7892169567 | Helpline: +91 7676202022 | E-mail: email@example.com
The power-efficiency of Bluetooth with low energy functionality makes it perfect for devices that run for long periods on power sources such as coin cell batteries or energy-harvesting devices. The smart part is the native support for Bluetooth technology on every major operating system, for easy mobile application development and connectivity for cloud computing and the social economy.
Bluetooth with its low energy functionality powers the Internet of Your Things. You wake up and go for a run with a heart rate monitor that communicates with your smart watch, then listen to music through your shower head. You unlock your doors, set the temperature, turn on the lights and control your TV using the smartphone or tablet you already own. All these wirelessly connected devices make your life richer through the convenience, empowerment and freedom of Bluetooth technology.
Bluetooth Low Energy To make sure the communication over Bluetooth® with its low energy feature (Smart, BLE, LE) is always secure and protected, the Bluetooth Core Specification provides several features to cover the encryption, trust, data integrity and privacy of the user's data.
The pairing mechanism is the process where the parties involved in the communication exchange their identity information to set up trust and get the encryption keys ready for the future data exchange. Depending on the user's requirement and the capability of the device, Bluetooth has several options for pairing.
In version 4.0 and 4.1 of the core specification, Bluetooth with its low energy functionality uses the Secure Simple Pairing model (referred to as LE Legacy after the Bluetooth 4.2 release), in which devices choose one method from Just Works, Passkey Entry and OOB based on the input/output capability of the devices.
With the release of the Bluetooth Core Specification version 4.2, security is greatly enhanced by the new LE Secure Connections pairing model. In this new model, the numeric comparison method is added to the other three methods and the Elliptical Curve Hellman-Diffie (ECDH) algorithm is introduced for key exchange in this process.
Reach a wider audience by leveraging a proven and ubiquitous ecosystem of billions of Bluetooth enabled devices in a growing market