turned on. A peripheral uses advertising
packets to broadcast information that any other BLE device within range can hear. To listen to these,
Central devices implement a Scanner mode, in which they listen for these advertisements. Both devices
move from an idle state to that of either an advertiser or a scanner.
The BLE standard divides the 2.4GHz spectrum into thirty-nine 2.0 MHz wide channels. Thirty-six of these
are reserved for data, only used by devices that have paired with each other. The remaining three
channels are used for advertisements. These three channels were specifically chosen to avoid the main
®

channels used by Wi-Fi access points, to minimize interference.
When a peripheral wants to broadcast, it starts an advertising event, where the same packet of
information is transmitted sequentially on each of the three advertising channels. Devices operating as
scanners will detect one of these, and pass the information it contains to the higher level protocol stack
and application.

ADVERTISING PACKETS
This is where we get to the value of the specification, at least as far as location and advertising is
concerned. Although the primary aim of advertising packets within the specification is to allow for the
discovery of devices and make a secure connection, they also permit small amounts of data to be
transmitted for any other device to hear. There are four different types of advertising packets defined, of
which three are of interest. These are:
•

Non-connectable Advertising, where a device transmits a string of data, but will not respond to any
request and cannot make a connection. This is the most common mode for beacons and can be
implemented using only a transmitter, with no receiver.

•

Discoverable Advertising is similar, but a scanning device can request more information. This
option allows a second packet of data to be sent to an application without the need to make a
connection. Discoverable advertising provides the ability to request more data. Although potentially
useful, most beacons would send information in a non-connectable advertisement packet directing a
central device to access further information from a secondary source, such as a website accessible
via a cellular or Wi-Fi link. Discoverable advertising cannot be used to initiate a connection.

•

General Advertising, where, in addition to the options above, a scanner can request that the beacon
make a connection, which may be short term or permanent.

•

There is a fourth mode, known as Directed Advertising, which is used to quickly re-establish a
previously negotiated connection. This is not relevant to beacons, and is not currently supported in
iOS7.

Page 5

October 23, 2013
Advertising packets consist of a header and a maximum of 27 bytes of advertising data. This can contain
multiple items, each grouped as a triplet of an identifying byte defining the data format, the length of the
contents, and the content. Defined formats include the signal strength, a local name, the Bluetooth
service, configuration flags and manufacturer specific information.

iBEACONS
Initially, one of the driving use cases for the development of BLE was proximity, which used a signal
strength measurement to determine when two devices move out of range of each other. Supported by
Nokia, this evolved into the Proximity profile. However, it is targeted at devices that have established a
connection, generating an alert when the link budget falls below a preset level. Despite having an
associated use case of location and positioning, efforts within the Bluetooth SIG to adopt a profile for this
application lost momentum. This has given a number of companies the opportunity to define their own
proprietary profiles. In July, these were largely made irrelevant when Apple announced its iBeacon

®

specification as part of iOS7, effectively discrediting any previous attempt to define a beacon profile.
Apple iBeacon defines four data elements or identifiers residing within the advertising packets of
compliant iBeacons. They are:
•

A Proximity ID, which is a unique 128bit string that identifies the beacon. This may be unique to
an iBeacon, but is more likely to relate to a store, or even chain of stores. Continuing that
example, within a store, individual iBeacons can be distinguished by:

•

Identifiers, a number of identifiers that could define a number of relevant location parameters
including department or even aisle.

•

The Transmitted Signal Strength. This is a Bluetooth defined advertising element, which can be
interpreted in conjunction with the signal strength to determine the approximate distance to the
beacon. The iBeacon specification classifies these into one of three categories - close,
intermediate or far away.
®

One of the best ways to think about an iBeacon packet is as a wireless QR code. The advantage of an
iBeacon packet, as we will see below, is that it can initiate an application response on an iOS7 phone,
without any user intervention.
An iBeacon transmits these packets on a regular basis, typically once per second. There is no reason
why it can’t transmit different packets of advertising data at different times, or alternate the content. More
complex applications may emerge as we start seeing actual implementations.

Page 6

October 23, 2013
PAYPAL BEACON
PayPal announced their PayPal Beacon shortly after Apple’s iBeacon announcement. It is a far more
sophisticated system than the one described by Apple. iBeacon only requires simple transmitters,
although the needs of installation and device management probably mean they will be more complex. In
contrast, the PayPal Beacon requires a connection with the smartphone, which is then authenticated by a
remote PayPal server. From the limited amount of released information, the process appears to be:
1. The PayPal Beacon advertises its presence, presumably using General Advertising packets. A
phone running the PayPal application then makes a secure connection to the PayPal Beacon and
identifies itself.
2. The PayPal Beacon also includes a Wi-Fi connection, which passes the phone details to a
PayPal server. This starts a secure end-to-end authentication with the phone. User data is
encrypted and passed back to the phone. This is used to check the user in to the store.
3. Once checked in, details of the authorized PayPal user are then passed to POS systems within
the store.
4. When the user goes to pay, they further “authenticate” themselves using:
a. A 4-digit randomly generated passcode that is sent to the phone and entered into the
payment device by the user
b. A QR code that is displayed on the phone, which can be scanned
c.

A picture the customer presents to the clerk who compares it with a stored profile picture

It is not clear whether PayPal intends to open up the protocol and apps to general application developers.
This may be unlikely as the system is 100 present focused on financial transactions at this time. However,
they are currently asking application developers to submit ideas.

iOS7
By itself, iBeacon is not particularly interesting. It is a very simple use of the BLE standard and many
companies have already announced similar beacons. What will provide the real impact, are the features
of iOS7.
In iOS7, Apple added a feature that permits a phone to scan and detect advertisements from iBeacons in
the background, passing up information and starting an application only when they are found. This has a
profound effect on the user experience. Once the app is loaded on the phone, it can remain dormant until
an appropriate iBeacon is discovered. iBeacon advertisements can be filtered and directed to specific
apps, or used to initiate actions within PassBook. All of this takes place with no user intervention and
minimal impact on battery life. It opens up the opportunity for “silent” apps that harvest user data and
Page 7

October 23, 2013
send it to a server for value-added analysis. However, although iOS7 enables background applications,
most application developers are likely to encourage users to interact with the apps, as they see the app
as their brand. This suggests there may be a divergence between shopping apps residing on the phone
and data-centric applications, which rely on real time server analysis.
Apple devices supporting BLE and iOS7 can themselves act as iBeacons. It remains to be seen what
applications may leverage this, but it is more likely in the social apps area.

