Portable smart card reader having secure wireless communications capability

ABSTRACT

A reader device includes a housing for receiving a smart card, a processor in electronic communication with an integrated circuit chip of the smart card when the smart card is received in the housing, a wireless communications device in electronic communication with the processor for enabling the reader device to transmit first encrypted information wirelessly and to receive second encrypted information wirelessly, and a memory in electronic communication with the processor that includes one or more routines executable by the processor. The one or more routines include a cryptographic module adapted to encrypt first information to create the first encrypted information and decrypt the second encrypted information to obtain second information. In addition, a communication system that includes the reader device and a computing device, wherein the reader device and computing device are able to wirelessly exchange information in a secure manner.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to smart cards and smart card readers, andmore particularly, to a portable and preferably wearable smart cardreader having secure wireless communications capability.

2. Description of the Prior Art

A smart card is a device, typically about the same size as a creditcard, that includes an embedded integrated circuit chip that stores andprocesses information. Information can be transferred between the smartcard and an associated computing device such as a PC, a laptop computeror a handheld electronic device like a PDA, a two way pager, a cellphone or the like, through a reader device that is coupled to theassociated computing device. In particular, the reader device is used tomake an electrical connection to the integrated circuit of the smartcard to provide a communication link between the smart card and thecomputing device.

In the prior art, the reader devices have been physically coupled to theassociated computing device, such as through a wire or some otherphysical connection. The physical connection provides a level of datasecurity for the transfer of data between the reader device and thesmart card. Also, smarts cards are typically protected by an accesscontrol mechanism such as a password that must be provided in order theaccess the information stored on and the functionality provided by theintegrated circuit chip of the smart card.

One common application of smart cards is to store cryptographic keys foruse in conducting secure communications. For example, a smart card maybe used to store cyptographic keys used for encrypting and/or digitallysigning electronic mail (email) messages.

As is known in the art, a number of secure, encrypted email protocolshave been developed, such as S/MIME and PGP, that use both symmetric(secret key) and asymmetric (public key) cryptography techniques.Generally, according to these protocols, after a sender creates an emailmessage, the sender's email program generates a symmetric session key(appropriate for the chosen symmetric encryption algorithm, such as DES,Triple DES or RC2) and uses the session key to encrypt the emailmessage. The session key is then encrypted using the message recipient'spublic key (typically obtained from the recipient's public keycertificate) and a public key encryption algorithm such asDiffie-Hellman and RSA. Next, a digest of the message is created using amessage digest algorithm such as SHA-1 or MD5. The message digest isthen encrypted using the sender's private key (to create a digitalsignature), again employing a public key encryption algorithm such asDiffie-Hellman or RSA. The encrypted session key, the sender's publickey certificate, the encrypted message, and the encrypted message digestare then sent to the recipient.

Upon receiving the message, the recipient uses his or her private key todecrypt the encrypted session key which is then used to decrypt theencrypted message. Also, the recipient uses the sender's public key todecrypt the encrypted message digest. The recipient then creates adigest of the decrypted message using the same algorithm used by thesender and compares that digest to the received message digest toauthenticate and check the integrity of the message. As an alternative,if message privacy is not a concern, the protocols provide for sending amessage that is digitally signed only.

A smart card is often used to store each individual's private key andpublic key certificate (which includes the individual's public key).When a recipient receives an encrypted email message, the smart cardpassword and encrypted session key are sent to the recipient's smartcard (through the reader device) by the recipient's computing device.The smart card then decrypts the encrypted session key using therecipient's private key and send sends the decrypted session key back tothe computing device (through the reader device), where it is usedthereby to decrypt the email message. In addition, during thepreparation of a message, after the message digest is created by thesender's computing device, it and the smart card password are sent tothe sender's smart card (through the reader device) where message digestis encrypted using the sender's private key (to create a digitalsignature) and returned to the computing device.

Many smart cards also carry additional information such as identifyinginformation embodied in a photograph or stored in a readable bar code ormagnetic strip. Such identifying information may be used, for example,to provide access to certain restricted locations. It is thus oftenimportant for this information to be visible so that it may be readilychecked by a guard or the like.

