⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 securitypolicy_rp.html

📁 J2ME MIDP2.0 final specification
💻 HTML
📖 第 1 页 / 共 5 页
字号:
the BIT STRING subjectPublicKey (excluding the tag, length, andnumber of unused bits) of that certificate.  This method iscommonly used to compute key identifiers, especially to acceleratetrust-chain building [RFC3280, &sect;4.2.1.2]. The implementationMUST NOT assume for optimization purposes that X.509 key identifiersor PKCS#15 labels are the correct value; however, and MUST computethe hash themselves. This hash MUST be used by the device to decidewhen a given program should be deactivated, as specified in Section8. </p><h4>3.3 Trusted Third-Party Domain</h4><p class="Paragraph">There is no explicit limitation on the number ofdomains available in a given device.  Applications thatauthenticate to a trusted third-party root certificate MUST belong toa Third-Party domain. If a given device has no Third-Party domain inthe policy file, then a third-party application MUST be authorizedand installed only as untrusted and MUST belong to the Untrusteddomain. </p><p class="Paragraph">Third-party root certificates downloaded after devicemanufacture MUST NOT be used for authentication of MIDlets.</p><p class="Paragraph">The implementation MUST present the user with the <i>Subject</i>fieldof the signing certificate of a MIDlet whenever a new MIDlet isinstalled in the Third-Party domain. This user notification MUST takeplace at MIDlet installation. When the user isprompted to grant permissions to an application, the prompt MUSTidentify the trusted source with the <i>Subject</i> field of the signingcertificate.</p><p class="Paragraph">The user must be able to delete or disable trusted third-partycertificates. If a third-party root certificate is to be deleted, theimplementation SHOULD warn the user of the consequence of thedeletion adequately. The user MUST be able to enable a disabledthird-party root certificate. A disabled third-party root certificateMUST NOT be used to verify downloaded MIDlets. Furthermore,  ifa third-party root certificate is deleted or disabled (for example,revoked, deleted, or disabled by the user) the Third-Party domainmust no longer be associated with this root certificate. If the userchooses to delete the root certificate, implementation may provide anoption to delete the applications authenticated to it. </p><p class="Paragraph">Trusted third-party applications are not granted any permissions<i>Allowed</i> by the Third-Party domain. All permissions granted bythe Third-Party domain are <i>User</i> permissions, that is, userinteraction is required for permission to be granted. Table 1specifies the function groups and the available user permissiontypes for applications in the Third-Party domain. Tables 2 through 6specify the mapping of permissions and APIs onto different functiongroups.</p><h4>3.4 Untrusted Domain</h4><p class="Paragraph"><b>MIDlets that areunsigned will belong to the Untrusted domain.</b></p><p class="Paragraph">The implementation MUST inform theuser whenever a new MIDlet is installed in the Untrusted domain. Thenotification MUST indicate that the application does not come from atrusted source.  The user must be able to make an informeddecision based on the available information before grantingpermissions to an application. </p><p class="Paragraph">When the user is prompted to grantpermissions to an application the prompt MUST indicate that theapplication does not come from a trusted source.</p><p class="Paragraph">Untrusted applications MUST NOT gain read access directly to PIMdata through the API defined in JSR 75 (see Table 1 in Section 5).Interactions between an untrusted application and the PIM data can beenabled, however, by implementations of the javax.microedition.lcduipackage: when the application programmer sets the constraintTextField.PHONENUMBER, an implementation of the TextField class MAYpropose that the user look up a number in his or her phone book andcopy it to the TextField item.  For example, when the TextFielditem has input focus, the user can access a menu to enter the phonebook; when the user selects an entry in the phone book, the contentsof the selected entry are "copied and pasted" into theTextField item.  </p><p class="Paragraph">Table 1 specifies the function groups and the available userpermissions for applications in the Untrusted domain. Tables 2through 6 specify the mapping of permissions and APIs onto differentfunction groups.