Security - ActionTec USB Wireless Bluetooth Adapter User Manual

Usb wireless bluetooth adapter
Table of Contents

Advertisement

Security

6.1
Authentication
Authentication is used to verify identity; it requires a passkey or link key from
the remote device. When a remote device attempts access, a visual and/or
audio warning notifies the local operator. If the notification is ignored, access
is denied after a preset timeout. When devices are "paired," those devices
automatically exchange a link key and authentication is carried out without
operator intervention.
6.2
Authorization
Authorization is Yes-or-No security that requires operator intervention to
avoid having the connection time out and fail. Authorization is limited to:
• Yes, you may connect (click the balloon to proceed)
• No, you may not connect (ignore the balloon prompt and the
connection will fail).
6.3
Bluetooth Device Identity
Every Bluetooth device has a unique Bluetooth Device Address (BDA)
assigned to it during the manufacturing process. This address cannot be
changed by the end-user. A device's BDA is usually displayed in hexadecimal
format; 00:D0:B7:03:2E:9F is avalid BDA.
Each Bluetooth device also has an operator-configurable, user-friendly name
to help distinguish it from other devices. The user-friendly name may be up
to 99 alphanumeric characters in length and may contain spaces. My Personal
Computer is a valid userfriendly name.
6.4
Encryption
Encrypting data translates it into an unreadable format using a secret key or
password. Decrypting the data requires the same key or password that was
used to encrypt it.
56
6

Advertisement

Table of Contents
loading

Table of Contents