Beruflich Dokumente
Kultur Dokumente
It is possible to apply varying trust levels and policies to restrict access for
applications with different security requirements, even when they operate in
parallel. It is possible to grant access to some services without providing
access to other services. The concept of authorisation is introduced in
Bluetooth security mode 2. Using this it is possible to determine if a specific
device is allowed to have access to a specific service.
The authentication and encryption processes use a separate secret link key that
is shared by paired devices, once the pairing has been established.
In Bluetooth Security Mode 4 the security procedures are initiated after link
setup. Secure Simple Pairing uses what are termed Elliptic Curve Diffie
Hellman (ECDH) techniques for key exchange and link key generation.
The algorithms for device authentication and encryption algorithms are the
same as those defined in Bluetooth v2.0 + EDR.