Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date © 2009 Research In Motion Limited Agenda In this course, you will cover the following topics: – Introduction to advanced mobile application development for the BlackBerry® smartphone – Application control for mobile devices – Optimization for mobile application development – Advanced BlackBerry user interface – Introduction to multimedia application development for the BlackBerry smartphone – Understanding push technology © 2009 Research In Motion Limited Agenda In this course, you will cover the following topics: – Understanding client/server push – Introduction to developing Bluetooth® applications for mobile devices – Developing secure applications © 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Objectives: – Describe Bluetooth wireless technology – Identify supported Bluetooth wireless technology profiles – Discuss Bluetooth wireless technology security – Discuss the implementation of Bluetooth wireless technology in BlackBerry wireless applications – Describe JSR-82 Java® APIs for Bluetooth API © 2009 Research In Motion Limited application programming interface Introduction to developing Bluetooth applications for mobile devices © 2009 Research In Motion Limited Bluetooth wireless technology – With Bluetooth technology, users can make effortless, instant connections between: • Mobile phones • Desktop computers • Notebook computers © 2009 Research In Motion Limited Bluetooth wireless technology – Bluetooth uses radio transmission – Transfers both voice and data in real-time – Ensures protection from interference and security of data © 2009 Research In Motion Limited Bluetooth wireless technology – Bluetooth specification has two power levels defined: • Lower power level that covers the shorter personal proximity range within a room • Higher power level that can cover a medium range, such as within a home – Supports both point-to-point and point-to-multipoint connections © 2009 Research In Motion Limited Bluetooth wireless technology – Bluetooth technology is a nonsecure channel – If implemented incorrectly, it can introduce security vulnerabilities into an organization’s network © 2009 Research In Motion Limited BlackBerry Enterprise Solution security – Encrypts data at all points between the BlackBerry smartphone and the BlackBerry® Enterprise Server – Only the BlackBerry Enterprise Server and the BlackBerry smartphone can access data sent between them © 2009 Research In Motion Limited Bluetooth profiles © 2009 Research In Motion Limited Bluetooth profiles – Specify how applications between devices connect and are interoperable – Provide use-case scenarios and information about how to configure applications © 2009 Research In Motion Limited Bluetooth profiles Bluetooth profiles that BlackBerry smartphones support – A2DP – AVRCP – HFP – HSP – SPP – SIM Access Profile © 2009 Research In Motion Limited Bluetooth wireless technology security – Bluetooth enabled devices are at risk for attack when: • Bluetooth wireless transceiver is turned on • Bluetooth enabled device is set to use discoverable (visible) mode • Bluetooth enabled device is physically located within range of a user with malicious intent © 2009 Research In Motion Limited Bluetooth wireless technology security Risks of using Bluetooth technology on wireless devices – Bluetooth enabled devices have the following vulnerabilities: • Users with malicious intent can obtain confidential data without consent • A previously trusted (or paired) source removed from the Trusted list can access the memory contents of some Bluetooth enabled devices © 2009 Research In Motion Limited Bluetooth wireless technology security Risks of using Bluetooth technology on wireless devices – Bluetooth enabled devices have the following vulnerabilities: • Users with malicious intent can gain access to higher-level commands and to voice, data, and messaging channels – Security threats can be user or device based © 2009 Research In Motion Limited Bluetooth wireless technology security Bluejacking – User-based threat – Users with malicious intent send text messages anonymously to Bluetooth enabled devices – Bluetooth enabled device must be set to use discoverable mode and are physically located within 10 meters of the attacking devices © 2009 Research In Motion Limited Bluetooth wireless technology security Bluesnarfing – Device-based threat that occurs when device manufacturers implement the specification for Bluetooth technology incorrectly – Can also access device information without knowledge or consent © 2009 Research In Motion Limited Bluetooth wireless technology security Bluebugging – Device-based threat that occurs when manufacturers implement