3C - arakomiuma/bt GitHub Wiki
9 OPERATIONAL MODES AND PROCEDURES â LE PHYSICAL TRANSPORT
LE ç©ççãã©ã³ã¹ããŒãäžã§ã¯ãããã€ãã®ç°ãªãã¢ãŒãåã³æç¶ããåæã«å®è¡ãããããšãããã 以äžã®ã¢ãŒãåã³æé ã¯ãLE ç©çãã©ã³ã¹ããŒãäžã§äœ¿çšããããã«å®çŸ©ãããã
- ãããŒããã£ã¹ãã»ã¢ãŒãåã³èŠ³æž¬æé
- ãã£ã¹ã«ããªãŒã¢ãŒããšæé
- æ¥ç¶ã¢ãŒããšæé
- ãã³ãã£ã³ã°ã¢ãŒããšæé
- 宿çãªåºåã¢ãŒããšæé äžèšã®åã¢ãŒãããã³æé ã¯ãäºãã«ç¬ç«ããŠããããã»ãšãã©ã®ããã€ã¹ãäºãã«éä¿¡ããããã«ã¯ãã¢ãŒãããã³æé ã®çµã¿åãããå¿ èŠã§ããã®ã§ã坿¥ã«é¢é£ããŠããã ã¢ãŒããšæé ã®äž¡æ¹ãšãããŠãŒã¶ã®çŽæ¥çãªè¡åã®çµæãšããŠããŸãã¯ããã€ã¹ã«ãã£ãŠèªåŸçã«ãããããå ¥åãŸãã¯å®è¡ãããŠãããã
ãã¹ãã¯ãäžèšã®ã¢ãŒãåã³æé ã®ãããããå®è¡ããåã«ã[Vol.6]Part B 4.6 ç¯ã§å®çŸ©ãããããŒã«ã«ãªã³ã¯ã¬ã€ã€ã®æ©èœæ å ±ãçšããŠãã³ã³ãããŒã©ãæ§æããªããã°ãªããªãã
ãããã®ã¢ãŒãããã³æé ã§äœ¿çšãããåºåã®çš®é¡ã¯ãé¢é£ãã GAP ããŒã«ã®ããããã«ã€ããŠã2.2.2.2 衚 2.1 ã«å®çŸ©ããã
9.1 BROADCAST MODE AND OBSERVATION PROCEDURE
ãããŒããã£ã¹ãã¢ãŒããšèŠ³æž¬æé ã¯ã2 ã€ã®ããã€ã¹ãåºåã€ãã³ãã䜿çšããŠäžæ¹åã³ãã¯ã·ã§ã³ã¬ã¹ã§éä¿¡ããããšãå¯èœã«ããŸãã ãããŒããã£ã¹ãã¢ãŒããšèŠ³æž¬æé ããµããŒãããããã«ãç¹å®ã®GAPããŒã«ã§åäœããããã€ã¹ã®èŠä»¶ã¯ã衚9.1ã«å®çŸ©ãããŠããŸãã
-- Table 9.1: Broadcast mode and observation procedure requirements --
9.1.1 Broadcast mode
9.1.1.1 Definition
ãããŒããã£ã¹ãã¢ãŒãã¯ãããã€ã¹ãåºåã€ãã³ãã§ã³ãã¯ã·ã§ã³ã¬ã¹ããŒã¿ãéä¿¡ããããã®æ¹æ³ãæäŸããã
9.1.1.2 Conditions
ãããŒããã£ã¹ãã¢ãŒãã®ããã€ã¹ã¯ã鿥ç¶å¯èœãªåºåã€ãã³ãã䜿çšããŠããŒã¿ãéä¿¡ããªããã°ãªããªãã
ãããŒããã£ã¹ãã¢ãŒãã®è£ 眮ã¯ããããŒããã£ã¹ã¿ã®ã¢ãã¬ã¹ãé€å€ããŠã鿥ç¶åã§éèµ°æ»åã®ç¡ååºåã€ãã³ãããŸãã¯éæ¥ç¶åã§éèµ°æ»åã®æååºåã€ãã³ããå¿åã§éä¿¡ããããšãã§ããã
åºåããŒã¿ã¯ã[Core Specification Supplement]ããŒãAãã»ã¯ã·ã§ã³1.3ã§å®çŸ©ãããŠããAdvertising Data (AD)ã¿ã€ãã®ãã©ãŒãããã䜿çšããŠãã©ãŒããããããªããã°ãªããªãã ãããŒããã£ã¹ãã¢ãŒãã®æ©åšã¯ããCore Specification SupplementãããŒãAã®1.3ç¯ã«èŠå®ãããFlags AD Typeãã«ãLE General Discoverable Modeããã©ã°åã¯ãLE Limited Discoverable Modeããã©ã°ãèšå®ããŠã¯ãªããªãã
泚ïŒãããŒããã£ã¹ãã»ã¢ãŒãã§ããã€ã¹ã«ãã£ãŠéä¿¡ããããã¹ãŠã®ããŒã¿ã¯ãããŒã¿ãåä¿¡ããå¯èœæ§ã®ããããã€ã¹ããã®ç¢ºèªå¿çããªããããä¿¡é Œæ§ããªããšèããããŸãã
ããã€ã¹ã¯ãè€æ°ã®ç¬ç«ããåºåã»ãããæ§æããæå¹ã«ããããšãã§ããŸãã ååºåã»ããã¯ãç¬ç«ããåºåãã£ã«ã¿ããªã·ãŒãæããŠãããã
9.1.2 Observation procedure
9.1.2.1 Definition
芳枬æé ã¯ãåºåã€ãã³ããéä¿¡ããŠããè£ çœ®ããã³ãã¯ã·ã§ã³ã¬ã¹ããŒã¿ãåä¿¡ããããã®æ¹æ³ãæäŸããã
9.1.2.2 Conditions
芳枬æé ãå®è¡ããããã€ã¹ã¯ãåºåã€ãã³ããåä¿¡ããããã«ãããã·ãèµ°æ»ãŸãã¯ã¢ã¯ãã£ãèµ°æ»ã䜿çšããããšãã§ããã
Observationæé ãå®è¡ããããã€ã¹ã¯ãã¹ãã£ã³å¯èœãªåºåã€ãã³ãã䜿çšããŠåºåãè¡ããããŒããã£ã¹ãã»ã¢ãŒãã®ããã€ã¹ã«ãã£ãŠéä¿¡ãããã¹ãã£ã³å¿çããŒã¿ãåä¿¡ããããã«ãã¢ã¯ãã£ãã»ã¹ãã£ã³ã䜿çšããŠãããã
èŠ³å¯æé ãå®è¡ããããã€ã¹ãåºåã€ãã³ãã§è§£æ±ºå¯èœãªãã©ã€ããŒãã¢ãã¬ã¹ãåä¿¡ããå Žåãããã€ã¹ã¯ã10.8.2.3é ã§å®çŸ©ãããŠãã解決å¯èœãªãã©ã€ããŒãã¢ãã¬ã¹è§£æ±ºæé ã䜿çšããŠããã©ã€ããŒãã¢ãã¬ã¹ã解決ããŠãããã
泚ïŒãããŒããã£ã¹ãã¢ãŒãã®ããã€ã¹ããã€ãããã¯ããŒã¿ãéä¿¡ãã䜿çšäŸã§ã¯ãåä¿¡ããã€ã¹ã¯ããã¹ããã³ã³ãããŒã©ã«ãã£ãŠåä¿¡ããããã¹ãŠã®åºåãã±ãããåä¿¡ããããã«ãã³ã³ãããŒã©ã®éè€ãã£ã«ã¿ãªã³ã°æ©èœãç¡å¹ã«ããå¿ èŠããããŸãã
9.2 DISCOVERY MODES AND PROCEDURES
ãã¹ãŠã®ããã€ã¹ã¯ãéçºèŠå¯èœã¢ãŒããŸãã¯çºèŠå¯èœã¢ãŒãã®ããããã§ãªããã°ãªããªãã çºèŠå¯èœã¢ãŒãã®ããã€ã¹ã¯ãäžè¬çºèŠå¯èœã¢ãŒããŸãã¯éå®çºèŠå¯èœã¢ãŒãã®ããããã§ããããšã éçºèŠå¯èœã¢ãŒãã®ããã€ã¹ã¯ãçºèŠå¯èœã§ã¯ãªãã äžè¬çºèŠå¯èœã¢ãŒããŸãã¯éå®çºèŠå¯èœã¢ãŒãã®ããããã§åäœããŠããããã€ã¹ã¯ãçºèŠããããã€ã¹ã«ãã£ãŠçºèŠãããã ä»ã®ããã€ã¹ãçºèŠããŠããããã€ã¹ã¯ãã»ã¯ã·ã§ã³9.2.5ã«å®çŸ©ãããŠããéå®çºèŠæé ãŸãã¯ã»ã¯ã·ã§ã³9.2.6ã«å®çŸ©ãããŠããäžè¬çºèŠæé ã®ãããããå®è¡ããŸãã
äžéšã®ããã€ã¹ã¯ãã¬ã¬ã·ãŒåºåPDUã䜿çšããŠåºåã€ãã³ãã®ã¿ãã¹ãã£ã³ããå ŽåããããŸãã ãã®ãããæ¡åŒµåºåPDUã䜿çšããåºåã€ãã³ãã䜿çšããããã€ã¹ã¯ãã¬ã¬ã·ãŒåºåPDUã䜿çšããåºåã€ãã³ãã䜿çšããåºåã»ããã䜿çšããããšãæšå¥šãããŸãã
9.2.1 Requirements
-- Table 9.2: Device Discovery requirements --
9.2.2 Non-discoverable mode
9.2.2.1 Description
éçºèŠå¯èœã¢ãŒãã«èšå®ãããããã€ã¹ã¯ãäžè¬çãªçºèŠæé ãŸãã¯éå®çãªçºèŠæé ã®ãããããå®è¡ããŠããããã€ã¹ã«ãã£ãŠçºèŠãããããšã¯ãªãã
9.2.2.2 Conditions
éçºèŠå¯èœã¢ãŒãã®è£ 眮ã¯ãåºåã€ãã³ããéä¿¡ããŠãããã ããã€ã¹ãåºåã€ãã³ããéä¿¡ããå Žåã¯ããã©ã°ADã¿ã€ãïŒ[Core Specification Supplement]ããŒãAã®1.3ç¯åç §ïŒã«ãLE General Discoverable Modeããã©ã°åã¯ãLE Limited Discoverable Modeããã©ã°ãèšå®ããŠã¯ãªããªãã
ããã€ã¹ãåºåã€ãã³ããéä¿¡ããå Žåããã¹ãã¯ä»¥äžã®ããã«ã³ã³ãããŒã©ãæ§æããããšãæšå¥šããŸãã
-
ãã¹ãã¯ããã¹ãŠã®åºåã»ããã®åºåãã£ã«ã¿ããªã·ãŒãããã¯ã€ããªã¹ãã®ããã€ã¹ããã®ã¿ã¹ãã£ã³ãšæ¥ç¶èŠæ±ãåŠçããããŸãã¯ããã¹ãŠã®ããã€ã¹ããã¹ãã£ã³ãšæ¥ç¶èŠæ±ãåŠçãããã®ããããã«èšå®ããå¿ èŠããããŸãã
-
ãã¹ãã¯ã9.3.11é ã§å®çŸ©ãããŠããããã«åºåééãèšå®ããå¿ èŠããããŸãã
9.2.3 Limited Discoverable mode
9.2.3.1 Description
éå®ççºèŠå¯èœã¢ãŒãã§æ§æãããããã€ã¹ã¯ãéå®çãŸãã¯äžè¬çãªããã€ã¹çºèŠæé ãå®è¡ããä»ã®ããã€ã¹ã«ãã£ãŠãéãããæéã ãçºèŠå¯èœã§ããã éå®çºèŠå¯èœã¢ãŒãã¯ãéåžžããŠãŒã¶ãŒãç¹å®ã®ã¢ã¯ã·ã§ã³ãå®è¡ããŠãéãããæéã ãããã€ã¹ãçºèŠå¯èœã«ããå Žåã«äœ¿çšãããŸãã
9.2.3.2 Conditions
ããã€ã¹ãããªãã§ã©ã«ãªåœ¹å²ã«ããéã¯ãããã€ã¹ã¯éå®çãªæ€åºå¯èœã¢ãŒãããµããŒãããããšãã§ããã ããã€ã¹ããããŒããã£ã¹ã¿ããªãã¶ãŒãããŸãã¯ã»ã³ãã©ã«ã®åœ¹å²ã®ã¿ã«ããéãããã€ã¹ã¯éå®çºèŠå¯èœã¢ãŒãããµããŒãããŠã¯ãªããªãã
éå®çºèŠå¯èœã¢ãŒãã®ããã€ã¹ã¯ã[Core Specification Supplement]ãããŒãAãã»ã¯ã·ã§ã³1.3ã§å®çŸ©ãããŠããããã«ã以äžã®ãã¹ãŠã®ãã©ã°ãèšå®ããŠã[Core Specification Supplement]ãããŒãAãã»ã¯ã·ã§ã³1.3ã§å®çŸ©ãããŠããããã«ããã©ã°ADã¿ã€ããå«ãåºåããŒã¿ãå«ãåºåã€ãã³ãã¿ã€ããéä¿¡ããªããã°ãªããªãã
-
LE Limited Discoverable Mode ãã©ã°ãïŒã«èšå®ããã
-
LE äžè¬çºèŠå¯èœã¢ãŒããã©ã°ããŒãã«èšå®ããã
