Reference Manual

Table Of Contents
connection) when a connection is initiated. When using this method, the peripheral and
central device output the new generated pass key (see
CMD_DISPLAY_PASSKEY_IND
) when a
connection setup has been initiated. Both, the central and peripheral device request their
hosts to confirm that both keys coincide (see
CMD_NUMERIC_COMP_REQ
). If both devices con-
firmed the key, the channel will be opened for data transmission. Otherwise, the connection
will be rejected.
Example: Secured connection with security method "LescNumComp"
1. Power-up the modules and make their UARTs accessible by the host(s) (115200 Baud,
8n1). After the power-up or after reset the following sequence is sent from the module
Info Module A Module B
Response
CMD_GETSTATE_CNF
: Module A
started in
ACTION_IDLE
mode.
02 41 02 00 01 01 41
Response
CMD_GETSTATE_CNF
: Module B
started in
ACTION_IDLE
mode.
02 41 02 00 01 01 41
2. Request the
FS_BTMAC
of both modules.
Info Module A Module B
Request
CMD_GET_REQ
with settings index 4 02 10 01 00 04 17
Response
CMD_GET_CNF
:
FS_BTMAC
of
module A is 0x55 0x00 0x00 0xDA 0x18 0x00
02 50 07 00 00 55 00
00 DA 18 00 C2
Request
CMD_GET_REQ
with settings index 4 02 10 01 00 04 17
Response
CMD_GET_CNF
:
FS_BTMAC
of
module B is 0x11 0x00 0x00 0xDA 0x18 0x00
02 50 07 00 00 11 00
00 DA 18 00 86
3. Configure the parameter
RF_SecFlags
to use "LescPasskey" pairing method for BT
security.
Proteus-III reference manual version 0.11 © November 2019
www.we-online.com/wireless-connectivity 43