Motorola HANDSET C381P User Manual
Page 5
Table of Contents
5
27 JAVA SYSTEM MENU
....................................................................................................................... 103
MID
LET
M
ANAGER
M
ENU
......................................................................................................................... 103
View MIDlet Suite Information
....................................................................................... 104
D
ELETING
MID
LET
S
UITES
.................................................................................................................... 104
28 INVISIBLE NET FOR J2ME
........................................................................................................ 107
I
NTRODUCTION
........................................................................................................................................ 107
J2ME
I
NVISIBLE
NET
O
PTIONS
.......................................................................................................... 107
J2ME Component Options
....................................................................................................... 107
J2ME Context-Sensitive Menu Options
......................................................................... 109
29 DOWNLOAD MIDLET THROUGH PC
............................................................................................... 111
E
STABLISHING
C
ONNECTION
................................................................................................................... 111
30 OPERATOR APPS PROVISIONING
............................................................................................... 112
31 MIDP 2.0 SECURITY MODEL
...................................................................................................... 113
U
NTRUSTED
MID
LET
S
UITES
.................................................................................................................. 114
U
NTRUSTED
D
OMAIN
................................................................................................................................ 114
T
RUSTED
MID
LET
S
UITES
..................................................................................................................... 115
P
ERMISSION
T
YPES CONCERNING THE
H
ANDSET
.................................................................................... 115
U
SER
P
ERMISSION
I
NTERACTION
M
ODE
................................................................................................. 115
I
MPLEMENTATION BASED ON
R
ECOMMENDED
S
ECURITY
P
OLICY
............................................................. 116
T
RUSTED
3
RD
P
ARTY
D
OMAIN
.................................................................................................................. 116
T
RUSTED
MID
LET
S
UITES
U
SING X
.509
PKI
................................................................................... 117
S
IGNING A
MID
LET
S
UITE
.................................................................................................................... 117
S
IGNER OF
MID
LET
S
UITES
.................................................................................................................. 118
MID
LET
A
TTRIBUTES
U
SED IN
S
IGNING
MID
LET
S
UITES
.................................................................. 118
C
REATING THE
S
IGNING
C
ERTIFICATE
................................................................................................. 118
I
NSERTING
C
ERTIFICATES INTO
JAD
.................................................................................................. 119
C
REATING THE
RSA
SHA-1
SIGNATURE OF THE
JAR
........................................................................ 119
A
UTHENTICATING A
MID
LET
S
UITE
...................................................................................................... 119
V
ERIFYING THE
S
IGNER
C
ERTIFICATE
................................................................................................. 119
V
ERIFYING THE
MID
LET
S
UITE
JAR
................................................................................................... 120
APPENDIX A: AUDIO MIX TABLE
.................................................................................................... 122
APPENDIX B: KEY MAPPING
............................................................................................................. 123
K
EY
M
APPING FOR THE
C381
P
............................................................................................................. 123
APPENDIX C: MEMORY MANAGEMENT CALCULATION
.................................................................. 125
A
VAILABLE
M
EMORY
................................................................................................................................ 125
APPENDIX D: FAQ
................................................................................................................................ 126
O
NLINE
FAQ
........................................................................................................................................... 126
APPENDIX E: HTTP RANGE
............................................................................................................... 127
G
RAPHIC
D
ESCRIPTION
........................................................................................................................... 127
APPENDIX F: SPEC SHEET
............................................................................................................... 128
C381
P
S
PEC
S
HEET
.............................................................................................................................. 128