4
setDialerListener
.....................................................................................................................
75
startCall
........................................................................................................................................
75
startCall
........................................................................................................................................
76
sendExtNo
........................................................................................................................................
76
endCall
.............................................................................................................................................
76
I
NTERFACE
D
IALER
L
ISTENER
...................................................................................................................
77
S
AMPLE
D
IALER
L
ISTENER
I
MPLEMENTATION
...........................................................................................
77
notifyDialerEvent
.....................................................................................................................
79
C
LASS
H
IERARCHY
....................................................................................................................................
79
I
NTERFACE
H
IERARCHY
.............................................................................................................................
79
18 DRM PROTECTION IN JAVA
..........................................................................................................
80
O
VERVIEW
..................................................................................................................................................
80
R
IGHTS
E
NFORCEMENT
-
MID
LETS
A
CCESSING
DRM
PROTECTED CONTENT
...........................................
80
A
CQUIRING
L
ICENSE
................................................................................................................................
80
19 CLDC 1.1
............................................................................................................................................
81
CLDC
1.1
C
OMPLIANCE
..........................................................................................................................
81
20 JTWI
.....................................................................................................................................................
86
O
VERVIEW
..................................................................................................................................................
86
CLDC
RELATED CONTENT FOR
JTWI
.......................................................................................................
87
MIDP
2.0
SPECIFIC INFORMATION FOR
JTWI
....................................................................................
88
W
IRELESS
M
ESSAGING
API
1.1
(JSR
120)
SPECIFIC CONTENT FOR
JTWI
..................................
89
M
OBILE
M
EDIA
API
1.1
(JSR
135)
SPECIFIC CONTENT FOR
JTWI
..............................................
90
MIDP
2.0
S
ECURITY SPECIFIC CONTENT FOR
JTWI
..........................................................................
90
21 MIDP 2.0 SECURITY MODEL
........................................................................................................
91
U
NTRUSTED
MID
LET
S
UITES
....................................................................................................................
92
U
NTRUSTED
D
OMAIN
..................................................................................................................................
92
T
RUSTED
MID
LET
S
UITES
.......................................................................................................................
93
P
ERMISSION
T
YPES CONCERNING THE
H
ANDSET
......................................................................................
93
U
SER
P
ERMISSION
I
NTERACTION
M
ODE
...................................................................................................
93
I
MPLEMENTATION BASED ON
R
ECOMMENDED
S
ECURITY
P
OLICY
...............................................................
94
T
RUSTED
3
RD
P
ARTY
D
OMAIN
....................................................................................................................
94
T
RUSTED
MID
LET
S
UITES
U
SING X
.509
PKI
.....................................................................................
95
S
IGNING A
MID
LET
S
UITE
......................................................................................................................
96
S
IGNER OF
MID
LET
S
UITES
....................................................................................................................
96
MID
LET
A
TTRIBUTES
U
SED IN
S
IGNING
MID
LET
S
UITES
....................................................................
96
C
REATING THE
S
IGNING
C
ERTIFICATE
...................................................................................................
96
I
NSERTING
C
ERTIFICATES INTO
JAD
....................................................................................................
97
C
REATING THE
RSA
SHA-1
SIGNATURE OF THE
JAR
..........................................................................
97
A
UTHENTICATING A
MID
LET
S
UITE
........................................................................................................
97
V
ERIFYING THE
S
IGNER
C
ERTIFICATE
...................................................................................................
98
V
ERIFYING THE
MID
LET
S
UITE
JAR
.....................................................................................................
98
APPENDIX A: AUDIO MIX TABLE
....................................................................................................
100
APPENDIX B: KEY MAPPING
.............................................................................................................
101
K
EY
M
APPING FOR THE
E680
...............................................................................................................
101
APPENDIX C: MEMORY MANAGEMENT CALCULATION
..................................................................
102