Java User’s Guide
12 Java Security
112
s
wm_java_usersguide_v12 Page 98 of 123 2008-02-25
Confidential / Released
12 Java Security
The Java Security Model follows the specification of MIDP 2.0 and is IMP-NG conforming. It
integrates only a simple protection domain concept since protection domains are not needed
for module use cases.
Java Security is divided into two main areas:
Secure MIDlet data links (HTTPS, Secure Connection) (see Section 12.1)
Execution of signed/unsigned MIDlets (see Section 12.2)
The interface of Java Security offers the following functionality.
Insert/delete X.509 certificate (default is no certificate, see Section 12.2.1)
Switch between trusted and untrusted mode for the execution of MIDlet
(default is trusted after inserting the certificate, see Section 12.2.1)
Enable/disable untrusted domain in trusted mode (default is disabled)
Switch MES (default is ON see Section 12.3)
Switch https certificate verification (default is OFF, see Section 12.1)
Restrictions:
The module does not supply users independent date/time base. Therefore no examination
of the validity of the expiration date/time of the certificate takes place.

12.1 Secure Data Transfer

This feature makes it possible for MIDlets to use safe data links to external communications
partners. The specification IMP-NG defines two java classes with this characteristic - HTTPS-
Connection and SecureConnection
.
The Siemens implementation follows the recommendations in IMP-NG:
HTTPSConnection
HTTP over TLS as documented in RFC 2818 and TLS Protocol Version 1.0 as specified in
RFC 2246.
SecureConnection
TLS Protocol Version 1.0 as specified in RFC 2246