Sign In to Follow Application
View All Documents & Correspondence

System And Method For Enabling Short Distance Secure Communication

Abstract: The present disclosure provides a robust solution to an entity or an organization by enabling the entity to implement a system that provides an alternate mechanism compared to the standard near field communication (NFC)-based communication. The system enables a standard public key infrastructure (PKI)-enabled smartphone to communicate secure data using a Bluetooth mode of transmission. Further, the system enables the Bluetooth mode of transmission without the requirement of pairing between devices.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
28 January 2023
Publication Number
30/2023
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

JIO PLATFORMS LIMITED
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. DUTTA, Debashis
T7/8B, Beverly Park Residences, Plot 107 Gagangiri Maharaja Marg, Sector-14, Koperkhairne, Navi Mumbai - 400709, Maharashtra, India.
2. MAITY, Chandan
602, Progressive Cottage, Plot-107/108, Sec-11, Koparkhairane, Navi Mumbai - 400709, Maharashtra, India.
3. DAGADI, Shivraj
403, Lord’s Enclave, B Cross, Bangalore -560017, Karnataka, India.
4. SHAH, Anish
301, Tridev Sapphire, Trimurti Marg, Opp. St Mary's School, Mulund (W) - 400080, Mumbai, Maharashtra, India.

Specification

Description:RESERVATION OF RIGHTS
[0001] A portion of the disclosure of this patent document contains material, which is subject to intellectual property rights such as but are not limited to, copyright, design, trademark, integrated circuit (IC) layout design, and/or trade dress protection, belonging to Jio Platforms Limited (JPL) or its affiliates (hereinafter referred as owner). The owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights whatsoever. All rights to such intellectual property are fully reserved by the owner.

FIELD OF INVENTION
[0002] The embodiments of the present disclosure generally relate to systems and methods for facilitating short distance secure communications in telecommunication systems. More particularly, the present disclosure relates to a system and a method for short distance secure communication using a Bluetooth mode of transmission that is secure, requires lesser user interaction, and reduces power consumption.

BACKGROUND OF THE INVENTION
[0003] The following description of related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admission of the prior art.
[0004] The world of digital technology has enabled faster payment methods though smartphones. Further, near-field communication (NFC) technology is used for data exchange between smartphones and a point of sales (PoS) device. However, smartphones with NFC implementations require the addition of standard protocols that contribute significantly to the manufacturing cost of smartphones. Current generation smartphones utilize Bluetooth technology to communicate with nearby smartphones. Further, Bluetooth technologies require pairing between smartphones through user interaction and consume a significant amount of time. Additionally, Bluetooth technology requires additional hardware implementation that significantly increases the cost of the smartphones.
[0005] There is, therefore, a need in the art to provide a system and a method that can mitigate the problems associated with the prior arts.

OBJECTS OF THE INVENTION
[0006] Some of the objects of the present disclosure, which at least one embodiment herein satisfies are listed herein below.
[0007] It is an object of the present disclosure to provide a system and a method with Bluetooth technology that facilitates communication between devices without the need for pairing.
[0008] It is an object of the present disclosure to provide a system and a method with Bluetooth technology that requires lesser power consumption.
[0009] It is an object of the present disclosure to provide a system and a method using Bluetooth technology that utilizes one or more advertising channels for broadcasting data.
[0010] It is an object of the present disclosure to provide a system and a method using Bluetooth technology that broadcasts data with a configurable interval while reducing interferences.

SUMMARY
[0011] This section is provided to introduce certain objects and aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0012] In an aspect, the present disclosure relates to a system that enables communication of data between a primary entity and a secondary entity. The system may include one or more processors operatively coupled to the primary entity. The primary entity may be operably coupled with a subscriber identity module (SIM) card. The primary entity may be associated with one or more users and may be connected to the one or more processors. The one or more processors may be coupled with a memory that stores instructions to be executed by the one or more processors. The one or more processors may generate one or more data parameters based on one or more target applications requested by the one or more users. Further, the one or more processors may encrypt the generated one or more data parameters. One or more primary techniques may be used to generate one or more encrypted data based on the one or more target applications requested by the one or more users. The one or more processors may determine a mode of communication based on the generated one or more encrypted data. The determined mode of communication may include at least a Bluetooth mode of communication Further, the one or more processors may enable the communication of the one or more encrypted data from the primary entity to the secondary entity via the determined mode of communication.
[0013] In an embodiment, one or more advertising channels may be associated with the Bluetooth mode of communication for transmission of the one or more encrypted data from the primary entity to the secondary entity.
[0014] In an embodiment, the one or more processors may be configured to transmit a public address and a private address associated with the one or more advertising channels of the Bluetooth mode of communication to the secondary entity.
[0015] In an embodiment, the Bluetooth mode of communication may use a data link layer with a physical specification of 4.X (LE 1M PHY) and 5.X (LE 2M PHY).
[0016] In an embodiment, the data link layer may include at least a preamble, an access address, a protocol data unit (PDU), a cyclic redundancy check (CRC), and a constant tone (CTE).
[0017] In an embodiment, the one or more encrypted data may be transmitted using a configurable interval from 20 milliseconds to 10.24 seconds along with a delay of 0 seconds to 0.625 milliseconds.
[0018] In an embodiment, the primary entity and the secondary entity may include one or more Bluetooth low energy (BLE) scanners to transmit and receive the one or more encrypted data through the one or more advertising channels.
[0019] In an aspect, the present disclosure relates to a method for communication of data between a primary entity and a secondary entity. The method may include generating, by one or more processors, one or more data parameters based on one or more target applications requested by one or more users. The one or more users may be associated with the primary entity that may be operably coupled with a SIM card. Further, the method may include encrypting, by the one or more processors, the generated one or more data parameters. One or more primary techniques may be used to generate one or more encrypted data based on the one or more target applications. The method may include determining, by the one or more processors, a mode of communication. The determined mode of communication may include at least a Bluetooth mode of communication. Further, the method may include enabling, by the one or more processors, the communication of the one or more encrypted data from the primary entity to the secondary entity via the determined mode of communication.
[0020] In an aspect, the present disclosure relates to a user equipment for communication of data to a secondary entity. The UE may include a SIM card, and one or more primary processors communicatively coupled to one or more processors in a system, the one or more primary processors coupled with a memory, where the memory stores instructions which when executed by the one or more primary processors causes the UE to generate and transmit one or more data parameters based on one or more target applications requested by one or more users associated with the UE. The one or more processors may be configured to receive the one or more data parameters from the UE, encrypt, using one or more primary techniques, the generated one or more data parameters based on the requested one or more target applications, determine a mode of communication based on the generated one or more encrypted data, where the determined mode of communication may include at least a Bluetooth mode of communication, and enable the communication of the one or more encrypted data to the secondary entity via the determined mode of communication.
[0021] In an aspect, the present disclosure relates to a SIM card for enabling communication of data to a secondary entity. The SIM card may include one or more processors communicatively coupled to one or more processors in a system, the one or more processors coupled with a memory, where the memory stores instructions which when executed by the one or more processors causes the SIM card to generate one or more data parameters based on one or more target applications requested by a user, encrypt, using one or more primary techniques, the generated one or more data parameters based on the requested one or more target applications, predict, using an artificial intelligence (AI) engine, a Bluetooth mode of communication based on the generated one or more encrypted data, and enable the communication of the one or more encrypted data from the SIM card associated with a primary entity to the secondary entity via the Bluetooth mode of communication.