BEACON SUPPLIERS AND PRACTICAL ISSUES
The concept of using BLE beacons to transmit coordinates or advertising messages is not new. It has
been publicized since the early days of the standard as a major potential application. As a result, a
number of companies have already grown up supplying this form of beacon, notably Estimote, Roximity,
and indoo.rs.

DEVICE MANAGEMENT
Introducing iBeacons into a retail environment poses two practical challenges:
•

How to install them, i.e. entering a unique set of information into each beacon? And

•

How to maintain them, particularly in terms of software updates

Both of these require a method of sending information to program or update the iBeacon. This can be
done manually, by plugging it into a commissioning tool – typically a laptop, or wirelessly using some form
of Over the Air (OTA) upgrade. Whatever the method, from the simplicity of a peer-2-peer connection
between beacon and commissioning tool, to a wider device management infrastructure, it needs to be
done securely.
There is currently no standardized way of doing this. It will be one way in which iBeacon manufacturers
differentiate their offering. However, for a large store, which might have hundreds or thousands of
iBeacons, it is a very serious consideration. It will have an impact on the price of the beacons and the
overall cost of ownership. The actual technology portion of a BLE iBeacon is low. The management
capability cost is likely to be significantly higher.
PayPal Beacon appears to have addressed this by incorporating a Wi-Fi backhaul for authentication,
which can also be used for updating and device management.

Page 8

October 23, 2013
PLACEMENT AND INTERFERENCE
BLE is designed to coexist with other transmitters in the 2.4GHz band, most notably Wi-Fi. iBeacons only
use the three advertising channels, which have been chosen specifically to avoid the standard Wi-Fi
channels. The transmissions are very short and robust to interference. However, careless installation next
to Wi-Fi access points will likely result in problems.
If iBeacons are positioned on metal shelves, or if the iBeacons are placed behind metal stands, there will
be a level of attenuation, which may result in inaccurate triangulation within apps that use them for
location. This is largely an education issue for installers and retailers, but needs to be addressed.
An additional challenge is posed for beacons that transmit a specific location and that need to be installed
at a predetermined, fixed location to allow a mapping application to triangulate with them.

SECURITY
Advertisements from BLE Beacons are not secure. By their nature they are open and can be read by any
device. As all of the data in the iBeacon is readable and is repeated in each consecutive transmission, it
is possible for hackers to capture and replay it, emulating the beacon either using their phone, or by
programming a small, low cost beacon placed elsewhere in the store. Sending incorrect or spurious
information is a lower risk. Unless it has meaning for the phone, it should be discarded by the application.
There will almost certainly be cases where this happens. Whether it will be destructive or a short term
nuisance is yet to be determined. PayPal has taken a more robust approach, where the Beacon is purely
the start of a complex security negotiation. This is not likely to be hacked, nor is it likely that it would be
disrupted by copies of beacons.

APPLICATIONS OF iBEACONS
The big question is, “What will iBeacons do for retail?” There are some obvious applications, which are
detailed below, along with some less obvious ones. All of them have the potential to change the way in
which consumers and retailers interact with each other.
Beacons will certainly have an impact on loyalty schemes, which now have the potential for microsegmentation. Once retailers can access the information from customers’ apps, it takes us into a world
that is no longer restricted to knowing what someone buys, but one in which retailers can see how they
buy.
Many of the application areas are similar, relying on the ability to detect the distance from a beacon. iOS7
provides features that can use this information in a number of different ways, hence applications can be
divided into some distinct, albeit closely related areas.

Page 9

October 23, 2013
INDOOR LOCATION AND MAPPING
The simplest application is indoor mapping. Here beacons provide location information, which a user app
can utilize to guide them through a store or indoor public space.
Nokia is taking a conventional approach, using advertisements that transmit standard location information
(lat, long and elevation). This works well with their existing Nokia Maps applications, effectively adding an
indoor element to an existing API.
Because this data is constant and fits an established industry, it can easily be used by developers to
generate other applications. As well as indoor guidance, it allows an app to save a breadcrumb trail of the
user’s path, which can be uploaded and analyzed, either to understand the user’s decision-making
process, or to validate the efficiency of the store layout.
Apple’s recent purchase of indoor mapping company WiFiSLAM, along with their internal mapping
solution, suggests they also have an eye on iBeacons for location.
By using multiple beacons, applications can triangulate to determine position more precisely. Although
technically feasible, the greater the accuracy, the more processing power is required, and the greater the
impact on battery life.

GEOFENCING
Geofencing is a special form of location, where devices use beacons to limit or check the area in which a
user is moving. Within iOS7 there is a geofencing function, where an application can instruct the device to
check whether it remains within a defined range of a beacon or set of beacons and then alert an
application if it moves outside that range. The advantage inferred by this is that the ranging function
operates in the background, consuming very little power until it detects that the geofencing parameters
have moved out of the defined range, at which point it alerts the application.
The specific use of this functionality is unclear but it could include route planning and monitoring
throughout a retail establishment.

PROXIMITY
Unlike the Bluetooth SIG and Nokia’s take on proximity, most beacon suppliers, including Apple, have a
simpler view, which is to detect when a central device comes within range of a beacon. This provides the
most straightforward customer engagement application, which is “Welcome to the store” or “Welcome to
the electronics department.”

Page 10

October 23, 2013
Writing an app to display a message on a phone is trivial and of very limited use. But the underlying alert
can trigger far more subtle interactions. This is the starting point of the PayPal beacon system, where the
user is signed into the store. While PayPal take a secure approach, with back-end authentication, it’s
easy to see other applications emerging which interact with data preloaded into a phone app, or accessed
via an alternative data link to download web or server based information. As the transmit power of
beacons can be turned down to enable a very low range, this can be very selective – down to a specific
area within a specific department.
As more Beacons are deployed, many with very limited range, the order in which they are detected
provides an accurate breadcrumb trail of how a consumer has progressed around a store. For
supermarkets, it gives information on how they have walked through the store, providing valuable
information on aisle usage. For department or clothing stores, it indicates how long users have stayed in
each section and how often they may have returned to the same point.
A hole in this argument is that the store only knows the routes of the user if they can access the beacon
data recorded on the phone, as the beacons themselves have no way of locating the phone. This implies
that the user has downloaded an application on their phone, which uploads their beacon trail to a server,
which runs analytics to make value decisions in real time. This real-time consumer data is the crown jewel
of beacon technology and will probably be fiercely fought over, as stores and third party applications vie
for the users’ attention and ownership of their data. Whoever manages to own it will be in possession of
data that will tell them not what consumers buy, but how they buy.

