User guide

Updating the BlackBerry Device Software from an update web site....................................................................................... 80
Protecting cryptographic services data when updating the BlackBerry Device Software from an update web site
.................................................................................................................................................................................................. 81
Process flow: Generating a BlackBerry services key that protects cryptographic services data.................................. 82
Process flow: Backing up cryptographic services data using the BlackBerry Desktop Manager................................. 82
Process flow: Restoring cryptographic services data using the BlackBerry Desktop Manager or BlackBerry
Application Web Loader......................................................................................................................................................... 83
14 Extending messaging security to a BlackBerry device.......................................................................................................... 84
Extending messaging security using PGP encryption................................................................................................................ 84
PGP public keys and PGP private keys................................................................................................................................ 84
Retrieving PGP keys from a PGP Universal Server, LDAP servers, or DSML certificate servers................................... 85
Encryption algorithms that the BlackBerry device supports for PGP encryption........................................................... 85
Process flow: Sending an email message using PGP encryption..................................................................................... 86
Process flow: Receiving a PGP encrypted message........................................................................................................... 87
Extending messaging security using S/MIME encryption......................................................................................................... 87
S/MIME certificates and S/MIME private keys.................................................................................................................. 88
Retrieving S/MIME certificates and checking certificate status...................................................................................... 89
S/MIME encryption algorithms............................................................................................................................................ 89
Process flow: Sending an email message using S/MIME encryption.............................................................................. 90
Process flow: Receiving an S/MIME-encrypted email message....................................................................................... 91
Extending messaging security using IBM Lotus Notes encryption........................................................................................... 91
Protecting the password for an IBM Lotus Notes .id file................................................................................................... 92
Process flow: Sending an email message using IBM Lotus Notes encryption................................................................ 93
Process flow: Receiving an IBM Lotus Notes encrypted message................................................................................... 94
Extending messaging security to attachments........................................................................................................................... 94
Process flow: Viewing an attachment in a PGP encrypted message or S/MIME-encrypted message....................... 95
Process flow: Viewing an attachment that is encrypted using S/MIME encryption, PGP/MIME encryption, or
OpenPGP encryption............................................................................................................................................................. 95
15 Configuring two-factor authentication and protecting Bluetooth connections............................................................... 96
BlackBerry Smart Card Reader...................................................................................................................................................... 96
Advanced Security SD cards.......................................................................................................................................................... 96
Two-factor authentication............................................................................................................................................................. 97
Verifying that a BlackBerry device is bound to a smart card............................................................................................ 97
Process flow: Turning on two-factor authentication using a smart card......................................................................... 98