BRIEF DESCRIPTION OF DRAWINGS
[0022] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes the disclosure of electrical components, electronic components, or circuitry commonly used to implement such components.
[0023] FIG. 1A illustrates an exemplary network architecture (100) of a proposed system (110), in accordance with an embodiment of the present disclosure.
[0024] FIG. 1B illustrates an exemplary system architecture (150) of a proposed system (110), in accordance with an embodiment of the present disclosure.
[0025] FIG. 2 illustrates an exemplary representation (200) of a proposed system (110), in accordance with an embodiment of the present disclosure.
[0026] FIG. 3 illustrates an exemplary representation of logical blocks (300) of a proposed system (110), in accordance with an embodiment of the present disclosure.
[0027] FIG. 4 illustrates an exemplary representation (400) of an application processor of a proposed system (110), in accordance with an embodiment of the present disclosure.
[0028] FIG. 5 illustrates an exemplary representation of secure environment architecture (500), in accordance with an embodiment of the present disclosure.
[0029] FIG. 6 illustrates an exemplary representation of an internal architecture (600) of a subscriber identity module (SIM) card operation, in accordance with an embodiment of the present disclosure.
[0030] FIGs. 7A-7F illustrate exemplary representations of secure communication over Bluetooth, in accordance with an embodiment of the present disclosure.
[0031] FIG. 8 illustrates an exemplary representation of a detailed process flow including digital signature and encryption (800), in accordance with an embodiment of the present disclosure.
[0032] FIG. 9 illustrates an exemplary computer system (900) in which or with which a proposed system (110) may be implemented, in accordance with an embodiment of the present disclosure.
[0033] The foregoing shall be more apparent from the following more detailed description of the disclosure.

