It can be appreciated from the foregoing descriptions of FIG. 2 though FIG. 3 that the Bluetooth host device 110 is enabled to determine whether the first member device 120 is a privileged device or not according to the auto-pair request transmitted from the first member device 120. After the first member device 120 is identified as a privileged device by the Bluetooth host device 110, the Bluetooth host device 110 and the first member device 120 can omit many traditional key parameter negotiation steps, and instead adopt a highly simplified approach to generate the corresponding first cypher key Key-1 and second cypher key Key-2. That is, the Bluetooth host device 110 is enabled to generate the first cypher key Key-1 by simply performing the aforementioned operation 210 and operation 214 while the first member device 120 is enabled to generate the second cypher key Key-2 by simply performing the aforementioned operation 212 and operation 216. As a result, it can significantly reduce the required time for generating the first cypher key Key-1 and the second cypher key Key-2.