throbber
Specification Volume 2
`
`Specification
`of the Bluetooth System
`
`Wireless connections made easy
`
`Profiles
`
`v1.0 B
` December 1st 1999
`
`1
`
`LG 1012
`
`

`

`2
`
`

`

`BLUETOOTH DOC
`
`Responsible
`
`N.B.
`
`Date / Day-Month-Year
`01 Dec 99
`e-mail address
`
`page 3 of 440
`Document No.
`1.C.47/1.0 B
`Status
`
`Profiles of the
`Bluetooth System
`
`Version 1.0B
`
`3
`
`3
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 4 of 440
`
`Profiles of the Bluetooth System
`Revision History
`The Revision History is shown in Appendix I on page 413
`
`Contributors
`The persons who contributed to this specification are listed in
`Appendix II on page 421.
`
`Web Site
`
`This specification can also be found on the Bluetooth web site:
`http://www.bluetooth.com
`
`Disclaimer and copyright notice
`THIS SPECIFICATION IS PROVIDED “AS IS” WITH NO WARRANTIES
`WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY,
`NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR
`ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECI-
`FICATION OR SAMPLE. All liability, including liability for infringement of any
`proprietary rights, relating to use of information in this document is disclaimed.
`
`No license, express or implied, by estoppel or otherwise, to any intellectual
`property rights are granted herein.
`
`Copyright © 1999
`
`Telefonaktiebolaget LM Ericsson,
`International Business Machines Corporation,
`Intel Corporation,
`Nokia Corporation,
`Toshiba Corporation .
`
`*Third-party brands and names are the property of their respective owners.
`
`4
`
`4
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 5 of 440
`
`MASTER TABLE OF CONTENTS
`
`For the Core Specification, see Volume 1
`
`Part K:1
`
`GENERIC ACCESS PROFILE
`Contents .............................................................................................15
`Foreword ...................................................................................19
`1 Introduction ..........................................................................20
`2 Profile Overview...................................................................22
`3 User Interface Aspects.........................................................25
`4 Modes ..................................................................................29
`5 Security Aspects ..................................................................33
`6 Idle Mode Procedures..........................................................37
`7 Establishment Procedures ...................................................45
`8 Definitions ............................................................................52
`9 Annex A (Normative): Timers and Constants.......................56
`10 Annex B (Informative): Information Flows of Related
`Procedures...........................................................................57
`11 References...........................................................................60
`
`Part K:2
`
`SERVICE DISCOVERY APPLICATION PROFILE
`Contents .............................................................................................63
`Foreword ...................................................................................65
`1 Introduction ..........................................................................66
`2 Profile Overview...................................................................68
`3 User Interface Aspects.........................................................72
`4 Application Layer..................................................................73
`5 Service Discovery ................................................................79
`6 L2CAP..................................................................................82
`7 Link Manager .......................................................................86
`8 Link Control..........................................................................88
`9 References...........................................................................91
`10 Definitions ............................................................................92
`11 Appendix A (Informative): Service Primitives and the
`Bluetooth PDUS ...................................................................93
`
`1 December 1999
`
`5
`
`5
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 6 of 440
`
`Part K:3
`
`CORDLESS TELEPHONY PROFILE
`Contents ............................................................................................97
`1 Introduction ........................................................................100
`2 Profile Overview.................................................................103
`3 Application Layer ...............................................................108
`4 TCS-BIN Procedures ......................................................... 110
`5 Service Discovery Procedures...........................................120
`6 L2CAP Procedures ............................................................121
`7 LMP Procedures Overview ................................................122
`8 LC Features .......................................................................124
`9 General Access Profile Interoperability Requirements ......126
`10 Annex A (Informative): Signalling Flows ............................128
`11 Timers and Counters .........................................................135
`12 References ........................................................................136
`13 List of Figures ....................................................................137
`14 List of Tables......................................................................138
`
`Part K:4
`
`INTERCOM PROFILE
`Contents ..........................................................................................141
`1 Introduction ........................................................................143
`2 Profile Overview.................................................................145
`3 Application Layer ...............................................................148
`4 TCS Binary.........................................................................149
`5 SDP Interoperability Requirements....................................153
`6 L2CAP Interoperability Requirements................................154
`7 Link Manager (LM) Interoperability Requirements.............155
`8 Link Control (LC) Interoperability Requirements................156
`9 Generic Access Profile.......................................................158
`10 Annex A (Informative): Signalling flows .............................159
`11 Timers and Counters .........................................................161
`12 List of Figures ....................................................................162
`13 List of Tables......................................................................163
`
`6
`
`1 December 1999
`
`6
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 7 of 440
`
`Part K:5
`
`SERIAL PORT PROFILE
`Contents ...........................................................................................167
`Foreword .................................................................................169
`1 Introduction ........................................................................170
`2 Profile Overview.................................................................171
`3 Application Layer................................................................174
`4 RFCOMM Interoperability Requirements...........................177
`5 L2CAP Interoperability Requirements................................179
`6 SDP Interoperability Requirements....................................181
`7 Link Manager (LM) Interoperability Requirements.............183
`8 Link Control (LC) Interoperability Requirements................184
`9 References.........................................................................186
`10 List of Figures.....................................................................187
`11 List of Tables ......................................................................188
`
`Part K:6
`
`HEADSET PROFILE
`Contents ...........................................................................................191
`1 Introduction ........................................................................193