As noted above, in current smart card systems, the reader device isphysically coupled to the associated computing device. As a result, thetransmission of clear-text session keys (after being decrypted) andclear-text smart card passwords between the two is secure. However, therequirement of a physical connection creates a number of problems anddisadvantages. For example, users often forget to remove their smartcard from a reader device when they leave their work ares, and thusencounter problems accessing locations that require the identifyinginformation on the smart card. Furthermore, if the smart card isinadvertently not removed from the reader device when the user leaveshis or her work are, a security problem arises as another individualcould use the still active smart card to access the associated computingdevice and to falsely send and receive secure messages. In addition,current readers are bulky and are thus difficult to carry around, whichpresents a problem for users that wish to use them in connection with(and thus physically couple them to) a portable device such as ahandheld electronic device.

SUMMARY OF THE INVENTION

The invention solves these and other problems by providing a portableand preferably wearable reader device for a smart card that is able towirelessly communicate with a computing device in a secure manner. Thereader device includes a housing for receiving the smart card, aprocessor in electronic communication with an integrated circuit chip ofthe smart card when the smart card is received in the housing, such asthrough mated electrical contacts provided on each, a wirelesscommunications device in electronic communication with the processor forenabling the reader device to transmit first encrypted informationwirelessly and to receive second encrypted information wirelessly, and amemory in electronic communication with the processor that includes oneor more routines executable by the processor. The one or more routinesinclude a cryptographic module adapted to encrypt first information tocreate the first encrypted information and decrypt the second encryptedinformation to obtain second information.

In the preferred embodiment, the wireless communications device includesa Bluetooth radio, and the first encrypted information is transmittedand the second encrypted information is received using the Bluetoothwireless communications protocol.

In one embodiment, the cryptographic module is adapted to generate asession key and use the session key to encrypt message information tocreate encrypted message information. The memory in this embodimentstores a shared secret key that is known to a computing deviceassociated with the reader device. The cryptographic module is adaptedto use the shared secret key to encrypt the session key to create anencrypted session key. In this case, the first encrypted informationthat is transmitted by the reader device includes both the encryptedmessage information and the encrypted session key. Preferably, thecryptographic module is adapted to encrypt the message information andthe session key using one or more FIPS-140-2 level 1 or greater approvedencryption algorithms.

The housing of the reader device may include a channel for receiving andholding the smart card. Preferably, a portion of the front face of thesmart card is visible when the smart card is received in the channel sothat information on the front face is visible. The housing may alsoinclude one or more attachment mechanisms for attaching the readerdevice to the clothing or the body of the user, thereby making itwearable. The attachments mechanisms may include, for example, andwithout limitation, a loop portion for receiving a lanyard or armportions for receiving and holding a strap.

The invention also relates to a communications system that employs sucha reader device. The system includes a smart card having an integratedcircuit chip, a reader device including a housing for receiving thesmart card, a first processor that is in electronic communication withthe integrated circuit chip when the smart card is received in thehousing, a first wireless communications device in electroniccommunication with the first processor, and a first memory in electroniccommunication with the first processor having one or more first routinesexecutable by the first processor, wherein the routines include a firstcryptographic module. The system further includes a computing deviceincluding a second processor, a second wireless communications device inelectronic communication with the second processor, and a second memoryin electronic communication with the second processor having one or moresecond routines executable by the second processor, wherein the secondroutines include a second cryptographic module. The reader device andcomputing device are able to wirelessly communicate with one another ina secure manner. Specifically, the first wireless communications devicewirelessly transmits first encrypted information to the second wirelesscommunications device and wirelessly receives second encryptedinformation transmitted by the second wireless communications device. Tocreate the first encrypted information, first information is encryptedby the first cryptographic module. Similarly, to create the secondencrypted information, second information is encrypted by the secondcryptographic module. The first cryptographic module is adapted todecrypt the second encrypted information to obtain the secondinformation and the second cryptographic module is adapted to decryptthe first encrypted information to obtain the first information.

