
BlackBerry Enterprise Solution
Enforcing BlackBerry device and BlackBerry Desktop Software security ................................................55
Controlling BlackBerry device access to the BlackBerry Enterprise Server.............................................55
Controlling wireless software upgrades using the BlackBerry Enterprise Server...................................56
Protecting Bluetooth connections on BlackBerry devices ..........................................................................56
Controlling location-based services on the BlackBerry device.................................................................. 57
How the BlackBerry device protects its operating system and the BlackBerry Device Software ........58
Protecting the BlackBerry device against malware .....................................................................................58
Protecting lost, stolen, or replaced BlackBerry devices................................................................................... 61
Remotely resetting the password of a content protected BlackBerry device.......................................... 61
Types of remote BlackBerry device wipes......................................................................................................62
Remotely erasing data from BlackBerry device memory and making the BlackBerry device
unavailable ..........................................................................................................................................................63
Remotely resetting a BlackBerry device to factory default settings .........................................................64
Erasing data from BlackBerry device memory and making the BlackBerry device unavailable
(standard security wipe) ...................................................................................................................................64
Unbinding the smart card from the BlackBerry device ...............................................................................65
Related resources .................................................................................................................................................. 66
Appendix A: RIM Crypto API Interface .............................................................................................................. 69
Cryptographic functionality that the RIM Crypto API provides................................................................ 69
Appendix B: TLS and WTLS standards that the RIM Crypto API supports .................................................... 72
Key establishment algorithm cipher suites that the RIM Crypto API supports ...................................... 72
Symmetric algorithms that the RIM Crypto API supports........................................................................... 73
Hash algorithms that the RIM Crypto API supports .................................................................................... 73
Appendix C: Previous version of wired master encryption key generation.................................................. 74
Previous version of wired master encryption key generation process...................................................... 74
Appendix D: BlackBerry device wipe process.................................................................................................... 75
Memory scrub process for RAM on BlackBerry devices............................................................................... 75
Memory scrub process for flash memory on BlackBerry devices...............................................................76
Memory scrub process for flash memory that stores user-saved files on BlackBerry devices .............76
Appendix E: Process for deriving encryption keys that protect the keys used with content protection. 77
Appendix F: Power and electromagnetic side-channel attacks and countermeasures ............................. 78
Masking operation process that the AES implementation uses when content protection is turned on78
Masking operation process that the AES implementation uses when content protection is turned off78
Appendix G: BlackBerry Router protocol ...........................................................................................................80
How the BlackBerry Router protocol uses the Schnorr identification scheme .......................................80
Examples of attacks that the BlackBerry Router protocol is designed to prevent..................................80
Process flow: Using the BlackBerry Router protocol to open an authenticated connection.................81
©
2009 Research In Motion Limited. All rights reserved.
www.blackberry.com