User guide

Contents
BlackBerry Smart Card Reader ................................................................................................................................ 4
Authenticating a user using a smart card .......................................................................................................... 4
Integrating a smart card with existing secure messaging technology ........................................................... 4
New in this release.................................................................................................................................................... 5
System requirements ................................................................................................................................................6
System architecture ...................................................................................................................................................7
BlackBerry Enterprise Solution security.................................................................................................................. 8
Protecting Bluetooth connections on a BlackBerry device .............................................................................. 8
Managing a Bluetooth enabled BlackBerry device ........................................................................................... 8
Restricting Bluetooth technology on a Bluetooth enabled computer............................................................. 9
Bluetooth security measures on the BlackBerry Smart Card Reader ..................................................................9
BlackBerry Smart Card Reader security.................................................................................................................10
Control Bluetooth connections from third-party applications.........................................................................11
Managing the BlackBerry Smart Card Reader..................................................................................................12
Opening an encrypted and authenticated connection to the BlackBerry Smart Card Reader.......................14
Secure pairing PIN...............................................................................................................................................14
Performing the Bluetooth pairing process and the secure pairing process on a BlackBerry device..........15
Performing the Bluetooth pairing process and the secure pairing process on a computer ........................15
Reconnecting to a BlackBerry device or computer automatically..................................................................15
Initial key establishment protocol used in the secure pairing process ..........................................................15
Connection key establishment protocol used in the secure pairing process ................................................16
Encrypting and authenticating data on the application layer ............................................................................18
Two-factor authentication.......................................................................................................................................18
Turning on two-factor authentication on a BlackBerry device .......................................................................18
Configuring two-factor authentication on a computer ...................................................................................19
Proximity authentication ........................................................................................................................................20
Locking a BlackBerry device when the BlackBerry Smart Card Reader moves out of Bluetooth
technology range ................................................................................................................................................20
Configuring a BlackBerry device to use a specific BlackBerry Smart Card Reader.....................................20
Two-factor content protection ...............................................................................................................................20
Process flow: Protecting the content encryption key using two-factor content protection........................ 21
BlackBerry Smart Card Reader supported algorithms ........................................................................................ 22
Connection key establishment protocol errors .................................................................................................... 23
Application layer protocol encryption and authentication.................................................................................24