페이지 선택
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in pages

Table Of Contents

 

Chapter 01 — Introduction

Chapter 02 — Architecture

Chapter 03 — Cryptographic Primitives

Chapter 04 — Secure Channel

Chapter 05 — Commissioning

Chapter 06 — Device Attestation

Chapter 07 — Data Model Document

Chapter 08 — Interaction Model

Chapter 09 — System Model

Chapter 10 — Interaction Encoding

Chapter 11 — Device Management

Chapter 12 — Multiple Fabrics

Chapter 13 — Security Requirements

 

 

 

1 Introduction   4 Secure Channel
1.1. Scope and Purpose   4.1. General Description
1.2. Acronyms and Abbreviations   4.1.1. Messages
1.3. Definitions   4.2. IPv6 Reachability
1.4. Standards Terminology Mapping   4.2.1. Stub Router Behavior
1.5. Conformance Levels   4.2.2. Matter Node Behavior
1.6. References   4.3. Discovery
1.6.1. CSA Reference Documents   4.3.1. Commissionable Node Discovery
1.6.2. External Reference Documents   4.3.2. Operational Discovery
1.7. Informative References   4.3.3. Commissioner Discovery
1.7.1. CSA Reference Documents   4.3.4. Common TXT Key/Value Pairs
1.8. Conventions   4.4. Message Frame Format
1.8.1. Enumerations and Reserved Values   4.4.1. Message Header Field Descriptions
1.8.2. Reserved Bit Fields   4.4.2. Message Footer Field Descriptions
1.8.3. Number Format   4.4.3. Protocol Header Field Descriptions
1.8.4. Provisional   4.4.4. Message Size Requirements
      4.5. Message Counters
      4.5.1. Message Counter Types
2 Architecture   4.5.2. Secure Session Message Counters
2.1. Overview   4.5.3. Message Counters as Encryption Nonces
2.2. Layered Architecture   4.5.4. Replay Prevention and Duplicate Message Detection
2.3. Network Topology   4.5.5. Counter Processing of Outgoing Messages
2.3.1. Single network   4.5.6. Counter Processing of Incoming Messages
2.3.2. Star network topology   4.6. Message Processing
2.4. Scoped names   4.6.1. Message Transmission
2.5. Identifiers   4.6.2. Message Reception
2.5.1. Fabric References and Fabric Identifier   4.7. Message Security
2.5.2. Vendor Identifier (Vendor ID, VID)   4.7.1. Data confidentiality and integrity with data origin authentication parameters
2.5.3. Product Identifier (Product ID, PID)   4.7.2. Security Processing of Outgoing Messages
2.5.4. Group Identifier (GID)   4.7.3. Security Processing of Incoming Messages
2.5.5. Node Identifier   4.8. Message Privacy
2.5.6. IPv6 Addressing   4.8.1. Privacy Key
2.6. Device identity   4.8.2. Privacy Nonce
2.7. Security   4.8.3. Privacy Processing of Outgoing Messages
2.8. Device Commissioning   4.8.4. Privacy Processing of Incoming Messages
2.9. Sleepy End Device (SED)   4.9. Message Exchanges
2.10. Data Model Root   4.9.1. Exchange Role
2.11. Stack Limits   4.9.2. Exchange ID
2.11.1. System Model Limits   4.9.3. Exchange Context
2.11.2. Interaction Model Limits   4.9.4. Exchange Message Dispatch