</p><h2 class="ChapterTitle">4  Remotely Located Policy File</h2><p class="Paragraph">The MIDP 2.0 specification defines the genericformat for the policy file that can be read from removable media.GSM/UMTS-compliant devices are not expected to use it in the firstphase, but rather to use a single policy file resident on thedevice.  The possibility of remotely located policy files isleft for further consideration. </p><h2 class="ChapterTitle">5  Permissions for Downloaded MIDlet Suites</h2><p class="Paragraph"><b>Mapping MIDP 2.0 Permissions onto Function Groups inProtected Domains</b></p><p class="Paragraph">A device with a small display may not be able topresent all permissions to the user in a single configurationsettings menu in a user-friendly manner. Therefore the device is notrequired to present all individual permissions for user confirmation.Rather, a certain higher-level action triggered by the protectedfunction should be brought to the user for acceptance.  Thehigh-level functions presented to the user essentially capture andreflect the actions and consequences of the underlying individualpermissions. The function groups are as follows: </p><p class="Paragraph">Network/cost-related groups: </p><p class="Paragraph"><b>Phone Call</b> &#8211; the group represents permissions toany function that results in a voice call. </p><p class="Paragraph"><b>Net Access</b> &#8211; the group represents permissions to anyfunction that results in an active network data connection (forexample GSM, GPRS, UMTS, etc&#8230;); such functions must be mapped to thisgroup.<br></p><p class="Paragraph"><b>Messaging</b> &#8211; the group represents permissions toany function that allows sending or receiving messages (for example,SMS, MMS, etc.) </p><p class="Paragraph"><b>Application Auto Invocation</b> &#8211; the group representspermissions to any function that allows a MIDlet to be invokedautomatically (for example, push, timed MIDlets, etc.) </p><p class="Paragraph"><b>Local Connectivity</b> &#8211; the group representspermissions to any function that activates a local port for furtherconnection (for example, COMM port, IrDa, Bluetooth, etc.) </p><p class="Paragraph">User-privacy-related groups: </p><p class="Paragraph"><b>Multimedia recording</b> &#8211; the group representspermissions to any function that gives a MIDlet the ability tocapture still images, or to record video or audio clips.</p><p class="Paragraph"><b>Read User Data Access</b> &#8211; the group representspermissions to any function that gives a MIDlet the ability to read auser's phone book, or any other data in a file or directory. </p><p class="Paragraph"><b>Write User Data Access</b> &#8211; the group representspermissions to any function that gives a MIDlet the ability to add ormodify a user's phone book, or any other data in a file or directory.</p><p class="Paragraph">Whenever new features are added to the MIDP they should beassigned to the appropriate function group. In addition, APIs thatare specified elsewhere (that is, in other JSRs) but rely on the MIDPsecurity framework should also be assigned to an appropriatefunction group. If none of the function groups defined in thissection is able to capture the new feature and reflect it to the useradequately, however, then a new function group MUST be defined inthis document.</p><p class="Paragraph">If a new function group is to be added, the following should betaken into consideration: the group to be added MUST not introduceany redundancy to the existing groups, the new group MUST be capableof protecting a wide range of similar features. The latterrequirement is to prevent introducing narrowly scoped groups. </p><p class="Paragraph">It is the function groups and not the individual permissions thatshould be presented when the user is prompted.  Furthermore, itis the function groups that should be presented to the user in thesettings of a given MIDlet suite. </p><p class="Paragraph">Table 1 presents the policy that must be enforced using thesecurity framework as defined in MIDP 2.0. The table specifies theavailable permission settings for each function group defined. Settings that are effective at the time the MIDlet is invoked for thefirst time, and remain effective until the user changes them in theMIDlet's configuration menu, are called "default settings."  