The name of Bluetooth comes from Danish King Harald Blatand-translated into English as Harold Bluetooth (because he likes Lan Mei very much, his teeth are blue every day). In the preparatory stage of the trade association, an expressive name is needed to name this high-tech. Industry organizers, after a night of discussion about the history of Europe and the infinite development of science and technology in the future, some people think that it is most appropriate to name it after King Blatter. King Blatter unified Norway, Sweden and Denmark. He is articulate and sociable, just like this upcoming technology, which will be defined as allowing coordination between different industrial fields and maintaining good communication between various system fields, such as computing, mobile phones and automobile industries. So the name is decided.
About bluetooth SIG
Bluetooth SIG (Bluetooth Technology Alliance) is a trade association composed of leading manufacturers in telecommunications, computer, automobile manufacturing, industrial automation and network industries. The team is committed to promoting the development of Bluetooth wireless technology, formulating low-cost wireless specifications for short-distance connection of mobile devices and bringing them to market.
Bluetooth SIG's global offices include: Seattle, USA (global headquarters); Kansas City, USA (US headquarters); Malmo, Sweden (EMEA headquarters); China Special Administrative Region (Asia-Pacific Headquarters).
The staff of Bluetooth SIG includes Dr. McFoley, executive director, Anders Edlund, marketing director, sales staff, engineering experts and operation experts. In addition to the support of Bluetooth SIG (Bluetooth Technology Alliance), volunteers from member companies also played an important role in the operation of Bluetooth SIG.
At present, Bluetooth SIG is composed of the initiators Agere, Ericsson, IBM, Intel, Microsoft, Motorola, Nokia and Toshiba, and thousands of companies as associate members and adopters.
Advantages of Bluetooth technology
Why choose Bluetooth wireless technology?
Bluetooth wireless technology is the simplest and most convenient method for wireless short-distance communication between two devices. It is widely used all over the world, and can wirelessly connect mobile phones, portable computers, cars, stereo headphones, MP3 players and other devices. Due to the unique concept of "profile", Bluetooth products no longer need to install driver software. The technology has been released in the fourth edition, and continues to develop on the basis of maintaining its inherent advantages-miniaturized radio, low power consumption, low cost, built-in security, stability, ease of use and instant networking functions. Bluetooth wireless technology is the only recognized leading short-range wireless technology in the market. By the end of 2005, its weekly shipment has exceeded 5 million units and the number of installed base stations has exceeded 500 million.
Globally available
Bluetooth wireless technical specifications are available for free use by our global member companies. Manufacturers in many industries are actively implementing this technology in their products to reduce the use of messy wires and realize seamless connection, streaming stereo transmission, data transmission or voice communication. Bluetooth technology works in the 2.4 GHz band, which is an industrial, scientific and medical (ISM) radio frequency band without applying for a license. For this reason, there is no need to pay any fees for using Bluetooth technology. But you must register with the mobile phone supplier to use GSM or CDMA, and you don't need to pay anything for using Bluetooth technology except the equipment fee.
Equipment scope
Bluetooth technology has been widely used as never before. Products that integrate this technology range from mobile phones, automobiles to medical equipment, and users who use this technology range from consumers, industrial markets to enterprises. Low power consumption, small size and low cost chip solutions enable Bluetooth technology to be applied to even small devices. Please refer to the Bluetooth product catalog and component product list to see the various products provided by our members.
convenient to use
Bluetooth technology is an instant technology, which does not need fixed infrastructure and is easy to install and set up. No cable connection is required. It's easy for new users to use-you just need to own a Bluetooth brand product, check the available profiles, and then use the same profile to connect it to another Bluetooth device. The subsequent PIN code process is as simple as operating on an ATM. When you go out, you can take your personal area network with you and even connect to other networks.
Global specification
Bluetooth wireless technology is the most widely supported, practical and secure wireless standard in the market today. A global certification program can test whether a member's products meet the standards. Since the release of 1999 in bluetooth profile, more than 4,000 companies have become members of the Bluetooth Special Interest Group (SIG). At the same time, the number of Bluetooth products on the market has also increased exponentially. The number of products has doubled for four consecutive years, and the installed base station capacity may reach 500 million by the end of 2005.
_________________________________________________________________________________________
Bluetooth security question and answer
What is a blue robbery?
