Bluetooth USB Adapter User Guide
7
Chapter 7
Security
7.1 Authentication
Authentication is used to verify identity; it requires a passkey or link key from the
remote device. When a remote device attempts access, a visual and/or audio warning
notifies the local operator.
If the notification is ignored, access is denied after a preset timeout.
When devices are “paired,” those devices automatically exchange a link key and
Authentication is carried out without operator intervention.
7.2 Authorization
Authorization is Yes-or-No security that requires operator intervention to avoid having
the connection time out and fail. Authorization is enabled automatically when Secure
Connection is enabled, but it can be turned off on a service-by-service basis for each
remote device.
Authorization is limited to:
‧
Yes
, you may connect (click the balloon to proceed)
‧
No
, you may not connect (ignore the balloon prompt and the connection will fail).
7.3 Bluetooth Device Identity
Every Bluetooth device has a unique Bluetooth Device Address (BDA) assigned to it
during the manufacturing process. This address cannot be changed.
The BDA is usually displayed in hexadecimal format; 00:30:4F:03:2E:9F is a valid
BDA.
Each Bluetooth device also has a configurable, user-friendly name to help distinguish
it from other devices. The user-friendly name may be up to 99 alphanumeric charac-
ters in length and may contain spaces.
My Personal Computer
is a valid user-friendly
name.
7.4 Encryption
Encrypting data translates it into an unreadable format using a secret key or password.
Decrypting the data requires the same key or password that was used to encrypt it.
7.5 Link Key
A link key is a unique, internally generated, access code based on a passkey, the
Bluetooth Device Address and an internally generated random number. Link keys are
generated automatically when devices are paired.
After a link key is generated, manual entry of the passkey is not required.
44