4
O
VERVIEW .................................................................................................................................................. 74
JSR-82 BLUETOOTH API....................................................................................................................... 74
System Requirements................................................................................................................. 74
Bluetooth Control Center..................................................................................................... 75
Device Property Table............................................................................................................ 75
Service Registration .............................................................................................................. 76
Device Management ..................................................................................................................... 76
Communication............................................................................................................................... 77
Security Policy .......................................................................................................................... 78
External Events .......................................................................................................................... 79
Alarm & Datebook Behaviour ................................................................................................ 79
Pressing of End Key................................................................................................................. 80
Hardware Requirements............................................................................................................ 80
Interoperability Requirements......................................................................................... 80
13 MIDP 2.0 SECURITY MODEL........................................................................................................ 81
UNTRUSTED MIDLET SUITES.................................................................................................................... 82
UNTRUSTED DOMAIN .................................................................................................................................. 82
TRUSTED MIDLET SUITES ....................................................................................................................... 83
PERMISSION TYPES CONCERNING THE HANDSET ...................................................................................... 83
USER PERMISSION INTERACTION MODE ................................................................................................... 83
IMPLEMENTATION BASED ON RECOMMENDED SECURITY POLICY............................................................... 84
TRUSTED 3
RD
PARTY DOMAIN.................................................................................................................... 84
SECURITY POLICY FOR PROTECTION DOMAINS........................................................................................ 86
DISPLAYING OF PERMISSIONS TO THE USER .......................................................................................... 88
TRUSTED MIDLET SUITES USING X.509 PKI ..................................................................................... 88
SIGNING A MIDLET SUITE...................................................................................................................... 88
SIGNER OF MIDLET SUITES.................................................................................................................... 88
MIDLET ATTRIBUTES USED IN SIGNING MIDLET SUITES.................................................................... 89
CREATING THE SIGNING CERTIFICATE ................................................................................................... 89
INSERTING CERTIFICATES INTO JAD .................................................................................................... 89
CREATING THE RSA SHA-1 SIGNATURE OF THE JAR .......................................................................... 90
AUTHENTICATING A MIDLET SUITE ........................................................................................................ 90
VERIFYING THE SIGNER CERTIFICATE ................................................................................................... 90
VERIFYING THE MIDLET SUITE JAR..................................................................................................... 91
CARRIER SPECIFIC SECURITY MODEL..................................................................................................... 92
BOUND CERTIFICATES............................................................................................................................... 92
14 PREVENT DOWNLOADING OF LARGE JAVA MIDLETS........................................................... 95
OVERVIEW .................................................................................................................................................. 95
NOTIFICATION .......................................................................................................................................... 96
BACKWARD COMPATIBILITY/FLEXING....................................................................................................... 96
15 LAUNCH NATIVE STREAMING VIDEO CLIENT FROM JAVA APPLICATION..................... 97
Overview........................................................................................................................................... 97
New Implementation ................................................................................................................... 97
16 JSR 139 – CLDC 1.1.................................................................................................................... 98
JSR 139.................................................................................................................................................. 98
APPENDIX A: KEY MAPPING ............................................................................................................. 102
KEY MAPPING FOR THE V3X .................................................................................................................. 102