Contents
BlackBerry Smart Card Reader
................................................................................................................................
4
Authenticating a user using a smart card
..........................................................................................................
4
Integrating a smart card with existing secure messaging technology
...........................................................
4
New in this release
....................................................................................................................................................
5
System requirements
................................................................................................................................................
6
System architecture
...................................................................................................................................................
7
BlackBerry Enterprise Solution security
..................................................................................................................
8
Protecting Bluetooth connections on a BlackBerry device
..............................................................................
8
Managing a Bluetooth enabled BlackBerry device
...........................................................................................
8
Restricting Bluetooth technology on a Bluetooth enabled computer
.............................................................
9
Bluetooth security measures on the BlackBerry Smart Card Reader
..................................................................
9
BlackBerry Smart Card Reader security
.................................................................................................................
10
Control Bluetooth connections from third-party applications
.........................................................................
11
Managing the BlackBerry Smart Card Reader
..................................................................................................
12
Opening an encrypted and authenticated connection to the BlackBerry Smart Card Reader
.......................
14
Secure pairing PIN
...............................................................................................................................................
14
Performing the Bluetooth pairing process and the secure pairing process on a BlackBerry device
..........
15
Performing the Bluetooth pairing process and the secure pairing process on a computer
........................
15
Reconnecting to a BlackBerry device or computer automatically
..................................................................
15
Initial key establishment protocol used in the secure pairing process
..........................................................
15
Connection key establishment protocol used in the secure pairing process
................................................
16
Encrypting and authenticating data on the application layer
............................................................................
18
Two-factor authentication
.......................................................................................................................................
18
Turning on two-factor authentication on a BlackBerry device
.......................................................................
18
Configuring two-factor authentication on a computer
...................................................................................
19
Proximity authentication
........................................................................................................................................
20
Locking a BlackBerry device when the BlackBerry Smart Card Reader moves out of Bluetooth
technology range
................................................................................................................................................
20
Configuring a BlackBerry device to use a specific BlackBerry Smart Card Reader
.....................................
20
Two-factor content protection
...............................................................................................................................
20
Process flow: Protecting the content encryption key using two-factor content protection
........................
21
BlackBerry Smart Card Reader supported algorithms
........................................................................................
22
Connection key establishment protocol errors
....................................................................................................
23
Application layer protocol encryption and authentication
.................................................................................
24