Blackberry KEY2 User Manual page 87

Hide thumbs Also See for KEY2:
Table of Contents

Advertisement

User guide
4. Do any of the following:
• Tap Trusted devices. Tap a device, and then tap Remove trusted device.
• Tap Trusted places. Tap a location, and then tap Turn off this location.
• Tap Trusted face. Tap Remove trusted face, and then tap Remove.
• Tap Voice Match. Turn off the Voice Match switch.
• Tap On-body detection. Turn off the switch.
5. If you turn off all of your Smart Lock settings, you should also turn off the Smart Lock trust agent:
• a. Go back to the Security screen and tap Trust agents.
• b. Turn off the Smart Lock (Google) switch.
Protect your SIM card with a PIN
You can use a SIM card PIN to help prevent unauthorized use of your SIM card in another device. For example, if you lose
your SIM card and someone tries to use it in another device, the SIM card can't be used unless the PIN is entered correctly.
After you set up a PIN for your SIM card, you must enter the PIN from the lock screen to use your device.
1. Swipe down from the top of the screen.
2. Tap
> Security & Location > SIM card lock.
3. Turn on the Lock SIM card switch.
4. Type a PIN, and then tap OK.
To remove the PIN from your SIM card, turn off the Lock SIM card switch. Type the PIN for your SIM card, and then tap OK.
Change the PIN for your SIM card
1. Swipe down from the top of the screen.
2. Tap
> Security & Location > SIM card lock.
3. Tap Change SIM PIN.
4. Follow the instructions on the screen.
About smart cards
Smart cards store certificates and private keys. You can import certificates from a smart card to your device by using an
external smart card reader or a microSD smart card. Private key operations such as signing and decryption use the smart
card. Public key operations such as verification and encryption use the public certificates on your device.
You can use smart card certificates with third-party apps that support smart card technology. And you can use smart card
certificates to send S/MIME-protected messages.
Security
87

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bbf100-2

Table of Contents