We PROTEUS-III User Manual page 133

Hide thumbs Also See for PROTEUS-III:
Table of Contents

Advertisement

WIRELESS CONNECTIVITY & SENSORS
User manual Proteus-III
Bit no.
Description
Security mode configuration. Depending on its value, different modes are chosen
when setting up a secure connection. In firmware version 2.1.0 and newer the
peripheral decides which is the minimum security level to access its data.
0x0
No security
LESC just
0x1
works
level 1.2
Just works
0x2
level 1.2
2 : 0
Static pass key
0x3
level 1.3
LESC numeric
0x4
comparison
level 1.4
LESC pass key
0x5
level 1.4
others
SECFLAGS_BONDING_ENABLE : If this Bit is set, bonding is enabled when using one of the
pairing methods. Bonding data of up to 32 devices will be stored in the flash. If
3
bonding storage is full, the bonding information that has not been used for the longest
period will be removed.
SECFLAGS_BONDEDCONNECTIONSONLY_ENABLE : If this Bit is set, only bonded peer devices
are allowed to connect. All connection requests from any unbonded peer device are
rejected. In case this restriction shall be disabled temporarily to setup a bonding to a
4
new peer device, use the command CMD_ALLOWUNBONDEDCONNECTIONS_REQ , which
temporarily disables this restriction. If this feature is enabled, the maximum number of
bonded devices is reduced to 8.
7 : 5
Reserved
Since the security modes "Lesc pass key" and "Lesc numeric comparison" out-
put the LESC key on the UART, it is essential to use the command mode.
In other words, the peripheral only mode does not support the lesc security
modes.
Order code 2611011024000
Version 1.8 , July 2022
Data is transmitted without authentication and encryption.
Each time a connection is established, new random keys
are exchanged in advance to use them for data
encryption. This mode uses the "just works" method with
keys generated by the LESC method (low energy elliptic
curve)
Each time a connection is established, new random keys
are exchanged in advance to use them for data
encryption. This mode uses the "just works" method.
For authentication, the RF_StaticPasskey is used. If the
peripheral uses this method, the central device must
enter the correct passkey to finalize the connection.
For authentication, the peripheral and central device
output a pass key. The central and peripheral device
must confirm the pass key to finalize the connection in
case both keys coincide. Otherwise reject it to cancel the
connection. The pass key is generated using the LESC
method (low energy elliptic curve).
For authentication, the peripheral outputs a passkey. The
central device must enter this pass key to finalize the
connection. The pass key is generated using the LESC
method (low energy elliptic curve).
Reserved
Table 71: Security configuration flags
131
www.we-online.com/wcs

Advertisement

Table of Contents
loading

This manual is also suitable for:

Proteus-iii-spi26110110240102611011024000

Table of Contents