Java Reference
In-Depth Information
Finally, the com.nttdocomo.security package contains several
classes, many optional, that provide encryption and decryption func-
tionality. The common PKCS #5 (RFC2898) Password-Based Encryption
specification is supported. Using these classes, data can be safely
exchanged between an i-Appli and an external server.
7.9 Summary
There has been a lot of new information in this chapter, so we'll keep this
short. We talked about the market in Japan and some of the history of
mobile technologies. We saw that even though the world is excited today
about 3G networks, Japan had the first 3G network (FOMA) way back in
2001. We've also learned how to develop applications using DoJa 2.5oe
and Eclipse as well as what to keep in mind when trying to port MIDlets
across to the DoJa environment.
Sam Cartwright has given us a rare glimpse of some advanced mobile
phone technologies that we can hope to see emerging in the rest of
the world over the next decade or so. He also detailed the functionality
available in the very latest DoJa 5.1 handsets. It doesn't get more cutting
edge than this.
DoJa is a whole area of Java ME technology that we can only view at
a distance from outside Japan - but what they're doing over there now
makes the future look all the more exciting for the rest of us. Whatever it
entails, you can be sure that Java ME technologies will form the nucleus
of the next generation of mobile games and applications.
Search WWH ::




Custom Search