2.12. List of Provisional Items   4.9.5. Exchange Message Processing
2.12.1. Invoke Multiple Paths   4.10. Secure Channel Protocol
2.12.2. EventList Global Attribute   4.10.1. Secure Channel Protocol Messages
2.12.3. Proxy Service   4.10.2. Parameters and Constants
2.12.4. Time Synchronization   4.11. Message Reliability Protocol (MRP)
2.12.5. Diagnostics Logs Cluster   4.11.1. Reliable Messaging Header Fields
2.12.6. Parameters and Constants   4.11.2. Reliable transfer
      4.11.3. Peer Exchange Management
      4.11.4. Transport Considerations
3 Cryptographic Primitives   4.11.5. Reliable Message Processing
3.1. Deterministic Random Bit Generator (DRBG)   4.11.6. Reliable Message State
3.2. True Random Number Generator (TRNG)   4.11.7. MRP Messages
3.3. Hash function (Hash)   4.11.8. Parameters and Constants
3.4. Keyed-Hash Message Authentication Code (HMAC)   4.12. Unicast Communication
3.5. Public Key Cryptography   4.12.1. Session Establishment Phase
3.5.1. Group   4.12.2. Application Data Phase
3.5.2. Key generation   4.13. Session Establishment
3.5.3. Signature and verification   4.13.1. Passcode-Authenticated Session Establishment (PASE)
3.5.4. ECDH   4.13.2. Certificate Authenticated Session Establishment (CASE)
3.5.5. Certificate validation   4.14. Group Communication
3.5.6. Time and date considerations for certificate path validation   4.14.1. Groupcast Session Context
3.6. Data Confidentiality and Integrity   4.14.2. Sending a group message
3.6.1. Generate and encrypt   4.14.3. Receiving a group message
3.6.2. Decrypt and verify   4.15. Group Key Management
3.7. Message privacy   4.15.1. Operational Groups
3.7.1. Privacy encryption   4.15.2. Operational Group Key Derivation
3.7.2. Privacy decryption   4.15.3. Epoch Keys
3.8. Key Derivation Function (KDF)   4.15.4. Distribution of Key Material
3.9. Password-Based Key Derivation Function (PBKDF)   4.16. Message Counter Synchronization Protocol (MCSP)
3.10. Password-Authenticated Key Exchange (PAKE)   4.16.1. Message Counter Synchronization Methods
3.10.1. Computation of pA   4.16.2. Group Peer State
3.10.2. Computation of pB   4.16.3. MCSP Messages
3.10.3. Computation of transcript TT   4.16.4. Unsynchronized Message Processing
3.10.4. Computation of cA, cB and Ke   4.16.5. Message Counter Synchronization Exchange
3.8. Key Derivation Function (KDF)   4.16.6. Message Counter Synchronization Session Context
3.9. Password-Based Key Derivation Function (PBKDF)   4.16.7. Sequence Diagram
3.10. Password-Authenticated Key Exchange (PAKE)   4.17. Bluetooth Transport Protocol (BTP)
3.10.1. Computation of pA   4.17.1. BTP Session Interface
3.10.2. Computation of pB   4.17.2. BTP Frame Formats
3.10.3. Computation of transcript TT   4.17.3. BTP GATT Service
3.10.4. Computation of cA, cB and Ke   4.17.4. Parameters and Constants
      4.17.5. Bluetooth SIG Considerations
         