-
LEéå®çºèŠå¯èœã¢ãŒããã©ã°ãïŒã«èšå®ãããŠããLEå°çšããã€ã¹ã»ã¿ã€ãã®ããã€ã¹ã®å Žåã
a) ãBR/EDR Not Supportedããã©ã°ã1ã«èšå®ããã
b) ãåæ LE ãš BR/EDR to Same Device Capable (Controller)ããã©ã°ããŒãã«èšå®ããã
c) ãLE/BR/EDRãšåäžããã€ã¹å¯Ÿå¿(ãã¹ã)ãžã®åææ¥ç¶ããã©ã°ããŒãã«èšå®ããã
ãŸããåºåããŒã¿ã«ã¯ãããé«éãªæ¥ç¶äœéšãå¯èœã«ããããã«ã以äžã®ADã¿ã€ããå«ããããšãæãŸããã
-
TX Power Level ADã¿ã€ãã¯ã[Core Specification Supplement]ãããŒãAãã»ã¯ã·ã§ã³1.5ã§å®çŸ©ãããŠããŸãã
-
ã³ã¢ä»æ§è£è¶³]ãããŒãAãã»ã¯ã·ã§ã³1.5ã§å®çŸ©ãããŠããããŒã«ã«åã®ADã¿ã€ãã
-
ã³ã¢ä»æ§è£è¶³]ããŒãA第1.1ç¯ã«å®çŸ©ãããŠãããµãŒãã¹UUIDsã®ADã¿ã€ãã
-
ã¹ã¬ãŒãæ¥ç¶ééç¯å² [Core Specification Supplement]ãããŒãAãã»ã¯ã·ã§ã³1.9ã§å®çŸ©ãããŠããADã¿ã€ãã
ããã€ã¹ã¯ãTGAP(lim_adv_timeout)ãè¶ ããŠã¯ãªããªãã
ããã€ã¹ãéå®çºèŠå¯èœã¢ãŒãã«ããéããã¹ãã¯ä»¥äžã®ããã«ã³ã³ãããŒã©ãæ§æããã
-
ãã¹ãã¯ãåºåãã£ã«ã¿ããªã·ãŒãããã¹ãŠã®ããã€ã¹ããã®ã¹ãã£ã³ãšæ¥ç¶èŠæ±ãåŠçãããã«èšå®ããã
-
ãã¹ãã¯ã9.3.11é ã§å®çŸ©ãããŠããããã«åºåééãèšå®ããã ããã€ã¹ã¯ãæ¥ç¶ã確ç«ããããŸã§ãéå®çãªæ€åºå¯èœã¢ãŒãã®ãŸãŸãšããã
ã確ç«ããããããã¹ããã¢ãŒããçµäºããŸãã
泚ïŒé »ç¹ã«å€æŽãããã¬ã¬ã·ãŒåºåã€ãã³ãã§äœ¿çšããããã¹ãããŒã¿ã¯åºåããŒã¿ã«é 眮ããéçããŒã¿ã¯ã¹ãã£ã³å¿çããŒã¿ã«é 眮ããå¿ èŠããããŸãã
泚ïŒåºåééã®éžæã¯ãæ¶è²»é»åãšããã€ã¹ã®æ€åºæéãšã®éã®ãã¬ãŒããªãã§ãã
ããã€ã¹ã¯ãè€æ°ã®ç¬ç«ããåºåã»ãããæ§æããæå¹ã«ããŠãããã ååºåã»ããã¯ãç¬ç«ããåºåãã£ã«ã¿ããªã·ãŒãæã€ããšãã§ããŸãã
9.2.4 äžè¬çãªæ€åºå¯èœã¢ãŒã
9.2.4.1 説æ
äžè¬çºèŠå¯èœã¢ãŒãã§æ§æãããããã€ã¹ã¯ãäžè¬çºèŠæé ãå®è¡ããããã€ã¹ã«ãã£ãŠçºèŠå¯èœã«ãªãããã«æå³ãããŠããŸãã äžè¬çãªçºèŠå¯èœã¢ãŒãã¯ãããã€ã¹ãé·æéçºèŠå¯èœã§ããããšãæå³ããŠããå Žåã«äžè¬çã«äœ¿çšãããŸãã
9.2.4.2 æ¡ä»¶
ããã€ã¹ãããªãã§ã©ã«ãªåœ¹å²ã«ããéã¯ãããã€ã¹ã¯äžè¬çãªæ€åºå¯èœã¢ãŒãããµããŒãããããšãã§ããã ããã€ã¹ããããŒããã£ã¹ã¿ããªãã¶ãŒãããŸãã¯ã»ã³ãã©ã«ã®åœ¹å²ã®ã¿ã«ããéã¯ãããã€ã¹ã¯äžè¬çºèŠå¯èœã¢ãŒãããµããŒãããªããã®ãšããã
äžè¬çºèŠå¯èœã¢ãŒãã®ããã€ã¹ã¯ã[Core Specification Supplement]ãããŒãAãã»ã¯ã·ã§ã³1.3ã§å®çŸ©ãããŠããããã«ã以äžã®ãã¹ãŠã®ãã©ã°ãèšå®ãããŠãããã©ã°ADããŒã¿åãå«ãåºåããŒã¿ã§åºåã€ãã³ããéä¿¡ããªããã°ãªããªãã
-
LE Limited Discoverable Mode ãã©ã°ããŒãã«èšå®ããã
-
LE äžè¬çºèŠå¯èœã¢ãŒããã©ã°ãïŒã«èšå®ããã
-
LEéå®çºèŠå¯èœã¢ãŒããã©ã°ããŒãã«èšå®ãããŠãã LE å°çšããã€ã¹ã»ã¿ã€ãã®ããã€ã¹ã®å Žåã
a) ãBR/EDR Not Supportedããã©ã°ãïŒã«èšå®ãããã
b) ãåäžããã€ã¹ã»ãã£ããã«ïŒã³ã³ãããŒã©ïŒãžã® LE ãš BR/EDR ã®åææ¥ç¶ããã©ã°ããŒãã«èšå®ããã
c) ãåæ LE åã³ BR/EDR ããåäžããã€ã¹å¯Ÿå¿ïŒãã¹ãïŒããã©ã°ã¯ãŒãã«èšå®ãããã
åºåããŒã¿ã¯ãããéãæ¥ç¶äœéšãå¯èœã«ããããã«ã以äžã®ADã¿ã€ããå«ãããšãæãŸããã
-
TX Power Level AD ã¿ã€ãïŒãCore Specification SupplementãããŒã A 1.5 ç¯ã«å®çŸ©ãããŠãã TX Power Level AD ã¿ã€ãã
-
ã³ã¢ä»æ§è£è¶³]ãããŒãAãã»ã¯ã·ã§ã³1.5ã§å®çŸ©ãããŠããããŒã«ã«åã®ADã¿ã€ãã
-
Service UUUIDs [Core Specification Supplement]ãããŒãAãã»ã¯ã·ã§ã³1.1ã§å®çŸ©ãããŠãããµãŒãã¹UUIDsã®ã¿ã€ãã
-
ã¹ã¬ãŒãæ¥ç¶ééç¯å² [Core Specification Supplement]ãããŒãAãã»ã¯ã·ã§ã³1.9ã§å®çŸ©ãããŠããADã¿ã€ãã
ããã€ã¹ãäžè¬çºèŠå¯èœã¢ãŒãã«ããéããã¹ãã¯ã以äžã®ããã«ã³ã³ãããŒã©ãæ§æããã
-
ãã¹ãã¯ããã¹ãŠã®åºåã»ããã®åºåãã£ã«ã¿ããªã·ãŒãããã¹ãŠã®ããã€ã¹ããã®ã¹ãã£ã³ãšæ¥ç¶èŠæ±ãåŠçãããã«èšå®ããªããã°ãªããªãã
-
ãã¹ãã¯ã9.3.11 ç¯ã«å®çŸ©ãããŠããããã«åºåééãèšå®ããã ããã€ã¹ã¯ãæ¥ç¶ã確ç«ããããŸã§ãäžè¬çãªæ€åºå¯èœã¢ãŒãã®ãŸãŸã§ããããšã
ã確ç«ããããããã¹ããã¢ãŒããçµäºããŸãã
泚ïŒé »ç¹ã«å€æŽãããã¬ã¬ã·ãŒåºåã€ãã³ãã§äœ¿çšããããã¹ãããŒã¿ã¯åºåããŒã¿ã«é 眮ããéçããŒã¿ã¯ã¹ãã£ã³å¿çããŒã¿ã«é 眮ããå¿ èŠããããŸãã
泚ïŒåºåééã®éžæã¯ãæ¶è²»é»åãšããã€ã¹ãã£ã¹ã«ããªãŒæéã®ãã¬ãŒããªãã§ããã
9.2.5 éå®çãªãã£ã¹ã«ããªãŒæé
9.2.5.1 説æ
éå®ççºèŠæé ãå®è¡ããè£ çœ®ã¯ãéå®ççºèŠå¯èœã¢ãŒãã®è£ 眮ãããè£ çœ®ã¢ãã¬ã¹ãåºåããŒã¿ãããã³ã¹ãã£ã³å¿çããŒã¿ã®ã¿ãåä¿¡ããã
-- Figure 9.1: A Central performing limited discovery procedure discovering Peripherals in the limited discoverable mode --
9.2.5.2 æ¡ä»¶
ããã€ã¹ãäžå€®ã®åœ¹å²ã«ããéãããã€ã¹ã¯éå®çãªãã£ã¹ã«ããªæé ããµããŒãããããšãã§ããã ããã€ã¹ããããŒããã£ã¹ã¿ããªãã¶ãŒããããªãã§ã©ã«ã®åœ¹å²ã«ããéã¯ãããã€ã¹ã¯éå®çãªçºèŠæé ããµããŒãããªãã
ããã€ã¹ããµããŒãããå šãŠã® PHY ãã¹ãã£ã³ããããšãæšå¥šããã
ãã¹ããéå®ççºèŠæé ãå®è¡ããå Žåããã¹ãã¯ä»¥äžã®ããã«ã³ã³ãããŒã©ãèšå®ããã
- ãã¹ãã¯ãã¹ãã£ããã£ã«ã¿ããªã·ãŒãããã¹ãŠã®åºåãã±ãããåŠçãããã«èšå®ããã
- ãã¹ãã¯ã9.3.11 ç¯ã§å®çŸ©ãããã¹ãã£ã³ééãšã¹ãã£ã³ãŠã£ã³ããŠãèšå®ããã
- ãã¹ãã¯ãã³ã³ãããŒã©ãã¢ã¯ãã£ãã¹ãã£ã³ã䜿çšããããã«èšå®ããã
ãã¹ãã¯ãåºåãã±ããã®ã¹ãã£ã³ãéå§ããLE 1M PHY ã§ã¹ãã£ã³ããå Žå㯠TGAP(lim_disc_scan_min)ãLE Coded PHY ã§ã¹ãã£ã³ããå Žå㯠TGAP(lim_disc_scan_min_coded)ã®æå°å€ã®éç¶ç¶ãããã®ãšããã
ãã¹ãã¯ãåºåããŒã¿äžã® Flags AD ã¿ã€ãããã§ãã¯ããªããã°ãªããªãã ãã©ã° AD ã¿ã€ããååšããLE éå®çºèŠå¯èœãã©ã°ãïŒã«èšå®ãããŠããå Žåããã¹ãã¯ãã®ããã€ã¹ãçºèŠãããããã€ã¹ãšèŠãªããã®ãšããã ãã©ã° AD ã¿ã€ãã¯ã[Core Specification Supplement]ãããŒã Aãã»ã¯ã·ã§ã³ 1.3 ã«å®çŸ©ãããŠããã çºèŠãããããã€ã¹ã®åºåããŒã¿ã¯ãä»ã® AD ã¿ã€ããäŸãã°ããµãŒãã¹ UUIDs AD ã¿ã€ããTX ãã¯ãŒã¬ãã« AD ã¿ã€ããããŒã«ã«å AD ã¿ã€ããã¹ã¬ãŒãæ¥ç¶ééç¯å² AD ã¿ã€ããæã€ããŒã¿ãå«ãã§ãããã ãã¹ãã¯ãæ¥ç¶ç¢ºç«æé ã®ãããããå®è¡ããéã«ããŒã¿ã䜿çšããããšãã§ããã
ãã¹ãã¯ããã©ã° AD ã¿ã€ãã®ãåæ LE åã³ BR/EDR to Same Device Capable (Controller)ãåã³ãåæ LE åã³ BR/EDR to Same Device Capable (Host)ãããããç¡èŠãããã®ãšããã
9.2.6 äžè¬çãªãã£ã¹ã«ããªãŒæé
9.2.6.1 説æ
äžè¬çºèŠæé ãå®è¡ããè£ çœ®ã¯ãéå®çºèŠå¯èœã¢ãŒããŸãã¯äžè¬çºèŠå¯èœã¢ãŒãã®è£ 眮ãããè£ çœ®ã¢ãã¬ã¹ãåºåããŒã¿ãããã³ã¹ãã£ã³å¿çããŒã¿ãåä¿¡ããã
-- Figure 9.2: A Central performing General Discovery procedure discovering Peripherals in the Limited Discoverable mode and General Discoverable mode --