NOTIFICATION
So far, the applications of BLE only need simple transmit only beacons. Once beacons are connected to
a network to provide device management, they can potentially transmit alternative data in their advertising
packets to push messages or offers to previously identified users. While this is possible, it requires a
degree of real-time feedback and needs to be treated with care. As explained above, messages from
beacons can easily be picked up and replicated by others, so it is difficult to send an offer to a subgroup
of customers within the store. Individual promotions can be sent over an alternative network – either Wi-Fi
or cellular, but that complicates the applications and back-end delivery mechanism

LIMITATIONS
Much of the enthusiasm for beacons has been fueled by the fact that Apple has attempted to own the
initiative. The real innovation, as stated above, is not the beacon, but the background routines in iOS7
that allow Apple devices to interact with beacons with minimal power consumption.

Page 11

October 23, 2013
Android devices can support the same applications, but currently all of the scanning is performed by the
Android application. This takes considerably more power and is likely to be less convenient for
consumers. In time they will probably provide the same functionality, but in the short-to-medium term it
means that most innovation will happen around iPhones.
Nokia will add a BLE stack upgrade for their most recent phones, but have no timescale to provide a user
API. This is a third party stack and not a native Microsoft solution. It is being introduced as an interim
solution to prevent Nokia falling even further behind the market leaders in terms of BLE applications.
Presumably any of their beacon applications will remain proprietary until Microsoft releases its own
Windows Mobile solution.

CONCLUSION
Beacons and beacon applications are about to emerge in retail. How much of its success will be hype and
how much disruption it causes remains to be seen. What is apparent is that the Apple effect, coupled with
some innovative app developers and the availability of beacons from many companies provides all of the
ingredients for major innovation.
Retailers should keep a careful eye on this innovation as it can drive the opportunity for increased
customer engagement. BLE should be perceived as an exciting new enabling technology that has the
ability to affect many aspects of the retail customer experience. The applications for BLE will include
payments but BLE by itself it should not be viewed as a direct alternative to existing cards, NFC, EMV, or
other mobile wallet schemes. BLE can be the enabler for a number of new ways to interact and pay in the
store but it is unlikely to instantly replace any existing technology. Instead, it is likely to be positioned as a
complementary technology to add GPS-style and “check-in” functionality to new and existing payment
schemes.
With regard to payment, BLE makes store check-in and intelligent interaction much easier to implement.
The fundamental challenge with regard to the consumer authentication is not natively addressed by BLE,
which is why PayPal added the PIN and barcode authentication. Apple will likely look to Touch ID™ as a
technology to authenticate users as well.
As the enabler of commerce, VeriFone is happy to discuss BLE and related technologies with you to help
determine the best solution for your specific environment. Please contact your VeriFone representative
for more information.

Page 12

October 23, 2013

More Related Content

What's hot

LTE_Inbuilding_SWP
LTE_Inbuilding_SWPLTE_Inbuilding_SWP
LTE_Inbuilding_SWPBen O'Nolan
 
Future of the living room
Future of the living room Future of the living room
Future of the living room IMTC
 
Kaizen MLM - Wor(l)d Tecnology mCell 5G
Kaizen MLM - Wor(l)d Tecnology mCell 5GKaizen MLM - Wor(l)d Tecnology mCell 5G
Kaizen MLM - Wor(l)d Tecnology mCell 5GPablo Prieto
 
COMSovereign Holding Presentation FEB 2022
COMSovereign Holding Presentation FEB 2022COMSovereign Holding Presentation FEB 2022
COMSovereign Holding Presentation FEB 2022RedChip Companies, Inc.
 
Q1 2009 Earning Report of Atheros Communications
Q1 2009 Earning Report of Atheros CommunicationsQ1 2009 Earning Report of Atheros Communications
Q1 2009 Earning Report of Atheros Communicationsearningreport earningreport
 
Microsoft Telecommunications Industry News | April 2021
Microsoft Telecommunications Industry News | April 2021Microsoft Telecommunications Industry News | April 2021
Microsoft Telecommunications Industry News | April 2021Rick Lievano
 
Evolution of mobile technology
Evolution of mobile technology Evolution of mobile technology
Evolution of mobile technology Adnan Khan
 
Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Mah Khan
 
COMSovereign Holding Presentation Nov 2021
COMSovereign Holding Presentation Nov 2021COMSovereign Holding Presentation Nov 2021
COMSovereign Holding Presentation Nov 2021RedChip Companies, Inc.
 
Sk M Rezaul Karim 072899056
Sk M Rezaul Karim  072899056Sk M Rezaul Karim  072899056
Sk M Rezaul Karim 072899056mashiur
 
Seminar on bluetooth
Seminar on bluetoothSeminar on bluetooth
Seminar on bluetoothhinduyuva
 
Special Toptic on Smart Operations
Special Toptic on Smart OperationsSpecial Toptic on Smart Operations
Special Toptic on Smart OperationsSitha Sok
 
5 g communication
5 g communication5 g communication
5 g communicationBasil John
 
Disruptive Analysis LTE Summit 2011 voice presentation may 2011
Disruptive Analysis   LTE Summit 2011 voice presentation may 2011Disruptive Analysis   LTE Summit 2011 voice presentation may 2011
Disruptive Analysis LTE Summit 2011 voice presentation may 2011Dean Bubley
 
Reap the Benefits of 4G Over Satellite
Reap the Benefits of 4G Over SatelliteReap the Benefits of 4G Over Satellite
Reap the Benefits of 4G Over SatelliteST Engineering iDirect
 
2020 Vision: Twenty Years of Technology
2020 Vision: Twenty Years of Technology2020 Vision: Twenty Years of Technology
2020 Vision: Twenty Years of TechnologyWayne Caswell
 

What's hot (20)

LTE_Inbuilding_SWP
LTE_Inbuilding_SWPLTE_Inbuilding_SWP
LTE_Inbuilding_SWP
 
Future of the living room
Future of the living room Future of the living room
Future of the living room
 
Kaizen MLM - Wor(l)d Tecnology mCell 5G
Kaizen MLM - Wor(l)d Tecnology mCell 5GKaizen MLM - Wor(l)d Tecnology mCell 5G
Kaizen MLM - Wor(l)d Tecnology mCell 5G
 
COMSovereign Holding Presentation FEB 2022
COMSovereign Holding Presentation FEB 2022COMSovereign Holding Presentation FEB 2022
COMSovereign Holding Presentation FEB 2022
 
Q1 2009 Earning Report of Atheros Communications
Q1 2009 Earning Report of Atheros CommunicationsQ1 2009 Earning Report of Atheros Communications
Q1 2009 Earning Report of Atheros Communications
 