In the preferred embodiment, the first memory and the second memory eachstore a shared secret key. The first cryptographic module is adapted togenerate a first session key and use the first session key to encryptfirst message information to create first encrypted message information.The first cryptographic module is also adapted to use the shared secretkey to encrypt the first session key to create a first encrypted sessionkey. In addition, the second cryptographic module is adapted to generatea second session key and use the second session key to encrypt secondmessage information to create second encrypted message information. Thesecond cryptographic module is also adapted to use the shared secret keyto encrypt the second session key to create a second encrypted sessionkey. In this embodiment, the first encrypted information includes thefirst encrypted message information and the first encrypted session key,and the second encrypted information includes the second encryptedmessage information and the second encrypted session key.

The invention may be used to facilitate the sending and receiving ofencrypted and/or signed email using the computing device. In this case,the second information includes a digest of an email message. Theintegrated circuit chip of the smart card stores a private key, and theintegrated circuit chip is adapted to encrypt the digest using theprivate key to create a digital signature which is included in the firstinformation that is securely transmitted back to the computing device.Furthermore, the second information may include the smart card passwordsuch that it is securely transmitted from the computing device, where itis input by a user, to the reader device. The second information mayalso include an encrypted email message that was created by encryptingan email message with a public key that corresponds to the private keystored in the smart card. The integrated circuit chip in this case isadapted to decrypt the encrypted email message using the private key toobtain the email message which is then included in the first informationthat is securely transmitted back to the computing device.

BRIEF DESCRIPTION OF THE DRAWINGS

A full understanding of the invention can be gained from the followingDescription of the Preferred Embodiments when read in conjunction withthe accompanying drawings in which:

FIG. 1 is a block diagram of a smart card communications systemaccording to the invention;

FIGS. 2A and 2B schematic illustrations of the front and back of asample smart card as shown in FIG. 1;

FIG. 3 is an isometric view of one particular embodiment of the smartcard reader device shown in FIG. 1; and

FIGS. 4, 5, 6 and 7 are isometric, front side and bottom views,respectively, of the smart card reader device shown in FIG. 3 having asmart card received therein.

Similar numerals refer to similar parts throughout the specification.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

FIG. 1 is a block diagram of a smart card communications system 5according to the invention. System 5 includes a wireless communicationenabled smart card reader device 10, a smart card 15, such as, forexample, a smart card as shown in FIGS. 2A and 2B, and a wirelesscommunication enabled computing device 20, which may be, withoutlimitation, a PC, a laptop computer or a handheld electronic device suchas a PDA, a two way pager, a cell phone or the like. Examples ofhandheld electronic devices are included in U.S. Pat. Nos. 6,452,588 and6,489,950. As shown in FIG. 1, smart card reader device 10 and computingdevice 20 are able to communicate with one another and exchangeinformation wirelessly, preferably using the Bluetooth wirelesscommunication protocol, although other wireless communication protocolsmay also be used, including various known or later developed RF wirelesscommunication protocols.

Smart card reader device 10 includes a processor 25, which may be,without limitation, a microprocessor (μP). The processor 25 controls theoperation of smart card reader device 10 by executing routines stored ina memory 30 that is in electronic communication with processor 25. Theroutines can be in any of a variety of forms such as, withoutlimitation, software, firmware, and the like, and shall include one ormore subroutines, processes, procedures, function calls or the like,alone or in combination. Memory 30 can be any of a variety of types ofinternal and/or external storage media such as, without limitation, RAM,ROM, EPROM(s), EEPROM(s), and the like, alone or in combination, thatprovide a storage register for data storage such as in the fashion of aninternal storage area of a computer, and can be volatile memory ornonvolatile memory. Memory 30 includes cryptographic module 35 in theform of one or more of the stored routines. Cryptographic module 35,when executed by processor 25, enables smart card reader device 10 toencrypt and decrypt information using one or more keys 37 stored inmemory 30 according to one or more particular encryption schemes asdescribed in greater detail herein. Preferably, the cryptographic module35 implements a FIPS (Federal Information Processing Standards)-140-2 orits successor approved, most preferably a FIPS-140-2 level 1 or greaterapproved, symmetric encryption scheme by utilizing a known FIPS-140-2approved encryption algorithm such as DES or Triple DES.