5 Commissioning      
5.1. Onboarding Payload   6 Device Attestation and Operational Credentials
5.1.1. Onboarding Payload Contents   6.1. Common Conventions
5.1.2. Onboarding Material Representation   6.1.1. Encoding of Matter-specific RDNs
5.1.3. QR Code   6.1.2. Key Identifier Extension Constraints
5.1.4. Manual Pairing Code   6.1.3. Certificate Sizes
5.1.5. TLV Content   6.1.4. Presentation of example certificates
5.1.6. Concatenation   6.2. Device Attestation
5.1.7. Generation of the Passcode   6.2.1. Introduction
5.1.8. NFC Tag   6.2.2. Device Attestation Certificate (DAC)
5.2. Initiating Commissioning   6.2.3. Device Attestation Procedure
5.2.1. Purpose and Scope   6.3. Certification Declaration
5.2.2. User Journey Details   6.3.1. Certification Declaration (CD) Format
5.3. User Directed Commissioning   6.3.2. Firmware Information
5.3.1. Overview   6.3.3. Firmware information validation examples
5.3.2. UDC Protocol Messages   6.4. Node Operational Credentials Specification
5.3.3. Message format   6.4.1. Introduction
5.3.4. Message Exchanges   6.4.2. Node Operational Credentials Management
5.3.5. IdentificationDeclaration Message   6.4.3. Node Operational Identifier Composition
5.4. Device Discovery   6.4.4. Node Operational Key Pair
5.4.1. Purpose and Scope   6.4.5. Node Operational Credentials Certificates
5.4.2. Announcement by Device   6.4.6. Node Operational Credentials Procedure
5.4.3. Discovery by Commissioner   6.4.7. Node Operational Certificate Signing Request (NOCSR)
5.5. Commissioning Flows   6.4.8. Node Operational Certificate Renewal
5.5.1. Commissioning Flows Error Handling   6.4.9. Node Operational Certificate Revocation
5.5.2. Commissioning Flow Diagrams   6.4.10. Security Considerations
5.6. Administrator Assisted Commissioning Flows   6.5. Operational Certificate Encoding
5.6.1. Introduction   6.5.1. Introduction
5.6.2. Basic Commissioning Method (BCM)   6.5.2. Matter certificate
5.6.3. Enhanced Commissioning Method (ECM)   6.5.3. Version Number
5.6.4. Open Commissioning Window   6.5.4. Serial Number
5.7. Device Commissioning Flows   6.5.5. Signature Algorithm
5.7.1. Standard Commissioning Flow   6.5.6. Issuer and Subject
5.7.2. User-Intent Commissioning Flow   6.5.7. Validity
5.7.3. Custom Commissioning Flow   6.5.8. Public Key Algorithm
5.7.4. Manual Pairing Code and QR Code Inclusion   6.5.9. EC Curve Identifier
5.8. In-field Upgrade to Matter   6.5.10. Public Key
      6.5.11. Extensions
      6.5.12. Matter certificate Extensions Encoding Rules
7 Data Model Specification   6.5.13. Signature
7.1. Practical Information   6.5.14. Invalid Matter certificates
7.1.1. Revision History   6.5.15. Examples
7.1.2. Scope & Purpose   6.6. Access Control
7.1.3. Origin Story   6.6.1. Scope and Purpose
7.1.4. Overview   6.6.2. Model
7.1.5. Glossary   6.6.3. Access Control List Examples
7.1.6. Conventions   6.6.4. Access Control Cluster update side-effects
7.1.7. Reserved Bit Fields   6.6.5. Conceptual Access Control Privilege Granting Algorithm
7.2. Data Qualities   6.6.6. Applying Privileges to Action Paths
7.2.1. Common Data Table Columns      
7.2.2. Description Section      
7.2.3. Other Data Table Columns   8 Interaction Model Specification
7.3. Conformance   8.1. Practical Information
7.3.1. Optional   8.1.1. Revision History
7.3.2. Provisional   8.1.2. Scope & Purpose
7.3.3. Mandatory   8.1.3. Origin Story
7.3.4. Disallowed   8.1.4. Purpose
7.3.5. Deprecated   8.1.5. Glossary
7.3.6. Exclusivity   8.1.6. Conventions & Conformance
7.3.7. List   8.2. Concepts
7.3.8. Expressions and Optionality   8.2.1. Path
7.3.9. Choice   8.2.2. Interaction
7.3.10. Blank Conformance   8.2.3. Transaction
7.3.11. Feature Conformance   8.2.4. Action
7.4. Element   8.2.5. Common Action Behavior
7.4.1. Encoded Element Processing   8.3. Status and Interaction