Microsoft Telecommunications Industry News | April 2021
Microsoft Telecommunications Industry News | April 2021Microsoft Telecommunications Industry News | April 2021
Microsoft Telecommunications Industry News | April 2021
 
Evolution of mobile technology
Evolution of mobile technology Evolution of mobile technology
Evolution of mobile technology
 
Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124
 
COMSovereign Holding Presentation Nov 2021
COMSovereign Holding Presentation Nov 2021COMSovereign Holding Presentation Nov 2021
COMSovereign Holding Presentation Nov 2021
 
Sk M Rezaul Karim 072899056
Sk M Rezaul Karim  072899056Sk M Rezaul Karim  072899056
Sk M Rezaul Karim 072899056
 
Goldi
GoldiGoldi
Goldi
 
Seminar on bluetooth
Seminar on bluetoothSeminar on bluetooth
Seminar on bluetooth
 
Smart Batteries
Smart BatteriesSmart Batteries
Smart Batteries
 
Special Toptic on Smart Operations
Special Toptic on Smart OperationsSpecial Toptic on Smart Operations
Special Toptic on Smart Operations
 
5 g communication
5 g communication5 g communication
5 g communication
 
Disruptive Analysis LTE Summit 2011 voice presentation may 2011
Disruptive Analysis   LTE Summit 2011 voice presentation may 2011Disruptive Analysis   LTE Summit 2011 voice presentation may 2011
Disruptive Analysis LTE Summit 2011 voice presentation may 2011
 
Goldi
GoldiGoldi
Goldi
 
Reap the Benefits of 4G Over Satellite
Reap the Benefits of 4G Over SatelliteReap the Benefits of 4G Over Satellite
Reap the Benefits of 4G Over Satellite
 
4G recommendation
4G recommendation4G recommendation
4G recommendation
 
2020 Vision: Twenty Years of Technology
2020 Vision: Twenty Years of Technology2020 Vision: Twenty Years of Technology
2020 Vision: Twenty Years of Technology
 

Similar to Bluetooth Low Energy, Beacons and Retail - A VeriFone White Paper

What Are The Advantages Of Bluetooth
What Are The Advantages Of BluetoothWhat Are The Advantages Of Bluetooth
What Are The Advantages Of BluetoothMiles Priar
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technologyNeha Jella
 
Bluetooth vs Wi-Fi comparison for IoT Solutions
Bluetooth vs Wi-Fi comparison for IoT SolutionsBluetooth vs Wi-Fi comparison for IoT Solutions
Bluetooth vs Wi-Fi comparison for IoT SolutionsRiyaz Lakhani
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationguest664c3f
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetoothKumar
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetoothmadhu428
 
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks
Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks Manas Rai
 
Bluetooth vs zigbee
Bluetooth vs zigbeeBluetooth vs zigbee
Bluetooth vs zigbeeaimenriyadh
 
IOT COMMUNICATION PROTOCOLS.pptx
IOT COMMUNICATION PROTOCOLS.pptxIOT COMMUNICATION PROTOCOLS.pptx
IOT COMMUNICATION PROTOCOLS.pptxIsmail Bajarla
 

Similar to Bluetooth Low Energy, Beacons and Retail - A VeriFone White Paper (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Intern_Report
Intern_ReportIntern_Report
Intern_Report
 
N045057376
N045057376N045057376
N045057376
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
What Are The Advantages Of Bluetooth
What Are The Advantages Of BluetoothWhat Are The Advantages Of Bluetooth
What Are The Advantages Of Bluetooth
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technology
 
Blutooth t.v
Blutooth t.vBlutooth t.v
Blutooth t.v
 
Bluetooth vs Wi-Fi comparison for IoT Solutions
Bluetooth vs Wi-Fi comparison for IoT SolutionsBluetooth vs Wi-Fi comparison for IoT Solutions
Bluetooth vs Wi-Fi comparison for IoT Solutions
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetooth
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetooth
 
Seminar
SeminarSeminar
Seminar
 
Bluetooth by vk
Bluetooth by vkBluetooth by vk
Bluetooth by vk
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks
Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks
 
Bluetooth1
Bluetooth1Bluetooth1
Bluetooth1
 
Bluetooth vs zigbee
Bluetooth vs zigbeeBluetooth vs zigbee
Bluetooth vs zigbee
 
Internet of things (io t) protocols
Internet of things (io t) protocolsInternet of things (io t) protocols
Internet of things (io t) protocols
 
IOT COMMUNICATION PROTOCOLS.pptx
IOT COMMUNICATION PROTOCOLS.pptxIOT COMMUNICATION PROTOCOLS.pptx
IOT COMMUNICATION PROTOCOLS.pptx
 
wibree
 wibree wibree
wibree
 

More from Verifone

Guiding Merchants to Success in the 21st Century
Guiding Merchants to Success in the 21st CenturyGuiding Merchants to Success in the 21st Century
Guiding Merchants to Success in the 21st CenturyVerifone
 
Paybook Vol. IX presented by Verifone
Paybook Vol. IX presented by VerifonePaybook Vol. IX presented by Verifone
Paybook Vol. IX presented by VerifoneVerifone
 
Verifone Q1 FY 2018 Results
Verifone Q1 FY 2018 Results Verifone Q1 FY 2018 Results
Verifone Q1 FY 2018 Results Verifone
 
Paybook presented by Verifone
Paybook presented by VerifonePaybook presented by Verifone
Paybook presented by VerifoneVerifone
 
Verifone Q4 FY17 Earnings Report
Verifone Q4 FY17 Earnings ReportVerifone Q4 FY17 Earnings Report
Verifone Q4 FY17 Earnings ReportVerifone
 
Helping Merchants Grow
Helping Merchants Grow Helping Merchants Grow
Helping Merchants Grow Verifone
 
Paybook Vol. 7 | October 2017
Paybook Vol. 7 | October 2017 Paybook Vol. 7 | October 2017
Paybook Vol. 7 | October 2017 Verifone
 
Verifone Q3 2017 Earnings
Verifone Q3 2017 EarningsVerifone Q3 2017 Earnings
Verifone Q3 2017 EarningsVerifone
 
Paybook Vol. 6 June 2017
Paybook Vol. 6 June 2017Paybook Vol. 6 June 2017
Paybook Vol. 6 June 2017Verifone
 
Guiding Merchants to Success in the 21st Century Survival Guide
Guiding Merchants to Success in the 21st Century Survival GuideGuiding Merchants to Success in the 21st Century Survival Guide
Guiding Merchants to Success in the 21st Century Survival GuideVerifone
 
