HP IPAQ H1900 Series Pocket PC Users Guide
Have a look at the manual HP IPAQ H1900 Series Pocket PC Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Using Bluetooth User’s Guide 8–7 Entering a Device Name The device name is what other devices see when they locate your device. To enter a device name: 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings > Accessibility tab. 2. Highlight the name in the Name field and enter your new name. 3. Tap OK to save your changes. Allowing Connections You can determine if all devices or only paired devices can connect to your iPAQ Pocket PC. Allowing All Devices to Connect 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings > Accessibility tab. 2. Select Allow other devices to connect, and All devices. 3. Tap OK. Ä CAUTION: This allows any device, even those unknown to you, to connect to your iPAQ Pocket PC. After they are connected, security settings for specific services apply as specified in the Bluetooth Settings.
8–8 User’s Guide Using Bluetooth Allowing Paired Devices to Connect Paired devices share and exchange an internally generated Link Key before connecting. The Link Key is derived from a unique Bluetooth device address, a random number, and a user-defined password. This feature allows only devices that you trust to connect to your iPAQ Pocket PC. To allow paired devices to connect: 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings > Accessibility tab. 2. Select Allow other devices to connect, and Paired devices only. 3. Tap OK. Allowing Others to Locate Your Device You can allow other devices to search and locate your iPAQ Pocket PC. ✎If another remote device has your device’s address, that device may be able to locate and connect to you even though you did not select for your device to be discovered. To allow others to locate your device: 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings > Accessibility tab. 2. Select Other devices can discover me. 3. Tap OK to save the changes.
Using Bluetooth User’s Guide 8–9 Enabling Bluetooth Services You can select to enable certain services: ■Automatically when Bluetooth is activated ■When you permit the connection ■When a passkey or link key is correctly entered You can use any of these security options when transferring files, creating a serial port connection, exchanging business card information, configuring dial-up networking, and joining a personal network. Automatically Enabling Services You can allow devices to connect without any authorization so that any time Bluetooth is on it is ready for connections. To automatically enable services: 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings. 2. Tap the tab for the service you want to enable: File Transfer, Information Exchange, Serial Port, Dial-up Networking, or Personal Network Server. 3. Select Enable service. 4. Ensure there are no check marks in the Authorization required or Authentication (Passkey) required checkboxes. 5. Tap OK.
8–10 User’s Guide Using Bluetooth Requiring Authorization to Access Services If you elect to require authorization to access services, you must authorize each connection. Then, your iPAQ Pocket PC will always ask you if the connection should be permitted. To require authorization to access services: 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings. 2. Tap the tab for the service you want to enable: File Transfer, Information Exchange, Serial Port, Dial-up Networking, or Personal Network Server. 3. Select Authorization required. 4. Tap OK. Secure Connections using a Passkey or Bond To establish a secure connection with another device, you can use the passkey feature or an established bond. You can also add data encryption to this type of security. A passkey is a code you enter to authenticate connections requested by other devices. The passkey must be known and used by both parties or the connection will not be allowed. To require a passkey or bond: 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings. 2. Tap the tab for the service you want to enable: File Transfer, Information Exchange, Serial Port, Dial-up Networking, or Personal Network Server. 3. Select Authentication (Passkey) required. 4. Select Encryption Required if you want to require all data exchanged between the devices to be encrypted. 5. Tap OK.
Using Bluetooth User’s Guide 8–11 Setting a Shared Folder You can determine the folder that other devices access when they connect to your iPAQ Pocket PC. To select a shared folder: 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings. 2. Tap the File Transfer tab. 3. Tap the Folder icon and locate a desired file folder. 4. Tap OK.
8–12 User’s Guide Using Bluetooth Understanding Profiles Use profiles to quickly enable selected personal settings in multiple environments. Creating a Profile To create a profile: 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings > General tab > Profile icon. 2. Tap the New button.
Using Bluetooth User’s Guide 8–13 3. Enter a descriptive name. 4. Select an existing profile to use as a template. 5. Tap OK. Activating a Profile When a new profile is created, you will need to activate it. To activate a profile after creating it: 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings. 2. From the General tab, select it from the Current Profile down arrow list. 3. Tap OK. 3 4
8–14 User’s Guide Using Bluetooth Saving Bluetooth Configuration Settings in a Profile To save the iPAQ Pocket PC Bluetooth configuration settings to any profile: ✎Bluetooth must be turned on for changes to be saved. 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings. 2. From the General tab, tap the Profile icon. 3. Select a profile from the Add/Delete Profiles list or create a new one. 4. Tap OK. 5. Set up your iPAQ Pocket PC. You should specify the desired connection, sharing, and security settings in all Bluetooth Settings tabs. 6. Tap OK to close the Bluetooth Settings. The changes are automatically saved. Renaming a Profile 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings. 2. From the General tab, tap the Profile icon. 3. Select a profile from the Add/Delete Profiles list. 4. Tap the Rename button. 5. Enter a new descriptive name. 6. Tap Enter. 7. Tap OK.
Using Bluetooth User’s Guide 8–15 Deleting a Profile 1. From the To d a y screen, tap the Bluetooth icon > Bluetooth Settings. 2. From the General tab, tap the Profile icon. 3. Select a profile from the Add/Delete Profiles list. 4. Tap the Delete button. 5. Tap Ye s to confirm you want to delete the profile. 6. Tap OK. Working with Bluetooth Manager Use Bluetooth Manager to: ■Establish connections ■Display shortcuts ■Exchange business cards ■Control the on-screen display
8–16 User’s Guide Using Bluetooth Opening Bluetooth Manager From the To d a y screen, tap Start > Bluetooth Manager. The first screen that displays is My Shortcuts. ✎Bluetooth Manager can also be accessed from the To d a y screen by tapping the Bluetooth icon, and from the pop-up menu, tap Bluetooth Manager. ✎Opening Bluetooth Manager automatically turns on Bluetooth. Locating and Selecting a Device Several tasks require you to locate a device and connect to it. When you are required to locate a device, the Bluetooth browser assists by searching for your desired function that supports other Bluetooth devices. Pairing Devices You can pair devices so they must exchange a computer generated security key prior to each connection. The security key is also called a “Link Key.” It is generated from a unique Bluetooth device address, a random number, and a user-defined password. After two devices are paired, they have a trusted relationship with each other that can be verified using a link key. No additional input is needed from the user. Therefore, connections and activities can be performed between the paired devices without constant authorization from the user.