Motorola C381P 用户手册

下载
页码 130
Table of Contents  
 
27 JAVA SYSTEM MENU
....................................................................................................................... 103
 
MID
LET 
M
ANAGER 
M
ENU
......................................................................................................................... 103
 
View MIDlet Suite Information
....................................................................................... 104
 
D
ELETING 
MID
LET 
S
UITES
.................................................................................................................... 104
 
28 INVISIBLE NET FOR J2ME
........................................................................................................ 107
 
I
NTRODUCTION
........................................................................................................................................ 107
 
J2ME
 
I
NVISIBLE 
NET
 
O
PTIONS
.......................................................................................................... 107
 
J2ME Component Options
....................................................................................................... 107
 
J2ME Context-Sensitive Menu Options
......................................................................... 109
 
29 DOWNLOAD MIDLET THROUGH PC
............................................................................................... 111
 
E
STABLISHING 
C
ONNECTION
................................................................................................................... 111
 
30 OPERATOR APPS PROVISIONING
............................................................................................... 112
 
31 MIDP 2.0 SECURITY MODEL
...................................................................................................... 113
 
U
NTRUSTED 
MID
LET 
S
UITES
.................................................................................................................. 114
 
U
NTRUSTED 
D
OMAIN
................................................................................................................................ 114
 
T
RUSTED 
MID
LET 
S
UITES
..................................................................................................................... 115
 
P
ERMISSION 
T
YPES CONCERNING THE 
H
ANDSET
.................................................................................... 115
 
U
SER 
P
ERMISSION 
I
NTERACTION 
M
ODE
................................................................................................. 115
 
I
MPLEMENTATION BASED ON 
R
ECOMMENDED 
S
ECURITY 
P
OLICY
............................................................. 116
 
T
RUSTED 
3
RD
 
P
ARTY 
D
OMAIN
.................................................................................................................. 116
 
T
RUSTED 
MID
LET 
S
UITES 
U
SING X
.509
 
PKI
................................................................................... 117
 
S
IGNING A 
MID
LET 
S
UITE
.................................................................................................................... 117
 
S
IGNER OF 
MID
LET 
S
UITES
.................................................................................................................. 118
 
MID
LET 
A
TTRIBUTES 
U
SED IN 
S
IGNING 
MID
LET 
S
UITES
.................................................................. 118
 
C
REATING THE 
S
IGNING 
C
ERTIFICATE
................................................................................................. 118
 
I
NSERTING 
C
ERTIFICATES INTO 
JAD
.................................................................................................. 119
 
C
REATING THE 
RSA
 
SHA-1
 SIGNATURE OF THE 
JAR
........................................................................ 119
 
A
UTHENTICATING A 
MID
LET 
S
UITE
...................................................................................................... 119
 
V
ERIFYING THE 
S
IGNER 
C
ERTIFICATE
................................................................................................. 119
 
V
ERIFYING THE 
MID
LET 
S
UITE 
JAR
................................................................................................... 120
 
APPENDIX A: AUDIO MIX TABLE
.................................................................................................... 122
 
APPENDIX B: KEY MAPPING
............................................................................................................. 123
 
K
EY 
M
APPING FOR THE 
C381
P
............................................................................................................. 123
 
APPENDIX C: MEMORY MANAGEMENT CALCULATION
.................................................................. 125
 
A
VAILABLE 
M
EMORY
................................................................................................................................ 125
 
APPENDIX D: FAQ
................................................................................................................................ 126
 
O
NLINE 
FAQ
........................................................................................................................................... 126
 
APPENDIX E: HTTP RANGE
............................................................................................................... 127
 
G
RAPHIC 
D
ESCRIPTION
........................................................................................................................... 127
 
APPENDIX F: SPEC SHEET
............................................................................................................... 128
 
C381
S
PEC 
S
HEET
.............................................................................................................................. 128