Few topics trip up BlackBerry developers more than the RIM security model. It can be extremely frustrating to take an app that works perfectly in the simulator and find that it won’t even start on a handset; or, worse, one that passes all your internal testing, but exhibits strange behavior in the field. Such problems are often the result of occasionally arcane security rules. Some of them you can bend, some you can break, and others you must live with: in all cases, though, just understanding them will allow you to make better decisions. This chapter examines the most important features of BlackBerry device security and how they affect your applications.


Security Policy Company Network User Permission Application Permission Corporate Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Chris King 2009

Authors and Affiliations

  • Chris King

There are no affiliations available

Personalised recommendations