4
O
VERVIEW
.................................................................................................................................................. 74
JSR-82
B
LUETOOTH
API
....................................................................................................................... 74
System Requirements
................................................................................................................. 74
Bluetooth Control Center
..................................................................................................... 75
Device Property Table
............................................................................................................ 75
Service Registration
.............................................................................................................. 76
Device Management
..................................................................................................................... 76
Communication
............................................................................................................................... 77
Security Policy
.......................................................................................................................... 78
External Events
.......................................................................................................................... 79
Alarm & Datebook Behaviour
................................................................................................ 79
Pressing of End Key
................................................................................................................. 80
Hardware Requirements
............................................................................................................ 80
Interoperability Requirements
......................................................................................... 80
13 MIDP 2.0 SECURITY MODEL
........................................................................................................ 81
U
NTRUSTED
MID
LET
S
UITES
.................................................................................................................... 82
U
NTRUSTED
D
OMAIN
.................................................................................................................................. 82
T
RUSTED
MID
LET
S
UITES
....................................................................................................................... 83
P
ERMISSION
T
YPES CONCERNING THE
H
ANDSET
...................................................................................... 83
U
SER
P
ERMISSION
I
NTERACTION
M
ODE
................................................................................................... 83
I
MPLEMENTATION BASED ON
R
ECOMMENDED
S
ECURITY
P
OLICY
............................................................... 84
T
RUSTED
3
RD
P
ARTY
D
OMAIN
.................................................................................................................... 84
S
ECURITY
P
OLICY FOR
P
ROTECTION
D
OMAINS
........................................................................................ 86
D
ISPLAYING OF
P
ERMISSIONS TO THE
U
SER
.......................................................................................... 88
T
RUSTED
MID
LET
S
UITES
U
SING X
.509
PKI
..................................................................................... 88
S
IGNING A
MID
LET
S
UITE
...................................................................................................................... 88
S
IGNER OF
MID
LET
S
UITES
.................................................................................................................... 88
MID
LET
A
TTRIBUTES
U
SED IN
S
IGNING
MID
LET
S
UITES
.................................................................... 89
C
REATING THE
S
IGNING
C
ERTIFICATE
................................................................................................... 89
I
NSERTING
C
ERTIFICATES INTO
JAD
.................................................................................................... 89
C
REATING THE
RSA
SHA-1
SIGNATURE OF THE
JAR
.......................................................................... 90
A
UTHENTICATING A
MID
LET
S
UITE
........................................................................................................ 90
V
ERIFYING THE
S
IGNER
C
ERTIFICATE
................................................................................................... 90
V
ERIFYING THE
MID
LET
S
UITE
JAR
..................................................................................................... 91
C
ARRIER
S
PECIFIC
S
ECURITY
M
ODEL
..................................................................................................... 92
B
OUND
C
ERTIFICATES
............................................................................................................................... 92
14 PREVENT DOWNLOADING OF LARGE JAVA MIDLETS
........................................................... 95
O
VERVIEW
.................................................................................................................................................. 95
N
OTIFICATION
.......................................................................................................................................... 96
B
ACKWARD
C
OMPATIBILITY
/F
LEXING
....................................................................................................... 96
15 LAUNCH NATIVE STREAMING VIDEO CLIENT FROM JAVA APPLICATION
..................... 97
Overview
........................................................................................................................................... 97
New Implementation
................................................................................................................... 97
16 JSR 139 – CLDC 1.1
.................................................................................................................... 98
JSR
139
.................................................................................................................................................. 98
APPENDIX A: KEY MAPPING
............................................................................................................. 102
K
EY
M
APPING FOR THE
V3
X
.................................................................................................................. 102