Skip to main content

New Bluetooth® Specifications Enable IP Connectivity and Deliver Industry-leading Privacy and Increased Speed

“Bluetooth 4.2 is all about continuing to make Bluetooth Smart the best solution to connect all the technology in your life – from personal sensors to your connected home. In addition to the improvements to the specification itself, a new profile known as IPSP enables IPv6 for Bluetooth, opening entirely new doors for device connectivity,” said Mark Powell, executive director of the Bluetooth SIG. “Bluetooth Smart is the only technology that can scale with the market, provide developers the flexibility to innovate, and be the foundation for the IoT.” 
Privacy and Security
Bluetooth 4.2 introduces industry-leading privacy settings that lowers power consumption and builds upon the government-grade security features of the Bluetooth specification. The new privacy features put control back into the hands of the consumer by making it difficult for eavesdroppers to track a device through its Bluetooth connection without permission. For example, when shopping in a retail store with beacons, unless you’ve enabled permission for the beacon to engage with your device, you can’t be tracked.
Speed
Bluetooth 4.2 increases the speed and reliability of data transfers between Bluetooth Smart devices. By increasing the capacity of Bluetooth Smart packets, devices transfer data up to 2.5 times faster than with previous versions. Increased data transfer speeds and packet capacity reduces the opportunity for transmission errors to occur and reduces battery consumption, resulting in a more efficient connection. 
Internet Connectivity
Building on the capabilities released earlier with Bluetooth 4.1 and the new features released in 4.2, the Internet Protocol Support Profile (IPSP) will allow Bluetooth Smart sensors to access the Internet directly via IPv6/6LoWPAN. IP connectivity makes it possible to use existing IP infrastructure to manage Bluetooth Smart “edge” devices. This is ideal for connected home scenarios that need both personal and wide area control. This profile will be ratified by the end of the year.
For the latest Bluetooth 4.2 and IPSP technical details, tools and other information including an FAQ and more, visit:www.bluetooth.com/bluetooth4-2
About Bluetooth® Wireless Technology
Bluetooth wireless technology is the global wireless standard enabling simple, secure connectivity for an expanding range of devices and serves as the backbone of the connected world. Bluetooth Smart technology, through an updatable platform and low power consumption, creates new application opportunities for the mobile phone, consumer electronics, PC, automotive, health & fitness and smart home industries. With nearly three billion devices shipping annually, Bluetooth is the wireless technology of choice for developers, product manufacturers, and consumers worldwide. Backed by industry leading companies, the Bluetooth SIG empowers over 24,000 member companies to collaborate, innovate and guide Bluetooth wireless technology. For more information, please visit www.bluetooth.com.
Source:Bluetooth.com

Comments

Popular posts from this blog

Microsoft Office for Tablet now on Google Play store

Back in November, Microsoft opened up early previews builds for its new mobile Office applications for Android tablets to those willing to sign up and wait for an invitation. After taking on feedback over the past couple of months, Microsoft has announced that it is expanding its preview scheme by releasing its Office applications to everyone directly through the Google Play Store. The new Office software for mobile unifies Android, IOS, and Windows platforms. Previously each platform had to make do with its own apps, meaning that feature sets differed depending on your operating system and updates were often slow and intermittent. By unifying the Office platform, Microsoft hopes to bring updates and new features to users in a timelier manner. There are still a couple of conditions attached to the preview builds though. Firstly, Office is still limited to ARM-based Android tablets with a screen size between 7 and 10.1 inches. Your tablet will also need to be running Ki...

Ethical Hacking Simplified. Applications of Cryptography

Pretty good Privacy PGP This type of cryptographic Application uses Public key encryption system and  is one of the most popular means of encryption in the world. It is used in securing data, data storage, email, Instant Messaging (instant messaging are messaging system that happens in real time, just like whatsApp, Facebook messenger etc.) and other forms of communication. The early version of this cryptographic application was written by Philip Zimmerman and has it public appearance in 1991. it is part of an open-source project with many version where user can choose the best that suit them. This cryptographic application comes with privacy and security measure that are found in many online systems. The data will travel in an encrypted form (chipertext), upon arriving at the receiving end, the receiving will use PGP to decrypt the data back to plaintext. PGP uses the Public/Private key encryption. Where the sender uses his public key to encrypt data, and the receiver ...

Tips for strong password

As we have already discussed that passwords are strong and at the same time weak! If user create password from his name, date of birth or any other combination that is related to him, cracking down his account doesn't need much technical know how. Meaning attacker who know you, can be lucky enough to access your sensitive information by only entering certain key combinations. Creating strong and almost non hackable wait!!! is there any non hackable password! I was once told that any system can be hacked! It only took time, skills and resources! You are absolutely right! But at-least one has to really suffer before getting your data! Arm robbers do rob banks! Do you think a local or common thief can rob bank? The ans is absolute NO! Strong passwords doesn't happen by chance! Below are the steps to create a very strong passwords! Passwords should be at-least 8 characters Its already becoming standard on the internet. Many websites doesn't allow less than 6 charact...