In the development of Windows Mobile, because Microsoft imposes restrictions on access to some APIs based on security considerations, sometimes the application needs a signature to run. This is undoubtedly a very troublesome issue. For programs without signatures, the Microsoft simulator will prompt:
If you can skip Microsoft's security restrictions, it is undoubtedly the most convenient method for development. You can do this by modifying the registry information, as shown below:
L use ActiveSync to upload the sp_allowcertificateinstall.cab file to the simulator directory and install it;
L transfer the regeditstg2.exe file to the simulator directory through activesync;
L double-click the regeditstg2.exe file and navigate to the HKEY_LOCAL_MACHINE/security/policies/directory. Then click the values key and set the value of 00001005 to 40 (16 by default );
L restart the simulator;
L reinstall the CBA (cabinet) application;
The key values in the Registry correspond to the following meanings:
; Autorun Policy
; Value: 0-applications on a CF card are allowed to auto-run
; [HKEY_LOCAL_MACHINE/security/policies]
, "00000002" = DWORD: 0
; Rapi Policy
; Value: 2-rapi CILS in restricted mode
[HKEY_LOCAL_MACHINE/security/policies]
"00001001" = DWORD: 2
; Unsigned cabs role
; (Default: secrole_userauth)
[HKEY_LOCAL_MACHINE/security/policies]
"00001005" = DWORD: 10
; Unsigned applications Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001006" = DWORD: 1
; Unauthenticated role is used for processing homescreens
[HKEY_LOCAL_MACHINE/security/policies]
"00001007" = DWORD: 40
; TPS Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001008" = DWORD: 1
; Message Authentication retry number Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001009" = DWORD: 3
; WAP signed message Policy
; (Default: secrole_ppg_auth | secrole_ppg_trusted | secrole_operator_tps)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100b" = DWORD: C80
; SL message Policy
; (Default: secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100c" = DWORD: 800
; Si message Policy
; (Default: secrole_ppg_auth | secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100d" = DWORD: c00
; Unauthenticated message Policy
; Value: 64-user_unauth
[HKEY_LOCAL_MACHINE/security/policies]
"0000100e" = DWORD: 40
; OTA provisioning policy
; (Default: operator_tps | secrole_ppg_trusted | secrole_ppg_auth | secrole_trusted_ppg | user_auth)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100f" = DWORD: E90
; WSP push Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001011" = DWORD: 1
; Grant Manager Policy
; (Default: operator_tps for phone SKUs; user_auth for non-phone SKUs)
[HKEY_LOCAL_MACHINE/security/policies]
If skutype = phonesku
"00001017" = DWORD: 80
Endif; skutype = phonesku
If skutype = phonesku!
"00001017" = DWORD: 10
Endif; skutype = phonesku!
; Grant user auth Policy
; (Default: user_auth)
[HKEY_LOCAL_MACHINE/security/policies]
"00001018" = DWORD: 10
; Trust WAP proxy Policy
; (Default: Operator | operator_tps | Manager)
[HKEY_LOCAL_MACHINE/security/policies]
"00001019" = DWORD: 8C
; Unsigned prompt policy
[HKEY_LOCAL_MACHINE/security/policies]
"2017101a" = DWORD: 0
; Privileged apps Policy
[HKEY_LOCAL_MACHINE/security/policies]
"2017101b" = DWORD: 1
; DRM Security Policy
; (Default secrole_ppg_auth | secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"00001021" = DWORD: c00
; Encrypted mail (useencrypt) Policy
; Applies to Windows Mobile aku2 and later
[HKEY_LOCAL_MACHINE/security/policies]
"0000101e" = DWORD: 1
Default Security Policy settings for Windows Mobile-based smartphone
The following code shows the default security policy settings for Windows Mobile-based smartphone:
; Rapi Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001001" = DWORD: 2
; Unsigned cabs role
[HKEY_LOCAL_MACHINE/security/policies]
"00001005" = DWORD: 10
; Unsigned applications Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001006" = DWORD: 1
; Unauthenticated role is used for processing homescreens
[HKEY_LOCAL_MACHINE/security/policies]
"00001007" = DWORD: 40
; TPS Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001008" = DWORD: 1
; Message Authentication retry number Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001009" = DWORD: 3
; WAP signed message Policy
; (Default: secrole_ppg_auth | secrole_ppg_trusted | secrole_operator_tps)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100b" = DWORD: C80
; SL message Policy
; (Default: secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100c" = DWORD: 800
; Si message Policy
; (Default: secrole_ppg_auth | secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100d" = DWORD: c00
; Unauthenticated message Policy
[HKEY_LOCAL_MACHINE/security/policies]
"0000100e" = DWORD: 40
; OTA provisioning policy
; (Default: operator_tps | secrole_ppg_trusted | secrole_ppg_auth | secrole_trusted_ppg | user_auth)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100f" = DWORD: E90
; WSP push Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001011" = DWORD: 1
; Grant Manager Policy
; (Default: operator_tps)
[HKEY_LOCAL_MACHINE/security/policies]
"00001017" = DWORD: 80
; Grant user auth Policy
; (Default: user_auth)
[HKEY_LOCAL_MACHINE/security/policies]
"00001018" = DWORD: 10
; Trust WAP proxy Policy
; (Default: Operator | operator_tps | Manager)
[HKEY_LOCAL_MACHINE/security/policies]
"00001019" = DWORD: 8C
; Unsigned prompt policy
; If the registry value is not present, the behavior is the same as setting the value to 0 (zero ).
; Privileged apps Policy
; If the registry value is not present, the behavior is the same as setting the value to 0 (zero ).
; DRM Security Policy
; (Default secrole_ppg_auth | secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"00001021" = DWORD: c00
; Encrypted mail (useencrypt) Policy
; Applies to Windows Mobile aku2 and later
[HKEY_LOCAL_MACHINE/security/policies]
"0000101e" = DWORD: 1