Siemens TC65 manual Application and Data Protection

Page 76

TC65 JAVA User's Guide

s

Strictly confidential / Released

 

11.3Application and Data Protection

In addition to the Java secured mode it is possible to prevent the activation of the Module Exchange Suite. When Module Exchange Suite access is deactivated with at^sjsec, it is no longer possible to access to the Flash file system on the module.

11.4Structure and Description of the Java Security Commands

Special commands are used in t he Java security environment. These commands are transferred to the module with the help of the special AT command at^sjec. This command makes it possible to send binary data to the module. After at^sjsec is issued, the module changes into a block transfer mode. Now binary data in a fixed format can be sent. These binary data contain the actual Java security commands.

TC65 JAVA User's Guide_V05

Page 76 of 90

26.09.2005

Image 76 Contents
Java Users Guide Document Name TC65 Java Users Guide TC65 Java Users GuideSeptember 26 TC65 Java Users GuideV05Table of Contents Maintenance 3.3.2Debug Environment Compile and Run a Program without a Java IDEJava Security Java Tutorial Differences from the TC45Sun Java Studio Mobility 6 Switching Emulators TablesPreamble Overview New solutionRelated Documents Terms and Abbreviations Abbreviation DescriptionInstallation CD InstallationSystem Requirements Components Module Exchange Suite1.2 WTK SDK and Java StudioInstalling the Standard Development Toolkit Siemens Mobility Toolkit InstallationInstalling the Smtk Environment Installing Eclipse Installing Borland JBuilder X Installing Sun Java Studio MobilityInstalling Module Exchange Suite MES Smtk Uninstall UpgradesSoftware Platform Software ArchitectureInterfaces 1 ASC0 Serial Device General Purpose I/O3 DAC/ADC 4 ASC1JVM Interfaces IP NetworkingMedia Other InterfacesData Flow of a Java Application Running on the Module ADCHandling Interfaces and Data Service Resources Module StatesState 1 Default No Java Running State 4 Default Java Application ActiveState 2 No Java Running, General Purpose I/O and I2C State 3 No Java Running, General Purpose I/O and SPIState 5 Java Application Active, General Purpose I/O and I2C Module State Transitions Maintenance IP ServicePower Saving ChargingAirplane Mode AlarmShutdown Automatic ShutdownRestart after Switch Off Special AT Command Set for Java ApplicationsSwitching from Data Mode to Command Mode Mode Indication after MIDlet StartupConfiguration of Serial Interface Java CommandsRestrictions Flash File System MemoryPerformance JavaFrequencyB 1 / frequencyA Duration of each loop = 600 sPin I/O Data Rates on RS-232 APIPlain Serial Interface Voice Call in ParallelScenarios with Gprs Connection Upload75% 63% 55% 33% 65% 55% 33% 16%91% 87% 81% 73% Download85% 78% 58% 48% MIDlets MIDlet Documentation MIDlet Life CycleMIDlet.destroyApp method Hello World MIDlet Here is a sample HelloWorld programCommand Line Based File Transfer to ModuleModule Exchange Suite Windows BasedOver the Air Provisioning Security IssuesOtap Introduction to Otap Over The Air Provisioning OtapOtap Overview Parameters Max. Length AT Keyword SM Install/update Delete Otap ParametersShort Message Format Install operationDelete operation Java File Format Procedures Install/Update Delete Time Out Values and Result Codes Tips and Tricks for OtapOtap Tracer SecurityHow To Compile and Run a Program without a Java IDE Build ResultsRun on the Module with Manual Start CompileRun on the Module with Autostart Switch on Autostart Switch off AutostartDebug Environment Data Flow of a Java Application in the Debug EnvironmentEmulator Java IDE Sun Java Studio Mobility 6 2004Q3 Switching emulators Projects Examples TemplatesCompile and run JBuilderX JDK settings Borland JBuilderExamples TC65 Java Users Guide JBuilder2005 JDK settings Eclipse IntegrationEclipse Plug-in installation Eclipse J2ME platform TC65 Java Users GuideV05 26.09.2005 Example Eclipse Project importEclipse Example Compile and debug Eclipse Create packageEclipse Configuration BreakpointsJava Security Secure Data Transfer ModeAsja Vasecuritycertificate J a va C u r i t y c e r t i f i c a t e Create a Secure Data Transfer Environment Step by Step Create CA and generate CA Root CertificateSecured mode Unsecured modeExecution Control Change to Secured Mode Concept Build binary data for AT command AtsjsecGenerate key pair Generate customer root CertificateConcept for the Signing the Java MIDlet Encoded JAR-File HashStructure and Description of the Java Security Commands Application and Data ProtectionStructure of the Java Security Commands General structureBuild Java Security Command Hash SHA1Send Java Security Command to the Module ATSJSEC?Create Java Security Commands Export X.509 Root CertificateCommand switch off module exchange functionality Sign a MIDletUsing the AT Command API Class ATCommandJava Tutorial Instantiation with or without CSD SupportSending an AT Command to the Device, the send Method Data ConnectionsTC65 Java Users Guide Non-blocking ATCommand.send Method ATCommandResponseListener InterfaceSynchronization ATEvents ATCommandListener InterfaceImplementation Registering a Listener with an ATCommand Instance Threads Programming the MIDletExample TC65 Java Users Guide Differences from the TC45
Related manuals
Manual 123 pages 53.3 Kb