User's Guide

60 Java™
Java™
When running a Java™ application, you may be prompted to grant access to protected features. These features are protected
because using them could incur a cost, or involve your personal data. In case of doubt, don't hesitate to refuse access by
selecting the "No" button!
The security configuration menu is an expert feature! You must know exactly what you are doing before attempting to change
the security parameters of a MIDlet. Misunderstanding changes may render MIDlet non functional and/or lead to higher risks
for your private data or impact your airtime consumption. Any changes in the security configuration are done under your
responsibility. In no case shall the manufacturer and/or your network provider be liable for any damages deriving from or
arising out of such changes in the security configuration.
You must be aware that applications downloaded to your phone could cause the phone to perform actions for which you will
be billed, such as making calls and sending SMS. Depending on your operator's billing policy, you may also be charged to
download the application because of airtime consumption.
Security considerations
Java™ MIDP technology is an efficient way to provide powerful applications in mobile phones.
All these MIDP 2.0 features cannot be displayed on MIDlet installed in the handset: an advanced access control system is
implemented in the device to protect your private data and airtime consumption.
Access controls are collected in 9 security groups:
- Network access
- Auto invocation
- Phone call
- Local connectivity
- Messaging receive
- Messaging sending
- Read User data
- Write User data
- Multimedia recording
Each of these security groups has one of 5 possible authorizations levels (listed from the more restrictive to the more
permissive):
- Never: The security group completely prevents access to the protected features.
- Per use: Each time MIDlet tries to use protected feature, user is prompted to grant access.
- Per session: First time a MIDlet uses a protected function, user is prompted to grant access like in "Per use" authorization
but access is granted until the MIDlet terminates.
User guide Roxy FCC_agreement.book Page 60 Mardi, 26. août 2008 3:19 15