9.2.6.2 æ¡ä»¶
ããã€ã¹ãäžå€®ã®åœ¹å²ã«ããéã¯ãããã€ã¹ã¯äžè¬çãªãã£ã¹ã«ããªæé ããµããŒãããªããã°ãªããªãã ããã€ã¹ããããŒããã£ã¹ã¿ããªãã¶ãŒããããªãã§ã©ã«ã®åœ¹å²ã«ããéã¯ãããã€ã¹ã¯äžè¬çãªãã£ã¹ã«ããªãŒæé ããµããŒãããªãã
ããã€ã¹ããµããŒãããå šãŠã® PHY ãã¹ãã£ã³ããããšãæšå¥šããã
ãã¹ããäžè¬çºèŠæé ãå®è¡ãããšãããã¹ãã¯ä»¥äžã®ããã«ã³ã³ãããŒã©ãèšå®ããã
- ãã¹ãã¯ãã¹ãã£ããã£ã«ã¿ããªã·ãŒãããã¹ãŠã®åºåãã±ãããåŠçãããã«èšå®ããã
- ã»ã¯ã·ã§ã³9.3.11.ã§å®çŸ©ãããŠããããã«ãã¹ãã£ã³ééãšã¹ãã£ã³ãŠã£ã³ããŠãèšå®ããã
- ãã¹ãã¯ãã³ã³ãããŒã©ãã¢ã¯ãã£ãã¹ãã£ã³ã䜿çšããããã«èšå®ããã
ãã¹ãã¯ãåºåãã±ããã®ã¹ãã£ã³ãéå§ããLE 1M PHY ã§ã¹ãã£ã³ããå Žå㯠TGAP(gen_disc_scan_min)以äžãLE Coded PHY ã§ã¹ãã£ã³ããå Žå㯠TGAP(gen_disc_scan_min_coded)以äžç¶ç¶ããã ããã·ãŒãžã£ã¯ããã¹ãã«ãã£ãŠæ©æã«çµäºããŠãããã
ãã¹ãã¯ãåºåããŒã¿äžã®ïŒŠïœïœïœïœ ã¿ã€ãããã§ãã¯ããªããã°ãªããªãã Flags AD ã¿ã€ãïŒ[Core Specification Supplement]ãããŒã Aãã»ã¯ã·ã§ã³ 1.3 åç §ïŒãååšããLE äžè¬çºèŠå¯èœã¢ãŒããã©ã°ãïŒã«èšå®ãããŠããããLE éå®çºèŠå¯èœã¢ãŒããã©ã°ãïŒã«èšå®ãããŠããå Žåã ãã¹ãã¯ããã€ã¹ãçºèŠãããããã€ã¹ãšã¿ãªããã®ãšããããã§ãªããã°åºåããŒã¿ã¯ç¡èŠããããã®ãšããã çºèŠãããããã€ã¹ã®åºåããŒã¿ã¯ãä»ã® AD ã¿ã€ããäŸãã°ããµãŒãã¹ UUIDs AD ã¿ã€ããTX ãã¯ãŒã¬ãã« AD ã¿ã€ããããŒã«ã«å AD ã¿ã€ããã¹ã¬ãŒãæ¥ç¶ééç¯å² AD ã¿ã€ãçã®ããŒã¿ãå«ãããšãã§ããã ãã¹ãã¯ã第 9.3 ç¯ã§å®çŸ©ãããæ¥ç¶ç¢ºç«æé ã®ãããããå®è¡ããéã«ããã®ããŒã¿ã䜿çšããããšãã§ããã
ãã¹ãã¯ãFlags AD ã¿ã€ãã®ãåæ LE åã³ BR/EDR to Same Device Capable (Controller)ãåã³ãåæ LE åã³ BR/EDR to Same Device Capable (Host)ãããããç¡èŠãããã®ãšããã
9.2.7 ååæ€åºæé
9.2.7.1 説æ
ååçºèŠæé ã¯ããªã¢ãŒãæ¥ç¶å¯èœãªããã€ã¹ã®Bluetoothããã€ã¹åãååŸããããã«äœ¿çšããŸãã
9.2.7.2 æ¡ä»¶
éå®çºèŠæé ãŸãã¯äžè¬çºèŠæé ã®ãããããå®è¡äžã«å®å šãªããã€ã¹åãååŸã§ããªãã£ãå Žåã¯ãååçºèŠæé ãå®è¡ããŠãããã
ååçºèŠæé ã¯ã以äžã®ããã«è¡ãã
-
ãã¹ãã¯ãæ¥ç¶ç¢ºç«æé ã®ãããããçšããŠæ¥ç¶ã確ç«ããªããã°ãªããªãã 第9.3é ã«å®çŸ©ãããŠããããã«ãã¡ã³ã¿ãŒã®æç¶ããè¡ãããšã
-
ãã¹ã㯠GATT ã䜿çšããŠããã€ã¹åã®ç¹æ§ãèªã¿åããã®ãšããã æé æåUUIDã䜿çšããèªã¿èŸŒã¿ã第3å·»ãGç·š 4.8.2.
-
GATT æç¶ãã®çµäºåŸãæ¥ç¶ãçµäºããããšãã§ããã
9.3 æ¥ç¶ã¢ãŒããšæé
æ¥ç¶ã¢ãŒããšæé ã«ãããããã€ã¹ã¯ä»ã®ããã€ã¹ãšã®æ¥ç¶ã確ç«ããããšãã§ããŸãã
ããã€ã¹ãæ¥ç¶ããããšãæ¥ç¶ã®ãã©ã¡ãŒã¿ã¯ãæ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé ã䜿çšããŠæŽæ°ããããšãã§ããŸãã æ¥ç¶ãããããã€ã¹ã¯ãTerminate Connectionæé ã䜿çšããŠæ¥ç¶ãçµäºããããšãã§ããŸãã æ¥ç¶ã¢ãŒããšæé ããµããŒãããããã®ããã€ã¹ã®èŠä»¶ã¯ã衚9.3ã«å®çŸ©ãããŠããŸãã ãããã®èŠä»¶ã¯ãããã€ã¹ãåäœããŠããç¹å®ã®åœ¹å²ãåç §ããã è€æ°ã®åœ¹å²ããµããŒãããããã€ã¹ã¯ããã®åœ¹å²ã§åäœããŠããéãæå®ããã圹å²ã®ããã«æå®ãããã¢ãŒããšæé ããµããŒãããªããã°ãªããªãã
9.3.1 èŠä»¶
-- Table 9.3: Connection modes and procedures requirements --
9.3.2 鿥ç¶ã¢ãŒã
9.3.2.1 説æ
鿥ç¶ã¢ãŒãã®è£ 眮ã¯ãæ¥ç¶ã®ç¢ºç«ãèš±å¯ããªãããšã
9.3.2.2 æ¡ä»¶
ããã€ã¹ãããªãã§ã©ã«ã»ããŒã«ã«ããéãããã€ã¹ã¯éæ¥ç¶ã¢ãŒãããµããŒãããªããã°ãªããªãã ãããŒããã£ã¹ã¿ãŒãŸãã¯ãªãã¶ãŒããŒã®åœ¹å²ã«ããããã€ã¹ã¯æ¥ç¶ã確ç«ã§ããªããããããã€ã¹ã¯éæ¥ç¶å¯èœã¢ãŒãããµããŒãããŠãããšèããããã
鿥ç¶ã¢ãŒãã®ããªãã§ã©ã«ã»ããã€ã¹ã¯ã鿥ç¶å¯èœãªåºåã€ãã³ããéä¿¡ããããšãã§ããã ãã®å Žåããã¹ãã¯ä»¥äžã®ããã«ã³ã³ãããŒã©ãæ§æããããšããå§ãããŸãã
-
ãã¹ãã¯ãåºåãã£ã«ã¿ããªã·ãŒãããã¯ã€ããªã¹ãã®ããã€ã¹ããã®ã¿ã¹ãã£ã³ãšæ¥ç¶èŠæ±ãåŠçããããŸãã¯ããã¹ãŠã®ããã€ã¹ããã¹ãã£ã³ãšæ¥ç¶èŠæ±ãåŠçãããã®ããããã«èšå®ããå¿ èŠããããŸãã
-
ãã¹ãã¯ã9.3.11é ã«å®çŸ©ãããŠããããã«åºåééãèšå®ããã
ããã€ã¹ã¯ãè€æ°ã®ç¬ç«ããåºåã»ãããæ§æããæå¹ã«ããŠãããã ååºåã»ããã¯ãç¬ç«ããåºåãã£ã«ã¿ããªã·ãŒãæã€ããšãã§ããã
9.3.3 Directed Connectable ã¢ãŒã
9.3.3.1 説æ
æåæ¥ç¶å¯èœã¢ãŒãã®è£ 眮ã¯ãèªåæ¥ç¶ç¢ºç«æé ãŸãã¯äžè¬æ¥ç¶ç¢ºç«æé ãè¡ãæ¢ç¥ã®çžæè£ 眮ããã®æ¥ç¶èŠæ±ãå ãä»ããããšã
9.3.3.2 æ¡ä»¶
ããã€ã¹ãããªãã§ã©ã«ã®åœ¹å²ãæãããŠããéã¯ãããã€ã¹ã¯æç€ºæ¥ç¶ã¢ãŒãããµããŒãããããšãã§ããŸãã ãã®ã¢ãŒãã¯ãããã€ã¹ãæ¢ç¥ã®ãã¢ã»ããã€ã¹ã»ã¢ãã¬ã¹ãæã£ãŠããå Žåã«ã®ã¿äœ¿çšããã ããã€ã¹ããããŒããã£ã¹ã¿ããªãã¶ãŒãããŸãã¯ã»ã³ãã©ã«ã®åœ¹å²ã®ã¿ã«ããéã¯ãããã€ã¹ã¯çŽæ¥æ¥ç¶å¯èœã¢ãŒãããµããŒãããŠã¯ãªããªãã ããªãã§ã©ã«ããã€ã¹ã¯ãæ¥ç¶å¯èœãªçŽæ¥åºåã€ãã³ããéä¿¡ããªããã°ãªããªãã ããã€ã¹ã¯ãè€æ°ã®ç¬ç«ããåºåã»ãããæ§æããæå¹ã«ããããšãã§ããã ååºåã»ããã¯ãç¬ç«ããåºåãã£ã«ã¿ããªã·ãŒãæã€ããšãã§ããã
9.3.4 çŽæ¥æ¥ç¶å¯èœã¢ãŒã
9.3.4.1 説æ
ç¡æåæ¥ç¶ã¢ãŒãã®è£ 眮ã¯ãèªåæ¥ç¶ç¢ºç«æé ãŸãã¯äžè¬æ¥ç¶ç¢ºç«æé ãè¡ãè£ çœ®ããã®æ¥ç¶èŠæ±ãåãä»ããããšã
9.3.4.2 æ¡ä»¶
ããã€ã¹ãããªãã§ã©ã«ã»ããŒã«ã«ããéã¯ããã®ããã€ã¹ã¯ç¡æåæ¥ç¶ã¢ãŒãããµããŒãããªããã°ãªããªãã ããã€ã¹ããããŒããã£ã¹ã¿ããªãã¶ãŒãããŸãã¯ã»ã³ãã©ã«ã®åœ¹å²ã«ããéã¯ããã®ããã€ã¹ã¯ç¡æåæ¥ç¶ã¢ãŒãããµããŒãããŠã¯ãªããªãã ããªãã§ã©ã«ã»ããã€ã¹ã¯ãã»ã¯ã·ã§ã³9.3.11ã§å®çŸ©ãããã¬ã€ãã©ã€ã³ã«åŸãããšãæãŸããã ããªãã§ã©ã«ããã€ã¹ã¯ãæ¥ç¶å¯èœã§ã¹ãã£ã³å¯èœãªç¡ååºåã€ãã³ããŸãã¯æ¥ç¶å¯èœãªç¡ååºåã€ãã³ãã®ãããããéä¿¡ããªããã°ãªããªãã ããã€ã¹ã¯ãè€æ°ã®ç¬ç«ããåºåã»ãããæ§æããæå¹ã«ããŠãããã ååºåã»ããã¯ãç¬ç«ããåºåãã£ã«ã¿ããªã·ãŒãæã€ããšãã§ããã
9.3.5 èªåæ¥ç¶ç¢ºç«æé
9.3.5.1 説æ
èªåæ¥ç¶ç¢ºç«æé ã§ã¯ããã¹ãã¯ãã³ã³ãããŒã©ãæåæ¥ç¶ã¢ãŒããŸãã¯ç¡åæ¥ç¶ã¢ãŒãã§1å°ä»¥äžã®ããã€ã¹ãšèªåŸçã«æ¥ç¶ã確ç«ããããã«èšå®ããããšãã§ããŸãã ã³ã³ãããŒã©ã®ãã¯ã€ããªã¹ãã¯ãããã€ã¹ã¢ãã¬ã¹ãæ ŒçŽããããã«äœ¿çšãããŸãã ãã®æé ã§ã¯ãã³ã³ãããŒã©ã®ã€ãã·ãšãŒã¿ãã¯ã€ããªã¹ãã䜿çšããŸãã ã³ã³ãããŒã©ã¯ããã¯ã€ããªã¹ãã«ä¿åãããŠããã¢ãã¬ã¹ãšäžèŽããããã€ã¹ã¢ãã¬ã¹ãæã€ããã€ã¹ãšèªåŸçã«æ¥ç¶ã確ç«ããŸãã
9.3.5.2 æ¡ä»¶
ããã€ã¹ãäžå€®ã®åœ¹å²ã«ããéãããã€ã¹ã¯èªåæ¥ç¶ç¢ºç«æé ããµããŒãããããšãã§ããã ããã€ã¹ããããŒããã£ã¹ã¿ããªãã¶ãŒãããŸãã¯ããªãã§ã©ã«ã®åœ¹å²ã®ã¿ã«ããéã¯ãããã€ã¹ã¯èªåæ¥ç¶ç¢ºç«æé ããµããŒãããŠã¯ãªããªãã
-- Figure 9.3: Flow chart for a device performing the Auto Connection Establishment procedure --
ãã¹ããèªåæ¥ç¶ç¢ºç«æé ãå®è¡ãããšããã¹ãã¯ä»¥äžã®ããã«ã³ã³ãããŒã©ãèšå®ããŸãã
