beautypg.com

Motorola HANDSET C381P User Manual

Page 5

background image

Table of Contents

5

27 JAVA SYSTEM MENU

....................................................................................................................... 103

MID

LET

M

ANAGER

M

ENU

......................................................................................................................... 103

View MIDlet Suite Information

....................................................................................... 104

D

ELETING

MID

LET

S

UITES

.................................................................................................................... 104

28 INVISIBLE NET FOR J2ME

........................................................................................................ 107

I

NTRODUCTION

........................................................................................................................................ 107

J2ME

I

NVISIBLE

NET

O

PTIONS

.......................................................................................................... 107

J2ME Component Options

....................................................................................................... 107

J2ME Context-Sensitive Menu Options

......................................................................... 109

29 DOWNLOAD MIDLET THROUGH PC

............................................................................................... 111

E

STABLISHING

C

ONNECTION

................................................................................................................... 111

30 OPERATOR APPS PROVISIONING

............................................................................................... 112

31 MIDP 2.0 SECURITY MODEL

...................................................................................................... 113

U

NTRUSTED

MID

LET

S

UITES

.................................................................................................................. 114

U

NTRUSTED

D

OMAIN

................................................................................................................................ 114

T

RUSTED

MID

LET

S

UITES

..................................................................................................................... 115

P

ERMISSION

T

YPES CONCERNING THE

H

ANDSET

.................................................................................... 115

U

SER

P

ERMISSION

I

NTERACTION

M

ODE

................................................................................................. 115

I

MPLEMENTATION BASED ON

R

ECOMMENDED

S

ECURITY

P

OLICY

............................................................. 116

T

RUSTED

3

RD

P

ARTY

D

OMAIN

.................................................................................................................. 116

T

RUSTED

MID

LET

S

UITES

U

SING X

.509

PKI

................................................................................... 117

S

IGNING A

MID

LET

S

UITE

.................................................................................................................... 117

S

IGNER OF

MID

LET

S

UITES

.................................................................................................................. 118

MID

LET

A

TTRIBUTES

U

SED IN

S

IGNING

MID

LET

S

UITES

.................................................................. 118

C

REATING THE

S

IGNING

C

ERTIFICATE

................................................................................................. 118

I

NSERTING

C

ERTIFICATES INTO

JAD

.................................................................................................. 119

C

REATING THE

RSA

SHA-1

SIGNATURE OF THE

JAR

........................................................................ 119

A

UTHENTICATING A

MID

LET

S

UITE

...................................................................................................... 119

V

ERIFYING THE

S

IGNER

C

ERTIFICATE

................................................................................................. 119

V

ERIFYING THE

MID

LET

S

UITE

JAR

................................................................................................... 120

APPENDIX A: AUDIO MIX TABLE

.................................................................................................... 122

APPENDIX B: KEY MAPPING

............................................................................................................. 123

K

EY

M

APPING FOR THE

C381

P

............................................................................................................. 123

APPENDIX C: MEMORY MANAGEMENT CALCULATION

.................................................................. 125

A

VAILABLE

M

EMORY

................................................................................................................................ 125

APPENDIX D: FAQ

................................................................................................................................ 126

O

NLINE

FAQ

........................................................................................................................................... 126

APPENDIX E: HTTP RANGE

............................................................................................................... 127

G

RAPHIC

D

ESCRIPTION

........................................................................................................................... 127

APPENDIX F: SPEC SHEET

............................................................................................................... 128

C381

P

S

PEC

S

HEET

.............................................................................................................................. 128