D-Link DBT-122 Manual - Page 56

Security - d link bluetooth

Page 56 highlights

Security Authentication Authentication is used to verify identity; it requires a passkey or link key from the remote device. When a remote device attempts access, a visual and/or audio warning notifies the local operator. If the notification is ignored, access is denied after a preset timeout. When devices are "paired," those devices automatically exchange a link key and Authentication is carried out without operator intervention. Authorization Authorization is Yes-or-No security that requires operator intervention to avoid having the connection time out and fail. Authorization is limited to: • Yes, you may connect (click the balloon to proceed). • No, you may not connect (ignore the balloon prompt and the connection will fail). Bluetooth Device Identity Every Bluetooth device has a unique Bluetooth Device Address (BDA) assigned to it during the manufacturing process. This address cannot be changed by the end-user. A device's BDA is usually displayed in hexadecimal format; 00:D0:B7:03:2E:9F is a valid BDA. Each Bluetooth device also has an operator-configurable, user-friendly name to help distinguish it from other devices. The user-friendly name may be up to 99 alphanumeric characters in length and may contain spaces. My Personal Computer is a valid user-friendly name. Encryption Encrypting data translates it into an unreadable format using a secret key or password. Decrypting the data requires the same key or password that was used to encrypt it. Link Key A unique, internally generated, access code based on a passkey, the Bluetooth Device Address and an internally generated random number. Link keys are generated automatically when devices Pair. After a link key is generated, manual entry of the passkey is not required. 56

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63

56
Security
Authentication
Authentication is used to verify identity; it requires a passkey or link key from
the remote device. When a remote device attempts access, a visual and/or
audio warning notifies the local operator.
If the notification is ignored, access is denied after a preset timeout.
When devices are “paired,” those devices automatically exchange a link key
and Authentication is carried out without operator intervention.
Authorization
Authorization is Yes-or-No security that requires operator intervention to
avoid having the connection time out and fail.
Authorization is limited to:
Yes
, you may connect (click the balloon to proceed).
No
, you may not connect (ignore the balloon prompt and the
connection will fail).
Bluetooth Device Identity
Every Bluetooth device has a unique Bluetooth Device Address (BDA)
assigned to it during the manufacturing process. This address cannot be
changed by the end-user.
A device’s BDA is usually displayed in hexadecimal format;
00:D0:B7:03:2E:9F is a valid BDA.
Each Bluetooth device also has an operator-configurable, user-friendly
name to help distinguish it from other devices. The user-friendly name may
be up to 99 alphanumeric characters in length and may contain spaces.
My
Personal Computer
is a valid user-friendly name.
Encryption
Encrypting data translates it into an unreadable format using a secret key or
password. Decrypting the data requires the same key or password that was
used to encrypt it.
Link Key
A unique, internally generated, access code based on a passkey, the
Bluetooth Device Address and an internally generated random number. Link
keys are generated automatically when devices Pair.
After a link key is generated, manual entry of the passkey is not required.