Settings available to the user in the configuration menu, towhich the user can change from a default setting, are called "othersettings." Together, default and other settings form a pool ofavailable configuration settings for the MIDlet. Default and othersettings are presented for each function group and each protectiondomain. The naming of the function groups is implementation-specificbut MUST follow the guidelines of the function-group names defined inthis document as well as the definitions of these groups. </p><p class="Paragraph">Tables 2 through 5 present individual permissions defined in theMIDP 2.0 and other JSRs, and map to the function groups specifiedin this section. An individual permission MUST occur in only onefunction group. </p><p class="Paragraph">It is not mandatory for manufacturer and operator-trustedapplications to adhere to the settings defined in the followingtables, as the necessary user prompts should be given by theapplication itself.  It is recommended that the manufacturer andoperator-trusted applications adhere to the permission guidelinesprovided in the tables, and present appropriate prompts to the userfor the functions identified as security-protected.  <br>  </p><p align="center">  Table 1: Function groups and user settings </p><table width="72%" border="1" cellpadding="0" cellspacing="3" align="center">	<tbody><tr>		<td width="24%">			<p style="border: medium none ; padding: 0cm;">			<b>Function group</b></p>		</td>		<td colspan="2" width="32%">			<p style="border: medium none ; padding: 0cm;">			<b> Trusted Third-Party  domain</b></p>		</td>		<td colspan="2" width="40%">			<p style="border: medium none ; padding: 0cm;">			<b> Untrusted  domain</b></p>		</td>	</tr>	<tr>		<td rowspan="2">			<p style="border: medium none ; padding: 0cm;">			 Phone Call</p>		</td>		<td>			<p style="border: medium none ; padding: 0cm;">			 default setting</p>		</td>		<td>			<p style="border: medium none ; padding: 0cm;">			 Oneshot</p>		</td>		<td>			<p style="border: medium none ; padding: 0cm;"> default			setting</p>		</td>		<td>			<p style="border: medium none ; padding: 0cm;">			 Oneshot</p>		</td>	</tr>	<tr>		<td>			<p style="border: medium none ; padding: 0cm;">			 other settings</p>		</td>		<td>			<p style="border: medium none ; padding: 0cm;">			 No</p>		</td>		<td>			<p style="border: medium none ; padding: 0cm;">			 other settings</p>		</td>		<td>			<p style="border: medium none ; padding: 0cm;">			 No</p>		</td>	</tr>	<tr>		<td rowspan="2" width="24%">			<p style="border: medium none ; padding: 0cm;">			 Net Access</p>		</td>		<td width="14%">			<p style="border: medium none ; padding: 0cm;">			 default setting</p>		</td>		<td width="18%">			<p style="border: medium none ; padding: 0cm;">			 Session</p>		</td>		<td width="13%">			<p style="border: medium none ; padding: 0cm;">			 default setting</p>		</td>		<td width="26%">			<p style="border: medium none ; padding: 0cm;">			 Session</p>		</td>	</tr>	<tr>		<td width="14%">			<p style="border: medium none ; padding: 0cm;">			 other settings</p>		</td>		<td width="18%">			<p style="border: medium none ; padding: 0cm;">			 Blanket, No</p>		</td>		<td width="13%">			<p style="border: medium none ; padding: 0cm;">			 other settings</p>		</td>		<td width="26%">			<p style="border: medium none ; padding: 0cm;">			 No</p>		</td>	</tr>	<tr>		<td rowspan="2" width="24%">			<p style="border: medium none ; padding: 0cm;">			 Messaging</p>		</td>		<td width="14%">			<p style="border: medium none ; padding: 0cm;">			 default setting</p>		</td>		<td width="18%">			<p style="border: medium none ; padding: 0cm;">			 Oneshot</p>		</td>		<td width="13%">			<p style="border: medium none ; padding: 0cm;">			 default setting</p>		</td>		<td width="26%">			<p style="border: medium none ; padding: 0cm;">			 Oneshot</p>		</td>	</tr>	<tr>		<td width="14%">			<p style="border: medium none ; padding: 0cm;">			 other settings</p>		</td>		<td width="18%">			<p style="border: medium none ; padding: 0cm;">			 No</p>		</td>		<td width="13%">			<p style="border: medium none ; padding: 0cm;">			 other settings</p>		</td>		<td width="26%">			<p style="border: medium none ; padding: 0cm;">			 No</p>		</td>	</tr>	<tr>		<td rowspan="2" width="24%">			<p style="border: medium none ; padding: 0cm;">			 Application Auto Invocation</p>		</td>		<td width="14%">			<p style="border: medium none ; padding: 0cm;">			 default setting</p>		</td>		<td width="18%">			<p style="border: medium none ; padding: 0cm;">			 Oneshot</p>		</td>		<td width="13%">			<p style="border: medium none ; padding: 0cm;">			 default setting</p>		</td>		<td width="26%">			<p style="border: medium none ; padding: 0cm;">			 Oneshot</p>		</td>	</tr>	<tr>		<td width="14%">			<p style="border: medium none ; padding: 0cm;">			 other settings</p>		</td>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -