BlackBerry Limited
METHODS AND SYSTEMS FOR IDENTIFYING COMPROMISED DEVICES FROM FILE TREE STRUCTURE

Last updated:

Abstract:

Methods and devices for determining whether a computing device has been compromised. File tree structure information for the computing device is obtained that details at least a portion of a tree-based structure of folders and files in a memory on the computing device. It is then determined from the file tree structure information that the computing device is compromised and, based on the determination that the computing device has been compromised, an action is taken.

Status:
Application
Type:

Utility

Filling date:

15 Aug 2019

Issue date:

18 Feb 2021