- ãã¹ãã¯ãèªåæ¥ç¶å ãšãªãããã€ã¹ã¢ãã¬ã¹ã®ãªã¹ãããã¯ã€ããªã¹ãã«æžã蟌ãã
- ãã¹ãã¯ãã€ãã·ãšãŒã¿ãã£ã«ã¿ããªã·ãŒãããã¯ã€ããªã¹ãã®å šããã€ã¹ããã®æ¥ç¶å¯èœãªåºåãã±ãããåŠçãããã«èšå®ããã
- ãã¹ãã¯ã9.3.11é ã§å®çŸ©ãããŠããããã«ãã¹ãã£ã³ééãšã¹ãã£ã³ãŠã£ã³ããŠãèšå®ããªããã°ãªããªã
- ãã¹ãã¯ã9.3.12é ã«å®çŸ©ãããŠããããã«æ¥ç¶ãã©ã¡ãŒã¿ãèšå®ããå¿ èŠããããŸãã
ãã®æé ã¯ãæ¥ç¶ã確ç«ããããšãããŸãã¯ãã¹ããæé ãçµäºãããšãã«çµäºããŸãã
9.3.6 äžè¬æ¥ç¶ç¢ºç«æé
9.3.6.1 説æ
äžè¬çãªæ¥ç¶ç¢ºç«æé ã«ããããã¹ãã¯æåæ¥ç¶å¯èœã¢ãŒããŸãã¯ç¡åæ¥ç¶å¯èœã¢ãŒãã§æ¢ç¥ã®ãã¢ããã€ã¹ã®ã»ãããšã®æ¥ç¶ã確ç«ããããšãã§ããŸãã
9.3.6.2 æ¡ä»¶
ããã€ã¹ãäžå€®ã®åœ¹å²ã«ããéã¯ãããã€ã¹ã¯äžè¬çãªæ¥ç¶ç¢ºç«æé ããµããŒãããããšãã§ããã ããã€ã¹ããããŒããã£ã¹ã¿ããªãã¶ãŒãããŸãã¯ããªãã§ã©ã«ã®åœ¹å²ã«ã®ã¿ããéã¯ãããã€ã¹ã¯äžè¬çãªæ¥ç¶ç¢ºç«æé ããµããŒãããŠã¯ãªããªãã
-- Figure 9.4: Flow chart for a device performing the General Connection Establishment procedure --
ãã¹ããäžè¬çãªæ¥ç¶ç¢ºç«æé ãå®è¡ãããšããã¹ãã¯ä»¥äžã®ããã«ã³ã³ãããŒã©ãèšå®ããŸãã
- ãã¹ãã¯ã[Vol 2]ããŒãEãã»ã¯ã·ã§ã³7.8.10ã§å®çŸ©ãããŠããããã«ãã¹ãã£ããã£ã«ã¿ããªã·ãŒãããã¹ãŠãåãå ¥ããããªãã·ã§ã³ã®ããããã«èšå®ããªããã°ãªããªãã
- ãã¹ãã¯ã9.3.11 ç¯ã«å®çŸ©ãããŠããããã«ã¹ãã£ã³ééãèšå®ããããšã
- ãã¹ãã¯ã9.3.11é ã§å®çŸ©ãããã¹ãã£ã³ãŠã£ã³ããŠãèšå®ããããšã
- ãã¹ãã¯ã¹ãã£ã³ãéå§ããã
- ãã¹ãã¯ã9.3.12é ã«å®çŸ©ãããŠããããã«æ¥ç¶ãã©ã¡ãŒã¿ãèšå®ããªããã°ãªããªãã
ãã¹ããæ¥ç¶ã詊ã¿ãå¯èœæ§ã®ããããã€ã¹ãçºèŠããå Žåããã¹ãã¯ã¹ãã£ã³ã忢ããçŽæ¥æ¥ç¶ç¢ºç«æé ã䜿çšããŠæ¥ç¶ãéå§ããªããã°ãªããªãã ãã®æé ã¯ãæ¥ç¶ã確ç«ããããšãããŸãã¯ãã¹ãããã®æé ãçµäºãããšãã«çµäºããã
9.3.7 éžæçæ¥ç¶ç¢ºç«æé
9.3.7.1 説æ
éžæçæ¥ç¶ç¢ºç«æé ã¯ããã¹ãããã¯ã€ããªã¹ãã®ããã€ã¹ã¢ãã¬ã¹ã®ã»ããã䜿çšããŠããã¹ããéžæããæ¥ç¶èšå®ãã©ã¡ãŒã¿ãšã®æ¥ç¶ã確ç«ããããšãå¯èœã«ããŸãã
9.3.7.2 æ¡ä»¶
ããã€ã¹ãäžå€®ã®åœ¹å²ã«ããéã¯ãããã€ã¹ã¯éžæçæ¥ç¶ç¢ºç«æé ããµããŒãããããšãã§ããã ããã€ã¹ããããŒããã£ã¹ã¿ããªãã¶ãŒãããŸãã¯ããªãã§ã©ã«ã®åœ¹å²ã®ã¿ã«ããéã¯ãããã€ã¹ã¯éžæçæ¥ç¶ç¢ºç«æé ããµããŒãããŠã¯ãªããªãã å³9.5ã«ããã€ã¹ãéžæçæ¥ç¶ç¢ºç«æé ãå®è¡ããå Žåã®ãããŒãã£ãŒãã瀺ãã
ãã¹ããéžæçæ¥ç¶ç¢ºç«æé ãå®è¡ããå Žåããã¹ãã¯ä»¥äžã®ããã«ã³ã³ãããŒã©ãèšå®ããŸãã
- ãã¹ãã¯ãéžæçã«æ¥ç¶ããããã€ã¹ã¢ãã¬ã¹ã®ãªã¹ãããã¯ã€ããªã¹ãã«æžã蟌ãã
- ãã¹ãã¯ã[Vol.2]ããŒãE 7.8.10é ã§å®çŸ©ãããŠããããã«ãã¹ãã£ããã£ã«ã¿ããªã·ãŒããaccept onlyããªãã·ã§ã³ã«èšå®ããã
- ãã¹ãã¯ã9.3.11é ã§å®çŸ©ãããŠããããã«ã¹ãã£ã³ééãèšå®ããããšã
- ãã¹ãã¯ã9.3.11é ã§å®çŸ©ãããã¹ãã£ã³ãŠã£ã³ããŠãèšå®ããããšã
- ãã¹ãã¯ãã¢ã¯ãã£ãã¹ãã£ã³ãŸãã¯ããã·ãã¹ãã£ã³ãéå§ããã
ãã¹ãã¯ãæ¥ç¶å ã®ãã¢ããã€ã¹ã®1ã€ãçºèŠããå Žåãã¹ãã£ã³ã忢ãããã®ãã¢ããã€ã¹ã®æ¥ç¶èšå®ãã©ã¡ãŒã¿ãæã€çŽæ¥æ¥ç¶ç¢ºç«æé ã䜿çšããŠæ¥ç¶ãéå§ããªããã°ãªããªãã
ãã®æé ã¯ãæ¥ç¶ã確ç«ããããšãããŸãã¯ãã¹ããæé ãçµäºãããšãã«çµäºããã
-- Figure 9.5: Flow chart for a device performing the Selective Connection Establishment proced --
9.3.8 çŽæ¥æ¥ç¶ç¢ºç«æé
9.3.8.1 説æ
çŽæ¥æ¥ç¶ç¢ºç«æé ã¯ããã¹ããéžæããæ¥ç¶èšå®ãã©ã¡ãŒã¿ã䜿çšããŠãåäžã®ãã¢ããã€ã¹ãšã®æ¥ç¶ã確ç«ããããšãå¯èœã«ããŸãã
9.3.8.2 æ¡ä»¶
ããã€ã¹ãäžå€®ã®åœ¹å²ã«ããéã¯ãããã€ã¹ã¯çŽæ¥æ¥ç¶ç¢ºç«æé ããµããŒãããªããã°ãªããªãã ããã€ã¹ããããŒããã£ã¹ã¿ããªãã¶ãŒãããŸãã¯ããªãã§ã©ã«ã®åœ¹å²ã®ã¿ã«ããå Žåãããã€ã¹ã¯çŽæ¥æ¥ç¶ç¢ºç«æé ããµããŒãããŠã¯ãªããªãã
-- Figure 9.6: Flow chart for a device performing the Direct Connection Establishment procedure --
ãã¹ããçŽæ¥æ¥ç¶ç¢ºç«æé ãå®è¡ããå Žåããã¹ãã¯ä»¥äžã®ããã«ã³ã³ãããŒã©ãèšå®ããŸãã
- ãã¹ãã¯ãã€ãã·ãšãŒã¿ãã£ã«ã¿ããªã·ãŒãããã¯ã€ããªã¹ããç¡èŠãããã¹ããæå®ããç¹å®ã®åäžããã€ã¹ããã®æ¥ç¶å¯èœãªåºåãã±ãããããã»ã¹ãããã«èšå®ããªããã°ãªããªãã
- ãã¹ãã¯ããã¢ã¢ãã¬ã¹ãç¹å®ã®åäžããã€ã¹ã®ããã€ã¹ã¢ãã¬ã¹ã«èšå®ããã
- ãã¹ãã¯ã9.3.12 ç¯ã§å®çŸ©ãããæ¥ç¶ãã©ã¡ãŒã¿ãèšå®ããªããã°ãªããªãã
- ãã¹ãã¯æ¥ç¶ãéå§ããªããã°ãªããªãã
ãã®æé ã¯ãæ¥ç¶ã確ç«ãããšãããŸãã¯ãã¹ããæé ãçµäºãããšãã«çµäºããã
9.3.9 æ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé
9.3.9.1 説æ
æ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé ã§ã¯ãããªãã§ã©ã«ãŸãã¯ã»ã³ãã©ã«ã確ç«ããæ¥ç¶ã®ãªã³ã¯ã¬ã€ã€æ¥ç¶ãã©ã¡ãŒã¿ãæŽæ°ããããšãã§ããŸãã
9.3.9.2 æ¡ä»¶
ããã€ã¹ãäžå€®ã®åœ¹å²ã«ããéãããã€ã¹ã¯æ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé ããµããŒãããªããã°ãªããªãã ããã€ã¹ãããªãã§ã©ã«ã»ããŒã«ã®ã¿ã«ããå Žåãããã€ã¹ã¯æ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé ããµããŒãããããšãã§ããã ããã€ã¹ããããŒããã£ã¹ã¿ãŸãã¯ãªãã¶ãŒãã®åœ¹å²ã«ããéã¯ãããã€ã¹ã¯æ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé ããµããŒãããŠã¯ãªããªãã
æ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé ãéå§ããã»ã³ãã©ã«ã¯ãã»ã³ãã©ã«åã¯ããªãã§ã©ã«ã®ãããããæ¥ç¶ãã©ã¡ãŒã¿èŠæ±ãªã³ã¯ã¬ã€ã€å¶åŸ¡æé ããµããŒãããŠããªãå Žåã«ã¯ã[Vol 6]ããŒãBãã»ã¯ã·ã§ã³5.1.1.1ã«å®çŸ©ãããŠãããªã³ã¯ã¬ã€ã€æ¥ç¶æŽæ°æé ããå¿ èŠãªæ¥ç¶ãã©ã¡ãŒã¿ãšå ±ã«äœ¿çšããªããã°ãªããªãã
ã»ã³ãã©ã«åã³ããªãã§ã©ã«ã®äž¡æ¹ãConnection Parameters Request Link Layer Controlæé ããµããŒãããŠããå Žåãæ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé ãéå§ããã»ã³ãã©ã«åã¯ããªãã§ã©ã«ã¯ãå¿ èŠãªæ¥ç¶ãã©ã¡ãŒã¿ãæ·»ããŠ[Vol 6] Part B, Section 5.1.7ã«å®çŸ©ãããŠããConnection Parameters Request Link Layer Controlæé ã䜿çšããªããã°ãªããªãã
äžå€®åã¯ããªãã§ã©ã«ã®ããããããæ¥ç¶ãã©ã¡ãŒã¿èŠæ±ãªã³ã¯å±€å¶åŸ¡æé ããµããŒãããŠããªãå Žåãæ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé ãéå§ããããªãã§ã©ã«ã¯ãå¿ èŠãªæ¥ç¶ãã©ã¡ãŒã¿ãšãšãã«ã[Vol 3]ããŒãAã®ã»ã¯ã·ã§ã³4.20ã«å®çŸ©ãããŠããL2CAPæ¥ç¶ãã©ã¡ãŒã¿æŽæ°èŠæ±ã³ãã³ãã䜿çšããªããã°ãªããªãã åšèŸºæ©åšã¯ãL2CAPæ¥ç¶ãã©ã¡ãŒã¿æŽæ°å¿çãåä¿¡ããŠããTGAP(conn_param_timeout)以å ã«ãL2CAPæ¥ç¶ãã©ã¡ãŒã¿æŽæ°èŠæ±ã³ãã³ããéä¿¡ããŠã¯ãªããªãã ã»ã³ãã©ã«ã¯ãããªãã§ã©ã«ãéå§ããæ¥ç¶ãã©ã¡ãŒã¿æŽæ°ãåãå ¥ããå ŽåãTGAP(conn_param_timeout)å ã§ãå¿ èŠãªæ¥ç¶ãã©ã¡ãŒã¿ã䜿çšããŠã[Vol 6]ããŒãBãã»ã¯ã·ã§ã³5.1.1.1ã«å®çŸ©ãããŠãããªã³ã¯ã¬ã€ã€æ¥ç¶æŽæ°æé ãéå§ããå¿ èŠããããŸãã
