56
Security
6.1 Authentication
Authentication is used to verify identity; it requires a passkey or link key from
the remote device. When a remote device attempts access, a visual and/or
audio warning notifies the local operator. If the notification is ignored, access
is denied after a preset timeout. When devices are “paired,” those devices
automatically exchange a link key and authentication is carried out without
operator intervention.
6.2 Authorization
Authorization is Yes-or-No security that requires operator intervention to
avoid having the connection time out and fail. Authorization is limited to:
•
Yes
, you may connect (click the balloon to proceed)
•
No
, you may not connect (ignore the balloon prompt and the
connection will fail).
6.3
Bluetooth Device Identity
Every Bluetooth device has a unique Bluetooth Device Address (BDA)
assigned to it during the manufacturing process. This address cannot be
changed by the end-user. A device’s BDA is usually displayed in hexadecimal
format; 00:D0:B7:03:2E:9F is avalid BDA.
Each Bluetooth device also has an operator-configurable, user-friendly name
to help distinguish it from other devices. The user-friendly name may be up
to 99 alphanumeric characters in length and may contain spaces. My Personal
Computer is a valid userfriendly name.
6.4 Encryption
Encrypting data translates it into an unreadable format using a secret key or
password. Decrypting the data requires the same key or password that was
used to encrypt it.
6