Solved

Capturing a new Bluetooth connection

Posted on 2008-06-11
3
587 Views
Last Modified: 2013-12-14
I can access all the information about a bluetooth device or radio. But what I have not figured out is when a bluetooth device comes on and sends a request for authentication, how do I capture the Device_Info to send to the BluetoothRegisterForAuthentication before the authentication happens?

The device that will ask for the passkey will never be discoverable. On the device the user will tell the system to find a bluetooth radio in the area, then ask for a passkey then connect and request pairing. I need the system to check the device for who it is then send back the passkey they user will enter.

In side the PFN_AUTHENTICATION_CALLBACK procedure I need to be able to check the device information to verify who is making the request.

Help would be appreciated on this.
Thank you.
0
Comment
Question by:mitchmiester
3 Comments
 
LVL 18

Accepted Solution

by:
Johnjces earned 500 total points
ID: 21904397
This is not an answer, but might help you on your way.. I do not know as I just stumbled upon it.

Download...

http://sourceforge.net/project/showfiles.php?group_id=92177&package_id=270335&release_id=589293

This is a FreePascal unit for BlueTooth "stuff". Being FreePascal, it is very Dlephi like and might just work for you or head you in a correct direction.

John
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question