Electronic devices are authenticated to each other initially over a
short-range wireless link. In particular, a user first enters a given
authentication information in each device. Later, when the devices are
out-of-range of the wireless link, they may be authenticated to each
other without subsequent user input when one of the devices invites the
other to exchange authentication information over an alternative
communications link. If the authentication is successful, the devices may
then communicate over the alternative communications link as if they were
within range of the original wireless link.