security mechanisms for Bluetooth technology improperly – Also occurs when users with malicious intent access phone commands © 2009 Research In Motion Limited Bluetooth wireless technology security Managing Bluetooth enabled BlackBerry smartphones – With BlackBerry Enterprise Server version 4.0 or later, you can set IT policy rules that are designed to control the behavior of Bluetooth enabled BlackBerry smartphones IT © 2009 Research In Motion Limited interactive technology Bluetooth wireless technology security – Bluetooth technology security measures on BlackBerry smartphones: • Support only seven of the available Bluetooth profiles • Limited support for the Bluetooth SPP • Discoverable mode option on BlackBerry smartphones is turned off by default SPP © 2009 Research In Motion Limited Serial Port Profile Bluetooth wireless technology security – Bluetooth technology security measures on BlackBerry smartphones: • Set the Limit Discoverable Time IT policy rule to True to allow discoverable mode for two minutes only • Use the Disable Bluetooth IT policy rule to control the Bluetooth wireless transceiver • Users must request connections © 2009 Research In Motion Limited Bluetooth wireless technology security – Bluetooth technology security measures on BlackBerry smartphones: • Specify whether or not to use a passkey to encrypt data • Request a combination key for authentication • Prompt the users each time that other Bluetooth enabled devices try to connect to them © 2009 Research In Motion Limited Bluetooth wireless technology security – Bluetooth technology security measures on BlackBerry smartphones: • Set the Disable Desktop Connectivity IT policy rule to True to prevent connections between the BlackBerry smartphone and the BlackBerry® Desktop Manager • Set the Disable Wireless Bypass IT policy rule to True to use a serial port to exchange information with the BlackBerry Enterprise Server © 2009 Research In Motion Limited Bluetooth wireless technology security Using IT policy to manage Bluetooth technology on BlackBerry smartphones – IT policy rules that control the use of Bluetooth wireless technology are available in BlackBerry Enterprise Server version 4.0 and later – All Bluetooth enabled BlackBerry smartphones can be managed simultaneously or individually © 2009 Research In Motion Limited Using JSR-82 © 2009 Research In Motion Limited Using JSR-82 – JSR-82 is a standard defined by the Java Community Process for providing a standard to develop Bluetooth applications in Java – JSR-82 API hides the complexity of the Bluetooth protocol stack by exposing a simple set of Java APIs JSR © 2009 Research In Motion Limited Java Specification Request Using JSR-82 – The JSR-82 API provides you with the options to do the following: • Manage the local Bluetooth device settings • Discover other Bluetooth devices in the neighborhood • Search for Bluetooth devices on the discovered Bluetooth smartphone • Connect to any of those Bluetooth services and communicate with them © 2009 Research In Motion Limited Using JSR-82 – The JSR-82 API provides you with the options to do the following: • Register a Bluetooth service on a BlackBerry smartphone so that other Bluetooth devices can connect to it • Manage and control the communication connections • Provide security to all of the preceding options © 2009 Research In Motion Limited Summary © 2009 Research In Motion Limited Summary – Bluetooth wireless technology provides fast, portable connection service – Wireless technology is considered to be nonsecure – You must protect against vulnerabilities when creating applications – Bluetooth profiles determine how applications on BlackBerry smartphones and on Bluetooth enabled devices connect and are interoperable © 2009 Research In Motion Limited Summary – IT policy rules prevent nonsecure actions and require certain secure behaviors on the BlackBerry smartphones – Follow the JSR-82 standard to develop secure applications © 2009 Research In Motion Limited © 2009 Research In Motion Limited Legal Disclaimer © 2009 Research In Motion Limited. All rights reserved. BlackBerry®, RIM®, Research In Motion®, SurePress™ SureType® and related trademarks, names and logos are the property of Research In Motion Limited and are registered and/or used in the U.S. and countries around the world. All other trademarks are the property of their respective owners. This documentation is provided "AS IS" and without condition, endorsement, guarantee, representation or warranty, or liability of any kind by Research In Motion Limited and its affiliated companies, all of which are expressly disclaimed to the maximum extent permitted by applicable law in your jurisdiction. © 2009 Research In Motion Limited