Nokia N71 User Manual page 95

Hide thumbs Also See for N71:
Table of Contents

Advertisement

Confirm SIM services
confirmation messages when you are using a SIM card
service (network service).
Glossary of PIN and lock codes
If you forget any of these codes, contact your service
provider.
Personal identification number (PIN) code — This code
protects your SIM card against unauthorized use. The PIN
code (4 to 8 digits) is usually supplied with the SIM card.
After three consecutive incorrect PIN code entries, the
code is blocked, and you need the PUK code to unblock it.
UPIN code — This code may be supplied with the USIM
card. The USIM card is an enhanced version of the SIM
card and is supported by UMTS mobile devices.
PIN2 code — This code (4 to 8 digits) is supplied with some
SIM cards, and is required to access some functions in
your device.
Lock code (also known as security code) — This code
(5 digits) can be used to lock the device to avoid
unauthorized use. The factory setting for the lock code is
12345. To avoid unauthorized use of your device, change
the lock code. Keep the new code secret and in a safe
place separate from your device. If you forget the code,
contact your service provider.
86
Copyright © 2006 Nokia. All rights reserved.
— You can set the device to display
Personal unblocking key (PUK) code and PUK2 code —
These codes (8 digits) are required to change a blocked PIN
code or PIN2 code, respectively. If the codes are not
supplied with the SIM card, contact the operator whose
SIM card is in your device.
UPUK code — This code (8 digits) is required to change a
blocked UPIN code. If the code is not supplied with the
USIM card, contact the operator whose USIM card is in
your device.
Certif. management
Digital certificates do not guarantee safety; they are used
to verify the origin of software.
In the certificate management main view, you can see a
list of authority certificates that are stored in your device.
Press
to see a list of personal certificates, if available.
Digital certificates should be used if you want to connect
to an online bank or another site or remote server for
actions that involve transferring confidential information.
They should also be used if you want to reduce the risk of
viruses or other malicious software and be sure of the
authenticity of software when downloading and installing
software.

Advertisement

Table of Contents
loading

Table of Contents