Smart card reader device 10 further includes a wireless communicationsdevice 40, such as an RF transceiver, that is in electroniccommunication with processor 25. In the preferred embodiment, wirelesscommunications device 40 is a Bluetooth radio that communicates usingthe Bluetooth wireless communications protocol. Finally, smart cardreader device 10 is provided with electrical contacts 45 that are inelectronic communication with processor 25. Electrical contacts 45 areadapted to make electrical contact with complementary electricalcontacts 50 that are provided on smart card 15 to enable smart cardreader device 10 and smart card 15 to exchange information.

Smart card 15 further includes integrated circuit chip 55 embeddedtherein (see FIG. 2A). Integrated circuit chip 55 includes processor 60in electronic communication with memory 65, which is preferably,although not necessarily, flash memory. Memory 65 stores routines thatare executable by the processor 65, including cryptographic module 70which enables smart card 15 to encrypt and decrypt information accordingto a particular encryption scheme. In the preferred embodiment,cryptographic module 70 implements a public-key cryptography scheme suchas Diffie-Hellman or RSA. Memory 65 also stores keys 75 used by smartcard 15 to encrypt and decrypt information. Preferably, keys 75 includea public key and corresponding private key (preferably stored as part ofa public key certificate) assigned to smart card 15 for use in thepublic-key cryptography scheme implemented by cryptographic module 70.

Computing device 20 includes processor that, like processor 25, may be,without limitation, a microprocessor (μP). Computing device 20 furtherincludes a wireless communications device 85, such as an RF transceiver,that is in electronic communication with processor 80. Wirelesscommunications device 85 is compatible with and able to communicate withwireless communications device 40 of smart card reader device 10. In thepreferred embodiment, wireless communications device 85 is a Bluetoothradio.

The processor 80 controls the operation of computing device 20 byexecuting routines stored in a memory 90 that is in electroniccommunication with processor 80. Memory 90 can be any of a variety oftypes of internal and/or external storage media such as, withoutlimitation, RAM, ROM, EPROM(s), EEPROM(s), and the like, alone or incombination, that provide a storage register for data storage such as inthe fashion of an internal storage area of a computer, and can bevolatile memory or nonvolatile memory. Memory 90 includes cryptographicmodule 95 in the form of one or more of the stored routines.Cryptographic module 95, when executed by processor 80, enablescomputing device 10 to encrypt and decrypt information using one or morekeys 100 stored in memory 90 according to one or more particularencryption schemes as described in greater detail herein. Preferably,like cryptographic module 70, the cryptographic module 95 implements aFIPS-140-2 or its successor approved encryption scheme, most preferablya FIPS-140-2 level 1 or greater symmetric encryption scheme.Cryptographic module 95 is compatible with and similar to cryptographicmodule 70 such that smart card reader device 10 and computing device 20can exchange encrypted messages, with each being able to decrypt amessage received from the other.

As noted above, according to an aspect of the invention, smart cardreader device 10 and computing device 20 are able to exchange encryptedmessages so that data can be transferred back and forth between the twoin a secure manner. In one particular embodiment, cryptographic modules35 and 95 implement a FIPS-140-2 or its successor approved symmetricencryption scheme as described above and keys 37 and 100 each include ashared secret key. When a message is to be encrypted, the sending device(either smart card reader device 10 or computing device 20, as the casemay be) generates a new, unique session key, and the session key is usedto encrypt the message. The session key is then encrypted using theshared secret key, and the encrypted message and encrypted session keyare wirelessly transmitted (through wireless communications devices 40and 85) to the other device. When received, the other device (eithersmart card reader device 10 or computing device 20, as the case may be)decrypts the encrypted session key using the stored shared secret key,and then uses the decrypted session key to decrypt the encryptedmessage.

