Java™
You are the owner of a SAGEM mobile phone which gives you the ability to download applications and games to be executed on your phone thanks to the
However, receiving applications from everywhere implies some basic knowledge of the possible effects of such download.
Thank you for spending a few minutes reading these pages: this will prevent you from performing action without measuring the consequences.
WARNING: When running a Java™ application, you may be prompted to grant access to protected features. These features are protected because using them could incur you cost, or involve your personal data. Read the security popup message carefully, to understand what feature is requested, and decide whether it is legitimate for the application to perform it. In case of doubt, don't hesitate to refuse access by selecting the "No" button!
The security configuration menu is an expert feature! You must know exactly what you are doing before attempting to change security parameters of a MIDlet. Misunderstanding changes may render MIDlet non functional and/or lead to higher risks for your private data or impact your airtime consumption. Any changes in the security configuration are done under your responsibility. In no case shall Sagem Communication and/or your network provider be liable for any damages deriving from or arising out of such changes in the security configuration.
You must be aware that applications downloaded to your phone could cause the phone to perform actions for which you will be billed, like making calls and sending SMS. Depending on your operator's billing policy, you may also be charged to download the application because of airtime consumption.
Security considerations
Java™ MIDP technology is an efficient way to provide powerful applications in mobile phones. It allows use, by "over the air" downloaded applications or games, of the great features
All these MIDP 2.0 features cannot be simply exposed to any MIDlet installed in the handset: a careful access control system is implemented in the device to protect your private data and airtime consumption.
Access controls are gathered in 9 security groups:
-Network access (GPRS/GSM data airtime consumption, HTTP/web connections…)
-Auto invocation (MIDlet can wake up at a given time or when receiving a SMS)
-Phone call (ability to initiate a phone call)
-Local connectivity (IrDA or serial interfaces use by the MIDlet)
Java™ | 61 |