X-Micro Tech. Bluetooth USB Dongle User Manual

Page 45

Advertising
background image

41

4

Security

A

U T H E N T I C A T I O N

Authentication is used to verify identity; it requires a passkey or link key from the remote
device. When a remote device attempts access, a visual and/or audio warning notifies the
local operator.

If the notification is ignored, access is denied after a preset timeout.

When devices are “paired,” those devices automatically exchange a Link Key and
Authentication is carried out without operator intervention.

A

U T H O R I Z A T I O N

Authorization is Yes-or-No security that requires operator intervention to avoid having the
connection time out and fail.

Authorization is limited to:

Yes, you may connect (click the balloon to proceed)

No, you may not connect (ignore the balloon prompt and the connection will fail).

B

L U E T O O T H

D

EVICE

I

D E N T I T Y

Every Bluetooth device has a unique Bluetooth Device Address (BDA) assigned to it
during the manufacturing process. This address cannot be changed by the end-user.

A device’s BDA is usually displayed in hexadecimal format; 00:D0:B7:03:2E:9F is a valid
BDA.

Each Bluetooth device also has an operator-configurable, user-friendly name to help
distinguish it from other devices. The user-friendly name may be up to 99 alphanumeric
characters in length and may contain spaces. My Personal Computer is a valid
user-friendly name.

E

N C R Y P T I O N

Encrypting data translates it into an unreadable format using a secret key or password.
Decrypting the data requires the same key or password that was used to encrypt it.

L

I N K

K

EY

A unique, internally generated, access code based on a passkey, the Bluetooth Device
Address and an internally generated random number.. Link Keys are generated
automatically when devices Pair.

After a link key is generated, manual entry of the passkey is not required.

Advertising