
Encryption translates data into an unreadable format using a secret key or password.
Decrypting the data requires the same key or password that was used to encrypt it.
HCI
Host Controller Interface
Human Interface Device (HID)
An input device such as a mouse, keyboard, or game controller that sends user input to a
computer.
internet telephony
A technology that uses the Internet to place and receive telephone calls.
link key
An internally generated unique security key that is exchanged by paired devices as proof of
identity before a connection is established. Link keys are generated automatically when two
devices pair.
paired devices
Bluetooth enabled devices must be paired before they can establish a secure (authenticated
and encrypted) connection. Paired devices share a unique link key, which is exchanged
automatically each time they connect.
PDA
personal digital assistant
PIM
Personal Information Manager. An application, such as Microsoft® Outlook®, that is used to
manage contacts, send and receive mail, create notes, and schedule events and tasks.
Secure Connection
A Bluetooth feature that requires the exchange of a passkey or link key between two Bluetooth
enabled devices each time you attempt to connect one with the other. All data exchanged over
the Bluetooth connection is encrypted. Depending on how you set authorization options,
authorization might also be required.
shortcut
An icon that provides quick access to the device control panel (see
Use the Services of Other
Bluetooth Enabled Devices
).
taskbar notification area
The area on the Windows taskbar that displays the time. The
Bluetooth
icon
is usually
located here.