Skip to content

Mobile Access Data In Disengage Flow

Xesar provided access data is previously encrypted and cannot be read by the mobile device. To prevent the replay of your mobile key there is a BLE Mobile Disengage Sequence that needs to be followed. Within this flow, the access data is wrapped and encrypted with AES-CCM (AEAD) for the transmission to EVVA Components. The AEAD is using the random generated challenge valid only for the current connection and a mobile device key (MOBDK) that is specifically derived for the mobile device and a specific mobile group.

InterfaceAnnotations
BLE AdvertisementSee documentation of the EVVA component manufacturer specific advertisement.
Mobile Identification Medium ServiceSee GATT service description
BLE Mobile Disengage SequenceSee the flow sequence of a mobile disengage
AEADIVADATACTMAC
ContentVersionFlagsMobile Device Identifier (MOBID)Mobile Device Group Identifier (MOBGID)Access Data
Length in Bytes1344323260516
AnnotationsChallenge as generated by the EVVA componentSee Structure of the versionSee Structure of the flagsRandom oder SHA256(UUID v4)Random oder SHA256(UUID v4)Xesar provided, encrypted access dataMessage Authentication Code generated by the AEAD (AES-CCM)
MajorMinorPatch
Length in Bytes112
This specification (decimal)200
HEX (to be interpreted big-endian)0x020x000x00 00
Office ModeRFU
Length in Bits131
Annotations
0
is release
1
is permanent release (toggle)
Specification Mobile BLE