èŠæ±ãŸãã¯æŽæ°ãããæ¥ç¶ãã©ã¡ãŒã¿ãã»ã³ãã©ã«ãŸãã¯ããªãã§ã©ã«ã«åãå ¥ããããªãå Žåããšã©ãŒã³ãŒã 0x3B(Unacceptable Connection Parameters)ã§æ¥ç¶ãåæããããšããããŸãã ããã€ã¹ã¯ããªã¢ãŒãã»ããã€ã¹ããäžããããæ¥ç¶ãã©ã¡ãŒã¿ã«å¯å®¹ã§ãªããã°ãªããŸããã
9.3.10 æ¥ç¶ã®çµäºæé
9.3.10.1 説æ
Terminate Connection ããã·ãŒãžã£ã¯ããã¹ãããã¢ããã€ã¹ãšã®æ¥ç¶ãçµäºãããããšãå¯èœã«ããŸãã
9.3.10.2 æ¡ä»¶
äžå€®åã³åšèŸºæ©åšã¯ãæ¥ç¶ã®çµäºæé ããµããŒãããªããã°ãªããªãã ãããŒããã£ã¹ãåã³ãªãã¶ãŒãã¯ãæ¥ç¶çµäºæé ããµããŒãããªããã®ãšããã
æ¥ç¶çµäºæé ãéå§ãããã¹ãã¯ã[Vol.6] Part B 5.1.6 ç¯ã§å®çŸ©ããããªã³ã¯ã¬ã€ã€çµäºæé ã䜿çšããªããã°ãªããªãã
9.3.11 æ¥ç¶ç¢ºç«ã¿ã€ãã³ã°ãã©ã¡ãŒã¿
9.3.11.1 説æ
æ¥ç¶ç¢ºç«ã¿ã€ãã³ã°ã»ãã©ã¡ãŒã¿ã¯ãã»ã³ãã©ã«ã»ããã€ã¹ãšããªãã§ã©ã«ã»ããã€ã¹éã®åææ¥ç¶ç¢ºç«æã«äœ¿çšãããŸãã
ã»ã³ãã©ã«ããã€ã¹ã¯ãæ¥ç¶å¯èœãªã¢ãŒãã§ããªãã§ã©ã«ããã€ã¹ãžã®æ¥ç¶ãéå§ããããã«ãGAPæ¥ç¶ç¢ºç«æé ã®ããããã䜿çšããå¿ èŠããããŸãã ãããã®ã¿ã€ãã³ã°ãã©ã¡ãŒã¿ã䜿çšããå¯èœæ§ã®ããæé ãšã¢ãŒãã«ã€ããŠã¯ãã»ã¯ã·ã§ã³9.3.4ïœã»ã¯ã·ã§ã³9.3.8ã§å®çŸ©ãããŠããŸãã
9.3.11.2 æ¡ä»¶
ãŠãŒã¶ãŒèµ·ååã® GAP æ¥ç¶ç¢ºç«æé ãéå§ããã»ã³ãã©ã«ããã€ã¹ã¯ãLE 1M PHY ã§ã¹ãã£ã³ããå Žåãæšå¥šãããã¹ãã£ã³éé TGAP(scan_fast_interval)ãšã¹ãã£ã³ãŠã£ã³ã㊠TGAP(scan_fast_window)ã TGAP(scan_fast_period)ã«äœ¿çšããLE Coded PHY ã§ã¹ãã£ã³ããå Žåãã¹ãã£ã³éé TGAP(scan_fast_interval_coded)ãšã¹ãã£ã³ãŠã£ã³ã㊠TGAP(scan_fast_window_coded)ã TGAP(scan_fast_period)ã«äœ¿çšããªããã°ãªããªãã
ããã¯ã°ã©ãŠã³ãã¹ãã£ã³ãè¡ãã»ã³ãã©ã«ããã€ã¹ïŒããªãã¡ããŠãŒã¶ãèµ·åããªã GAP æ¥ç¶ç¢ºç«æé ã®äžéšãšããŠïŒã¯ãLE 1M PHY ã§ã®ã¹ãã£ã³æã«æšå¥šãããã¹ãã£ã³éé TGAP(scan_slow_interval1)ãšã¹ãã£ã³ãŠã£ã³ã㊠TGAP(scan_slow_window1)ã䜿çšããLE Coded PHY ã§ã®ã¹ãã£ã³æã«ã¯ã¹ãã£ã³éé TGAP(scan_slow_interval1_coded)ãšã¹ãã£ã³ãŠã£ã³ã㊠TGAP(scan_slow_window1_coded)ã䜿çšãã¹ãã§ããã ãããã¯ãã»ã³ãã©ã«ã¯ãLE 1M PHY ã§ã¹ãã£ã³ããéã« TGAP(scan_slow_interval2)ãšã¹ãã£ã³ãŠã£ã³ã㊠TGAP(scan_slow_window2)ã䜿çšããŠããããLE Coded PHY ã§ã¹ãã£ã³ããéã« TGAP(scan_slow_interval2_coded)ãšã¹ãã£ã³ãŠã£ã³ã㊠TGAP(scan_slow_window2_coded)ã䜿çšãã¹ãã§ããã
以äžã® GAP ã¢ãŒãã«å ¥ãããªãã§ã©ã«ããã€ã¹ã¯ãLE 1M PHY äžã§åºåãè¡ãå Žåãæšå¥šãããåºåéé TGAP(adv_fast_interval1)ã TGAP(adv_fast_period)ã«äœ¿çšããLE ã³ãŒãå PHY äžã§åºåãè¡ãå Žå㯠TGAP(adv_fast_period)ã« TGAP(adv_fast_interval1_coded)ã䜿çšããå¿ èŠããããŸãã
- ç¡æåæ¥ç¶ã¢ãŒã
- éå®çãªçºèŠå¯èœã¢ãŒããšæ¥ç¶å¯èœãªç¡æååºåã€ãã³ãã®éä¿¡
- äžè¬çãªçºèŠå¯èœã¢ãŒããšæ¥ç¶å¯èœãªç¡æååºåã€ãã³ãã®éä¿¡
- æç€ºãããæ¥ç¶å¯èœãªã¢ãŒããšäœãã¥ãŒãã£ãµã€ã¯ã«ã®æ¥ç¶å¯èœãªæç€ºãããåºåã€ãã³ãã®éä¿¡
以äžã® GAP ã¢ãŒãã«å ¥ãã鿥ç¶ååºåã€ãã³ããéä¿¡ããå Žåãããªãã§ã©ã«ããã€ã¹ã¯ãLE 1M PHY äžã§åºåãè¡ãå Žå㯠TGAP(adv_fast_period)ã«æšå¥šãããåºåéé TGAP(adv_fast_interval2)ã䜿çšããLE Coded PHY äžã§åºåãè¡ãå Žå㯠TGAP(adv_fast_period)ã« TGAP(adv_fast_interval2_coded)ã䜿çšããªããã°ãªããªãã
- éçºèŠå¯èœã¢ãŒã
- 鿥ç¶ã¢ãŒã
- éå®çºèŠã¢ãŒã
- äžè¬çãªçºèŠå¯èœã¢ãŒã
é«ãã¥ãŒãã£ãµã€ã¯ã«ã®æ¥ç¶å¯èœãªæåååºåã€ãã³ããæã€ GAP Directed Connectable Mode 以å€ã® GAP Mode ã§ããã¯ã°ã©ãŠã³ãåºåãè¡ãããªãã§ã©ã«ããã€ã¹ã¯ãLE 1M PHY äžã§åºåãè¡ãå Žåã¯æšå¥šãããåºåéé TGAP(adv_slow_interval)ã䜿çšããLE Coded PHY äžã§åºåãè¡ãå Žå㯠TGAP(adv_slow_interval_coded)ã䜿çšããããšãæšå¥šãããã
泚ïŒåºåäž»ãä»ã®ããã€ã¹ãšå¹²æžããå¯èœæ§ãããç°å¢ã§ã100ms æªæºã®åºåééå€ã鿥ç¶åãŸãã¯ã¹ãã£ã³å¯èœãªç¡æååºåã«äœ¿çšãããå Žåãå¹²æžãæå°åããããã®æªçœ®ããšãããšãæšå¥šãããŸãã äŸãã°ãåºåã¯æ°ç§ã ãæå¹ã«ããŠæ°åéã¯ç¡å¹ã«ãããªã©ã亀äºã«è¡ãããšãã§ããŸãã
9.3.12 æ¥ç¶ééã¿ã€ãã³ã°ãã©ã¡ãŒã¿
9.3.12.1 説æ
æ¥ç¶ééã®ã¿ã€ãã³ã°ãã©ã¡ãŒã¿ã¯ãæ¥ç¶å ã§äœ¿çšãããŸãã åææ¥ç¶ééã¯ããã³ãã£ã³ã°ãæå·åã»ããã¢ããããµãŒãã¹ãã£ã¹ã«ããªãŒãªã©ã®æé ãè¿ éã«å®äºãããããã«äœ¿çšãããŸãã æ¥ç¶ééã¯ãæé ã®éå§ãå®äºããåŸãPeripheral Preferred Connection Parametersç¹æ§ã®å€ã«å€æŽããå¿ èŠããããŸãã
9.3.12.2 æ¡ä»¶
ã»ã³ãã©ã«ããã€ã¹ã¯ãPeripheral Preferred Connection Parameters ç¹æ§(ã»ã¯ã·ã§ã³ 12.3 åç §)ãèªã¿èŸŒãããåºåããŒã¿ãããã©ã¡ãŒã¿ãååŸãã(ã»ã¯ã·ã§ã³ 12.3 åç §)ã
æ¥ç¶ééã¯ãLE 1M PHY äžã§æ¥ç¶ã確ç«ããå Žå㯠TGAP(initial_conn_interval)ã«èšå®ããLE Coded PHY äžã§æ¥ç¶ã確ç«ããå Žå㯠TGAP(initial_conn_interval_coded)ã«èšå®ããã¹ã¬ãŒãã¬ã€ãã³ã·ã¯ãŒãã«èšå®ãã¹ãã§ããã ãããã®ãã©ã¡ãŒã¿ã¯ãã»ã³ãã©ã«ã»ããã€ã¹ããã以äžä¿çäžã®ã¢ã¯ã·ã§ã³ãå®è¡ããªããããŸãã¯ããªãã§ã©ã«ã»ããã€ã¹ãæ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé ãå®è¡ãããŸã§äœ¿çšãããã¹ãã§ããïŒã»ã¯ã·ã§ã³ 9.3.9 åç §ïŒã
ã»ã³ãã©ã«ããã€ã¹ããã以äžä¿çäžã®ã¢ã¯ã·ã§ã³ãå®è¡ããããšããªããããªãã§ã©ã«ããã€ã¹ãTGAP(conn_pause_central)å ã§ä»ã®ã¢ã¯ã·ã§ã³ãéå§ããŠããªãåŸãã»ã³ãã©ã«ããã€ã¹ã¯Connection Parameter Updateæé (ã»ã¯ã·ã§ã³9.3.9åç §)ãåŒã³åºããæ¥ç¶ééãPeripheral Preferred Connection Parametersç¹æ§ã§æå®ããããã®ã«å€æŽããã¹ãã§ããã
äžå€®è£ 眮ãPeripheral Preferred Connection Parametersç¹æ§ãèªã¿åã£ãŠããªãå Žåãäžå€®è£ 眮ã¯ã䜿çšããæ¥ç¶ãã©ã¡ãŒã¿ãéžæããŠãããã
ããªãã§ã©ã«ããã€ã¹ãå®è¡ãã¹ãæŽãªãä¿çäžã®ã¢ã¯ã·ã§ã³ãæãããã»ã³ãã©ã«ããã€ã¹ãTGAP(conn_pause_central)å ã§ä»ã®ã¢ã¯ã·ã§ã³ãéå§ããŠããªãåŸãããªãã§ã©ã«ããã€ã¹ã¯ãæ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé ãå®è¡ããŠãããïŒã»ã¯ã·ã§ã³9.3.9åç §ïŒã Peripheral ããã€ã¹ã¯ãæ¥ç¶ã確ç«ããåŸãTGAP(conn_pause_peripheral)å ã§ Connection Parameter Update æé ãå®è¡ããŠã¯ãªããªãã