In another particular embodiment, smart card communications system 5 asjust described may be used to send and receive encrypted and/ordigitally signed email messages. Specifically, computing device 20 isprovided with an email program employing a scheme such as S/MIME or PGPthat uses both symmetric (secret key) and asymmetric (public key)cryptography techniques. As noted above, after the user of computingdevice 20 creates an email message, the email program generates asymmetric session key and uses the session key to encrypt the emailmessage. The session key is then encrypted using the message recipient'spublic key (preferably obtained from that recipient's public keycertificate).

Next, the message may be signed by creating a digest of the messageusing a message digest algorithm such as SHA-1 or MD5 and encrypting thedigest using the private key of the user of computing device 20 (that isstored in memory 65 of smart card 15). According to an aspect of theinvention, this step is performed wirelessly in a secure manner.Specifically, the message digest is created by computing device 20 andit and the smart card password (which is input into computing device 20by the user) are wirelessly transmitted to the smart card reader device10 (through cooperation of wireless communication devices 85 and 40)using the secure, encrypted channel described above (i.e., using theshared secret key and a newly generated session key). Once received,this information is decrypted as described above, and the message digestis sent to smart card 15 (through contacts 45 and 50) where it isencrypted with the stored private key, thus creating a digitalsignature. The digital signature is then sent back to smart card readerdevice 10 (through contacts 45 and 50) and is subsequently wirelesslytransmitted back to computing device 20 using the secure, encryptedchannel described above for subsequent transmission to the recipientalong with the encrypted message.

When a user of computing device 20 receives an encrypted email messagefrom another party, the smart card password (entered into computingdevice 20 by the user) and the encrypted session key (the one used bythe sending party to encrypt the email message, not the one used in theencrypted channel between the computing device 20 and the smart cardreader device 10) are wirelessly transmitted to the smart card readerdevice 10 (through cooperation of wireless communication devices 85 and40) using the secure, encrypted channel described above (i.e., using theshared secret key and a newly generated session key). Once received,this information is decrypted as described above, and the encryptedsession key is sent to smart card 15 (through contacts 45 and 50) whereit is decrypted with the stored private key. The decrypted session keyis then sent back to the smart card reader device 10 (through contacts45 and 50) and is subsequently wirelessly transmitted back to computingdevice 20 using the secure, encrypted channel described above where itis used to decrypt the encrypted email message that was received.

As will be appreciated, each of these operations (creating an encryptedand/or digitally signed email and decrypting a received encrypted email)are performed without the private key of the user of computing device 20ever leaving that user's smart card 15. In addition, these operationsare also performed wirelessly without any key information or smart cardpassword information being transmitted between devices in an unencrypted(clear text), unsecured manner. In fact, that information is preferablytransmitted between devices using FIPS-140-2 or its successor approvedencryption.

FIG. 3 is an isometric view of one particular embodiment of the smartcard reader device 10. FIGS. 4, 5, 6, and 7 show isometric, front, sideand bottom views, respectively, of the smart card reader device 10 shownin FIG. 3 having smart card 15 received therein. The embodiment of smartcard reader 10 shown in FIGS. 3, 4, 5, 6, and 7 is portable andpreferably wearable by the user thereof. Smart card reader 10 shown inFIGS. 3, 4, 5, 6, and 7 includes housing 105, preferably made of amolded lightweight plastic material, that houses the components shown inFIG. 1 (processor 25, memory 30, wireless communications device 40, andcontacts 45). Housing 105 has a channel 17 (FIG. 3) provided on thefront face thereof for receiving and holding a smart card 15 as shown inFIGS. 4 and 5. The channel 17 is defined on three sides by lower flangeportion 110 and left and right side flange portions 115 and 120 ofhousing 105. As seen in FIGS. 4 and 5, the lower flange portion 110 andleft and right side flange portions 115 and 120 are sized so that alarge portion of the front face of smart card 15 will remain visiblewhen the smart card 15 is inserted in the channel so thatpersonal/identifying information provided on the smart card 15 can beenreadily seen by a guard or the like. In addition, the contacts 45 arehoused and supported by lower flange portion 110 such that contacts 45are caused to be aligned with and make electrical contact with contacts50 of the smart card 15 when it is inserted in the channel.

