D-Link DBT-122 Manual - Page 56
Security - d link bluetooth
View all D-Link DBT-122 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 56 highlights
Security Authentication Authentication is used to verify identity; it requires a passkey or link key from the remote device. When a remote device attempts access, a visual and/or audio warning notifies the local operator. If the notification is ignored, access is denied after a preset timeout. When devices are "paired," those devices automatically exchange a link key and Authentication is carried out without operator intervention. Authorization Authorization is Yes-or-No security that requires operator intervention to avoid having the connection time out and fail. Authorization is limited to: • Yes, you may connect (click the balloon to proceed). • No, you may not connect (ignore the balloon prompt and the connection will fail). Bluetooth Device Identity Every Bluetooth device has a unique Bluetooth Device Address (BDA) assigned to it during the manufacturing process. This address cannot be changed by the end-user. A device's BDA is usually displayed in hexadecimal format; 00:D0:B7:03:2E:9F is a valid BDA. Each Bluetooth device also has an operator-configurable, user-friendly name to help distinguish it from other devices. The user-friendly name may be up to 99 alphanumeric characters in length and may contain spaces. My Personal Computer is a valid user-friendly name. Encryption Encrypting data translates it into an unreadable format using a secret key or password. Decrypting the data requires the same key or password that was used to encrypt it. Link Key A unique, internally generated, access code based on a passkey, the Bluetooth Device Address and an internally generated random number. Link keys are generated automatically when devices Pair. After a link key is generated, manual entry of the passkey is not required. 56