background image

 

39 

 

When running a Java™ application, you may be prompted to grant access to protected features. These features 
are  protected  because  using  them  could  incur  you  cost,  or involve  your  personal  data.  In  case  of  doubt,  don't 
hesitate to refuse access by selecting the "No" button! 
The  security  configuration  menu  is  an  expert  feature!  You  must  know  exactly  what  you  are  doing  before 
attempting to change security parameters of a MIDlet. 
 
Misunderstanding changes may render MIDlet non functional and/or lead to higher risks for your private data or 
impact your airtime consumption. Any changes in the security configuration are done under your responsibility. In 
no case shall Celsius X VI II and/or your network provider be liable for any damages deriving from or arising out of 
such changes in the security configuration. 
You must be aware that applications downloaded to your phone could cause the phone to perform actions for 
which you will be billed, like making calls and sending SMS. Depending on your operator's billing policy, you may 
also be charged to download the application because of airtime consumption. 
Security considerations Java™ MIDP technology is an efficient way to provide 
powerful applications in mobile phones. 
All these MIDP 2.0 features cannot be simply exposed to any MIDlet installed in the handset: a careful access 
control system is implemented in the device to protect your private data and airtime consumption. 
 
 
Access controls are gathered in 9 security groups: 
– Network access 
– Auto invocation 
– Phone call 
– Local connectivity 
– Messaging receive 
– Messaging sending 
– Read User data 
– Write User data 
– Multimedia recording 
Each of these security groups has one among 5 possible authorizations levels [listed from the more restrictive to 
the more permissive]: 
– Never: The security group completely prevents access to the protected features. 
– Per use: Each time MIDlet tries to use protected feature, user is prompted to grant access. 
– Per session: First time a MIDlet uses a protected function, user is prompted to grant access like in "Per use" 
authorization but access is granted until the MIDlet terminates. 
– Single confirmation: The first time in the whole MIDlet life a MIDlet uses a protected feature, user is prompted to 
grant access. It remains valid until the MIDlet is removed from the handset. 
– Always: The security group unconditionally grants access to protected features. 
A MIDlet has a security status which is either "uncertified", or else "certified". 
An  "uncertified"  status  means  that  the  source  of  the  MIDlet  could  not  be  verified  by  the  mobile  phone  at 
installation time. 
As far as the phone knows, the MIDlet could have been written by anyone. 
A "certified" status means that the MIDlet was digitally signed by a known party, whose name is displayed by the 
mobile phone. 
Security permissions are different for "uncertified" or "certified" MIDlets. 
 

Security configuration menu 

When a MIDlet is installed in the mobile phone, default security authorizations are applied. This default security 
configuration may be altered through the "Settings/Security" menu of an installed MIDlet. 
Once in the "Security" menu, the security status of the MIDlet is displayed. 
If you do not want to enter the security menu, simply select "Back" button. You can proceed by selecting "OK" 
button. 
The menu displayed allows you to increase or decrease permissions currently applied to the current MIDlet for 
each of the security groups. When you set a more permissive authorization to a security group than the current 
value, mobile phone asks you to confirm your increased risk exposure. 
 
The maximum risk exposure increase is limited by the security 
status. 
 
 
What is Java™? 
 
Business applications and games are easily downloadable by the end-

user on a Java™ featured handset. 

Your mobile phone is a MIDP 2.0 compliant Java™ platform which implements WMA [SMS support] and MMAPI 
[Multimedia support]  options, providing  an  exciting  environment  to run  highly  graphical,  networked  and intuitive 
MIDP applications. 
 

Summary of Contents for LeDIX

Page 1: ...1 LeDIX User Guide...

Page 2: ...tents 1 Introduction 3 2 Quick start 7 3 Phone menus 14 4 Calls 15 5 Contacts 17 6 Messages 19 7 Camera and Tools 21 8 Connection functions 24 9 Phone customization 26 10 Other functions 30 11 Appendi...

Page 3: ...LeDIX and Remontage Papillon are registered trademarks T9 Text Input is a trademark of Tegic Communications Inc Java and all Java based trademarks and logos are trademarks or registered trademarks of...

Page 4: ...3 mode Long press activate deactivate T9 mode 4 5 keys navigator Outcentered keys navigation through menus Central key confirmation of a selection 5 Right contextual key In idle screen shortcut to set...

Page 5: ...the knob 1 to open the connector cover 2 2 Connector cover 3 Flash 4 Camera lens 5 Microphone for video mode 6 SIM cover 7 Button to open the battery cover 8 and SIM cover 6 8 Battery cover Left view...

Page 6: ...1 Pull the crown to setup the mechanical clock 2 Minute hand 3 Hour hand 4 Power reserve hand 5 Excentred Tourbillon complication 6 Hinge open and close the mobile phone in order to wind up the mecha...

Page 7: ...ach of young children Your phone is identified by its IMEI number Write this number down and do not keep it with your phone because you may be asked for it in the event of your phone being stolen in o...

Page 8: ...ady in the SIM rack only the battery cover opens Step 3 Push again on the ejection Button 2 and in the same time use the notch as a lever to lift the Cover 3 Step 4 Insert the SIM card inside the SIM...

Page 9: ...9 Step 5 Push the ejection button 5 and close se SIM cover 6 Step 6 7 Close the battery cover by pushing in the corner as shown on the phone drawing...

Page 10: ...l Warning if the battery has entirely discharged the phone cannot start Plug the phone to the charger The phone will switch on after a few minutes of charge You can use the phone again when the Start...

