Bluetooth Low Energy in Wireless PKI Deployments
Total Page:16
File Type:pdf, Size:1020Kb
Bluetooth Low Energy in Wireless PKI deployments mToken BLE ecosystem White Paper All rights reserved 1 Introduction | Century Longmai Technology Co., Ltd CONTENTS 1. INTRODUCTION.................................................................................................... 3 WHO SHOULD READ THIS DOCUMENT? ................................................................................ 3 DEFINITIONS ............................................................................................................................ 4 2. BLUETOOTH OVERVIEW .................................................................................. 4 HOW BLUETOOTH WORKS ....................................................................................................... 5 FREQUENCY HOPPING.............................................................................................................. 5 POWER CONSUMPTION ............................................................................................................ 6 SECURITY ................................................................................................................................ 6 BLUETOOTH CORE SPECIFICATION 4.2 ..................................................................................... 6 Features and Benefits .......................................................................................................... 6 BLUETOOTH ARCHITECTURE ................................................................................................... 8 BLE Application services .................................................................................................... 8 3. NEW GENERATION (NG) WIRELESS TOKEN ............................................... 8 BACKGROUND ......................................................................................................................... 8 Structural Design ................................................................................................................ 9 Model Appearance ............................................................................................................ 10 STRONG TWO FACTOR AUTHENTICATION (2FA) .................................................................... 11 Scalable portfolio of authentication devices ..................................................................... 11 New Smart card based Security ........................................................................................ 11 Exchange & Storage of Sensitive Data ............................................................................. 11 Portability & Usability ..................................................................................................... 12 Mobility Convenience& Compatibility ............................................................................. 12 Multiple applications Security & Flexibility..................................................................... 13 Card Operating System Features ...................................................................................... 13 4. MTOKEN BLE-B1 OVERVIEW ......................................................................... 14 OVERVIEW............................................................................................................................. 14 Design ............................................................................................................................... 14 Operation .......................................................................................................................... 15 Important Notes ................................................................................................................ 17 5. APPENDIX A: GLOSSARY ................................................................................. 18 6. APPENDIX B: DOCUMENT REVISION HISTORY ....................................... 20 7. ABOUT CENTURY LONGMAI .......................................................................... 20 2 Introduction | Century Longmai Technology Co., Ltd 1. Introduction The evolution of mobile applications and mobile payment industries is accompanied by two technologies i.e. Bluetooth Low Energy (BLE) and host card emulation (HCE) with Near Field Communication (NFC). With the increasing consumer demands for greater privacy of their communications, network security problems have drawn much attention, especially in government telecom, and financial industries. In this paper, we define Bluetooth from the technical and organizational context, and discuss the security and privacy designs when using this technology in Public key infrastructure. Bluetooth silently connects so many of our gadgets together, it’s easy to forget it’s a pretty impressive piece of technology on its own. It helps us listen to music, talk on our phones, and play video games, all without being frustrated by miles of cables strewn around the place. We present Century Longmai’s newly launched wireless token series that utilize the Bluetooth communication protocol to secure a wide range of applications and realize robust identity authentication functions especially in mobile and wireless transaction markets. As one of the leading digital Information security device manufacturers in China, Century Longmai is always excited on best informing those in IT security and related industries about technologies used in our innovative products. Who Should Read This Document? Because this document comprises conceptual and future mobile payment market security, its audience is broad. This document sets the stage with an overview of Bluetooth technology. Then, it describes how Century Longmai implements Bluetooth technology in its Public Key Infrastructure (PKI) tokens to meet end-users’ mobility needs. If you are unfamiliar with Bluetooth technology in general, you can read this document for a high-level summary. If you are primarily interested in learning about Century Longmai mToken BLE ecosystem product series, you will find a thorough description and application scenarios in this document. Finally, if you are involved in deploying mobile payment solutions that utilize wireless Public Key Infrastructure or communicate with Bluetooth enabled devices, you should read this document to discover your options. Get more technical information on Bluetooth technology including core specifications, FAQs and Quick Reference Guides. Links to tools and information: o Quick Reference Guide o Frequently Asked Questions o Bluetooth Brand Guide Getting Additional Information Century Longmai provides reference documentation for the mToken BLE ecosystem wireless PKI token products series that utilizes Bluetooth low energy. If you have any questions 3 Introduction | Century Longmai Technology Co., Ltd regarding mToken BLE ecosystem, review our frequently asked Questions at http://lm- infosec.com/about-us/faqs/ ; if you would like to request for technical assistance or would like to provide feedback about our products and solutions, visit Contact Us Page at http://lm- infosec.com/contact/ Definitions o Bluetooth is a technology that makes short-range wireless connections between devices at distances up to 10 meters (33 feet). o Bluetooth Smart refers to qualified products incorporating Bluetooth Core Specification Version 4.0 (or higher) with a Low Energy Core Configuration or Basic Rate and Low Energy Combined Core Configuration and using the GATT-based architecture to enable particular functionality of the product. o Bluetooth Smart Ready refers to qualified products incorporating Bluetooth Core Specification Version 4.0 (or higher) with a Basic Rate and Low Energy Combined Core Configuration, and using the GATT-based architecture to provide a means by which the end user can choose to update the Bluetooth Smart Ready product with the functionality of a Bluetooth Smart product. o Bluetooth Smart technology is a wireless communications system intended to replace the cables connecting many types of devices, from mobile phones and headsets to hear monitors and medical equipment. Learn more about how Bluetooth Smart increases opportunities for developers to make consumers' lives easier. 2. Bluetooth Overview This section seeks to give you an overview of the Bluetooth technology. If you’re already familiar with the Bluetooth specification and how Bluetooth devices work, you might choose to skip ahead to mToken BLE ecosystem. Bluetooth is an open specification that enables low-bandwidth, short-range wireless connections between computers and peripherals, such as keyboard, mouse, Smartphone, and personal data assistant (PDA). The appeal of the Bluetooth model lies in its convenience for wirelessly transferring information and small data files between devices. Meanwhile, the Core Bluetooth framework enables support for communication between applications and Bluetooth devices. For example, when a health monitoring app can discover, explore, and interact with peripheral devices, such as heart rate monitors, digital thermostats, and even other multi-platform based devices. 4 Bluetooth Overview | Century Longmai Technology Co., Ltd How Bluetooth Works Bluetooth devices operate at 2.4 GHz in the license-free, globally available Industrial, Scientific, and Medical (ISM) radio band. Bluetooth chips produce wavelengths that are bound to frequencies operating within a range specifically set aside for short-range communication. The advantage of operating in this band is worldwide availability and compatibility; but the potential