Win a copy of Terraform in Action this week in the Cloud forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
  • Tim Cooke
  • Campbell Ritchie
  • Paul Clapham
  • Ron McLeod
  • Liutauras Vilda
  • Jeanne Boyarsky
  • Rob Spoor
  • Bear Bibeault
Saloon Keepers:
  • Jesse Silverman
  • Tim Moores
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Piet Souris
  • Al Hobbs
  • salvin francis

Application security

Ranch Hand
Posts: 136
Android Mac Chrome
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

How can we provide security mechanism for the BB app. There may be ways with I can transfer downloaded JAD/JAR from one device to another device. Which are the ways to prevent JAD/JAR from unauthorized distribution(from User to User).

Pratik Goswami
Posts: 26
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
By default, it is quite simple for a user to transfer an application from one device to another. The JavaLoader utility (which is bundled with the JDE) allows you to transfer any BlackBerry app from your PC to your smartphone and vice-versa. (You might need to be a little bit of an advanced user to do it, but very little.)

One thing you can do is generate a license key that is mapped to the PIN number of the device (or possibly to some other identifying credential such as the user's email address). You can have the app check at startup that the device's PIN is correct, but you have to implement this check yourself in your application. (I've written some sample code demonstrating how to do it in Chapter 5.)

BlackBerry App World has some infrastructure in place to sell the license keys based on user/device identity.
Consider Paul's rocket mass heater.
    Bookmark Topic Watch Topic
  • New Topic