BRIEF DESCRIPTION OF THE INVENTION
[0034] In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter can each be used independently of one another or with any combination of other features. An individual feature may not address all of the problems discussed above or might address only some of the problems discussed above. Some of the problems discussed above might not be fully addressed by any of the features described herein.
[0035] The ensuing description provides exemplary embodiments only and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
[0036] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail to avoid obscuring the embodiments.
[0037] Also, it is noted that individual embodiments may be described as a process that is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination can correspond to a return of the function to the calling function or the main function.
[0038] The word “exemplary” and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive in a manner similar to the term “comprising” as an open transition word without precluding any additional or other elements.
[0039] Reference throughout this specification to “one embodiment” or “an embodiment” or “an instance” or “one instance” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, the appearances of the phrases “in one embodiment” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
[0040] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of disclosure. As used herein, the singular forms “a”, “an”, and “the” are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
[0041] The various embodiments throughout the disclosure will be explained in more detail with reference to FIGs. 1-9.
[0042] FIG. 1A illustrates an exemplary network architecture (100) of a proposed system (110), in accordance with an embodiment of the present disclosure.
[0043] Referring to FIG. 1A, the system (110) may enable communication of data between a primary entity (104) and a secondary entity (108). In an embodiment, the primary entity (104) and/or the secondary entity (108) may also be known as user equipment (UE) that may include, but not be limited to, a mobile, a laptop, etc. Further, the primary entity (104) and/or the secondary entity (108) may include one or more in-built or externally coupled accessories including, but not limited to, a visual aid device such as a camera, audio aid, a microphone, or a keyboard. Further, the primary entity (104) and/or the secondary entity (108) may include a smartphone, virtual reality (VR) devices, augmented reality (AR) devices, a general-purpose computer, desktop, personal digital assistant, and a mainframe computer. Additionally, input devices for receiving input from one or more users (102-1, 102-2…102-N) such as a touch pad, touch-enabled screen, electronic pen, and the like may be used.
[0044] Referring to FIG. 1A, the primary entity (104) and the secondary entity (108) may be communicatively connected with each other through a mode of communication (106).
[0045] In an embodiment, the system (110) may generate one or more data parameters based on one or more target applications requested by the one or more users (102-1, 102-2…102-N). A person of ordinary skill in the art will understand that the one or more users (102-1, 102-2…102-N) may be collectively referred as the users (102) and individually referred as the user (102). In an embodiment, the one or more target applications may include, but not be limited to, payment information or any other sensitive data. In an embodiment, a Bluetooth mode of communication may be used for communication of data from the primary entity (104) to the secondary entity (108).
[0046] Although FIG. 1A shows exemplary components of the network architecture (100), in other embodiments, the network architecture (100) may include fewer components, different components, differently arranged components, or additional functional components than depicted in FIG. 1A. Additionally, or alternatively, one or more components of the network architecture (100) may perform functions described as being performed by one or more other components of the network architecture (100).
[0047] FIG. 1B illustrates an exemplary system architecture (150) of a proposed system (110), in accordance with an embodiment of the present disclosure.
[0048] As illustrated in FIG. 1B, the system architecture (150) includes a transmitter (170) and a receiver (172). A person of ordinary skill in the art will appreciate that the transmitter (170) may be similar to the primary entity (104) of FIG. 1A in its functionality. Further, a person of ordinary skill in the art will appreciate that the receiver (172) may be similar to the secondary entity (108) of FIG. 1A in its functionality.
[0049] Referring to FIG. 1B, the transmitter (170) may include a data generation block (152) for generation of one or more data parameters. Data generation may be supervised (manually entered or attended) or un-supervised (i.e., automatically fetched or unattended). The generated data or data parameters may be encrypted at a data encryption block (154). Once the encryption of the data parameters is completed, the encrypted data parameters may go through a packetization block (156) based on a type of peripheral. Packetization may include generation of one or more data packets based on the encrypted data parameters. Data transmission block (158) may include activation of the desired output peripheral and hardware protocol level configuration for transmission of the packetized data to the receiver (172) using a data communication link (106).
[0050] In an embodiment, the data communication link (106) may include basic attributes such as, but not limited to, time (bit rate), image quality (in case of a quick response (QR) image), distance of communication based on the mode of transmission. In an embodiment, the receiver (172) may be similar to the transmitter (170), but in a reverse mode. The receiver (172) may be configured to scan the data transmitted by the transmitter (170) and select an application specific peripheral (input). Data reception block (162) may control the protocol level configuration to perform the task of receiving the data. Once the data is captured in receiver frontend peripheral, depacketization of the data is performed at a depacketization block (164). Based on the type of communication mode and size of the data packet(s), the depacketization block (164) may parse the desired data leaving the protocol layer overheads.
[0051] Further, the depacketized data may be decrypted at a data decryption block (166). After decryption, the data is verified at a data verification block (168) and further processed based on one or more target applications requested by users such as the users (102) of FIG. 1A.
[0052] In an exemplary embodiment, a subscriber identity module (SIM) card enabled with public key infrastructure (PKI) may be included at the transmitter (170) (for example, the primary entity (104) of FIG. 1A) and the receiver (172) (for example, the secondary entity (108) of FIG. 1A). In an exemplary embodiment, various modes of communication may be enabled over a secure computation platform i.e. PKI-SIM. Further, the SIM card may be embedded as an e-SIM or a normal SIM card. The communication subsystems with heterogeneous hardware modules may be available in any smartphone or device. Further, single or multiple modes of hardware modules may be used by the application processor (301) to fulfil requirements of secure data communication over a short distance.
[0053] Additionally, the PKI-enabled SIM card may have the following features.
• A suitable certifying authority (CA) infrastructure support.
• Onboard key pair generation and protection of private key inside SIM.
• Secure storage of Rivest-Shamir-Adleman (RSA) or elliptical curve cryptography (ECC) keys and digital certificates.
• Secure storage of user data.
• Signing of any user data.
• Encryption and decryption of any data with: asymmetric keys and algorithms such as (RSA, ECC), and/or with symmetric keys and algorithms such as, but not limited to, an advanced encryption standard (AES), a data encryption standard (DES), and a triple data encryption standard (3DES).
• Support of hashing algorithm such as, but not limited to, a secure hash algorithm (SHA) and a message-digest algorithm (MD5).