7.5. Fabric   8.3.1. Status Response Action
7.5.1. Accessing Fabric   8.4. Read Interaction
7.5.2. Fabric-Index   8.4.1. Read Transaction
7.5.3. Fabric-Scoped Data   8.4.2. Read Request Action
7.5.4. Fabric-Scoped IDs   8.4.3. Report Data Action
7.6. Access   8.5. Subscribe Interaction
7.6.1. Read Access   8.5.1. Subscribe Transaction
7.6.2. Write Access   8.5.2. Subscribe Request Action
7.6.3. Invoke Access   8.5.3. Subscribe Response Action
7.6.4. Fabric-Scoped Quality   8.6. Report Transaction
7.6.5. Fabric-Sensitive Quality   8.6.1. Report Transaction Non-Empty
7.6.6. View Privilege   8.6.2. Report Transaction Empty
7.6.7. Operate Privilege   8.7. Write Interaction
7.6.8. Manage Privilege   8.7.1. Write Transaction
7.6.9. Administer Privilege   8.7.2. Write Request Action
7.6.10. Timed Interaction   8.7.3. Write Response Action
7.7. Other Qualities   8.7.4. Timed Request Action
7.7.1. Nullable Quality   8.8. Invoke Interaction
7.7.2. Non-Volatile Quality   8.8.1. Invoke Transaction
7.7.3. Fixed Quality   8.8.2. Invoke Request Action
7.7.4. Scene Quality   8.8.3. Invoke Response Action
7.7.5. Reportable Quality   8.9. Common Action Information Blocks and Paths
7.7.6. Changes Omitted Quality   8.9.1. Path Information
7.7.7. Singleton   8.9.2. Attribute Information Blocks
7.8. Node   8.9.3. Event Information Blocks and Paths
7.9. Endpoint   8.9.4. Command Information Blocks and Paths
7.10. Cluster   8.9.5. Status Information Blocks and Paths
7.10.1. Cluster Revision   8.10. Status Codes
7.10.2. Cluster Optional Features   8.10.1. Status Code Table
7.10.3. Cluster Data Version      
7.10.4. New Cluster      
7.10.5. Cluster Aliasing   9 System Model Specification
7.10.6. Cluster Inheritance   9.1. Practical Information
7.10.7. Status Codes   9.1.1. Revision History
7.10.8. Cluster Classification   9.1.2. Scope and Purpose
7.11. Command   9.1.3. Origin Story
7.11.1. Command Fields   9.1.4. Overview
7.12. Attribute   9.2. Endpoint Composition
7.12.1. Persistence   9.2.1. Dynamic Endpoint allocation
7.13. Global Elements   9.3. Interaction Model Relationships
7.13.1. ClusterRevision Attribute   9.3.1. Subscription
7.13.2. FeatureMap Attribute   9.4. Binding Relationship
7.13.3. AttributeList Attribute   9.5. Descriptor Cluster
7.13.4. AcceptedCommandList Attribute   9.5.1. Revision History
7.13.5. GeneratedCommandList Attribute   9.5.2. Classification
7.13.6. EventList Attribute   9.5.3. Cluster ID
7.13.7. FabricIndex Field   9.5.4. Data Types
7.14. Event   9.5.5. Attributes
7.14.1. Priority   9.6. Binding Cluster
7.14.2. Event Record   9.6.1. Binding Mutation
7.14.3. Buffering   9.6.2. Revision History
7.14.4. Event Filtering   9.6.3. Classification
7.14.5. Fabric-Sensitive Event   9.6.4. Cluster ID
7.15. Device Type   9.6.5. Data Types
7.15.1. Device Type Revision   9.6.6. Attributes
7.15.2. Device Type Composition   9.7. Label Cluster
7.15.3. Device Type Classification   9.7.1. Revision History
7.15.4. Extra Clusters on an Endpoint   9.7.2. Classification
7.16. Non-Standard   9.7.3. Cluster ID
7.17. Data Field   9.7.4. Data Types
7.17.1. Nullable   9.7.5. Attributes
7.17.2. Optional or Deprecated   9.8. Fixed Label Cluster
7.17.3. Constraint & Value   9.8.1. Revision History
7.17.4. Default Column   9.8.2. Classification
7.18. Data Types   9.8.3. Cluster ID
7.18.1. Base Data Types   9.8.4. Attributes
7.18.2. Derived Data Types   9.9. User Label Cluster
7.19. Manufacturer Specific Extensions   9.9.1. Revision History
7.19.1. Manufacturer Extensible Identifiers   9.9.2. Classification
7.19.2. Manufacturer Extensible Identifier (MEI)   9.9.3. Cluster ID
7.19.3. Manufacturer Extensions   9.9.4. Attributes
7.19.4. Discoverability   9.10. Access Control Cluster
      9.10.1. Revision History
