
4
setDialerListener ..................................................................................................................... 75
startCall ........................................................................................................................................ 75
startCall ........................................................................................................................................ 76
sendExtNo ........................................................................................................................................ 76
endCall............................................................................................................................................. 76
INTERFACE DIALERLISTENER................................................................................................................... 77
SAMPLE DIALERLISTENER IMPLEMENTATION ........................................................................................... 77
notifyDialerEvent ..................................................................................................................... 79
CLASS HIERARCHY .................................................................................................................................... 79
INTERFACE HIERARCHY............................................................................................................................. 79
18 DRM PROTECTION IN JAVA .......................................................................................................... 80
OVERVIEW .................................................................................................................................................. 80
RIGHTS ENFORCEMENT -MIDLETS ACCESSING DRM PROTECTED CONTENT........................................... 80
ACQUIRING LICENSE ................................................................................................................................80
19 CLDC 1.1............................................................................................................................................ 81
CLDC 1.1 COMPLIANCE.......................................................................................................................... 81
20 JTWI..................................................................................................................................................... 86
OVERVIEW .................................................................................................................................................. 86
CLDC RELATED CONTENT FOR JTWI....................................................................................................... 87
MIDP 2.0 SPECIFIC INFORMATION FOR JTWI .................................................................................... 88
WIRELESS MESSAGING API 1.1 (JSR 120) SPECIFIC CONTENT FOR JTWI.................................. 89
MOBILE MEDIA API 1.1 (JSR 135) SPECIFIC CONTENT FOR JTWI.............................................. 90
MIDP 2.0 SECURITY SPECIFIC CONTENT FOR JTWI .......................................................................... 90
21 MIDP 2.0 SECURITY MODEL........................................................................................................ 91
UNTRUSTED MIDLET SUITES.................................................................................................................... 92
UNTRUSTED DOMAIN .................................................................................................................................. 92
TRUSTED MIDLET SUITES ....................................................................................................................... 93
PERMISSION TYPES CONCERNING THE HANDSET ...................................................................................... 93
USER PERMISSION INTERACTION MODE................................................................................................... 93
IMPLEMENTATION BASED ON RECOMMENDED SECURITY POLICY............................................................... 94
TRUSTED 3RD PARTY DOMAIN.................................................................................................................... 94
TRUSTED MIDLET SUITES USING X.509 PKI..................................................................................... 95
SIGNING A MIDLET SUITE...................................................................................................................... 96
SIGNER OF MIDLET SUITES.................................................................................................................... 96
MIDLET ATTRIBUTES USED IN SIGNING MIDLET SUITES.................................................................... 96
CREATING THE SIGNING CERTIFICATE ................................................................................................... 96
INSERTING CERTIFICATES INTO JAD .................................................................................................... 97
CREATING THE RSA SHA-1 SIGNATURE OF THE JAR.......................................................................... 97
AUTHENTICATING A MIDLET SUITE ........................................................................................................ 97
VERIFYING THE SIGNER CERTIFICATE ................................................................................................... 98
VERIFYING THE MIDLET SUITE JAR..................................................................................................... 98
APPENDIX A: AUDIO MIX TABLE.................................................................................................... 100
APPENDIX B: KEY MAPPING............................................................................................................. 101
KEY MAPPING FOR THE E680 ............................................................................................................... 101
APPENDIX C: MEMORY MANAGEMENT CALCULATION.................................................................. 102