ããŒãªãã¬ãã·ã¥åã¯æå·åèšå®æé ãå¿ èŠãšãããçŸåšã®æ¥ç¶ééã LE 1M PHY å㯠LE 2M PHY ã«æ¥ç¶ãããŠããå Žå㯠TGAP(initial_conn_interval)ããã倧ãããLE Coded PHY ã«æ¥ç¶ãããŠããå Žå㯠TGAP(initial_conn_interval_coded)ããã倧ããå Žåã¯ãããŒãªãã¬ãã·ã¥åã¯æå·åèšå®æé ã®åã«æ¥ç¶ãã©ã¡ãŒã¿æŽæ°æé (ã»ã¯ã·ã§ã³ 9.3.9 åç §)ãå®è¡ãã¹ãã§ããã æ¥ç¶ééã¯ãLE 1M PHY ã«æ¥ç¶ããå Žå㯠TGAP(initial_conn_interval)ã«ãLE 2M PHY ã«æ¥ç¶ããå Žå㯠TGAP(initial_conn_interval_coded)ã«èšå®ããLE Coded PHY ã«æ¥ç¶ããå Žå㯠TGAP(initial_conn_interval_coded)ã«èšå®ããã¹ã¬ãŒãã®ã¬ã€ãã³ã·ã¯ãŒãã«èšå®ããã ãã®é«éæ¥ç¶ééã¯ãããŒãªãã¬ãã·ã¥ãŸãã¯æå·åã»ããã¢ããæé ãå®äºãããŸã§ç¶æãããã¹ãã§ããã ãã®åŸãããªãã§ã©ã«åªå æ¥ç¶ãã©ã¡ãŒã¿ç¹æ§ã®å€ã«åãæ¿ããã¹ãã§ããã
9.4 ãã³ãã£ã³ã°ã®æ¹æ³ãšæé
ãã³ãã£ã³ã°ã§ã¯ãæ¥ç¶ããã2ã€ã®æ©åšãã»ãã¥ãªãã£æ å ±ãšã¢ã€ãã³ãã£ãã£æ å ±ã亀æã»ä¿åããä¿¡é Œãããé¢ä¿ãæ§ç¯ããããšãã§ããŸãã Vol.3]ããŒãHã®2.4.1ç¯ã§å®çŸ©ãããŠããã»ãã¥ãªãã£æ å ±ãšIDæ å ±ã¯ãã³ãã£ã³ã°æ å ±ãšãåŒã°ããŠããŸãã ããã€ã¹ããã³ãã£ã³ã°æ å ±ãæ ŒçŽãããšããããã€ã¹ããã³ãã£ã³ã°ãããããã³ãã£ã³ã°ãäœæãããããšãã衚çŸã§ç¥ãããŠããŸãã
ãã³ãã£ã³ã°ã«ã¯ãéãã³ãã£ã³ã°ã¢ãŒããšãã³ãã£ã³ã°å¯èœã¢ãŒãã®2ã€ã®ã¢ãŒãããããŸãã ãã³ãã£ã³ã°ã¯ããã³ããã«ã¢ãŒãã®2ã€ã®ããã€ã¹éã§ã®ã¿çºçããå¯èœæ§ããããŸãã ãã³ãã£ã³ã°ã¢ãŒãããµããŒãããããã€ã¹ã®èŠä»¶ãšæé ã¯ã衚 9.4 ã«å®çŸ©ãããŠããŸãã
9.4.1 èŠä»¶
-- Table 9.4: Bonding compliance requirements
9.4.2 ãã³ãã³ãã¢ãŒã
9.4.2.1 説æ
ãã³ãã³ãã¢ãŒãã®ããã€ã¹ã¯ããã¢ããã€ã¹ãšã®éã«ãã³ããäœæããããšãã§ããŸããã
9.4.2.2 æ¡ä»¶
ããã€ã¹ãããªãã§ã©ã«ãŸãã¯ã»ã³ãã©ã«ããŒã«ã«ããéãããã€ã¹ã¯éçµåã¢ãŒãããµããŒãããªããã°ãªããªãã ããã€ã¹ãSecurity Managerã»ã¯ã·ã§ã³ã§å®çŸ©ãããŠããããã«ãã¢ãªã³ã°ããµããŒãããŠããªãå Žåããã® ããã€ã¹ã¯ãã³ãã³ãã£ã³ã°ã¢ãŒãã§ãããšã¿ãªãããã
Security Managerã®ãã¢ãªã³ã°ããµããŒããããŠããå Žåããã¹ãã¯ã[Vol 3]ããŒãHãã»ã¯ã·ã§ã³3.5.1ã§å®çŸ©ãããŠããããã«ãBonding_FlagsããNo Bondingãã«èšå®ãããã³ãã£ã³ã°æ å ±ã亀æããããä¿åãããããŠã¯ãªããªãã
9.4.3 ãã³ãã£ã³ã°å¯èœã¢ãŒã
9.4.3.1 説æ
ãã³ããã«ã¢ãŒãã®ããã€ã¹ã¯ããã³ããã«ã¢ãŒãã®ãã¢ããã€ã¹ãšã®éã«ãã³ããäœæããããšãã§ããŸãã
9.4.3.2 æ¡ä»¶
ãã¹ãã¯ããã¢ãªã³ã°æé ã®éãBonding_Flags ããBondingãã«èšå®ããªããã°ãªããªãã
9.4.4 ãã³ãã£ã³ã°æé
9.4.4.1 説æ
ãã³ãã£ã³ã°æé ã¯ããã³ãã£ã³ã°ãå¿ èŠãšãããµãŒãã¹ã«ããã³ãã£ã³ã°ãããŠããªãããã€ã¹ãã¢ã¯ã»ã¹ããããšãããšãã«å®è¡ãããŠãããã ãã®ãã³ãã£ã³ã°æé ã¯ã2 ã€ã®ããã€ã¹éã®çµåãäœæããç®çã§å®è¡ãããããšããããŸãã
-- Figure 9.7: The bonding procedure
9.4.4.2 æ¡ä»¶
ããã€ã¹ãããªãã§ã©ã«ãŸãã¯ã»ã³ãã©ã«ã®åœ¹å²ã«ããéã¯ãããã€ã¹ã¯ãã³ãã£ã³ã°æé ããµããŒãããŠãããã ããã€ã¹ããããŒããã£ã¹ã¿ãŒãŸãã¯ãªãã¶ãŒãã®åœ¹å²ã«ããéã¯ãããã€ã¹ã¯ãã³ãã£ã³ã°æé ããµããŒãããŠã¯ãªããªãã
Centralã®ãã¹ãã¯ïŒ[Vol 3]ããŒãHïŒ3.5.1ç¯ã§å®çŸ©ãããŠããããã«ïŒBonding_FlagsãBondingã«èšå®ããŠïŒ[Vol 3]ããŒãCïŒ2.1ç¯ã§å®çŸ©ãããŠããããã«ãã¢ãªã³ã°åŠçãéå§ããã ãã¢ããã€ã¹ããã³ãã£ã³ã°å¯èœãªã¢ãŒãã§ããå ŽåïŒããã€ã¹ã¯ãã³ãã£ã³ã°æ å ±ã亀æãïŒã»ãã¥ãªãã£ããŒã¿ããŒã¹ã«æ ŒçŽããªããã°ãªããªãã
ããã€ã¹ããã»ã¯ã·ã§ã³10.8.2.2.2ã«å®çŸ©ãããŠãã解決å¯èœãªãã©ã€ããŒãã¢ãã¬ã¹ã®çæã ãµããŒãããããŒã«ã«ã¢ãã¬ã¹ã®è§£æ±ºå¯èœãªãã©ã€ããŒãã¢ãã¬ã¹ãçæããå Žåã¯ãæå¹ãªIRKãå«ããŠãSMPã§Identityæ å ±ã éä¿¡ããªããã°ãªããªãã ããã€ã¹ãèªåã®ã¢ãã¬ã¹ã«å¯ŸããŠè§£æ±ºå¯èœãªãã©ã€ããŒãã¢ãã¬ã¹ãçæããããã¹ãã SMPã§Identityæ å ±ãéä¿¡ããå Žåããã¹ãã¯ããã¹ãŠãŒãã®IRKãéä¿¡ãããã®ãšããã ãã¹ãã¯ãèªèšŒèŠä»¶ãIRKãé åžããã®ã«ååã§ãªãå Žåããã¢ãªã³ã°æé ãäžæ¢ããããšãã§ããã
äžç¥
10.3 èªèšŒæé
èªèšŒæé ã¯ãããã€ã¹ããªã¢ãŒãããã€ã¹ãžã®ãµãŒãã¹èŠæ±ãéå§ãããšããããã³ããã€ã¹ããªã¢ãŒãããã€ã¹ãããµãŒãã¹èŠæ±ãåä¿¡ãããšãã«ãèŠæ±ãããã»ãã¥ãªãã£ãã©ã®ããã«ç¢ºç«ããããã説æããŸãã èªèšŒæé ã¯ãLE ã»ãã¥ãªãã£ã¢ãŒã 1 ã察象ãšããã èªèšŒæé ã¯ãæ¥ç¶ã確ç«ãããåŸã«ã®ã¿éå§ããããã®ãšããã
LE ã»ãã¥ãªãã£ã»ã¢ãŒãïŒã¯ãããŒã¿çœ²åã®äœ¿çšã«é¢é£ããã»ã¯ã·ã§ã³ 10.4 ã§èŠå®ããã
LE ã»ãã¥ãªãã£ã»ã¢ãŒãïŒã®èªèšŒã¯ãã»ã¯ã·ã§ã³10.6ã§å®çŸ©ãããããã«æå·åãæå¹ã«ããããšã§éæãããã æå·åã®ã»ãã¥ãªãã£ã¯ãå®è¡ããããã¢ãªã³ã°ã®ã¿ã€ãã«ãã£ãŠåœ±é¿ãåããã ãã¢ãªã³ã°ã«ã¯ãèªèšŒæžã¿ãã¢ãªã³ã°ãšæªèªèšŒãã¢ãªã³ã°ã® 2 çš®é¡ãããã èªèšŒæžã¿ãã¢ãªã³ã°ã§ã¯ã[Vol.3] Part H, 2.1 ç¯ã§å®çŸ©ãããŠãããã¢ãªã³ã°æé ããèªèšŒããMITM ä¿è·ãã«èšå®ããŠå®è¡ããŸãã èªèšŒãªãã®ãã¢ãªã³ã°ã§ã¯ïŒèªèšŒããNo MITM protectionãã«èšå®ããŠãã¢ãªã³ã°ãè¡ãïŒ æ³šïŒæ¬ç¯ã§ã¯ïŒãèªèšŒæžã¿ãã¢ãªã³ã°ãããã³ãæªèªèšŒãã¢ãªã³ã°ããšããçšèªã¯ïŒãã¢ãªã³ã°ãå®è¡ããããã«äœ¿çšãããã»ãã¥ãªãã£æ¹æ³ãæãïŒåæ¥ç¶æã®ä»¥åã«çµåãããããã€ã¹ã®èªèšŒãšã¯é¢ä¿ãããŸããã
10.3.1 ç¯ã§ã¯ãããã€ã¹ããµãŒãã¹èŠæ±ã«å¿çããå Žåã®èªèšŒæé ãèŠå®ããã 10.3.2 ç¯ã§ã¯ãããã€ã¹ããµãŒãã¹èŠæ±ãéå§ããéã®èªèšŒæé ãèŠå®ããã
10.3.1 ãµãŒãã¹èŠæ±ãžã®å¿ç
ãã®ã»ã¯ã·ã§ã³ã§ã¯ãããŒã«ã« ããã€ã¹ã¯ããªã¢ãŒã ããã€ã¹ãè¡ã£ããµãŒãã¹èŠæ±ã«å¿çããããã€ã¹ã§ãã L2CAPãããã³ã«ã§ã¯ãããŒã«ã«ããã€ã¹ã¯ããªã¢ãŒãããã€ã¹ãæ¥ç¶èŠæ±ãè¡ã£ãå Žåã«ãæ¥ç¶å¿çã§å¿çããŸãã GATTã§ã¯ãããŒã«ã«ããã€ã¹ãGATTãµãŒãããªã¢ãŒãããã€ã¹ãGATTã¯ã©ã€ã¢ã³ããšãªããŸãã
ããŒã«ã«ããã€ã¹ããªã¢ãŒãããã€ã¹ãããµãŒãã¹èŠæ±ãåä¿¡ããå ŽåããµãŒãã¹èŠæ±ãæåŠãããå Žåã«ã¯ããšã©ãŒã³ãŒããä»ããŠå¿çããã ãšã©ãŒã³ãŒãã¯ãçŸåšã®æ¥ç¶ãæå·åãããŠãããã©ãããšã䜿çšãã LTK ãŸã㯠STK ãäœæããããã«å®è¡ããããã¢ãªã³ã°ã®çš®é¡ã«äŸåããã
ããŒã«ã«ããã€ã¹ããªã¢ãŒãããã€ã¹ãããµãŒãã¹èŠæ±ãåä¿¡ããå Žåã以äžã®ã«ãŒã«ã«åŸã£ãŠåäœããã
-
ããŒã«ã«ããã€ã¹ã®ã»ãã¥ãªãã£ããŒã¿ããŒã¹ã¯ããµãŒãã¹èŠæ±ãåãå ¥ããããã«å¿ èŠãªã»ãã¥ãªãã£èšå®ãæå®ããã æå·åãšããŒã¿çœ²åãå¿ èŠãªãå ŽåããµãŒãã¹èŠæ±ã¯åãå ¥ããããã æå·åãå¿ èŠãªå ŽåãããŒã«ã«ããã€ã¹ã¯è¡š10.2ã§å®çŸ©ãããŠããããã«ãš ã©ãŒã³ãŒããéããªããã°ãªããªãã æå·åãå¿ èŠãªããããŒã¿çœ²åãå¿ èŠãªå ŽåãããŒã«ã«ããã€ã¹ã®åäœã¯ã»ã¯ã·ã§ã³10.4ã§å®çŸ©ãããŠããéãã§ããã
-
LTKãSTKãå©çšå¯èœã§ãªãå ŽåããµãŒãã¹èŠæ±ã¯ãšã©ãŒã³ãŒããInsufficient Authenticationãã§æåŠãããªããã°ãªããªãã
泚ïŒãªã³ã¯ãæå·åãããŠããªãå Žåããšã©ãŒã³ãŒããInsufficient Authenticationãã¯ãMITM ä¿è·ãå¿ èŠã§ããããšã瀺ããªãã
-
