Broadcom Corporation BRCM1046 Manuel D’Utilisation

Page de 5
 
NOTE: Before you begin, however, please review the Bluetooth 
Module User’s Guide. This document provides important 
information and instructions that will help you do the things you want to do with 
your Bluetooth enabled computer. 
Glossary 
 
Authentication 
A Bluetooth security feature that is used to verify identity; it requires a 
 
Bluetooth PIN Code from the remote device. 
Authorization 
A Yes-or-No Bluetooth security feature that requires operator intervention to 
 
avoid having the connection time out and fail. 
Bluetooth device 
Bluetooth enabled hardware such as a computer, printer, fax, mouse, 
keyboard, cell phone, headset, or PDA. 
Bluetooth PIN 
The alphanumeric string (up to 16 characters) that is typed to respond to a 
Code 
Bluetooth PIN Code Request. Also referred to as a Passkey. 
Bluetooth® 
A short-range (9.14 meters/30 feet) networking protocol that allows enabled 
 
devices to automatically recognize each other. Bluetooth wireless 
 
technology allows quick and easy connectivity of Bluetooth enabled devices. 
Client 
Software applications on this computer that allow this computer to use the 
Applications 
Bluetooth services provided by remote Bluetooth devices. 
Link Key 
An internally generated unique security key (based on a Passkey, the 
Bluetooth Device Address, and an internally generated random number) that is 
exchanged by paired devices as proof of identity before a connection is 
established. 
Local Services 
Services that this computer provides to other Bluetooth devices. 
Paired Devices 
Bluetooth devices must be paired before they can connect. Paired devices 
share a unique Link Key, which they exchange each time they connect. 
Secure 
A setting that requires a Passkey or Link Key each time you attempt to make 
Connection 
a connection. All data exchanged over the Bluetooth connection is encrypted. 
Depending on other configuration options, authorization may also 
 
be required.