`2 Profile Overview.................................................................196
`3 Application Layer................................................................200
`4 Headset Control Interoperability Requirements .................201
`5 Serial Port Profile ...............................................................210
`6 Generic Access Profile.......................................................214
`7 References.........................................................................215
`8 List of Figures.....................................................................216
`9 List of Tables ......................................................................217
`
`1 December 1999
`
`7
`
`7
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 8 of 440
`
`Part K:7
`
`DIAL-UP NETWORKING PROFILE
`Contents ..........................................................................................221
`1 Introduction ........................................................................223
`2 Profile Overview.................................................................226
`3 Application Layer ...............................................................230
`4 Dialling and Control Interoperability Requirements............231
`5 Serial Port Profile Interoperability Requirements...............235
`6 Generic Access Profile Interoperability Requirements.......238
`7 References ........................................................................240
`8 List of Figures ....................................................................241
`9 List of Tables......................................................................242
`
`Part K:8
`
`FAX PROFILE
`Contents ..........................................................................................245
`1 Introduction ........................................................................246
`2 Profile Overview.................................................................249
`3 Application Layer ...............................................................253
`4 Dialling and Control Interoperability Requirements............254
`5 Serial Port Profile...............................................................256
`6 Generic Access Profile Interoperability Requirements.......259
`7 References ........................................................................261
`8 List of Figures ....................................................................262
`9 List of Tables......................................................................263
`
`8
`
`1 December 1999
`
`8
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 9 of 440
`
`Part K:9
`
`LAN ACCESS PROFILE
`Contents ...........................................................................................267
`1 Introduction ........................................................................269
`2 Profile Overview.................................................................271
`3 User Interface Aspects.......................................................275
`4 Application Layer................................................................278
`5 PPP....................................................................................281
`6 RFCOMM...........................................................................284
`7 Service Discovery ..............................................................285
`8 L2CAP................................................................................287
`9 Link Manager .....................................................................288
`10 Link Control........................................................................290
`11 Management Entity Procedures.........................................291
`12 APPENDIX A (Normative): Timers and counters ...............293
`13 APPENDIX B (Normative): Microsoft Windows..................294
`14 APPENDIX C (Informative): Internet Protocol (IP).............295
`15 List of Figures.....................................................................297
`16 List of Tables ......................................................................298
`17 References.........................................................................299
`
`Part K:10
`
`GENERIC OBJECT EXCHANGE PROFILE
`Contents ...........................................................................................303
`Foreword .................................................................................305
`1 Introduction ........................................................................306
`2 Profile Overview.................................................................310
`3 User Interface Aspects.......................................................312
`4 Application Layer................................................................313
`5 OBEX Interoperability Requirements .................................314
`6 Serial Port Profile Interoperability Requirements ...............324
`7 Generic Access Profile Interoperability Requirements.......326
`8 References.........................................................................328
`
`1 December 1999
`
`9
`
`9
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 10 of 440
`
`Part K:11
`
`OBJECT PUSH PROFILE
`Contents ..........................................................................................331
`Foreword .................................................................................333
`1 Introduction ........................................................................334
`2 Profile Overview.................................................................338
`3 User Interface Aspects.......................................................340
`4 Application Layer ...............................................................344
`5 OBEX.................................................................................348
`6 Service Discovery ..............................................................351
`7 References ........................................................................353
`
`Part K:12
`
`FILE TRANSFER PROFILE
`Contents ..........................................................................................357
`Foreword .................................................................................359
`1 Introduction ........................................................................360
`2 Profile Overview.................................................................364
`3 User Interface Aspects.......................................................367
`4 Application Layer ...............................................................370
`5 OBEX.................................................................................374
`6 Service Discovery ..............................................................383
`7 References ........................................................................385
`
`Part K:13
`
`SYNCHRONIZATION PROFILE
`Contents ..........................................................................................389
`Foreword .................................................................................391
`1 Introduction ........................................................................392
`2 Profile Overview.................................................................396
`3 User Interface Aspects.......................................................399
`4 Application Layer ...............................................................402
`5 IrMC Synchronization Requirements .................................404
`6 OBEX.................................................................................406
`7 Service Discovery ..............................................................408
`8 References ........................................................................ 411
`
`10
`
`1 December 1999
`
`10
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 11 of 440
`
`Appendix I
`
`REVISION HISTORY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
`
`Appendix II
`
`CONTRIBUTORS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
`
`Appendix III
`
`ACRONYMS AND ABBREVIATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
`
`INDEX
`
`435
`
`1 December 1999
`
`11
`
`11
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 12 of 440
`
`12
`
`1 December 1999
`
`12
`
`

