User's Manual

IVT BlueSoleil™ User Manual
Copyright © 2001, IVT Corporation, http://www.ivtcorporation.com
All specifications are preliminary and subject to change without notice.
16
3 Bluetooth Security
3.1 Introduction
Bluetooth introduces security features to protect users from unauthorized access of
local data and encrypt data in the air. Three levels of security is defined in
Bluetooth:
Low (no security): Local device will not initiate any security procedure.
Medium (service-level enforced security): Local device does not initiate
security procedures before user access local Bluetooth services. This mode
allows different and flexible access policies for Bluetooth applications,
especially running applications with different security requirements in parallel.
High(device level enforced security): Local device initiates security procedures
as long as the remote Bluetooth device set-up link, for example, browsing local
services etc.
Following table shows the security when Bluetooth client device access another
Bluetooth device that provides services.
Server in
Security Low
Server in
Security Medium
Server in
Security High
Client in
Security
Low
No security. Can browse
services.
Accessing service
depends on the
settings of local
services.
High. Security is
enforced at link
level before setup
connection.
Client in
Security
Medium
No security. Can browse
services.
Accessing service
depends on the
settings of local
services.
High. Security is
enforced at link
level before setup
connection.
Client in
Security
High
High. Security is
enforced at link
level before setup
connection.
High. Security is
enforced at link
level before setup
connection.
High. Security is
enforced at link
level before setup
connection.
When security is enforced at device level or a local service requires, an
Authentication procedure is required. Both of Bluetooth client and server side
need enter a Bluetooth passkey to confirm the client user's identity.
To avoid entering Bluetooth passkey every time, two Bluetooth devices can be set
up paring relationship, that is to save the relationship after Authentication. After
Authentication, the Bluetooth link can be encrypted if necessary.
Authorization is used in Security Medium (service-level enforced security), to set
which devices can use the local service and which cannot. The following are some
concept of bluetooth security: