https://store-images.s-microsoft.com/image/apps.25988.b08feacb-6f08-4608-aff4-f14499ea8885.bd0bc7d7-6e1d-4317-8846-95b125decfcb.7e9b595d-8421-4e10-ab53-caaaebef8293

BLE Authentication Module

Connax Oy

BLE Authentication Module

Connax Oy

Touchless proximity & context-based Bluetooth authentication for Physical Web

BLEAM or Bluetooth Low Energy Authentication Module is changing the way how we get services, buy products, open doors, pick up parcels and so on. It automates and simplifies our interactions with the surroundings with proximity and context-based Bluetooth authentication. There’s no more need to touch screens or press buttons, with BLEAM you can get what you need in flawless and Touchless manner.

BLEAM stands for Bluetooth Low Energy Authentication Module. It uses Bluetooth beacons to determine the precise location of a person or object. These Bluetooth beacons are alway installed in a static location that we call Service Area. In order to activate Bluetooth in certain locations it has to be geofenced. When the end user enters the geofence area the BLEAM system activates itself and starts searching for the end user’s precise location inside the Service Area. To avoid any doubt in the BLEAM platform a location where service or product is based should be geofenced and then set up in a correct way which in turn forms a Service Area.

BLEAM on mobile has a possibility to function without mobile apps open, but it applies only to Android devices. On iOS devices it’s a bit more complex due to Apple security requirements. Android OS offers more opportunities for apps to work in the background. There BLEAM runs as a foreground service, showing silent notification while operating.

Even though we want to make our solution not only Touchless but beaconless we are forced to use beacons. Beacons are used to improve location precision and security of the system. BLEAM beacons utilise Ruuvi hardware and proprietary software and eventually called Bleam beacons. It’s possible to purchase BLEAM beacons for research, development, testing and other purposes here.


With BLEAM the end user’s phone doesn’t have to scan for beacons (as it usually happens). What happens is BLEAM beacons are scanning for the phone. Hence it means that the phone is acting as a beacon and BLEAM beacons are acting as scanners. End user’s phone is transmitting data while BLEAM beacons are connecting to it in order to find out signal strength and determine the precise end user’s phone location in space. It’s a strong and secure method, because the end user’s phone is verifying a source (BLEAM beacon) with a digital signature generated on board.
https://store-images.s-microsoft.com/image/apps.26369.b08feacb-6f08-4608-aff4-f14499ea8885.d7e40cda-2cb5-4ab1-8d60-fbb4348d7d83.368b5f2a-f6b5-4758-902d-ae4dabcec8c4
https://store-images.s-microsoft.com/image/apps.26369.b08feacb-6f08-4608-aff4-f14499ea8885.d7e40cda-2cb5-4ab1-8d60-fbb4348d7d83.368b5f2a-f6b5-4758-902d-ae4dabcec8c4
https://store-images.s-microsoft.com/image/apps.28887.b08feacb-6f08-4608-aff4-f14499ea8885.d7e40cda-2cb5-4ab1-8d60-fbb4348d7d83.fbc43863-b26e-412b-8e92-25f13aef8e7d
https://store-images.s-microsoft.com/image/apps.59984.b08feacb-6f08-4608-aff4-f14499ea8885.d7e40cda-2cb5-4ab1-8d60-fbb4348d7d83.de033755-e579-4080-ba4a-5475cd6680f9