Figure 2 Advanced Configurations For UART Hardware Device
59
Properties Configuration
To configure the properties of your local device, click My Bluetooth | Device
Properties…,
General
•Device Name
The local device's name, which will be shown to other Bluetooth
enabled devices.
•Device Type
The device's type of your local computer (i.e., Desktop, Laptop or
Server).
•Device Address
The address of the local device. Every Bluetooth enabled device has a
unique address.
Figure 1 General Properties Page
60
Accessibility
Connecting Mode
•Connectable: Permits other Bluetooth enabled devices to connect with
your computer.
•Non-Connectable: Prohibits other Bluetooth enabled devices from
connecting with your computer.
Discovery Mode
•General Discoverable: Permits other Bluetooth enabled devices to
detect your computer.
•Limited Discoverable: Permits other Bluetooth enabled devices to
detect your computer with Limited Inquiry.
•Non-Discoverable: Prohibits other Bluetooth enabled devices from
detecting your computer.
Bonding Mode (Pairing Mode)
• Accepts Bonding: Allow other Bluetooth enabled devices to pair with
your computer. If the other device initiates a pairing procedure with your
computer, each device must enter the same passkey before they will be
paired.
61
Does Not Accept Bonding: Rejects pairing attempts initiated by other
•
Bluetooth enabled devices.
Figure 2 Accessibility Properties Page
Hardware
View information about your Bluetooth hardware.
• Manufacturer: The manufacturer of the local Bluetooth device.
• HCI Version: The HCI version of the local Bluetooth device.
• HCI Revision: The HCI revision of the local Bluetooth device.
• LMP Version: The LMP version of the local Bluetooth device.
62
LMP Subversion: The LMP subversion of the local Bluetooth device.
•
Figure 3 Hardware Properties Page
Security Configuration
Use the Security Configuration screens to specify the security settings of your
local device, it includes:
• General Security
• Paired Devices Management
• Local Services Security
Pair / Un-pair Devices
Once a remote device has paired with your computer by exchanging passkeys,
passkeys will no longer be required for further connections between your
computer and the device.
63
How to pair with another device
•Automatically
If a passkey is required for connection, the devices will be paired
automatically the first time they successfully exchange passkeys and
connect. After a device has successfully paired with your computer, the
remote device icon in the Main Window will have a red checkmark next
to it.
•Manually
In the Main Window, right click on the device icon, and in the pop-up
menu, select Pair Device. In the Enter Bluetooth Passkey dialog,
enter the same passkey that you enter on the remote device. After a
device has successfully paired with your computer, the remote device
icon will have a red checkmark next to it.
How to un-pair with another device
•Manually
In the Main Window, right-click on the device icon, and in the pop-up
menu, select Unpair. The red checkmark next to the device icon will
disappear.
General Security
To access the security configuration screen, click My Bluetooth | Security…
Security Level
•Low
If checked, other devices will be able to access your device freely
without entering a passkey.
64
However, if the remote device requires a passkey to connect, then both
devices need to exchange passkeys.
•Medium
The medium level is service level security, you can assign the
appropriate level of access for each specific service. For more detail,
see Local Services Security.
•High
If checked, passkeys must be exchanged for every incoming and
outgoing connection, unless the two devices have already paired in the
past.
Bluetooth
•Set Default Passkey
Use this setting to set a default passkey for all connections. BlueSoleil
will use this passkey whenever one is required.
Passkey
Data Encryption
•Enable Data Encryption
If checked, the data transmitted will be encrypted.
Paired Devices Management
To access the device security configuration screen, click My Bluetooth |
Security and click on the Devices tab.
Paired Devices List Box
This screen lists devices which have already paired with the local device.
Remove Pairing Button
65
Click to remove the pairing relationship between the selected device and the
local device.
Authorize Services Button
Click to select which services you authorize the selected paired device to use.
A list of local services will appear. Select the services you wish to allow the
remote device to use, then click OK.
Figure 1 Authorize Services
Note:
•The screen will only list the local services that require authentication.
The local services that do not require authentication can be accessed
freely.
• The Authorization button is enabled only when the Security Level is set
to Medium.
Local Services Security
To access the local services security configuration screen, click My Bluetooth
| Security and click on the Services tab. You can only configure security for
66
local services when the Security Level is set to Medium. (Set the Security
Level in the General Security.)
