39
When running a Java™ application, you may be prompted to grant access to protected features. These features
are protected because using them could incur you cost, or involve your personal data. In case of doubt, don't
hesitate to refuse access by selecting the "No" button!
The security configuration menu is an expert feature! You must know exactly what you are doing before
attempting to change security parameters of a MIDlet.
Misunderstanding changes may render MIDlet non functional and/or lead to higher risks for your private data or
impact your airtime consumption. Any changes in the security configuration are done under your responsibility. In
no case shall Celsius X VI II and/or your network provider be liable for any damages deriving from or arising out of
such changes in the security configuration.
You must be aware that applications downloaded to your phone could cause the phone to perform actions for
which you will be billed, like making calls and sending SMS. Depending on your operator's billing policy, you may
also be charged to download the application because of airtime consumption.
Security considerations Java™ MIDP technology is an efficient way to provide
powerful applications in mobile phones.
All these MIDP 2.0 features cannot be simply exposed to any MIDlet installed in the handset: a careful access
control system is implemented in the device to protect your private data and airtime consumption.
Access controls are gathered in 9 security groups:
– Network access
– Auto invocation
– Phone call
– Local connectivity
– Messaging receive
– Messaging sending
– Read User data
– Write User data
– Multimedia recording
Each of these security groups has one among 5 possible authorizations levels [listed from the more restrictive to
the more permissive]:
– Never: The security group completely prevents access to the protected features.
– Per use: Each time MIDlet tries to use protected feature, user is prompted to grant access.
– Per session: First time a MIDlet uses a protected function, user is prompted to grant access like in "Per use"
authorization but access is granted until the MIDlet terminates.
– Single confirmation: The first time in the whole MIDlet life a MIDlet uses a protected feature, user is prompted to
grant access. It remains valid until the MIDlet is removed from the handset.
– Always: The security group unconditionally grants access to protected features.
A MIDlet has a security status which is either "uncertified", or else "certified".
An "uncertified" status means that the source of the MIDlet could not be verified by the mobile phone at
installation time.
As far as the phone knows, the MIDlet could have been written by anyone.
A "certified" status means that the MIDlet was digitally signed by a known party, whose name is displayed by the
mobile phone.
Security permissions are different for "uncertified" or "certified" MIDlets.
Security configuration menu
When a MIDlet is installed in the mobile phone, default security authorizations are applied. This default security
configuration may be altered through the "Settings/Security" menu of an installed MIDlet.
Once in the "Security" menu, the security status of the MIDlet is displayed.
If you do not want to enter the security menu, simply select "Back" button. You can proceed by selecting "OK"
button.
The menu displayed allows you to increase or decrease permissions currently applied to the current MIDlet for
each of the security groups. When you set a more permissive authorization to a security group than the current
value, mobile phone asks you to confirm your increased risk exposure.
The maximum risk exposure increase is limited by the security
status.
What is Java™?
Business applications and games are easily downloadable by the end-
user on a Java™ featured handset.
Your mobile phone is a MIDP 2.0 compliant Java™ platform which implements WMA [SMS support] and MMAPI
[Multimedia support] options, providing an exciting environment to run highly graphical, networked and intuitive
MIDP applications.
Summary of Contents for LeDIX
Page 1: ...1 LeDIX User Guide...