EasyManuals Logo
Home>Motorola>Handhelds>MC2100

Motorola MC2100 User Manual

Motorola MC2100
106 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #52 background imageLoading...
Page #52 background image
4 - 2 MC21XX Series User Guide
The Bluetooth radio in this MC2180 operates as a Class 2 device power class. The maximum output power is
2.5mW and the expected range is 32.8 feet (10 meters). A definition of ranges based on power class is difficult
to obtain due to power and device differences, and whether one measures open space or closed office space.
Security
The current Bluetooth specification defines security at the link level. Application-level security is not specified.
This allows application developers to define security mechanisms tailored to their specific need. Link-level
security occurs between devices, not users, while application-level security can be implemented on a per-user
basis. The Bluetooth specification defines security algorithms and procedures needed to authenticate devices,
and if needed, encrypt the data flowing on the link between the devices. Device authentication is a mandatory
feature of Bluetooth while link encryption is optional.
Pairing of Bluetooth devices is accomplished by creating an initialization key that is used to authenticate the
devices and create a link key for them. Entering a common PIN number in the devices being paired generates
the initialization key. The PIN number is never sent over the air. By default, the Bluetooth stack responds with
no key when a key is requested (it is up to user to respond to the key request event). Authentication of
Bluetooth devices is based-upon a challenge-response transaction. Bluetooth allows for a PIN number or
passkey that is used to create other 128-bit keys used for security and encryption. The encryption key is
derived from the link key used to authenticate the pairing devices. Also worthy of note is the limited range and
fast frequency hopping of the Bluetooth radios that makes long-distance eavesdropping difficult.
Recommendations are:
Perform pairing in a secure environment
Keep PIN codes private and don't store the PIN codes in the mobile computer
Implement application-level security.
The Microsoft stack supports Smart-pairing. For detailed information, refer to the Microsoft MSDN.
Bluetooth Configuration
The services supported by the Microsoft Bluetooth stack:
Generic Access Profile
Serial Port Service
Service Discovery Access Profile
Dial-Up Networking Profile (Client)
COM5 and COM9 ports are available for the Microsoft Bluetooth stack.
NOTE It is not recommended to perform Bluetooth wireless technology inquiry when high rate 802.11b
operation is required.
ELIMINARY
-level security is not s
-level security is no
their specific need. Li
their specific need. Li
y can be implemented
can be implemente
edures needed to auth
needed to auth
ces. Device authentica
es. Device authe
nitialization key that is
ialization key
PIN number in the de
mber in th
r the air. By default, th
the air. By default, th
spond to the key requ
pond to the key requ
onse transaction. Blue
onse transaction
s used for security an
used for security a
e the pairing devices.
airing devices
dios that makes long-
dios that makes long-
environment
ent
e and don't store the
e and don't store the
PRE
tion-level security.
tion-level security.
supports Smart-pairin
pports Smart-pai
RE
onfiguration
onfiguration
services supported by
services supported
Generic Access
Generic
al Port al Po

Table of Contents

Other manuals for Motorola MC2100

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Motorola MC2100 and is the answer not in the manual?

Motorola MC2100 Specifications

General IconGeneral
BrandMotorola
ModelMC2100
CategoryHandhelds
LanguageEnglish

Related product manuals