`

`Part K:1
`
`GENERIC ACCESS PROFILE
`
`This profile defines the generic procedures
`related to discovery of Bluetooth devices
`(idle mode procedures) and link management
`aspects of connecting to Bluetooth devices
`(connecting mode procedures). It also defines
`procedures related to use of different security
`levels. In addition, this profile includes com-
`mon format requirements for parameters
`accessible on the user interface level.
`
`13
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 14 of 440
`
`Generic Access Profile
`
`14
`
`1 December 1999
`
`
`
`14
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 15 of 440
`
`Generic Access Profile
`CONTENTS
`
`1
`
`2
`
`3
`
`Introduction ........................................................................................20
`1.1
`Scope.........................................................................................20
`1.2
`Symbols and conventions ..........................................................20
`1.2.1 Requirement status symbols.........................................20
`1.2.2 Signalling diagram conventions.....................................21
`1.2.3 Notation for timers and counters ...................................21
`Profile overview..................................................................................22
`2.1
`Profile stack ...............................................................................22
`2.2 Configurations and roles ............................................................22
`2.3 User requirements and scenarios ..............................................23
`2.4
`Profile fundamentals ..................................................................23
`2.5 Conformance .............................................................................24
`User interface aspects.......................................................................25
`3.1
`The user interface level..............................................................25
`3.2 Representation of Bluetooth parameters ...................................25
`3.2.1 Bluetooth device address (BD_ADDR) .........................25
`3.2.1.1 Definition.........................................................25
`3.2.1.2 Term on user interface level............................25
`3.2.1.3 Representation ...............................................25
`3.2.2 Bluetooth device name (the user-friendly name)...........25
`3.2.2.1 Definition.........................................................25
`3.2.2.2 Term on user interface level............................26
`3.2.2.3 Representation ...............................................26
`3.2.3 Bluetooth passkey (Bluetooth PIN) ...............................26
`3.2.3.1 Definition.........................................................26
`3.2.3.2 Terms at user interface level...........................26
`3.2.3.3 Representation ...............................................26
`3.2.4 Class of Device .............................................................27
`3.2.4.1 Definition.........................................................27
`3.2.4.2 Term on user interface level............................27
`3.2.4.3 Representation ...............................................27
`Pairing........................................................................................28
`
`3.3
`
`
`
`1 December 1999
`
`15
`
`15
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 16 of 440
`
`Generic Access Profile
`
`4
`
`5
`
`4.1.2
`
`Modes..................................................................................................29
`4.1
`Discoverability modes................................................................29
`4.1.1 Non-discoverable mode ................................................30
`4.1.1.1 Definition.........................................................30
`4.1.1.2 Term on UI-level .............................................30
`Limited discoverable mode ...........................................30
`4.1.2.1 Definition.........................................................30
`4.1.2.2 Conditions.......................................................31
`4.1.2.3 Term on UI-level .............................................31
`4.1.3 General discoverable mode ..........................................31
`4.1.3.1 Definition.........................................................31
`4.1.3.2 Conditions.......................................................31
`4.1.3.3 Term on UI-level .............................................31
`4.2 Connectability modes ................................................................31
`4.2.1 Non-connectable mode.................................................31
`4.2.1.1 Definition.........................................................31
`4.2.1.2 Term on UI-level .............................................32
`4.2.2 Connectable mode........................................................32
`4.2.2.1 Definition.........................................................32
`4.2.2.2 Term on UI-level .............................................32
`Pairing modes............................................................................32
`4.3.1 Non-pairable mode........................................................32
`4.3.1.1 Definition.........................................................32
`4.3.1.2 Term on UI-level .............................................32
`4.3.2 Pairable mode...............................................................32
`4.3.2.1 Definition.........................................................32
`4.3.2.2 Term on UI-level .............................................32
`Security aspects ................................................................................33
`5.1
`Authentication ............................................................................33
`5.1.1 Purpose.........................................................................33
`5.1.2
`Term on UI level ............................................................33
`5.1.3 Procedure .....................................................................34
`5.1.4 Conditions .....................................................................34
`Security modes ..........................................................................34
`5.2.1 Security mode 1 (non-secure).......................................36
`5.2.2 Security mode 2 (service level enforced security).........36
`5.2.3 Security modes 3 (link level enforced security).............36
`
`4.3
`
`5.2
`
`16
`
`1 December 1999
`
`
`
`16
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 17 of 440
`
`Generic Access Profile
`
`6
`
`6.2
`
`Idle mode procedures........................................................................37
`6.1 General inquiry...........................................................................37
`6.1.1 Purpose.........................................................................37
`6.1.2
`Term on UI level ............................................................37
`6.1.3 Description ....................................................................38
`6.1.4 Conditions .....................................................................38
`Limited inquiry............................................................................38
`6.2.1 Purpose.........................................................................38
`6.2.2
`Term on UI level ............................................................39
`6.2.3 Description ....................................................................39
`6.2.4 Conditions .....................................................................39
