Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 23.057
Word version: 18.0.0
1…
5…
5
Generic MExE functions (excluding security)
6
Generic MExE Security
7
MExE Classmark 1 (WAP environment)
8
MExE Classmark 2 (PersonalJava environment)
9
MExE Classmark 3 (J2ME CLDC environment)
10
MExE classmark 4 (CLI Compact environment)
A
MExE profile of PKCS#15
B
PKCS#15 certificate objects ASN1 expanded syntax extract
C
Access restriction certificate extension
D
MExE executable life cycle
E
MExE conformance requirements
$
Change history
5
Generic MExE functions (excluding security)
p. 16
5.1
User profile
p. 16
5.1.1
Location of, access to, and security of, the user profile
p. 16
5.1.2
Support of the user profile
p. 17
5.1.3
User interface personalisation
p. 18
5.1.3.1
MExE user interface personalisation
p. 18
5.1.3.2
Support of MExE user interface personalisation
p. 18
5.1.4
Virtual home environment
p. 19
5.2
Capability and content negotiation
p. 19
5.2.1
User profile and capability negotiation relationship
p. 20
5.2.2
Capability negotiation characteristics
p. 20
5.2.3
Client content capability report
p. 22
5.2.4
Server role in capability negotiation
p. 22
5.2.5
Client-driven negotiation
p. 22
5.3
Provisioning and management of services
p. 22
5.3.1
Service discovery
p. 22
5.3.2
Service transfer
p. 23
5.3.3
Service installation and configuration
p. 23
5.3.4
Service management
p. 23
5.3.5
Service termination
p. 23
5.3.6
Service deletion
p. 23
5.4
User control of application connections
p. 24
5.4.1
Journaling of network events
p. 24
5.4.2
User notification
p. 24
5.5
Quality of service
p. 24
5.5.1
Introduction
p. 26
5.5.2
MExE QoS support
p. 26
5.5.3
MExE QoS manager
p. 27
5.5.4
Network control API
p. 27
5.5.5
MExE QoS API
p. 27
5.5.6
Sources of bearer service parameters
p. 28
5.5.7
QoS streams
p. 28
5.5.8
QoS security
p. 28
5.6
Charging
p. 28
5.6.1
Generic charging support
p. 29
6
Generic MExE Security
p. 29
6.1
Introduction
p. 29
6.2
MExE executable integrity
p. 29
6.2.1
Full signature verification
p. 30
6.2.2
Optimised pre-launch signature verification
p. 30
6.3
MExE executable permissions
p. 30
6.3.1
MExE executable permissions for operator, manufacturer and third party security domains
p. 30
6.3.2
MExE executable permissions for untrusted MExE executables
p. 33
6.4
Handling of MExE executables when their valid root public key is not available
p. 34
6.4.1
Launching of MExE executables when their valid RPK is not available
p. 35
6.4.2
Currently executing secure MExE executables when their valid RPK is no longer available
p. 35
6.5
User permission types
p. 35
6.6
Root Public keys
p. 36
6.6.1
Operator root public key
p. 36
6.6.1.1
Caching of root public keys
p. 37
6.6.1.2
MExE device actions on detection of valid (U)SIM application and/or power up
p. 37
6.6.2
Manufacturer root public key
p. 39
6.6.3
Third party root public key
p. 39
6.7
Certification and authorisation architecture
p. 40
6.7.1
Certification requirements
p. 40
6.7.1.1
MExE terminal requirements for certificate processing
p. 40
6.7.2
Certification administration requirements
p. 41
6.7.3
Example certification process
p. 41
6.7.4
Certificate Chain Verification
p. 42
6.8
Usage of Signed Content
p. 44
6.8.1
Signed packages used for installation
p. 44
6.8.2
Installation of root certificates in a signed data package
p. 45
6.8.3
Installation of other signed data
p. 45
6.9
Certificate Format
p. 46
6.9.1
Certificate extension for removal of network access
p. 46
6.9.1.1
X.509 version 3
p. 46
6.10
Certificate management
p. 46
6.10.1
Certificate configuration message (CCM)
p. 47
6.10.1.1
CCM numbering convention
p. 50
6.10.1.2
CCM order of transmission
p. 50
6.10.1.3
CCM field mapping convention
p. 50
6.10.1.4
Authorised CCM download mechanisms
p. 50
6.11
Separation of I/O streams
p. 50
6.12