Page 11: ...over at the bottom To increase the performance of your phone please avoid putting your fingers on this area when using the phone 2 4 2 Increasing the battery life of your phone The Bluetooth function...

Page 12: ...contacts memory Warning if a wrong PIN is entered three times in a row your SIM card is blocked You must then 1 Enter the PUK Personal Unblocking Key provided by your operator and validate 2 Enter yo...

Page 13: ...tch is to open and close the cell phone One opening adds 3 hours of power reserve to the mechanical clock The maximum power reserve of the watch is about 100 hours 2 6 3 Care and Maintenance The tourb...

Page 14: ...tbox Drafts Templates Settings Memory Local info Voice mail Lists of contacts 3 Contacts Contacts Lists 4 Calls Dialed Missed Received Durations 5 Tools Files Settings Celsius X VI II Alarm Diary Calc...

Page 15: ...nd confirm or press Options and select Amplified mode ON then confirm Warning in this mode do not bring the phone up to your ear All the numbers corresponding to incoming and outgoing calls are logged...

Page 16: ...call warning 4 4 5 Auto redial This service automatically calls back a correspondent you could not reach at first attempt You can set the redial function to inactive on request or systematic If you c...

Page 17: ...ct and press the green key to start the call Select a contact press the navigator central key to display it press Call to start the call Direct call from the idle screen only for the contacts stored i...

Page 18: ...hat point you may use the Business Card option to read it modify it send it by a message or exchange it by Bluetooth 5 4 11 Add to mailing list This option adds a contact to a mailing list so that you...

Page 19: ...ey to validate it or press the 0 key which validates and inserts a space after the word and go on writing the next word If the word you expected is not proposed please add characters until you get the...

Page 20: ...irst The number of Not Read and Not Retrieved messages is displayed on the top The corresponding messages titles are displayed in bold 6 5 2 Outbox The Outbox lists the messages that have not been sen...

Page 21: ...to the icon And then use the navigation buttons to choose an option Applications Flash Photo format Photo quality Focus Saving location Click sound Timer Modes Effects or Exposure Then navigate up dow...

Page 22: ...any function of your mobile phone while still listening to music in the background Just play music quit the Player and answer Yes You can download music by connecting your phone to a PC using a USB c...

Page 23: ...isplay to the camera position see chapter Camera 7 2 4 Accessories You can as well listen to music using the integrated stereo speakers 7 3 Files The Files menu contains all your files and directories...

Page 24: ...period is defined by the linger time setting 8 3 Local Connections You can exchange various data with other devices PC mobile phones printers etc such as photos videos music To do tasks Diary entries...

Page 25: ...rt the pairing operation again if you need this device later Rename lets you modify the name of the device Delete all deletes all your devices Warning using this function requires you to start the pai...

Page 26: ...te If a call comes in during an exchange of data with your PC the link will be interrupted and will have to be manually re started 8 3 3 Car kit or headset This menu allows you to configure the behavi...

Page 27: ...t to select it as your phone wallpaper or press the navigator up down key to display the others 9 2 2 Skins This menu allows you to select the background picture when displaying menus 9 2 3 Screensave...

Page 28: ...ou activate or not the torch when recording a video 9 4 4 Storage This menu allows you to format the phone memory or memory card to select where the files are saved phone memory or memory card 9 5 Cal...

Page 29: ...incoming calls will be blocked Select Activation and enter password 9 6 6 Fixed dialing This menu allows you to restrict the outgoing calls The availability of this menu depends on your SIM card Proc...

Page 30: ...s you to display the different entry categories assign a specific ring tone to each individual category display the number of entries in each category and display them The other menus are See month di...

Page 31: ...w message that contains the To do properties so that you can send them to another correspondent Send By Bluetooth sends the To do by Bluetooth Export copies the To do properties in a text file that yo...

Page 32: ...rator reservations Compatible profiles for accessories File transfer FTP Stereo headset AADP AVRCP Car kit Headset Hands free kit HSP and HFP Object transfer OPP Modem SPP DUNP Using temperature from...

Page 33: ...MODEL PHONE MEETS THE FCC S REQUIREMENTS FOR EXPOSURE TO RADIO WAVES Your wireless phone is a radio transmitter and receiver It is designed and manufactured not to exceed the limits for exposure to ra...

Page 34: ...pacemaker To achieve this use the phone on the opposite ear to your pace maker and do not carry it in a breast pocket For hearing aids Some digital wireless phones may interfere with some hearing aid...

Page 35: ...do the wireless phones themselves the RF exposures that people get from these base stations are typically thousands of times lower than those they can get from wireless phones Base stations are thus n...

Page 36: ...ompensate leading to an increase in RF absorption Driving safety tips Wireless phones give people the ability to communicate almost anywhere anytime But an important responsibility accompanies those b...

Page 37: ...to time request manufacturers or SOFTWARE SUPPLIERS to provide security related updates to the DRM components of the SOFTWARE Security Updates that may affect your ability to copy display and or play...

Page 38: ...n your initial copy of the SOFTWARE Supplemental Components If the MANUFACTURER provides or makes available to you Supplemental Components and no other EULA terms are provided along with the Supplemen...

Page 39: ...se protected feature user is prompted to grant access Per session First time a MIDlet uses a protected function user is prompted to grant access like in Per use authorization but access is granted unt...

Page 40: ...service provider or their affiliates be liable for any lost profits or costs of procurement of substitute goods or services loss of profits interruptions of business loss of data or for any special in...

Page 41: ...ed purpose and under normal conditions Under this warranty your product will be exchanged or repaired free of charge at Celsius X VI II s convenience Include a copy of proof of purchase of the equipme...

Reviews: