User's Manual

3-26
3-3.1.2.1 Service Level
Each Bluetooth service (for example, Network Access) can be selectively disabled.
If all Bluetooth services are disabled, your computer is unable to accept connections from
a remote device.
Your computer can still initiate outgoing connections to other Bluetooth devices, but
incoming connections will not be allowed.
Advantages: Extremely strong security.
Disadvantages: It is non-selective; it shuts out all incoming Bluetooth connections for a
particular service.
3-3.1.2.2 Encryption
The Bluetooth specification allows for encrypted transactions using a key size
of up to 128 bits.
Some Bluetooth devices do not support encryption. If a device or service is configured
to use encryption and attempts a connection with a device that does not support
encryption, the connection may fail unexpectedly.
Advantages: Protects against radio frequency snooping.
Disadvantages: The receiving unit must also support encryption.
3-3.1.2.3 Authorization
Authorization provides name-level security.
A visual warning notifies the local operator that a remote device is attempting to access
the system.
The local operator can open a dialog box that provides:
x Name-level security information—the user-friendly name of the device
attempting access.
x The type of access the requesting device is trying to achieve.
Based on the information provided in the dialog box, the operator may authorize or deny
access by physically clicking an on-screen button.
If the initial notification is ignored, access is denied after a preset timeout period expires.
Authorization does not provide foolproof security since Bluetooth device names
are configurable by the end-user.
Advantages: Ease of use—requires a dialog box response.
Disadvantages: Weak security.
3-3.1.2.4 Authentication
Authentication requires a passkey from the remote device attempting to access
your computer.
A visual security notification is given when a remote device attempts to access your
computer.
When the notification is acknowledged, a dialog box opens; it provides:
x Name-level security information—the user-friendly name of the device
attempting access.
x A place to enter a passkey.
The operator of the remote system must enter the identical passkey or access is denied.