Broadcom Corporation BRCM1046 Manuel D’Utilisation
NOTE: Before you begin, however, please review the Bluetooth
Module User’s Guide. This document provides important
information and instructions that will help you do the things you want to do with
your Bluetooth enabled computer.
Module User’s Guide. This document provides important
information and instructions that will help you do the things you want to do with
your Bluetooth enabled computer.
Glossary
Authentication
A Bluetooth security feature that is used to verify identity; it requires a
Bluetooth PIN Code from the remote device.
Authorization
A Yes-or-No Bluetooth security feature that requires operator intervention to
avoid having the connection time out and fail.
Bluetooth device
Bluetooth enabled hardware such as a computer, printer, fax, mouse,
keyboard, cell phone, headset, or PDA.
keyboard, cell phone, headset, or PDA.
Bluetooth PIN
The alphanumeric string (up to 16 characters) that is typed to respond to a
Code
Bluetooth PIN Code Request. Also referred to as a Passkey.
Bluetooth®
A short-range (9.14 meters/30 feet) networking protocol that allows enabled
devices to automatically recognize each other. Bluetooth wireless
technology allows quick and easy connectivity of Bluetooth enabled devices.
Client
Software applications on this computer that allow this computer to use the
Applications
Bluetooth services provided by remote Bluetooth devices.
Link Key
An internally generated unique security key (based on a Passkey, the
Bluetooth Device Address, and an internally generated random number) that is
exchanged by paired devices as proof of identity before a connection is
established.
Bluetooth Device Address, and an internally generated random number) that is
exchanged by paired devices as proof of identity before a connection is
established.
Local Services
Services that this computer provides to other Bluetooth devices.
Paired Devices
Bluetooth devices must be paired before they can connect. Paired devices
share a unique Link Key, which they exchange each time they connect.
share a unique Link Key, which they exchange each time they connect.
Secure
A setting that requires a Passkey or Link Key each time you attempt to make
Connection
a connection. All data exchanged over the Bluetooth connection is encrypted.
Depending on other configuration options, authorization may also
Depending on other configuration options, authorization may also
be required.