Bluejacking refers to the behavior of mobile phone users using Bluetooth wireless technology to send business cards anonymously. Bluejacking "No" will delete or modify any data in the device. These business cards usually contain some naughty or provocative information, instead of the usual name and phone number. Bluejacker usually looks for ping calls or responds to users, and then they send more personal information to the device. Similarly, for bluejacking, the distance between sending and receiving devices must be within 10 meter. The owner of the mobile phone that receives the bluejack message should refuse to add such a contact to the address book. Devices set to undiscovered mode are not vulnerable to attacks such as bluejacking.
What is blues music?
Bluebugging allows individuals who know this technology to access mobile phone commands using Bluetooth wireless technology without notifying or prompting mobile phone users in advance. This flaw allows hackers to make phone calls, send and receive text messages, read and write phone book contacts, eavesdrop on phone content and connect to the Internet. To launch all these attacks without using special equipment, the hacker must be within 10 meters of the mobile phone. This is a defect independent of bluesnarfing, which may not necessarily affect the same mobile phone suffering from bluesnarfing.
What is bluesnarfing?
Bluesnarfing allows hackers to access data stored on Bluetooth-enabled mobile phones using Bluetooth wireless technology without prompting mobile phone users that they are connected to the device. Information accessible in this way includes phone books and related images, calendars and IMEI (International Mobile Equipment Identification Number). By setting the device to undetectable mode, it can greatly increase the difficulty of discovering and attacking the device. To run a device with special software without special equipment, a hacker must be within 10 meters of the device. Only a few old mobile phones that support Bluetooth are vulnerable to Bluetooth attacks.
What measures have mobile phone manufacturers taken to solve these problems?
Both Nokia and Sony Ericsson have developed mobile phone upgrade software, which is vulnerable to Bluetooth and Bluetooth eavesdropping. The two companies have also made great efforts to ensure that newly listed mobile phones will not be attacked by these attacks. Please visit the websites of Sony Ericsson and Nokia to learn more about how users can get the applicable software for upgrading their mobile phones.
What is car eavesdropping software?
Car eavesdropping software is a software tool developed by security researchers, which can be connected with Bluetooth car kit to send and receive audio through specific implementation. Individual users who use this tool can connect to cars, communicate remotely through unauthorized remote devices, send audio to speakers of remote devices, and receive audio from microphones. If there is no special equipment, an individual must keep a distance of 10 meter from the target vehicle when running the car eavesdropping tool on the laptop. The goal of security researchers is to highlight various implementation weaknesses of Bluetooth-enabled car kits, forcing manufacturers to ensure that Bluetooth-enabled devices have higher security.
How can I identify whether my car kit or car is vulnerable to car eavesdropping software?
To receive the access of car eavesdropping tools, the car kit needs to keep the pairing mode, use the standard fixed 4-digit PIN code, and not connect with the mobile phone. If the user always pairs the mobile phone with the car kit, the unauthorized device cannot be connected to the car kit. If the car kit of individual users is already in the pairing mode and has a standard fixed 4-digit PIN code (such as 0000 or 1234), they should contact the manufacturer directly to learn more about the vulnerabilities of their equipment and obtain the software upgrade suitable for the car kit.
Is Bluetooth wireless technology vulnerable to hackers in other aspects?
The attacks listed on this page are the only known possible attacks and are limited to some products on the market. If possible, please take some measures, such as enabling security measures and using reasonably long PIN codes or pairing devices in private mode. Bluetooth SIG will continue to study the security measures related to this technology, and will determine its application period with the spread and development of this technology.
What measures can users take to protect their data?
Users can take many measures to protect their data. If the user's mobile phone is vulnerable to bluesnarfing or bluebugging attacks, he should contact the mobile phone manufacturer or take the mobile phone to a service point authorized by the manufacturer. Manufacturers of vulnerable devices have developed software patches that can make up for these defects. In addition, if users are still worried that the device will be the target of attack, they can set the device to undetectable mode when they are not using Bluetooth wireless technology and are in an unknown area. Users can also ensure the security of their data by not "pairing" with unknown devices. If a user receives a pairing invitation with another device and is asked to enter a PIN code, but the user does not know which device invited the pairing, the user should not perform the pairing. Pairing only with known devices.
What is Cabir worm? What devices will the Cabir worm affect?
Cabir worm is a kind of malware, also known as malware. After being installed on the mobile phone, it will use Bluetooth technology to send itself to other similar vulnerable devices. Because it can replicate itself, it is classified as a worm. Cabir worm currently only affects mobile phones using Symbian 60 series user interface platform and Bluetooth wireless technology. In addition, users must manually receive viruses and install malware to infect their mobile phones. For more information about Cabir worm, please contact Symbian, a software licensing company, and visit the websites of F-Secure, McAfee and Symantec.
How does PIN affect security?
Personal Identification Number (PIN) is a 4-digit or more alphanumeric code, which will be temporarily associated with the product to realize safe pairing. If possible, users are advised to use a PIN containing at least 8 characters or more alphanumeric characters. Product owners can only share PIN codes with trusted individuals and trusted products for matching purposes. If you don't enter this PIN code, you can't pair. It is recommended that you always pair products in a relatively confidential area. Avoid pairing Bluetooth-enabled devices in public places. If your device is not paired for some reason, please find a safe and confidential location before pairing the device again.
Do I need to remember my password?
No need. There is no need to remember the PIN code except in the following rare cases: the PIN code is fixed; In this case, you only need to save the user manual with the specified PIN code for future reference.
Why does pairing in public places easily lead to security risks?
In theory, hackers can monitor and record the activities in the spectrum, and then use computers to regenerate PIN codes for exchange. This requires special construction hardware and complete knowledge of Bluetooth system. If an 8-digit or more alphanumeric PIN code is used, it may take years for a hacker to crack the PIN code. If you use a 4-digit password, hackers may crack it in a few hours. But advanced software is still needed.
Is this a big risk for Bluetooth-enabled devices?
Bluetooth devices establish a secure connection through the initial pairing process. During this period, one or two devices need to enter a PIN code, which is used by the internal algorithm to generate a security key, and then used to verify the device connection at any time in the future.
The latest academic report puts forward a theoretical process to "estimate" the security settings of paired Bluetooth devices. To this end, the attacking device needs to listen to the initial pairing process. Based on this point of view, the security key can be estimated by algorithm and disguised as other Bluetooth devices. The novelty of this report is that it proposes to enforce a new pairing sequence between two devices and improves the method of performing the estimation process, thus greatly shortening the previous attack time.
In order to carry out this attack, the attacker needs to eavesdrop on the initial pairing process, which usually happens only once in a confidential environment and lasts less than one second. The author puts forward a possible method, trying to forcibly delete the security key of one of the two Bluetooth devices, and then starting a new pairing process so that they can eavesdrop. To do this, they need to pretend to be a second device when connecting. The equipment required for this process is very expensive and usually only used by developers. If this process is successful, users will see a message on the device asking them to re-enter the PIN code. If the password is entered when the attacker appears and the PIN code is short enough, the attack will succeed in theory.
If the PIN key consists of only four digits, a fast PC can calculate the security key in less than one tenth of a second. The longer the PIN key, the longer it takes to crack the security key. It takes 100 years to calculate PIN with 8 alphanumeric characters, which is almost impossible to crack.
This is an academic analysis of the security of Bluetooth technology. The method described in this analysis is possible, but it is almost impossible for ordinary users to encounter such an attack. This kind of attack is also related to the credulity of users, so it is very important to understand the Bluetooth pairing process.
_______________________________________________________________________________________
Bluetooth technology version
1) bluetooth * * * currently has four versions: v1.11.2/2.0/2.1.
2) According to the communication distance, it can be further divided into class A (1)/class B (2) in different versions.
3) Differences between versions
1. 1 is the earliest version, and the transmission rate is about 748 ~ 8 10 KB/s 0 kb/s. Because it is an early design, it is easily interfered by products with the same frequency, which affects the communication quality.
1.2 also has a transmission rate of 748~8 10kb/s, but the anti-jamming frequency hopping function (software improvement) is added. (Too in-depth technical theory will not be detailed! )。
4) Communication distance version
A) Class A is used for high-power/long-distance Bluetooth products, but not for personal communication products (mobile phones/Bluetooth headsets/Bluetooth dongles, etc.). Because of its high cost and high power consumption, it is mostly used for some special commercial purposes, and the communication distance is about 80 ~100 m.