Guiding Merchants to Success
Guiding Merchants to SuccessGuiding Merchants to Success
Guiding Merchants to SuccessVerifone
 
Verifone Q2 2017 Earnings
Verifone Q2 2017 EarningsVerifone Q2 2017 Earnings
Verifone Q2 2017 EarningsVerifone
 
21st Century Merchant Survival Guide US Edition
21st Century Merchant Survival Guide US Edition21st Century Merchant Survival Guide US Edition
21st Century Merchant Survival Guide US EditionVerifone
 
Paybook Vol. 5 May 2017
Paybook Vol. 5 May 2017Paybook Vol. 5 May 2017
Paybook Vol. 5 May 2017Verifone
 
Surviving the Retail Jungle
Surviving the Retail JungleSurviving the Retail Jungle
Surviving the Retail JungleVerifone
 
Verifone Q1 2017 Earnings
Verifone Q1 2017 EarningsVerifone Q1 2017 Earnings
Verifone Q1 2017 EarningsVerifone
 
Paybook Vol. 2 | July 2016
Paybook Vol. 2 | July 2016Paybook Vol. 2 | July 2016
Paybook Vol. 2 | July 2016Verifone
 
Paybook Vol. 4 | January 2017
Paybook Vol. 4 | January 2017Paybook Vol. 4 | January 2017
Paybook Vol. 4 | January 2017Verifone
 
Verifone Q4 2016 Earnings
Verifone Q4 2016 EarningsVerifone Q4 2016 Earnings
Verifone Q4 2016 EarningsVerifone
 
Paybook Vol. 3 | October 2016
Paybook Vol. 3 | October 2016Paybook Vol. 3 | October 2016
Paybook Vol. 3 | October 2016Verifone
 

More from Verifone (20)

Guiding Merchants to Success in the 21st Century
Guiding Merchants to Success in the 21st CenturyGuiding Merchants to Success in the 21st Century
Guiding Merchants to Success in the 21st Century
 
Paybook Vol. IX presented by Verifone
Paybook Vol. IX presented by VerifonePaybook Vol. IX presented by Verifone
Paybook Vol. IX presented by Verifone
 
Verifone Q1 FY 2018 Results
Verifone Q1 FY 2018 Results Verifone Q1 FY 2018 Results
Verifone Q1 FY 2018 Results
 
Paybook presented by Verifone
Paybook presented by VerifonePaybook presented by Verifone
Paybook presented by Verifone
 
Verifone Q4 FY17 Earnings Report
Verifone Q4 FY17 Earnings ReportVerifone Q4 FY17 Earnings Report
Verifone Q4 FY17 Earnings Report
 
Helping Merchants Grow
Helping Merchants Grow Helping Merchants Grow
Helping Merchants Grow
 
Paybook Vol. 7 | October 2017
Paybook Vol. 7 | October 2017 Paybook Vol. 7 | October 2017
Paybook Vol. 7 | October 2017
 
Verifone Q3 2017 Earnings
Verifone Q3 2017 EarningsVerifone Q3 2017 Earnings
Verifone Q3 2017 Earnings
 
Paybook Vol. 6 June 2017
Paybook Vol. 6 June 2017Paybook Vol. 6 June 2017
Paybook Vol. 6 June 2017
 
Guiding Merchants to Success in the 21st Century Survival Guide
Guiding Merchants to Success in the 21st Century Survival GuideGuiding Merchants to Success in the 21st Century Survival Guide
Guiding Merchants to Success in the 21st Century Survival Guide
 
Guiding Merchants to Success
Guiding Merchants to SuccessGuiding Merchants to Success
Guiding Merchants to Success
 
Verifone Q2 2017 Earnings
Verifone Q2 2017 EarningsVerifone Q2 2017 Earnings
Verifone Q2 2017 Earnings
 
21st Century Merchant Survival Guide US Edition
21st Century Merchant Survival Guide US Edition21st Century Merchant Survival Guide US Edition
21st Century Merchant Survival Guide US Edition
 
Paybook Vol. 5 May 2017
Paybook Vol. 5 May 2017Paybook Vol. 5 May 2017
Paybook Vol. 5 May 2017
 
Surviving the Retail Jungle
Surviving the Retail JungleSurviving the Retail Jungle
Surviving the Retail Jungle
 
Verifone Q1 2017 Earnings
Verifone Q1 2017 EarningsVerifone Q1 2017 Earnings
Verifone Q1 2017 Earnings
 
Paybook Vol. 2 | July 2016
Paybook Vol. 2 | July 2016Paybook Vol. 2 | July 2016
Paybook Vol. 2 | July 2016
 
Paybook Vol. 4 | January 2017
Paybook Vol. 4 | January 2017Paybook Vol. 4 | January 2017
Paybook Vol. 4 | January 2017
 
Verifone Q4 2016 Earnings
Verifone Q4 2016 EarningsVerifone Q4 2016 Earnings
Verifone Q4 2016 Earnings
 
Paybook Vol. 3 | October 2016
Paybook Vol. 3 | October 2016Paybook Vol. 3 | October 2016
Paybook Vol. 3 | October 2016
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Bluetooth Low Energy, Beacons and Retail - A VeriFone White Paper

