Hi Shawn,
I've been lurking on the ketai-l list for a few days and I spotted your =
post about MIDP 2 features and from what you've written you have an =
extremely strong grasp of what MIDP 2.0 offers. I know this becasue I am =
a product manager for my company Smart Fusion where we are implementing =
MIDP 2.0 for handset manufacturers. One of my problems at the moment is =
locating some sample MIDP 2.0 source code that can stress/demonstrate =
the new Graphics and Gaming APIs within MIDP 2.0, do you have any ideas =
or pointers that could help me?
I would be very grateful for any input, and would be happy to =
reciprocate if I can
best reagrds
Mathew Smith
-----Original Message-----
From: Shawn [mailto:javajunkie@koyuru.com]
Sent: 13 May 2003 11:13
To: keitai-l@appelsiini.net
Subject: (keitai-l) Re: (keitai) Clossing Walled Gardens and Java vs. =
NativeApplications
> MIDP 1.0 applications are run in a so called sandbox environment to
> minimize the security risk. Therefore you won't be able to access any =
of
> the functionality on the phone.
>
> Do any of you know if this basic logic will change in MIDP 2.0? Which
> are the key new features in MIDP 2.0?
>
Ok MIDP 2.0 will still run things in a sandbox if they are"untrusted".=20
Public Key Infrastructure (PKI) is utilized by MIDP 2.0 to provide =
secure=20
connections and digital signatures for "trusted" MIDP application =
packages=20
(also known as MIDlets).
If and when a device determines that a MIDlet suite can be trusted then=20
access is allowed as indicated by the domain policy.
According to Sun "The internal representation of protection domains and=20
permissions is implementation specific." which I take to mean that=20
functionality will be available depending on the phone but am not =
working=20
with it now so can't say from experience.
In general though, Untrusted applications have access to the entire=20
graphical interface, sound, record management, and core MIDlet packages. =
HTTP and HTTPS connections are only accessible to untrusted applications =
with explicit permission of the end user.
Untrusted code cannot make connections at will; it must receive =
permission=20
from the user. Code can be designated as trusted if the developer =
digitally=20
signs it and the user's device can verify the signature.
Other things include:
There is a push registry that allows MIDlets to be launched in response =
to=20
incoming network connections.
New Media API supports tone generation, tone sequences, and, if the =
device=20
supports sample audio, WAV files.
There is a newly-added gaming API.
Added representation of images as integer arrays, which allows MIDlets =
to=20
manipulate image data directly.
Record stores may be shared between MIDlets
form layout is considerably more sophisticated than it was in MIDP 1.0
http://wireless.java.sun.com/midp/articles/midp20/
http://www.onjava.com/pub/a/onjava/2002/12/18/midp.html
--=20
Shawn
Using M2, Opera's revolutionary e-mail client: http://www.opera.com/m2/
This mail was sent to address Mathew.Smith@smart-fusion.com
Need archives? How to unsubscribe? http://www.appelsiini.net/keitai-l/=20
Received on Tue May 13 12:33:56 2003