      9.10.2. Classification
10 Interaction Encoding   9.10.3. Cluster ID
10.1. Overview   9.10.4. Data Types
10.2. Messages   9.10.5. Attributes
10.2.1. IM Protocol Messages   9.10.6. Error handling
10.2.2. Common Action Information Encoding   9.10.7. Events
10.2.3. Chunking   9.11. Group Relationship
10.2.4. Transaction Flows   9.12. Bridge for non-Matter devices
10.3. Data Types   9.12.1. Introduction
10.3.1. Analog – Integer   9.12.2. Exposing functionality and metadata of Bridged Devices
10.3.2. Analog – Floating Point   9.12.3. Discovery of Bridged Devices
10.3.3. Discrete – Enumeration   9.12.4. Configuration of Bridged Devices
10.3.4. Discrete – Bitmap   9.12.5. New features for Bridged Devices
10.3.5. Composite – String   9.12.6. Changes to the set of Bridged Devices
10.3.6. Composite – Octet String   9.12.7. Changes to device names and grouping of Bridged Devices
10.3.7. Collection – Struct   9.12.8. Setup flow for a Bridge (plus Bridged Devices)
10.3.8. Collection – List   9.12.9. Access Control
10.3.9. Derived Types   9.12.10. Software update (OTA)
10.3.10. Field IDs   9.12.11. Best practices for Bridge Manufacturers
10.4. Sample Cluster   9.12.12. Best practices for Administrators
10.4.1. Disco Ball Cluster   9.13. Bridged Device Basic Information Cluster
10.4.2. Super Disco Ball Cluster   9.13.1. Revision History
10.5. Information Blocks   9.13.2. Classification
10.5.1. Tag Rules   9.13.3. Cluster ID
10.5.2. AttributePathIB   9.13.4. Attributes
10.5.3. DataVersionFilterIB   9.13.5. Events
10.5.4. AttributeDataIB   9.14. Actions Cluster
10.5.5. AttributeReportIB   9.14.1. Revision History
10.5.6. EventFilterIB   9.14.2. Classification
10.5.7. ClusterPathIB   9.14.3. Cluster ID
10.5.8. EventPathIB   9.14.4. Data Types
10.5.9. EventDataIB   9.14.5. Attributes
10.5.10. EventReportIB   9.14.6. Commands
10.5.11. CommandPathIB   9.14.7. Events
10.5.12. CommandDataIB   9.14.8. Examples
10.5.13. InvokeResponseIB   9.15. Proxy Architecture
10.5.14. CommandStatusIB   9.15.1. Motivation
10.5.15. EventStatusIB   9.15.2. Subscription Proxy: Overview
10.5.16. AttributeStatusIB   9.15.3. Composition & Paths
10.5.17. StatusIB   9.15.4. Proxy Subscriptions
      9.15.5. Schemas and Data Serialization/Deserialization
      9.15.6. Indirect Proxies
11 Service and Device Management   9.15.7. Proxy Discovery & Assignment Flow
11.1. Basic Information Cluster   9.15.8. Constraints
11.1.1. Revision History   9.15.9. Certification
11.1.2. Classification   9.15.10. Security & Privacy
11.1.3. Cluster ID   9.15.11. Parameters and Constants
11.1.4. Data Types   9.15.12. Clusters
11.1.5. Attributes   9.15.13. Proxy Discovery Cluster
11.1.6. Events   9.15.14. Proxy Configuration Cluster
11.2. Group Key Management Cluster   9.15.15. Valid Proxies Cluster
11.2.1. Scope & Purpose      
11.2.2. Revision History      
11.2.3. Classification   12 Multiple Fabrics
11.2.4. Cluster ID   12.1. Multiple Fabrics
11.2.5. Features   12.1.1. Introduction
11.2.6. Data Types   12.1.2. User Consent
11.2.7. Attributes   12.1.3. Administrator-Assisted Commissioning Method
11.2.8. Commands   12.1.4. Node Behavior
11.3. Localization Configuration Cluster      
11.3.1. Revision History   13 Security Requirements
11.3.2. Classification   13.1. Overview
11.3.3. Cluster ID   13.2. Device vs. Node
11.3.4. Attributes   13.3. Commissioning
11.4. Time Format Localization Cluster   13.4. Factory Reset
11.4.1. Revision History   13.5. Firmware
11.4.2. Classification   13.6. Security Best Practices
11.4.3. Cluster ID   13.6.1. Cryptography
11.4.4. Features   13.6.2. Commissioning
11.4.5. Data Types   13.6.3. Firmware
11.4.6. Attributes   13.6.4. Manufacturing
11.5. Unit Localization Cluster   13.6.5. Resiliency
11.5.1. Revision History   13.6.6. Battery Powered Devices