LTK ãŸã㯠STK ããããæå·åãå¿ èŠãªå ŽåïŒLE ã»ãã¥ãªãã£ã¢ãŒã 1ïŒã§æå·åãæå¹ã«ãªã£ãŠããªãå Žåã¯ããšã©ãŒã³ãŒããInsufficient Encryptionãã§ãµãŒãã¹èŠæ±ãæåŠããã äžååãªéµãµã€ãºã§æå·åãæå¹ãªå Žåã¯ããµãŒãã¹èŠæ±ã¯ãšã©ãŒã³ãŒã "Insufficient Encryption Key Size "ã§æåŠãããªããã°ãªããªãã
-
èªèšŒæžã¿ãã¢ãªã³ã°ãèŠæ±ãããŠãããïŒèªèšŒãããŠããªããã¢ãªã³ã°ã®ã¿ãçºçãïŒãªã³ã¯ãçŸåšæå·åãããŠããå ŽåïŒãµãŒãã¹èŠæ±ã¯ãšã©ãŒã³ãŒã "Insufficient Authentication "ã§æåŠãããã
泚ïŒèªèšŒãããŠããªããã¢ãªã³ã°ãçºçãããªã³ã¯ãçŸåšæå·åãããŠããå Žåããšã©ãŒã³ãŒããInsufficient Authenticationãã¯ãMITM ä¿è·ãå¿ èŠã§ããããšã瀺ãã
- LE Secure Connections ã®ãã¢ãªã³ã°ãå¿ èŠã ããLE ã¬ã¬ã·ãŒã»ãã¢ãªã³ã°ãçºçãããªã³ã¯ãçŸåšæå·åãããŠããå ŽåããµãŒãã¹èŠæ±ã¯ããšã©ãŒã»ã³ãŒããInsufficient Authenticationãã§æåŠããããã®ãšããã
ããŒã«ã«ã»ããã€ã¹ã¯ããã®ãµãŒãã¹ãžã®ã¢ã¯ã»ã¹ã«å¿ èŠãªæäœéã®ã»ãã¥ãªãã£ã»ã¬ãã«ã§å¿çããã ããŒã«ã«ããã€ã¹ãã»ãã¥ãªãã£èŠæ±ãæããªãå Žåã¯ããã¢ãªã³ã°ãã§ãŒãº1ã§å®çŸ©ãããããŒã«ã«ããã€ã¹ãå¯èœãªæäœéã®ã»ãã¥ãªãã£ã¬ãã«ãããã©ã«ããšããïŒ[Vol.3]ããŒãHã®2.1ç¯åç §ïŒã
ããŒã«ã«ããã€ã¹ãèŠæ±ãããIOèœåãŸãã¯OBããŒã¿1ããµããŒãããŠããªãå ŽåïŒããŒã«ã«ããã€ã¹ã¯ïŒèªèšŒæžã¿ãã¢ãªã³ã°ïŒMITMïŒãå¿ èŠãšããªããã®ãšããã
ããŒã«ã«ããã€ã¹ããªã¢ãŒãããã€ã¹ããã®ãµãŒãã¹èŠæ±ã«å¿çããããšã衚10.2ã«ãŸãšããã
-- 衚10.2. ããŒã«ã«ããã€ã¹ããµãŒãã¹èŠæ±ã«å¿çãã
å³10.1ã«ãµãŒãããµãŒãã¹ãªã¯ãšã¹ããã©ã®ããã«åŠçãããã瀺ãã
-- å³10.1. å³10.1: ããŒã«ã«ããã€ã¹ããªã¢ãŒãããã€ã¹ããã®ãµãŒãã¹èŠæ±ãåŠçããå Žåã®ãããŒãã£ãŒã
10.3.1.1 GATTã®è¡šç€ºãšéç¥ã®åæ±ã
ã¯ã©ã€ã¢ã³ãã¯ãã¯ã©ã€ã¢ã³ãç¹æ§èšå®èšè¿°åãä»ããŠãµãŒããé©åã«èšå®ããããšã§ãæç€ºãéç¥ãéä¿¡ããããã«ãµãŒãã«ãèŠæ±ãããŸãã èšå®ã¯åæãšåæ¥ç¶ã®éãæç¶ããã®ã§ãåæ¥ç¶æã«èšå®ãšç §ããåãããŠã»ãã¥ãªãã£èŠä»¶ããã§ãã¯ããŠãããæç€ºãšéç¥ãéä¿¡ããªããã°ãªããŸããã
10.3.1.1 GATTã®è¡šç€ºãšéç¥ã®åæ±ã
ã¯ã©ã€ã¢ã³ãã¯ãã¯ã©ã€ã¢ã³ãç¹æ§èšå®èšè¿°åãä»ããŠãµãŒããé©åã«èšå®ããããšã§ã衚瀺ãéç¥ãéä¿¡ããããã«ãµãŒãã«ãèŠæ±ãããŸãã èšå®ã¯åæãšåæ¥ç¶ã®éãæç¶ããã®ã§ã衚瀺ãéç¥ãéä¿¡ããåã«ãåæ¥ç¶æã«ã»ãã¥ãªãã£èŠä»¶ãèšå®ãšç §åããªããã°ãªããŸããã ãµãŒãããã»ãã¥ãªãã£ãèŠæ±ãããæç€ºãŸãã¯éç¥ãéä¿¡ããããã«ã¯ã©ã€ã¢ã³ãã«åæ¥ç¶ããå ŽåããµãŒãã¯ãæç€ºãŸãã¯éç¥ãéä¿¡ããåã«ãã¯ã©ã€ã¢ã³ããšã®éã§æå·åãéå§ãããããŸãã¯èŠæ±ããªããã°ãªããªãã ã¯ã©ã€ã¢ã³ããçµåã倱ã£ãããšã瀺ãLTKãæã£ãŠããªãå Žåãæå·åãæå¹ã«ããããšã¯å€±æããã
10.3.1.2 ã¯ãã¹ãã©ã³ã¹ããŒãéµçæ
æå·åãæå¹ã«ãªããæ£ããã»ãã¥ãªãã£ã¬ãã«ãéæãããäž¡æ¹ã®ããã€ã¹ãã¯ãã¹ãã©ã³ã¹ããŒãéµçæããµããŒãããåŸãäž¡æ¹ã®ããã€ã¹ãBR/EDRãªã³ã¯éµã®å°åºãå®è¡ããããšãã§ããŸãã
泚: LTK ã« 16 ãªã¯ããã(128 ããã)æªæºã®æå·åããŒãµã€ãºãããå ŽåãBR/EDR ãªã³ã¯ããŒã¯ LTK ããã¹ã¯ãããåã«å°åºãããŸãã
10.3.2 ãµãŒãã¹ãªã¯ãšã¹ãã®éå§
ãã®ã»ã¯ã·ã§ã³ã§ã¯ãããŒã«ã« ããã€ã¹ã¯ããªã¢ãŒã ããã€ã¹ãžã®ãµãŒãã¹èŠæ±ãéå§ããããã€ã¹ã§ãã L2CAPãããã³ã«ã§ã¯ãããŒã«ã«ããã€ã¹ãæ¥ç¶èŠæ±ãéä¿¡ãããªã¢ãŒãããã€ã¹ãæ¥ç¶å¿çãéä¿¡ããŸãã GATTã§ã¯ãããŒã«ã«ããã€ã¹ãGATTã¯ã©ã€ã¢ã³ãããªã¢ãŒãããã€ã¹ãGATTãµãŒããšãªããŸãã
ããŒã«ã«ããã€ã¹ããªã¢ãŒãããã€ã¹ãžã®ãµãŒãã¹èŠæ±ãéå§ããå Žåã¯ã以äžã®ã«ãŒã«ã«åŸã£ãŠåäœããã
-
ããŒã«ã«ããã€ã¹ã®ã»ãã¥ãªãã£ããŒã¿ããŒã¹ã¯ããµãŒãã¹èŠæ±ãéå§ããããã«å¿ èŠãªã»ãã¥ãªãã£ãæå®ããã ããŒã«ã«ããã€ã¹ã®ã»ãã¥ãªãã£ããŒã¿ããŒã¹ã¯ããµãŒãã¹èŠæ±ãéå§ããããã«å¿ èŠãªã»ãã¥ãª ãã£ãæå®ããã ããŒã«ã«ããã€ã¹ãæå·åãèŠæ±ããªãå ŽåããµãŒãã¹èŠæ±ã¯æå·åããã¢ãªã³ã°ãããã«é²è¡ããŠãããã
-
LTKãå©çšã§ããªããæå·åãå¿ èŠãªå Žåã¯ãããŒã«ã«ããã€ã¹ã®å¿ èŠãªèªèšŒèšå®ã§ãã¢ãªã³ã°æé ãéå§ããªããã°ãªããªãã ãã¢ãªã³ã°æé ã倱æããå ŽåããµãŒãã¹èŠæ±ã¯äžæ¢ãããªããã°ãªããªãã
æ³šïŒæå·åãæå¹ã«ãªã£ãŠããªãå Žåããšã©ãŒã³ãŒããInsufficient Authenticationãã¯ãããŒã«ã«ããã€ã¹ã«MITMä¿è·ãå¿ èŠã§ããããšã瀺ããªãã
泚ïŒããŒã«ã«ããã€ã¹ãããªãã§ã©ã«ã§ããå ŽåïŒ[Vol 3]ããŒãHïŒã»ã¯ã·ã§ã³2.4.6ã§å®çŸ©ãããŠããããã«ïŒã¹ã¬ãŒãèµ·ååã»ãã¥ãªãã£èŠæ±ãéä¿¡ããŠãããã
-
ãã¢ãªã³ã°ãçºçãããïŒæå·åããŒãµã€ãºãäžååãªå Žåã¯ïŒå¿ èŠãªæå·åããŒãµã€ãºã§ãã¢ãªã³ã°æé ãå®è¡ããªããã°ãªããªãã ãã¢ãªã³ã°æé ã倱æããå Žåã¯ããµãŒãã¹èŠæ±ãäžæ¢ããã
-
LTKãå©çšå¯èœã§æå·åãå¿ èŠãªå Žå(LEã»ãã¥ãªãã£ã¢ãŒã1)ãã»ã¯ã·ã§ã³10.6ã§ å®çŸ©ãããŠããããã«ãµãŒãã¹ãªã¯ãšã¹ããé²ãåã«æå·åãæå¹ã«ããªããã°ãªããªãã æå·åãæå¹åããããšããµãŒãã¹èŠæ±ã¯ç¶è¡ããããã®ãšããã æå·åã倱æããå Žåã¯ããªã¢ãŒãããã€ã¹ã«ãã³ãããã¯ãååšããªãããééã£ãããã€ã¹ãæ¥ç¶ããããã®ããããã§ããã ããŒã«ã«ããã€ã¹ã¯ããªã¢ãŒãããã€ã¹ã確èªããããã®ãŠãŒã¶ãŒãšã®ãããšãã®åŸã åçµåãããµãŒãã¹ãã£ã¹ã«ããªãå®è¡ãããªã¢ãŒãããã€ã¹ãåèšå®ããªããã°ãªããªãã ããŒã«ã«ããã€ã¹ã以åã«ãªã¢ãŒãããã€ã¹ããService Changedãç¹æ§ãæã£ãŠããªããšå€æããå ŽåããŸãã¯ãDatabase Hashãç¹æ§ãèªã¿åã£ãŠããŒã¿ããŒã¹ã倿ŽãããŠããªããšããŒã«ã«ããã€ã¹ã倿ããå ŽåããµãŒãã¹æ€åºã¯ã¹ããããããå¯èœæ§ããããŸãã
-
èªèšŒããããã¢ãªã³ã°ãå¿ èŠã ããèªèšŒãããŠããªããã¢ãªã³ã°ããçºçããŠãããããªã³ã¯ãçŸåšæå·åãããŠããå Žåããã¢ãªã³ã°æé ã¯å¿ èŠãªèªèšŒèšå®ã§å®è¡ãããã¹ãã§ããã ãã¢ãªã³ã°æé ã倱æããå ŽåïŒåã¯ããŒã«ã«ããã€ã¹ãšãªã¢ãŒãããã€ã¹ã®IOèœåã§èªèšŒæžã¿ãã¢ãªã³ã°ãå®è¡ã§ããªãå ŽåïŒãµãŒãã¹èŠæ±ã¯äžæ¢ãããªããã°ãªããªãã 2ã€ã®ããã€ã¹éã«çµåãäœæãããŠããå Žåããããªã忥ç¶ãããµãŒãã¹èŠæ±ãéå§ããåã«ãããŒã«ã«ããã€ã¹ããªã¢ãŒãããã€ã¹ãšã®éã§æå·åãæå¹ã«ããããèŠæ±ããçµæãšãªãã¹ãã§ããã ããŒã«ã«ããã€ã¹ããµãŒãã¹èŠæ±ãéå§ããåã«æå·åãæå¹ã«ããããšã©ãŒã³ãŒãã«äŸåããŠã»ãã¥ãªãã£èŠä»¶ã決å®ããå ŽåãããŒã«ã«ããã€ã¹ã¯ããªã³ã¯ãæå·åãããŠããªãéã«ãªã¢ãŒãããã€ã¹ãããInsufficient Authenticationããšã©ãŒã³ãŒããåä¿¡ããããšã«å¿çããŠãMITMä¿è·ãšã®ãã¢ãªã³ã°ãèŠæ±ããŠã¯ãªããªãã ããŒã«ã«ããã€ã¹ã¯ïŒããŒã«ã«ããã€ã¹èªèº«ãMITMä¿è·ãèŠæ±ããå Žåã«ã®ã¿ïŒMITMä¿è·èŠæ±ãã©ã°ãèšå®ããªããã°ãªããªãã
-