Local Services:
•Authentication
If checked, a passkey is required whenever a remote device attempts to
connect with this service.
•Encryption
If checked, data transmitted between devices for this service will be
encrypted.
Authorization Button:
Click to select the devices you wish to allow to use the selected service.
67
In the Service Authorization screen, enter the following settings:
•Trusted Devices
Select to trust devices listed in this screen to use the selected service
on your device.
A device can freely access the service from your local device when
trusted. Click Add/Remove to edit the device list.
•Trust all devices
Connection requests will be accepted from every device.
•Prompt to user if the device is not a trusted device of this service
If a non-trusted device attempts to access the service, a dialog will
appear to allow you to accept or reject the connection.
•Reject the device to use the service if it is not a trusted device of
this service
If a non-trusted device attempts to access the service, the connection
will be rejected automatically without informing the user.
68
Notes: If a device is trusted for a service, it may connect to this service on your
local device without informing you.
69
Troubleshooting
Cannot start My
When the program starts, the local device address is 00:00:00:00:00:00.
Please check whether you have properly plug-in your Bluetooth USB dongle or
Bluetooth CF card and whether the device is powered up. Bluetooth USB
dongles can be detected automatically if they are in the IVT known device list
(If you are using a device of a new model, please contact IVT so that the model
can be added to the list). Some Bluetooth CF card device cannot be detected
automatically. Users need to configure the parameters in the menu Tools |
Bluetooth Device... to enable the device.
How can I find my
Bluetooth
Bluetooth
?
device information?
On the center ball, my device, right click and select Properties... on the popup
menu. In the My Bluetooth Device dialog box, there are device names,
device addresses, device manufacturers, device HCI and LMP (Link Manager
Protocol) versions and editions.
Can't find the remote device you want?
First, please check whether the remote device is in discoverable mode. If the
remote device is set to non-discoverable, other devices cannot find it. Second,
please check whether the remote device is within the radio range. Bluetooth
devices have 3 classes. Class 1 devices are high power devices. Their
transmission range are 50-100 meters. Class 2 and class 3 devices are low
power devices. Their transmission range are 10-20 meters. If you still cannot
find the remote device, you can (1) find the device from the history list, so that
70
you can add it directly to the Main Window. Do this via Tools | Add Device
from History.... (2) If the device is not in the history list, you can also add a
new device directly by inputting the remote device address. Do this via Tools |
Add New Device....
Can't find the remote device's services?
First, please verify that whether the remote device is in connectable mode. If
the remote device is set to non-connectable, other devices cannot connect
to it.
Second, please verify whether the remote device is within the radio range.
Third, please check whether the remote device has connections already.
Currently, some Bluetooth devices do not support scatter net. That is, the
device has limitations in supporting connection among multi-devices at the
same time. It is recommended that users try to connect one to one if the
connection cannot be set up.
Fourth, please verify whether both sides have input the right Bluetooth
passkey if any side is at security level High. The Bluetooth passkey must be
the same at both sides. If both sides have set Fixed Passkey (the default
passkey) and the passkeys are different, the connection cannot be set up
because of the authentication failure.
71
Terms
ABCDE F GH I J K L M N O P Q R S T
U V W X Y Z
A
Authentication Authentication is the process of verifying "who" is at the
other end of the link. Authentication is performed for devices. In Bluetooth this
is achieved by the authentication procedure based on the stored link key or by
pairing (entering a PIN).
Authorization Authorization is the process of deciding if device X is allowed
to access service Y. This is where the concept of "trusted" exists. Trusted
devices (authenticated and indicated as "trusted"), are allowed to access
services. Mistrusted or unknown devices may require authorization based on
user interaction before access to services is granted.
B
BluetoothBluetooth is an open specification for a cutting-edge technology
that enables short-range wireless connections between desktop and laptop
computers, personal digital assistants, cellular phones, printers, scanners,
digital cameras and even home appliances on a globally available band
(2.4GHz) for worldwide compatibility. In a nutshell, Bluetooth unplugs your
digital peripherals and makes cable clutter a thing of the past.
Bluetooth Authentication Bluetooth authentication is the procedure to
verify whether another Bluetooth enabled device has the right to access your
computer. During this procedure, a Bluetooth passkey is asked for on both
connection sides. If the passkeys are the same, the authentication procedure
is a success and the connection can be setup. If the passkeys are different,
then authentication fails and the connection cannot be set up.
Bluetooth Authorization Bluetooth authorization is the procedure to verify
whether you are going to allow (authorize) other Bluetooth enabled devices to
use Bluetooth services on your Bluetooth enabled devices. This procedure
functions in Bluetooth security Mode 2 and applies only to your Bluetooth
services. Every Bluetooth service in your BlueSoleil has the setting of
72
authorization. And there is an authorization devices list for every service, which
records the devices that you have authorized. The user can change the
authorization status for each device.
Bluetooth Connection Bluetooth functions are in the model of
Client/Server. One Bluetooth device provides services, and another Bluetooth
device uses these Bluetooth services. After connection, a Bluetooth link is set
up between two devices, and the link is called a Bluetooth connection. Users
can disconnect the connection after finishing his job on Bluetooth.
Bluetooth Connection Shortcut Connection shortcut is used for saving
time in searching devices and browsing services. After a connection is
established, it can be saved as a shortcut. The shortcut can be used later to
re-establish the connection, without searching the remote Bluetooth devices
and browsing services. After a connection is setup, the connection can be
saved as a shortcut, which can be used later without searching Bluetooth
devices or browsing services.
Bluetooth Device Bluetooth devices are addressed in two ways: (1) When
referring to the local device configuration, a Bluetooth Device is the local
Bluetooth hardware which can be a USB dongles, a UART device, a PCMCIA
card or a BCSP device. The user is expected to select the interface of his
Bluetooth device in his configuration. (2) When referring to the Bluetooth
application, it is the Bluetooth system as a whole, e.g. a Bluetooth modem,
Bluetooth mobiles or a Bluetooth PDA etc. My PC together with the BlueSoleil
and the Bluetooth dongle would also be addressed as a remote Bluetooth
device by other Bluetooth devices.
Bluetooth Device Address A unique 48-bit address that distinguishes
between different Bluetooth transceivers. Every Bluetooth device has a unique
address so that other devices can find it and communicate with it. The address
appears in the form of 00:03:20:00:0D:0A.
Bluetooth Device Class According to the Bluetooth standard, every
Bluetooth device is assigned a device type, which is represented in device
class. The Bluetooth device class is three bytes in length in the form of
04:01:00. On the computer side, the class may be Server, Desktop or Laptop.
Users will be asked to select it during the first time starting.
73
Bluetooth Device Inquiry To use Bluetooth, the user has to find the
remote device first. The searching procedure is called device inquiry. There
are two kinds of inquiry procedure, named General Inquiry and Limited Inquiry.
General Inquiry will find all the Bluetooth devices in general discoverable mode
and limited discoverable mode. Limited Inquiry will find only the devices in
limited discoverable mode.
Bluetooth Dongle A Bluetooth device which can be added onto a PC or a
notebook to make it Bluetooth enabled. Typically a USB device.
Bluetooth bonding A user initiates the bonding procedure and enters a
passkey to create a paired relationship between two devices. This differs
from the authentication procedure where the user is requested to enter a
passkey during the establishment of a link.
Bluetooth Passkey In the Bluetooth authentication procedure, a Bluetooth
passkey is requested on both connection sides. The same Bluetooth passkey
should be input on both sides. If the passkeys are the same, the authentication
procedure is successful and connections can be setup. If the passkeys are
different, the connection and authentication will fail.
Bluetooth Peripheral Device This is the implementation of the Bluetooth
Human Interface Device profile (HID). By using HID, a Bluetooth peripheral
input device such as Bluetooth mouse or keyboard can interface with the host
PC remotely.
Bluetooth Security Bluetooth security is an important part for the wireless
communication technology. Illegal access to your computer can be rejected.
There are three levels of security: Low, Medium and High. In Low level, there
is no security check. In Medium level, remote Bluetooth devices can browse
your services. Security is set on every service. The service can be set to
request or not request for authentication and authorization. If you request for
authentication, the remote device will be asked to enter the same passkey as
the one in your PC . Otherwise, the Bluetooth passkey is not asked. If
authorization is set, the remote device has to be in the authorized devices list.
If not, there will be a dialog to ask the user to confirm whether you are going to
allow a remote device to use a services of the local device.