The embodiment of smart card reader device 10 shown in FIGS. 3. 4, 5, 6,and 7 further includes at least one attachment mechanism for attachingthe smart card reader 10 to the body or clothing of the user, therebyenhancing the portable nature of the smart card reader 10. Specifically,the smart card reader device 10 shown in FIGS. 3, 4, 5, 6, and 7includes an upper loop portion for receiving a lanyard or the liketherethrough so that the smart card reader device 10 may be worn aroundthe user's neck like a necklace. The smart card reader device 10 shownin FIGS. 3, 4, 5, 6, and 7 also includes fastening arms 130A and 130B(FIG. 7) for receiving opposite ends of a strap or the like so that thesmart card reader device 10 can be attached to a portion of the user'sbody, such as the user's upper arm. As will be appreciated, any of anumber of alternative fastening mechanisms may also be employed, such asa clip provided on the rear of the smart card reader device 10 forattaching it to the user's belt or a pocket or button on the user'sshirt or jacket. Finally, as seen in FIG. 7, the smart card readerdevice 10 includes a USB port 135 for enabling USB connections to bemade thereto. While the preferred embodiment utilizes a USB connection,it will be understood that other connections such as other types ofserial (e.g., RS-232) connections, PCMCIA, or a parallel port may alsobe used.

Thus, the invention provides a smart card reader device and a smart cardcommunications system that overcomes the problems of the prior art. Inparticular, the invention provides a portable, lightweight, andpreferably wearable smart card reader device that is able to securelycommunicate with an associated computing device to securely exchangeinformation such as the smart card password and encryption keys. Becausethe smart card reader device is wearable and portable, a user is moreeasily able to keep it with him or her at all relevant times, therebyeliminating the problem of inadvertently leaving a smart card in areader device that is physically coupled to a computing device.

While specific embodiments of the invention have been described indetail, it will be appreciated by those skilled in the art that variousmodifications and alternatives to those details could be developed inlight of the overall teachings of the disclosure. Accordingly, theparticular arrangements disclosed are meant to be illustrative only andnot limiting as to the scope of the invention which is to be given thefull breadth of the claims appended and any and all equivalents thereof.

