
Bluetooth USB Adapter BTW Configuration & User’s Guide
v
(Continued from the previous page)
6
Security .................................................................................................................28
6.1 I
NTRODUCTION
................................................................................................................. 28
6.2 A
UTHENTICATION
............................................................................................................. 28
6.3 A
UTHORIZATION
............................................................................................................... 28
6.4 E
NCRYPTION
.................................................................................................................... 29
6.5 L
EVELS OF
S
ECURITY
....................................................................................................... 29
6.6 L
INK
K
EY
......................................................................................................................... 29
6.7 P
AIRING
D
EVICES
............................................................................................................ 30
6.8 P
ASSKEY
......................................................................................................................... 30
6.9 S
ECURITY
R
EQUEST
D
IALOG
B
OX
.................................................................................... 31
6.10 S
ECURITY
R
EQUEST
D
IALOG
B
OX
, A
DVANCED
B
UTTON
.................................................... 31
7
Technical Support ................................................................................................32
8
Troubleshooting ...................................................................................................33
9
Glossary................................................................................................................35