User's Manual
6
3
implemented per each user, whereas the security at the level of link is implemented between
devices. The Bluetooth specifications define security algorithms and procedures necessary to
certificate devices and, if necessary, to encrypt the data flow of link between devices. The
certification of devices is a fundamental feature of Bluetooth; however, the encryption of link is
selective.
The synchronization between Bluetooth devices are performed by generating initialization keys
used for link keys required for certifying devices. Basically, a Bluetooth stack responds without a
key when a key is requested (the response to the key-requesting event is the user’s role). The
certification of Bluetooth devices are based on attempt-response transactions. In Bluetooth
technology, other PIN numbers or passwords used for generating 128 bit keys for security and
encryption can be re-used. Encrypted keys are extracted from the link keys used for certifying
synchronized devices. Also, the constraints in distance and high-speed frequency hopping of
Bluetooth wireless technology make eavesdropping difficult.
Recommendations are as follows:
. Synchronization should be conducted under secured environments.
. Do not save PIN code at industrial PDA. Store it somewhere else personally.
. Implement a security at the level of applications.
Microsoft stack supports smart synchronization. For the details, see Microsoft MSDN.
Composition of Bluetooth
- In principle, NAUTIZ X3 is configured to use Microsoft Bluetooth stack.
The available services via Microsoft Bluetooth stack is listed in Table 6-1.
<Table 6-1. Bluetooth services>
Microsoft Bluetooth Stack
OBEX Object Push Services
Hands-Free Audio Gateway Services
Serial Port Services
Personal Area Networking Services
PBAP Services
Dial-Up Networking Services
HID Client Services
A2DP/AVRCP Services
The ports supported by Microsoft Bluetooth Stack
COM5
COM9
For more details on ports, contact Technical Support Team at Handheld.