B) Class B is the most popular system at present, and the communication distance is about 8~30M, depending on the product design. It is mostly used in mobile phone/Bluetooth headset/Bluetooth dongle personal communication products, with low power consumption, small size and easy to carry.
5)1.11.2 Bluetooth products can basically support the transmission requirements of stereo sound effects, but they can only work in simplex mode, and the band frequency response is not enough, so they are not the best stereo transmission tools.
6) Version 2.0 is an improved version of 1.2. The transmission rate is about 1.8M/s~2. 1M/s, and it can work in duplex mode. In other words, it can transmit files/high-quality pictures and voice communication. Some Bluetooth dongles have been sold in the market in Taiwan Province Province, but few mobile phones support Bluetooth version 2.0. There are not many Bluetooth headsets that can really be used. Some Bluetooth products claim to be version 2.0, but they still need external accessories to achieve it. Therefore, it is believed that it will not be until the end of September this year at the earliest ~ 1 1, and version 2.0 certainly supports three-dimensional operation.
7) Later, if the Bluetooth version 2.0 chip has the opportunity to join the stereo decoding chip, even A2DP (Advanced Audio Distribution Profile) may not be needed.
Interpretation of Bluetooth 2. 1+EDR, a new standard of Bluetooth technology
At present, the most widely used standard is Bluetooth 2.0+EDR introduced in 2004, and a large number of products supporting Bluetooth 2.0+EDR appeared in 2006. Although Bluetooth 2.0+EDR standard has made many technical improvements, it inherits the problems of 1, such as complex configuration process and high power consumption of equipment. The x standard still exists.
In order to improve the problems existing in Bluetooth technology, Bluetooth SIG group proposed Bluetooth version 2. 1+EDR.
1. Improve the equipment pairing process: Because many users will encounter many problems in hardware pairing, whether it is single pairing or permanent pairing, the pairing process and necessary operations are too complicated. In the past, personal identification code was needed to ensure the security of the connection, but the improved connection method will automatically use digital passwords for pairing and connection, for example, as long as you choose to connect a specific device in the mobile phone options.
For short-distance pairing, there is also an NFC (Near Field Communication) mechanism for pairing and communication transmission between two mobile phones with Bluetooth function. NFC is a short-range wireless RFID technology. In the short-distance online application of1~ 2m, the traditional radio transmission is replaced by electromagnetic wave. Because the NFC mechanism controls the initial detection of pairing, when two devices in range want to transmit pairing, they just need to click whether to accept the connection on the mobile phone screen. However, in order to apply NFC function, the system must have built-in NFC chip or relevant hardware functions.
2. Better power saving effect: Bluetooth version 2. 1 adds the function of sniffing probe rate, and achieves the purpose of saving power by setting the transmission interval of mutual acknowledgement signals between two devices. Generally speaking, when two connected Bluetooth devices enter the standby state, they still need to talk to each other to determine whether they are still online. Of course, because of this, the Bluetooth chip must be kept in the working state at any time, even if other parts of the mobile phone have entered the sleep mode. In order to improve this situation, Bluetooth 2. 1 extends the time interval of mutual confirmation between devices from the old version of 0. 1 s to about 0.5 seconds, which can greatly reduce the workload of Bluetooth chips and give Bluetooth more time to sleep completely. According to official reports, after adopting this technology, the standby time of Bluetooth devices after opening Bluetooth connection can be effectively extended by more than 5 times.
New version of Bluetooth technology in the future.
1)UWB ultra-wideband version: The new version will be released in the middle of 2008. The new version of Bluetooth integrated with UWB technology will enable users to transmit and transmit a large amount of data at the same speed, and enable portable devices to achieve more advanced video and audio applications. Under the Bluetooth technical specification, the rate of UWB technology can reach 480Mbps in the effective range of 10 meter, which exceeds the highest requirement of 200Mbps in many applications. Synchronous MP3 player or high-definition digital camera is an application example of this technology.
2) Ultra-low power version of Wibree: In June this year, Wibree Forum, an ultra-low power wireless technology organization developed by Nokia, merged into the Bluetooth Technology Alliance. The new technical specification of Bluetooth technology integrated with Wibree technical specification will be released in the first half of 2008.