EasyManua.ls Logo

ActionTec USB Wireless Bluetooth Adapter - 6 Security

ActionTec USB Wireless Bluetooth Adapter
72 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
56
Security
6.1 Authentication
Authentication is used to verify identity; it requires a passkey or link key from
the remote device. When a remote device attempts access, a visual and/or
audio warning notifies the local operator. If the notification is ignored, access
is denied after a preset timeout. When devices are “paired, those devices
automatically exchange a link key and authentication is carried out without
operator intervention.
6.2 Authorization
Authorization is Yes-or-No security that requires operator intervention to
avoid having the connection time out and fail. Authorization is limited to:
Ye s , you may connect (click the balloon to proceed)
No, you may not connect (ignore the balloon prompt and the
connection will fail).
6.3 Bluetooth Device Identity
Every Bluetooth device has a unique Bluetooth Device Address (BDA)
assigned to it during the manufacturing process. This address cannot be
changed by the end-user. A devices BDA is usually displayed in hexadecimal
format; 00:D0:B7:03:2E:9F is avalid BDA.
Each Bluetooth device also has an operator-configurable, user-friendly name
to help distinguish it from other devices. The user-friendly name may be up
to 99 alphanumeric characters in length and may contain spaces. My Personal
Computer is a valid userfriendly name.
6.4 Encryption
Encrypting data translates it into an unreadable format using a secret key or
password. Decrypting the data requires the same key or password that was
used to encrypt it.
6

Related product manuals