Academia.eduAcademia.edu

BLUETOOTH LOW ENERGY, BEACONS AND RETAIL TABLE OF CONTENTS

within the industry about how they will change retail payments.

BLUETOOTH LOW ENERGY, BEACONS AND RETAIL Announcements by Apple® and PayPal® have generated a frenzy and massive speculation within the industry about how they will change retail payments. Both certainly have the potential for disruption and new applications, but the reality is more complex. This white paper explains the technology and some of the factors which will shape their use and determine their eventual success. Erik Vlugt VP, Product Marketing Twitter: @ErikVlugt VERIFONE HEADQUARTERS 2099 Gateway Place, Suite 600, San Jose CA 95131 Phone 408.232.7800 • Fax 408.232.7811 • www.verifone.com © 2013 VeriFone. All rights reserved. VeriFone and the VeriFone Logo are either trademarks or registered trademarks of VeriFone in the United States and/or other countries. All other trademarks or brand names are the properties of their respective holders. All features and specifications are subject to change without notice. Reproduction or posting of this document without prior VeriFone approval is prohibited. TABLE OF CONTENTS Bluetooth Low Energy – the Background .............................................................................. 3 Beacons – the Underlying Technology .................................................................................. 4 PayPal Beacon ......................................................................................................................... 7 iOS7 .......................................................................................................................................... 7 Beacon Suppliers and Practical Issues .................................................................................. 8 Indoor Location and Mapping ................................................................................................10 Geofencing ..............................................................................................................................10 Proximity .................................................................................................................................10 Notification ..............................................................................................................................11 Limitations...............................................................................................................................11 Conclusion ..............................................................................................................................12 Page 2 October 23, 2013 BLUETOOTH LOW ENERGY, BEACONS AND RETAIL BLUETOOTH LOW ENERGY – THE BACKGROUND ® The specification for Bluetooth Smart, also known as Bluetooth low energy (BLE), was released in June of 2010. Although bearing the Bluetooth name, it is a completely new specification, designed to enable very low-power devices which can run for months or even years off small batteries such as coin cells. Its ® history dates back to 2001, when Nokia attempted to have it selected as the core technology for the IEEE 802.15.4 initiative for a low-power, short-range radio. The IEEE group chose the proposal that was ® to become ZigBee , but the Nokia effort continued internally, eventually emerging as their Wibree standard. The Bluetooth SIG struggled for several years trying to find a way to reduce the overall power of classic Bluetooth, and failed to reach a compromise that met the conflicting criteria for a truly low-power wireless standard. When Nokia offered the SIG the Wibree standard as a basis for this next generation, low-power solution in 2007, they used it as a starting point for what was to become BLE. It is important to realize that BLE is an entirely new standard. It is effectively a “blank sheet of paper design,” drawing on Nokia’s expertise, low-power radio techniques that had been developed by Nordic Semiconductor for the ANT™+ standard and the input of most of the world’s leading experts in low-power radio and protocols. The standards architects also took advantage of developments in wireless from the previous decade, with the aim of achieving a cost/performance point that would enable a market of hundreds of billions of accessory products. BLE’s connection with Bluetooth is that its design allows it to be implemented as an increment to the existing Bluetooth chips that are in mobile phones, laptops and tablets, sharing the same radio and a modified protocol stack. Although a new generation of chip is required to run BLE, these became available at the same time as a reduction in process geometry, meaning that these “dual-mode” chips are cheaper than the previous generation of single-mode Bluetooth classic chips. Although the chips in phones and tablets support both Bluetooth standards, BLE allows for the design of single-mode chips for use in low cost, battery powered peripheral devices. These are far simpler chips, which are increasingly highly integrated, containing the BLE radio, a processor running the BLE stack, and an additional processor and memory to run an application. All that’s needed to turn these into complete devices is the application code, a battery, a sensor and an enclosure. Page 3 October 23, 2013 Since 2010, dual mode chips have been built into in an increasing number of smartphones, tablets and ® ® laptops. Apple has incorporated them in all products since the iPhone 4s and iPad 3, they are in most ® new Android™ phones and Nokia has included them within all of its Windows phones. Both Apple and ® Google (Android) have released APIs for application developers. This