欢迎来到报告吧! | 帮助中心 分享价值,成长自我!

报告吧

换一换
首页 报告吧 > 资源分类 > PDF文档下载
 

蓝牙安全性(英文版).pdf

  • 资源ID:123387       资源大小:543.55KB        全文页数:6页
  • 资源格式: PDF        下载积分:15金币 【人民币15元】
快捷下载 游客一键下载
会员登录下载
三方登录下载: 微信开放平台登录 QQ登录  
下载资源需要15金币 【人民币15元】
邮箱/手机:
温馨提示:
用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,下载共享资源
 
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,既可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

蓝牙安全性(英文版).pdf

Bluetooth Security2 Introduction Bluetooth Security For EPOS, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that EPOS Contact Center and Office (CC&O) headsets provide. Introduction Bluetooth is a wireless technology standard for exchanging voice and data over short distances between Bluetooth enabled devices. Ericsson introduced Bluetooth to the market in 1994 to overcome the challenges of connecting devices with different types of technology and communication protocols. Since its introduction, the Bluetooth Special Interest Group has collected more than 20,000 member companies and the Bluetooth standard has become a widespread and popular method of connecting devices. More than 2 billion units are able to use Bluetooth technology, which has conse- quentially raised concerns about security issues. Before getting into details about Bluetooth security, it should be mentioned that overall, the risk of unauthorized access to communication via Bluetooth is limited. In general, Bluetooth offers a very high level of security, which EPOS has chosen to enhance further through the intelligent use of innovative solutions3 The Bluetooth standard offers a wireless connection between devices in proximity to each other. To do so, the two devices have to first be paired. The pairing is like a “tech- nological handshake” that introduces the two devices to each other and enables them to communicate. The pairing requires that the two devices can find each other they must be made “discoverable”. For most Bluetooth devices, this requires an active process of putting the devices in pairing mode. While in this setting, the devices become discoverable for a short while and can begin to exchange a security key for authentication. After exchanging this security key, which is not transmitted through the air and cannot be stolen, the devices are success fully paired. The secret key is the “bridge” between the devices that is formed after the initial pairing. In the future, these devices can continue to use this key, which eliminates the need for repeating the pairing each time the devices are used. How Bluetooth works4 High level of security As mentioned earlier, Bluetooth technology offers a high level of security for the user. It is extremely difficult to eavesdrop or to interfere with Bluetooth communication for many reasons, including the short range and the authentication that must take place in order to use the devices. In theory, the most vulnerable point for Bluetooth devices is when they are pairing as they have to be visible/discover able to do that. Even though the security threat is highly hypothetical, EPOS has addressed the issue with several intelligent measures. Different types of threats In order to explain the advantages of the secure EPOS headsets it is useful to list the different types of threats that are being discussed. Man in the middle attack An attacker tries to intercept information over to his device without the knowledge of the attacked. It is extremely difficult to do that in real life, as the attacker would have to be very close to the devices. Virus Wireless transmission of a harmful virus. The EPOS Bluetooth headset and the Bluetooth dongle only transmit speech, not data like other Bluetooth devices. Therefore, there is no environment for a virus to run. Eavesdropping An attacker listening in on a conversation. The attacker would have to be present at the pairing and furthermore have extremely advanced equipment. The voices are encrypted and converted to a digital stream. Modern devices use the Bluetooth 4.0 s tandard and higher, especially for the use of voice transmission, which provides a high level of protection. Supplementary EPOS security For EPOS, security for the user plays an important role in product development. We have taken extra steps in order to strengthen the high level of security that Bluetooth technology provides. Here are some examples: Intelligent Power Management During pairing, the transmit power of EPOS Bluetooth devices is reduced. This results in a much shorter range when performing the pairing process. “Man in the Middle” attacks become extremely difficult to undertake as the attac king device would have to be very close to the pairing devices. Host Device Access Security EPOS head- sets and the corresponding USB-dongles only support audio related Bluetooth profiles. Data content stored on the host device can never be transmitted to the headset or other devices. This means that viruses cannot be transferred, either. Short Pairing Window EPOS headsets are only discoverable for a very short period during pairing. After that short period, they automati cally turn off the Bluetooth access until access is reactivated by the authorized user5 EPOS legal disclaimer At EPOS we strive for ensuring the best security measures in our Bluetooth products. However, we cannot be held responsible with regard to compensation for damages or expenses due to any security breaches taking place on the part of the customer by using our Bluetooth products. Although EPOS has implemented precau- tionary measures to ensure a high security level, it is the customers responsibility to check and configure appropriate settings of his Bluetooth device to maintain secu- rity. Security measures implemented in the EPOS device may not be supported by the customers device which may reduce the security level of a Bluetooth connection. The customer acknowledges that encryption of the Bluetooth connection only applies to the wireless connection between paired devices. Communication links and contents transferred by an encrypted Bluetooth connection (i.e. telephone calls) are not encrypted by the EPOS Bluetooth device. The customer further acknowledges that no technology provides complete security. For higher security requirements than provided by the Bluetooth standard, additional measures must be implemented by the customer. Nevertheless, EPOS will be liable for damages from injury to life, body or health due to negli- gent breach of duty by EPOS or damages arising from a breach caused by gross negligence or willful intent by EPOS. EPOS is also liable for negligent breaches of essential contractual obligations. Essential contractual obli gations means obligations whose performance is a fundamental pre- requisite for the proper execution of the contract and on which a contracting party may rely upon. In this case, compensation is limited to foreseeable, typical damages. The above provisions also apply to damages caused by a legal representative or a person used to perform an obligation of EPOS. EPOS liability according to the Danish/ European Product Liability Act unaffected406839258 EPOS Group A/S Industriparken 27 2750 Ballerup, Denmark

注意事项

本文(蓝牙安全性(英文版).pdf)为本站会员(行业报告-1)主动上传,报告吧仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知报告吧(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2017-2022 报告吧 版权所有
经营许可证编号:宁ICP备17002310号 | 增值电信业务经营许可证编号:宁B2-20200018  | 宁公网安备64010602000642号


收起
展开