Bluetooth Service A Bluetooth device may offer certain functions for
other Bluetooth devices to use. These functions are called Bluetooth services.
74
For example, a Bluetooth mobile phone can offer 4 services, which include
synchronization, dial-up networking, file transfer and serial port. In BlueSoleil,
some services are started automatically and other services need to be started
manually before using. The user can also stop a service.
Bluetooth Service Browse A remote Bluetooth device can provide one or
more Bluetooth services. To use the services that the remote device provides,
the user has to find the services first. This is called service browse.
C
Connectable Bluetooth devices can be connectable or non-connectable.
When the device is connectable, other devices can connect to it.
D
DHCP The Dynamic Host Configuration Protocol (DHCP) is an Internet
protocol for automating the configuration of computers that use TCP/IP.
E
Encryption When a Bluetooth link is encrypted, data are encrypted into
unreadable data using a secret key or password before they are sent over the
air. Data are decrypted after they reach the remote device.
G
General Discoverable Bluetooth devices have 3 modes: General
discoverable, Limited discoverable and Non-discoverable mode. A Bluetooth
device will respond to a General Inquiry if it is in general discoverable or limited
discoverable mode.
H
HID A Human Interface device such as keyboard and mouse.
I
ICS Internet Connection Sharing. For more detailed information about ICS,
please refer to the help topic Internet Connection Sharing of Microsoft
Windows.
75
L
Limited Discoverable Bluetooth devices have 3 modes: General
discoverable, Limited discoverable and Non-discoverable mode. In Limited
discoverable mode, a Bluetooth device will respond to a General Inquiry or a
Limited Inquiry.
LAN Access Point One of entities defined in the LA profiles, the LAN
Access Point acts like a router between a Bluetooth piconet and an external
network.
N
NAP (Networking Access Point) A network access point is a unit that
contains one or more Bluetooth radio devices and acts as a bridge, proxy, or
router between a Bluetooth network and some other network technology
(10baseT, GSM, etc).
NAT Network address translation, which is used to re-map IP's from one
address range to another range of network addresses.
Non-connectable A Bluetooth devices can be connectable or
non-connectable. When it is non-connectable, other devices cannot connect to
it. This is used in BlueSoleil only when the user does not want other device to
connect to their computer.
Non-discoverable Bluetooth devices have 3 modes: General discoverable,
Limited discoverable and Non-discoverable mode. In Non-discoverable mode,
a Bluetooth device will not respond to any inquiry so no device can find it.
Non-pairable A Bluetooth device can be pairable or non-pairable. When it
is non-pairable, it will not accept a bonding request from other devices;
P
Pairing Devices Pairing allows you to avoid entering access information
each time a connection is set up. Paired devices share a unique Link Key,
which they exchange each time they connect.
PIM Personal Information Management.
76
R
Radio Signal Strength Bluetooth works on 2.4G ISM band. The radio
signal is stronger when the remote device is closer or the remote device has a
higher radio output. The radio signal is weak when the remote device is distant
or the remote device has a weak radio output. The strength of the remote
device's radio signal affects the quality of the communication of the two
Bluetooth devices. When the radio signal is weak, the Bluetooth data
transferring speed is slow. However, if the two devices are too close and the
radio signal is too strong, the Bluetooth data transferring speed is also slow
because the "sound" is too loud to "hear". The radio signal strength is always
referred to as RSSI in Bluetooth.
Remote Bluetooth Device All the other Bluetooth enabled devices are
called remote Bluetooth devices in the term of my Bluetooth device. They
could be a Bluetooth modem, Bluetooth mobiles or a Bluetooth PDA etc.
T
Trusted Device Device having unrestricted access to all services on the
server.
77
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class
B digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one of the
following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the
party responsible for compliance could void the user's authority to operate this
equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) This device may not cause harmful interference,
and (2) this device must accept any interference received, including
interference that may cause undesired operation.
The antenna(s) used for this transmitter must not be co-located or operating in
conjunction with any other antenna or transmitter.
IMPORTANT NOTE: In the event that these conditions can not be met (for example certain
laptop configurations or co-location with another transmitter), then the FCC authorization is
no longer considered valid and the FCC ID can not be used on the final product. In these
circumstances, the OEM integrator will be responsible for re-evaluating the end product
(including the transmitter) and obtaining a separate FCC authorization.
78
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.