has stimulated a renaissance in ® hardware design, including crowd-funded projects on sites like Kickstarter , where the majority of shortrange wireless projects now use BLE. BLE is already present in hundreds of millions of devices. That number is projected to increase by 1 billion additional devices each year for the next few years as smartphone and tablet penetration increases. BEACONS – THE UNDERLYING TECHNOLOGY Since Bluetooth’s launch, various companies have looked at the possibility of using Bluetooth for advertising – pushing information to phones when the phone comes within range of a fixed transmitter. Although several companies exist within this area, it is an awkward experience that leverages classic Bluetooth technology and it is poorly supported across phones. A major drawback is that classic Bluetooth cannot broadcast messages to unfamiliar phones – instead it needs to identify the presence of each individual phone and then send a targeted message. To prevent multiple messages appearing, the transmitter needs to keep a log of which phones it has previously sent messages to, incurring a considerable level of complexity and cost. BLE changes this by including a range of broadcast advertising modes. These are fundamental to the technology and used for the discovery and pairing process, essentially creating a much better user experience when pairing & connecting. However, they can also be used for general, unacknowledged advertisements that can be detected by any phone with its Bluetooth receiver turned on. It is this which makes low cost Beacons possible. PERIPHERALS AND CENTRALS The BLE standard defines two types of devices – a Peripheral device, which is assumed to be a lowpower device that exposes state or information, and a Central device. The Central is usually either a powered device, or one with significantly greater processing capability and a rechargeable battery, e.g. a phone or tablet. Unlike classic Bluetooth, the Peripheral and Central are very asymmetric in their resource needs, with the standard being designed to minimize the complexity, power requirements and costs of the Peripheral. In most cases, a Peripheral device spends the majority of its life asleep, only waking when it needs to send data. Page 4 October 23, 2013 SCANNERS AND ADVERTISERS Advertising is the first thing that BLE devices do when they’re turned on. A peripheral uses advertising packets to broadcast information that any other BLE device within range can hear. To listen to these, Central devices implement a Scanner mode, in which they listen for these advertisements. Both devices move from an idle state to that of either an advertiser or a scanner. The BLE standard divides the 2.4GHz spectrum into thirty-nine 2.0 MHz wide channels. Thirty-six of these are reserved for data, only used by devices that have paired with each other. The remaining three channels are used for advertisements. These three channels were specifically chosen to avoid the main ® channels used by Wi-Fi access points, to minimize interference. When a peripheral wants to broadcast, it starts an advertising event, where the same packet of information is transmitted sequentially on each of the three advertising channels. Devices operating as scanners will detect one of these, and pass the information it contains to the higher level protocol stack and application. ADVERTISING PACKETS This is where we get to the value of the specification, at least as far as location and advertising is concerned. Although the primary aim of advertising packets within the specification is to allow for the discovery of devices and make a secure connection, they also permit small amounts of data to be transmitted for any other device to hear. There are four different types of advertising packets defined, of which three are of interest. These are: • Non-connectable Advertising, where a device transmits a string of data, but will not respond to any request and cannot make a connection. This is the most common mode for beacons and can be • implemented using only a transmitter, with no receiver. Discoverable Advertising is similar, but a scanning device can request more information. This option allows a second packet of data to be sent to an application without the need to make a connection. Discoverable advertising provides the ability to request more data. Although potentially useful, most beacons would send information in a non-connectable advertisement packet directing a central device to access further information from a secondary source, such as a website accessible • via a cellular or Wi-Fi link. Discoverable advertising cannot be used to initiate a connection. • make a connection, which may be short term or permanent. General Advertising, where, in addition to the options above, a scanner can request that the beacon There is a fourth mode, known as Directed Advertising, which is used to quickly re-establish a previously negotiated connection. This is not relevant to beacons, and is not currently supported in iOS7. Page 5 October 23, 2013 Advertising packets consist of a header and a maximum of 27 bytes of advertising data. This can contain multiple items, each grouped as a triplet of an identifying byte defining the data format, the length of the contents, and the content. Defined formats include the signal strength, a local name, the Bluetooth service, configuration flags and manufacturer specific information. iBEACONS Initially, one of the driving use cases for the development of BLE was proximity, which used a signal strength measurement to determine when two devices move out of range of each other. Supported by Nokia, this evolved into the Proximity profile. However, it is targeted at devices that have established a connection, generating an alert when the link budget falls below a preset level. Despite having an associated use case of location and positioning, efforts within the Bluetooth SIG to adopt a profile for this application lost momentum. This has given a number of companies the opportunity to define their own proprietary profiles. In July, these were largely made irrelevant when Apple announced its iBeacon ® specification as part of iOS7, effectively discrediting any previous attempt to define a beacon profile. Apple iBeacon defines four data elements or identifiers residing within the advertising packets of compliant iBeacons. They are: • A Proximity ID, which is a unique 128bit string that identifies the beacon. This may be unique to an iBeacon, but is more likely to relate to a store, or even chain of stores. Continuing that • example, within a store, individual iBeacons can be distinguished by: • including department or even aisle. Identifiers, a number of identifiers that could define a number of relevant location parameters The Transmitted Signal Strength. This is a Bluetooth defined advertising element, which can be interpreted in conjunction with the signal strength to determine the approximate distance to the beacon. The iBeacon specification classifies these into one of three categories - close, intermediate or far away. ® One of the best ways to think about an iBeacon packet is as a wireless QR code. The advantage of an iBeacon packet, as we will see below, is that it can initiate an application response on an iOS7 phone, without any user intervention. An iBeacon transmits these packets on a regular basis, typically once per second. There is no reason why it can’t transmit different packets of advertising data at different times, or alternate the content. More complex applications may emerge as we start seeing actual implementations. Page 6 October 23, 2013 PAYPAL BEACON PayPal announced their PayPal Beacon shortly after Apple’s iBeacon announcement. It is a far more sophisticated system than the one described by Apple. iBeacon only requires simple transmitters, although the needs of installation and device management probably mean they will be more complex. In contrast, the PayPal Beacon requires a connection with the smartphone, which is then authenticated by a remote PayPal server. From the limited amount of released information, the process appears to be: 1. The PayPal Beacon advertises its presence, presumably using General Advertising packets. A phone running the PayPal application then makes a secure connection to the PayPal Beacon and identifies itself. 2. The PayPal Beacon also includes a Wi-Fi connection, which passes the phone details to a PayPal server. This starts a secure end-to-end authentication with the phone. User data is encrypted and passed back to the phone. This is used to check the user in to the store. 3. Once checked in, details of the authorized PayPal user are then passed to POS systems within the store. 4. When the user goes to pay, they further “authenticate” themselves using: a. A 4-digit randomly generated passcode that is sent to the phone and entered into the payment device by the user b. A QR code that is displayed on the phone, which can be scanned c. A picture the customer presents to the clerk who compares it with a stored profile picture It is not clear whether PayPal intends to open up the protocol and apps to general application developers. This may be unlikely as the system is 100 present focused on financial transactions at this time. However, they are currently asking application developers to submit ideas. iOS7 By itself, iBeacon is not particularly interesting. It is a very simple use of the BLE standard and many companies have already announced similar beacons. What will provide the real impact, are the features of iOS7. In iOS7, Apple added a feature that permits a phone to scan and detect advertisements from iBeacons in the background, passing up information and starting an application only when they are found. This has a profound effect on the user experience. Once the app is loaded on the phone, it can remain dormant until an appropriate iBeacon is discovered. iBeacon advertisements can be filtered and directed to specific apps, or used to initiate actions within PassBook. All of this takes place with no user intervention and minimal impact on battery life. It opens up the opportunity for “silent” apps that harvest user data and Page 7 October 23, 2013 send it to a server for value-added analysis. However, although iOS7 enables background applications, most application developers are likely to encourage users to interact with the apps, as they see the app as their brand. This suggests there may be a divergence between shopping apps residing on the phone and data-centric applications, which rely on real time server analysis. Apple devices supporting BLE and iOS7 can themselves act as iBeacons. It remains to be seen what applications may leverage this, but it is more likely in the social apps area. BEACON SUPPLIERS AND PRACTICAL ISSUES The concept of using BLE beacons to transmit coordinates or advertising messages is not new. It has been publicized since the early days of the standard as a major potential application. As a result, a number of companies have already grown up supplying this form of beacon, notably Estimote, Roximity, and indoo.rs. DEVICE MANAGEMENT Introducing iBeacons into a retail environment poses two practical challenges: • • How to install them, i.e. entering a unique set of information into each beacon? And How to maintain them, particularly in terms of software updates