Security Module; Restore Original Settings; Protected Content - Nokia 002J900 User Manual

User manual
Hide thumbs Also See for 002J900:
Table of Contents

Advertisement

To check the details of a certificate, select
Certificate
details. The validity of the certificate is checked,
and one of the following notes may be displayed:
Certificate not trusted
application to use the certificate.
Expired certificate
— The certificate validity period has
ended.
Certificate not valid yet
has not yet begun.
Certificate corrupted
Contact the certificate issuer.
Change the trust settings
Before changing any certificate settings, you must make sure
that you really trust the owner of the certificate and that the
certificate really belongs to the listed owner.
To change the settings for an authority certificate, select
Options
Trust
settings. Depending on the certificate, a
>
list of the applications that can use the selected certificate is
shown. For example:
Symbian
installation:
certify the origin of a new Symbian operating system
application.
● Internet:
Yes
— The certificate is able to certify servers.
App.
installation:
Yes
the origin of a new Java™ application.
To change the value, select
setting.
© 2009 Nokia. All rights reserved.
Options
— You have not set any
— The certificate validity period
— The certificate cannot be used.
Yes
— The certificate is able to
— The certificate is able to certify
Options
Change trust
>

Security module

>
Select
Menu
Security
>
To view or edit a security module (if available), select it from
the list.
To view detailed information about a security module, select
Options
Security
>

Restore original settings

Select
Menu
Factory
settings.
You can reset some of the settings to their original values. To
do this, you need the lock code.
After resetting, the device may take a longer time to power
on. Documents and files are unaffected.

Protected content

To manage digital rights licences, select
and
Phone
content.
Digital rights management
Content owners may use different types of digital rights
management (DRM) technologies to protect their intellectual
property, including copyrights. This device uses various types
of DRM software to access DRM-protected content. With this
device you can access content protected with WMDRM 10,
OMA DRM 1.0, and OMA DRM 2.0. If certain DRM software fails
to protect the content, content owners may ask that such DRM
Settings
and
Phone
>
Security
module.
details.
Settings
and
Phone
>
Phone mgmt.
Security
>
>
Settings
Phone mgmt.
>
>
Phone mgmt.
>
>
Menu
Settings
>
Protected
>
99

Advertisement

Table of Contents
loading

This manual is also suitable for:

002l6055800 xpressmusic

Table of Contents