-
21.
公开(公告)号:US20180247034A1
公开(公告)日:2018-08-30
申请号:US15960331
申请日:2018-04-23
申请人: Blackberry Limited
发明人: Michael Andrew Goldsmith , Aleksandar Papo , Robert Joseph Lombardi , Jasmin Mulaosmanovic , Nazih Almalki , Brian Everett McBride , Peter Mark Rabinovitch
摘要: A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of collecting response data based upon a challenge, and a processor capable of determining a level of assurance (LOA) that possession of the mobile communications device has not changed based upon a statistical behavioral model and the passively received input data, and comparing the LOA with a security threshold. When the LOA is above the security threshold, the processor may be capable of performing a given mobile device operation without requiring response data from the second input device(s). When the LOA falls below the security threshold, the processor may be capable of generating the challenge, performing the given mobile device operation responsive to valid response data, and adding recent input data to the statistical behavioral model responsive to receipt of the valid response data.
-
公开(公告)号:US09953289B2
公开(公告)日:2018-04-24
申请号:US15229161
申请日:2016-08-05
申请人: BlackBerry Limited
CPC分类号: G06Q10/087 , G06K7/10376 , G06Q10/08
摘要: A server-implemented method for automatically registering an asset tag in a database is disclosed. One or more asset tag collision reports are received from at least one mobile device connected to the server, each report including a tag identifier of the asset tag that is wirelessly broadcast by the asset tag. A location of the asset tag is determined based on the one or more received asset tag collision reports. A first asset is selected from a set of unregistered assets that are identified as being deployed in the indoor facility based on determining that there is a match between the location of the asset tag and location information associated with the first asset. The asset tag is then registered in association with the first asset in the database.
-
公开(公告)号:US11972025B2
公开(公告)日:2024-04-30
申请号:US18187206
申请日:2023-03-21
申请人: BlackBerry Limited
CPC分类号: G06F21/6254 , G06F18/21 , G06F18/22 , G06F21/6209
摘要: Methods and systems for detecting a privacy violation in an image file. A policy to be used by a master imaging application is obtained and a file system is monitored for a digital image modified by a monitored imaging application. It is then determined that the digital image file includes at least some content in violation of a defined setting for the master imaging application and, based on the determination that the digital image file includes at least some content in violation of the defined setting for the master imaging application, taking an action.
-
公开(公告)号:US11954203B2
公开(公告)日:2024-04-09
申请号:US18163190
申请日:2023-02-01
申请人: BlackBerry Limited
CPC分类号: G06F21/565 , G06F16/13 , G06F16/1734 , G06F16/2246 , G06F2221/034
摘要: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
-
公开(公告)号:US11800482B2
公开(公告)日:2023-10-24
申请号:US17551291
申请日:2021-12-15
申请人: BlackBerry Limited
IPC分类号: H04W64/00 , G01S19/13 , G01S11/02 , G01S5/02 , G06Q10/0833 , G01C21/34 , G01S5/00 , H04W4/029 , G08G1/0968 , G08G1/00
CPC分类号: H04W64/00 , G01C21/3415 , G01S5/0027 , G01S5/0294 , G01S5/02521 , G01S11/02 , G01S19/13 , G06Q10/0833 , G08G1/096816 , G08G1/096838 , G08G1/205 , H04W4/029
摘要: A mobile transceiver for asset tracking having route monitoring and method of operation are provided. In one aspect, the method comprises: determining a location of the mobile transceiver using the satellite receiver; determining whether the determined location deviates from a planned route; and sending an alert to an asset tracking service when the determined location deviates from the planned route.
-
公开(公告)号:US11632377B2
公开(公告)日:2023-04-18
申请号:US16541672
申请日:2019-08-15
申请人: BlackBerry Limited
IPC分类号: H04L9/40 , G06F16/16 , G06F16/13 , H04W12/30 , G06F21/12 , G06F21/62 , H04L67/06 , H04L67/306
摘要: Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.
-
公开(公告)号:US11625495B2
公开(公告)日:2023-04-11
申请号:US16669927
申请日:2019-10-31
申请人: BlackBerry Limited
摘要: Methods and systems for detecting a privacy violation in an image file. A policy to be used by a master imaging application is obtained and a file system is monitored for a digital image modified by a monitored imaging application. It is then determined that the digital image file includes at least some content in violation of a defined setting for the master imaging application and, based on the determination that the digital image file includes at least some content in violation of the defined setting for the master imaging application, taking an action.
-
公开(公告)号:US11418545B2
公开(公告)日:2022-08-16
申请号:US16669858
申请日:2019-10-31
申请人: BlackBerry Limited
摘要: Methods and systems for removing sensitive information from a digital image. An instruction to share a digital image is received. It is then determined that the digital image contains a depiction of a corporate display medium that is classified as sensitive based on a policy and, based on the determination that the digital image contains the depiction of the corporate display medium that is classified as sensitive based on the policy, the digital image is processed to modify the depiction. The digital image is shared.
-
公开(公告)号:US10810545B2
公开(公告)日:2020-10-20
申请号:US16449606
申请日:2019-06-24
申请人: BlackBerry Limited
摘要: A server-implemented method for automatically registering an asset tag in a database is disclosed. One or more asset tag collision reports are received from at least one mobile device connected to the server, each report including a tag identifier of the asset tag that is wirelessly broadcast by the asset tag. A location of the asset tag is determined based on the one or more received asset tag collision reports. A first asset is selected from a set of unregistered assets that are identified as being deployed in the indoor facility based on determining that there is a match between the location of the asset tag and location information associated with the first asset. The asset tag is then registered in association with the first asset in the database.
-
30.
公开(公告)号:US10078742B2
公开(公告)日:2018-09-18
申请号:US15362430
申请日:2016-11-28
申请人: Blackberry Limited
发明人: Michael Andrew Goldsmith , Aleksandar Papo , Robert Joseph Lombardi , Jasmin Mulaosmanovic , Nazih Almalki , Brian Everett McBride , Peter Mark Rabinovitch
摘要: A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of collecting response data based upon a challenge, and a processor capable of determining a level of assurance (LOA) that possession of the mobile communications device has not changed based upon a statistical behavioral model and the passively received input data, and comparing the LOA with a security threshold. When the LOA is above the security threshold, the processor may be capable of performing a given mobile device operation without requiring response data from the second input device(s). When the LOA falls below the security threshold, the processor may be capable of generating the challenge, performing the given mobile device operation responsive to valid response data, and adding recent input data to the statistical behavioral model responsive to receipt of the valid response data.
-
-
-
-
-
-
-
-
-