Both of these require a method of sending information to program or update the iBeacon. This can be done manually, by plugging it into a commissioning tool – typically a laptop, or wirelessly using some form of Over the Air (OTA) upgrade. Whatever the method, from the simplicity of a peer-2-peer connection between beacon and commissioning tool, to a wider device management infrastructure, it needs to be done securely. There is currently no standardized way of doing this. It will be one way in which iBeacon manufacturers differentiate their offering. However, for a large store, which might have hundreds or thousands of iBeacons, it is a very serious consideration. It will have an impact on the price of the beacons and the overall cost of ownership. The actual technology portion of a BLE iBeacon is low. The management capability cost is likely to be significantly higher. PayPal Beacon appears to have addressed this by incorporating a Wi-Fi backhaul for authentication, which can also be used for updating and device management. Page 8 October 23, 2013 PLACEMENT AND INTERFERENCE BLE is designed to coexist with other transmitters in the 2.4GHz band, most notably Wi-Fi. iBeacons only use the three advertising channels, which have been chosen specifically to avoid the standard Wi-Fi channels. The transmissions are very short and robust to interference. However, careless installation next to Wi-Fi access points will likely result in problems. If iBeacons are positioned on metal shelves, or if the iBeacons are placed behind metal stands, there will be a level of attenuation, which may result in inaccurate triangulation within apps that use them for location. This is largely an education issue for installers and retailers, but needs to be addressed. An additional challenge is posed for beacons that transmit a specific location and that need to be installed at a predetermined, fixed location to allow a mapping application to triangulate with them. SECURITY Advertisements from BLE Beacons are not secure. By their nature they are open and can be read by any device. As all of the data in the iBeacon is readable and is repeated in each consecutive transmission, it is possible for hackers to capture and replay it, emulating the beacon either using their phone, or by programming a small, low cost beacon placed elsewhere in the store. Sending incorrect or spurious information is a lower risk. Unless it has meaning for the phone, it should be discarded by the application. There will almost certainly be cases where this happens. Whether it will be destructive or a short term nuisance is yet to be determined. PayPal has taken a more robust approach, where the Beacon is purely the start of a complex security negotiation. This is not likely to be hacked, nor is it likely that it would be disrupted by copies of beacons. APPLICATIONS OF iBEACONS The big question is, “What will iBeacons do for retail?” There are some obvious applications, which are detailed below, along with some less obvious ones. All of them have the potential to change the way in which consumers and retailers interact with each other. Beacons will certainly have an impact on loyalty schemes, which now have the potential for microsegmentation. Once retailers can access the information from customers’ apps, it takes us into a world that is no longer restricted to knowing what someone buys, but one in which retailers can see how they buy. Many of the application areas are similar, relying on the ability to detect the distance from a beacon. iOS7 provides features that can use this information in a number of different ways, hence applications can be divided into some distinct, albeit closely related areas. Page 9 October 23, 2013 INDOOR LOCATION AND MAPPING The simplest application is indoor mapping. Here beacons provide location information, which a user app can utilize to guide them through a store or indoor public space. Nokia is taking a conventional approach, using advertisements that transmit standard location information (lat, long and elevation). This works well with their existing Nokia Maps applications, effectively adding an indoor element to an existing API. Because this data is constant and fits an established industry, it can easily be used by developers to generate other applications. As well as indoor guidance, it allows an app to save a breadcrumb trail of the user’s path, which can be uploaded and analyzed, either to understand the user’s decision-making process, or to validate the efficiency of the store layout. Apple’s recent purchase of indoor mapping company WiFiSLAM, along with their internal mapping solution, suggests they also have an eye on iBeacons for location. By using multiple beacons, applications can triangulate to determine position more precisely. Although technically feasible, the greater the accuracy, the more processing power is required, and the greater the impact on battery life. GEOFENCING Geofencing is a special form of location, where devices use beacons to limit or check the area in which a user is moving. Within iOS7 there is a geofencing function, where an application can instruct the device to check whether it remains within a defined range of a beacon or set of beacons and then alert an application if it moves outside that range. The advantage inferred by this is that the ranging function operates in the background, consuming very little power until it detects that the geofencing parameters have moved out of the defined range, at which point it alerts the application. The specific use of this functionality is unclear but it could include route planning and monitoring throughout a retail establishment. PROXIMITY Unlike the