×

Discussion Board

Results 1 to 2 of 2
  1. #1
    Regular Contributor
    Join Date
    Mar 2003
    Posts
    124

    Can you recommend an application level security protocol to layer on top of

    Can you recommend an application level security protocol to layer on top of BT?

  2. #2
    Regular Contributor
    Join Date
    Mar 2003
    Posts
    194

    RE: Can you recommend an application level security protocol to layer on top of

    Bluetooth technology itself provides a number of different security methods, such as authentication, authorisation, and encryption. They are sufficient for most Bluetooth applications to protect data transmission against eavesdropping.

    However, it is possible to create own, application-level security mechanisms too. Bluetooth specification does not set any restrictions for them.

    Please refer to the Bluetooth specification v1.1 Core for further details on security methods.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
×