User`s manual
Programming Manual) A serial connection from your PC to the printer and a
communications utility such as Label Vista, MS HyperTerminal or ProComm is
needed.
With Authentication turned on: When a handheld computer discovers the printer
and tries to establish a communication link between them, the printer will request
a passkey.
Zebra printers use an algorithm to generate the passkey based on the Friendly
Name of the printer. (By default the friendly name is the serial number, however it
can be changed to whatever name the user desires). The handheld computer
seeking to connect to the printer must be able to generate the same passkey.
The Friendly Name of the printer is available to the handheld computer within the
information obtained from the printer during discovery. The passkey algorithm
can be provided to end users (developers) by Zebra.
Also, an executable demo program for Pocket PC called ZebraBTPrintUtility.exe
is available to create the passkey by entering the friendly name in the dialog box
that requires it. This program is also useful to be able to select a label format
(previously saved in your handheld) and send it to be printed via Bluetooth.
Please see section called: “ Connecting Zebra Bluetooth Printers with Handheld
Computers”.
III. Encryption
The Bluetooth standard uses a 128 bit encryption key which is consider a secure
encryption key. The algorithm that Bluetooth uses to encrypt data is the SAFER+
algorithm developed by Cylink.
www.cylink.com
Zebra printers use this encryption system by simply turning “on” authentication
on the printer and turning “on” encryption on the master device/terminal. All data
transferred between the devices will be encrypted.
The connection procedure which involves establishing the encryption key
involves the following steps:
1) Authentication: The first step of the security process is
authentication. When a terminal attempts to start a
connection, the terminal will be prompted to enter a
“passkey” or a “PIN”. Once you enter the PIN, the
printer verifies whether the PIN you entered is correct
using a secure “challenge/response” system. If the
PIN is correct, then the 128 bit “link key” is securely
exchange.
Rev 2.1 Page 7