Project

General

Profile

SonyEricssonJ120i » History » Revision 3

Revision 2 (fixeria, 11/27/2023 09:21 PM) → Revision 3/12 (fixeria, 11/27/2023 09:43 PM)

{{>toc}} 

 h1. SonyEricssonJ120i 

 This is another ODM phone model based on TI Calypso. Not yet supported. 

 h2. Specifications 

 https://www.gsmarena.com/sony_ericsson_j120-1843.php 

 * GSM 900/1800 
 * 99 x 44 x 17 mm, 75g 
 * STN 65k, 96 x 64 
 * 900mAh Li-Ion battery (BST-37) 

 h2. Hardware 

 TODO 

 h3. Flash 

 * INTEL 28F320W18T (1.8 Volt Wireless Flash Memory, 4 MByte) 

 h4. Flash dumps 

 * https://people.osmocom.org/fixeria/dump/se_j120i/J120i_R1A007_CXC1250845_full.bin -- full flash, dumped using pstool 
 * https://people.osmocom.org/fixeria/dump/se_j120i/J120i-R1A007-CXC1250845-356325015955496-fc-full.bin -- full flash, dumped using fc-loadtool 
 ** https://people.osmocom.org/fixeria/dump/se_j120i/fc_loadtools.patch 

 h3. Serial cable 

 J120i has the standard Sony Ericsson Fastport connector. Refer to [[SonyEricssonJ100i]] for more details. 

 

 h2. Bootloader 

 Similarly to [[SonyEricssonK200i|Sony Ericsson K200i]] and unlike [[SonyEricssonJ100i|Sony Ericsson J100i]], J120i has the boot ROM (see [[CalypsoRomloader]]) enabled. 

 h2. Stock firmware notes 

 Below are some notes related to the stock SE's firmware. 

 h3. AT Modem mode 

 It's not yet known how to get access to the AT command interpreter. 
 Some AT commands can be found by running strings on the firmware dump. 

 <pre> 
 $ strings J120i_R1A007_CXC1250845_Main.bin | grep "AT[*+]" 
 </pre> 

 h3. MMI codes 

 NOTE: for some codes you need to press the "green" (call) button. 

 * Standard SE codes: 
 ** @-> * <- <- * <- *@ - service info and tests; 
 ** @<- * * <-@ - lock status; 

 Found in the firmware dump: 

 <pre> 
 $ strings J120i_R1A007_CXC1250845_Main.bin | less 
 ... 
 *#06# 
 F*#**837# 
 *#**785# 
 *#**664# 
 *###664# 
 *#**364# 
 *#**364*564# 
 *#**672# 
 *#**372# 
 *#**2263*0#    -- BAND? 
 *#**2263*1# 
 *#**2263*2# 
 *#**2263*3# 
 *#**2263*4# 
 *#**735*0# 
 *#**735*12# 
 *#**735*13# 
 *#**833*2# 
 *#**833*4# 
 *#**833*7# 
 *#**833*3# 
 *#**778377# 
 *#**464851# 
 *#**324# 
 *#**6360# 
 F*#**6361# 
 F*#**6362# 
 F*#**6363# 
 F*#**6364# 
 F*#**266*0# 
 *#**266*1# 
 *#**277378#    -- ASSERT? 
 *#**636# 
 *#**636*0# 
 *#**636*1# 
 *#**84637# 
 *#**767# 
 *#**3428*0# 
 *#**3428*1# 
 *#**3428*2# 
 *#**778337# 
 *#**25276# 
 *#**62683# 
 *#**3646633*0# 
 *#**3646633*1# 
 *#**678257# 
 *#**33284#    -- DEBUG 
 </pre> 

 https://www.dcode.fr/t9-cipher is quite useful for guessing the purpose.
Add picture from clipboard (Maximum size: 48.8 MB)