User Manual

Table Of Contents
Cha pt er 8
Secur it y
8.1 AUTHENTICATION
Authentication is used to verify identity; it requires a passkey or link key from the remote
device. When a remote device attempts access, a visual and/or audio warning notifies the
local operator.
If the notification is ignored, access is denied after a preset timeout.
When devices are “paired,” those devices automatically exchange a Link Key and
Authentication is carried out without operator intervention.
8.2 AUTHORIZATION
Authorization is Yes-or-No security that requires operator intervention to avoid having
the connection time out and fail.
Authorization is limited to:
Yes, you may connect (click the balloon to proceed)
No, you may not connect (ignore the balloon prompt and the connection will
fail).
8.3 ENCRYPTION
Encrypting data translates it into an unreadable format using a secret key or password.
Decrypting the data requires the same key or password that was used to encrypt it.
8.4 LINK KEY
A unique, internally generated, access code based on a passkey, the Bluetooth Device
Address and an internally generated random number. Link Keys are generated
automatically when devices Pair.
After a link key is generated, manual entry of the passkey is not required.
8.5 PAIRING DEVICES
Pairing allows you to avoid entering access information each time a connection is
attempted. Paired devices share a unique Link Key, which they exchange each time they
87