• Access protection of SIM card applet through appropriate keys and algorithm (secure communication protocol (SCP)-02, 03, 10, 11).
[0054] In an exemplary embodiment, Wi-Fi, Bluetooth, Image (QR), audio, and the like may be used in any combination to provide communication of data between the transmitter (170) and the receiver (172). The data communication link (106) may be configured for one or more modes of communication in a specific way to provide a faster transaction cycle time and a maximum data rate. The communication range may also be configurable for the respective mode of communication.
[0055] It may be appreciated that the system architecture (150) may be modular and flexible to accommodate any kind of changes in the system (110).
[0056] FIG. 2 illustrates an exemplary representation (200) of a proposed system (110), in accordance with an embodiment of the present disclosure. A person of ordinary skill in the art will understand that the system (110) of FIG. 2 may be similar to the system (110) of FIG. 1A in its functionality.
[0057] Referring to FIG. 2, the system (110) may comprise one or more processor(s) (202). The one or more processor(s) (202) may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that process data based on operational instructions. Among other capabilities, the one or more processor(s) (202) may be configured to fetch and execute computer-readable instructions stored in a memory (204) of the system (110). The memory (204) may be configured to store one or more computer-readable instructions or routines in a non-transitory computer-readable storage medium, which may be fetched and executed to create or share data packets over a network service. The memory (204) may comprise any non-transitory storage device including, for example, volatile memory such as random-access memory (RAM), or non-volatile memory such as erasable programmable read-only memory (EPROM), flash memory, and the like.
[0058] In an embodiment, the system (110) may include an interface(s) (206). The interface(s) (206) may comprise a variety of interfaces, for example, interfaces for data input and output devices, referred to as input/output (I/O) devices, storage devices, and the like. The interface(s) (206) may facilitate communication through the system (110). The interface(s) (206) may also provide a communication pathway for one or more components of the system (110). Examples of such components include, but are not limited to, processing engine(s) (208) and a database (210).
[0059] The processing engine(s) (208) may be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processing engine(s) (208). In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing engine(s) (208) may be processor-executable instructions stored on a non-transitory machine-readable storage medium and the hardware for the processing engine(s) (208) may comprise a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) (208). In such examples, the system (110) may comprise the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to the system (110) and the processing resource. In other examples, the processing engine(s) (208) may be implemented by electronic circuitry.
[0060] In an embodiment, the one or more processor(s) (202) may be configured generate one or more data parameters based on one or more target applications requested by users (102) of FIG. 1A. The one or more processors (s) (202) may store the generated one or more data parameters in the database (210). The one or more processors (202) may determine the mode of communication between the primary entity (104) and the secondary entity (108).
[0061] In an embodiment, the one or more processors (202) may be configured to transmit a public address and a private address associated with one or more advertising channels of the Bluetooth based mode of communication (106) to the secondary entity (108).
[0062] In an embodiment, the primary entity (104) and the secondary entity (108) may comprise one or more Bluetooth low energy (BLE) scanners to transmit and receive the one or more encrypted data through the one or more advertising channels.
[0063] FIG. 3 illustrates an exemplary representation of logical blocks (300) of the proposed system (110), in accordance with an embodiment of the present disclosure.
[0064] As shown in FIG. 3, the logical blocks in FIG. 1B of the proposed system (110) are mapped onto a physical hardware present in computing devices such as, but not limited to, smartphones. As illustrated in FIG. 3, the corresponding physical sections may be classified into three segments including an application processor (301), a secure environment (302), a hardware peripheral (303), and a data communication link (160). In an embodiment, the data communication link (160) may include a wireless optical link (160a), a wireless radio frequency link (160b), and a wireless acoustic link (160c) for enabling communication of data between a transmitter and a receiver (for example, the transmitter (170) and the receiver (172) of FIG. 1B).
[0065] It may be appreciated that the logical blocks (300) may be modular and flexible to accommodate any kind of changes.
[0066] FIG. 4 illustrates an exemplary representation (400) of an application processor (301) of the proposed system (110), in accordance with an embodiment of the present disclosure. A person of ordinary skill in the art will appreciate that the application processor (301) of FIG. 4 may be similar to the application processor (301) of FIG. 3 in its functionality. The application processor (301) may further include data generation, data encryption, and packetization as shown in FIG.3.
[0067] In an embodiment, the application processor (301) may contain a multi-core central processing unit (CPU) and a general purpose input/output (GPIO) feature. The application processor (301) may primarily run a smart phone operating system (OS) (402) and user-level applications (402-A, 402-B, 402-C, 402-D). It may be appreciated that the user-level applications (402-A, 402-B, 402-C, 402-D) may be independent of each other and follow their respective life-cycle.
[0068] In an exemplary embodiment, the user-level applications (402-A, 402-B, 402-C, 402-D) may include, but not be limited to, a payment application or any other secure/sensitive applications. Alternatively or additionally, sensitive operations may be performed by a secure processor independent of the application processor (301).
[0069] FIG. 5 illustrates an exemplary representation of secure environment architecture (500), in accordance with an embodiment of the present disclosure. A person of ordinary skill in the art will appreciate that the secure environment (302) of FIG. 5 may be similar to the secure environment (302) of FIG. 3 in its functionality.
[0070] In an embodiment, the secure environment (302) may contain a single processor or controller or a chip set based on various independent designs of an original equipment manufacturer (OEM). As illustrated, the secure environment (302) may contain a secure memory (502-A) to ensure the data may be extracted or fetched by a specific handshaking method. The secure environment (302) may be a separate hardware unit or maybe an integrated part of a secure processor (502-B). The secure processor (502-B) may compute various logical operations without exposing any data. Further, a hardware accelerator (502-C) may be incorporated with the secure processor (502-B) to enable high-speed computations. Furthermore, an asymmetric cryptographic operation (502-D) may provide complex cryptographic operations in the secure environment (302). In many configurations, the hardware accelerator (502-C) and the asymmetric cryptographic operation (502-D) may be linked to the secure processor (502-B).
[0071] FIG. 6 illustrates an exemplary representation of an internal architecture of a SIM card (600), in accordance with an embodiment of the present disclosure.
