<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>how to establish secure connection between Android and nRF?</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/2763/how-to-establish-secure-connection-between-android-and-nrf</link><description>Hello Gentlemen, 
 I&amp;#39;m developing an Android App that needs to connect to nRF. The nRF sensor does not have keyboard, display or buttom. 
 But we can have OOB which is a type of secret key generated during assembly. 
 As long as I don&amp;#39;t require pairing</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 13 Jun 2014 15:01:28 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/2763/how-to-establish-secure-connection-between-android-and-nrf" /><item><title>RE: how to establish secure connection between Android and nRF?</title><link>https://devzone.nordicsemi.com/thread/10685?ContentTypeID=1</link><pubDate>Fri, 13 Jun 2014 15:01:28 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:11796b0a-62e3-425a-a93a-07bf15b36ad0</guid><dc:creator>FormerMember</dc:creator><description>&lt;p&gt;The bonding process consits among others of the exchange of the encryption keys, and when the bonding process is finished the link is encrypted. You can see this if you use our sniffer to track what is being sent of the air. The sniffer can be downloaded here: &lt;a href="https://www.nordicsemi.com/eng/nordic/Products/nRF51822/nRF-Sniffer/26386"&gt;www.nordicsemi.com/.../26386&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The keyboard in our reference design &amp;quot;nRFready Desktop 2&amp;quot; uses OOB, but I don&amp;#39;t think it has been tested on Android.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: how to establish secure connection between Android and nRF?</title><link>https://devzone.nordicsemi.com/thread/10684?ContentTypeID=1</link><pubDate>Fri, 13 Jun 2014 14:10:21 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3df8714c-35bc-4998-a127-1027c04dc2f7</guid><dc:creator>Gilson</dc:creator><description>&lt;p&gt;Kristin,
Maybe I did not make myself clear. I want to enable security during the bonding, encryption of the message comes later I understand.
&amp;quot;just works&amp;quot; is NOT as good, I need to come with a way to set the PIN programmatically or OOB.&lt;/p&gt;
&lt;p&gt;I really need an example of Android using OOB, I see people here asking for examples and I would like to suggest for Nordic to provide examples showing the 3 different methods. Let the business developers decide for themselves. Sometimes we have to talk to our marketing department before we make the decision, it is not always developers choice until there is road block.&lt;/p&gt;
&lt;p&gt;Is there an Android-nRF sample that demonstrates OOB use ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: how to establish secure connection between Android and nRF?</title><link>https://devzone.nordicsemi.com/thread/10683?ContentTypeID=1</link><pubDate>Fri, 13 Jun 2014 13:39:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8f4e8f91-cc81-42e4-af13-a9abfa7248ac</guid><dc:creator>FormerMember</dc:creator><description>&lt;p&gt;The only difference between the bonding methods (Just works, display-keyboard, OOB, etc) is the security during the bonding process; when using display-keyboard, OOB, or any other MITM &amp;quot;process&amp;quot; you can make sure that there is no man-in-the-middle (MITM) attacs. However, the security of the encryption will be the same both with and without MITM bonding. Therefore, if there is no security concern during bonding, &amp;quot;just works&amp;quot; will be as good any of the other bonding &amp;quot;methods&amp;quot;.&lt;/p&gt;
&lt;p&gt;If you don&amp;#39;t want anybody else to be able to connect to your device, you can use whitelist. If using whitelisting, you can limit the number of phones/centrals that can bond to the device.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>