Motorola E680 Technical Manual - Page 4

Drm Protection In Java, Cldc 1.1, Midp 2.0 Security Model, Appendix A: Audio Mix Table, Appendix B: - specific

Page 4 highlights

setDialerListener ...75 startCall ...75 startCall ...76 sendExtNo ...76 endCall ...76 INTERFACE DIALERLISTENER...77 SAMPLE DIALERLISTENER IMPLEMENTATION 77 notifyDialerEvent ...79 CLASS HIERARCHY ...79 INTERFACE HIERARCHY...79 18 DRM PROTECTION IN JAVA ...80 OVERVIEW ...80 RIGHTS ENFORCEMENT - MIDLETS ACCESSING DRM PROTECTED CONTENT 80 ACQUIRING LICENSE ...80 19 CLDC 1.1...81 CLDC 1.1 COMPLIANCE...81 20 JTWI ...86 OVERVIEW ...86 CLDC RELATED CONTENT FOR JTWI...87 MIDP 2.0 SPECIFIC INFORMATION FOR JTWI 88 WIRELESS MESSAGING API 1.1 (JSR 120) SPECIFIC CONTENT FOR JTWI 89 MOBILE MEDIA API 1.1 (JSR 135) SPECIFIC CONTENT FOR JTWI 90 MIDP 2.0 SECURITY SPECIFIC CONTENT FOR JTWI 90 21 MIDP 2.0 SECURITY MODEL...91 UNTRUSTED MIDLET SUITES...92 UNTRUSTED DOMAIN ...92 TRUSTED MIDLET SUITES ...93 PERMISSION TYPES CONCERNING THE HANDSET 93 USER PERMISSION INTERACTION MODE 93 IMPLEMENTATION BASED ON RECOMMENDED SECURITY POLICY 94 TRUSTED 3RD PARTY DOMAIN...94 TRUSTED MIDLET SUITES USING X.509 PKI 95 SIGNING A MIDLET SUITE...96 SIGNER OF MIDLET SUITES...96 MIDLET ATTRIBUTES USED IN SIGNING MIDLET SUITES 96 CREATING THE SIGNING CERTIFICATE 96 INSERTING CERTIFICATES INTO JAD ...97 CREATING THE RSA SHA-1 SIGNATURE OF THE JAR 97 AUTHENTICATING A MIDLET SUITE ...97 VERIFYING THE SIGNER CERTIFICATE 98 VERIFYING THE MIDLET SUITE JAR...98 APPENDIX A: AUDIO MIX TABLE...100 APPENDIX B: KEY MAPPING ...101 KEY MAPPING FOR THE E680 ...101 APPENDIX C: MEMORY MANAGEMENT CALCULATION 102 4

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107

4
setDialerListener
.....................................................................................................................
75
startCall
........................................................................................................................................
75
startCall
........................................................................................................................................
76
sendExtNo
........................................................................................................................................
76
endCall
.............................................................................................................................................
76
I
NTERFACE
D
IALER
L
ISTENER
...................................................................................................................
77
S
AMPLE
D
IALER
L
ISTENER
I
MPLEMENTATION
...........................................................................................
77
notifyDialerEvent
.....................................................................................................................
79
C
LASS
H
IERARCHY
....................................................................................................................................
79
I
NTERFACE
H
IERARCHY
.............................................................................................................................
79
18 DRM PROTECTION IN JAVA
..........................................................................................................
80
O
VERVIEW
..................................................................................................................................................
80
R
IGHTS
E
NFORCEMENT
-
MID
LETS
A
CCESSING
DRM
PROTECTED CONTENT
...........................................
80
A
CQUIRING
L
ICENSE
................................................................................................................................
80
19 CLDC 1.1
............................................................................................................................................
81
CLDC
1.1
C
OMPLIANCE
..........................................................................................................................
81
20 JTWI
.....................................................................................................................................................
86
O
VERVIEW
..................................................................................................................................................
86
CLDC
RELATED CONTENT FOR
JTWI
.......................................................................................................
87
MIDP
2.0
SPECIFIC INFORMATION FOR
JTWI
....................................................................................
88
W
IRELESS
M
ESSAGING
API
1.1
(JSR
120)
SPECIFIC CONTENT FOR
JTWI
..................................
89
M
OBILE
M
EDIA
API
1.1
(JSR
135)
SPECIFIC CONTENT FOR
JTWI
..............................................
90
MIDP
2.0
S
ECURITY SPECIFIC CONTENT FOR
JTWI
..........................................................................
90
21 MIDP 2.0 SECURITY MODEL
........................................................................................................
91
U
NTRUSTED
MID
LET
S
UITES
....................................................................................................................
92
U
NTRUSTED
D
OMAIN
..................................................................................................................................
92
T
RUSTED
MID
LET
S
UITES
.......................................................................................................................
93
P
ERMISSION
T
YPES CONCERNING THE
H
ANDSET
......................................................................................
93
U
SER
P
ERMISSION
I
NTERACTION
M
ODE
...................................................................................................
93
I
MPLEMENTATION BASED ON
R
ECOMMENDED
S
ECURITY
P
OLICY
...............................................................
94
T
RUSTED
3
RD
P
ARTY
D
OMAIN
....................................................................................................................
94
T
RUSTED
MID
LET
S
UITES
U
SING X
.509
PKI
.....................................................................................
95
S
IGNING A
MID
LET
S
UITE
......................................................................................................................
96
S
IGNER OF
MID
LET
S
UITES
....................................................................................................................
96
MID
LET
A
TTRIBUTES
U
SED IN
S
IGNING
MID
LET
S
UITES
....................................................................
96
C
REATING THE
S
IGNING
C
ERTIFICATE
...................................................................................................
96
I
NSERTING
C
ERTIFICATES INTO
JAD
....................................................................................................
97
C
REATING THE
RSA
SHA-1
SIGNATURE OF THE
JAR
..........................................................................
97
A
UTHENTICATING A
MID
LET
S
UITE
........................................................................................................
97
V
ERIFYING THE
S
IGNER
C
ERTIFICATE
...................................................................................................
98
V
ERIFYING THE
MID
LET
S
UITE
JAR
.....................................................................................................
98
APPENDIX A: AUDIO MIX TABLE
....................................................................................................
100
APPENDIX B: KEY MAPPING
.............................................................................................................
101
K
EY
M
APPING FOR THE
E680
...............................................................................................................
101
APPENDIX C: MEMORY MANAGEMENT CALCULATION
..................................................................
102