[0072] As illustrated in FIG. 6, SIM card (600) may contain a global platform and over the air (OTA) interface (601) and a telecom applet (602). The telecom applet (602) may be accessed using an issuer security domain (ISD) access key-1 (607). A new application such as a secure applet (603) may be added to enable the SIM card (600) with all the functionalities of a secure environment as indicated in block (302) of FIG. 3 or FIG. 5. The secure applet (603) may be placed in a supplementary security domain (SSD) (606) to prevent other applets or applications from accessing the secure applet (603). Additionally, the SIM card (600) may be safely accessed using a global platform and host (608) or a short messaging service (SMS) or a hypertext transfer protocol secure (HTTPS) route (609). Further, the SIM card (600) may be protected from side channel access after deployment.
[0073] In an embodiment, a SIM card applet (603) may contain all the features of the PKI environment with the following attributes of the secure applet (603):
• Onboard key pair generation and protection of private key inside SIM.
• Secure storage of RSA or ECC keys and digital certificates.
• Secure storage of user data.
• Signing of any user data.
• Encryption of any data with asymmetric keys and algorithms (RSA, ECC) and/or symmetric keys (AES, DES, 3DES).
• Decryption of any data.
• Support hashing algorithm such as an SHA and an MD5.
• Access protection of SIM card applet via appropriate keys and algorithm (SCP-02, 03, 10, 11).
[0074] In an exemplary implementation, the encryption and decryption techniques may include a symmetric key and/or an asymmetric key. In the case of symmetric key-based security, the SIM card (600) shown in FIG. 6 may be equipped with secure storage of the generated key pairs. For an asymmetric key-based security, the SIM (600) card may be equipped with a PKI-based framework. The PKI framework may contain its process flow of key generation, CA, digital certificate generation (at CA), digital certificate storage (at SIM card), etc.
[0075] FIGs. 7A-7F illustrate exemplary representation of secure communication over Bluetooth (700), in accordance with an embodiment of the present disclosure.
[0076] As illustrated in FIG. 7A, blocks (702) and (702A) may be used for communication of data. The Bluetooth communication-specific block (160) may provide a Bluetooth link for fast transactions. FIG. 7A may include the functionality of the remaining blocks as described earlier in FIG. 1B. However, the functionality of the remaining blocks may not be explained from the point of view of brevity. However, as a fundamental principle, all communication (including Bluetooth) may be simplex in nature and may not include “pairing” i.e. there will not be any explicit connection based on mutual handshaking. In simplex communication, data may be sent or transmitted, or broadcasted from one device to another device or devices. The Bluetooth option provides faster communication with less user interaction. Further, received data (303) may be decrypted at block (702-A) as shown in in FIG. 7A.
[0077] In an exemplary embodiment, the Bluetooth communication type may include the advertising feature as the mode of data transmission from one device to another device. The data may include, but not be limited to, identity information, transaction information, and an acknowledgment signal. The definition and frame structure of data may be dependent on a specific application.
[0078] For security, the advertising frame or packet may be accessible to all the devices in the vicinity. For example, any device in the vicinity accessing the Bluetooth signal can also read all the data transmitted by the Bluetooth device phrased as “advertising.” Hence, this channel of communication is linked with previous stages of data preparation as shown in “data encryption” ((154) in FIG. 1B) and “packetization” ((156) in FIG. 1B) blocks. The “data encryption” block ensures data security and prevents other devices from accessing this data. It may also be noted, at the time of Bluetooth low energy (BLE) data transmission, all the data transmitted along with BLE source address may be a public address (media access control (MAC) address) or a configurable private address.
[0079] In an exemplary implementation, the size of data in transmission depends on the scope and specification of the peripheral hardware. The process of packetization may maintain the equilibrium between desired data to transmit at the application layer and the available memory to transmit at the physical or data-link layer. As indicated, the PHY (physical layer) specification of the Bluetooth may be BLE 4.X (LE 1M PHY), 5.X (LE 2M PHY), and others. It may be appreciated that various configurations may be enabled to achieve maximum output. In an embodiment, Bluetooth configuration may be based on the hardware capability of the device and may be configured to achieve maximum data size in the advertising packet and the frequency of data broadcast interval.
[0080] Bluetooth may be configured to work free of license in the industrial, scientific, and medical (ISM) bands of 2.4 gigahertz to 2.48 gigahertz. The spectrum may be divided into multiple channels. The same frequency bandwidth may also be used by many other wireless devices such as Wi-Fi and proprietary RF broadcasting system.
[0081] FIG. 7B illustrates a frequency spectrum of the Bluetooth and the Wi-Fi channels. As shown in FIG. 7B, the three channels (Channel-37, Channel-38, Channel-39) out of 40 channels of Bluetooth may be used for broadcasting “advertisement,” while other channels may be used to send data after pairing. In Bluetooth BLE-4.X, only three channels may be used to broadcast advertising data, whereas in BLE 5.X onwards, the other 37 channels (Channel-0 to Channel-36) may be configured for advertisement. The usage of advertising channels (as many as possible) depends on the lowest common hardware availability of the smartphone of the sender and the receiver.
[0082] The Bluetooth advertising data may be broadcasted with a configurable interval ranging from 20 milliseconds to 10.24 seconds along with a small random delay of 0 seconds to 0.625 milliseconds to avoid interference from multiple devices. Small intervals may be used to increase data available for broadcasting advertisements to the scanner or receiver. However, small advertising intervals increase the possibility of interferences in the case of multiple devices broadcasting in the same region. Hence, small intervals may be selected appropriately based on the application to achieve optimum results.
[0083] FIG. 7C describes a link-layer (LL) packet structure that may further include the following:
[0084] Preamble: All LL packets may contain a preamble, which is used in the receiver to perform frequency synchronization, automatic gain control (AGC) training, and symbol timing estimation. The preamble may be a fixed sequence alternating between 0 and 1 bits. For the BLE packets transmitted on the LE 1M PHY and LE 2M PHY, the preamble size may be between 1 octet and 2 octets, respectively.
[0085] Access Address: The access address may be a 4-octet value. Each periodic advertising train may have a distinct access address. Each time, the BLE device needs a new access address while the LL generates a new random value.
[0086] Protocol data unit (PDU): When a BLE packet is transmitted on either the primary (Ch37, Ch38, and Ch39) or secondary advertising physical channels (Ch0 to Ch36) or the periodic physical channel, the PDU may be defined as the advertising physical channel PDU. When a packet is transmitted on the data physical channel, the PDU may be defined as the data physical channel PDU.
[0087] Cyclic redundancy check (CRC): The size of the CRC may be 3 octets and may be calculated on the PDU of all LL packets. If the PDU is encrypted, then the CRC may be calculated after the encryption of the PDU is complete. The CRC polynomial has the form x24+x10+x9+x6+x4+x3+x+1.
[0088] Constant Tone (CTE): The CTE may consist of a constantly modulated series of unwhitened 1s. This field has a variable length that ranges from 16 microseconds to 160 microseconds.
[0089] FIG. 7D illustrates a PDU header. The PDU frame may contain 2 to 258 octets or bytes. It may have a header (2 octets) and a payload (1 to 255 bytes). Further, the payload may include the advertising data size.
[0090] The PDU header of 2 octets or bytes may define the way the transmitter behaves while the packet or payload contains data. The header frame may consist of 4 bits with various configuration options. The configuration parameter shown in bold in Table 1 may be not allowed, while the other parameters may be accepted for use in the proposed Bluetooth-based transaction.

