beautypg.com

Asus USB-BT21 User Manual

Page 6

background image

authentication

A Bluetooth security feature that is used to verify identity. During the

initial authentication process, the Bluetooth device that initiates the

connection requires the remote device to supply a Bluetooth PIN code.

BDA

Bluetooth Device Address (assigned by the manufacturer).

Bluetooth
wireless

technology

Bluetooth

®

wireless technology allows short-range (within a distance of

10 meters) communication among Bluetooth enabled devices,
eliminating the need for cables. When connected, one device can use

or be used by the other, as specified by the user.

Bluetooth

security code

An alphanumeric string up to 16 characters long that is typed to
respond to a Bluetooth PIN Code Request. Also referred to as a

passkey, password, passcode or PIN code.

Client
Applications

Software applications on this computer that allow this computer to use
the Bluetooth services that are provided by remote Bluetooth devices.

Bluetooth device Bluetooth enabled hardware such as a computer, printer, fax, mouse,

keyboard, telephone, headset, headphones, camera, or PDA.

Dynamic Host

Control Protocol

A protocol used by a server to assign an Internet Protocol (IP) address

to a connecting device.

encryption

Encryption translates data into an unreadable format using a secret

key or password. Decrypting the data requires the same key or

password that was used to encrypt it.

HCI

Host Controller Interface.

HID

human interface device. A mouse or keyboard, for example.

link key

An internally generated unique security key that is exchanged by
paired devices as proof of identity before a connection is established.

Link keys are generated automatically when two devices pair.

Local Services

Bluetooth services such as Headset, Headphones, Audio Gateway, File
Transfer, and Printer that this computer provides to other Bluetooth

devices. Bluetooth services are used to carry out actions between a

program installed on your computer and a remote Bluetooth device.

My Bluetooth

services

See Local Services.

paired devices

Bluetooth devices must be paired before they can establish a secure
(authenticated and encrypted) connection. Paired devices share a

unique link key, which is exchanged automatically each time they

connect.

PDA

personal digital assistant.

PIM

Personal Information Manager. An application, such as Microsoft

®

Outlook

®

, that is used to manage contacts, send and receive e-mail,

and schedule events and tasks.

Secure

connection

A Bluetooth service or application property setting that requires a
passkey or link key each time you attempt to make a connection. All

data exchanged over the Bluetooth connection is encrypted. Depending

on other configuration options, authorization may also be required.

shortcut

An icon that provides quick access to frequently used programs, files,

folders, and drives. Double-clicking such an icon opens its

corresponding folder or file without first having to find it. Shortcut
icons do not change the location of files; they simply link to the file

wherever it is located. You can delete a shortcut without deleting the

file with which it is associated. Also, you can rename a shortcut.

taskbar

notification area The area on the Windows taskbar that displays the time and can also

contain shortcuts that provide quick access to programs. This is where