User's Manual
Back to Contents
Glossary: Bluetooth Adapter User Guide
authentication A Bluetooth security feature that is used to verify identity; it requires a Bluetooth PIN
Code from the remote device.
authorization A yes-or-no Bluetooth security feature that requires operator intervention to avert
having the connection time out and fail.
BDA Bluetooth Device Address (assigned by the manufacturer).
Bluetooth A short-range (10 meters) networking protocol that allows enabled devices to
automatically recognize each other. Bluetooth wireless technology allows quick and
easy connectivity of Bluetooth enabled devices.
Bluetooth PIN Code The alphanumeric string (up to 16 characters) that is typed to respond to a Bluetooth
PIN Code Request. Also referred to as a passkey or password.
Client Applications Software applications on this computer that allow this computer to use the Bluetooth
services that are provided by remote Bluetooth devices.
Bluetooth device Bluetooth enabled hardware such as a computer, printer, fax, mouse, keyboard, cell
phone, headset, or PDA.
Dynamic Host Control Protocol A protocol used by a server to assign an Internet Protocol (IP) address to a
connecting device.
encryption Encryption translates data into an unreadable format using a secret key or password.
Decrypting the data requires the same key or password that was used to encrypt it.
GHz gigahertz A unit of frequency equal to 1 000 000 000 cycles per second.
HCI Host Controller Interface
HID human interface device (mouse, keyboard, and so forth)
link key An internally generated unique security key that is exchanged by paired devices as
proof of identity before a connection is established.
Local Services Services that this computer provides to other Bluetooth devices.
network adapter A processor chip that provides network capabilities. A computer may include a
network adapter on its system board or it may contain a PC card with an adapter on it.
paired devices Bluetooth devices must be paired before they can connect. Paired devices share a
unique link key, which they exchange each time they connect.
PDA personal digital assistant
PIM Personal Information Manager An application, such as Microsoft Outlook, that is
used to manage contacts, send and receive e-mail, and schedule events and tasks.
Secure Connection A setting that requires a passkey or link key each time you attempt to make a
connection. All data exchanged over the Bluetooth connection is encrypted.
Depending on other configuration options, authorization may also be required.
Review Copy