PDU Type PDU Name Remark
0b0000 ADV_IND Connectable Scannable Undirected advertising.
0b0001 ADV_DIRECT_IND Connectable Directed advertising
0b0010 ADV_NONCONN_IND Non-Connectable Non-Scannable Undirected adv.
0b0011 SCAN_REQ Scan Request on Primary channels
AUX_SCAN_REQ Scan Request on Secondary channels
0b0100 SCAN_RSP Scan Response on Primary channels
0b0101 CONNECT_IND For Connection Req in Primary
AUX_CONNECT_REQ For Connection Req in Secondary
0b0110 ADV_SCAN_IND Scannable Undirected advertising
0b0111

ADV_EXT_IND Extended advertising Primary
AUX_ADV_IND Extended advertising Secondary
AUX_SCAN_RSP Scan Response on Secondary channels
AUX_SYNC_IND Periodic Advertising
AUX_CHAIN_IND Chaining of Sec. Advertising Packet
0b1000 AUX_CONNECT_RSP connection response packet sent on Secondary
Table 1
[0091] The configuration of other parameters of PDU Header Packet are indicated in Table 2 below:

PDU Type PDU Name Max Data Length (Payload Data-1 Byte) Legacy (BLE 4.X) compatibility
BLE 5.X and above compatibility
0b0010 ADV_NONCONN_IND 31 YES YES
0b0111
AUX_SYNC_IND 254 No
Yes
AUX_CHAIN_IND 254
Table 2
[0092] ChSel: 0 or 1. (1 if the advertiser supports the LE channel selection algorithm)
[0093] TxAdd: Preferred 0, else 1. (1 if the advertiser’s address is random, and set to 0 if the address is public)
[0094] RxAdd: Preferred 0 else 1 (1 if the target device’s address is random, and set to 0 if the address is public)
[0095] Length: Holds the length of the payload of the packet.
[0096] FIG. 7E illustrates a payload data structure. The payload data structure may contain 1 to 255 bytes of data. In case of lower than BLE 5.X, the maximum payload size may be 32 bytes (excluding SCAN_RESPONSE data of another 32 bytes) and for BLE 5.X it may be up to 255 bytes (excluding auxiliary channel advertisement). Further, the packet may be divided into a significant part and a non-significant part. The unused data in the frame may be called a non-significant part and transmitted as zero. The significant part may be further coded into multiple parts and called an advertisement data (AD) structure. Multiple ADs may fit one after another within the maximum length of the payload size. Each AD may contain one byte of length information and the other may include AD information which may be further split into an AD Type (1 byte), and an AD Data (variable). Hence, below the BLE 5.0 core specification, the maximum useable data may be less than 36 bytes and in BLE 5.X, it may be 254 bytes. One byte in each case may be used to denote the length of the significant data part of the payload data structure.
[0097] In an exemplary implementation, as per the available and usable data in the link layer of Bluetooth advertising “Payload frame” based in BLE 4.X or BLE 5.X, the data packetization is being done. Using auxiliary channels and an advertising chain, the BLE-5.X may send about 1.5 kilobytes of data in a single iteration of advertisement which is much higher than 36 bytes of data in BLE 4.X. The required data to be sent per application channel may be much higher than available data size in the link layer. During the situation, the “application data” may be divided into suitable chunks (that fit into the LL) and the advertisement data may be dynamically updated one after another.
[0098] In an exemplary embodiment, the BLE scanner may receive data to be broadcasted or advertised. There may be many devices broadcasting simultaneously on the same or different channels. Hence, scanning and filtration of data may involve a tedious and complex operation by the scanner. Based on the application and use-case area, the advertising interval may be further tuned.
[0099] The mechanism of updating an advertising packet may not be part of the BLE core specification and may be further dependent on the hardware chip manufacturer to provide a suitable interface to update the packet. In many hardware chips, the advertising data buffer may not be updated during transmission. In that situation, the transmission or broadcasting loop may be stopped to update the advertising data buffer which may ultimately add a time lag to the scanner. Hence, proper data or packet linkage information in subsequent advertising packets may be necessary to maintain the data integrity while reconstructing the complete advertisement data at the scanner end. Further, the data linkage mechanism may occupy a space within the payload data structure.
[00100] FIG. 7F represents an exemplary embodiment of the data linkage and the frame structure when the application data size is large with multiple advertisement packets. The “sequence number” and the “CRC” field as indicated in FIG. 7F, may be added to the payload data structure of the Bluetooth advertising payload frame. The sequence number may help in reconstructing the complete packet at the scanner. The CRC shall ensure data integrity which is optional and may be removed to increase useable data size buffer length. A sequence number of 1 byte may allow the transmission of 255 packets and a total length of 255xN bytes of advertising data.
[00101] As an example of BLE4.2, the maximum value of N shall be 25 Bytes (in available hardware) without CRC. Further, using multiple advertising packets, the BLE4.2 may send 1 kilobyte of application layer data in about 700 milliseconds without packet loss. In case packet loss, another 700 milliseconds may be required to reconstruct the entire data.
[00102] This method may be enhanced by enabling “SCAN_RESP” feature of the PDU type header configuration. The BLE Scanner on the other side may receive the advertised packet along with the source device address. The application layer data (at payload) may be constituted with a source device address to ensure the respective payload data and the device hardware originating from the same source.
[00103] In an exemplary embodiment, the application level data (used as payload data) may use the entire source device address or parts or derivation such as HASH or a few bytes of Hash, a digitally signed “device address” or encrypted “device address.”
[00104] FIG. 8 illustrates an exemplary representation of a detailed process flow including digital signature and encryption (800), in accordance with an embodiment of the present disclosure.
[00105] As illustrated, the SIM card may perform all the operations of a secure module. The SIM card consists of a secure memory and a secure processor. With a suitable partition, the applications inside the SIM card may also be placed to work independently without interfering with each other. In an exemplary implementation, two smartphones block (104) and block (108) may be participating devices intended for secure transactions. Both devices may communicate with PKI-enabled SIM cards indicated as block (1206) and block (1218) respectively. Further, the devices may contain identical functional logical sub-blocks with different working principles based on the use-case. All PKI-enabled SIM cards may interact with the remote certification authority (CA) as indicated in block (1222).
[00106] In an exemplary implementation, both devices (104) and (108) (sender and receiver) may contain components for transmission and reception.
[00107] The sender side (104) process flow may include the following:
[00108] The transaction may be initiated from a sender device indicated at block (104). Any authorized application prepares the data (in block (1202A)) to be sent securely to another device (block (108)). The plain text data in block (1202A) that needs to be protected may be sent to the PKI-enabled SIM card (1206) through an existing wired bus. The communication channels (1204A) and (1204B) may be optionally protected by a suitable SCP standard derived from Global Specification such as SCP-01/02/03 etc. The security standards may also provide “authorization” capabilities to the specific or selected application(s) residing in a user’s smartphone.
[00109] The SIM card (1206) of a sender (104) device may have a secure memory (1206A) and a secure processor (1206B). The secure memory (1206A) may contain pertinent sensitive data such as a sender’s private key (1206A-1) and a digital certificate (1206A-2). The private key may be generated at the very beginning of PKI initialization or the “key pair generation” process. The digital certificate may be obtained by interaction with remote CA as indicated in block (1222) during PKI initialization too.
[00110] The plain text data (1202A) is taken in a secure process block (1206B-1) in the SIM card’s secure processor (1206B). The encryption process is authorized by providing the user’s personal identification number (PIN) (1214A) and encrypted by the recipient’s public key.
