<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security and user authentication</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/4688/security-and-user-authentication</link><description>Hi, 
 I did some small applications using RFduino, and now I will start developing using Nordic sdk. 
 I&amp;#39;ll list some features of my application: 
 
 a hardware with no keyboard or
display, with nrf51822; 
 it will communicate with smartphones</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Mon, 15 Dec 2014 15:09:58 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/4688/security-and-user-authentication" /><item><title>RE: Security and user authentication</title><link>https://devzone.nordicsemi.com/thread/16620?ContentTypeID=1</link><pubDate>Mon, 15 Dec 2014 15:09:58 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:52630b7c-57ea-4a4a-8704-c50695c58cd8</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;You question is very non-specific, so it&amp;#39;s hard to give you a specific answer. I&amp;#39;ll try to give you some tips on what you should read up on.&lt;/p&gt;
&lt;p&gt;Your question is similar to &lt;a href="https://devzone.nordicsemi.com/question/21451/nrf51-s110-block-bonding-allow-access-to-some-services/"&gt;this&lt;/a&gt; one.&lt;/p&gt;
&lt;p&gt;We have some MSC&amp;#39;s that are very helpful in understanding what is done by the SoftDevice and what is done by the application. For example &lt;a href="http://developer.nordicsemi.com/nRF51_SDK/doc/7.1.0/s110/html/a00855.html"&gt;this&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;You need to figure out how to identify and bond with these master users, and if you need to handle the scenario of losing all of them.&lt;/p&gt;
&lt;p&gt;In BLE you can block unwanted devices by adding the authorized master to a white list. This may be something that you can use.&lt;/p&gt;
&lt;p&gt;If you have any specific questions I hope you will add them as new questions. Or this one will soon get messy. But, of course if anything is unclear about my answer, please add a comment.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>