Advanced Java Application
Development for the
BlackBerry Smartphone
Trainer name
Date
© 2009 Research In Motion Limited
Agenda
In this course, you will cover the following topics:
– Introduction to advanced mobile application
development for the BlackBerry® smartphone
– Application control for mobile devices
– Optimization for mobile application development
– Advanced BlackBerry user interface
– Introduction to multimedia application development
for the BlackBerry smartphone
– Understanding push technology
© 2009 Research In Motion Limited
Agenda
In this course, you will cover the following topics:
– Understanding client/server push
– Introduction to developing Bluetooth® applications
for mobile devices
– Developing secure applications
© 2009 Research In Motion Limited
Advanced Java Application Development for the BlackBerry
Smartphone
Objectives:
– Describe Bluetooth wireless technology
– Identify supported Bluetooth wireless technology
profiles
– Discuss Bluetooth wireless technology security
– Discuss the implementation of Bluetooth wireless
technology in BlackBerry wireless applications
– Describe JSR-82 Java® APIs for Bluetooth
API
© 2009 Research In Motion Limited
application programming interface
Introduction to developing Bluetooth
applications for mobile devices
© 2009 Research In Motion Limited
Bluetooth wireless technology
– With Bluetooth technology, users can make
effortless, instant connections between:
• Mobile phones
• Desktop computers
• Notebook computers
© 2009 Research In Motion Limited
Bluetooth wireless technology
– Bluetooth uses radio transmission
– Transfers both voice and data in real-time
– Ensures protection from interference and security of
data
© 2009 Research In Motion Limited
Bluetooth wireless technology
– Bluetooth specification has two power levels
defined:
• Lower power level that covers the shorter
personal proximity range within a room
• Higher power level that can cover a medium
range, such as within a home
– Supports both point-to-point and point-to-multipoint
connections
© 2009 Research In Motion Limited
Bluetooth wireless technology
– Bluetooth technology is a nonsecure channel
– If implemented incorrectly, it can introduce security
vulnerabilities into an organization’s network
© 2009 Research In Motion Limited
BlackBerry Enterprise Solution security
– Encrypts data at all points between the BlackBerry
smartphone and the BlackBerry® Enterprise Server
– Only the BlackBerry Enterprise Server and the
BlackBerry smartphone can access data sent
between them
© 2009 Research In Motion Limited
Bluetooth profiles
© 2009 Research In Motion Limited
Bluetooth profiles
– Specify how applications between devices connect
and are interoperable
– Provide use-case scenarios and information about
how to configure applications
© 2009 Research In Motion Limited
Bluetooth profiles
Bluetooth profiles that BlackBerry smartphones support
– A2DP
– AVRCP
– HFP
– HSP
– SPP
– SIM Access Profile
© 2009 Research In Motion Limited
Bluetooth wireless technology security
– Bluetooth enabled devices are at risk for attack
when:
• Bluetooth wireless transceiver is turned on
• Bluetooth enabled device is set to use
discoverable (visible) mode
• Bluetooth enabled device is physically located
within range of a user with malicious intent
© 2009 Research In Motion Limited
Bluetooth wireless technology security
Risks of using Bluetooth technology on wireless devices
– Bluetooth enabled devices have the following
vulnerabilities:
• Users with malicious intent can obtain
confidential data without consent
• A previously trusted (or paired) source removed
from the Trusted list can access the memory
contents of some Bluetooth enabled devices
© 2009 Research In Motion Limited
Bluetooth wireless technology security
Risks of using Bluetooth technology on wireless devices
– Bluetooth enabled devices have the following
vulnerabilities:
• Users with malicious intent can gain access to
higher-level commands and to voice, data, and
messaging channels
– Security threats can be user or device based
© 2009 Research In Motion Limited
Bluetooth wireless technology security
Bluejacking
– User-based threat
– Users with malicious intent send text messages
anonymously to Bluetooth enabled devices
– Bluetooth enabled device must be set to use
discoverable mode and are physically located
within 10 meters of the attacking devices
© 2009 Research In Motion Limited
Bluetooth wireless technology security
Bluesnarfing
– Device-based threat that occurs when device
manufacturers implement the specification for
Bluetooth technology incorrectly
– Can also access device information without
knowledge or consent
© 2009 Research In Motion Limited
Bluetooth wireless technology security
Bluebugging
– Device-based threat that occurs when