[00111] The recipient’s public key is extracted from the recipient’s digital certificate (RDC). The RDC is made available to the sender’s device by two possible mechanisms: a) directly from the recipient’s device (desired and preferable) in case of pure offline (no internet or back-end connectivity), and b) from CA Server (1222) requesting with recipient’s identity such as a mobile number. In this case, when the other party’s digital certificate is obtained through an offline mechanism, the data route shall be a secure channel (such as (1204A), (1204B)) with host mobile, the data packetization block (1208-A), and the peripheral block (1210-A).
[00112] The encryption type performed in block (1206B-1) is asymmetric such as RSA or ECC or hybrid i.e. combination of symmetric algorithms such as AES, a DES, and a 3DES, etc., and asymmetric algorithms (RSA, ECC, etc.). The output produced at block (1206B-1) is secure data and transferred to data signing block (1206B-2).
[00113] The encrypted data is digitally signed by the sender’s private key (1206A-1) in the data signing block (1206B-2). The signing process ensures the origin of the transaction. It also requires the user’s authorization by providing a PIN block (1214A).
[00114] Once the data is encrypted (1206B-1) and signed (1206B-2) in the SIM card’s secure processor (1206), it goes back to the sender’s phone (104) for further step of data packetization block (1208A).
[00115] In the data packetization block (1208A), the encrypted data is prepared as per the modality of communication, which is a Bluetooth based transmission as per this disclosure.
[00116] In this context, it is necessary to mention that the same data packetization block (1208A) is also used for any auxiliary communication between the sender and the receiver to obtain the recipient’s RDC. For simplicity, it has not been indicated in the diagram.
[00117] Once the packetization is completed in block (1208A), the data is transferred to block (1210A) to select the suitable mode of communication.
[00118] Block (1210A) is a generic representation of communication modalities which can be one or multiple wireless/optical peripheral types such as WiFi, Bluetooth, QR, audio, etc. For example, sensitive data (1204-B) may use QR and Bluetooth in conjunction for communication. The selection and combination of communication modalities are user and use-case specific. A few specific use cases scenario may be referred to correlate the multiple communication modalities. Finally, the secured data is transferred via link block (1222) from the sender device block (104) to the recipient’s device block (108).
[00119] In an exemplary embodiment, the recipient’s side process flow may be given as follows:
[00120] The encrypted and signed data (1204-B) is transferred via link block (1222) from the sender’s device block (104) to the specific block (1210B) of the recipient block (108).
[00121] In a similar fashion to the sender’s block (1210A), (1210B) is also a generic representation of communication modalities at the recipient’s end and can be one or multiple wireless/optical peripheral types to receive data from single or multiple peripherals.
[00122] The data received at block (1210B) may be fragmented or may be available in parts as per communication property. The packets are sent to the depacketization block (1208B) where the depacketization block (1208B) reverses the operation as per the sender’s packetization block (1204A).
[00123] Once the depacketization is done, the entire data is available at the recipient’s side in an encrypted form. Data is sent to a PKI-enabled SIM (1218) of the recipient’s side via a wired link block (1204C) between the device (108) and the SIM card’s (1218) secure processing unit (1218B).
[00124] The communication channels (1204-C) and (1204-D) on the recipient’s side may be optionally protected by suitable SCP given by a global specification such as SCP-01/02/03 etc. The security standards may also give “authorization” capabilities to the specific or selected application(s) residing in a host smartphone by sharing suitable symmetric keys for communication layer security.
[00125] In an exemplary implementation, the recipient (104-2) may also contain the PKI-enabled SIM card (1218) with a secure memory (1218A) and a secure processor (1218B). The secure memory (1218A) may mandatorily contain sensitive data such as a recipient’s private key (1218A-1) and a digital certificate (1218A-2). The private key may be generated at the very beginning of PKI initialization or the “key pair generation” process. The digital certificate (1218A-2) may be obtained by interaction with a remote CA as indicated in block (1222) during the PKI initialization process.
[00126] Additionally, the recipient’s SIM card (1218) and the received encrypted data are sent to block (1218B-1) for verification of the sender’s digital certificate to ensure authentication and record of the transaction.
[00127] In an exemplary implementation, the sender’s public key is extracted from the sender’s digital certificate (SDC). The SDC is made available to the recipient’s device by the mechanisms:
[00128] a) Directly from the recipient’s device in case of pure offline (no internet or back-end connectivity) and
[00129] b) From the CA Server (1222) requesting the recipient’s identity.
[00130] In the case where the digital certificate is obtained through an offline mechanism, the data route shall be a secure channel (such as (1204-C), (1204-D)) with the host mobile, the data de-packetization block (1208-B), and the peripheral block (1210-B).
[00131] Further, once the digital signature is verified, the encrypted data is sent to the decryption block (1218B-2). The data originally encrypted with the recipient’s key at the sender’s SIM may be decrypted using the recipient’s private Key. The user authorization, the private key of the recipient (1218A-1), and the user authorization PIN (1214B) are required to perform the decryption process which may be RSA, ECC, or hybrid as per the type of encryption performed at the sender’s side block (1206B-1).
[00132] Furthermore, the output of the decryption process may regenerate the plain text data which was originally present at the sender’s side at block (1202A) and may now be available in the recipient’s device block (1202-B).
[00133] FIG. 9 illustrates an exemplary computer system (900) in which or with which the proposed system (110) may be implemented, in accordance with an embodiment of the present disclosure.
[00134] In an embodiment, the primary entity (104), the secondary entity (108), and/or the system (110) may be implemented as the computer system (900).
[00135] As shown in FIG. 9, the computer system (900) may include an external storage device (910), a bus (920), a main memory (930), a read-only memory (940), a mass storage device (950), communication port(s) (960), and a processor (970). A person skilled in the art will appreciate that the computer system (900) may include more than one processor and communication ports. The processor (970) may include various modules associated with embodiments of the present disclosure. The communication port(s) (960) may be any of an RS-232 port for use with a modem-based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. The communication port(s) (960) may be chosen depending on a network, such as a Local Area Network (LAN), Wide Area Network (WAN), or any network to which the computer system (900) connects.
[00136] In an embodiment, the main memory (930) may be Random Access Memory (RAM), or any other dynamic storage device commonly known in the art. The read-only memory (940) may be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chip for storing static information e.g., start-up or basic input/output system (BIOS) instructions for the processor (970). The mass storage device (950) may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces).
[00137] In an embodiment, the bus (920) may communicatively couple the processor(s) (970) with the other memory, storage, and communication blocks. The bus (920) may be, e.g. a Peripheral Component Interconnect PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface (SCSI), USB, or the like, for connecting expansion cards, drives, and other subsystems as well as other buses, such a front side bus (FSB), which connects the processor (970) to the computer system (900).
[00138] In another embodiment, operator and administrative interfaces, e.g., a display, keyboard, and cursor control device may also be coupled to the bus (920) to support direct operator interaction with the computer system (900). Other operator and administrative interfaces can be provided through network connections connected through the communication port (960). Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system (900) limit the scope of the present disclosure.
[00139] While considerable emphasis has been placed herein on the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the disclosure. These and other changes in the preferred embodiments of the disclosure will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be implemented merely as illustrative of the disclosure and not as a limitation.