1. A reader device for a smart card, comprising: a housing, said housingreceiving said smart card; a processor, said processor being inelectronic communication with an integrated circuit chip of said smartcard when said smart card is received in said housing; a wirelesscommunications device in electronic communication with said processorfor enabling the reader device to transmit first encrypted informationwirelessly and to receive second encrypted information wirelessly; and amemory in electronic communication with said processor, said memoryhaving one or more routines executable by said processor, said one ormore routines including a cryptographic module adapted to encrypt firstinformation to create said first encrypted information and decrypt saidsecond encrypted information to obtain second information.
 2. The readerdevice according to claim 1, wherein said wireless communications devicecomprises a Bluetooth radio, and wherein said first encryptedinformation is transmitted and said second encrypted information isreceived using the Bluetooth wireless communications protocol.
 3. Thereader device according to claim 1, wherein said cryptographic module isadapted to generate a session key and use said session key to encryptmessage information to create encrypted message information, whereinsaid memory stores a shared secret key, said shared secret key beingknown to at least one computing device, and wherein said cryptographicmodule is adapted to use said shared secret key to encrypt said sessionkey to create an encrypted session key, said first encrypted informationcomprising said encrypted message information and said encrypted sessionkey.
 4. The reader device according to claim 3, wherein saidcryptographic module is adapted to encrypt said message information andsaid session key using one or more FIPS-140-2 or its successor approvedencryption algorithms.
 5. The reader device according to claim 1,wherein said cryptographic module is adapted to encrypt said firstinformation to create said first encrypted information using one or moreFIPS-140-2 or its successor approved encryption algorithms.
 6. Thereader device according to claim 1, wherein said housing includes achannel for receiving and holding said smart card.
 7. The reader deviceaccording to claim 6, wherein a portion of a face of said smart card isvisible when said smart card is received in said channel.
 8. The readerdevice according to claim 1, wherein said housing includes one or moreattachment mechanisms for attaching said reader device to the clothingor the body of a user of said reader device.
 9. The reader deviceaccording to claim 8, wherein said one or more attachment mechanismscomprise a loop portion for receiving a lanyard.
 10. The reader deviceaccording to claim 8, wherein said one or more attachment mechanismscomprise first and second arm portions for receiving and holding astrap.
 11. The reader device according to claim 1, said housing havingone or more contacts in electronic communication with said processor,said one or more contacts being in electronic communication with one ormore second contacts provided on said smart card when said smart card isreceived in said housing, said one or more second contacts being inelectronic communication with said integrated circuit chip.
 12. Acommunication system, comprising: a smart card having an integratedcircuit chip; a reader device including: a housing, said housingreceiving said smart card; a first processor, said first processor beingin electronic communication with said integrated circuit chip when saidsmart card is received in said housing; a first wireless communicationsdevice in electronic communication with said first processor; and afirst memory in electronic communication with said first processor, saidfirst memory having one or more first routines executable by said firstprocessor, said one or more first routines including a firstcryptographic module; and a computing device including: a secondprocessor; a second wireless communications device in electroniccommunication with said second processor; and a second memory inelectronic communication with said second processor, said second memoryhaving one or more second routines executable by said second processor,said one or more second routines including a second cryptographicmodule; wherein said first wireless communications device wirelesslytransmits first encrypted information to said second wirelesscommunications device and wirelessly receives second encryptedinformation transmitted by said second wireless communications device,wherein first information is encrypted by said first cryptographicmodule to create said first encrypted information and second informationis encrypted by said second cryptographic module to create said secondencrypted information, and wherein said first cryptographic module isadapted to decrypt said second encrypted information to obtain saidsecond information and said second cryptographic module is adapted todecrypt said first encrypted information to obtain said firstinformation.
 13. The system according to claim 12, wherein said firstand second wireless communications devices each comprise a Bluetoothradio, and wherein said first and second encrypted information aretransmitted using the Bluetooth wireless communications protocol. 14.The system according to claim 12, wherein said first memory and saidsecond memory each store a shared secret key, wherein said firstcryptographic module is adapted to generate a first session key and usesaid first session key to encrypt first message information to createfirst encrypted message information, wherein said first cryptographicmodule is adapted to use said shared secret key to encrypt said firstsession key to create a first encrypted session key, said firstencrypted information comprising said first encrypted messageinformation and said first encrypted session key, wherein said secondcryptographic module is adapted to generate a second session key and usesaid second session key to encrypt second message information to createsecond encrypted message information, and wherein said secondcryptographic module is adapted to use said shared secret key to encryptsaid second session key to create a second encrypted session key, saidsecond encrypted information comprising said second encrypted messageinformation and said second encrypted session key.
 15. The systemaccording to claim 12, wherein said second information includes a digestof an email message, wherein said integrated circuit chip stores aprivate key, wherein said integrated circuit chip is adapted to encryptsaid digest using said private key to create a digital signature, andwherein said first information includes said digital signature.
 16. Thesystem according to claim 12, wherein said second information includes apassword for said smart card.
 17. The system according to claim 12,wherein said integrated circuit chip stores a private key, wherein saidsecond information includes an encrypted email message, said encryptedemail message having been created by encrypting an email message with apublic key that corresponds to said private key, wherein said integratedcircuit chip is adapted to decrypt said encrypted email message usingsaid private key to obtain said email message, and wherein said firstinformation includes said email message.
 18. The system according toclaim 12, said housing having one or more contacts in electroniccommunication with said first processor, said one or more contacts beingin electronic communication with one or more second contacts provided onsaid smart card when said smart card is received in said housing, saidone or more second contacts being in electronic communication with saidintegrated circuit chip.