Quick Reference Guide
Table Of Contents
- Gryphon™ I GBT/GM4500
 - Table of Contents
 - END USER SOFTWARE LICENSE AGREEMENT
 - About the Scanner
 - Setting Up the Reader
 - Reader, Cradle and LEDs Description
 - Connecting the Base Station
 - System and Network Layouts
 - Using the GBT/GM4500 Scanner
 - Using the WLC4090 Radio Base
 - Replacing the Battery Pack
 - Using the Gryphon™ I GBT/GM4500
 - Linking the Reader
 - Link Scanner as Serial Device to a Bluetooth Host
 - Link Scanner as HID device to a Bluetooth host
 - Power Off
 - Selecting the Interface Type
 - Programming
 - Reading Parameters
 - Operating Modes
 - Technical Features
 - LED and Beeper Indications
 - Troubleshooting
 - Ergonomic Recommendations
 - Cleaning Procedure
 - Support Through the Website
 - Charging the Batteries
 - Datalogic Limited Factory Warranty
 
Link Scanner as HID device to a Bluetooth host
Quick Reference Guide 19
Link Scanner as HID device to a Bluetooth host
Use this procedure to send data to a Bluetooth host using 
the Bluetooth HID profile.
1. If using a Bluetooth adapter on the host device,
install any driver provided with the adapter.
2. Scan the 
Link to Host in HID mode
 label below to make
the scanner visible to the host device.
3. Use the Bluetooth manager of the host device to
"Discover new devices" and select "GBT4500 …". If you
receive an error message, it may be necessary to
change the security settings on either the host device
or the scanner.
4. On the host device, open the program that is meant
to receive the incoming data.
The data transmitted by the scanner will appear in the pro-
gram as if it was typed using the keyboard of the host 
device.
Power Off
Scan the bar code below to shut off power to the hand-
held until the next trigger pull.
PowerOff
NOTE
The Gryphon I GBT4500 can be set up to authenticate the
remote system when connecting, by entering a Bluetooth
passkey or a PIN code. If you want to set the security level
and authentication options suitable for your application,
or when adding new equipment to a system that requires
authentication or uses a custom security PIN, please see
the PRG for information.










