SMC Networks - IVT BlueSoleil™ User Manual
Bluetooth File Transfer This is the implementation of the Bluetooth File Transfer profile (FTP). Bluetooth File Transfer enables the transfer files between Bluetooth devices.
Bluetooth HCRP This is the implementation of the Bluetooth Hardcopy Cable Replacement profile (HCRP). HCRP provides services to replace the cables between hosts and peripheral devices with a Bluetooth link. HCRP is mainly used for wireless printing.
Bluetooth Information Synchronization This is the implementation of the Bluetooth Synchronization profile (SYNC). Using Synchronization, Bluetooth devices can synchronize messages, notes, calendars and cards with each other.
Bluetooth LAN Access This is the implementation of the Bluetooth LAN Access profile (LAP). Using LAP, Bluetooth devices can access Local Area Network via LAN access points.
Bluetooth Object Push This is the implementation of the Bluetooth Object Push profile (OPP). Using OPP, Bluetooth devices can transfer messages, notes, calendars and cards with each other.
Bluetooth Passkey In the Bluetooth authentication procedure, a Bluetooth passkey is requested on both connection sides. The same Bluetooth passkey should be input on both sides. If the passkeys are the same, the authentication procedure is successful and connections can be setup. If the passkeys are different, the connection and authentication will fail.
Bluetooth Peripheral Device This is the implementation of the Bluetooth Human Interface Device profile (HID). By using HID, Bluetooth peripheral input devices such as a Bluetooth mouse or keyboard, can remotely interface with the host computer.
Bluetooth Personal Area Networking This is the implementation of the Bluetooth Personal Area Networking profile (PAN). Using PAN, Bluetooth devices can connect to each other to form
Bluetooth Printer This is the implementation of the Bluetooth
Bluetooth Security Bluetooth security is an important part of the Bluetooth wireless communication technology. Bluetooth security enables illegal access to your computer to be rejected. There are three levels of security: Low, Medium and High. In Low level, there is no security check. In Medium level, remote Bluetooth devices can browse your services. Security is set on every service. The service can be set to request or not to request for authentication and authorization. If you request for authentication, the remote device will be asked to enter the same passkey as the one in your computer. Otherwise, the Bluetooth passkey is not requested. If authorization is set, the remote device has to be in the authorized devices list.
Bluetooth Service A Bluetooth device may offer certain functions for other Bluetooth devices to use. These functions are called Bluetooth services. For example, a Bluetooth mobile phone can offer four services, which include synchronization,
Bluetooth Service Browse A remote Bluetooth device can provide one or more Bluetooth services. To use the services that the remote device provides, the user has to first find the services. This is called service browse.
Bluetooth Serial Port This is the implementation of the Bluetooth Serial Port profile (SPP). SPP emulates a serial port over Bluetooth, for the Bluetooth device.
76