
3Technical information
The NFC Tag contains an NDEF record with Bluetooth® handover information and OOB data:
• Record type name : “application/vnd.bluetooth.le.oob"
• Bluetooth® device name: e. g. « ST25OOB »
• Bluetooth® device address: e. g. 80:e1:26:00:6A:a8
• LE secure connections "Random Value" (16 bytes)
• LE Secure connections "Confirmation Value" (16 bytes)
The last two fields are optional and correspond to the OOB data.
When taping the NFC Tag, this NDEF message is read natively by the NFC service of the Android™ phone. A
pop-up is displayed to ask the user to confirm if it really wants to do a pairing with this Bluetooth® device. The
Bluetooth® pairing starts if the user clicks "Yes".
If the OOB data are present, it is used during the pairing process.
The Android™ application uses a "Broadcast Receiver" to be notified when a Bluetooth® connection is done. This
"Broadcast Receiver" checks if the connected Bluetooth® device has the expected device name. If this is the
case, the application starts displaying the data received.
Note: In this demonstration, the user is not authenticated. In a real product, the device checks if the user has the
permission to read the data. This is out of the scope of this demonstration, which shows how the NFC facilitates
the pairing with a Bluetooth® device.
3.1 Secure simple pairing
The used pairing method is called “Secure simple pairing” (refer to §7 of [1]), performed in five steps:
1. Public key exchange: The devices exchange their public keys and compute a shared secret information
thanks to Diffie-Hellman protocol.
2. Authentication Stage 1
The OOB protocol is used during this phase. The smartphone uses the random value and the commitment
value received from the Bluetooth® device. The protocol checks if the "Public Key" received during the "Key
Exchange" phase is really the one of the device. If a hacker has substituted the "Public Key" during the
phase 1, the verification of the commitment value fails. This is the protection against MITM attack.
Note: The NDEF data contained in the tag must be protected in write so that the data cannot be modified through the
RF interface and cannot be manipulated.
3. Authentication Stage 2
This stage confirms that both devices have successfully completed the exchange.
4. "Link Key" calculation
Calculation of the "Link Key".
5. LMP Authentication and Encryption
The final phase in simple pairing consists in authentication and generation of the encryption key.
UM2710
Technical information
UM2710 - Rev 1 page 9/16