  • 1. BLUETOOTH LOW ENERGY, BEACONS AND RETAIL Announcements by Apple® and PayPal® have generated a frenzy and massive speculation within the industry about how they will change retail payments. Both certainly have the potential for disruption and new applications, but the reality is more complex. This white paper explains the technology and some of the factors which will shape their use and determine their eventual success. Erik Vlugt VP, Product Marketing Twitter: @ErikVlugt VERIFONE HEADQUARTERS 2099 Gateway Place, Suite 600, San Jose CA 95131 Phone 408.232.7800 • Fax 408.232.7811 • www.verifone.com © 2013 VeriFone. All rights reserved. VeriFone and the VeriFone Logo are either trademarks or registered trademarks of VeriFone in the United States and/or other countries. All other trademarks or brand names are the properties of their respective holders. All features and specifications are subject to change without notice. Reproduction or posting of this document without prior VeriFone approval is prohibited.
  • 2. TABLE OF CONTENTS Bluetooth Low Energy – the Background .............................................................................. 3 Beacons – the Underlying Technology .................................................................................. 4 PayPal Beacon ......................................................................................................................... 7 iOS7 .......................................................................................................................................... 7 Beacon Suppliers and Practical Issues .................................................................................. 8 Indoor Location and Mapping ................................................................................................10 Geofencing ..............................................................................................................................10 Proximity .................................................................................................................................10 Notification ..............................................................................................................................11 Limitations...............................................................................................................................11 Conclusion ..............................................................................................................................12 Page 2 October 23, 2013
  • 3. BLUETOOTH LOW ENERGY, BEACONS AND RETAIL BLUETOOTH LOW ENERGY – THE BACKGROUND ® The specification for Bluetooth Smart, also known as Bluetooth low energy (BLE), was released in June of 2010. Although bearing the Bluetooth name, it is a completely new specification, designed to enable very low-power devices which can run for months or even years off small batteries such as coin cells. Its ® history dates back to 2001, when Nokia attempted to have it selected as the core technology for the IEEE 802.15.4 initiative for a low-power, short-range radio. The IEEE group chose the proposal that was ® to become ZigBee , but the Nokia effort continued internally, eventually emerging as their Wibree standard. The Bluetooth SIG struggled for several years trying to find a way to reduce the overall power of classic Bluetooth, and failed to reach a compromise that met the conflicting criteria for a truly low-power wireless standard. When Nokia offered the SIG the Wibree standard as a basis for this next generation, low-power solution in 2007, they used it as a starting point for what was to become BLE. It is important to realize that BLE is an entirely new standard. It is effectively a “blank sheet of paper design,” drawing on Nokia’s expertise, low-power radio techniques that had been developed by Nordic Semiconductor for the ANT™+ standard and the input of most of the world’s leading experts in low-power radio and protocols. The standards architects also took advantage of developments in wireless from the previous decade, with the aim of achieving a cost/performance point that would enable a market of hundreds of billions of accessory products. BLE’s connection with Bluetooth is that its design allows it to be implemented as an increment to the existing Bluetooth chips that are in mobile phones, laptops and tablets, sharing the same radio and a modified protocol stack. Although a new generation of chip is required to run BLE, these became available at the same time as a reduction in process geometry, meaning that these “dual-mode” chips are cheaper than the previous generation of single-mode Bluetooth classic chips. Although the chips in phones and tablets support both Bluetooth standards, BLE allows for the design of single-mode chips for use in low cost, battery powered peripheral devices. These are far simpler chips, which are increasingly highly integrated, containing the BLE radio, a processor running the BLE stack, and an additional processor and memory to run an application. All that’s needed to turn these into complete devices is the application code, a battery, a sensor and an enclosure. Page 3 October 23, 2013
  • 4. Since 2010, dual mode chips have been built into in an increasing number of smartphones, tablets and ® ® laptops. Apple has incorporated them in all products since the iPhone 4s and iPad 3, they are in most ® new Android™ phones and Nokia has included them within all of its Windows phones. Both Apple and ® Google (Android) have released APIs for application developers. This has stimulated a renaissance in ® hardware design, including crowd-funded projects on sites like Kickstarter , where the majority of shortrange wireless projects now use BLE. BLE is already present in hundreds of millions of devices. That number is projected to increase by 1 billion additional devices each year for the next few years as smartphone and tablet penetration increases. BEACONS – THE UNDERLYING TECHNOLOGY Since Bluetooth’s launch, various companies have looked at the possibility of using Bluetooth for advertising – pushing information to phones when the phone comes within range of a fixed transmitter. Although several companies exist within this area, it is an awkward experience that leverages classic Bluetooth technology and it is poorly supported across phones. A major drawback is that classic Bluetooth cannot broadcast messages to unfamiliar phones – instead it needs to identify the presence of each individual phone and then send a targeted message. To prevent multiple messages appearing, the transmitter needs to keep a log of which phones it has previously sent messages to, incurring a considerable level of complexity and cost. BLE changes this by including a range of broadcast advertising modes. These are fundamental to the technology and used for the discovery and pairing process, essentially creating a much better user experience when pairing & connecting. However, they can also be used for general, unacknowledged advertisements that can be detected by any phone with its Bluetooth receiver turned on. It is this which makes low cost Beacons possible. PERIPHERALS AND CENTRALS The BLE standard defines two types of devices – a Peripheral device, which is assumed to be a lowpower device that exposes state or information, and a Central device. The Central is usually either a powered device, or one with significantly greater processing capability and a rechargeable battery, e.g. a phone or tablet. Unlike classic Bluetooth, the Peripheral and Central are very asymmetric in their resource needs, with the standard being designed to minimize the complexity, power requirements and costs of the Peripheral. In most cases, a Peripheral device spends the majority of its life asleep, only waking when it needs to send data. Page 4 October 23, 2013
  • 5. SCANNERS AND ADVERTISERS Advertising is the first thing that BLE devices do when they’re turned on. A peripheral uses advertising packets to broadcast information that any other BLE device within range can hear. To listen to these, Central devices implement a Scanner mode, in which they listen for these advertisements. Both devices move from an idle state to that of either an advertiser or a scanner. The BLE standard divides the 2.4GHz spectrum into thirty-nine 2.0 MHz wide channels. Thirty-six of these are reserved for data, only used by devices that have paired with each other. The remaining three channels are used for advertisements. These three channels were specifically chosen to avoid the main ® channels used by Wi-Fi access points, to minimize interference. When a peripheral wants to broadcast, it starts an advertising event, where the same packet of information is transmitted sequentially on each of the three advertising channels. Devices operating as scanners will detect one of these, and pass the information it contains to the higher level protocol stack and application. ADVERTISING PACKETS This is where we get to the value of the specification, at least as far as location and advertising is concerned. Although the primary aim of advertising packets within the specification is to allow for the discovery of devices and make a secure connection, they also permit small amounts of data to be transmitted for any other device to hear. There are four different types of advertising packets defined, of which three are of interest. These are: • Non-connectable Advertising, where a device transmits a string of data, but will not respond to any request and cannot make a connection. This is the most common mode for beacons and can be implemented using only a transmitter, with no receiver. • Discoverable Advertising is similar, but a scanning device can request more information. This option allows a second packet of data to be sent to an application without the need to make a connection. Discoverable advertising provides the ability to request more data. Although potentially useful, most beacons would send information in a non-connectable advertisement packet directing a central device to access further information from a secondary source, such as a website accessible via a cellular or Wi-Fi link. Discoverable advertising cannot be used to initiate a connection. • General Advertising, where, in addition to the options above, a scanner can request that the beacon make a connection, which may be short term or permanent. • There is a fourth mode, known as Directed Advertising, which is used to quickly re-establish a previously negotiated connection. This is not relevant to beacons, and is not currently supported in iOS7. Page 5 October 23, 2013