11.5.2. Classification   13.6.7. Tamper Resistance
11.5.3. Cluster ID   13.6.8. Bridging
11.5.4. Features   13.6.9. Distributed Compliance Ledger
11.5.5. Data Types   13.7. Threats and Countermeasures
11.5.6. Attributes      
11.6. Power Source Configuration Cluster      
11.6.1. Revision History   Appendix A: Tag-length-value (TLV) Encoding Format
11.6.2. Classification   A.1. Scope & Purpose
11.6.3. Cluster ID   A.2. Tags
11.6.4. Attributes   A.2.1. Profile-Specific Tags
11.7. Power Source Cluster   A.2.2. Context-Specific Tags
11.7.1. Revision History   A.2.3. Anonymous Tags
11.7.2. Classification   A.2.4. Canonical Ordering of Tags
11.7.3. Cluster ID   A.3. Lengths
11.7.4. Features   A.4. Primitive Types
11.7.5. Data Types   A.5. Container Types
11.7.6. Attributes   A.5.1. Structures
11.7.7. Events   A.5.2. Arrays
11.7.8. Configuration Examples   A.5.3. Lists
11.8. Network Commissioning Cluster   A.6. Element Encoding
11.8.1. Revision History   A.7. Control Octet Encoding
11.8.2. Classification   A.7.1. Element Type Field
11.8.3. Cluster ID   A.7.2. Tag Control Field
11.8.4. Features   A.8. Tag Encoding
11.8.5. Data Types   A.8.1. Fully-Qualified Tag Form
11.8.6. Attributes   A.8.2. Implicit Profile Tag Form
11.8.7. Commands   A.8.3. Common Profile Tag Form
11.8.8. Usage of networking configurations   A.8.4. Context-Specific Tag Form
11.9. General Commissioning Cluster   A.8.5. Anonymous Tag Form
11.9.1. Revision History   A.9. Length Encoding
11.9.2. Classification   A.10. End of Container Encoding
11.9.3. Cluster ID   A.11. Value Encodings
11.9.4. Data Types   A.11.1. Integers
11.9.5. Attributes   A.11.2. UTF-8 and Octet Strings
11.9.6. Commands   A.11.3. Booleans
11.10. Diagnostic Logs Cluster   A.11.4. Arrays, Structures and Lists
11.10.1. Revision History   A.11.5. Floating Point Numbers
11.10.2. Classification   A.11.6. Nulls
11.10.3. Cluster ID   A.12. TLV Encoding Examples
11.10.4. Data Types      
11.10.5. Commands      
11.11. General Diagnostics Cluster   Appendix B: Tag-length-value (TLV) Schema Definitions
11.11.1. Revision History   B.1. Introduction
11.11.2. Classification   B.1.1. Basic Structure
11.11.3. Cluster ID   B.1.2. Keywords
11.11.4. Data Types   B.1.3. Naming
11.11.5. Status Codes   B.1.4. Namespaces
11.11.6. Attributes   B.1.5. Qualifiers
11.11.7. Commands   B.1.6. Tagging
11.11.8. Events   B.2. Definitions
11.12. Software Diagnostics Cluster   B.2.1. Type Definition (type-def )
11.12.1. Revision History   B.2.2. FIELD GROUP Definition (field-group-def )
11.12.2. Classification   B.2.3. Namespace Definition (namespace-def )
11.12.3. Cluster ID   B.2.4. PROTOCOL Definition (protocol-def )
11.12.4. Features   B.2.5. VENDOR Definition (vendor-def )
11.12.5. Data Types   B.3. Types
11.12.6. Attributes   B.3.1. ARRAY / ARRAY OF
11.12.7. Commands   B.3.2. BOOLEAN
11.12.8. Events   B.3.3. FLOAT32 / FLOAT64
11.13. Thread Network Diagnostics Cluster   B.3.4. SIGNED INTEGER / UNSIGNED INTEGER
11.13.1. Revision History   B.3.5. LIST / LIST OF
11.13.2. Classification   B.3.6. OCTET STRING
11.13.3. Cluster ID   B.3.7. NULL
11.13.4. Features   B.3.8. STRING
11.13.5. Data Types   B.3.9. STRUCTURE
11.13.6. Attributes   B.4. Pseudo-Types
11.13.7. Commands   B.4.1. ANY
11.13.8. Events   B.4.2. CHOICE OF
11.14. Wi-Fi Network Diagnostics Cluster   B.5. Qualifiers
11.14.1. Revision History   B.5.1. any-order / schema-order / tag-order
11.14.2. Classification   B.5.2. extensible
11.14.3. Cluster ID   B.5.3. id
11.14.4. Features   B.5.4. length
11.14.5. Data Types   B.5.5. nullable
11.14.6. Attributes   B.5.6. optional
11.14.7. Commands   B.5.7. range
11.14.8. Events   B.5.8. tag
11.15. Ethernet Network Diagnostics Cluster   B.5.9. Documentation and Comments
11.15.1. Revision History      
11.15.2. Classification      
11.15.3. Cluster ID  

