User's Manual
Table Of Contents
- Introduction
- Basic Operations
- Configure Bluetooth
- Security
- Troubleshooting
- Cannot connect to a paired device
- Cannot discover services on an un-paired remote device
- Dial-up Networking service does not start
- Determine the Bluetooth Device Address (BDA) of my hardware device
- Determine the version of the Host Controller Interface (HCI)
- Determine the version of the Link Manager Protocol (LMP)
- Find information about the Bluetooth hardware attached to my computer
- Internet Connection Sharing Does Not Work
- Test a Network Access connection
- Unknown Port message when using a Bluetooth Serial Port
- Bluetooth Headset Doesn’t Always Function Under WIN 98

User’s Guide
April 3, 2003 43
4 Security
4.1 AUTHENTICATION
Authentication is used to verify identity; it requires a passkey or link key from the remote
device. When a remote device attempts access, a visual and/or audio warning notifies the
local operator.
If the notification is ignored, access is denied after a preset timeout.
When devices are “paired,” those devices automatically exchange a link key and
Authentication is carried out without operator intervention.
4.2 AUTHORIZATION
Authorization is Yes-or-No security that requires operator intervention to avoid having
the connection time out and fail.
Authorization is limited to:
• Yes, you may connect (click the balloon to proceed)
• No, you may not connect (ignore the balloon prompt and the connection will
fail).
4.3 BLUETOOTH DEVICE IDENTITY
Every Bluetooth device has a unique Bluetooth Device Address (BDA) assigned to it
during the manufacturing process. This address cannot be changed by the end-user.
A device’s BDA is usually displayed in hexadecimal format; 00:D0:B7:03:2E:9F is a
valid BDA.
Each Bluetooth device also has an operator-configurable, user-friendly name to help
distinguish it from other devices. The user-friendly name may be up to 99 alphanumeric
characters in length and may contain spaces. My Personal Computer is a valid user-
friendly name.
4.4 ENCRYPTION
Encrypting data translates it into an unreadable format using a secret key or password.
Decrypting the data requires the same key or password that was used to encrypt it.
4.5 LINK KEY
A unique, internally generated, access code based on a passkey, the Bluetooth Device
Address and an internally generated random number. Link keys are generated
automatically when devices Pair.
After a link key is generated, manual entry of the passkey is not required.