Core software download
p. 51
6.13
Administrator Concept
p. 51
6.13.1
Administrator root public key
p. 51
6.13.2
Provisioned mechanism for designating administrative responsibilities and adding third parties in a MExE device
p. 52
6.13.3
MExE administrator determination mechanism
p. 52
6.13.3.1
Determining the administrator of the MExE device
p. 52
6.13.3.2
Determining the administrator of the MExE device, for MExE-(U)SIM supporting third party certificates
p. 53
6.13.3.2.1
Administrator of the MExE device is the user
p. 53
6.13.3.2.2
Administrator of the MExE device is not the user
p. 54
6.13.4
Administrator root certificate download mechanism
p. 55
7
MExE Classmark 1 (WAP environment)
p. 56
7.1
Introduction
p. 56
7.1.1
WAP MExE devices
p. 56
7.1.2
High level architecture
p. 56
7.2
Non Security
p. 56
7.2.1
WAP components
p. 56
7.2.2
Services
p. 57
7.2.2.1
User interface
p. 57
7.2.2.2
Access points
p. 57
7.2.2.3
Transferring
p. 58
7.2.2.3.1
WSP and HTTP/1.1 Proxy Function
p. 58
7.2.3
WAP charging support
p. 59
7.2.4
CC/PP over WSP (Classmark 1)
p. 59
7.3
Security
p. 59
7.3.1
Call control
p. 59
7.3.2
Local phonebook
p. 59
8
MExE Classmark 2 (PersonalJava environment)
p. 59
8.1
Introduction
p. 59
8.1.1
Classmark 2 MExE devices
p. 60
8.1.2
High level architecture
p. 60
8.2
Non Security
p. 60
8.2.1
High level functions
p. 60
8.2.1.1
Optional Java packages
p. 60
8.2.1.2
Required and optional PersonalJava APIs
p. 61
8.2.1.3
Required and optional JavaPhone APIs
p. 61
8.2.1.3.1
Application installation
p. 62
8.2.1.3.2
Power
p. 62
8.2.1.3.3
Datagram recipient addressing
p. 62
8.2.1.4
Required and optional MExE PersonalJava APIs
p. 62
8.2.1.5
Mandated services and applications
p. 63
8.2.1.5.1
Network protocol support
p. 63
8.2.2
CC/PP over HTTP (Classmark 2)
p. 63
8.2.3
Java charging support
p. 63
8.3
Security
p. 63
8.3.1
PersonalJava security
p. 63
8.3.1.1
Java applet certification in PersonalJava
p. 63
8.3.1.2
Java application signature verification in PersonalJava
p. 63
8.3.1.3
Java loading native libraries in PersonalJava
p. 64
8.3.2
Installing MExE native libraries
p. 64
9
MExE Classmark 3 (J2ME CLDC environment)
p. 64
9.1
Introduction
p. 64
9.1.1
Classmark 3 MExE devices
p. 64
9.1.2
High level architecture
p. 64
9.1.3
High level functionality
p. 65
9.2
Non Security
p. 65
9.2.1
Connected Limited Device Configuration (CLDC)
p. 65
9.2.2
Mobile Information Device Profile (MIDP)
p. 65
9.2.2.1
Networking
p. 66
9.2.2.2
MID Applications (MIDlet)
p. 66
9.2.2.3
MIDlet Suites
p. 66
9.2.2.4
Record Storage
p. 66
9.2.3
Required and optional MExE APIs
p. 66
9.2.4
Service discovery and management
p. 66
9.2.5
Transfer of capability negotiation information in Classmark 3
p. 67
9.3
Security
p. 67
9.3.1
CLDC security
p. 67
10
MExE classmark 4 (CLI Compact environment)
p. 67
10.1
Introduction
p. 67
10.1.1
High level architecture
p. 68
10.2
Non security
p. 68
10.2.1
High level functionality
p. 68
10.2.2
Network protocol support
p. 69
10.2.3
Power Management
p. 69
10.2.4
CLI charging support
p. 69
10.2.5
CC/PP over HTTP or WSP (Classmark 4)
p. 69
10.3
Security
p. 70
10.3.1
CLI Security
p. 70
A
(Normative) MExE profile of PKCS#15
p. 71
A.1
PKCS#15 certificate object attributes presentation
p. 71
A.1.1
Object common attributes
p. 71
A.1.2
Certificate common attributes
p. 71
A.1.3
Certificate attributes
p. 71
A.1.4
Specific X.509 certificate attributes
p. 71
A.2
MExE profile of PKCS#15
p. 71
A.3
Coding and storage in MExE-(U)SIM
p. 72
B
PKCS#15 certificate objects ASN1 expanded syntax extract
p. 73
C
(Normative) Access restriction certificate extension
p. 74
D
MExE executable life cycle
p. 75
D.1
State of a MExE executable
p. 75
D.2
Released state
p. 77
D.3
Uninstalled Execution state
p. 78
D.4
Verification
p. 79
E
MExE conformance requirements
p. 80
$
Change history
p. 84