USER MANUAL
EMDC –ENOCEAN MOTION DETECTOR AND LIGHT LEVEL SENSOR
© 2020 EnOcean | www.enocean.com EMDC User Manual | v1.0 | March 2020 | Page 4/75
5.1.2 ERP2 frame format .............................................................................. 24
5.2 EnOcean Equipment Profiles (EEP) and SIGNAL telegrams ................................ 25
5.2.1 EEP structure ...................................................................................... 25
5.2.2 4BS telegram structure ........................................................................ 26
5.2.3 Signal telegram structure ..................................................................... 26
5.2.4 Supported EEP types ............................................................................ 27
5.2.5 Supported SIGNAL types ...................................................................... 28
6Security ..................................................................................................... 29
6.1 Basic concepts ............................................................................................ 29
6.2 Telegram encryption .................................................................................... 29
6.2.1 Telegram authentication ....................................................................... 30
6.2.2 Dynamic security key modification ......................................................... 31
6.3 Security parameters .................................................................................... 32
6.3.1 EURID ................................................................................................ 32
6.3.2 Security key........................................................................................ 32
6.3.3 Rolling code ........................................................................................ 32
6.3.4 Security algorithm ............................................................................... 32
6.4 Secure teach-in telegram ............................................................................. 33
6.4.1 Security level format (SLF) ................................................................... 34
6.5 EMDC security implementation...................................................................... 34
7EMDC commissioning ................................................................................... 35
7.1 Radio-based commissioning.......................................................................... 36
7.2 QR code commissioning ............................................................................... 36
7.2.1 Commissioning QR code structure.......................................................... 36
7.2.2 Commissioning QR code format ............................................................. 37
7.3 Commissioning via NFC interface................................................................... 37
8NFC interface .............................................................................................. 38
8.1 NFC interface parameters ............................................................................. 38
8.2 NFC access protection .................................................................................. 38
8.3 Using the NFC interface................................................................................ 39
8.3.1 PC with dedicated NFC reader ............................................................... 39
8.3.2 Smartphones with NFC ......................................................................... 39
8.4 NFC interface functions ................................................................................ 40
8.4.1 NFC interface state machine.................................................................. 40
8.4.2 IDLE state........................................................................................... 41
8.4.3 READY 1 state ..................................................................................... 41
8.4.4 READY 2 state ..................................................................................... 41
8.4.5 ACTIVE state....................................................................................... 41
8.4.6 Read command ................................................................................... 42
8.4.7 Write command ................................................................................... 42
8.4.8 Password authentication (PWD_AUTH) command ..................................... 43
9NFC registers .............................................................................................. 44
9.1 NFC memory areas ...................................................................................... 44
9.2 PRODUCT NDEF........................................................................................... 45
9.3 USER NDEF................................................................................................. 45