7.1 O
VERVIEW
.................................................................................... 40
7.2 JSR-82 B
LUETOOTH
API ................................................................... 40
7.2.1 S
YSTEM
R
EQUIREMENTS
................................................................ 40
7.2.2 B
LUETOOTH
C
ONTROL
C
ENTER
......................................................... 41
7.2.3 D
EVICE
P
ROPERTY
T
ABLE
............................................................... 41
7.2.4 S
ERVICE
R
EGISTRATION
................................................................ 42
7.2.4.1 C
ONNECTABLE
M
ODE
................................................................. 42
7.2.4.2 N
ON
-C
ONNECTABLE
M
ODE
........................................................... 43
7.2.5 D
EVICE
M
ANAGEMENT
.................................................................. 43
7.2.5.1 G
ENERIC
A
CCESS
P
ROFILE
(GAP)................................................... 43
7.2.5.2 S
ECURITY
............................................................................. 43
7.2.6 C
OMMUNICATION
........................................................................ 43
7.2.6.1 S
ERIAL
P
ORT
P
ROFILE
(SPP)........................................................ 44
7.2.6.2 O
BJECT
E
XCHANGE
(OBEX) ......................................................... 44
7.2.7 S
ECURITY
P
OLICY
....................................................................... 45
7.2.8 E
XTERNAL
E
VENTS
...................................................................... 45
7.2.8.1 I
NCOMING
C
ALL
...................................................................... 45
7.2.8.2 I
NCOMING
M
ESSAGE
................................................................. 46
7.2.9 A
LARM
& D
ATEBOOK
B
EHAVIOUR
...................................................... 46
7.2.10 P
RESSING OF
E
ND
K
EY
............................................................... 46
7.2.11 H
ARDWARE
R
EQUIREMENTS
........................................................... 47
7.2.12 I
NTEROPERABILITY
R
EQUIREMENTS
................................................... 47
8 MIDP 2.0 Security Model ................................................................. 49
8.1 U
NTRUSTED
MID
LET
S
UITES
................................................................ 50
8.2 U
NTRUSTED
D
OMAIN
........................................................................ 50
8.3 T
RUSTED
MID
LET
S
UITES
................................................................... 51
8.4 P
ERMISSION
T
YPES CONCERNING THE
H
ANDSET
............................................ 51
8.5 U
SER
P
ERMISSION
I
NTERACTION
M
ODE
.................................................... 52
8.6 I
MPLEMENTATION BASED ON
R
ECOMMENDED
S
ECURITY
P
OLICY
............................ 53
8.7 T
RUSTED
3
RD
P
ARTY
D
OMAIN
............................................................... 53
8.8 S
ECURITY
P
OLICY FOR
P
ROTECTION
D
OMAINS
.............................................. 54
8.9 D
ISPLAYING OF
P
ERMISSIONS TO THE
U
SER
................................................ 57
8.10 T
RUSTED
MID
LET
S
UITES
U
SING X
.509 PKI ............................................ 57
8.11 S
IGNING A
MID
LET
S
UITE
................................................................. 58
8.12 S
IGNER OF
MID
LET
S
UITES
............................................................... 58
8.13 MID
LET
A
TTRIBUTES
U
SED IN
S
IGNING
MID
LET
S
UITES
................................ 58
8.14 C
REATING THE
S
IGNING
C
ERTIFICATE
..................................................... 59
8.15 I
NSERTING
C
ERTIFICATES INTO
JAD ...................................................... 59
8.16 C
REATING THE
RSA SHA-1
SIGNATURE OF THE
JAR .................................... 60
8.17 A
UTHENTICATING A
MID
LET
S
UITE
........................................................ 60
8.18 V
ERIFYING THE
S
IGNER
C
ERTIFICATE
..................................................... 61
8.19 V
ERIFYING THE
MID
LET
S
UITE
JAR....................................................... 62
8.20 C
ARRIER
S
PECIFIC
S
ECURITY
M
ODEL
...................................................... 63
9 JSR-120 - Wireless Messaging API.................................................... 64
9.1 W
IRELESS
M
ESSAGING
API (WMA)........................................................ 64
[3/201]
DRAFT - Subject to Change