`6.3 Name discovery .........................................................................40
`6.3.1 Purpose.........................................................................40
`6.3.2
`Term on UI level ............................................................40
`6.3.3 Description ....................................................................40
`6.3.3.1 Name request .................................................40
`6.3.3.2 Name discovery ..............................................40
`6.3.4 Conditions .....................................................................41
`6.4 Device discovery........................................................................41
`6.4.1 Purpose.........................................................................41
`6.4.2
`Term on UI level ............................................................41
`6.4.3 Description ....................................................................42
`6.4.4 Conditions .....................................................................42
`Bonding......................................................................................42
`6.5.1 Purpose.........................................................................42
`6.5.2
`Term on UI level ............................................................42
`6.5.3 Description ....................................................................43
`6.5.3.1 General bonding .............................................43
`6.5.3.2 Dedicated bonding..........................................44
`6.5.4 Conditions .....................................................................44
`
`6.5
`
`
`
`1 December 1999
`
`17
`
`17
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 18 of 440
`
`Generic Access Profile
`
`7
`
`8
`
`9
`10
`
`11
`
`18
`
`Establishment procedures................................................................45
`7.1
`Link establishment .....................................................................45
`7.1.1 Purpose.........................................................................45
`7.1.2
`Term on UI level ............................................................45
`7.1.3 Description ....................................................................46
`7.1.3.1 B in security mode 1 or 2................................46
`7.1.3.2 B in security mode 3 .......................................47
`7.1.4 Conditions .....................................................................47
`7.2 Channel establishment ..............................................................48
`7.2.1 Purpose.........................................................................48
`7.2.2
`Term on UI level ............................................................48
`7.2.3 Description ....................................................................48
`7.2.3.1 B in security mode 2 .......................................49
`7.2.3.2 B in security mode 1 or 3................................49
`7.2.4 Conditions .....................................................................49
`7.3 Connection establishment .........................................................50
`7.3.1 Purpose.........................................................................50
`7.3.2
`Term on UI level ............................................................50
`7.3.3 Description ....................................................................50
`7.3.3.1 B in security mode 2 .......................................50
`7.3.3.2 B in security mode 1 or 3................................51
`7.3.4 Conditions .....................................................................51
`Establishment of additional connection .....................................51
`7.4
`Definitions ..........................................................................................52
`8.1 General definitions.....................................................................52
`8.2 Connection-related definitions ...................................................52
`8.3 Device-related definitions ..........................................................53
`8.4
`Procedure-related definitions.....................................................54
`8.5
`Security-related definitions ........................................................54
`Annex A (Normative): Timers and constants ..................................56
`Annex B (Informative): Information flows of related procedures..57
`10.1 lmp-authentication .....................................................................57
`10.2 lmp-pairing .................................................................................58
`10.3 Service discovery.......................................................................58
`References..........................................................................................60
`
`1 December 1999
`
`
`
`18
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 19 of 440
`
`Generic Access Profile
`FOREWORD
`
`Interoperability between devices from different manufacturers is provided for a
`specific service and use case, if the devices conform to a Bluetooth SIG-
`defined profile specification. A profile defines a selection of messages and pro-
`cedures (generally termed capabilities) from the Bluetooth SIG specifications
`and gives an unambiguous description of the air interface for specified
`service(s) and use case(s).
`
`All defined features are process-mandatory. This means that, if a feature is
`used, it is used in a specified manner. Whether the provision of a feature is
`mandatory or optional is stated separately for both sides of the Bluetooth air
`interface.
`
`
`
`1 December 1999
`
`19
`
`19
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 20 of 440
`
`Generic Access Profile
`1 INTRODUCTION
`
`1.1 SCOPE
`
`The purpose of the Generic Access Profile is:
`
`To introduce definitions, recommendations and common requirements related
`to modes and access procedures that are to be used by transport and
`application profiles.
`
`To describe how devices are to behave in standby and connecting states in
`order to guarantee that links and channels always can be established between
`Bluetooth devices, and that multi-profile operation is possible. Special focus is
`put on discovery, link establishment and security procedures.
`
`To state requirements on user interface aspects, mainly coding schemes and
`names of procedures and parameters, that are needed to guarantee a satisfac-
`tory user experience.
`
`1.2 SYMBOLS AND CONVENTIONS
`
`1.2.1 Requirement status symbols
`
`In this document (especially in the profile requirements tables), the following
`symbols are used:
`
`‘M’ for mandatory to support (used for capabilities that shall be used in the
`profile);
`
`’O’ for optional to support (used for capabilities that can be used in the profile);
`
`‘C’ for conditional support (used for capabilities that shall be used in case a cer-
`tain other capability is supported);
`
`‘X’ for excluded (used for capabilities that may be supported by the unit but
`shall never be used in the profile);
`
`’N/A’ for not applicable (in the given context it is impossible to use this
`capability).
`
`Some excluded capabilities are capabilities that, according to the relevant
`Bluetooth specification, are mandatory. These are features that may degrade
`operation of devices following this profile. Therefore, these features shall never
`be activated while a unit is operating as a unit within this profile.
`
`In this specification, the word shall is used for mandatory requirements, the
`word should is used to express recommendations and the word may is used for
`options.
`
`20
`
`1 December 1999
`
` Introduction
`
`20
`
`