  • 6. Advertising packets consist of a header and a maximum of 27 bytes of advertising data. This can contain multiple items, each grouped as a triplet of an identifying byte defining the data format, the length of the contents, and the content. Defined formats include the signal strength, a local name, the Bluetooth service, configuration flags and manufacturer specific information. iBEACONS Initially, one of the driving use cases for the development of BLE was proximity, which used a signal strength measurement to determine when two devices move out of range of each other. Supported by Nokia, this evolved into the Proximity profile. However, it is targeted at devices that have established a connection, generating an alert when the link budget falls below a preset level. Despite having an associated use case of location and positioning, efforts within the Bluetooth SIG to adopt a profile for this application lost momentum. This has given a number of companies the opportunity to define their own proprietary profiles. In July, these were largely made irrelevant when Apple announced its iBeacon ® specification as part of iOS7, effectively discrediting any previous attempt to define a beacon profile. Apple iBeacon defines four data elements or identifiers residing within the advertising packets of compliant iBeacons. They are: • A Proximity ID, which is a unique 128bit string that identifies the beacon. This may be unique to an iBeacon, but is more likely to relate to a store, or even chain of stores. Continuing that example, within a store, individual iBeacons can be distinguished by: • Identifiers, a number of identifiers that could define a number of relevant location parameters including department or even aisle. • The Transmitted Signal Strength. This is a Bluetooth defined advertising element, which can be interpreted in conjunction with the signal strength to determine the approximate distance to the beacon. The iBeacon specification classifies these into one of three categories - close, intermediate or far away. ® One of the best ways to think about an iBeacon packet is as a wireless QR code. The advantage of an iBeacon packet, as we will see below, is that it can initiate an application response on an iOS7 phone, without any user intervention. An iBeacon transmits these packets on a regular basis, typically once per second. There is no reason why it can’t transmit different packets of advertising data at different times, or alternate the content. More complex applications may emerge as we start seeing actual implementations. Page 6 October 23, 2013
  • 7. PAYPAL BEACON PayPal announced their PayPal Beacon shortly after Apple’s iBeacon announcement. It is a far more sophisticated system than the one described by Apple. iBeacon only requires simple transmitters, although the needs of installation and device management probably mean they will be more complex. In contrast, the PayPal Beacon requires a connection with the smartphone, which is then authenticated by a remote PayPal server. From the limited amount of released information, the process appears to be: 1. The PayPal Beacon advertises its presence, presumably using General Advertising packets. A phone running the PayPal application then makes a secure connection to the PayPal Beacon and identifies itself. 2. The PayPal Beacon also includes a Wi-Fi connection, which passes the phone details to a PayPal server. This starts a secure end-to-end authentication with the phone. User data is encrypted and passed back to the phone. This is used to check the user in to the store. 3. Once checked in, details of the authorized PayPal user are then passed to POS systems within the store. 4. When the user goes to pay, they further “authenticate” themselves using: a. A 4-digit randomly generated passcode that is sent to the phone and entered into the payment device by the user b. A QR code that is displayed on the phone, which can be scanned c. A picture the customer presents to the clerk who compares it with a stored profile picture It is not clear whether PayPal intends to open up the protocol and apps to general application developers. This may be unlikely as the system is 100 present focused on financial transactions at this time. However, they are currently asking application developers to submit ideas. iOS7 By itself, iBeacon is not particularly interesting. It is a very simple use of the BLE standard and many companies have already announced similar beacons. What will provide the real impact, are the features of iOS7. In iOS7, Apple added a feature that permits a phone to scan and detect advertisements from iBeacons in the background, passing up information and starting an application only when they are found. This has a profound effect on the user experience. Once the app is loaded on the phone, it can remain dormant until an appropriate iBeacon is discovered. iBeacon advertisements can be filtered and directed to specific apps, or used to initiate actions within PassBook. All of this takes place with no user intervention and minimal impact on battery life. It opens up the opportunity for “silent” apps that harvest user data and Page 7 October 23, 2013
  • 8. send it to a server for value-added analysis. However, although iOS7 enables background applications, most application developers are likely to encourage users to interact with the apps, as they see the app as their brand. This suggests there may be a divergence between shopping apps residing on the phone and data-centric applications, which rely on real time server analysis. Apple devices supporting BLE and iOS7 can themselves act as iBeacons. It remains to be seen what applications may leverage this, but it is more likely in the social apps area. BEACON SUPPLIERS AND PRACTICAL ISSUES The concept of using BLE beacons to transmit coordinates or advertising messages is not new. It has been publicized since the early days of the standard as a major potential application. As a result, a number of companies have already grown up supplying this form of beacon, notably Estimote, Roximity, and indoo.rs. DEVICE MANAGEMENT Introducing iBeacons into a retail environment poses two practical challenges: • How to install them, i.e. entering a unique set of information into each beacon? And • How to maintain them, particularly in terms of software updates Both of these require a method of sending information to program or update the iBeacon. This can be done manually, by plugging it into a commissioning tool – typically a laptop, or wirelessly using some form of Over the Air (OTA) upgrade. Whatever the method, from the simplicity of a peer-2-peer connection between beacon and commissioning tool, to a wider device management infrastructure, it needs to be done securely. There is currently no standardized way of doing this. It will be one way in which iBeacon manufacturers differentiate their offering. However, for a large store, which might have hundreds or thousands of iBeacons, it is a very serious consideration. It will have an impact on the price of the beacons and the overall cost of ownership. The actual technology portion of a BLE iBeacon is low. The management capability cost is likely to be significantly higher. PayPal Beacon appears to have addressed this by incorporating a Wi-Fi backhaul for authentication, which can also be used for updating and device management. Page 8 October 23, 2013
