BTW User’s Guide

4Security

4.1AUTHENTICATION

Authentication is used to verify identity; it requires a passkey or link key from the remote device. When a remote device attempts access, a visual and/or audio warning notifies the local operator.

If the notification is ignored, access is denied after a preset timeout.

When devices are “paired,” those devices automatically exchange a link key and Authentication is carried out without operator intervention.

4.2AUTHORIZATION

Authorization is Yes-or-No security that requires operator intervention to avoid having the connection time out and fail.

Authorization is limited to:

Yes—You may connect (click the balloon to proceed).

No—You may not connect (ignore the balloon prompt and the connection will fail).

4.3BLUETOOTH DEVICE IDENTITY

Every Bluetooth device has a unique Bluetooth Device Address (BDA) assigned to it during the manufacturing process. This address cannot be changed by the end-user.

A device’s BDA is usually displayed in hexadecimal format; 00:D0:B7:03:2E:9F is a valid BDA.

Each Bluetooth device also has an operator-configurable, user-friendly name to help distinguish it from other devices. The user-friendly name may be up to 99 alphanumeric characters in length and may contain spaces. My Personal Computer is a valid user- friendly name.

4.4ENCRYPTION

Encrypting data translates it into an unreadable format using a secret key or password. Decrypting the data requires the same key or password that was used to encrypt it.

4.5LINK KEY

A unique, internally generated, access code based on a passkey, the Bluetooth Device Address and an internally generated random number. Link keys are generated automatically when devices Pair.

After a link key is generated, manual entry of the passkey is not required.

WIDCOMMinc

33

Page 37
Image 37
HP X1018CL, X1020US, X1012QV, X1015US, X1010CA, X1010US, X1001US, X1002US, X1050US, X1040US, X1030US, X1058CL manual Security