-
公开(公告)号:US11645402B2
公开(公告)日:2023-05-09
申请号:US16541630
申请日:2019-08-15
申请人: BlackBerry Limited
IPC分类号: G06F21/62 , G06F21/57 , G06F12/14 , G06F16/185
CPC分类号: G06F21/6209 , G06F12/1491 , G06F16/185 , G06F21/57
摘要: Methods and devices for determining whether a computing device has been compromised. File tree structure information for the computing device is obtained that details at least a portion of a tree-based structure of folders and files in a memory on the computing device. It is then determined from the file tree structure information that the computing device is compromised and, based on the determination that the computing device has been compromised, an action is taken.
-
公开(公告)号:US11240026B2
公开(公告)日:2022-02-01
申请号:US16413773
申请日:2019-05-16
申请人: BlackBerry Limited
摘要: Devices and methods of managing data stored within a container. The container may be associated with at least one registered user. The data within the container may be encrypted by a data encryption key (DEK). A computing device includes: a security module including a crypto-processor, a main processor, and memory. The memory stores instructions that, when executed, configure a processor to: authenticate a user based on a user secret associated with the container and generate a soft key based on the user secret. The instructions cause a crypto-processor to generate a secure generator output including a crypto key component and generate a hardened user key based on a key agreement protocol using the soft key and the crypto key component. The instructions cause a processor to construct an unencrypted DEK associated with the hardened user key and decrypt the subset of data using the unencrypted DEK.
-
公开(公告)号:US10797890B2
公开(公告)日:2020-10-06
申请号:US15905394
申请日:2018-02-26
申请人: BlackBerry Limited
摘要: Systems, methods, and software can be used to provide inter-enterprise data communications between enterprise applications on an electronic device. In some aspects, a method comprises: receiving, by a bridge application executing on an electronic device, an interoperation request for a first enterprise, wherein the interoperation request includes a first token and a second token; sending, from the bridge application to an application of the first enterprise, the first token, wherein the application of the first enterprise executes on the electronic device; receiving, by the bridge application from the application of the first enterprise, a certificate in response to the first token, wherein the certificate is encrypted by the second token; decrypting, by the bridge application, the certificate by using the second token; and validating, by the bridge application, the application of the first enterprise based on the decrypted certificate.
-
公开(公告)号:US11954203B2
公开(公告)日:2024-04-09
申请号:US18163190
申请日:2023-02-01
申请人: BlackBerry Limited
CPC分类号: G06F21/565 , G06F16/13 , G06F16/1734 , G06F16/2246 , G06F2221/034
摘要: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
-
公开(公告)号:US11632377B2
公开(公告)日:2023-04-18
申请号:US16541672
申请日:2019-08-15
申请人: BlackBerry Limited
IPC分类号: H04L9/40 , G06F16/16 , G06F16/13 , H04W12/30 , G06F21/12 , G06F21/62 , H04L67/06 , H04L67/306
摘要: Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.
-
公开(公告)号:US11599676B2
公开(公告)日:2023-03-07
申请号:US16295982
申请日:2019-03-07
申请人: BlackBerry Limited
摘要: Described herein is a system and method of application container access, the method includes performing a foreground unlock on an application container; creating a copy of a container key of the application container; locking the application container; receiving a background unlock trigger; determining whether a background unlock is authorized; performing the background unlock on at least a portion of the application container using the copy of the container key in response to determining the background unlock is authorized; and storing data in the at least a portion of the application container while the application container is in the background unlock.
-
公开(公告)号:US11599639B2
公开(公告)日:2023-03-07
申请号:US16541795
申请日:2019-08-15
申请人: BlackBerry Limited
摘要: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
-
公开(公告)号:US11233784B2
公开(公告)日:2022-01-25
申请号:US16403979
申请日:2019-05-06
申请人: BlackBerry Limited
摘要: A method for managing access to a shared endpoint of a network is disclosed. The method includes: receiving a user request to access a service associated with the shared endpoint; verifying that a user associated with the user request is authorized to access the service; in response to verifying that the user is authorized to access the service, obtaining a unique session identifier (USID) associated with the user request; receiving, via input from a device associated with the user, an access code; in response to determining that the inputted access code matches the USID, granting access to the service for the user.
-
公开(公告)号:US11343258B2
公开(公告)日:2022-05-24
申请号:US16541735
申请日:2019-08-15
申请人: BlackBerry Limited
IPC分类号: H04L29/06 , G06F16/185
摘要: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the managed profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the managed portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
-
公开(公告)号:US11182494B2
公开(公告)日:2021-11-23
申请号:US16582930
申请日:2019-09-25
申请人: BlackBerry Limited
IPC分类号: G06F21/62 , H04L9/08 , H04L9/32 , H04W12/033 , H04W12/062
摘要: A method of controlling access to data on a first electronic device, the method comprising steps of establishing a shared encryption key with a first software application instance running on a second electronic device, receiving a ‘begin session’ command sent by the first software application instance and responsive to the ‘begin session’ command, creating a storage location in a data store of the electronic device, obtaining a data encryption key, receiving data, encrypting the data using the data encryption key and storing the encrypted data in the storage location, receiving an ‘end session’ command sent by the first software application instance and responsive to the ‘end session’ command, discarding the shared encryption key, and deleting the encrypted data from the storage location.
-
-
-
-
-
-
-
-
-