`

`BLUETOOTH SPECIFICATION Version 1.0 B
`
`page 21 of 440
`
`Generic Access Profile
`
`1.2.2 Signalling diagram conventions
`
`The following arrows are used in diagrams describing procedures
`:
`
`A
`
`B
`
`PROC 1
`
`PROC 2
`
`PROC 3
`
`PROC 4
`
`PROC 5
`
`MSG 1
`
`MSG 2
`
`MSG 3
`
`MSG 4
`
`Figure 1.1: Arrows used in signalling diagrams
`In the table above, the following cases are shown: PROC1 is a sub-procedure
`initiated by B. PROC2 is a sub-procedure initiated by A. PROC3 is a sub-pro-
`cedure where the initiating side is undefined (may be both A or B). Dashed
`arrows denote optional steps. PROC4 indicates an optional sub-procedure ini-
`tiated by A, and PROC5 indicates an optional sub-procedure initiated by B.
`MSG1 is a message sent from B to A. MSG2 is a message sent from A to B.
`MSG3 indicates an optional message from A to B, and MSG4 indicates a con-
`ditional message from B to A.
`
`1.2.3 Notation for timers and counters
`
`Timers are introduced specific to this profile. To distinguish them from timers
`used in the Bluetooth protocol specifications and other profiles, these timers
`are named in the following format: ’TGAP(nnn)’.
`
` Introduction
`
`1 De

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket