The Z-Wave Alliance, the standards development organization dedicated to advancing the smart home and Z-Wave® technology, announces the release of the 2024A Z-Wave Specification Package, which includes new User Credential Command Class features, as well as new User Credential Control Specifications. The Alliance has also published a new Z-Wave Reference Application Design (ZRAD), a publicly available repository of data including detailed schematics and reference designs to help developers create Z-Wave products with enhanced range capabilities using Z-Wave Long Range.
The 2024A Z-Wave Specification Package includes several documents that have undergone an Intellectual Property Rights (IPR) review as well as clarifications and fixes to the User Credential Command Class (CC) and the User Credential Control Specification, as well as minor clarifications in the Association v4 and MAC v5 Command Classes.
The Z-Wave User Credential CC is a specification within the Z-Wave protocol that defines how user credentials, such as passwords or PIN codes, are managed and communicated between devices in a Z-Wave network. Unprecedented in the smart lock category and exclusive to Z-Wave, this CC update provides a standardized way for smart locks to handle user authentication in access control, ensuring secure and reliable operation within a Z-Wave smart home network. Key aspects include:
1. Credential Management: It allows devices such as smart locks to create, modify and delete user credentials. This includes defining the type of credential (e.g., PIN code, password), its validity period and any associated permissions.
2. Security: The CC ensures that user credentials are transmitted and stored securely within the network. This is crucial for maintaining the integrity and confidentiality of the smart home environment.
3. Interoperability: By following the specifications of the User Credential CC, different Z-Wave devices can work together seamlessly to manage user access. For instance, a smart lock from one manufacturer can understand and use the credentials provided by a smart home controller from another manufacturer.
4. User Control: It allows users to control who can access their Z-Wave network and devices. For example, homeowners can add or remove users and set different access levels for family members, guests or service personnel.
5. Automation Integration: The CC can be used in conjunction with other Z-Wave CCs to create sophisticated automation scenarios. For instance, unlocking a door could trigger a series of events, such as turning on lights, adjusting the thermostat or disarming a security system.
The Z-Wave User Credential Control Specification outlines the standards and protocols for managing user credentials within a Z-Wave network. It defines how devices should handle, store and communicate user credentials such as PIN codes, passwords or biometric data to ensure secure access control and authentication. The key components are:
1. Credential Types: Defines the different types of user credentials that can be used, such as numeric PIN codes, alphanumeric passwords and biometric data.
2. Credential Management: Specifies how to create, update and delete user credentials. It includes procedures for adding new users, changing existing credentials and removing users from the system.
3. Access Control: Establishes how user credentials control access to devices and services within the Z-Wave network. This involves setting permissions and access levels for different users.
4. Security Protocols: Outlines the security measures required to protect user credentials. This includes encryption standards for transmitting credentials, secure storage practices and methods for verifying the authenticity of credentials.
5. Interoperability: This standardization ensures that different Z-Wave devices can work together seamlessly when managing user credentials. It allows devices from various manufacturers to understand and use credentials consistently.
6. Event Logging: Describes how to log events related to credential use, such as successful and failed authentication attempts. This is important for auditing and monitoring the security of the network.
7. User Interface: Provides guidelines for user interfaces that manage credentials, ensuring they are user-friendly and secure.
8. Error Handling: Defines how devices should handle errors related to credential management, such as incorrect PIN entries or expired passwords.
By adhering to the Z-Wave User Credential CC and User Credential Control Specification, Z-Wave devices can offer robust, secure, and interoperable user authentication and access control, enhancing the overall security and user experience of the smart home network.
Z-Wave Reference Application Design (ZRAD) Now Publicly Available
The Z-Wave Alliance announces the public release of the ZRAD (Z-Wave Reference Application Design). Created by Z-Wave wireless IoT expert Eric Ryherd (AKA Dr. Z-Wave), ZRAD is an open-source reference design of a best-in-class RF range device. ZRAD aims to accelerate time-to-market for Z-Wave products by providing a simple-to-follow application design example complete with detailed step-by-step instructions for implementing Z-Wave technology and the latest available features, such as Z-Wave Long Range (ZWLR).
ZRAD is a game-changer for the Z-Wave community, dramatically lowering the barrier to entry for development and providing a clear path from concept to product. ZRAD offers the tools required to leverage the full power of Z-Wave technology and ZWLR. It is a publicly available repository of data, including detailed schematics and reference designs, to help developers create Z-Wave products with enhanced range capabilities. This free offering offers a streamlined alternative to complex, all-encompassing developer kits, focusing on simplicity and practicality for the developer.
The ZRAD design features a USB controller with a best-in-class RF range. It achieved over 2 miles of successful transmission in line of sight testing and yielded exceptional performance in noisy urban environments with over 1 mile of successful transmission. The design can be implemented as both a controller connected to a computer or as an end device with battery power, enabling the development of versatile applications.