USER MANUAL
PTM 216B – BLUETOOTH
®
PUSHBUTTON TRANSMITTER MODULE
© 2022 EnOcean | www.enocean.com
F-710-017, V1.0
PTM 216B User Manual | v1.0 | February 2022 | Page 5/86
10.6
India Equipment Type Approval ................................................................ 70
11.
Product history ............................................................................................ 71
A.
Parsing PTM 216B radio telegrams ................................................................. 72
Data telegram example ................................................................................ 72
A.1.1
BLE frame structure ............................................................................. 72
A.1.2
EnOcean data telegram payload structure ............................................... 72
Commissioning telegram example ................................................................. 73
A.2.1
BLE frame structure ............................................................................. 73
A.2.2
EnOcean commissioning telegram payload structure ................................ 73
B.
Address resolution for resolvable private addresses (RPA) ................................ 74
B.1.1
RPA resolution flow .................................................................................. 74
B.1.2
Address resolution example ...................................................................... 75
C.
Authentication of PTM 216B data telegrams .................................................... 76
C.1
Algorithm input parameters ...................................................................... 76
C.1.1
Constant input parameters ....................................................................... 76
C.1.2
Variable input parameters ........................................................................ 77
C.1.3
Obtaining the security key ........................................................................ 78
C.1.3.1
Obtaining the security key via NFC interface ................................................... 78
C.1.3.2
Obtaining the security key via the product QR code ......................................... 79
C.1.3.3
Obtaining the security key via a commissioning telegram ................................. 79
C.1.4
Internal parameters ................................................................................. 80
C.1.5
Constant internal parameters .................................................................... 80
C.1.6
Variable internal parameters ..................................................................... 81
C.2
Algorithm execution sequence ................................................................... 81
C.3
Examples ............................................................................................... 82
C.3.1
Data telegram without optional data .......................................................... 82
C.3.2
Data telegram with 1 byte optional data ..................................................... 84
C.3.3
Data telegram with 2 byte optional data ..................................................... 85
C.3.4
Data telegram with 4 byte optional data ..................................................... 86