Appendix C: Tag-length-value (TLV) Payload Text

Representation Format

11.15.4. Features   C.1. Introduction
11.15.5. Data Types   C.2. Format Specification
11.15.6. Attributes   C.2.1. Tag/Value
11.15.7. Commands   C.2.2. Context-Specific Tags
11.16. Time Synchronization Cluster   C.2.3. Protocol-Specific Tags
11.16.1. Revision History   C.2.4. Anonymous Tags
11.16.2. Classification   C.2.5. Primitive Types
11.16.3. Cluster ID   C.2.6. Complex Types: Structure
11.16.4. Terminology   C.2.7. Complex Types: Arrays
11.16.5. Features   C.2.8. Complex Types: List
11.16.6. Data Types   C.3. Examples
11.16.7. Status Codes   C.3.1. TLV Schema
11.16.8. Attributes   C.3.2. TLV Payloads
11.16.9. Commands      
11.16.10. Events      
11.16.11. Time Synchronization at Commissioning   Appendix D: Status Report Messages
11.16.12. Time Synchronization during operation   D.1. Overview
11.16.13. Time source prioritization   D.2. Status Report elements
11.16.14. Time synchronization maintenance   D.3. Message Format
11.16.15. Acting as an NTP Server   D.3.1. General status codes (GeneralCode)
11.16.16. Implementation Guidance   D.3.2. Protocol-specific codes (ProtocolId and ProtocolCode)
11.17. Node Operational Credentials Cluster   D.3.3. Protocol-specific data (ProtocolData)
11.17.1. Revision History   D.4. Presenting StatusReport messages in protocol specifications
11.17.2. Classification    
11.17.3. Cluster ID    
11.17.4. Data Types   Appendix E: Matter-Specific ASN.1 Object Identifiers (OIDs)
11.17.5. Attributes    
11.17.6. Commands      
11.18. Administrator Commissioning Cluster   Appendix F: Cryptographic test vectors for some procedures
11.18.1. Revision History   F.1. Certification Declaration CMS test vector
11.18.2. Classification   F.2. Device Attestation Response test vector
11.18.3. Cluster ID   F.3. Node Operational CSR Response test vector
11.18.4. Features   Appendix G: Minimal Resource Requirements
11.18.5. Data Types      
11.18.6. Status Codes      
11.18.7. Attributes      
11.18.8. Commands      
11.19. Over-the-Air (OTA) Software Update      
11.19.1. Scope & Purpose      
11.19.2. Functional overview      
11.19.3. Software update workflow    
11.19.4. Security considerations      
11.19.5. Some special situations      
11.19.6. OTA Software Update Provider Cluster      
11.19.7. OTA Software Update Requestor Cluster      
11.20. Over-the-Air (OTA) Software Update File Format      
11.20.1. Scope & Purpose      
11.20.2. General Structure      
11.20.3. Security considerations      
11.21. Bulk Data Exchange Protocol (BDX)      
11.21.1. Overview      
11.21.2. Terminology      
11.21.3. Protocol Opcodes and Status Report Values      
11.21.4. Security and Transport Constraints      
11.21.5. Transfer Management Messages      
11.21.6. Data Transfer Messages      
11.21.7. Synchronous Transfers Message Flows    
11.21.8. Asynchronous Tranfers Message Flows      
11.22. Distributed Compliance Ledger      
11.22.1. Scope & Purpose      
11.22.2. Schemas      
11.22.3. Vendor Schema      
11.22.4. PAA Schema      
11.22.5. DeviceModel Schema      
11.22.6. DeviceSoftwareVersionModel Schema    
11.22.7. DeviceSoftwareCompliance / Compliance test result Schema    
11.22.8. APIs / CLI    

 

 

 

Adsense

 

 WiFi IoT Module

 

www.mxchip.com

 

 

 Bluetooth Module

www.feasycom.com

 

 

 5G/LTE/CAT-M1/NB-IoT

 

www.simcom.com

 

Viewed Page List