Table Of Contents - Blackberry PRD-09695-004 - SMART Card Reader Manual

Blackberry smart card reader security technical overview
Hide thumbs Also See for PRD-09695-004 - SMART Card Reader:
Table of Contents

Advertisement

BlackBerry Smart Card Reader
Contents
BlackBerry Smart Card Reader .............................................................................................................................. 4
Authenticating a user using a smart card........................................................................................................ 4
Integrating a smart card with existing secure messaging technology....................................................... 4
New in this release .............................................................................................................................................. 5
System requirements........................................................................................................................................... 5
System architecture ................................................................................................................................................. 5
BlackBerry Enterprise Solution security ............................................................................................................... 5
Bluetooth enabled BlackBerry devices.............................................................................................................6
Managing Bluetooth enabled BlackBerry devices..........................................................................................6
Restricting Bluetooth technology on the computer....................................................................................... 7
Bluetooth security measures on the BlackBerry Smart Card Reader .............................................................. 7
BlackBerry Smart Card Reader security ............................................................................................................... 8
Control Bluetooth connections from third-party applications....................................................................10
Managing BlackBerry Smart Card Reader technology.................................................................................10
Reconnecting to the BlackBerry device or computer automatically ..........................................................14
Initial key establishment protocol used in the secure pairing process......................................................14
Encrypting and authenticating data on the application layer ........................................................................17
Using two-factor authentication ..........................................................................................................................17
Turning on two-factor authentication on the BlackBerry device ...............................................................17
Setting two-factor authentication on the computer.....................................................................................18
Related resources................................................................................................................................................... 19
Appendix A: BlackBerry Smart Card Reader supported algorithms ..............................................................20
Appendix B: Connection key establishment protocol errors............................................................................21
Appendix C: Application layer protocol encryption and authentication ...................................................... 22
designed to prevent ...............................................................................................................................................24
Eavesdropping ....................................................................................................................................................24
Impersonating a BlackBerry device or computer..........................................................................................24
Man-in-the-middle attack................................................................................................................................24
Offline attack......................................................................................................................................................24
©
2007 Research In Motion Limited. All rights reserved.
www.blackberry.com

Advertisement

Table of Contents
loading

This manual is also suitable for:

Smart card reader

Table of Contents