ant deploy
for each Sun SPOT.
What is protected?
Applications and customized libraries are always verified and unless the digital signature can be successfully verified using the trusted public key, the application will not be executed. Extra security is provided for
Generating a new key-pair
If you wish to generate a new
ant flashlibrary
Limitations
This security scheme has some current limitations. In particular:
•There is no protection against an attacker who has physical access to the Sun SPOT device.
•The SDK key pair is stored in clear text on the host, and so there is no protection against an attacker with access to the host computer’s file system.
Deploying and running a host application
Example
The directory Demos/CodeSamples/SunSpotHostApplicationTemplate contains a simple host
application. Copy this directory and its contents to a new directory to build a host application.
To run the copied host application, first start the base station as outlined in the section Using the Basestation. Run the example on your host by using these commands:
ant
If the application works correctly, you should see (besides other output)
Base station initialized
Normally, the base station will be detected automatically. If you wish to specify the port to be used (for example, if automatic detection fails, or if you have two base stations connected) then you can either indicate this on the command line, by adding the switch
System.setProperty("SERIAL_PORT", "COM3");
If your application doesn’t require a basestation you may add the following switch to the command line:
ant
20