Implementation Based On Recommended Security Policy; Trusted 3 Rd Party Domain - Motorola V3x Technical Manual

2 cameras; 320x240 display
Hide thumbs Also See for V3x:
Table of Contents

Advertisement

blanket – grants access to the protected API or function every time it is required by the
MIDlet suite until the MIDlet suite is uninstalled or the permission is changed by the user.
(Never Ask)
session – grants access to the protected API or function every time it is required by the
MIDlet suite until the MIDlet suite is terminated. This mode will prompt the user on or
before the final invocation of the protected API or function. (Ask Once Per App)
oneshot – will prompt the user each time the protected API or function is requested by the
MIDlet suite. (Always Ask)
No – will not allow the MIDlet suite access to the requested API or function that is
protected. (No Access)
The prompt No, Ask Later will be displayed during runtime dialogs and will enable the
user to not allow the protected function to be accessed this instance, but to ask the user
again the next time the protected function is called.
User permission interaction modes will be determined by the security policy and device
implementation. User permission will have a default interaction mode and a set of other
available interaction modes. The user should be presented with a choice of available
interaction modes, including the ability to deny access to the protected API or function.
The user will make their decision based on the user-friendly description of the requested
permissions provided for them.
The Permissions menu allows the user to configure permission settings for each MIDlet
when the VM is not running. This menu is synchronized with available run-time options.
Implementation based on Recommended Security
Policy
The required trust model, the supported domain, and their corresponding structure will be
contained in the default security policy for Motorola's implementation for MIDP 2.0.
Permissions will be defined for MIDlets relating to their domain. User permission types, as
well as user prompts and notifications, will also be defined.
Trusted 3
Party Domain
rd
A trusted third party protection domain root certificate is used to verify third party MIDlet
suites. These root certificates will be mapped to a location on the handset that cannot be
modified by the user. The storage of trusted third party protection domain root certificates
and operator protection domain root certificates in the handset is limited to 12 certificates.
If a certificate is not available on the handset, the third party protection domain root
certificates will be disabled. The user will have the ability to disable root certificates
through the browser menu and will be prompted to warn them of the consequences of
84

Advertisement

Table of Contents
loading

Table of Contents