4
setDialerListener ..................................................................................................................... 75
startCall ........................................................................................................................................ 75
startCall ........................................................................................................................................ 76
sendExtNo ........................................................................................................................................ 76
endCall............................................................................................................................................. 76
INTERFACE DIALERLISTENER................................................................................................................... 77
SAMPLE DIALERLISTENER IMPLEMENTATION ........................................................................................... 77
notifyDialerEvent ..................................................................................................................... 79
CLASS HIERARCHY .................................................................................................................................... 79
INTERFACE HIERARCHY............................................................................................................................. 79
18 DRM PROTECTION IN JAVA .......................................................................................................... 80
OVERVIEW .................................................................................................................................................. 80
RIGHTS ENFORCEMENT - MIDLETS ACCESSING DRM PROTECTED CONTENT........................................... 80
ACQUIRING LICENSE ................................................................................................................................80
19 CLDC 1.1............................................................................................................................................ 81
CLDC 1.1 COMPLIANCE.......................................................................................................................... 81
20 JTWI..................................................................................................................................................... 86
OVERVIEW .................................................................................................................................................. 86
CLDC RELATED CONTENT FOR JTWI....................................................................................................... 87
MIDP 2.0 SPECIFIC INFORMATION FOR JTWI .................................................................................... 88
WIRELESS MESSAGING API 1.1 (JSR 120) SPECIFIC CONTENT FOR JTWI .................................. 89
MOBILE MEDIA API 1.1 (JSR 135) SPECIFIC CONTENT FOR JTWI.............................................. 90
MIDP 2.0 SECURITY SPECIFIC CONTENT FOR JTWI .......................................................................... 90
21 MIDP 2.0 SECURITY MODEL........................................................................................................ 91
UNTRUSTED MIDLET SUITES.................................................................................................................... 92
UNTRUSTED DOMAIN .................................................................................................................................. 92
TRUSTED MIDLET SUITES ....................................................................................................................... 93
PERMISSION TYPES CONCERNING THE HANDSET ...................................................................................... 93
USER PERMISSION INTERACTION MODE................................................................................................... 93
IMPLEMENTATION BASED ON RECOMMENDED SECURITY POLICY............................................................... 94
TRUSTED 3
RD
PARTY DOMAIN.................................................................................................................... 94
TRUSTED MIDLET SUITES USING X.509 PKI..................................................................................... 95
SIGNING A MIDLET SUITE...................................................................................................................... 96
SIGNER OF MIDLET SUITES.................................................................................................................... 96
MIDLET ATTRIBUTES USED IN SIGNING MIDLET SUITES.................................................................... 96
CREATING THE SIGNING CERTIFICATE ................................................................................................... 96
INSERTING CERTIFICATES INTO JAD .................................................................................................... 97
CREATING THE RSA SHA-1 SIGNATURE OF THE JAR .......................................................................... 97
AUTHENTICATING A MIDLET SUITE ........................................................................................................ 97
VERIFYING THE SIGNER CERTIFICATE ................................................................................................... 98
VERIFYING THE MIDLET SUITE JAR..................................................................................................... 98
APPENDIX A: AUDIO MIX TABLE.................................................................................................... 100
APPENDIX B: KEY MAPPING............................................................................................................. 101
KEY MAPPING FOR THE E680 ............................................................................................................... 101
APPENDIX C: MEMORY MANAGEMENT CALCULATION.................................................................. 102