X-Micro Bluetooth USB Dongle Manuel D’Utilisation

Page de 49
 
 
41
 
Security 
A
U T H E N T I C A T I O N
 
Authentication is used to verify identity; it requires a passkey or link key from the remote 
device. When a remote device attempts access, a visual and/or audio warning notifies the 
local operator. 
If the notification is ignored, access is denied after a preset timeout. 
When devices are “paired,” those devices automatically exchange a Link Key and 
Authentication is carried out without operator intervention.  
A
U T H O R I Z A T I O N
 
Authorization is Yes-or-No security that requires operator intervention to avoid having the 
connection time out and fail. 
Authorization is limited to: 
 
Yes, you may connect (click the balloon to proceed) 
 
No, you may not connect (ignore the balloon prompt and the connection will fail). 
B
L U E T O O T H  
D
EVICE 
I
D E N T I T Y
 
Every Bluetooth device has a unique Bluetooth Device Address (BDA) assigned to it 
during the manufacturing process. This address cannot be changed by the end-user. 
A device’s BDA is usually displayed in hexadecimal format; 00:D0:B7:03:2E:9F is a valid 
BDA. 
Each Bluetooth device also has an operator-configurable, user-friendly name to help 
distinguish it from other devices. The user-friendly name may be up to 99 alphanumeric 
characters in length and may contain spaces. My Personal Computer is a valid 
user-friendly name. 
E
N C R Y P T I O N
 
Encrypting data translates it into an unreadable format using a secret key or password. 
Decrypting the data requires the same key or password that was used to encrypt it. 
L
I N K  
K
EY
 
A unique, internally generated, access code based on a passkey, the Bluetooth Device 
Address and an internally generated random number.. Link Keys are generated 
automatically when devices Pair. 
After a link key is generated, manual entry of the passkey is not required.