ãµãŒãã¹ãªã¯ãšã¹ãæã«æå·åãæå¹ã«ãªã£ãŠãããããšã©ãŒã³ãŒããInsufficient Authenticationããåä¿¡ããããŒã«ã«ããã€ã¹ãçŸåš LTK ãæã£ãŠããå Žåã¯ãæå·åæé ãéå§ããå¿ èŠããããŸã(ã»ã¯ã·ã§ã³ 10.6 åç §)ã ããã倱æããå Žå(ãªã¢ãŒãããã€ã¹ããã³ãã倱ããLTKããã¯ãæã£ãŠããªãããšã瀺ããŠããå¯èœæ§ãé«ã)ããŸãã¯ããŒã«ã«ããã€ã¹ãæ£ããLTKãæã£ãŠããªãå Žåã¯ããã¢ãªã³ã°æé ãéå§ãã¹ãã§ããã IOèœåã¯ãã¢ãªã³ã°ãã§ãŒãº1ã§äº€æããïŒ[Vol 3]ããŒãHãã»ã¯ã·ã§ã³2.1åç §ïŒãã»ãã¥ãªãã£ã¬ãã«ã¯ããã€ã¹ã®IOèœåãšMITMèŠä»¶ã«ãã£ãŠæ±ºå®ãããªããã°ãªããªãã
-
ãµãŒãã¹èŠæ±æã«æå·åãæå¹ã«ãªã£ãŠãããïŒãšã©ãŒã³ãŒã "Insufficient Encryption "ãåä¿¡ãïŒããŒã«ã«ããã€ã¹ãçŸåšLTKãæã£ãŠããå Žåã¯ïŒæå·åæé ãéå§ããªããã°ãªããªãïŒ10.6ç¯åç §ïŒã æå·åã®éå§ã«å€±æããå ŽåïŒãªã¢ãŒãã»ããã€ã¹ããã³ãã倱ããLTK ãæããªããªã£ãããšã瀺ããŠããå¯èœæ§ ãé«ãïŒããŸãã¯ããŒã«ã«ã»ããã€ã¹ãæ£ãã LTK ãæã£ãŠããªãå Žåã¯ããã¢ãªã³ã°æé ãéå§ãã¹ãã§ããã
-
LE Secure Connections èªèšŒãã¢ãªã³ã°ãå¿ èŠã ãããªã¢ãŒãããã€ã¹ã LE Secure Connections ããµããŒãããŠããªãå ŽåããµãŒãã¹èŠæ±ã¯äžæ¢ããããã®ãšããã
å³ 10.2 ã«ãã¯ã©ã€ã¢ã³ãããµãŒãã¹èŠæ±ãçºè¡ããæ¹æ³ã瀺ãã
-- å³ 10.2. å³ 10.2: ããŒã«ã«ã»ããã€ã¹ããªã¢ãŒãã»ããã€ã¹ã«ãµãŒãã¹èŠæ±ãçºè¡ããå Žåã®ãããŒã»ãã£ãŒã
10.3.2.1 ã¯ãã¹ãã©ã³ã¹ããŒãéµã®çæ
æå·åãæå¹ã«ãªããæ£ããã»ãã¥ãªãã£ã¬ãã«ãéæãããäž¡æ¹ã®ããã€ã¹ãã¯ãã¹ãã©ã³ã¹ããŒãéµçæããµããŒãããåŸãäž¡æ¹ã®ããã€ã¹ãBR/EDRãªã³ã¯éµã®å°åºãå®è¡ããããšãã§ããŸãã
泚ïŒLTKã«16ãªã¯ãããïŒ128ãããïŒæªæºã®æå·åããŒãµã€ãºãããå ŽåãLTKããã¹ã¯ãããåã«BR/EDRãªã³ã¯ããŒãå°åºãããŸãã
10.4 ããŒã¿çœ²å
ããŒã¿çœ²åæ¹åŒã¯ãæå·åãããŠããªãæ¥ç¶ã§2å°ã®æ©åšéã§èªèšŒãããããŒã¿ã転éããããã«äœ¿çšãããŸãã ãã®ããŒã¿çœ²åæ¹åŒã¯ãé«éãªæ¥ç¶èšå®ãšé«éãªããŒã¿è»¢éãå¿ èŠãšãããµãŒãã¹ã§äœ¿çšããã ãµãŒãã¹èŠæ±ã LE ã»ãã¥ãªãã£ã¢ãŒã 2 ãæå®ããå Žåã¯ãæ¥ç¶ããŒã¿çœ²åæé ã䜿çšããã
10.4.1 æ¥ç¶ããŒã¿çœ²åæé
ããã€ã¹ã¯ãæ¥ç¶ã«ãããŠçœ²åããŒã¿ãéä¿¡ããçžæããã€ã¹ã®é忝ã«ãæ°ãã«æ¥ç¶çœ²åè§£æ±ºéµ CSRK ãçæããã CSRK ã«ã€ããŠã¯ã[Vol.3]ããŒã H 2.4.2.2.2 ç¯ã§å®çŸ©ããã
ããã§ãm ã¯çœ²åããããŒã¿ PDUãk 㯠CSRKãSignCounter ã¯ã«ãŠã³ã¿å€ã§ããã 眲åã¯ãã«ãŠã³ã¿å€ãšã眲åã¢ã«ãŽãªãºã ã«ãã£ãŠçæãããã¡ãã»ãŒãžèªèšŒã³ãŒãïŒMACïŒããæ§æãããã ã«ãŠã³ã¿å€ã¯ãéä¿¡ãããæ°ããããŒã¿ïŒ°ïŒ€ïŒµããšã«ïŒãã€ã€ã³ã¯ãªã¡ã³ããããªããã°ãªããªãã
眲åããŒã¿ã®ãã©ãŒããããå³ 10.3 ã«ç€ºãã
-- å³ 10.3ïŒç¬Šå·ä»ãããŒã¿ã®äžè¬çãªãã©ãŒããã
10.4.2 眲åããŒã¿ã®èªèšŒæç¶ã
æå·åãå¿ èŠãªããã〠CSRK ãå©çšå¯èœãªå ŽåïŒLE ã»ãã¥ãªãã£ã¢ãŒã 2ïŒãæžãèŸŒã¿æäœãå«ããµãŒãã¹èŠæ±ãè¡ ãéã«ã¯ãããŒã¿çœ²åæé ã䜿çšããããã®ãšããã
泚ïŒãµãŒãäžã®çµåã®ååšã¯ãã»ã¯ã·ã§ã³10.6ã§å®çŸ©ãããŠããæå·åæé ã䜿çšããŠãµãŒããšã®æå·åãæ£åžžã«æå¹ã«ããããšã«ãã£ãŠæ±ºå®ããããšãã§ããã äžäœã¬ã€ã€ã®ãããã¡ã€ã«ã§ã¯ãã¯ã©ã€ã¢ã³ããèªèšŒæé ãå®è¡ããªãããšãèš±å¯ããŠãããã ãããã¯ãäžäœã¬ã€ã€ãããã³ã«ã¯ã眲åãã§ãã¯ããã³ãã倱ã£ãããã«å€±æããããšãã¯ã©ã€ã¢ã³ãã«éç¥ããŠããããã¯ã©ã€ã¢ã³ãã¯ããã®åŸããŠãŒã¶ã«éç¥ãããããŸãã¯ãã³ããå確ç«ããããã«å床ãã¢ãªã³ã°ã詊ã¿ãããã®æªçœ®ããšã£ãŠãããã
眲åãããããŒã¿ãåä¿¡ããããã€ã¹ã¯ã眲åã¢ã«ãŽãªãºã ãå®è¡ããããšã§ãããèªèšŒããªããã°ãªããªãã ããã§ãm ã¯èªèšŒãããããŒã¿ PDUãk ã¯æ ŒçŽããã CSRKãSignCounter ã¯åä¿¡ããã«ãŠã³ã¿å€ã§ããã 眲åã¢ã«ãŽãªãºã ã«ãã£ãŠèšç®ãããMACãåä¿¡ããMACãšäžèŽããªãå Žåãæ€èšŒã¯å€±æãããã¹ãã¯åä¿¡ããããŒã¿PDUãç¡èŠãããã®ãšããã
ãµãŒãã¯Signed Writeã³ãã³ãã«å¿çããªãã®ã§ãäžäœå±€ã¢ããªã±ãŒã·ã§ã³ã¯ç¡èŠãããèŠæ±ãå¿ ãããéç¥ãããªãã ãããã£ãŠãã¯ã©ã€ã¢ã³ããã»ãã¥ãªãã£æ»æã詊ã¿ãæªæã®ããããã€ã¹ã§ããå Žåã«ã¯ããµãŒãã¯ãªã³ã¯ãåæããããšãæšå¥šãããã
ãµãŒãã眲åä»ãæžã蟌ã¿ã³ãã³ããåä¿¡ããéã«æ ŒçŽãããŠãã CSRK ãæããªãå ŽåããµãŒãã¯åä¿¡ããããŒã¿ PDU ãç¡èŠããã ãµãŒãã¯çœ²åä»ãæžèŸŒã¿ã³ãã³ãã«å¿çããªãã®ã§ãäžäœã¬ã€ã€ã¢ããªã±ãŒã·ã§ã³ã¯ç¡èŠãããèŠæ±ãå¿ ãããéç¥ãããªãã åæã¯ãããã€ã¹ããã¢ãªã³ã°ãããå¿ èŠãããããšããŠãŒã¶ã«å¯ŸããŠé©åã«ç€ºããã®ã§ãã£ãŠãããããå®è£ è ã¯ãã確ç«ããããã«ããã€ã¹ããã¢ãªã³ã°ãããå¿ èŠãããããšããŠãŒã¶ã«å¯ŸããŠããæçãªè¡šç€ºãæäŸããããšãæ€èšããããšãæšå¥šãããã
ãµãŒãããå¿çãèŠæ±ããæžãèŸŒã¿æäœã®ããã®ã¯ã©ã€ã¢ã³ãããã®èŠæ±(ããªãã¡ãSigned Writeã³ãã³ããŸãã¯Writeã³ãã³ã以å€ã®ãã®)ãåä¿¡ããæå·åãæå¹ã«ãªã£ãŠããªãå ŽåããµãŒãã¯ããšã©ãŒã³ãŒããInsufficient Authenticationãã§å¿çããªããã°ãªããªãã
ãªã³ã¯ãæå·åãããŠããããµãŒããããŒã¿çœ²åãèŠæ±ãããæå·åãèŠæ±ããªãã¯ã©ã€ã¢ã³ãããã®èŠæ±ãåä¿¡ããå Žåããªã³ã¯ã®æå·åãããç¶æ ã眲åèŠæ±ãæºãããšèããããããããµãŒãã¯ãä»ã«æå¹ã§ããã°ããã®èŠæ±ãå®äºããªããã°ãªããªãã
ã»ã¯ã·ã§ã³10.2.2ã§èŠæ±ãããŠããããã«ãäžãããããªã³ã¯ã§ã¯ãæå·åãšåæã«çœ²åãããããŒã¿ã¯äœ¿çšãããªãã ãããã£ãŠãã¯ã©ã€ã¢ã³ãããµãŒãããŸã çµåãããŠããããšããã¹ããããããããã£ãŠæå·åãæå¹ã«ãããå ŽåããµãŒããäžèšã®æšå¥šéããªã³ã¯ãåæããªããšä»®å®ããŠããããªãããŒã¿è»¢éã¯çœ²åãªãã§è¡ãããªããã°ãªããªãã
äžäœã¬ã€ã€ããµãŒãäžã«çµåãååšããªããšå€æããå Žåãã¯ã©ã€ã¢ã³ãã¯ããªã¢ãŒãããã€ã¹ã確èªããããã®ãŠãŒã¶ãšã®å¯Ÿè©±ã®åŸãå床çµåãè¡ãããµãŒãã¹æ€åºãå®è¡ãããµãŒããåèšå®ããªããã°ãªããªãã ã¯ã©ã€ã¢ã³ãã以åã«ãµãŒãããService Changedãç¹æ§ãæããªããšå€æããŠããå ŽåããŸãã¯ãDatabase Hashãç¹æ§ãèªã¿åã£ãŠããŒã¿ããŒã¹ã倿ŽãããŠããªããšã¯ã©ã€ã¢ã³ãã倿ããå ŽåããµãŒãã¹çºèŠã¯ã¹ããããããŠãããã
åä¿¡ããã€ã¹ã¯ãåä¿¡ããSignCounterããåããã¢ããã€ã¹ãã以åã«åä¿¡ããSignCounterãšæ¯èŒããããšã§ããªãã¬ã€æ»æããä¿è·ããªããã°ãªããªãã SignCounter ã以åã«äœ¿çšãããŠããå Žåãåä¿¡ããã€ã¹ã¯ããŒã¿ PDU ãç¡èŠããªããã°ãªããªãã
10.5 èªå¯æç¶ã
ãµãŒãã¹ã¯ãã¢ã¯ã»ã¹ãèš±å¯ããåã«æ¿èªãå¿ èŠãšããå ŽåããããŸãã èªå¯ãšã¯ãæç¶ããç¶ç¶ããããã®ãŠãŒã¶ãŒã«ãã確èªã®ããšã§ãã èªèšŒã¯å¿ ãããèªå¯ãäžãããã®ã§ã¯ãããŸããã èªèšŒã«æåããåŸããŠãŒã¶ã®ç¢ºèªã«ãã£ãŠèªå¯ãäžããããããšãããã
10.6 æå·åæé
ã»ã³ãã©ã«ã¯ãå®å šæ§ãšæ©å¯æ§ãæäŸããããã«ã[Vol 3] Part H, Section 2.4.4 ã§å®çŸ©ãããŠãã Encryption Session Setup ã䜿çšããŠæ¥ç¶ãæå·åããããšãã§ããŸãã
ããªãã§ã©ã«ã¯ïŒå®å šæ§ãšæ©å¯æ§ã確ä¿ããããã«ïŒ[Vol 3] Part H 2.4.6 ç¯ã§å®çŸ©ãããŠãã Slave Initiated Security Request ãçšããŠæ¥ç¶ãæå·åããããšãã§ããã
æå·åæé ã倱æããã»ã³ãã©ã«åã¯ããªãã§ã©ã«ã®ãããããæ¥ç¶ç¢ºç«ã®ããã«ãªãŸã«ããã«ã»ãã©ã€ããŒãã»ã¢ãã¬ã¹ã䜿çšããå ŽåãçŸåšã®ãªãŸã«ããã«ã»ãã©ã€ããŒãã»ã¢ãã¬ã¹ã¯çŽã¡ã«ç Žæ£ãããæ°ãããªãŸã«ããã«ã»ãã©ã€ããŒãã»ã¢ãã¬ã¹ãçæãããªããã°ãªããªãã