  • 9. PLACEMENT AND INTERFERENCE BLE is designed to coexist with other transmitters in the 2.4GHz band, most notably Wi-Fi. iBeacons only use the three advertising channels, which have been chosen specifically to avoid the standard Wi-Fi channels. The transmissions are very short and robust to interference. However, careless installation next to Wi-Fi access points will likely result in problems. If iBeacons are positioned on metal shelves, or if the iBeacons are placed behind metal stands, there will be a level of attenuation, which may result in inaccurate triangulation within apps that use them for location. This is largely an education issue for installers and retailers, but needs to be addressed. An additional challenge is posed for beacons that transmit a specific location and that need to be installed at a predetermined, fixed location to allow a mapping application to triangulate with them. SECURITY Advertisements from BLE Beacons are not secure. By their nature they are open and can be read by any device. As all of the data in the iBeacon is readable and is repeated in each consecutive transmission, it is possible for hackers to capture and replay it, emulating the beacon either using their phone, or by programming a small, low cost beacon placed elsewhere in the store. Sending incorrect or spurious information is a lower risk. Unless it has meaning for the phone, it should be discarded by the application. There will almost certainly be cases where this happens. Whether it will be destructive or a short term nuisance is yet to be determined. PayPal has taken a more robust approach, where the Beacon is purely the start of a complex security negotiation. This is not likely to be hacked, nor is it likely that it would be disrupted by copies of beacons. APPLICATIONS OF iBEACONS The big question is, “What will iBeacons do for retail?” There are some obvious applications, which are detailed below, along with some less obvious ones. All of them have the potential to change the way in which consumers and retailers interact with each other. Beacons will certainly have an impact on loyalty schemes, which now have the potential for microsegmentation. Once retailers can access the information from customers’ apps, it takes us into a world that is no longer restricted to knowing what someone buys, but one in which retailers can see how they buy. Many of the application areas are similar, relying on the ability to detect the distance from a beacon. iOS7 provides features that can use this information in a number of different ways, hence applications can be divided into some distinct, albeit closely related areas. Page 9 October 23, 2013
  • 10. INDOOR LOCATION AND MAPPING The simplest application is indoor mapping. Here beacons provide location information, which a user app can utilize to guide them through a store or indoor public space. Nokia is taking a conventional approach, using advertisements that transmit standard location information (lat, long and elevation). This works well with their existing Nokia Maps applications, effectively adding an indoor element to an existing API. Because this data is constant and fits an established industry, it can easily be used by developers to generate other applications. As well as indoor guidance, it allows an app to save a breadcrumb trail of the user’s path, which can be uploaded and analyzed, either to understand the user’s decision-making process, or to validate the efficiency of the store layout. Apple’s recent purchase of indoor mapping company WiFiSLAM, along with their internal mapping solution, suggests they also have an eye on iBeacons for location. By using multiple beacons, applications can triangulate to determine position more precisely. Although technically feasible, the greater the accuracy, the more processing power is required, and the greater the impact on battery life. GEOFENCING Geofencing is a special form of location, where devices use beacons to limit or check the area in which a user is moving. Within iOS7 there is a geofencing function, where an application can instruct the device to check whether it remains within a defined range of a beacon or set of beacons and then alert an application if it moves outside that range. The advantage inferred by this is that the ranging function operates in the background, consuming very little power until it detects that the geofencing parameters have moved out of the defined range, at which point it alerts the application. The specific use of this functionality is unclear but it could include route planning and monitoring throughout a retail establishment. PROXIMITY Unlike the Bluetooth SIG and Nokia’s take on proximity, most beacon suppliers, including Apple, have a simpler view, which is to detect when a central device comes within range of a beacon. This provides the most straightforward customer engagement application, which is “Welcome to the store” or “Welcome to the electronics department.” Page 10 October 23, 2013
  • 11. Writing an app to display a message on a phone is trivial and of very limited use. But the underlying alert can trigger far more subtle interactions. This is the starting point of the PayPal beacon system, where the user is signed into the store. While PayPal take a secure approach, with back-end authentication, it’s easy to see other applications emerging which interact with data preloaded into a phone app, or accessed via an alternative data link to download web or server based information. As the transmit power of beacons can be turned down to enable a very low range, this can be very selective – down to a specific area within a specific department. As more Beacons are deployed, many with very limited range, the order in which they are detected provides an accurate breadcrumb trail of how a consumer has progressed around a store. For supermarkets, it gives information on how they have walked through the store, providing valuable information on aisle usage. For department or clothing stores, it indicates how long users have stayed in each section and how often they may have returned to the same point. A hole in this argument is that the store only knows the routes of the user if they can access the beacon data recorded on the phone, as the beacons themselves have no way of locating the phone. This implies that the user has downloaded an application on their phone, which uploads their beacon trail to a server, which runs analytics to make value decisions in real time. This real-time consumer data is the crown jewel of beacon technology and will probably be fiercely fought over, as stores and third party applications vie for the users’ attention and ownership of their data. Whoever manages to own it will be in possession of data that will tell them not what consumers buy, but how they buy. NOTIFICATION So far, the applications of BLE only need simple transmit only beacons. Once beacons are connected to a network to provide device management, they can potentially transmit alternative data in their advertising packets to push messages or offers to previously identified users. While this is possible, it requires a degree of real-time feedback and needs to be treated with care. As explained above, messages from beacons can easily be picked up and replicated by others, so it is difficult to send an offer to a subgroup of customers within the store. Individual promotions can be sent over an alternative network – either Wi-Fi or cellular, but that complicates the applications and back-end delivery mechanism LIMITATIONS Much of the enthusiasm for beacons has been fueled by the fact that Apple has attempted to own the initiative. The real innovation, as stated above, is not the beacon, but the background routines in iOS7 that allow Apple devices to interact with beacons with minimal power consumption. Page 11 October 23, 2013
  • 12. Android devices can support the same applications, but currently all of the scanning is performed by the Android application. This takes considerably more power and is likely to be less convenient for consumers. In time they will probably provide the same functionality, but in the short-to-medium term it means that most innovation will happen around iPhones. Nokia will add a BLE stack upgrade for their most recent phones, but have no timescale to provide a user API. This is a third party stack and not a native Microsoft solution. It is being introduced as an interim solution to prevent Nokia falling even further behind the market leaders in terms of BLE applications. Presumably any of their beacon applications will remain proprietary until Microsoft releases its own Windows Mobile solution. CONCLUSION Beacons and beacon applications are about to emerge in retail. How much of its success will be hype and how much disruption it causes remains to be seen. What is apparent is that the Apple effect, coupled with some innovative app developers and the availability of beacons from many companies provides all of the ingredients for major innovation. Retailers should keep a careful eye on this innovation as it can drive the opportunity for increased customer engagement. BLE should be perceived as an exciting new enabling technology that has the ability to affect many aspects of the retail customer experience. The applications for BLE will include payments but BLE by itself it should not be viewed as a direct alternative to existing cards, NFC, EMV, or other mobile wallet schemes. BLE can be the enabler for a number of new ways to interact and pay in the store but it is unlikely to instantly replace any existing technology. Instead, it is likely to be positioned as a complementary technology to add GPS-style and “check-in” functionality to new and existing payment schemes. With regard to payment, BLE makes store check-in and intelligent interaction much easier to implement. The fundamental challenge with regard to the consumer authentication is not natively addressed by BLE, which is why PayPal added the PIN and barcode authentication. Apple will likely look to Touch ID™ as a technology to authenticate users as well. As the enabler of commerce, VeriFone is happy to discuss BLE and related technologies with you to help determine the best solution for your specific environment. Please contact your VeriFone representative for more information. Page 12 October 23, 2013