Blackberry PRD-09695-004 Technical Overview - Page 2

Contents, Bluetooth security measures on the BlackBerry Smart Card Reader

Page 2 highlights

Contents BlackBerry Smart Card Reader ...4 Authenticating a user using a smart card ...4 Integrating a smart card with existing secure messaging technology 4 New in this release...5 System requirements ...6 System architecture ...7 BlackBerry Enterprise Solution security...8 Protecting Bluetooth connections on a BlackBerry device 8 Managing a Bluetooth enabled BlackBerry device 8 Restricting Bluetooth technology on a Bluetooth enabled computer 9 Bluetooth security measures on the BlackBerry Smart Card Reader 9 BlackBerry Smart Card Reader security...10 Control Bluetooth connections from third-party applications 11 Managing the BlackBerry Smart Card Reader 12 Opening an encrypted and authenticated connection to the BlackBerry Smart Card Reader 14 Secure pairing PIN ...14 Performing the Bluetooth pairing process and the secure pairing process on a BlackBerry device..........15 Performing the Bluetooth pairing process and the secure pairing process on a computer 15 Reconnecting to a BlackBerry device or computer automatically 15 Initial key establishment protocol used in the secure pairing process 15 Connection key establishment protocol used in the secure pairing process 16 Encrypting and authenticating data on the application layer 18 Two-factor authentication...18 Turning on two-factor authentication on a BlackBerry device 18 Configuring two-factor authentication on a computer 19 Proximity authentication ...20 Locking a BlackBerry device when the BlackBerry Smart Card Reader moves out of Bluetooth technology range ...20 Configuring a BlackBerry device to use a specific BlackBerry Smart Card Reader 20 Two-factor content protection ...20 Process flow: Protecting the content encryption key using two-factor content protection 21 BlackBerry Smart Card Reader supported algorithms 22 Connection key establishment protocol errors ...23 Application layer protocol encryption and authentication 24

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34

Contents
BlackBerry Smart Card Reader
................................................................................................................................
4
Authenticating a user using a smart card
..........................................................................................................
4
Integrating a smart card with existing secure messaging technology
...........................................................
4
New in this release
....................................................................................................................................................
5
System requirements
................................................................................................................................................
6
System architecture
...................................................................................................................................................
7
BlackBerry Enterprise Solution security
..................................................................................................................
8
Protecting Bluetooth connections on a BlackBerry device
..............................................................................
8
Managing a Bluetooth enabled BlackBerry device
...........................................................................................
8
Restricting Bluetooth technology on a Bluetooth enabled computer
.............................................................
9
Bluetooth security measures on the BlackBerry Smart Card Reader
..................................................................
9
BlackBerry Smart Card Reader security
.................................................................................................................
10
Control Bluetooth connections from third-party applications
.........................................................................
11
Managing the BlackBerry Smart Card Reader
..................................................................................................
12
Opening an encrypted and authenticated connection to the BlackBerry Smart Card Reader
.......................
14
Secure pairing PIN
...............................................................................................................................................
14
Performing the Bluetooth pairing process and the secure pairing process on a BlackBerry device
..........
15
Performing the Bluetooth pairing process and the secure pairing process on a computer
........................
15
Reconnecting to a BlackBerry device or computer automatically
..................................................................
15
Initial key establishment protocol used in the secure pairing process
..........................................................
15
Connection key establishment protocol used in the secure pairing process
................................................
16
Encrypting and authenticating data on the application layer
............................................................................
18
Two-factor authentication
.......................................................................................................................................
18
Turning on two-factor authentication on a BlackBerry device
.......................................................................
18
Configuring two-factor authentication on a computer
...................................................................................
19
Proximity authentication
........................................................................................................................................
20
Locking a BlackBerry device when the BlackBerry Smart Card Reader moves out of Bluetooth
technology range
................................................................................................................................................
20
Configuring a BlackBerry device to use a specific BlackBerry Smart Card Reader
.....................................
20
Two-factor content protection
...............................................................................................................................
20
Process flow: Protecting the content encryption key using two-factor content protection
........................
21
BlackBerry Smart Card Reader supported algorithms
........................................................................................
22
Connection key establishment protocol errors
....................................................................................................
23
Application layer protocol encryption and authentication
.................................................................................
24