ADVANTAGES OF THE INVENTION
[00140] The present disclosure provides a system and a method with Bluetooth technology that facilitates communication between devices without the need for pairing.
[00141] The present disclosure provides a system and a method with Bluetooth technology that requires lesser power consumption.
[00142] The present disclosure provides a system and a method with Bluetooth technology that utilizes one or more advertising channels for broadcasting data.
[00143] The present disclosure provides a system and a method with Bluetooth technology that broadcasts data with a configurable interval while reducing interferences.

, Claims:1. A system (110) for communication of data between a primary entity (104) and a secondary entity (108), the system (110) comprising:
one or more processors (202) operatively coupled with the primary entity (104) and a memory (204), wherein said memory (204) stores instructions which when executed by the one or more processors (202) cause the one or more processors (202) to:
generate one or more data parameters based on one or more target applications requested by one or more users (102), wherein the one or more users (102) are associated with the primary entity (104), and wherein the primary entity (104) is operatively coupled with a subscriber identity module (SIM) card;
encrypt, using one or more primary techniques, the generated one or more data parameters based on the requested one or more target applications;
determine a mode of communication (106) based on the generated one or more encrypted data, wherein the determined mode of communication (106) comprises at least a Bluetooth mode of communication; and
enable the communication of the one or more encrypted data from the primary entity (104) to the secondary entity (108) via the determined mode of communication (106).
2. The system (110) as claimed in claim 1, wherein one or more advertising channels are associated with the Bluetooth mode of communication to enable the communication of the one or more encrypted data from the primary entity (104) to the secondary entity (108).
3. The system (110) as claimed in claim 2, wherein the one or more processors (202) are configured to transmit a public address and a private address associated with the one or more advertising channels of the Bluetooth mode of communication.
4. The system (110) as claimed in claim 1, wherein the Bluetooth mode of communication (106) uses a data link layer with a physical specification of 4.X (LE 1M PHY) and 5.X (LE 2M PHY).
5. The system (110) as claimed in claim 4, wherein the data link layer comprises at least a preamble, an access address, a protocol data unit (PDU), a cyclic redundancy check (CRC), and a constant tone (CTE).
6. The system (110) as claimed in claim 1, wherein the one or more encrypted data is transmitted using a configurable interval ranging from 20 milliseconds to 10.24 seconds with a delay of 0 seconds to 0.625 milliseconds.
7. The system (110) as claimed in claim 2, wherein the primary entity (104) and the secondary entity (108) comprise one or more Bluetooth low energy (BLE) scanners to transmit and receive the one or more encrypted data through the one or more advertising channels.
8. A method for communication of data between a primary entity (104) and a secondary entity (108), the method comprising:
generating, by one or more processors (202), one or more data parameters based on one or more target applications requested by one or more users (102), wherein the one or more users (102) are associated with the primary entity (104), and wherein the primary entity (104) is operatively coupled with a subscriber identity module (SIM) card;
encrypting, by the one or more processors (202) using one or more primary techniques, the generated one or more data parameters based on the one or more target applications;
determining, by the one or more processors (202), a mode of communication (106) using the one or more encrypted data, wherein the determined mode of communication (106) comprises at least a Bluetooth mode of communication; and
enabling, by the one or more processors (202), the communication of the one or more encrypted data from the primary entity (104) to the secondary entity (108) via the determined mode of communication (106).
9. A user equipment (UE) (104) for communication of data to a secondary entity (108), said UE (104) comprising:
a subscriber identity module (SIM) card;
one or more primary processors communicatively coupled to one or more processors (202) in a system (110), the one or more primary processors coupled with a memory, wherein said memory stores instructions which when executed by the one or more primary processors causes the UE (104) to:
generate and transmit one or more data parameters based on one or more target applications requested by one or more users (102), wherein the one or more users (102) are associated with the UE (104),
wherein the one or more processors (202) are configured to:
receive the one or more data parameters from the UE (104);
encrypt, using one or more primary techniques, the generated one or more data parameters based on the requested one or more target applications;
determine a mode of communication (106) based on the generated one or more encrypted data, wherein the determined mode of communication (106) comprises at least a Bluetooth mode of communication; and
enable the communication of the one or more encrypted data to a secondary entity (108) via the determined mode of communication (106).
10. A subscriber identity module (SIM) card for enabling communication of data to a secondary entity (108), the SIM card comprising:
one or more processors communicatively coupled to one or more processors (202) in a system (110), the one or more processors coupled with a memory, wherein said memory stores instructions which when executed by the one or more processors causes the SIM card to:
generate one or more data parameters based on one or more target applications requested by a user (102);
encrypt, using one or more primary techniques, the generated one or more data parameters based on the requested one or more target applications;
predict, using an artificial intelligence (AI) engine (210), a Bluetooth mode of communication (106) based on the generated one or more encrypted data; and
enable the communication of the one or more encrypted data from the SIM card associated with a primary entity (104) to the secondary entity (108) via the Bluetooth mode of communication (106).

Documents

Application Documents

# Name Date
1 202322005696-STATEMENT OF UNDERTAKING (FORM 3) [28-01-2023(online)].pdf 2023-01-28
2 202322005696-REQUEST FOR EXAMINATION (FORM-18) [28-01-2023(online)].pdf 2023-01-28
3 202322005696-POWER OF AUTHORITY [28-01-2023(online)].pdf 2023-01-28
4 202322005696-FORM 18 [28-01-2023(online)].pdf 2023-01-28
5 202322005696-FORM 1 [28-01-2023(online)].pdf 2023-01-28
6 202322005696-DRAWINGS [28-01-2023(online)].pdf 2023-01-28
7 202322005696-DECLARATION OF INVENTORSHIP (FORM 5) [28-01-2023(online)].pdf 2023-01-28
8 202322005696-COMPLETE SPECIFICATION [28-01-2023(online)].pdf 2023-01-28
9 202322005696-FORM-8 [30-01-2023(online)].pdf 2023-01-30
10 202322005696-ENDORSEMENT BY INVENTORS [24-02-2023(online)].pdf 2023-02-24
11 Abstract1.jpg 2023-03-17