US 11,954,203 B2
Methods and systems for identifying a compromised device through its unmanaged profile
Chang Fung Yang, Mississauga (CA); Robert Joseph Lombardi, Hamilton (CA); Chi Hing Ng, Richmond Hill (CA); and Johnathan George White, St. Albans (GB)
Assigned to BlackBerry Limited, Waterloo (CA)
Filed by BlackBerry Limited, Waterloo (CA)
Filed on Feb. 1, 2023, as Appl. No. 18/163,190.
Application 18/163,190 is a continuation of application No. 16/541,795, filed on Aug. 15, 2019, granted, now 11,599,639.
Prior Publication US 2023/0185914 A1, Jun. 15, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/00 (2013.01); G06F 16/13 (2019.01); G06F 16/17 (2019.01); G06F 16/22 (2019.01); G06F 21/56 (2013.01)
CPC G06F 21/565 (2013.01) [G06F 16/13 (2019.01); G06F 16/1734 (2019.01); G06F 16/2246 (2019.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method of determining whether a computing device has been compromised, the computing device having a first profile and a second profile, the method comprising:
based on determining that file tree structure information for the first profile includes information regarding files within the second profile, determining from the file tree structure information for the first profile that the computing device has been compromised; and
based on the determination that the computing device has been compromised, taking an action.