manufacturers implement security mechanisms for
Bluetooth technology improperly
– Also occurs when users with malicious intent
access phone commands
© 2009 Research In Motion Limited
Bluetooth wireless technology security
Managing Bluetooth enabled BlackBerry smartphones
– With BlackBerry Enterprise Server version 4.0 or
later, you can set IT policy rules that are designed
to control the behavior of Bluetooth enabled
BlackBerry smartphones
IT
© 2009 Research In Motion Limited
interactive technology
Bluetooth wireless technology security
– Bluetooth technology security measures on
BlackBerry smartphones:
• Support only seven of the available Bluetooth
profiles
• Limited support for the Bluetooth SPP
• Discoverable mode option on BlackBerry
smartphones is turned off by default
SPP
© 2009 Research In Motion Limited
Serial Port Profile
Bluetooth wireless technology security
– Bluetooth technology security measures on
BlackBerry smartphones:
• Set the Limit Discoverable Time IT policy rule to
True to allow discoverable mode for two minutes
only
• Use the Disable Bluetooth IT policy rule to
control the Bluetooth wireless transceiver
• Users must request connections
© 2009 Research In Motion Limited
Bluetooth wireless technology security
– Bluetooth technology security measures on
BlackBerry smartphones:
• Specify whether or not to use a passkey to
encrypt data
• Request a combination key for authentication
• Prompt the users each time that other Bluetooth
enabled devices try to connect to them
© 2009 Research In Motion Limited
Bluetooth wireless technology security
– Bluetooth technology security measures on
BlackBerry smartphones:
• Set the Disable Desktop Connectivity IT policy
rule to True to prevent connections between the
BlackBerry smartphone and the BlackBerry®
Desktop Manager
• Set the Disable Wireless Bypass IT policy rule to
True to use a serial port to exchange information
with the BlackBerry Enterprise Server
© 2009 Research In Motion Limited
Bluetooth wireless technology security
Using IT policy to manage Bluetooth technology on
BlackBerry smartphones
– IT policy rules that control the use of Bluetooth
wireless technology are available in BlackBerry
Enterprise Server version 4.0 and later
– All Bluetooth enabled BlackBerry smartphones can
be managed simultaneously or individually
© 2009 Research In Motion Limited
Using JSR-82
© 2009 Research In Motion Limited
Using JSR-82
– JSR-82 is a standard defined by the Java
Community Process for providing a standard to
develop Bluetooth applications in Java
– JSR-82 API hides the complexity of the Bluetooth
protocol stack by exposing a simple set of Java
APIs
JSR
© 2009 Research In Motion Limited
Java Specification Request
Using JSR-82
– The JSR-82 API provides you with the options to do
the following:
• Manage the local Bluetooth device settings
• Discover other Bluetooth devices in the
neighborhood
• Search for Bluetooth devices on the discovered
Bluetooth smartphone
• Connect to any of those Bluetooth services and
communicate with them
© 2009 Research In Motion Limited
Using JSR-82
– The JSR-82 API provides you with the options to do
the following:
• Register a Bluetooth service on a BlackBerry
smartphone so that other Bluetooth devices can
connect to it
• Manage and control the communication
connections
• Provide security to all of the preceding options
© 2009 Research In Motion Limited
Summary
© 2009 Research In Motion Limited
Summary
– Bluetooth wireless technology provides fast,
portable connection service
– Wireless technology is considered to be nonsecure
– You must protect against vulnerabilities when
creating applications
– Bluetooth profiles determine how applications on
BlackBerry smartphones and on Bluetooth enabled
devices connect and are interoperable
© 2009 Research In Motion Limited
Summary
– IT policy rules prevent nonsecure actions and
require certain secure behaviors on the BlackBerry
smartphones
– Follow the JSR-82 standard to develop secure
applications
© 2009 Research In Motion Limited
© 2009 Research In Motion Limited
Legal Disclaimer
© 2009 Research In Motion Limited. All rights reserved. BlackBerry®, RIM®, Research
In Motion®, SurePress™ SureType® and related trademarks, names and logos are the
property of Research In Motion Limited and are registered and/or used in the U.S. and
countries around the world. All other trademarks are the property of their respective
owners. This documentation is provided "AS IS" and without condition, endorsement,
guarantee, representation or warranty, or liability of any kind by Research In Motion
Limited and its affiliated companies, all of which are expressly disclaimed to the
maximum extent permitted by applicable law in your jurisdiction.
© 2009 Research In Motion Limited