Bluetooth SIG and Nokia’s take on proximity, most beacon suppliers, including Apple, have a simpler view, which is to detect when a central device comes within range of a beacon. This provides the most straightforward customer engagement application, which is “Welcome to the store” or “Welcome to the electronics department.” Page 10 October 23, 2013 Writing an app to display a message on a phone is trivial and of very limited use. But the underlying alert can trigger far more subtle interactions. This is the starting point of the PayPal beacon system, where the user is signed into the store. While PayPal take a secure approach, with back-end authentication, it’s easy to see other applications emerging which interact with data preloaded into a phone app, or accessed via an alternative data link to download web or server based information. As the transmit power of beacons can be turned down to enable a very low range, this can be very selective – down to a specific area within a specific department. As more Beacons are deployed, many with very limited range, the order in which they are detected provides an accurate breadcrumb trail of how a consumer has progressed around a store. For supermarkets, it gives information on how they have walked through the store, providing valuable information on aisle usage. For department or clothing stores, it indicates how long users have stayed in each section and how often they may have returned to the same point. A hole in this argument is that the store only knows the routes of the user if they can access the beacon data recorded on the phone, as the beacons themselves have no way of locating the phone. This implies that the user has downloaded an application on their phone, which uploads their beacon trail to a server, which runs analytics to make value decisions in real time. This real-time consumer data is the crown jewel of beacon technology and will probably be fiercely fought over, as stores and third party applications vie for the users’ attention and ownership of their data. Whoever manages to own it will be in possession of data that will tell them not what consumers buy, but how they buy. NOTIFICATION So far, the applications of BLE only need simple transmit only beacons. Once beacons are connected to a network to provide device management, they can potentially transmit alternative data in their advertising packets to push messages or offers to previously identified users. While this is possible, it requires a degree of real-time feedback and needs to be treated with care. As explained above, messages from beacons can easily be picked up and replicated by others, so it is difficult to send an offer to a subgroup of customers within the store. Individual promotions can be sent over an alternative network – either Wi-Fi or cellular, but that complicates the applications and back-end delivery mechanism LIMITATIONS Much of the enthusiasm for beacons has been fueled by the fact that Apple has attempted to own the initiative. The real innovation, as stated above, is not the beacon, but the background routines in iOS7 that allow Apple devices to interact with beacons with minimal power consumption. Page 11 October 23, 2013 Android devices can support the same applications, but currently all of the scanning is performed by the Android application. This takes considerably more power and is likely to be less convenient for consumers. In time they will probably provide the same functionality, but in the short-to-medium term it means that most innovation will happen around iPhones. Nokia will add a BLE stack upgrade for their most recent phones, but have no timescale to provide a user API. This is a third party stack and not a native Microsoft solution. It is being introduced as an interim solution to prevent Nokia falling even further behind the market leaders in terms of BLE applications. Presumably any of their beacon applications will remain proprietary until Microsoft releases its own Windows Mobile solution. CONCLUSION Beacons and beacon applications are about to emerge in retail. How much of its success will be hype and how much disruption it causes remains to be seen. What is apparent is that the Apple effect, coupled with some innovative app developers and the availability of beacons from many companies provides all of the ingredients for major innovation. Retailers should keep a careful eye on this innovation as it can drive the opportunity for increased customer engagement. BLE should be perceived as an exciting new enabling technology that has the ability to affect many aspects of the retail customer experience. The applications for BLE will include payments but BLE by itself it should not be viewed as a direct alternative to existing cards, NFC, EMV, or other mobile wallet schemes. BLE can be the enabler for a number of new ways to interact and pay in the store but it is unlikely to instantly replace any existing technology. Instead, it is likely to be positioned as a complementary technology to add GPS-style and “check-in” functionality to new and existing payment schemes. With regard to payment, BLE makes store check-in and intelligent interaction much easier to implement. The fundamental challenge with regard to the consumer authentication is not natively addressed by BLE, which is why PayPal added the PIN and barcode authentication. Apple will likely look to Touch ID™ as a technology to authenticate users as well. As the enabler of commerce, VeriFone is happy to discuss BLE and related technologies with you to help determine the best solution for your specific environment. Please contact your VeriFone representative for more information. Page 12 October 23, 2013