Product Specs

Page 14 of 18
© copyright Axa-Stenman, 2019, Bluetooth E-RL 2 Product Specification V1.00
When in a data connection, an adaptive frequency-hopping algorithm is used. Adaptive
frequency hopping makes it possible for a given packet to be remapped from a known
bad channel to a known good channel so that the interference from other devices is
reduced. To do this, a channel map of good and bad channels is kept in both devices. If
the channel that would have been chosen by the master device is a good channel, then
that channel is used; if the channel that would have been chosen is a bad channel, then
it is remapped onto the set of good channels. A minimum of two data channels must be
marked as good by a master.
Suppose, for example, that a Bluetooth low energy device is in the same area as a Wi-
Fi channel 1 access point that is streaming data to another Wi-Fi device. The Bluetooth
low energy device would mark Link Layer data channels 0 to 8 as bad channels. This
means that when the two devices are communicating, they would cycle through the
channels and remap these channels to a set of good channels,
1.2 System Description
Making the complicated system setup of the trusted third party KeySafe cloud service
and its operation clear a visualization in Figure 7 is helping cement the concept of the
KeySafe cloud service. The renting app on the smartphone is detecting the presents of
bikes available for renting and offering this to the customer. The customer is making
his or her selection and the app is sending renting details to the renting companies’
backend computer system for availability. When approved by the renting agent
backend computer system an specific eKey type will be requested for this particular
bike from the KeySafe, the cloud computer is generating a certificate holding
information regarding the bike, renting time and type of eKey. The KeySafe cloud will
forward this information including a freshly generated passkey in case of pairing and
bonding eKey type to the requesting rental agent backend computer who will forward
this information to the renting app.
Figure 7.
It’s up to the renting app to present the certificate to the E-RL 2 BLE service on the
selected bike for verification and approval and send the passkey using an API call to
the OS on the smartphone. When the certificate is accepted by the E-RL 2 and
depending on the type of eKey a secure pairing/bonding sequence will follow providing